                            UNITED STATES DISTRICT COURT
                            FOR THE DISTRICT OF COLUMBIA

                                              )
ASSOCIATED PRESS, et al.,                     )
                                              )
              Plaintiffs,                     )
                                              )
      v.                                      )       Civil Action No. 16-cv-1850 (TSC)
                                              )
FEDERAL BUREAU OF                             )
INVESTIGATION,                                )
                                              )
              Defendant.                      )
                                              )


                                  MEMORANDUM OPINION

       Before the court are cross motions for summary judgment in this case brought under the

Freedom of Information Act (“FOIA”), 5 U.S.C. § 552. In 2016, Plaintiffs Associated Press,

Gannett Satellite Information Network d/b/a USA Today, and Vice Media, LLC (“Plaintiffs”),

each filed FOIA requests to the Federal Bureau of Investigation (“FBI”) for records relating to an

agreement with a technology vendor who assisted the FBI in unlocking the iPhone of a suspected

terrorist. As part of the parties’ joint agreement in this litigation, the FBI has produced 100 of

123 responsive pages in full or in part, with certain material withheld pursuant to FOIA

Exemptions 1, 3, 4, 6, 7(C), and 7(E). Plaintiffs have narrowed their FOIA request on summary

judgment to two specific pieces of information—the identity of the vendor, and the price paid to

the vendor—such that only Exemptions 1, 3, 4, and 7(E) remain disputed. The FBI claims that

Exemptions 1, 3, and 7(E) apply independently to the identity of the vendor and the purchase

price, and that Exemption 4 also applies independently to the purchase price.
       Plaintiffs have also moved to supplement the record with then-FBI Director James

Comey’s May 3, 2017, Senate testimony. The court will GRANT Plaintiffs’ motion to

supplement the record and consider the testimony as part of Plaintiffs’ brief.

       Upon consideration of the parties’ filings, the court concludes that Exemptions 1, 3, and

7(E) independently apply to the requested information, and that Exemption 4 does not.

Accordingly, as set forth below, the FBI’s motion for summary judgment is GRANTED, and

Plaintiffs’ cross-motion for summary judgment is DENIED.

I.     BACKGROUND

       In December 2015, Syed Rizwan Farook and Tashfeen Malik killed fourteen people and

injured twenty-two others in an attack on the Inland Regional Center in San Bernardino,

California. See Government’s Motion to Compel Apple Inc. to Comply, No. 5:16-cm-10-SP

(C.D. Cal.) at 1 ECF No. 1. The FBI led the federal investigation into the attack, and during the

course of that investigation, discovered an employer-owned iPhone issued to Farook that was

password-protected. See id. at 1, 5. The phone was equipped with an auto-erase function that

would result in the permanent destruction of the information in the phone after 10 failed attempts

at entering the passcode. Id. at 5. Thus, the FBI was unable to access the phone without risking

the loss of its contents. Id. at 10-11. After initially commencing legal action against the phone’s

manufacturer, Apple, to compel its assistance in accessing the phone, id. at 6, the FBI moved to

stay the proceedings in March 2016 when an “outside party demonstrated to the FBI a possible

method for unlocking Farook’s iPhone.” Government’s Ex Parte Application for a Continuance,

No. 5:16-cm-10 (C.D. Cal.) at 3 ECF No. 191.

       Rather than allow competitive bidding, the FBI sought a waiver to solicit a single source

for the contract to unlock the phone. (Declaration of Jay Ward Brown (“Brown Decl.”) Ex. J, at




                                                 2
AP-19–AP-23). None of the vendors who inquired with the agency about unlocking the phone

had demonstrated that they could produce a solution quickly enough to meet the FBI’s

investigative requirements, and in fact, none of them had begun to develop or test a solution at

the time of the inquiries. (Id. at AP-22). At the end of March 2016, the FBI reported that it had

“successfully accessed the data stored on Farook’s iPhone and therefore no longer require[d] the

assistance from Apple Inc.” Government’s Status Report, No. 5:16-cm-10 (C.D. Cal.) at 1 ECF

No. 209.

         Following this revelation, then-FBI Director James Comey gave interviews to reporters

on April 21, 2016, and May 11, 2016, during which he confirmed several details regarding the

tool and its purchase. (Brown Decl. Ex. G; Ex. H; Ex. I). This information included details

about its cost, which Comey believed “for sure” exceeded the salary he was due at the time for

the remainder of his seven-year, four-month tenure, about $1.2 million. (Brown Decl. Ex. G).

He also stated that the tool was narrowly tailored to only work on an iPhone 5C operating on iOS

9, and the FBI had not identified any other phones on which the tool could be used. (Brown

Decl. Ex. I at 3, 16). Moreover, he noted that the urgency of the FBI’s investigation necessitated

the FBI’s purchase of the tool and the agency spent what it needed to in order to acquire it. (Id.

at 5).

         Each Plaintiff filed a separate FOIA request with the FBI between March and April of

2016. (See Declaration of David M. Hardy (“First Hardy Decl.”) Ex. A; Ex. I; Ex. M). They

sought records concerning the FBI’s financial agreements with the vendor the agency employed

to unlock the iPhone. (See id.) The FBI initially denied each request on the basis of FOIA

Exemption 7(A), which permits agencies to withhold records or information compiled for law

enforcement purposes to the extent that the production of such records could reasonably be




                                                 3
expected to interfere with law enforcement proceedings. (First Hardy Decl. Ex. C; Ex. J; Ex. N).

Each Plaintiff appealed administratively as provided under FOIA, and the Department of Justice

Office of Information Policy affirmed the FBI’s denial of the requests for the records in each

case. (First Hardy Decl. Ex. D; Ex. H; Ex. K; Ex. L; Ex. O; Ex. Q).

