Evidence Case Comment 136 Harv. L. Rev. 170

No Appetite for Change: The Supreme Court Buttresses the State Secrets Privilege, Twice

Comment on United States v. Husayn (Zubaydah) and FBI v. Fazaga

Response:


Download

Yassir Fazaga and Zayn al-Abidin Muhammad Husayn are strikingly different people. Fazaga is a well-respected American imam whose mosque in southern California became the target for a muscle-bound FBI informant posing as a personal trainer determined to find a congregant who wanted to bring armed jihad to the United States.1 Husayn — better known as “Abu Zubaydah” — was born in Saudi Arabia and is currently held as an enemy combatant at Guantanamo Bay, famous both for his role facilitating the recruitment and training of would-be mujahideen in Afghanistan and for suffering extensive waterboarding (among other things) while in CIA custody.2 But Fazaga and Abu Zubaydah have this in common: both pursued civil litigation concerning the legality of the U.S. government’s national security activities relating to terrorism, both encountered the potentially fatal obstacle known as the state secrets privilege, and both were before the Supreme Court during the October 2021 Term as a result.3

Supreme Court cases touching on the privilege are rare, and to see two taken up at once was remarkable.4 The privilege enables the government to foreclose discovery or usage of information that might be critical to a lawsuit, and in some instances can result in outright dismissal of a case.5 These are draconian consequences for private litigants who may have legitimate claims — including claims against the government itself. In this sense, the privilege sits at the heart of a dilemma. On one hand, the United States aspires to the rule of law, with an adversarial system of civil litigation and judicial review playing critical roles in the pursuit of that aspiration. On the other hand, the United States maintains an array of national security enterprises — including military, diplomatic, and intelligence activities and agencies — that depend for their efficacy to some extent on the preservation of secrecy.6 These two broad interests come into conflict when someone pursues litigation for redress of alleged harms committed by government agents in the course of national security activities.7 Our system is chock full of doctrines and devices that mediate this conflict.8 It is fair to say that they tilt, on the whole, decidedly in favor of preserving secrecy. The state secrets privilege is exhibit A for that proposition.

To be sure, civil suits are not the only mechanisms through which to pursue and encourage legal compliance in the national security setting. Other important mechanisms include internal safeguards of the executive branch itself (including ex ante and ex post review by general counsel offices, inspectors general, interagency committees, and specialized agencies);9 oversight from congressional committees;10 and leaks to the media (whether from whistleblowers or rivals) that might galvanize public opinion (and thus also the aforementioned executive and legislative mechanisms).11 But even at their best, there is something missing from these devices in comparison to the prospect of a lawsuit that results in a judgment. Perhaps because of the centrality of courts and litigation in our culture and conscience, a judgment of wrongdoing in court arguably has the potential to land louder, to have greater demonstrative and cathartic effect. Doctrines that tend to foreclose this prospect may be necessary, but they should receive recurring scrutiny and retailoring in order to improve the chances that such harsh effects are sufficiently justified in light of ever-evolving technological, cultural, and strategic circumstances, not to mention lessons learned from experience. The two cases before the Court last Term — United States v. Husayn (Zubaydah)12 and FBI v. Fazaga13 — were opportunities for just such a thoughtful reconsideration, but neither ruling delivered on this potential.

Zubaydah was particularly well positioned for impact. The case presented the question whether an erstwhile state secret might lose its privileged status altogether, against the government’s wishes, due to the ubiquity of public knowledge about the facts in question.14 Put another way: Should the government really continue to reap the benefits of the privilege (including, in some cases, the ability to fend off litigation altogether, regardless of the merits of a person’s claims) where everyone who cares about the matter knows full well what happened, based simply on a stubborn refusal by the government to own up to the matter in formal terms? In a world in which information about classified matters leaks with regularity, and where unleaked secrets in any event become public thanks to the constantly expanding utility of open-source intelligence,15 this question has long loomed large.

It is not surprising, perhaps, that the Court declined this chance to open the door wider for civil suits against the government for its national security activities, rejecting the notion of de facto waivers of the privilege. But what is surprising are the various doctrinal confusions that the Court introduced into the privilege’s doctrinal framework — quite unnecessarily — in the course of reaching this conclusion. Given how rare the Court’s interventions relating to the privilege have been, it is a shame that this one will leave the doctrinal details less, rather than more, clear.

Fazaga did at least settle an important question relating to the state secrets privilege: whether Congress had preempted the privilege in a narrow but potentially impactful way when it created section 106 of the Foreign Intelligence Surveillance Act of 197816 (FISA).17 The plain language of section 106 unquestionably covers the situation in which the government proposes to use FISA-derived evidence at trial and defendants move to suppress it on the ground that it was obtained illegally. Could section 106 do the same for a civil plaintiff suing the government for allegedly illegal electronic-surveillance activity, though? If so, section 106 might well turn out to be a font of litigation of a rare sort, opening the door to lawsuits contesting foreign-intelligence collection activities coming within FISA’s purview. But the Supreme Court was having none of it; with unanimity but without a compelling argument, the Court slammed the door on such arguments.18

Taken together, Zubaydah and Fazaga were significant victories for the government. Those interested in vigorous enforcement of the legal boundaries governing America’s national security activities are left to ponder alternatives. One option is to pursue expansion or enhancement of the many nonjudicial mechanisms of oversight and compliance associated with national security activities. Another is to revive the currently moribund project of statutory reform of the privilege itself.

