Summary
applying the state secrets privilege in a case involving FBI surveillance of members of the Muslim community in California
Summary of this case from In re Terrorist Attacks on Sept. 11, 2001Opinion
Case No. 8:11–cv–00301–CJC(VBKx).
2012-08-14
Ahilan T. Arulanantham, Jennifer L. Pasquarella, Peter Bibring, ACLU Foundation of Southern California, Los Angeles, CA, Ameena Mirza Qazi, Council on American Islamic Relations—Greater Los Angeles, Anaheim, CA, Dan Stormer, Joshua Piovia–Scott, Reem Salahi, Hadsell Stormer Richardson & Renick LLP, Pasadena, CA, for Plaintiffs. Anthony Joseph Coppolino, Lynn Y. Lee, Stephen E. Handler, W. Scooter Slade, U.S. Department of Justice, Annie L. Owens, Carl J. Nichols, Howard M. Shapiro, Wilmer Cutler Pickering Hale & Dorr LLP, Washington, DC, Brian R. Michael, Katie Moran, Peiyin Patty Li, Wilmer Cutler Pickering Hale & Dorr LLP, Alexander H. Cote, Amos Alexander Lowder, Angela Machala, David C. Scheper, Scheper Kim & Harris LLP, Los Angeles, CA, for Defendants.
Ahilan T. Arulanantham, Jennifer L. Pasquarella, Peter Bibring, ACLU Foundation of Southern California, Los Angeles, CA, Ameena Mirza Qazi, Council on American Islamic Relations—Greater Los Angeles, Anaheim, CA, Dan Stormer, Joshua Piovia–Scott, Reem Salahi, Hadsell Stormer Richardson & Renick LLP, Pasadena, CA, for Plaintiffs. Anthony Joseph Coppolino, Lynn Y. Lee, Stephen E. Handler, W. Scooter Slade, U.S. Department of Justice, Annie L. Owens, Carl J. Nichols, Howard M. Shapiro, Wilmer Cutler Pickering Hale & Dorr LLP, Washington, DC, Brian R. Michael, Katie Moran, Peiyin Patty Li, Wilmer Cutler Pickering Hale & Dorr LLP, Alexander H. Cote, Amos Alexander Lowder, Angela Machala, David C. Scheper, Scheper Kim & Harris LLP, Los Angeles, CA, for Defendants.
ORDER GRANTING DEFENDANTS' MOTIONS TO DISMISS BASED ON THE STATE SECRETS PRIVILEGE
CORMAC J. CARNEY, District Judge.
I. INTRODUCTION
The present case involves a group of counterterrorism investigations by the Federal Bureau of Investigation (“FBI”), dubbed “Operation Flex,” in which the FBI engaged a covert informant to help gather information on certain, unidentified individuals from 2006 to 2007. Although some of the general facts about Operation Flex, including the identity of one informant, Craig Monteilh, have been disclosed to the public, much of the essential details of the operation remain classified. After disclosure of Monteilh's identity, Plaintiffs, three Muslim residents of Southern California, filed a putative class action against the FBI, the United States of America, and two FBI officers sued in their official capacities (together, the “Government”) as well as five FBI agents sued in their individual capacities (collectively, “Defendants”). Plaintiffs allege that Defendants conducted an indiscriminate “dragnet” investigation and gathered personal information about them and other innocent Muslim Americans in Southern California based on their religion. In doing so, Plaintiffs allege that Defendants violated their constitutional and civil rights under the First Amendment Free Exercise Clause and Establishment Clause, the Religious Freedom Restoration Act (“RFRA”), the Fifth Amendment Equal Protection Clause, the Privacy Act, the Fourth Amendment, the Foreign Intelligence Surveillance Act (“FISA”), and the Federal Tort Claims Act (“FTCA”). Defendants currently move to dismiss Plaintiffs' claims and for summary judgment pursuant to Federal Rules of Civil Procedure 12 and 56 on various grounds, including the state secrets privilege. Defendants argue that all of Plaintiffs' claims, aside from their FISA and Fourth Amendment claims, must be dismissed because litigation of those claims would risk or require disclosure of certain evidence properly protected by the Attorney General's assertion of the state secrets privilege.
The Attorney General's privilege claim in this action requires the Court to wrestle with the difficult balance that the state secrets doctrine strikes between the fundamental principles of liberty, including judicial transparency, and national security. Although, as the Ninth Circuit aptly opined, “as judges we strive to honor all of these principles, there are times when exceptional circumstances create an irreconcilable conflict between them.” Mohamed v. Jeppesen Dataplan, Inc., 614 F.3d 1070, 1073 (9th Cir.2010), cert. denied,––– U.S. ––––, 131 S.Ct. 2442, 179 L.Ed.2d 1235 (2011). “On those rare occasions, we are bound to follow the Supreme Court's admonition that ‘even the most compelling necessity cannot overcome the claim of privilege if the court is ultimately satisfied that [state] secrets are at stake.’ ” Id. (quoting United States v. Reynolds, 345 U.S. 1, 11, 73 S.Ct. 528, 97 L.Ed. 727 (1953)). Such is the case here. After careful deliberation and skeptical scrutiny of the public and classified filings, the Court concludes that Plaintiffs' claims against Defendants, aside from their FISA claim, must be dismissed under the state secrets privilege. Further litigation of those claims would require or unjustifiably risk disclosure of secret and classified information regarding the nature and scope of the FBI's counterterrorism investigations, the specific individuals under investigation and their associates, and the tactics and sources of information used in combating possible terrorist attacks on the United States and its allies. The state secrets privilege is specifically designed to protect against disclosure of such information that is so vital to our country's national security.
Defendants' motions to dismiss Plaintiffs' FISA claim are discussed in the Court's separate, concurrently-issued Order. The Court finds that dismissal of Plaintiffs' FISA claim against the Government is warranted because sovereign immunity has not been waived. The Court, however, finds that Plaintiffs have alleged sufficient facts to state a FISA claim against the individual-capacity Agent Defendants, who are not entitled to qualified immunity at this stage of the proceeding based on the allegations pled in the First Amended Complaint.
II. BACKGROUND
The central subject matter of this case is a group of counterterrorism investigations by the FBI, known as “Operation Flex,” which focused on fewer than 25 individuals and “was directed at detecting and preventing possible terrorist attacks.” (Pub. Giuliano Decl. ¶ 11.) During the investigations, the FBI utilized Craig Monteilh as a confidential informant from 2006 to 2007. ( Id. ¶¶ 6, 11.) “The goal of Operation Flex was to determine whether particular individuals were involved in the recruitment and training of individuals in the United States or overseas for possible terrorist activity.” ( Id. ¶ 11.) Plaintiffs allege that as part of Operation Flex, Defendants directed Monteilh to infiltrate mosques and indiscriminately collect information about Plaintiffs and other members of the Los Angeles and Orange County Muslim community because of their adherence to and practice of the religion of Islam from July 2006 to October 2007. (First Amended Complaint (“FAC”) ¶¶ 1–3, 86, 167.)
The FBI has only acknowledged that Monteilh engaged in confidential source work and disclosed limited information concerning Monteilh's actions. (Pub. Giuliano Decl. ¶ 6.) For example, in an unrelated criminal proceeding in this district, United States v. Niazi, Case No. 8:09–cr–28–CJC(ANx), the FBI disclosed to the defendant Ahmadullah Niazi the content of the audio and video recordings containing conversations between him and Monteilh and others. ( Id. ¶ 12.) The FBI also acknowledged in the Niazi case that Monteilh provided handwritten notes to the FBI and that it produced certain notes provided by Monteilh concerning Niazi. ( Id.) However, essential details regarding Operation Flex and Monteilh's activities have not been disclosed, and the Government asserts that this information “remains highly sensitive information concerning counterterrorism matters that if disclosed reasonably could be expected to cause significant harm to national security.” ( Id. ¶ 6.) The allegedly privileged information includes (i) the identities of the specific individuals who have or have not been the subject of counterterrorism investigations, (ii) the reasons why individuals were subject to investigation, including in Operation Flex, and their status and results, and (iii) the particular sources and methods used in obtaining information for counterterrorism investigations, including in Operation Flex. (Holder Decl. ¶ 4; Pub. Giuliano Decl. ¶ 6.) The Government provides a more fulsome discussion of the nondisclosed matters in its ex parte, in camera materials that include two classified declarations and a classified supplemental memorandum. (Dkt. Nos. 35, 36, 56.)
With regard to these materials obtained by Monteilh, the FBI states that is it “presently assessing whether additional audio, video, or notes can be disclosed without risking disclosure of the privileged information ... and [risking] significant harm to national security interests in protecting counterterrorism investigations.” (Pub. Giuliano Decl. ¶ 12.)