       Plaintiffs then filed this action in September 2016. (ECF No. 1). On January 6, 2017, the

FBI produced 100 of 123 responsive pages in full or in part, with certain information withheld or

redacted pursuant to FOIA Exemptions 1, 3, 4, 6, 7(C), and 7(E). (First Hardy Decl. ¶ 25; Ex. R;

Brown Decl. Ex. J). The FBI then moved for summary judgment (ECF No. 14), and Plaintiffs

filed their cross-motion for summary judgment, narrowing their outstanding FOIA request to two

pieces of information: (1) the identity of the vendor, and (2) the amount paid to the vendor for

the tool in question. (See Pls. Mem at 9, ECF Nos. 15, 16). As a result of this revised request,

the remaining issues on summary judgment are whether the FBI properly applied Exemptions 1,

3, and 7(E) to the identity of the vendor, and whether it properly applied Exemptions 1, 3, 4, and

7(E) to the purchase price.

II.    PLAINTIFFS’ MOTION TO SUPPLEMENT THE RECORD

       On May 3, 2017, Director Comey testified before the Senate Judiciary Committee. (See

Supplemental Declaration of Jay Ward Brown “Supp. Brown Decl.” Ex. A). During questioning,

Senator Dianne Feinstein mentioned the FBI’s hacking of Farook’s iPhone, as excerpted below

from the hearing transcript:

       FEINSTEIN: Well I – I was so struck when San Bernardino happened and you made
       overtures to allow that device to be opened, and then the FBI had to spend $900,000 to
       hack it open. And as I subsequently learned of some of the reason for it, there were good
       reasons to get into that device.

       And the concern I have is that once people had been killed in a terrorist attack and that
       there may be other DNA, there may be other messages that lead an investigative agency




                                                 4
       to believe that there are others out there, isn't to the – for the protection of the public that
       one would want to be able to see if a device could be opened.

       And I’ve had a very hard time – I’ve tried – I’ve gone out, I tried to talk to the tech
       companies that are in my state. One – Facebook was very good and understood the
       problem. But most do not have. Has the FBI ever talked with the tech companies about
       this need in particular?

       COMEY: Yes, senator. We’ve had a lot of conversations, and as I said earlier, they’re –
       in my sense, they've been getting more productive because I think the tech companies
       have come to see the darkness a little bit more. My – my concern was privacy’s really
       important but that they didn't see the public safety costs.

       I think they’re starting to see that better and what – what nobody wants to have happen is
       something terrible happen in the United States and it be connected to our inability to
       access information with lawful authority. That we ought to have the conversations before
       that happens and the companies more and more get that. I think over the last year and
       half, and – but it’s vital, we weren't picking on Apple in the San Bernardino case.

(Id at 4). On May 12, 2017, Plaintiffs moved to supplement the record on summary judgment

with this testimony, citing it as “further evidence in support of [their] arguments on pages 15, 20,

26, and 29” of their memorandum in support of their cross-motion. (ECF No. 20 at 2).

       Regarding Exemption 1, Plaintiffs note that then-Director Comey has already spoken

publicly about the price (namely that it was very high), and thus disclosing the price information

would not jeopardize national security interests. (See Pls. Mem. at 15). Regarding Exemption 3,

Plaintiffs claim the FBI’s argument that releasing the specific purchase price would aid those

seeking to thwart the FBI’s tool is belied by the fact that the information that could provide such

aid—that the purchase price was very high—is already publicly available.         (See id. at 20).

Regarding Exemption 4, Plaintiffs emphasize that the tool’s vendor would not suffer competitive

harm from disclosure of the purchase price because Comey already released the general price-

related information, and potential competitors have a ballpark figure from which to underbid.

(See id. at 26). Regarding Exemption 7(E), Plaintiffs argue that releasing the purchase price will




                                                  5
not risk circumvention of the law because the FBI took that risk when Director Comey revealed

that the purchase price was substantial. (See id. at 29).

       The court will GRANT Plaintiffs’ motion to supplement the record with the Senate

Judiciary Committee hearing transcript, and will consider it part of Plaintiffs’ brief in the

sections detailed above.

III.   SUMMARY JUDGMENT STANDARD

       Summary judgment is appropriate where the record shows there is no genuine issue of

material fact and the movant is entitled to judgment as a matter of law. Fed. R. Civ. P. 56(a);

Celotex Corp. v. Catrett, 477 U.S. 317, 322 (1986); Waterhouse v. District of Columbia, 298

F.3d 989, 991 (D.C. Cir. 2002). In determining whether a genuine issue of material fact exists,

the court must view all facts in the light most favorable to the non-moving party. See, e.g.,

Adickes v. S.H. Kress & Co., 398 U.S. 144, 157 (1970). A fact is material if “a dispute over it

might affect the outcome of a suit under governing law; factual disputes that are ‘irrelevant or

unnecessary’ do not affect the summary judgment determination.” Holcomb v. Powell, 433 F.3d

889, 895 (D.C. Cir. 2006) (quoting Anderson v. Liberty Lobby, 477 U.S. 242, 248 (1986)). An

issue is genuine if “the evidence is such that a reasonable jury could return a verdict for the

nonmoving party.” Id. (quoting Anderson, 477 U.S. at 248). The party seeking summary

judgment “bears the heavy burden of establishing that the merits of his case are so clear that

expedited action is justified.” Taxpayers Watchdog, Inc., v. Stanley, 819 F.2d 294, 297 (D.C.

Cir. 1987).

       FOIA cases are typically and appropriately decided on motions for summary judgment.

Brayton v. Office of the U.S. Trade Rep., 641 F.3d 521, 527 (D.C. Cir. 2011). Agencies bear the

burden of justifying withholding of any records, as FOIA favors a “strong presumption in favor




                                                  6
of disclosure.” Dep’t of State v. Ray, 502 U.S. 164, 173 (1991). The court therefore analyzes all

underlying facts and inferences in the light most favorable to the FOIA requester, even where the

requester has moved for summary judgment. See Pub. Citizen Health Research Grp. v. FDA,

185 F.3d 898, 904–05 (D.C. Cir. 1999).

       In cases where the applicability of certain FOIA exemptions is at issue, agencies may rely

on supporting declarations that are reasonably detailed and non-conclusory. See, e.g., ACLU v.

