Electronic Privacy Information Center v. United States Department of Homeland Security

777 F.3d 518, 414 U.S. App. D.C. 151, 2015 U.S. App. LEXIS 2043, 2015 WL 525183
CourtCourt of Appeals for the D.C. Circuit
DecidedFebruary 10, 2015
Docket14-5013
StatusPublished
Cited by120 cases

This text of 777 F.3d 518 (Electronic Privacy Information Center v. United States Department of Homeland Security) is published on Counsel Stack Legal Research, covering Court of Appeals for the D.C. Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Electronic Privacy Information Center v. United States Department of Homeland Security, 777 F.3d 518, 414 U.S. App. D.C. 151, 2015 U.S. App. LEXIS 2043, 2015 WL 525183 (D.C. Cir. 2015).

Opinion

Opinion for the Court filed by Circuit Judge ROGERS.

*520 ROGERS, Circuit Judge:

Pursuant to the Freedom of Information Act (“FOIA”), 5 U.S.C. § 552, the Electronic Privacy Information Center (“EPIC”) requested release by the Department of Homeland Security of Standard Operating Procedure 303 (“SOP 303”), which the Department describes as a protocol for shutting down wireless networks during critical emergencies. When the Department released only a heavily redacted version, EPIC successfully sued to compel disclosure. See Elec. Privacy Info. Ctr. v. Dep’t of Homeland Sec., 999 F.Supp.2d 24 (D.D.C.2013) (“EPIC”). The Department appeals, invoking FOIA Exemption 7(F) on the ground that production of SOP 303 could reasonably be expected to endanger many individuals’ lives or physical safety. Upon de novo review, we hold that the plain text of Exemption 7(F) protects law enforcement records the disclosure of which “could reasonably be expected to endanger the life or physical safety of any individual,” 5 U.S.C. § 552(b)(7)(F), during a critical emergency, without requiring the withholding agency to specifically identify the individuals who would be endangered, and that much if not all of SOP 303 is exempt from disclosure. Accordingly, we reverse the grant of summary judgment to EPIC, and we remand the case for the district coürt to determine whether any reasonably segregable portions of SOP 303 can be disclosed.

I.

SOP 303 is an “Emergency Wireless Protocol” that codifies a “unified voluntary process for the orderly shut-down and restoration of wireless services during critical emergencies such as the threat of radio-activated improvised explosive devices.” Deck James Holzer, I, Senior Dir. FOIA Opns., Privacy Off., Dep’t Homeland Sec., 1120, June 28, 2013; see Nat’l Sec. Telecomm. Advisory Comm., Termination of Cellular Networks During Emergency Situations, NSTAC Issue Review 2006-07, at 139 (2007) (“NSTAC Issue Review”). 1 After the 2005 bombings of the transportation system in London, England, in which cellular telephones were used to detonate explosives remotely, the President’s National Security Telecommunications Advisory Committee identified the need for a “single governmental process to coordinate determinations of if and when cellular shutdown activities should be undertaken in light of the serious impact on access by the public to emergency communications services during these situations and the need to preserve the public trust in the integrity of the communications infrastructure.” Holzer Deck ¶ 20; see also NSTAC Issue Review, at 139. The National Coordinating Center for Communications (“NCC”, formerly known as the NCC for Telecommunications), part of the Department’s National Cybersecurity and Communications Integration Center, developed SOP 303, under which the NCC “function[s] as the focal point for coordinating any actions leading up to and following the termination of private wireless network connections.” NSTAC Issue Review, at 139. State Homeland Security Advisors, or their designees, or representatives of the Department’s Homeland Security Operations Center make the decision to suspend cellular service. Id. Once one of these entities requests a shutdown, the NCC “operate[s] as an authenticating body, notifying the carriers in the affected area of the decision.” Id. The NCC also *521 “ask[s] the requestor a series of questions to determine if the shutdown is a necessary action.” Id. “After making the determination that the shutdown is no longer required, the NCC ... initiate^] a similar process to reestablish service.” Id.

On July 10, 2012, EPIC submitted a FOIA request to the Department seeking the full text of SOP 303, the series of questions used to determine whether a shutdown is necessary, and any related protocols or guidelines. The Department initially responded that it had conducted a comprehensive search, but was unable to locate or identify any responsive records. Following an administrative appeal, however, the Department conducted another search and located one responsive record: SOP 303. See Nat’l Coordinating Ctr. for Telecomm. Standard Operating Procedure 303 (Sept. 25, 2009) (“SOP 303”). The SOP included the full text of the predetermined series of questions that determines if a shutdown is necessary, and the executing protocols related to the implementation of SOP 303. Holzer Deck ¶ 21.

Pursuant to FOIA Exemptions 6 and 7(C), which protect certain personal information, see 5 U.S.C. §§ 552(b)(6), (b)(7)(C), the Department withheld from EPIC the names, telephone numbers, and email addresses for state homeland security officials contained in SOP 303. Aside from a sentence explaining that SOP 303 “provides detailed procedures for the [NCC] to coordinate requests for the disruption of cellular service,” certain subsection headings, and the title of Appendix E (“External Agency Cellular Service Disruption Implementation Instructions”), essentially all of SOP 303 was withheld pursuant to FOIA Exemptions 7(F) and 7(E), which permit non-disclosure of certain law-enforcement information that, respectively, “could reasonably be expected to endanger the life or physical safety of any individual,” 5 U.S.C. § 552(b)(7)(F), or “would disclose techniques and procedures for law enforcement investigations or prosecutions,” id. § 552(b)(7)(E).

On February 27, 2013, EPIC filed suit seeking the release of SOP 303 in its entirety. See 5 U.S.C. § 552(a)(4)(B). The parties filed cross motions for summary judgment. In support of summary judgment, the Department submitted the Holzer declaration asserting that SOP 303 was exempt from disclosure under FOIA Exemption 7(F) because “[m]aking SOP 303 public would, e.g., enable bad actors to insert themselves into the process of shutting down or reactivating wireless networks by appropriating verification methods and then impersonating officials designated for involvement in the verification process.” Holzer Deck ¶ 26. Such bad actors would, Holzer stated, then “be [able] to disable the protocol [and] freely use wireless networks to activate ... improvised explosive devices,” so “there is a reasonable expectation that disclosure could reasonably endanger individuals’ lives or physical safety.” Id. Exemption 7(E) also applied because, according to Holzer, SOP 303 “contains a homeland security procedure primarily intended to efficiently and effectively deter the triggering of radio-activated improvised explosive devices,” and diming such critical emergencies “orderly deactivation of wireless networks may be the best option for preventing and/or mitigating explosions that would endanger life and property.” Id. ¶ 25.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Shapiro v. Department of Justice
District of Columbia, 2025
Cabezas v. Federal Bureau of Prisons
District of Columbia, 2023
Risenhoover v. U.S. Department of State
District of Columbia, 2023
Yale New Haven Hosp. v. Becerra
56 F.4th 9 (Second Circuit, 2022)

Cite This Page — Counsel Stack

Bluebook (online)
777 F.3d 518, 414 U.S. App. D.C. 151, 2015 U.S. App. LEXIS 2043, 2015 WL 525183, Counsel Stack Legal Research, https://law.counselstack.com/opinion/electronic-privacy-information-center-v-united-states-department-of-cadc-2015.