A. The Parties
Plaintiffs, Sheikh Yassir Fazaga, Ali Uddin Malik, and Yasser AbdelRahim (collectively, “Plaintiffs”), are resident members of the Muslim community in Southern California. (FAC ¶¶ 12–14.) Fazaga, a U.S. citizen born in Eritrea, has served as an “imam” or religious leader of the Orange County Islamic Foundation (“OCIF”), a mosque in Mission Viejo, California, and has lectured widely on topics of Islam and American Muslims. ( Id. ¶¶ 12, 55–56.) Malik, a U.S. citizen born in Southern California, is a resident of Orange County and has regularly attended religious services at the Islamic Center of Irvine (“ICOI”), a mosque in Irvine, California. ( Id. ¶¶ 13, 68–69.) AbdelRahim, a U.S. permanent resident from Egypt, has regularly attended religious services at the ICOI. ( Id. ¶¶ 14, 80.)
The Government Defendants consist of the FBI and the United States of America as well as Robert Mueller, Director of the FBI, and Steven M. Martinez, Assistant Director in Charge of the FBI Los Angeles Field Office, sued in their official capacities. ( Id. ¶¶ 15–17, 255.) Defendants also include five FBI agents, Kevin Armstrong, Paul Allen, J. Stephen Tidwell, Barbara Walls, and Pat Rose (collectively, “Agent Defendants”), who are sued in their individual capacities. ( Id. ¶¶ 18–22.) Defendants Armstrong and Allen, who were both assigned to the Orange County area, were handlers for Monteilh and allegedly directed Monteilh to gather information on the Muslim community in Orange County and also supervised his purported surveillance activities. ( Id. ¶¶ 18–19, 87.) Defendant Rose, who was assigned to the FBI's Santa Ana branch office, supervised the FBI's Orange County national security investigations and directly supervised Allen and Armstrong. ( Id. ¶ 22.) Defendant Walls, the head of the FBI's Santa Ana branch office, directly supervised Allen, Armstrong, and Rose. ( Id. ¶ 21.) Defendant Tidwell served as the Assistant Director in Charge of the FBI's Los Angeles Field Office from August 2005 to December 2007, and in that capacity, supervised operations in the Central District of California. ( Id. ¶ 20.) Plaintiffs allege Tidwell authorized the selection of Monteilh as an informant and directed the actions of Armstrong, Allen, Rose, Walls, and other agents in the handling of Monteilh. ( Id.)
B. Operation Flex
The Court emphasizes that the facts regarding Operation Flex are only allegations from the FAC and do not constitute established facts or disclosures by Defendants. The FBI has neither confirmed nor denied that Monteilh collected information specifically in connection with any of the Plaintiffs or the putative class members.
Plaintiffs allege many disturbing facts about Operation Flex and wrongdoing by Defendants. Sometime prior to July 2006, Plaintiffs allege that the FBI hired Monteilh to be a paid informant to covertly gather information about Muslims in the Irvine area. (FAC ¶ 48.) Monteilh became a Muslim convert, began to attend the ICOI and five of the other largest mosques in Orange County, and assumed the name Farouk al-Aziz. ( Id. ¶¶ 49–50, 92.) Monteilh interacted with many members of the Muslim community in Southern California during the relevant time period, including Plaintiffs, as part of a “broader pattern of dragnet surveillance program that Monteilh engaged in at the behest of his FBI handlers,” known as “Operation Flex,” which referenced Monteilh's cover as a fitness instructor. ( Id. ¶¶ 54–85, 86, 88.) Armstrong and Allen, who supervised all of Monteilh's work, informed Monteilh that Operation Flex was part of a broader surveillance program that went beyond his work. ( Id. ¶ 88.) Defendants did not limit Monteilh to specific targets on which they wanted information, but “repeatedly made clear that they were interested simply in Muslims” and that he should gather “as much information on as many people in the Muslim community as possible,” with heightened attention to particularly religious members and those who attracted Muslim youths. ( Id. ¶¶ 89, 90, 98.) Plaintiffs allege that “[t]he central feature of the FBI agents' instructions to Monteilh was their directive that he gather information on Muslims, without any further specification,” and indiscriminately gather information about them under the maximum that “everybody knows somebody” who may have some connection with the Taliban, Hezbollah, and Hamas. ( Id. ¶¶ 89, 117.)
Over the course of Operation Flex, Plaintiffs allege that Armstrong and Allen sent Monteilh to conduct surveillance and audio recording in approximately ten mosques in Los Angeles and Orange County. ( Id. ¶ 92.) Defendants provided Monteilh with surveillance tools, including sophisticated audio and video recording devices, such as key fobs with audio recording capability and a hidden camera outfitted to his shirt, to conduct an “indiscriminate surveillance” of Muslims, who were targeted“solely due to their religion.” ( Id. ¶¶ 86, 122, 124, 128.) Defendants gathered information about Plaintiffs and other members of the Muslim community through these devices and from extensive review of Monteilh's handwritten notes about all aspects of his daily interactions with Muslims. ( Id. ¶ 122.) Plaintiffs allege that Armstrong and Allen were well aware that many of the surveillance tools they had given Monteilh were being used illegally without warrants. ( Id. ¶ 136.)
Plaintiffs allege that the FBI Agents instructed Monteilh to utilize surveillance strategies aimed at gathering information on Muslims in an indiscriminate manner. ( Id. ¶ 99.) The Agents' key directive was that Monteilh gather information from “anyone from any mosque without any specific target, for the purpose of collecting as much information as possible about Muslims in the community.” ( Id. ¶ 114.) Armstrong and Allen instructed Monteilh to obtain information through various methods, including seizing every opportunity to meet people, obtain their contact information, and learn about their background and religious and political views. ( Id. ¶ 101.) Monteilh did not limit surveillance to any particular group of people but instead socialized widely with different groups and individuals regardless of their ethnic origin or language. ( Id. ¶¶ 102–103.) Armstrong and Allen further instructed Monteilh to gather information on Muslims' charitable givings, attend Muslim fundraising events, collect information on travel plans of Muslims in the community, attend lectures by Muslim scholars and other guest speakers, attend classes and dawn prayers at mosques, track followers of extremist jihadist websites, elicit people's views on extremist scholars and thinkers, work out with Muslims he met at a local gym, and gather any compromising information about Muslims that Defendants could use against them to persuade them to become informants. ( Id. ¶¶ 105–16.) Plaintiffs allege that the consistent theme throughout these different surveillance gathering strategies was in Armstrong's and Allen's “expressed interest in gathering information only on Muslims,” and their setting aside any non-Muslims who were identified through surveillance Monteilh performed. ( Id. ¶ 120.)
Plaintiffs allege that through Monteilh, Defendants gathered information on Muslims and their associates consisting of hundreds of phone numbers and thousands of email addresses; background information on hundreds of individuals; hundreds of hours of video recordings that captured the interiors of mosques, homes, businesses, and the associations of Muslims; and thousands of hours of audio recordings of conversations as well as recordings of religious lectures, discussion groups, classes, and other Muslim religious and cultural events occurring in mosques. ( Id. ¶¶ 2, 137.) Plaintiffs allege that the FBI's “dragnet investigation did not result in even a single conviction related to counterterrorism” because, unsurprisingly, “the FBI did not gather the information based on suspicion of criminal activity, but instead gathered the information simply because the targets were Muslim.” ( Id. ¶ 3.) Plaintiffs allege Monteilh discontinued working for Defendants as an informant around September 2007. ( Id. ¶ 151.)
C. Disclosure of Monteilh's Identity
In February 2009, the FBI acknowledged that it had utilized Monteilh as a confidential informant during a criminal proceeding in the Niazi case. (Pub. Giuliano Decl. ¶ 11; FAC ¶¶ 155–59.) Subsequentto this disclosure, Monteilh has provided numerous statements to the media discussing his purported activities on behalf of the FBI. (Pub. Giuliano Decl. ¶ 14; FAC ¶ 162.) In January 2010, Monteilh also filed a civil lawsuit under 42 U.S.C. §§ 1983 and 1985 in this district against the FBI, its agents, and the City of Irvine in Monteilh v. FBI, Case No. 8:10–cv–102–JVS(RNBx). In that case, Monteilh made allegations related to his work as an FBI source in Operation Flex. (Pub. Giuliano Decl. ¶ 14; FAC ¶ 164.) The FBI has neither confirmed nor denied any of Monteilh's public allegations concerning his work for the agency, and the FBI maintains that Monteilh's allegations do not constitute a disclosure or confirmation by the FBI of any information concerning his activities as an informant. (Pub. Giuliano Decl. ¶ 14; FAC ¶ 164.) In this case, Monteilh has submitted a declaration, dated April 23, 2010, in support of Plaintiffs' opposition to Defendants' motions to dismiss in which he makes allegations regarding his work for the FBI in Operation Flex similar to those asserted in the FAC. (Dkt. No. 66; FAC ¶ 167.)