U.S. Dep’t of Def., 628 F.3d 612, 619 (D.C. Cir. 2011); Students Against Genocide v. Dep’t of

State, 257 F.3d 828, 838 (D.C. Cir. 2001). “If an agency’s affidavit describes the justifications

for withholding the information with specific detail, demonstrates that the information withheld

logically falls within the claimed exemption, and is not contradicted by contrary evidence in the

record or by evidence of the agency’s bad faith, then summary judgment is warranted on the

basis of the affidavit alone.” ACLU, 628 F.3d at 619. “Ultimately, an agency’s justification for

invoking a FOIA exemption is sufficient if it appears ‘logical’ or ‘plausible.’” Id. (internal

quotation marks omitted) (quoting Larson v. Dep’t of State, 565 F.3d 857, 862 (D.C. Cir. 2009)).

However, a motion for summary judgment should be granted in favor of the FOIA requester

where “an agency seeks to protect material which, even on the agency’s version of the facts, falls

outside the proffered exemption.” Coldiron v. U.S. Dep’t of Justice, 310 F. Supp. 2d 44, 48

(D.D.C. 2004) (quoting Petroleum Info. Corp. v. Dep’t of Interior, 976 F.2d 1429, 1433 (D.C.

Cir. 1992)).

IV.    DISCUSSION

       The defendant in a FOIA case must show that its search for responsive records was

adequate, that any claimed exemptions are valid, and that any reasonably segregable non-exempt




                                                 7
portions of records have been disclosed after redaction of exempt information. Light v. Dep’t of

Justice, 968 F. Supp. 2d 11, 23 (D.D.C. 2013).

       Here, Plaintiffs have conceded that the FBI’s search for responsive records was adequate,

and do not challenge the FBI’s segregability determination. They do, however, contest the FBI’s

claimed exemptions for the tool vendor’s identity and the tool’s purchase price. The FBI asserts

that such information is properly and independently protected under FOIA Exemptions 1, 3, and

7(E), and that the purchase price is also independently protected under FOIA Exemption 4. (Def.

Opp. at 1). For the reasons set forth below, the court finds that Exemptions 1, 3, and 7(E) apply

to both the vendor’s identity and the purchase price, and Exemption 4 does not apply to the

purchase price. Although invocation of a single valid exemption is sufficient to permit the

withholding of the information requested and support a grant of summary judgment to the FBI,

the court will nevertheless analyze the application of each exemption.

       A.      FOIA Exemption 1

               1.      Applicable Legal Standard

       FOIA Exemption 1 protects from disclosure records that are “(A) specifically authorized

under criteria established by an Executive order to be kept secret in the interest of national

defense or foreign policy and (B) are in fact properly classified pursuant to such Executive

order.” 5 U.S.C. § 552(b)(1). Executive Order 13,526 currently governs the classification of

national security information, and requires that:

       (1) an original classification authority is classifying the information;

       (2) the information is owned by, produced by or for, or is under the control of the United
           States Government;

       (3) the information falls within one or more of the categories of information listed in
           section 1.4 of this order; and




                                                    8
       (4) the original classification authority determines that the unauthorized disclosure of the
           information reasonably could be expected to result in damage to the national security,
           which includes defense against transnational terrorism, and the original classification
           authority is able to identify or describe the damage.

Classified National Security Information, EO 13,526 § 1.1(a); 75 Fed. Reg. 707 (2009).

Plaintiffs do not dispute that the FBI has met the first and second requirements, (see Pls. Mem. at

12-18), as the Hardy Declaration demonstrates that Hardy is an original classification authority

and that the withheld information is under the control of the United States Government. (First

Hardy Decl. ¶ 2, 33). The FBI asserts that the third requirement is satisfied because the identity

of the vendor and the cost of the tool relate to intelligence activities or intelligence sources or

methods under Section 1.4(c) of the Executive Order. (First Hardy Decl. ¶ 33) (citing Exec.

Order No. 13,526 § 1.4(c); 75 Fed. Reg. at 708). Plaintiffs do not appear to challenge this

assertion. (See Pls. Mem. at 12-18; Pls. Reply at 2-5, 7-11).

       The parties’ dispute involves the fourth requirement, which permits withholding if the

information requested could reasonably be expected to cause an identifiable and describable

degree of harm to national security if released. Judicial Watch, Inc. v. Dep’t of Def., 715 F.3d

937, 941 (D.C. Cir. 2013). The court owes “substantial weight” to detailed agency explanations

in the national security context; its role is to ensure that the government’s rationale is logical or

plausible. Id. at 941, 943; see also Judicial Watch, Inc. v. Dep’t of Commerce, 337 F. Supp. 2d

146, 162 (D.D.C. 2004) (“In light of courts’ presumed lack of expertise in the area of national

security, a reviewing court is prohibited from conducting a detailed analysis of the agency’s

invocation of Exemption 1.” (citing Halperin v. CIA, 629 F.2d 144, 148 (D.C. Cir. 1980))).

Further, “the text of Exemption 1 suggests that little proof or explanation is required beyond a

plausible assertion that information is properly classified.” Morley v. CIA, 508 F.3d 1108, 1124

(D.C. Cir. 2007). However, conclusory affidavits that merely recite statutory standards, or that



                                                   9
are overly vague or sweeping, will not suffice to carry the government’s burden. Larson, 585

F.3d at 864.