Part I opens with a thumbnail sketch of the origins and evolution of the privilege, placing the new rulings in context by tracing the privilege’s roots from the early Republic forward. This overview provides critical context for all that follows. Part II then explores Zubaydah, highlighting the extraordinary underlying facts of that case, the unlikely procedural path that led to the Court’s decision, and the subtle but important problems with the Court’s analysis. Part III turns to Fazaga, bringing the reader through the strange world of “Operation Flex,” through the complexities of FISA’s potential intersection with the privilege, and on to the Court’s unanimous — yet quite debatable — analysis. Part IV concludes with observations about the implications of these decisions for the future of efforts to ensure that the nation’s national security activities are subject to, not immune from, legal constraint.

Read Full PDF


* Dean and James A. Baker III Chair in the Rule of Law and World Affairs, University of Texas School of Law.

Footnotes
  1. ^ See Sanya Mansoor, “Who Else Is Spying on Me?” Muslim Americans Bring the Fight Against Surveillance to the Supreme Court, Time (Sept. 16, 2021, 1:13 PM), https://time.com/6097712/muslim-american-surveillance-supreme-court-sept-11 [https://perma.cc/D7PP-9Q26].

    Return to citation ^
  2. ^ See Ali Soufan with Daniel Freedman, The Black Banners (Declassified): How Torture Derailed the War on Terror After 9/11, at 377–89 (2020).

    Return to citation ^
  3. ^ Compare FBI v. Fazaga, 142 S. Ct. 1051 (2022), with United States v. Husayn (Zubaydah), 142 S. Ct. 959 (2022).

    Return to citation ^
  4. ^ The four earlier examples were Totten v. United States, 92 U.S. 105, 107 (1876), originating the idea that a claim might have to be dismissed because its subject matter — in that case an espionage contract — required secrecy; United States v. Reynolds, 345 U.S. 1, 9–10 (1953), establishing the modern metes and bounds of the state secrets privilege in connection with a discovery dispute; Tenet v. Doe, 544 U.S. 1, 8–11 (2005), holding that the very subject matter of a contract claim for espionage services implicated obligations of secrecy that required dismissal; and General Dynamics Corp. v. United States, 563 U.S. 478, 490 (2011), holding the same for a defense contractor’s claims.

    Return to citation ^
  5. ^ See Robert M. Chesney, State Secrets and the Limits of National Security Litigation, 75 Geo. Wash. L. Rev. 1249, 1253 (2007).

    Return to citation ^
  6. ^ See, e.g., Joshua Rovner, The Blessings of Secrecy, War on the Rocks (Feb. 11, 2020), https://warontherocks.com/2020/02/the-blessings-of-secrecy [https://perma.cc/H3A3-QL82].

    Return to citation ^
  7. ^ See Fazaga, 142 S. Ct. at 1061; Zubaydah, 142 S. Ct. at 962.

    Return to citation ^
  8. ^ To name a few: Immunity doctrines abound. See, e.g., Halperin v. Kissinger, 807 F.2d 180, 183–88 (D.C. Cir. 1986) (describing qualified immunity in the context of a Bivens action alleging Fourth Amendment violations in the form of national security wiretaps). Standing might be hard to prove. See, e.g., Clapper v. Amnesty Int’l USA, 568 U.S. 398, 402–03 (2013) (finding that would-be plaintiffs challenging NSA surveillance activities lacked standing). Evidence might be exceedingly difficult to obtain as a practical matter. See, e.g., Kenneth Watkin, The Search for Justice: Military Collection of Evidence on the Battlefield, PKI Glob. Just. J. (July 22, 2020), https://globaljustice.queenslaw.ca/news/the-search-for-justice-military-collection-of-evidence-on-the-battlefield [https://perma.cc/6H3D-7H2X] (discussing difficulties that militaries themselves face with respect to battlefield evidence collection). Justiciability complications might arise. See Harold Hongju Koh, The National Security Constitution: Sharing Power After the Iran-Contra Affair 218–24 (1990) (discussing such arguments).

    Return to citation ^
  9. ^ See, e.g., Garrett Hatch, Cong. Rsch. Serv., RL34385, Privacy and Civil Liberties Oversight Board: New Independent Agency Status 6 (2012); Rebecca Ingber, The Obama War Powers Legacy and the Internal Forces that Entrench Executive Power, 110 Am. J. Int’l L. 680, 692 (2016) (describing internal executive branch legal-review mechanisms, some more formal in institutional structure than others); Dawn E. Johnsen, Faithfully Executing the Laws: Internal Legal Constraints on Executive Power, 54 UCLA L. Rev. 1559, 1562 (2007); Margo Schlanger, Offices of Goodness: Influence Without Authority in Federal Agencies, 36 Cardozo L. Rev. 53, 116–17 (2014) (providing a typology and analysis of entities such as Privacy and Civil Liberties Oversight officers).

    Return to citation ^
  10. ^ See, e.g., L. Britt Snider, The Agency and the Hill: CIA’s Relationship with Congress, 1946–2004 (2008).

    Return to citation ^
  11. ^ See, e.g., Avril Haines, Fighting for Balance, in National Security, Leaks and Freedom of the Press: The Pentagon Papers Fifty Years On 1, 32 (Lee C. Bollinger & Geoffrey R. Stone eds., 2021).

    Return to citation ^
  12. ^ 142 S. Ct. 959 (2022).

    Return to citation ^
  13. ^ 142 S. Ct. 1051 (2022).

    Return to citation ^
  14. ^ Zubaydah, 142 S. Ct. at 964.

    Return to citation ^
  15. ^ See, e.g., Hamilton Bean, No More Secrets: Open Source Information and the Reshaping of U.S. Intelligence 2 (2011).

    Return to citation ^
  16. ^ Pub. L. No. 95-511, 92 Stat. 1783 (codified as amended in scattered sections of 50 U.S.C.).

    Return to citation ^
  17. ^ Fazaga, 142 S. Ct. at 1060.

    Return to citation ^
  18. ^ See id. at 1055.

    Return to citation ^