This Court dismissed the Niazi indictment without prejudice on September 30, 2010. (Case No. 8:09–cr–28–CJC(ANx), Ct. Order, Dkt. No. 40, Sept. 30, 2010.)
See, e.g., Jerry Markon, Tension Grows between Calif. Muslims, FBI after Informant Infiltrates Mosque, WASH. POST (Dec. 5, 2010).
D. The Lawsuit
On February 22, 2011, Plaintiffs filed the instant suit against the FBI and its officers and agents. (Dkt. No. 1.) On August 1, 2011, the FBI, Mueller, and Martinez moved to dismiss the Complaint and for summary judgment on the grounds, inter alia, that certain evidence needed to litigate Plaintiffs' claims is properly protected by the Attorney General's assertion of the state secrets privilege. (Dkt. No. 32.) In support of their privilege claim, they submitted for ex parte, in camera review by the Court (i) a classified declaration of Mark F. Giuliano, FBI Assistant Director, Counterterrorism Division and (ii) a classified supplemental memorandum. (Dkt. Nos. 35, 36.) The Agent Defendants also separately moved to dismiss the Complaint. (Dkt. Nos. 41–42.) Shortly thereafter, Plaintiffs moved ex parte to stay the Court's review of the classified filings until after its consideration of whether the state secrets argument would apply in this case as a matter of law. (Dkt. No. 39.) Plaintiffs argued that such a ruling would prevent the Court from unnecessarily reviewing information that could be highly prejudicial to Plaintiffs and not properly subject to consideration by the Court. (Pls. Ex Parte App., at 8.) The Court denied Plaintiffs' ex parte application because the Court determined that there was no legal bar to its review of the classified submissions and because it was confident that its independent evaluation would not be compromised by the contents of those submissions. (Ct. Order, Dkt. No. 46, Aug. 11, 2011.)
On September 13, 2011, Plaintiffs filed the operative FAC, adding a claim under the FTCA against the United States. (Dkt. No. 49.) Plaintiffs assert a total of eleven causes of action against Defendants: (1) violation of the First Amendment Establishment Clause under Bivens and 28 U.S.C. § 1331 (against all Defendants except the FBI and United States); (2) violation of the First Amendment Establishment Clause under 42 U.S.C. § 1985(3) and 28 U.S.C. § 1343 (against Agent Defendants); (3) violation of the First Amendment Free Exercise Clause under Bivens and 28 U.S.C. § 1331 (against all Defendants except the FBI and United States); (4) violation of the First Amendment Free Exercise Clause under 42 U.S.C. § 1985(3) and 28 U.S.C. § 1343 (against Agent Defendants); (5) violation of RFRA, 42 U.S.C. § 2000bb–1 (against all Defendants); (6) violation of the Fifth Amendment Equal Protection Clause under Bivens and 28 U.S.C. § 1331 (against all Defendants except the FBI and United States); (7) violation of the Equal Protection Clause under 42 U.S.C. § 1985(3) and 28 U.S.C. § 1343 (against Agent Defendants); (8) violation of the Privacy Act, 5 U.S.C. § 552a(a)-( l ) (against the FBI); (9) violation of the Fourth Amendment under Bivens and 28 U.S.C. § 1331 (against the FBI and United States); (10) violation of FISA, 50 U.S.C. § 1810 (against all Defendants); and (11) invasion of privacy, violation of Cal. Civ.Code § 52.1, and intentional infliction of emotion distress under the FTCA, 28 U.S.C. §§ 1346(b), 2671, et seq. (against the United States). Plaintiffs request damages as well as injunctive relief in the form of the destruction or return of any information gathered through Operation Flex. Plaintiffs further seek certification of “[a]ll individuals targeted by Defendants for surveillance or information-gathering through Monteilh and Operation Flex, on account of their religion, and about whom the FBI thereby gathered personally identifiable information.” (FAC ¶ 219.)
For claims 1, 3, 6, and 9, Plaintiffs assert claims for damages under Bivens against individual-capacity Agent Defendants and assert claims for injunctive relief under Section 1331 against the official-capacity Defendants. ( See FAC ¶ 226 n. 37.)
On November 4, 2011, the Government moved to dismiss the FAC and for summary judgment pursuant to Federal Rules of Civil Procedure 12(b)(1), 12(b)(6), and 56. (Dkt. No. 55.) The Government moves to dismiss all of Plaintiffs' claims, aside from the FISA and Fourth Amendment claims, on the grounds that, inter alia, litigation of these claims would risk or require the disclosure of certain evidence properly protected by the Attorney General's assertion of the state secrets privilege. In support of their privilege claim, the Government relies on its previously-filed public declaration from the Attorney General, Eric H. Holder, dated July 29, 2011, (Dkt. No. 32–3), and a public declaration from Mark Giuliano, dated July 25, 2011, (Dkt. No. 33). The Government also relies on its previously-lodged, August 1, 2011 in camera filings, the classified declaration of Giuliano and the classified supplemental memorandum, (Dkt. Nos. 35, 36). In addition, the Government lodged a classified supplemental declaration of Giuliano on November 4, 2011, which provided a status update on certain investigations discussed in the classified Giuliano Declaration. (Dkt. No. 56.)
Defendants Tidwell and Walls separately moved to dismiss claims against them under Federal Rule of Civil Procedure 12(b)(6). (Dkt. No. 58.) Tidwell and Walls argue, in part, that the Government's assertion of the state secrets privilege mandates dismissal of Counts 1 through 7. (Tidwell/Walls Br., at 9–12.) Defendants Rose, Armstrong, and Allen also moved to dismiss the FAC under Rule 12(b)(6) and joined in the motions to dismiss filed by the Government and Defendants Tidwell and Walls. (Dkt. No. 57.) On December 23, 2011, Plaintiffs opposed the Government's motion and filed a combined opposition to the Agent Defendants' motions to dismiss. (Dkt. Nos. 63, 64.) Defendants filed replies in support of their respective motions to dismiss on January 20, 2012. (Dkt. Nos. 69–71.) After granting the parties' requests for continuances of the hearing on Defendants' motions to dismiss, the Court heard extended oral arguments on the motions from the parties' counsel on August 14, 2012.
III. LEGAL STANDARD
A. The State Secrets Doctrine
“The Supreme Court has long recognized that in exceptional circumstances courts must act in the interest of the country's national security to prevent disclosure of state secrets, even to the point of dismissing a case entirely.” Jeppesen Dataplan, 614 F.3d at 1077 (citing Totten v. United States, 92 U.S. 105, 107, 23 L.Ed. 605 (1875)). Created by federal common law, the state secrets doctrine bars litigation of an action entirely or excludes certain evidence because the case or evidence risks disclosure of “state secrets”—that is, “matters which, in the interest of national security, should not be divulged.” Reynolds, 345 U.S. at 10, 73 S.Ct. 528. Although developed at common law, the state secrets doctrine also “performs a function of constitutional significance, because it allows the executive branch to protect information whose secrecy is necessary to its military and foreign-affairs responsibilities.” El–Masri v. United States, 479 F.3d 296, 303 (4th Cir.2007). At the same time, the state secrets doctrine does not represent an abdication of judicial control over access to the courts, as the judiciary is ultimately tasked with deciding whether the doctrine properly applies to a particular case. Id. at 312. The state secrets doctrine thus attempts to strike a difficult balance between the Executive's duty to protect national security information and the judiciary's obligation to preserve judicial transparency in its search for the truth. Id. at 303–305.
There are two modern applications of the state secrets doctrine: (1) a justiciability bar that forecloses litigation altogether because the very subject matter of the case is a state secret (the “Totten bar”) and (2) an evidentiary privilege that excludes certain evidence because it implicates secret information and may result in dismissal of claims (the “Reynolds privilege”). Jeppesen Dataplan, 614 F.3d at 1077–80. While distinct, the Totten bar and the Reynolds privilege converge in situations where the government invokes the privilege—as it may properly do—before waiting for an evidentiary dispute to arise during discovery or trial. Id. at 1080 (“The privilege may be asserted at any time, even at the pleading stage.”). The privilege indisputably may be raised with respect to discovery requests seeking allegedly privileged information or to prevent disclosure of such information in a responsive pleading. Id. at 1081. Alternatively, “the government may assert a Reynolds privilege claim prospectively, even at the pleading stage, rather than waiting for an evidentiary dispute to arise during discovery or trial.” Id. In such circumstances, the Totten bar necessarily informs the Reynolds privilege in a “continuum of analysis.” Al–Haramain Islamic Found., Inc. v. Bush, 507 F.3d 1190, 1201 (9th Cir.2007).
