Damages for Privileged Harm

The law often permits us to impose substantial harm on others without incurring liability. Once liability is triggered, compensatory damages require a defendant to pay for the harm caused by his wrongful conduct. Calculating these damages requires consideration of the harm that the defendant could have caused without incurring liability in the first place. This harm is “privileged,” in the sense that the defendant would have been free to impose it in a counterfactual universe in which he complied with the substantive law. Having transgressed that law, he is responsible for damages. But the question is whether these damages should be reduced to account for the harm he could have imposed without owing damages at all.

The treatment of privileged harm is fundamental to the calculation of compensatory damages. Nonetheless, it has received little scholarly attention and has been the subject of conflicting decisions in the courts. In some areas of law, damages are routinely reduced to account for privileged harm; in others, this credit is given only sporadically, or not at all. Critically, there is not yet any sound theoretical explanation for why the rule ought to be different in one set of cases than another.

This Article begins by exploring the effects of crediting or not crediting privileged harm. It then relates the treatment of privileged harm to several well-known questions of remedial design. Finally, it proposes several general principles that a court or policymaker might follow in determining whether to reduce damages to account for privileged harm.

Introduction

Compensatory damages are meant to restore a plaintiff to the position she would have enjoyed absent the defendant’s wrong.1.See Restatement (Second) of Torts § 903 cmt. a (Am. L. Inst. 1979) (“When there has been harm only to the pecuniary interests of a person, compensatory damages are designed to place him in a position substantially equivalent in a pecuniary way to that which he would have occupied had no tort been committed.”); 1 Theodore Sedgwick, A Treatise on the Measure of Damages § 30, at 25 (9th ed. 1920) (“In all cases . . . of civil injury and breach of contract, the declared object of awarding damages is . . . to put the plaintiff in the same position, so far as money can do it, as he would have been if the contract had been performed or the tort not committed.”) (footnotes omitted).Show More Their amount is typically figured by way of a counterfactual. We ask the factfinder, “How much worse off is the plaintiff compared to the position she would have occupied in a hypothetical universe in which the defendant did not wrong her at all?” In theory, damages equal to this amount will “redress the concrete loss that the plaintiff has suffered by reason of the defendant’s wrongful conduct.”2.Cooper Indus., Inc. v. Leatherman Tool Grp., Inc., 532 U.S. 424, 432 (2001).Show More

In many cases, it is simple and true to imagine this alternative, wrong-free universe as one in which the defendant does no harm to the plaintiff. For example, rather than negligently swerving into oncoming traffic, the defendant simply stays in his lane. In a case like that, the defendant’s role in the counterfactual universe is so trivial that he can be imagined out of it completely. Instead of asking what the plaintiff’s condition would have been if the defendant had driven safely, we could just as well ask what the plaintiff’s condition would have been if the defendant had not driven at all. This works because the world in which the defendant commits no tort is also a world in which the defendant imposes no harm.

But sometimes things are more complicated. In some cases, the truth is that the defendant would have imposed some harm on the plaintiff even if he had acted lawfully. This is possible because the law often leaves certain injuries to lie where they fall. As Oliver Wendell Holmes put it, some harm is “privileged,” in the sense the defendant was free to impose it, even intentionally, only subject to conditions set by the substantive law.3.Oliver Wendell Homes, Jr., Privilege, Malice, and Intent, 8 Harv. L. Rev. 1, 3–4 (1894). Note that the term “privilege” later took on a somewhat narrower, more technical meaning in tort law: “conduct which, under ordinary circumstances, would subject the actor to liability, [but that] under particular circumstances, does not subject him thereto.” Restatement (First) of Torts § 10 (Am. L. Inst. 1934); see also Francis H. Bohlen, Incomplete Privilege To Inflict Intentional Invasions of Interests of Property and Personality, 39 Harv. L. Rev. 307, 308 (1926) (consciously reappropriating the term “privilege” to refer to excuses and justifications). Throughout this Article, I use the term “privileged” in the broader sense that Holmes used it—to describe harm that may be imposed on another without incurring legal liability.Show More Holmes was never known for timid examples:

[A] man has a right to set up a shop in a small village which can support but one of the kind, although he expects and intends to ruin a deserving widow who is established there already. He has a right to build a house upon his land in such a position as to spoil the view from a far more valuable house hard by. He has a right to give honest answers to inquiries about a servant, although he intends thereby to prevent his getting a place. . . . In these instances, the justification is that the defendant is privileged . . . to inflict the damage complained of.4.Holmes, supra note 3, at 3.Show More

In cases involving damages, the defendant has, by hypothesis, not complied with the strictures of the substantive law, making the plaintiff’s injuries actionable rather than privileged. But the possibility of privileged harm forces us to confront a choice in counterfactuals. When measuring compensatory damages, do we work from a baseline in which the defendant imposes no harm on the plaintiff, or one in which the defendant imposes only privileged harm on the plaintiff?

The difference between these two conceptions can have significant consequences for the defendant’s ultimate liability, and courts have come down both ways. To pick just one example among many, consider the landmark due process case of Carey v. Piphus.5.435 U.S. 247 (1978).Show More The plaintiff in that case, Piphus, was a freshman at a Chicago high school who had been summarily suspended after a principal observed him smoking what appeared to be marijuana. Piphus brought suit under 42 U.S.C. § 1983, alleging that this suspension without pre-deprivation process violated the Fourteenth Amendment.6.Id. at 248–50.Show More The school district argued that, whether or not the afforded process was constitutionally sufficient, Piphus would be unable to prove any actual damages, since Piphus deserved his suspension either way.7.Id. at 260.Show More At heart, this was an argument rooted in privileged harm. Piphus sought the value of the school days lost to his unconstitutional suspension; the school district sought to reduce its damages by invoking a hypothetical suspension it could have imposed constitutionally.

In a terse section of its opinion, the Supreme Court accepted the school district’s argument for privileged harm. If it was really true that the school could have suspended Piphus in a counterfactual world in which it also afforded him due process, then “the failure to accord procedural due process could not properly be viewed as the cause of the suspension[].”8.Id.Show More To hold otherwise, the Court suggested, would afford Piphus a windfall rather than compensation.9.Id.Show More

Carey’s damages rule has had far-reaching consequences for plaintiffs invoking their federal constitutional right to procedural due process. But some courts have blunted its practical import by treating privileged harm differently for claims arising out of state law. Following Carey, a terminated government employee alleging that her firing violated the U.S. Constitution will typically receive zero compensatory damages unless she can show that the constitutionally required procedure would have actually prevented her termination.10 10.See infra notes 45–48 and accompanying text.Show More But when that same employee alleges that she was denied the procedural protections promised by her employment contract, a number of state courts have refused to credit privileged harm. For example, in Piacitelli v. Southern Utah State College,11 11.636 P.2d 1063 (Utah 1981).Show More the Utah Supreme Court explicitly declined to follow Carey, holding that the State was liable for back pay until the contractually specified process had been substantially performed. If credit were given for privileged harm, the Court reasoned, “the employer could discharge an employee summarily and then omit or delay the contractual termination procedures with impunity so long as it was in possession of evidence which, when ultimately provided, would justify the discharge.”12 12.Id. at 1069.Show More The State was thus liable for the privileged harm, even if it could have terminated the employee by following the contractually specified procedures in the first instance.13 13.See id. A number of Western states have followed Utah’s lead. See, e.g., Hom v. State, 459 N.W.2d 823, 826 (N.D. 1990) (adopting same rule for North Dakota); Bowler v. Bd. of Trs., 617 P.2d 841, 849 (Idaho 1980) (“[I]n order to prevail, appellant must allege and prove either that his employment contract was breached by the board or that he was unjustifiably discharged.”); Brown v. Ford, Bacon & Davis, Utah, Inc., 850 F.2d 631, 633–34 (10th Cir. 1988) (applying Piacitelli in case arising under Utah law). But see Nzomo v. Vt. State Colls., 411 A.2d 1366, 1367–68 (Vt. 1980) (applying Carey rule in case involving contractual claims).Show More