               2.      Whether the FBI Properly Invoked Exemption 1 with Respect to the
                       Vendor’s Identity

       The FBI argues that releasing the vendor’s identity could allow adversaries to use

existing public technology created by the vendor to probe for weaknesses and create better

encryption technology to thwart the FBI’s ability to use the tool. (Second Declaration of David

M. Hardy (“Second Hardy Decl.”) ¶ 8-9). The agency argues that because software companies

“update and modernize their old operating systems rather than create a completely new product,”

there are programming styles and strategies unique to most companies, likely including the

vendor at issue. (Id. ¶ 8). Thus, if the vendor’s identity were made public, a review of the

company’s work could lead antagonists to “develop exploits for the vendor’s unique product.”

(Id.) Additionally, the FBI notes that because the vendor’s networks are not as sophisticated as

the FBI’s cyber-security facilities, releasing the name of the vendor could subject the vendor to

attacks by entities who wish to exploit the technology. (Id. ¶ 9). Since the vendor is not as well

equipped to guard against these types of attacks as is the FBI, revealing the vendor’s identity

“risks disclosure, exploitation, and circumvention of a classified intelligence source and

method.” (Id.) Disclosure of the vendor’s identity could thus “reasonably be expected to cause

serious damage to national security, as it would allow hostile entities to discover the current

intelligence gathering methods used, as well as the capabilities and limitations of those

methods.” (First Hardy Decl. ¶ 36).

       This line of reasoning logically and plausibly demonstrates how the FBI could reasonably

expect the release of the vendor’s identity to cause identifiable harm to national security. If an

adversary were determined to learn more information about the iPhone hacking tool the FBI



                                                 10
acquired, it is certainly logical that the release of the name of the company that created the tool

could provide insight into the tool’s technological design. Adversaries could use this

information to enhance their own encryption technologies to better guard against this tool or

tools the vendor develops for the FBI in the future. Plaintiffs assert that it is unlikely that a

public body of work which an adversary could use even exists, (Pls. Reply at 3), given that the

vendor is likely sophisticated enough to avoid risking the usefulness of its technology by making

such work available, but it is plausible that useful information about a software company’s

technological design could be gleaned from its other publicly available products.

        Moreover, it is logical and plausible that the vendor may be less capable than the FBI of

protecting its proprietary information in the face of a cyber-attack. The FBI’s conclusion that

releasing the name of the vendor to the general public could put the vendor’s systems, and

thereby crucial information about the technology, at risk of incursion is a reasonable one.

Plaintiffs here assume that this is not a legitimate threat, and that if the tool were so critically

important to national security, the FBI would not have left it in the hands of a “poorly guarded

vendor.” (Pls. Reply at 4 n.1). But the vendor may continue to possess the tool for any number

of reasons related to national security interests, and even if the possibility of an attack on the

vendor’s systems is remote, the FBI has still demonstrated a logically reasonable risk of harm to

national security in this respect.

        The court therefore finds that the FBI has shown that the release of the vendor’s identity

could be reasonably expected to cause harm to national security interests by limiting the FBI’s

present and future ability to gain access to suspected terrorists’ phones. Although as of May

2016 the FBI had not yet identified other phones with which the tool could be utilized, (Brown

Decl. Ex. I at 3), any affidavit describing a potential threat to national security “will always be




                                                   11
speculative to some extent.” ACLU, 628 F.3d at 619. There is no evidence to suggest that the

tool will not be valuable in the future, and the FBI has met its burden of providing a detailed,

non-conclusory affidavit sufficient to invoke Exemption 1 as applied to the vendor’s identity.

       Plaintiffs argue that Director Comey’s public comments about the tool’s efficacy negate

the risk that an adversary will attempt to learn more about it, since the route to developing a

countermeasure seems fairly straightforward. (Pls. Mem. at 15-16). After Director Comey

emphasized that he was “highly confident” that the tool only works on iPhone 5Cs running iOS9

(Brown Decl. Ex. I at 16), any organization intending to prevent the FBI from using the tool to

hack its members’ phones could therefore use a different phone or a different operating system.

However, this overlooks the tool’s potentially valuable technical capabilities. The FBI may find

a way to enhance the tool’s capabilities, choose to continue using advanced versions of similar

technology in the future, or re-employ the vendor to develop another similar product. It is

certainly plausible that disclosure of the vendor’s name could hurt the FBI’s future efforts to

protect national security, despite opportunities to circumvent the tool that may arise from

Comey’s comments. The FBI therefore properly invoked Exemption 1 with respect to the

vendor’s identity.

               3.      Whether the FBI Properly Invoked Exemption 1 with Respect to the
                       Purchase Price

       The FBI argues that revealing the price paid for the tool would allow adversaries to

determine its usefulness and assess its nature, and would reveal where the FBI concentrates its

resources in national security investigations. (Second Hardy Decl. ¶ 16-18). Releasing the

purchase price would designate a finite value for the technology and help adversaries determine

whether the FBI can broadly utilize the technology to access their encrypted devices. (Id. ¶ 16).

Since release of this information might “reduce the effectiveness of a critical classified source



                                                 12
and method,” it is reasonable to expect that disclosure could endanger national security. (Id. ¶

19).

       The court finds that the Second Hardy Declaration logically and plausibly sets forth how

the release of the purchase price could cause a reasonably expected risk of harm to national

security. “Minor details of intelligence information,” like the price paid for the iPhone hacking

tool, “may reveal more information than their apparent insignificance suggests because, much

like a piece of jigsaw puzzle, each detail may aid in piecing together other bits of information.”

Leopold v. CIA, 106 F. Supp. 3d 51, 59 (D.D.C. 2015) (quoting Larson, 565 F.3d at 864)

(internal quotation marks omitted). The price the FBI paid for the tool could logically reveal

how much the FBI values gaining access to suspects’ phones, and the breadth of the tool’s

capabilities. Accordingly, the FBI has met its burden of providing a detailed, non-conclusory

affidavit sufficient to invoke Exemption 1 with respect to the purchase price.