1. The Totten Bar
The Supreme Court in Totten v. United States articulated the general principle that “public policy forbids the maintenance of any suit in a court of justice, the trial of which would inevitably lead to the disclosure of matters which the law itself regards as confidential.” 92 U.S. at 107. The Totten bar is a categorical bar “where the very subject matter of the action ... [is] a matter of state secret,” such that the action is “dismissed on the pleadings without ever reaching the question of evidence since it [is] so obvious that the action should never prevail over the privilege.” Reynolds, 345 U.S. at 11 n. 26, 73 S.Ct. 528;accord Jeppesen Dataplan, 614 F.3d at 1077–78;see also Al–Haramain, 507 F.3d at 1197 (“[W]here the very subject matter of a lawsuit is a matter of state secret, the action must be dismissed without reaching the question of evidence.”). The purpose of the Totten bar is not merely to defeat the asserted claims, but to foreclose judicial inquiry altogether. Tenet v. Doe, 544 U.S. 1, 6 n. 4, 125 S.Ct. 1230, 161 L.Ed.2d 82 (2005); Jeppesen Dataplan, 614 F.3d at 1078.
The Supreme Court has very sparingly applied this bar to preclude judicial review of an action entirely. See Totten, 92 U.S. at 106–107 (barring suit by Civil War spy against the United States for alleged failure to pay for espionage services because the case was predicated on the existence of an undisclosed contract for secret services with the government); Weinberger v. Catholic Action of Hawaii/Peace Educ. Project, 454 U.S. 139, 146–47, 102 S.Ct. 197, 70 L.Ed.2d 298 (1981) (holding action against the United States Navy exceeded judicial scrutiny based on state secrets because it implicated information regarding nuclear weapons storage that the Navy could not admit or deny); Tenet, 544 U.S. at 8–10, 125 S.Ct. 1230 (precluding judicial review of action by former Cold War spies against the Central Intelligence Agency for allegedly reneging on promise to pay for espionage services because plaintiffs' relationship with the government was state secrets). Beyond these three cases, the Supreme Court has not provided further guidance on what subject matters would constitute state secrets. The Ninth Circuit in Jeppesen, however, declined to interpret the Totten bar as only applying to certain types of cases, such as those involving covert espionage agreements, but emphasized that “the Totten bar rests on a general principle that extends beyond that specific context” and applies “ ‘where the very subject matter of the action’ is ‘a matter of state secret.’ ” 614 F.3d at 1078–79 (quoting Reynolds, 345 U.S. at 11 n. 26, 73 S.Ct. 528). The El–Masri court further clarified that “[t]he controlling inquiry is not whether the general subject matter of an action can be described without resort to state secrets”; rather, it must be ascertained “whether an action can be litigated without threatening the disclosure of such state secrets.” El–Masri, 479 F.3d at 308. “Thus, for purposes of the state secrets analysis, the ‘central facts' and ‘very subject matter’ of an action are those facts that are essential to prosecuting the action or defending against it.” Id.
2. The Reynolds Privilege
The second application of the state secrets doctrine is an evidentiary privilege against revealing state secrets. Jeppesen Dataplan, 614 F.3d at 1079. Derived from United States v. Reynolds, this privilege applies when the court is satisfied “from all the circumstances of the case, that there is a reasonable danger that compulsion of the evidence will expose ... matters which, in the interest of national security, should not be divulged.” Reynolds, 345 U.S. at 10, 73 S.Ct. 528;see also id. at 10–11, 73 S.Ct. 528 (finding that the government made a sufficient showing of privilege, “under circumstances indicating a reasonable possibility that military secrets were involved,” to cut off demand for an accident investigation report of an aircraft testing secret electronic equipment). A successful assertion of the Reynolds privilege will remove the privileged evidence from the case. Jeppesen Dataplan, 614 F.3d at 1079. In some instances, however, “the assertion of the privilege will require dismissal because it will become apparent during the Reynolds analysis that the case cannot proceed without privileged evidence, or that litigating the case to a judgment on the merits would present an unacceptable risk of disclosing state secrets.” Id. The Ninth Circuit in Jeppesen Dataplan applied the Reynolds privilege to dismiss an action brought by foreign nationals who were allegedly transported in secret to other countries where they were detained and interrogated under the Central Intelligence Agency's (“CIA”) extraordinary rendition program. 614 F.3d at 1085–90. The Ninth Circuit held that dismissal under the state secrets privilege was required under Reynolds because there was no feasible way to litigate the defendant's liability without creating “an unjustifiable risk of divulging state secrets” related to the CIA's secret intelligence activities. Id. at 1087. When such dismissal is required, the Reynolds privilege converges with the Totten bar. Id. at 1083.
An analysis of claims under the Reynolds privilege involves three steps. First, the court must ascertain whether the procedural requirements for invoking the privilege, consisting of a formal claim by the government, have been satisfied. Id. at 1080. Second, the court must independently determine whether the information is privileged. Id. Third, the court must determine how the case should proceed in light of the successful privilege claim. Id. Once the privilege is properly invoked, and the court is satisfied as to the danger of disclosing state secrets, the privilege is absolute. Kasza v. Browner, 133 F.3d 1159, 1166 (9th Cir.1998); see also Reynolds, 345 U.S. at 11, 73 S.Ct. 528 (“[E]ven the most compelling necessity cannot overcome the claim of privilege if the court is ultimately satisfied that [state] secrets are at stake.”); In re United States, 872 F.2d 472, 476 (D.C.Cir.1989) (“No competing public or private interest can be advanced to compel disclosure [of privileged information].” (citation and quotes omitted)). This is because, in determining whether the privilege applies to a particular case, “the balance has already been struck in favor of protecting secrets of state over the interest of a particular litigant.” In re United States, 872 F.2d at 476 (citation and quotes omitted). The Supreme Court has therefore cautioned that the privilege “is not to be lightly invoked,” and must be applied no more often or extensively than necessary. Reynolds, 345 U.S. at 7–8, 73 S.Ct. 528;see also Jeppesen Dataplan, 614 F.3d at 1080.
B. Threshold Considerations
Plaintiffs raise two threshold issues with regard to whether the state secrets doctrine may apply in this case, neither of which are persuasive. First, Plaintiffs argue that FISA preempts the state secrets privilege. Plaintiffs insist that because most, if not all, of the conduct at issue in this case involves electronic surveillance in the name of foreign intelligence gathering in the domestic context, the Court should adhere to the procedures that Congress has set for the treatment of secret evidence in FISA. (Pls. Opp'n to Gov't, at 20–21, 26–31.) The Court disagrees. As a preliminary matter, the question of whether FISA preempts the state secrets privilege is not at issue because Defendants have not moved to dismiss the FISA claim on privilege grounds. Moreover, even if FISA preempts the state secrets privilege with respect to a FISA claim, as ruled by the Northern District of California in In re Nat'l Sec. Agency Telecomms. Records Litig., 564 F.Supp.2d 1109, 1120 (N.D.Cal.2008), Plaintiffs cite no authority for the proposition that FISA also preempts non-FISA claims. Nor has the Court found any statute, including the language of FISA, or case law supporting an expansive application of FISA to Plaintiffs' non-FISA claims in this case. Plaintiffs rely on In re National Security Agency, 564 F.Supp.2d at 1118, for the proposition that FISA preempts the state secrets privilege in cases, as here, which involve electronic surveillance undertaken in the name of national security. (Pls. Opp'n to Gov't, at 26, 29). However, the court in that case clarified that “FISA does not preempt the state secrets privilege as to matters that are not within FISA's purview,”—that is, “activities [that] include foreign intelligence surveillance.” In re National Security Agency, 564 F.Supp.2d at 1118. In the present action, however, the central subject matter is Operation Flex, a group of counterterrorism investigations that extend well beyond the purview of electronic surveillance as discussed in the Government's public and classified filings. Plaintiffs' non-FISA claims also rely upon allegations far broader in scope than allegations upon which the FISA claim is predicated, and litigating those non-FISA claims will require information, including privileged evidence, beyond that contemplated by FISA. ( See infra Part IV.C.)
See the Court's concurrently-filed Order, which discusses the FISA claim in detail.
The Court in In re National Security determined that “FISA should displace federal common law rules such as the state secrets privilege with regard to matters within FISA's purview.” 564 F.Supp.2d at 1120. As the Government does not move to dismiss the FISA claim on the basis of state secrets, the Court need not and does not decide at this time whether FISA preempts the state secrets privilege with respect to a FISA claim.