As we will see, variants of this question arise in many areas of law, from torts to contracts, intellectual property, antitrust, defamation, and constitutional litigation. Perhaps surprisingly, a search across these disparate fields reveals there is not yet a clear theoretical or consistent doctrinal answer to what seems like a very basic remedial question. As a pair, Carey and Piacitelli capture the dilemma succinctly. On the one hand, a court must consider the possibility of privileged harm to measure the injury actually caused by the defendant’s wrongful conduct; to do otherwise seems to afford the plaintiff a windfall rather than compensation. On the other hand, reducing damages to account for privileged harm risks leaving violations unpunished, creating no particular incentive for the defendant to comply with the substantive law. Carey and Piacitelli are outliers in acknowledging these policy concerns so explicitly, but the same basic tradeoff lurks beneath the surface in countless compensatory damages cases.

This Article explores when and how damages should be reduced to account for privileged harm. It begins with an introduction to prior doctrinal treatment of this question—an apparent morass of inconsistent rules and unreasoned conclusions.14 14.See infra Part I.Show More It then models the effects of privileged harm on marginal incentives, both for prospective plaintiffs and prospective defendants.15 15.See infra Sections II.A, II.B, II.C.Show More This analysis reveals that the treatment of privileged harm closely tracks a well-known question of remedial design: whether damages ought to operate as prices or sanctions.16 16.See Robert Cooter, Prices and Sanctions, 84 Colum. L. Rev. 1523, 1523 (1984).Show More At its core, a decision to deny credit for privileged harm is a decision to erect sanctions-like damages around the threshold of liability, with increased marginal deterrence for defendants and wealth transfer to plaintiffs following as a result.17 17.See infra Sections II.B, II.C.Show More In this way, there is a previously unrecognized commonality between the question of how to measure compensatory damages and the question of whether to impose punitive damages.18 18.See infra Section II.D.Show More

Building on this theoretical account, this Article turns to the specifics of how courts should handle arguments for privileged harm. In addition to the first-order question of whether damages should operate as prices or sanctions,19 19.See infra Section III.A.Show More there are a number of practical, second-order concerns that may influence the decision to account for privileged harm. In identifiable categories of cases, the magnitude of any privileged harm will be small enough that the question can be safely ignored in the interest of remedial simplicity.20 20.See infra Section III.C.Show More In other cases, incautious crediting of privileged harm has the potential to leave entire classes of plaintiffs with no remedy.21 21.See infra Section IV.A.Show More As these and other examples will illustrate, the treatment of privileged harm might look like a simple calculation detail, but in fact it can significantly affect the ability of the substantive law to achieve its ends. For that reason, it is a question better confronted than avoided.