       Plaintiffs argue that Director Comey’s public comments about the purchase price negate

the possibility of any further harm to national security. (Pls. Mem. at 15). Because he has

already disclosed the “only possible useful bit of information about the tool’s price, namely, that

it was very high,” they argue that there is no justification for withholding the exact price. (Id.)

They further note that the agency’s national security priorities have already been made clear by

virtue of Comey’s statement that the government will pay “what is necessary,” (Brown Decl. Ex.

I at 5), to access suspected terrorists’ phones. (Pls. Reply at 10). However, Plaintiffs fail to

address this Circuit’s test for when an agency’s official disclosure may compel release of

otherwise valid exemption claims. Although it is true that “when information has been officially

acknowledged, its disclosure may be compelled even over an agency’s otherwise valid




                                                 13
exemption claim” Fitzgibbon v. CIA, 911 F.2d 755, 765 (D.C. Cir. 1990), the claim must meet

the following “strict test”:

        To be officially disclosed: (1) the information requested must be as specific as the
        information previously released; (2) the information requested must match the
        information previously disclosed; and (3) the information requested must already have
        been made public through an official and documented disclosure. Thus, a plaintiff
        asserting a claim of prior disclosure must bear the initial burden of pointing to specific
        information in the public domain that appears to duplicate that being withheld.

Moore v. CIA, 666 F.3d 1330, 1333 (D.C. Cir. 2011) (internal citations omitted). Since this court

has found that the FBI’s invocation of Exemption 1 with respect to the purchase price is valid,

Director Comey’s public comments must meet the requirements set forth in Moore in order to

compel disclosure of the purchase price. The comments fail the first requirement—Comey

provided only a general estimate, rather than the specific price paid for the tool. He admitted

himself that in making that estimate, he was “just winging that.” (Brown Decl. Ex. I at 2).

        Plaintiffs’ supplemental evidence fares no better. (See Supp. Brown Decl. Ex. A at 2).

Even if Senator Feinstein was correct that the FBI paid $900,000 for the tool, Director Comey

did not acknowledge or verify Sen. Feinstein’s comment, and Comey’s testimony therefore fails

the third element of the test, since the information was not made public through an agency’s

official disclosure.

        Plaintiffs also insist that the FBI seeks to prevent disclosure of the purchase price in order

to prevent embarrassment and restrain competition, not to protect national security, in violation

of section 1.7(a) of Executive Order 13,526; 75 Fed. Reg. at 710. Plaintiffs’ allegation is based

on Comey’s comment that he would not disclose the exact purchase price, stating “I don’t want

to waste your tax payers [sic] money.” (Brown Decl. Ex. I at 11). However, Plaintiffs ignore the

context in which this statement was made. It appears Comey was attempting to explain that he

did not want to reveal the purchase price because he did not wish to hurt the FBI’s negotiating



                                                 14
position the next time a similar tool was purchased, thus potentially saving public funds. (See

Brown Decl. Ex. I at 10-11). This comment does not reveal any desire to prevent embarrassment

to the FBI, and Plaintiffs provide no evidence for their conclusory statement that withholding the

purchase price will “artificially alter[] the competitive landscape for technology contracting.”

(Pls. Mem. at 15). This single statement from the former FBI Director is an insufficient basis for

this court to determine that the FBI’s motive for withholding the purchase price is improper.

Plaintiffs must provide something more than conjecture to show that the agency’s withholding

decision violates Executive Order 13,526. See Canning v. Dep’t of Justice, 848 F. Supp. 1037,

1048 (D.D.C. 1994). They have failed to do so.

       Despite Comey’s assertions about the price the FBI paid for the tool, his statements do

not amount to an official disclosure that compels the release of the information over the agency’s

valid exemption claim, and there is no evidence that the FBI has an improper motive in invoking

the exemption. The agency has provided a logical and plausible affidavit that adequately

demonstrates how the release of the purchase price could cause a reasonably expected risk of

harm to national security, and thus they have properly invoked Exemption 1 with respect to the

purchase price.

       B.      FOIA Exemption 3

               1.      Applicable Legal Standard

       FOIA Exemption 3 protects from disclosure information that has been specifically

exempted by statute, if that statute “(i) requires that the matters be withheld from the public in

such a manner as to leave no discretion on the issue; or (ii) establishes particular criteria for

withholding or refers to particular types of matters to be withheld.” 5 U.S.C. § 552(b)(3)(A).

Courts apply a two-pronged inquiry when evaluating Exemption 3 invocations, first determining




                                                  15
whether the statute is an exempting statute, and then evaluating whether the requested material

falls within the scope of that statute. CIA v. Sims, 471 U.S. 159, 167 (1985). Here, the FBI relies

on section 102A(i)(1) of the National Security Act of 1947 (the “Act”), which protects

intelligence sources and methods from unauthorized disclosure. 50 U.S.C. § 3024(i)(1).

Plaintiffs do not dispute that the Act qualifies as an exempting statute for the purpose of

Exemption 3. (Pls. Mem. at 18); ACLU, 628 F.3d at 619. Accordingly, the issue here is whether

the withheld information protects intelligence sources and methods.

        This Circuit has interpreted the Act “broadly,” holding that material is exempt if it relates

to intelligence sources and methods, or can reasonably be expected to lead to the unauthorized

disclosure of intelligence sources and methods. Leopold, 106 F. Supp. 3d at 57 (citing Larson,

565 F.3d at 865; Halperin, 629 F.2d at 147). The exemption includes the “power to withhold

superficially innocuous information on the ground that it might enable an observer to discover

the identity of an intelligence source or method.” Id. (quoting Sims, 471 U.S. at 178). The Act

presents an easier hurdle for the agency under Exemption 3 than does Executive Order 13,526

under Exemption 1, in that it does not require the FBI to determine that release of the

information could reasonably be expected to result in damage to national security. See 50 U.S.C.