Second, Plaintiffs argue that the Constitution prohibits dismissal of this case on state secret grounds because they seek injunctive relief from on-going constitutional violations. (Pls. Opp'n to Gov't, at 20, 40–51.) This argument, likewise, is unsupported by any authority, let alone Ninth Circuit or Supreme Court precedent. The principles of the state secrets doctrine make clear that it is analyzed and applied to cases irrespective of the types of claims or relief sought. See Tenet, 544 U.S. at 8, 125 S.Ct. 1230 (“[P]ublic policy forbids the maintenance of any suit in a court of justice, the trial of which would inevitably lead to the disclosure of matters which the law itself regards as confidential.” (quoting Totten, 92 U.S. at 107)); Kasza, 133 F.3d at 1166 (“Once the privilege is properly invoked and the court is satisfied as to the danger of divulging state secrets, the privilege is absolute....”); Jeppesen Dataplan, 614 F.3d at 1081 (“If this standard [for privilege] is met, the evidence is absolutely privileged, irrespective of the plaintiffs' countervailing need for it.”). In fact, in Al–Haramain, the Ninth Circuit found that the state secrets privilege applied to and warranted dismissal of constitutional claims involving requests for injunctive relief. 507 F.3d at 1205. In that case, Al–Haramain Islamic Foundation, a designated terrorist organization, and two of its attorneys brought suit against the government in connection with the government's Terrorist Surveillance Program. 507 F.3d at 1193. The plaintiffs in that case alleged that they were subject to warrantless electronic surveillance in violation of FISA and various provisions of the Constitution. Id. In addition to a request to enjoin further warrantless surveillance, the plaintiffs sought the same injunctive relief as Plaintiffs here do—disclosure and/or destruction of information and records acquired from allegedly unlawful surveillance—and also similarly alleged violations under the First and Fourth Amendments. Al–Haramain Islamic Found., Inc. v. Bush, 451 F.Supp.2d 1215, 1218 (D.Or.2006), rev'd and remanded by Al–Haramain, 507 F.3d 1190. The Ninth Circuit in Al–Haramain found dismissal of the action appropriate under the Reynolds privilege because the defendant could not establish standing without the privileged information. 507 F.3d at 1205. Accordingly, the Court finds that the state secrets doctrine may properly be considered in this case.
Plaintiffs' argument is additionally misplaced because, even assuming that their argument regarding constitutional claims for injunctive relief had merit, it would be inapplicable as to their claims for damages against Defendants.
IV. APPLICATION OF THE STATE SECRETS DOCTRINE
The Government requests dismissal of all of Plaintiffs' claims against Defendants, aside from the FISA and Fourth Amendment claims, under the Reynolds privilege. The Government argues that dismissal of these claims under the state secrets privilege is appropriate because it has satisfied the procedural requirements for invoking the privilege and further litigation of the action would risk or require the disclosure of state secrets related to Operation Flex. More specifically, the Government contends that because Plaintiffs' claims are premised on their core allegation that Defendants conducted an indiscriminate religion-based investigation, any rebuttal against this allegation would risk or require disclosure of privileged information—whom and what the FBI was investigating under Operation Flex and why—in order to establish that the investigation was properly predicated and focused. (Gov't Br., at 5–6, 45–53.) The Court agrees. As discussed more fully below, because further litigation of this action would require or, at the very least, create an unjustifiable risk of disclosure of state secrets, the Court finds that dismissal of Plaintiffs' claims, aside from their FISA claim, is required under the Reynolds privilege.
A. Procedural Requirements
The Reynolds privilege may only be asserted by the government, and a private party can neither claim nor waive the privilege. Jeppesen Dataplan, 614 F.3d at 1080;Reynolds, 345 U.S. at 7, 73 S.Ct. 528. The government cannot invoke the privilege lightly, especially where it seeks not merely to preclude the production of certain evidence, but to obtain dismissal of the action entirely. Jeppesen Dataplan, 614 F.3d at 1080. There are several mechanisms to ensure that the Reynolds privilege is invoked no more than is necessary. Id. First, “[t]here must be a formal claim of privilege, lodged by the head of the department which has control over the matter, after actual personal consideration by that officer.” Reynolds, 345 U.S. at 7–8, 73 S.Ct. 528. “This certification is fundamental to the government's claim of privilege,” as the decision to invoke the privilege must “ ‘be a serious, considered judgment, not simply an administrative formality.’ ” Jeppesen Dataplan, 614 F.3d at 1080 (quoting United States v. W.R. Grace, 526 F.3d 499, 507–508 (9th Cir.2008) (en banc)). The formal claim must “reflect the certifying official's personal judgment,” and be presented in “sufficient detail” to permit the court “to make an independent determination of the validity of the claim of privilege and the scope of the evidence subject to the privilege.” Id. at 1080.
Second, even before invoking the privilege in court, the government must adhere to its own State Secrets Policy, promulgated by the Obama administration in a memorandum by the Attorney General in September 2009, effective October 1, 2009. (Holder Decl. ¶ 12 & Exh. 1 [State Secrets Policy] ); see also Jeppesen Dataplan, 614 F.3d at 1077. The Policy outlines the legal standard for invoking the privilege: the government will assert and defend an assertion of the state secrets privilege in litigation “when a government department or agency seeking to assert the privilege makes a sufficient showing that assertion of the privilege is necessary to protect information the unauthorized disclosure of which reasonably could be expected to cause significant harm to the national defense or foreign relations (“national security”) of the United States.” (Holder Decl., Exh. 1 ¶ 1(A).) The privilege must also be “narrowly tailored,” such that the “privilege should be invoked only to the extent necessary to protect against the risk of significant harm to national security.” ( Id. ¶ 1(B).) The Policy further sets limitations for invoking the privilege, including not defending an invocation of the privilege to “conceal violations of the law, inefficiency, or administrative error”; to “prevent embarrassment to a person, organization, or agency of the United States government”; or to “prevent or delay the release of information the release of which would not reasonably be expected to cause significant harm to national security.” ( Id. ¶ 1(C).) The Policy further outlines the initial procedure for invoking the privilege, which includes sufficient evidentiary support and recommendation from the Assistant Attorney General; evaluation, consultation, and recommendation by a state secrets review committee; and approval by the Attorney General. ( Id. ¶¶ 2–4.)
The Government has properly invoked the state secrets privilege. The Government has submitted a public declaration from Eric Holder in his capacity as the Attorney General and head of the Department of Justice. The Attorney General has made a formal assertion of the state secrets privilege after personal consideration of the public and classified materials at the request of the director of the FBI: “After careful and actual personal consideration of the matter, I have concluded that disclosure of the three categories of information described below and in more detail in the classified Giuliano Declaration could reasonably be expected to cause significant harm to the national security, and I therefore formally assert the state secrets privilege over this information.” (Holder Decl. ¶ 3.) The Attorney General also avers that the requirements for an assertion and defense of the state secrets privilege have been satisfied in accordance with the State Secrets Policy. ( Id. ¶ 12.)
The Court cannot and does not comment on whether the Government has properly adhered to its State Secrets Policy, as this is internal to the Executive branch, and the Policy does not create a substantive or procedural right enforceable at law or in equity against the Government. ( See Holder Decl., Exh. 1 ¶ 7.) However, the Court does observe that the Government has narrowly tailored its assertion of the privilege by moving on other grounds before invoking the privilege and has done so with restraint. ( See Gov't Br., at 3–7.) While the Court has considered Defendants' initial grounds for dismissal before analyzing the state secrets privilege, the Court believes they are limited and do not entirely warrant dismissal of Plaintiffs' claims. In contrast, the Court finds that all of Plaintiffs' claims, aside from their FISA claim, should be dismissed under the Reynolds privilege. For this reason and for the sake of judicial economy, the Court limits its discussion to the state secrets doctrine in this Order and the FISA claim in the Court's concurrently-issued Order.
B. Independent Evaluation of the Privilege Claim
After a court determines that the privilege has been properly invoked, it then “ ‘must make an independent determination whether the information is privileged.’ ” Jeppesen Dataplan, 614 F.3d at 1080, 1081 (quoting Al–Haramain, 507 F.3d at 1202). “The court must sustain a claim of privilege when it is satisfied, ‘from all the circumstances of the case, that there is a reasonable danger that compulsion of the evidence will expose ... matters which, in the interest of national security, should not be divulged.’ ” Id. at 1081 (quoting Reynolds, 345 U.S. at 10, 73 S.Ct. 528). “The Executive bears the burden of satisfying a reviewing court that the Reynolds reasonable-danger standard is met.” El–Masri, 479 F.3d at 305. The government cannot satisfy this burden by the mere conclusory assertion that the standard has been met. El–Masri, 479 F.3d at 312. “Simply saying ‘military secret,’ ‘national security’ or ‘terrorist threat’ or invoking an ethereal fear that disclosure will threaten our nation is insufficient to support the privilege.” Al–Haramain, 507 F.3d at 1203. Rather, the government must provide “[s]ufficient detail” to enable the court to conduct a meaningful examination. Id. In some instances, a formal privilege claim asserted in a declaration may suffice, while in others, the court may conduct an in camera examination of the allegedly privileged information. El–Masri, 479 F.3d at 305. “The degree to which such a reviewing court should probe depends in part on the importance of the assertedly privileged information to the position of the party seeking it.” Id.;see also Reynolds, 345 U.S. at 11, 73 S.Ct. 528 (“In each case, the showing of necessity which is made will determine how far the court should probe in satisfying itself that the occasion for invoking the privilege is appropriate.”) At the same time, the Court must make this determination “without forcing a disclosure of the very thing the privilege is designed to protect.” Reynolds, 345 U.S. at 8, 73 S.Ct. 528. “If this standard is met, the evidence is absolutely privileged, irrespective of the plaintiffs' countervailing need for it.” Jeppesen Dataplan, 614 F.3d at 1081.