  1. * Professor of Law, Notre Dame Law School. For very helpful feedback on prior drafts, I thank A.J. Bellia, Sam Bray, Bernard Chao, Thomas Cotter, John Duffy, John Golden, Bert Huang, Dan Kelly, Andrew Kull, Douglas Laycock, Saul Levmore, Mark McKenna, Collen Murphy, Jeff Pojanowski, Henry Smith, Jay Tidmarsh, and Stephen Waddams.
  2. See Restatement (Second) of Torts § 903 cmt. a (Am. L. Inst. 1979) (“When there has been harm only to the pecuniary interests of a person, compensatory damages are designed to place him in a position substantially equivalent in a pecuniary way to that which he would have occupied had no tort been committed.”); 1 Theodore Sedgwick, A Treatise on the Measure of Damages § 30, at 25 (9th ed. 1920) (“In all cases . . . of civil injury and breach of contract, the declared object of awarding damages is . . . to put the plaintiff in the same position, so far as money can do it, as he would have been if the contract had been performed or the tort not committed.”) (footnotes omitted).
  3. Cooper Indus., Inc. v. Leatherman Tool Grp., Inc., 532 U.S. 424, 432 (2001).
  4. Oliver Wendell Homes, Jr., Privilege, Malice, and Intent, 8 Harv. L. Rev. 1, 3–4 (1894). Note that the term “privilege” later took on a somewhat narrower, more technical meaning in tort law: “conduct which, under ordinary circumstances, would subject the actor to liability, [but that] under particular circumstances, does not subject him thereto.” Restatement (First) of Torts § 10 (Am. L. Inst. 1934); see also Francis H. Bohlen, Incomplete Privilege To Inflict Intentional Invasions of Interests of Property and Personality, 39 Harv. L. Rev. 307, 308 (1926) (consciously reappropriating the term “privilege” to refer to excuses and justifications). Throughout this Article, I use the term “privileged” in the broader sense that Holmes used it—to describe harm that may be imposed on another without incurring legal liability.
  5. Holmes, supra note 3, at 3.
  6. 435 U.S. 247 (1978).
  7. Id. at 248–50.
  8. Id. at 260.
  9. Id.
  10. Id.
  11. See infra notes 45–48 and accompanying text.
  12. 636 P.2d 1063 (Utah 1981).
  13. Id. at 1069.
  14. See id. A number of Western states have followed Utah’s lead. See, e.g., Hom v. State, 459 N.W.2d 823, 826 (N.D. 1990) (adopting same rule for North Dakota); Bowler v. Bd. of Trs., 617 P.2d 841, 849 (Idaho 1980) (“[I]n order to prevail, appellant must allege and prove either that his employment contract was breached by the board or that he was unjustifiably discharged.”); Brown v. Ford, Bacon & Davis, Utah, Inc., 850 F.2d 631, 633–34 (10th Cir. 1988) (applying Piacitelli in case arising under Utah law). But see Nzomo v. Vt. State Colls., 411 A.2d 1366, 1367–68 (Vt. 1980) (applying Carey rule in case involving contractual claims).
  15. See infra Part I.
  16. See infra Sections II.A, II.B, II.C.
  17. See Robert Cooter, Prices and Sanctions, 84 Colum. L. Rev. 1523, 1523 (1984).
  18. See infra Sections II.B, II.C.
  19. See infra Section II.D.
  20. See infra Section III.A.
  21. See infra Section III.C.
  22. See infra Section IV.A.

Against Fiduciary Constitutionalism

A growing body of scholarship draws connections between fiduciary law and the Constitution. In much of this literature, the Constitution is described as a fiduciary instrument that establishes fiduciary duties, not least for the President of the United States.

This Article examines and critiques the claims of fiduciary constitutionalism. Although a range of arguments are made in this literature, there are common failings. Some of these involve a literalistic misreading of the works of leading political philosophers (e.g., Plato and Locke). Other failings involve fiduciary law, such as mistakes about how to identify fiduciary relationships and about the content and enforcement of fiduciary duties. Still other failings sound in constitutional law, including the attempt to locate the genre of the Constitution in the categories of private fiduciary law. These criticisms suggest weaknesses in the new and increasingly influential attempt to develop fiduciary constitutionalism.