§ 3024(i)(1). 1




1
  Plaintiffs’ challenge of the FBI’s invocation of Exemption 3 is inconsistent with their challenge
of Exemption 1. They do not appear to contest that the information they seek pertains to
intelligence sources or methods under Section 1.4(c) of Executive Order 13,526, (see Pls. Mem.
at 12-18; Pls. Reply at 2-5, 7-11), but they later contend that it does not “actually relate” to
intelligence sources or methods under the Act. (Pls. Mem. at 19) (citing Larson, 565 F.3d at
865). These two positions do not appear reconcilable.


                                                 16
                2.      Whether the FBI Properly Invoked Exemption 3 with Respect to the
                        Vendor’s Identity

        The FBI considers the iPhone hacking tool itself to be an intelligence source and method,

(Second Hardy Decl. ¶ 8), and the court agrees. The tool allows the FBI to access intelligence

information on suspects’ phones, therefore logically serving as both a source of intelligence

information and method for obtaining intelligence information. The FBI argues that release of

the vendor’s identity relates to an intelligence source and method because it could lead to

information about the tool, in the same manner as discussed under Exemption 1.

(Id. ¶ 8-9). For the reasons set forth in Section III.A.2, supra, the court finds that this is an

adequate justification for withholding the vendor’s identity pursuant to Exemption 3.

        Plaintiffs argue that the FBI’s position is undercut because it did not claim that the

vendor’s identity was an intelligence source. (Pls. Mem. at 20). But this fact is irrelevant under

the legal standard, as Plaintiffs acknowledge—the information requested must only relate to

intelligence sources or methods. Larson, 565 F.3d at 865. Plaintiffs also claim that the FBI’s

assertion that releasing the vendor’s identity could allow an adversary to learn more about the

tool’s capabilities is speculative, arguing that the FBI “has identified no rational reason why

knowing the vendor’s identity is linked in any way to the substance of the tool, much less how

such knowledge would reveal any information about the tool’s application[.]” (Pls. Mem. at 20).

However, as the court previously noted, any affidavit that describes a threatened harm to national

security “will always be speculative to some extent,” ACLU, 628 F.3d at 619, and the FBI has

shown how the vendor’s identity logically relates to an intelligence source and method.

Accordingly, the FBI properly invoked Exemption 3 with respect to the vendor’s identity.




                                                  17
                3.      Whether the FBI Properly Invoked Exemption 3 with Respect to the
                        Purchase Price

        The FBI argues that information regarding the purchase price relates to an intelligence

source and method because it could lead to information about the iPhone hacking tool, in the

same manner as discussed under Exemption 1. (Second Hardy Decl. ¶ 16-18). For the reasons

set forth in Section III.A.3, supra, the court finds that this is an adequate justification for

withholding the purchase price pursuant to Exemption 3.

        Plaintiffs’ argument again centers on Director Comey’s public statements about the tool’s

purchase price, asserting that all relevant information about the price has already been released.

(Pls. Reply at 9-11). As the court previously discussed in Section III.A.3, supra, Comey’s

comments did not constitute an official disclosure such that the release of the purchase price

could be compelled over the FBI’s valid exemption claim. Accordingly, the FBI properly

invoked Exemption 3 with respect to the tool’s purchase price.

        C.      FOIA Exemption 7(E)

                1.      Applicable Legal Standard

        FOIA Exemption 7(E) protects from disclosure “records or information compiled for law

enforcement purposes” when production of such records “would disclose techniques and

procedures for law enforcement investigations or prosecutions, or would disclose guidelines for

law enforcement investigations or prosecutions if such disclosure could reasonably be expected

to risk circumvention of the law.” 5 U.S.C. § 552(b)(7)(E). To fall within Exemption 7,

information must first meet a threshold requirement: that the records were compiled for law

enforcement purposes. Pub. Emps. for Envtl. Responsibility (“PEER”) v. U.S. Section, Int’l

Boundary & Water Comm’n, 740 F.3d 195, 202-03 (D.C. Cir. 2014). Here, this threshold is

clearly met; Plaintiffs do not dispute that the FBI compiled the withheld information for law



                                                  18
enforcement purposes, (Pls. Mem. at 28-31), and that the records related to the vendor were

clearly compiled to further the law enforcement investigation into the San Bernardino terrorist

attack.

          Although courts are divided over whether the “risk circumvention of the law”

requirement applies to techniques and procedures as well as guidelines, this Circuit has applied

the requirement to records containing techniques and procedures as well as those containing

guidelines. PEER, 740 F.3d at 204 n.4 (citing Blackwell v. FBI, 646 F.3d 37, 41-42 (D.C. Cir.

2011)). The FBI acknowledges this is the proper test here. (See Second Hardy Decl. ¶ 11). Still,

Exemption 7(E) “sets a relatively low bar for the agency to justify withholding.” Blackwell, 646

F.3d at 41. As the court in Mayer Brown LLP v. IRS put it,

          the exemption looks not just for circumvention of the law, but for a risk of
          circumvention; not just for an actual or certain risk of circumvention, but for an expected
          risk; not just for an undeniably or universally expected risk, but for a reasonably expected
          risk; and not just for certitude of a reasonably expected risk, but for the chance of a
          reasonably expected risk.

562 F.3d 1190, 1193 (D.C. Cir. 2009). The exemption does not require a specific showing of

how the law will be circumvented, only that the agency demonstrate logically how the release of

the requested information might create a risk of circumvention. Id. at 1194; see also Blackwell,

646 F.3d at 42.

                 2.      Whether the FBI Properly Invoked Exemption 7(E) with Respect to the
                         Vendor’s Identity

          The FBI argues that, as a law enforcement agency, it could use the iPhone unlocking

technology in future law enforcement activities, making the iPhone hacking tool itself a law

enforcement technique. (Second Hardy Decl. ¶ 10). The court agrees. Although the vendor’s

identity is itself not a law enforcement technique, the FBI contends that disclosing the vendor’s

identity will allow hostile entities to discover how the iPhone hacking tool works and then use



                                                   19
that information to circumvent the technology in the same manner this court found to be logical

and plausible under Exemption 1 in Section III.A.2, supra. Bearing in mind that the FBI must

only show that release of the information will create a “chance of a reasonably expected risk” of

circumvention of the law, Mayer Brown, 562 F.3d at 1193, the agency has met its burden to

show that it properly invoked Exemption 7(E).