Here, the Government asserts the privilege over three categories of information related to Operation Flex as described in their public and classified filings: (i) subject identification, (ii) reasons for counterterrorism, and (iii) sources and methods. First, the FBI seeks to protect “[i]nformation that could tend to confirm or deny whether a particular individual was or was not the subject of an FBI counterterrorism investigation, including in Operation Flex.” (Holder Decl. ¶ 4; Pub. Giuliano Decl. ¶ 15.) Second, the FBI seeks to protect “[i]nformation that could tend to reveal the initial reasons ( i.e., predicate) for an FBI counterterrorism investigation of a particular person (including in Operation Flex), any information obtained during the course of such an investigation, and the status and results of the investigation. This category includes any information obtained from the U.S. Intelligence Community related to the reasons for an investigation.” (Holder Decl. ¶ 4; Pub. Giuliano Decl. ¶ 15.) Third, the FBI seeks to protect “[i]nformation that could tend to reveal whether particular sources and methods were used in a counterterrorism investigation of a particular subject, including in Operation Flex,” and “previously undisclosed information related to whether court-ordered searches or surveillance, confidential human sources, and other investigative sources and methods were used in a counterterrorism investigation of a particular person, the reasons such methods were used, the status of the use of such sources and methods, and any results derived from such methods.” (Holder Decl. ¶ 4; Pub. Giuliano Decl. ¶ 15.)
Beyond the Government's descriptions of these categories of information in its public declarations, the Court heavily relies upon the classified declarations and supplemental memorandum to determine whether disclosure of the information described above could reasonably be expected to cause significant harm to national security. In making this determination, the Court assumes the “ ‘special burden to assure itself that an appropriate balance is struck between protecting national security matters and preserving an open court system.’ ” Jeppesen Dataplan, 614 F.3d at 1081 (quoting Al–Haramain, 507 F.3d at 1203);see also El–Masri, 479 F.3d at 304 (“This inquiry is a difficult one, for it pits the judiciary's search for truth against the Executive's duty to maintain the nation's security.”). On the one hand, the Court “acknowledge[s] the need to defer to the Executive on matters of foreign policy and national security and surely cannot legitimately find [itself] second guessing the Executive in this arena.” Jeppesen Dataplan, 614 F.3d at 1081–82;see also El–Masri, 479 F.3d at 305 (“In assessing the risk that such a disclosure [of state secrets] might pose to national security, a court is obliged to accord the ‘utmost deference’ to the responsibilities of the executive branch.”) (quoting United States v. Nixon, 418 U.S. 683, 710, 94 S.Ct. 3090, 41 L.Ed.2d 1039 (1974)). On the other hand, “ ‘the state secrets doctrine does not represent a surrender of judicial control over access to the courts.’ ” Jeppesen Dataplan, 614 F.3d at 1082 (quoting El–Masri, 479 F.3d at 312);see also Reynolds, 345 U.S. at 9–10, 73 S.Ct. 528 (“Judicial control over the evidence in a case cannot be abdicated to the caprice of executive officers.”) Rather, the Court has the obligation “to ensure that the state secrets privilege is asserted no more frequently and sweepingly than necessary,” by critically examining the instances of its invocation, Ellsberg v. Mitchell, 709 F.2d 51, 58 (D.C.Cir.1983), with “a very careful, indeed a skeptical, eye, and not to accept at face value the government's claim or justification of privilege,” Al–Haramain, 507 F.3d at 1203.See also Jeppesen Dataplan, 614 F.3d at 1082. But the Court cannot delve so deeply that it discloses the very information the privilege is meant to protect. Reynolds, 345 U.S. at 8, 73 S.Ct. 528 (“Too much judicial inquiry into the claim of privilege would force disclosure of the thing the privilege is meant to protect, while a complete abandonment of judicial control would lead to intolerable abuses.”)
The Court has thoroughly and skeptically examined the Government's public and classified submissions. In particular, the Court has critically scrutinized the Attorney General's classified declarations and the classified memorandum—which are comprehensive and detailed—since they were submitted for the Court's ex parte, in camera review in August and November 2011. The Court is convinced that the subject matter of this action, Operation Flex, involves intelligence that, if disclosed, would significantly compromise national security. The Court is further convinced that litigation of this action would certainly require or, at the very least, greatly risk disclosure of secret information, such that dismissal at this stage of the proceeding is required. This is because, as described more fully below, the Government will inevitably need the privileged information to defend against Plaintiffs' core allegation that Defendants conducted an indiscriminate “dragnet” investigation and gathered information on Plaintiffs and Muslims in Southern California based on their religion. ( See infra Part IV.C.)
In their Opposition, Plaintiffs argue that the Government's first category of information is not privileged because everyone who had contact with Monteilh already knows that they were targeted for investigation. (Pls. Opp'n to Gov't, at 31–32.) However, aside from the general information about Operation Flex and the identity of Monteilh as an informant, the Government has not confirmed or denied the identities of the fewer than 25 individuals who were under investigation. Plaintiffs further argue that because the Government has not explicitly invoked the Totten bar, it has effectively conceded that the very subject matter of this action is not a state secret. ( Id. at 23.) But while some of the general facts of Operation Flex are public knowledge, the facts required to litigate the action— e.g., to defend against Plaintiffs' claims of indiscriminate targeting of Muslims—requires disclosure of information that is classified and privileged. El Masri, 479 F.3d at 308 (“[F]or purposes of the state secrets analysis, the ‘central facts' and ‘very subject matter’ of an action are those facts that are essential to prosecuting the action or defending against it.”) Plaintiffs' position to the contrary implies an overly rigid understanding of the difference between the Totten bar and Reynolds privilege that is inconsistent with the Ninth Circuit's application of the state secrets doctrine. As the Jeppesen court indicated, the state secrets analysis under the Totten bar converges with its progeny when, as here, the Government requests dismissal at the pleading stage because defense against plaintiff's claims requires privileged evidence or further litigation of the case would present an unacceptable risk of disclosing state secrets. Jeppesen Dataplan, 614 F.3d at 1083. ( See infra Part IV.C.)
While the Court cannot describe the specific contents of the classified materials—as this would thwart the very purpose of the privilege claim—the Court can make the following observations. In the context of a counterterrorism investigation, subject identification may include information about persons residing in the United States or abroad, such as Afghanistan, Lebanon, the Palestinian Territories, Yemen, and other regions in the Middle East, whom law enforcement has and has not decided to investigate depending on their nexus to terrorist organizations, such as al Qaeda, the Taliban, Hezbollah, and Hamas. Subjects and their associates may also be investigated because they are suspected of or involved in the recruitment, training, indoctrination, or radicalization of individuals for terrorist activities or fundraising for terrorist organizations. More directly, individuals subjected to counterterrorism investigations may be involved in plotting terrorist attacks. In the nearly eleven years that have passed since September 11, 2001, Islamic extremists have continued to plot and attempt to carry out numerous terrorist attacks both on U.S. soil and abroad against U.S. targets and allies. Such attacks are not abstract events born out of fear, but are real and insidious. The Daily Beast reported that as of September 8, 2011, “there have been at least 45 jihadist terrorist-attack plots against Americans since 9/11—each of them thwarted by a combination of intelligence work, policing and citizen participation.” John Avlon, Forty–Five Foiled Terror Plots Since 9/11, Daily Beast (Sept. 8, 2011), http:// www. thedailybeast. com/ articles/ 2011/ 09/ 08/ 9– 11– anniversary– 45– terror– plots– foiled– in– last– 10– years. html. The article notes that “these are just the plotted attacks that we know about through public documentation” and that “the real number of credible plots is no doubt much higher.” Id. Examples of recent, known terrorist attempts include the September 2009 scheme by Najibullah Zazi, who was arrested for plotting to attack the New York City subway system, as well as the December 2009 failed attempt by Umar Farouk Abdulmutallab to bomb Northwest Flight 253 to Chicago and the May 2010 failed attempt of Faisal Shazad to detonate a car bomb in Times Square. ( See Pub. Giuliano Decl. ¶¶ 8–9.) Subjects and their associates may be further investigated because they have ties to homegrown violent extremists who do not necessarily receive guidance from terrorist groups overseas but may be inspired by the global jihadist movement to commit violent acts inside the United States. Such was the case for a group of armed men who were arrested before they could execute their plot to kill people inside a military recruiting center in Santa Monica, California, on September 11, 2005, and then later open fire on families outside of temple during Yom Kippur in West Los Angeles. ( See id. ¶ 10.)