Introduction

Recently, a number of scholars have argued that the U.S. Constitution resembles a fiduciary document, and that it imposes fiduciary duties on various actors, including the President of the United States.1.See, e.g., Gary Lawson & Guy Seidman, “A Great Power of Attorney”: Understanding the Fiduciary Constitution (2017); Randy E. Barnett & Evan D. Bernick, The Letter and the Spirit: A Unified Theory of Originalism, 107 Geo. L.J. 1, 18 (2018); Andrew Kent, Ethan J. Leib & Jed Handelsman Shugerman, Faithful Execution and Article II, 132 Harv. L. Rev. 2111 (2019); Ethan J. Leib & Stephen R. Galoob, Fiduciary Principles and Public Offices, in The Oxford Handbook of Fiduciary Law 303 (Evan J. Criddle, Paul B. Miller & Robert H. Sitkoff eds., 2019); Ethan J. Leib & Andrew Kent, Fiduciary Law and the Law of Public Office: Suggestions for a Research Agenda, Wm. & Mary L. Rev. (forthcoming 2021) (on file with authors); Ethan J. Leib & Jed Handelsman Shugerman, Fiduciary Constitutionalism: Implications for Self-Pardons and Non-Delegation, 17 Geo. J.L. & Pub. Pol’y 463 (2019); Ethan J. Leib, David L. Ponet & Michael Serota, A Fiduciary Theory of Judging, 101 Calif. L. Rev. 699 (2013); Robert G. Natelson, The Constitution and the Public Trust, 52 Buff. L. Rev. 1077, 1140 (2004) [hereinafter Natelson, The Constitution and the Public Trust].Show More When Barack Obama was President, some found in the “fiduciary Constitution”2.Different scholars writing about what we call the “fiduciary Constitution” might have their own nomenclature. Our choice of terms, however, is not original and is not meant to be pejorative. See Lawson & Seidman, supra note 1 (title); Kent et al., supra note 1, at 2182; Leib & Shugerman, supra note 1 (title); id. at 464.Show More a means by which a court could hold unconstitutional the signature achievement of his administration, the Affordable Care Act.3.E.g., Lawson & Seidman, supra note 1, at 91–98.Show More Now others find in fiduciary constitutionalism a means by which a court could find the present incumbent to have violated a proscription on self-dealing.4.See Leib & Shugerman, supra note 1, at 468–69, 475.Show More The fiduciary Constitution contains multitudes—everything from a handy way for an originalist to justify Bolling v. Sharpe5.See Lawson & Seidman, supra note 1, at 151–53, 170–71.Show More to a way for skeptics of the non-delegation doctrine to rein it in.6.See Leib & Shugerman, supra note 1, at 479–85.Show More The convenience and malleability of this new constitutional argument should make us wary.

This Article offers a critique of fiduciary constitutionalism, finding it bad fiduciary law and bad constitutional law. We are not the first to criticize fiduciary constitutionalism, and our work therefore builds on that of others, especially Seth Davis and Richard Primus.7.See generally Seth Davis, The False Promise of Fiduciary Government, 89 Notre Dame L. Rev. 1145 (2014) (analyzing differences between private fiduciaries and public officials and critiquing the lack of authority for fiduciary constitutionalism); Richard Primus, The Elephant Problem, 17 Geo. J.L. & Pub. Pol’y 373 (2019) (critically reviewing the evidence and methodology in Lawson & Seidman, supra note 1). Others have also criticized the over-extension of fiduciary concepts, albeit in different contexts. E.g., Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497 (2019).Show More