       Plaintiffs argue once again that there is no risk that revealing the vendor’s identity will

cause circumvention of the law, because the tool can already be circumvented by using a phone

that is not an iPhone 5C or any operating system other than iOS9. (Pls. Mem. at 31). This

overlooks the tool’s potential value to the FBI in future iterations of the technology, and

Plaintiffs themselves acknowledge that Exemption 7(E) presents a low bar for the agency. The

FBI “has not publicly explained how the technology works,” (Second Hardy Decl. ¶ 11), and

releasing the vendor’s identity could provide individuals with a recourse to discovering how to

circumvent its use in the future. Accordingly, release of the vendor’s identity would risk

disclosure of a law enforcement technique and create a reasonably expected risk of

circumvention of the law. Therefore, the FBI properly invoked Exemption 7(E) with respect to

the vendor’s identity.

               3.        Whether the FBI Properly Invoked Exemption 7(E) with Respect to the
                         Purchase Price

       The FBI argues that although the cost of a single contract is not a law enforcement

technique or procedure, it must be considered in conjunction with the law enforcement technique

to which it relates, namely, the iPhone hacking tool. (Id. ¶ 16). The FBI’s posits that if the total

price paid for the iPhone hacking tool were revealed, adversaries would be able to assess the

nature of the tool and determine its likely capabilities. (Id. ¶ 17). The agency further asserts that

revealing specific financial allotments for technology acquisition will disclose where the FBI



                                                 20
concentrates its resources for national security investigations, and that releasing non-public

details like a purchase price could allow “potential targets to carefully put together building

blocks of information that would result in the degradation of the effectiveness of [intelligence

gathering] tools.” (Id. ¶ 18). This in turn could give rise to the development of countermeasures

by hostile entities that could cause circumvention of the law. (Id.) The court finds this

explanation to be logical and plausible, and it meets Exemption 7(E)’s low bar for records that

would reveal law enforcement techniques and risk circumvention of the law.

       Plaintiffs again argue that these risks have already been created by Comey’s public

comments about the purchase price, and that because this “theory of harm is long since out of the

barn,” release of the purchase price would not create a further risk of circumvention of the law.

(Pls. Mem. at 30). However, as discussed in Section III.A.3, supra, Comey’s comments do not

amount to an official disclosure that compels the release of requested information over the FBI’s

valid exemption claim. Accordingly, the FBI properly invoked Exemption 7(E) with respect to

the purchase price.

       D.      FOIA Exemption 4

               1.      Applicable Legal Standard

       FOIA Exemption 4 protects “trade secrets and commercial or financial information

obtained from a person and privileged or confidential.” 5 U.S.C. § 552(b)(4). The purpose of

this exemption is to “balance the strong public interest in favor of disclosure against the right of

private businesses to protect sensitive information.” Nat’l Parks & Conservation Ass’n v.

Morton (“Nat’l Parks I”), 498 F.2d 765, 768-69 (D.C. Cir. 1974).

       In order to qualify for withholding under Exemption 4, information withheld must “(1)

involve trade secrets or commercial or financial information; (2) be obtained from a person




                                                 21
outside the government; and (3) be privileged or confidential.” Biles v. Dep’t of Health &

Human Servs., 931 F. Supp. 2d 211, 219 (D.D.C. 2013) (citing Nat’l Parks I, 498 F.2d at 766);

see also CREW v. U.S. Dep’t of Justice, 160 F. Supp. 3d 226, 237 (D.D.C. 2016) (citing Pub.

Citizen Health Research Grp. v. FDA, 704 F.2d 1280, 1290 (D.C. Cir. 1983)). Plaintiffs do not

dispute that the purchase price paid to the vendor qualifies as commercial or financial

information, or that it was obtained from a person outside the government. The FBI does not

assert that the purchase price is privileged, so the sole issue before the court here is whether the

price is confidential.

        The court must first decide whether the purchase price constitutes material that was

submitted to the government voluntarily, or material that the government required to be

submitted. Biles, 931 F. Supp. 2d at 219-20 (citing Critical Mass Energy Project v. NRC, 975

F.2d 871, 878-80 (D.C. Cir. 1992) (en banc)). Information that an entity is required to provide is

less rigorously protected than information it voluntarily provides to the government. Id. at 219.

The parties here agree that information submitted for a government contract is an involuntary

submission. (Def. Mem. at 16; Pls. Mem. at 22); see McDonnell Douglas Corp. v. Dep’t of the

Air Force, 375 F.3d 1182, 1187 (D.C. Cir. 2004). When information is required to be submitted

to the government, it is considered confidential under FOIA if “disclosure is likely ... (1) to

impair the Government’s ability to obtain necessary information in the future; or (2) to cause

substantial harm to the competitive position of the person from whom the information was

obtained.” Nat’l Parks I, 498 F.2d at 770. The FBI argues that its invocation of Exemption 4 is

appropriate under either prong.




                                                 22
               2.      Whether Disclosure of the Purchase Price is Likely to Impair the FBI’s
                       Ability to Obtain Necessary Information in the Future

       The FBI contends that disclosing the purchase price may dissuade future contractors from

working with the FBI, for fear that the FBI would publicize information about their own

financial transactions. (First Hardy Decl. ¶ 46; Second Hardy Decl. ¶ 15). However, whether an

entity will participate in a government program is not relevant in deciding whether the

government will be impaired in its ability to obtain information in the future from those entities

that do participate. “Where the government obtains information involuntarily, disclosure does

not impair the government’s ability to obtain similar information in the future.” In Def. of

Animals v. Dep’t of Agric., 656 F. Supp. 2d 68, 72 (D.D.C. 2009); see also Martin Marietta

Corp. v. Dalton, 974 F. Supp. 37, 40 (D.D.C. 1997). Accordingly, the FBI’s invocation of

Exemption 4 with respect to the purchase price was not appropriate under the first prong of

National Parks I.