Disclosure of subjects under investigation would undoubtedly jeopardize national security. This is because persons under investigation would be alerted to the FBI's interest in them and cause them to flee, destroy evidence, or alter their conduct so as to avoid detection, which would seriously impede law enforcement's and intelligence officers' ability to determine their location or gain further intelligence on their activities. (Holder Decl. ¶ 6; Pub. Giuliano Decl. ¶ 23.) Disclosure of those not under investigation by the FBI is, likewise, dangerous because individuals who desire to commit terrorist acts may then be motivated to do so upon discovering that they are not being monitored. Information about who is being investigated while the status of others are unconfirmed may be manipulated by individuals and terrorist groups to discover whether they or any of their members are being investigated. (Holder Decl. ¶ 7; Pub. Giuliano Decl. ¶ 24.)
The second and third categories of information necessarily overlap with the first. The reasons and results of counterterrorism investigations may include the identities of human sources, such as confidential informants or undercover agents and officers (other than Monteilh); existent or suspected links between individuals and terrorist organizations; the results of surveillance efforts; and information shared among law enforcement and other government agencies. This category of evidence will also likely involve information about the status of the investigation—whether a particular investigation is open or closed—or the substantive details of the investigations themselves. With regard to the third category, this is likely to include information similar to the first and second categories, such as what, if any, confidential human sources besides Monteilh were used; whether court-authorized searches or surveillance occurred, such as wire taps and monitoring of electronic communication; whether the investigations involved undercover activity or physical surveillance; and whether interviews with suspects and their associates were conducted. The disclosure of the reasons and results of counterterrorism investigations would unquestionably compromise national security because it would reveal to those involved in plotting terrorist activities what the FBI knows and does not know about their plans and thereby enable them to evade detection. (Holder Decl. ¶ 9; Pub. Giuliano Decl. ¶ 29.) The disclosure of the methods and sources would endanger national security because it could reveal the identities of particular subjects and the steps taken by the FBI in counterterrorism matters, thereby effectively disclosing a road map to adversaries on how the FBI detects and prevents terrorist activities. (Holder Decl. ¶ 10; Pub. Giuliano Decl. ¶ 31.)
Aside from these explanations, the Court cannot and need not give any further details with regard to the contents of the classified materials. See Kasza, 133 F.3d at 1169 (concluding that in camera review of classified declarations“was an appropriate means to resolve the applicability and scope of the state secrets privilege,” and “[n]o further disclosure or explanation is required”). The Court, however, is thoroughly convinced that the Government has described, in sufficient detail, the nature of the privileged information and reasons why its disclosure would compromise national security in its classified filings. Plaintiffs no doubt are frustrated that the Court is precluded from giving any more specifics. But “[a]n inherent feature of the state secrets privilege ... is that the party against whom it is asserted will often not be privy to the information that the Executive seeks to protect.” El–Masri, 479 F.3d at 312. While the Government must persuade the Court with “[s]ufficient detail” that their assertion of the privilege is warranted, Al–Haramain, 507 F.3d at 1203, it has no obligation to divulge any details of the privileged matter to Plaintiffs. ( See Pls. Opp'n to Gov't, at 31 n. 17 (criticizing the Government's public declarations for not describing the alleged privileged information with sufficient specificity). Nevertheless, Plaintiffs' unfamiliarity with the classified materials' explanation for the privilege does not imply that “no such explanation was required,” or that the Court's “ruling was simply an unthinking ratification of a conclusory demand by the executive branch.” El–Masri, 479 F.3d at 312.
C. Consequences of the Privilege Claim
If the court sustains a claim of privilege, then “ ‘the ultimate question to be resolved is how the matter should proceed in light of the successful privilege claim.’ ” Jeppesen Dataplan, 614 F.3d at 1080, 1082 (quoting Al–Haramain, 507 F.3d at 1202). Ordinarily, a successful claim of the privilege may simply entail excluding or walling off the secret evidence. Id. at 1082. But in some instances, as here, application of the privilege may require dismissal of the case. Id. at 1083. Dismissal is appropriate in cases where “the court may be able to determine with certainty from the nature of the allegations and the other government's declarations in support of its claim of secrecy that litigation must be limited or cut off in order to protect state secrets, even before any discovery or evidentiary requests have been made.” Id. at 1081. There are three circumstances when the Reynolds privilege warrants terminating a case entirely, rather than removing the evidence at issue: (1) “if the plaintiff cannot prove the prima facie elements of her claim with nonprivileged evidence,” (2) “if the privilege deprives the defendant of information that would otherwise give the defendant a valid defense to the claim, then the court may grant summary judgment to the defendant,” and (3) “even if the claims and defenses might theoretically be established without relying on privileged evidence, it may be impossible to proceed with the litigation because—privileged evidence being inseparable from nonprivileged information that will be necessary to the claims or defenses—litigating the case to a judgment on the merits would present an unacceptable risk of disclosing state secrets.” Id. (citations and quotes omitted). The second and third circumstances are applicable here.
1. Privileged Information Needed for Defense
Dismissal of all of Plaintiffs' claims, aside from their FISA claim, is required because the privileged information gives Defendants a valid defense. Jeppesen Dataplan, 614 F.3d at 1083. This analysis of the Reynolds privilege necessarily coincides with the Totten bar, which permits dismissal of an action at the outset if the very subject matter of the action is a state secret. Reynolds, 345 U.S. at 11 n. 26, 73 S.Ct. 528. The key test is not whether the general subject matter of Operation Flex is a state secret, but whether this case can be “ litigated without threatening the disclosure of such state secrets.” El–Masri, 479 F.3d at 308. “Subject matter” of an action means “those facts that are essential to prosecuting the action or defending against it.” Id. (emphasis added); see also id. at 309–11 (affirming dismissal of action under the Reynolds privilege because defendants needed privileged information related to CIA intelligence operations to defend itself against plaintiff's claims); Kasza, 133 F.3d at 1166 (stating that dismissal is proper “if the privilege deprives the defendant of information that would otherwise give the defendant a valid defense to the claim” (citation and quotes omitted)).
Here, Plaintiffs' claims are predicated on their core allegation that Defendants engaged in an indiscriminate investigation, surveillance, and collection of information of Plaintiffs and the putative class because they are Muslim. (FAC ¶¶ 1–3, 86, 167.) Based on this allegation, Plaintiffs assert that Defendants' scheme discriminated against Plaintiffs because of their religion in violation of the Establishment Clause (claims 1, 2); substantially burdened the exercise of their religion without a legitimate government interest in violation of the Free Exercise Clause (claims 3, 4) and the RFRA (claim 5); and violates the Equal Protection Clause (claims 6, 7). Plaintiffs also assert that Defendants' alleged scheme violates the Privacy Act, the Fourth Amendment prohibition against unreasonable searches, and FISA (claims 8, 9, 10). Finally, Plaintiffs assert that the United States is liable to Plaintiffs for the Agent Defendants' invasion of their privacy, violation of Cal. Civ.Code § 52.1, and for intentional infliction of emotional distress under California law pursuant to the FTCA (claim 11).
Plaintiffs contend that they do not need privileged information to prove their discrimination claims against Defendants. (Pls. Opp'n to Gov't, at 37.) The Court does not speculate on what Plaintiffs already have in their possession and whether that is enough to prove their claims at this stage of the proceeding. But even assuming that Plaintiffs do not require privileged information to establish their claims, the Court is persuaded that privileged information provides essential evidence for Defendants' full and effective defense against Plaintiffs' claims—namely, showing that Defendants' purported “dragnet” investigations were not indiscriminate schemes to target Muslims, but were properly predicated and focused. Doing so would require Defendants to summon privileged evidence related to Operation Flex, including the subjects who may or may not have been under investigation, the reasons and results of those investigations, and their methods and sources. Additionally, even if Plaintiffs can successfully show that Defendants' actions substantially burdened their exercise of religion with nonprivileged information, defense against Plaintiffs' First Amendment claims entails analysis of whether the Government had a “compelling state interest” and its actions were “narrowly tailored” to achieve that interest. Church of the Lukumi Babalu Aye, Inc. v. City of Hialeah, 508 U.S. 520, 546, 113 S.Ct. 2217, 124 L.Ed.2d 472 (1993); see also Navajo Nation v. United States Forest Serv., 535 F.3d 1058, 1068 (9th Cir.2008) (“[S]hould the plaintiff establish a substantial burden on his exercise of religion [for a RFRA claim], the burden of persuasion shifts to the government to prove that the challenged government action is in furtherance of a ‘compelling governmental interest’ and is implemented by ‘the least restrictive means.’ ”). These are fact-intensive questions that necessitate a detailed inquiry into the nature, scope, and reasons for the investigations under Operation Flex. Moreover, with regard to Plaintiffs' FTCA claim, the United States may have a valid defense under the discretionary function exception, Sabow v. United States, 93 F.3d 1445, 1451 (9th Cir.1996), which requires the Court to determine “whether the challenged acts ... are of the nature and quality that Congress intended to shield from tort liability.” United States v. Varig Airlines, 467 U.S. 797, 813, 104 S.Ct. 2755, 81 L.Ed.2d 660 (1984); see also Dichter–Mad Family Partners, LLP v. United States, 707 F.Supp.2d 1016, 1018–19 (C.D.Cal.2010). To establish that this defense applies to the Government's counterterrorism investigations that purportedly violated Plaintiffs' constitutional rights, the Government must marshal facts that fall within the three privileged categories of information related to Operation Flex.