It is important at the outset to note that the burgeoning literature in favor of a fiduciary reading of the Constitution means that different scholars make different claims. Some analogize the Constitution to a trust,8.See Leib & Shugerman, supra note 1, at 477–79.Show More some to an agency relationship,9.Lawson & Seidman, supra note 1, at 112.Show More some to a power of attorney,10 10.Id. at 75 (referring to James Iredell’s quote regarding power of attorney).Show More and some to an attractively all-purpose generic “fiduciary” construct.11 11.Barnett & Bernick, supra note 1, at 18–21; see also id. at 19 nn.81 & 83 (discussing common fiduciary relationships and duties); cf. Lawson & Seidman, supra note 1, at 76 (“[W]e think it close to obvious that the Constitution, as a legal document, is best understood as some kind of agency or fiduciary instrument, whereas the case for viewing it specifically as (or as like) a power of attorney is more attenuated.”); Leib et al., supra note 1, at 708, 712–13 (recognizing differences among different kinds of fiduciaries, as well as differences between public and private law, but relying on a general “fiduciary principle”).Show More Some draw a straight line between a fiduciary law of the eighteenth century and the present.12 12.See, e.g., Barnett & Bernick, supra note 1, at 19–21.Show More Others admit there are differences between past and present, and thus offer a bevy of qualifications and hedges13 13.E.g., Lawson & Seidman, supra note 1, at 6 (“[W]e are making no claims about the extent to which the meaning we uncover should or must contribute to legal decision making.”); id. at 11 (“Again, we frame these interpretative conclusions in hypothetical form: to the extent that the Constitution can be seen as a fiduciary instrument, or in some cases as a fiduciary instrument of a particular kind, certain conclusions about the document’s meaning follow from that identification.”). The hedges and qualifications are more pronounced—and thus the conclusions more circumspect—in the article by Kent, Leib, and Shugerman than in some of the other literature. See, e.g., Kent et al., supra note 1, at 2190 (“We do not opine here on the way the framers envisioned enforcing the President’s duty of loyalty and avoiding self-dealing.”).Show More—but those tend to fall away as soon as the scholars turn to spelling out the “enforceable duties” that they want to see the courts administering.14 14.E.g., Lawson & Seidman, supra note 1, at 7 (“Now to our affirmative project: understanding the fiduciary character of the Constitution is important not simply as a historical matter but also for its contribution to constitutional interpretation.”); id. at 11; Leib & Shugerman, supra note 1, at 465 (“[T]his article delves further into this language’s [i.e. the Take Care Clause’s] likely meaning, indicating how it can establish enforceable duties for public officials.”); see also Kent et al., supra note 1, at 2119 (claiming “that the best historical understanding of the meaning of the Faithful Execution Clauses is that they impose duties that we today—and some in the eighteenth century as well—would call fiduciary”). Richard Primus and Suzanna Sherry note this oscillation in Lawson and Seidman’s argument. Primus, supra note 7, at 400, 402–04; Suzanna Sherry, The Imaginary Constitution, 17 Geo. J.L. & Pub. Pol’y 441, 447–49 (2019) (reviewing Lawson & Seidman, supra note 1). For discussion of a similar tendency in Kent et al., supra note 1, see infra note 87.Show More Some of the literature starts out cautious and then gallops away; some of it gallops from the start. But it all tends to be ambitious and thoroughly presentist.

This Article offers three main critiques of fiduciary constitutionalism:

The first is about contemporary fiduciary law. The fiduciary constitutionalists pervasively treat concepts as “fiduciary” that are in fact not limited to fiduciary law and instead have much a broader application, such as good faith.15 15.See infra Part II.Show More This matters because a point of connection between the Constitution and some area that can be characterized as fiduciary (e.g., trust, agency), as thin as it is, cannot sustain the fiduciary constitutionalist project if it is a point of connection with many areas of law.

The second is about historical anachronism. Some fiduciary constitutionalists rely on a “fiduciary law” of 1789 when there was in fact no such law.16 16.E.g., Barnett & Bernick, supra note 1, at 20–21 (asserting that the Constitution’s “organization and language sounds in eighteenth-century fiduciary law”). More cautious on this point is Kent et al., supra note 1, at 2179–80 (“[W]hat the three meanings we can attribute to the [Faithful Execution] Clauses have in common is that they are all part of the basic ways the private law constrains fiduciary discretion and power.”).Show More There were quite specific legal regimes for trust, agency, bailment, and so on. Some of these were at law, and some were in equity. Their standards of liability were different; their remedies were different; they differed in respect to defenses and the availability of a jury.17 17.Contra Lawson & Seidman, supra note 1, at 62 (“The fiduciary responsibilities of a trustee and an attorney do not differ in any way material to our project.”).Show More As other fiduciary constitutionalists concede, there was no pan-subject “fiduciary law” in 1789.18 18.See, e.g., Kent et al., supra note 1, 2180–81 (describing the “crystalliz[ing]” of “the ‘private’ fiduciary law we would recognize today” as not occurring in America until late in the eighteenth century, and concluding that “a fiduciary law of ‘private’ offices was unlikely to have been plucked off-the-rack by the Philadelphia Convention drafters and applied to public offices”); id. at 2179 (“Our historical findings about the original meaning of the Faithful Execution Clauses align with core features of modern fiduciary law . . . . ”); Leib & Shugerman, supra note 1, at 468 (suggesting doubt about whether “private fiduciary law was itself fully formed at the time of the founding”).Show More This abstraction is fatal to fiduciary constitutionalism.