               3.      Whether Disclosure of the Purchase Price is Likely to Cause Substantial
                       Harm to the Competitive Position of the Vendor

       Under the competitive injury prong, the FBI must establish that the vendor (1) actually

faces competition, and (2) substantial competitive injury would likely result from disclosure.

Nat’l Parks and Conservation Ass’n v. Kleppe (Nat’l Parks II), 547 F.2d 673, 679 (D.C. Cir.

1976). The competitive injury must “be limited to harm flowing from the affirmative use of the

proprietary information by competitors.” Pub. Citizen Health Res. Grp., 704 F.2d at 1291 n.30

(emphasis in original). However, a “sophisticated economic analysis of the likely effects of

disclosure” is not required. Id. at 1291 (citing Nat’l Parks II, 547 F.2d at 681). The agency need

not “prove that substantial harm is ‘certain’ to result from disclosure, but only that such harm is

‘likely.’” Boeing v. Dep’t of Air Force, 616 F. Supp. 2d 40, 45 (D.D.C. 2009) (citing McDonnell




                                                 23
Douglas Corp., 375 F.3d at 1187). Further, the agency need only proffer evidence indicating the

existence of potential competitive injury or economic harm. Essex Electro Eng’rs, Inc. v. Sec’y

of Army, 686 F. Supp. 2d 91, 94 (D.D.C. 2010) (citing Gulf & W. Indus., Inc. v. United States,

615 F.2d 527, 530 (D.C. Cir. 1979)). Evidence of actual harm is not required. Id. However, the

agency may not simply offer “conclusory and generalized allegations” of substantial competitive

harm. Nat’l Parks II, 547 F.2d at 681. Instead, it must provide “specific factual or evidentiary

material to support [its] claim that harm is likely to result.” Boeing, 616 F. Supp. 2d at 45 (citing

Nat’l Parks II, 547 F.2d at 679).

                        a.     Whether the Vendor Actually Faces Competition

       A sole source contract does not preclude a finding of actual competition. Gen. Elec. Co.

v. Dep’t of the Air Force, 648 F. Supp. 2d 95, 103 (D.D.C. 2009). The agency need not provide

evidence of actual competition for the particular contract, only evidence of actual competition for

future contracts. Id.

       The FBI argues that because the vendor has proved that unlocking these devices is

possible, it is reasonable to assume that the vendor’s success will create future competition.

(Second Hardy Decl. ¶ 14). However, in General Electric, the company demonstrated actual

competition—its competitors were actively producing the parts covered by the relevant

government contracts. Here, the FBI has not shown that any other vendor is even capable of

producing a similar product, much less that one is actively attempting to do so. They merely

speculate that there would be competition if the FBI were to request a similar tool in the future.

(See Brown Decl. Ex. J at AP-22). Since there is no evidence that any actual competition exists

over current or future contracts, the FBI has failed to demonstrate that the vendor actually faces




                                                 24
competition. Accordingly, the FBI’s invocation of Exemption 4 was also not appropriate under

the second prong of National Parks I.

                       b.      Whether Substantial Competitive Injury is Likely to Result From
                               Disclosure of the Purchase Price

       Even if the FBI’s assertion about potential future competition was sufficient to show

actual competition, disclosure of the purchase price would be unlikely to cause substantial

competitive injury. The FBI argues that releasing this information would grant potential

government contractors an opportunity to judge how they might underbid the vendor in the

future, hurting the vendor’s ability to obtain government contracts. (First Hardy Decl. ¶ 45;

Second Hardy Decl. ¶ 14). But the bidding process for this particular contract was unique and

unlikely to be replicated. The contract price was based on time constraints caused by the

urgency of the investigation and the vendor’s ability to produce the tool quickly. Any future

price paid for a similar contract in competitive bidding would likely be unaffected by the price

paid here, as it reflected the unusual circumstances surrounding the investigation. Accordingly,

the disclosure of the purchase price is unlikely to cause substantial competitive injury to the

vendor.

       The agency argues that its determination of substantial competitive injury is entitled to

deference, but deference is only granted under Exemption 4 in a “reverse FOIA” case in which

the plaintiff is challenging the agency’s impending release of information. Ctr. for Pub. Integrity

v. Dep’t of Energy, 191 F. Supp. 2d 187, 196 (D.D.C. 2002) (“The rationale for showing

deference in such cases is that… if the agency is willing to release information, it can be safely

assumed that the agency is acting to protect its ability to contract in the future. This rationale

clearly does not apply where an agency is withholding information”); see also Jurewicz v. Dep’t

of Agric., 741 F.3d 1326, 1330-31 (D.C. Cir. 2014).



                                                 25
       In sum, the court finds that disclosure of the purchase price (1) will not impair the FBI’s

ability to obtain similar information in the future, and (2) is not likely to cause substantial

competitive harm to the vendor, because the vendor does not face actual competition, and even if

it did, would not likely suffer competitive injury from disclosure. Accordingly, the purchase

price is not confidential within the meaning of Exemption 4, and the FBI’s application of the

exemption to the purchase price was improper.

V.     CONCLUSION

       For the foregoing reasons, Plaintiffs’ motion to supplement the record will be

GRANTED; the FBI’s motion for summary judgment will be GRANTED; and Plaintiffs’ cross-

motion for summary judgment will be DENIED.



A corresponding order will issue separately.



Dated: September 30, 2017
                                               Tanya S. Chutkan
                                               TANYA S. CHUTKAN
                                               United States District Judge




                                                  26