Plaintiffs further argue that the Government misunderstands the nature of their religious discrimination claim, which they assert does not require proof that religion is the “sole” reason for their having been targeted for surveillance, but rather that religion was “a” reason that they were targeted. Plaintiffs argue that their essential claim is that religion should be treated like race for the purposes of anti-discrimination law in that its use should always be justified by strict scrutiny. (Pls. Opp'n to Gov't, at 21.) As a preliminary matter, Plaintiffs' characterization of their own allegation contradicts the express language in their FAC. ( See FAC ¶ 86 (alleging that the FBI Agents' instructions to Monteilh ensured that “Plaintiffs and numerous other people were surveilled solely due to their religion”) (emphasis added)).) Regardless of the semantics used, however, for the purpose of the state secrets analysis, there is little difference between alleging that Plaintiffs were targeted because of their religion or solely based on their religion. Defense against the claim that Defendants targeted Plaintiffs because of their religion requires the Government to draw on privileged information to show that the investigations were proper and narrowly targeted for a legitimate purpose.
2. Inseparable from Privileged Information
Dismissal of Plaintiffs' claims is also required because, even if the claim or defense may be theoretically established without relying on privileged information, the Court is convinced that the privileged and nonprivileged information are inextricably intertwined, such that litigating the instant case to judgment on the merits would present an unacceptable risk of disclosing state secrets. Jeppesen Dataplan, 614 F.3d at 1083. “ ‘[W]henever possible, sensitive information must be disentangled from nonsensitive information to allow for the release of the latter.’ ” Kasza, 133 F.3d at 1166 (quoting Ellsberg, 709 F.2d at 57). But “when, as a practical matter, secret and nonsecret information cannot be separated,” the Court may “restrict the parties' access not only to evidence which itself risks the disclosure of a state secret, but also those pieces of evidence or areas of questioning which press so closely upon highly sensitive material that they create a high risk of inadvertent or indirect disclosures.” Jeppesen Dataplan, 614 F.3d at 1082 (citation and quotes omitted); see also Kasza, 133 F.3d at 1166 (“[I]f seemingly innocuous information is part of a classified mosaic, the state secrets privilege may be invoked to bar its disclosure and the court cannot order the government to disentangle this information from other classified information.”); id. at 1169–70 (affirming dismissal under the state secrets privilege of action involving allegations that the United States Air Force had unlawfully handled hazardous waste in classified operating locations because litigation of plaintiff's claims required and risked, under the “classified mosaic” theory, disclosure of privileged information).
Here, as in Jeppesen Dataplan and Kasza, the subject matter of this case, Operation Flex, involves both privileged and nonprivileged information, which cannot be separated as a practical matter. Indeed, Operation Flex comprises only a small part of the classified mosaic in the FBI's larger counterterrorism investigations, which predate and go beyond Monteilh's source work. The effort to separate privileged from nonprivileged information—even with the protective procedures available to the Court—presents an unjustifiable risk of disclosing state secrets. As the Ninth Circuit observed, “[a]dversarial litigation, including pretrial discovery of documents and witnesses and the presentation of documents and testimony at trial, is inherently complex and unpredictable.” Jeppesen Dataplan, 614 F.3d at 1089. “Although district courts are well equipped to wall off isolated secrets from disclosure, the challenge is exponentially greater in exceptional cases like this one, where the relevant secrets are difficult or impossible to isolate and even efforts to define a boundary between privileged and unprivileged evidence would risk disclosure by implication.” Id. In such rare circumstances, as here, the risk of disclosure that further litigation would engender cannot be averted through protective orders or restrictions on testimony. Id. This is true even as to Plaintiffs' Fourth Amendment claim because it is impossible to excise the facts directly related to this claim from the factual context of Operation Flex as a whole, and that context forms an important background for a finder of fact to consider in her analysis. While this case is only at the pleading stage and Plaintiffs have not yet propounded any discovery requests, (Arulanantham Decl. ¶ 2), Defendants need not wait before discovery or evidentiary disputes are at issue to assert the privilege for dismissal. Jeppesen Dataplan, 614 F.3d at 1081 (“Courts are not required to play with fire and chance further disclosure—inadvertent, mistaken, or even intentional—that would defeat the very purpose for which the privilege exists.”) (quoting Sterling v. Tenet, 416 F.3d 338, 344 (4th Cir.2005)). Accordingly, because further litigation of this action would create “an unjustifiable risk of revealing state secrets” related to the FBI's counterterrorism investigations, dismissal of Plaintiffs' claims is warranted. Id. at 614 F.3d at 1088.
V. CONCLUSION
The state secrets privilege strives to achieve a difficult compromise between the principles of national security and constitutional freedoms. The state secrets privilege can only be invoked and applied with restraint, in narrow circumstances, and infused with judicial skepticism. Yet, when properly invoked, it is absolute—the interest of protecting state secrets cannot give way to any other need or interest. Navigating through the narrow straits of the state secrets privilege has not been an easy or enviable task for the Court. In the context of the Executive's counterterrorism efforts engendered by 9/11, the Court has been confronted with the difficult task of balancing its obligation to defer to the Executive in matters of national security with its duty to promote open judicial inquiry. Too much deference would short-circuit constitutional liberties while too much judicial inquiry would risk disclosure of information that would jeopardize national security. In struggling with this conflict, the Court is reminded of the classic dilemma of Odysseus, who faced the challenge of navigating his ship through a dangerous passage, flanked by a voracious six-headed monster, on the one side, and a deadly whirlpool, on the other. Odysseus opted to pass by the monster and risk a few of his individual sailors, rather than hazard the loss of his entire ship to the sucking whirlpool. Similarly, the proper application of the state secrets privilege may unfortunately mean the sacrifice of individual liberties for the sake of national security. El–Masri, 479 F.3d at 313 (“[A] plaintiff suffers this reversal not through any fault of his own, but because his personal interest in pursuing his civil claim is subordinated to the collective interest in national security.”); Sterling, 416 F.3d at 348 (“[T]here can be no doubt that, in limited circumstances ... the fundamental principle of access to court must bow to the fact that a nation without sound intelligence is a nation at risk.”); Fitzgerald v. Penthouse Int'l, Ltd., 776 F.2d 1236, 1238 n. 3 (4th Cir.1985) (“When the state secrets privilege is validly asserted, the result is unfairness to individual litigants—through the loss of important evidence or dismissal of a case—in order to protect a greater public value.”)
The Court recognizes the weight of its conclusion that Plaintiffs must be denied a judicial forum for their claims. The Court does not reach its decision today lightly, but does so only reluctantly, after months of careful review of the parties' submissions and arguments, particularly the Government's in camera materials upon which the Court heavily relies. Plaintiffs raise the specter of Korematsu v. United States, 323 U.S. 214, 65 S.Ct. 193, 89 L.Ed. 194 (1944), and protest that dismissing their claims based upon the state secrets privilege would permit a “remarkable assertion of power” by the Executive, and that any practice, no matter how abusive, may be immunized from legal challenge by being labeled as “counterterrorism” and “state secrets.” (Pls. Opp'n to Gov't, at 20, 41–42.) But such a claim assumes that courts simply rubber stamp the Executive's assertion of the state secrets privilege. That is not the case here. The Court has engaged in rigorous judicial scrutiny of the Government's assertion of privilege and thoroughly reviewed the public and classified filings with a skeptical eye. The Court firmly believes that after careful examination of all the parties' submissions, the present action falls squarely within the narrow class of cases that require dismissal of claims at the outset of the proceeding on state secret grounds. Accordingly, all of Plaintiffs' causes of action against Defendants, aside from their FISA claim, are DISMISSED.