The third is about how some fiduciary constitutionalists evade the anachronism problem. They try to escape this problem by tying the Constitution not to a fictional eighteenth-century “fiduciary law” but rather to fiduciary law of the twenty-first century.19 19.Leib & Shugerman, supra note 1, at 468–69 (“[Article II of the U.S. Constitution] uses the language of faith and care to signal to courts and to executive officials that the President was supposed to be held to the same kinds of fiduciary obligations to which corporate officers, trustees, and lawyers are routinely held today in the private sector.”).Show More That interpretive move is certainly available on some theories of constitutional interpretation—theories that would to a substantial degree integrate political morality and constitutional law, or theories that would allow the courts to legitimately turn what was originally a non-fiduciary Constitution into a fiduciary Constitution, creating and developing new fiduciary duties for government officers.20 20.But cf. Davis, supra note 7, at 1182–95 (discussing whether that is advisable).Show More But that is not the argument the fiduciary constitutionalists have made to date (though they are of course free to reshape their arguments going forward). Instead, the fiduciary constitutionalists have relied on text and structure as understood at the Founding.21 21.See infra notes 161 and 164 and accompanying text. We do recognize that there is a spectrum of views about how much the interpretation of the constitutional text should be informed by the legal categories at the time of ratification (as part of context). The more one separates the text from its legal context, the more room there is to integrate constitutional law and political morality, and the less constraint there is from the original understanding (with the familiar virtues and vices of that interpretive equilibrium).Show More And that more-or-less originalist argument does not hold if the Constitution can only be understood as fiduciary in light of present-day fiduciary law.

One thing, however, does need to be said in favor of the fiduciary constitutionalists’ claims. It is true that there is a long history in political thought of the use of trust and agency metaphors for governance. This figurative language appears in Plato and Cicero, in Locke and Hume.22 22.See infra Section I.A.Show More But this language offers moral guidance and political wisdom, not enforceable duties with remedies that can be awarded by courts. And mere metaphor is not the big game the fiduciary constitutionalists are pursuing. Against this long history of a figurative and legally thin understanding of public office as a trust, it becomes easier to recognize the fiduciary constitutionalist project for what it is: an earnest and literalistic misreading of the tradition and an insistence on taking figurative language that works across thousands of years of political theory and treating it as if it were an invocation of an inevitably more particular body of legal or equitable claims and remedies. There is no such body of claims and remedies that can support this move—not a fiduciary law of 1789 (once it is recognized as a fiction), and not present-day fiduciary law (once it is correctly described).

The remainder of this Article proceeds as follows. Part I analyzes the supposed antecedents of fiduciary constitutionalism—both the classical and early modern tradition in political theory and also more recent advances in fiduciary theory with which the fiduciary constitutionalists align themselves. Part II critiques the fiduciary law of fiduciary constitutionalism. Part III critiques the constitutional law of fiduciary constitutionalism. The idea that the Constitution ought to be understood as a fiduciary instrument is a well-meant and seemingly timely entrant into the constitutional discourse of the United States. But taken together, these critiques show that the historical, philosophical, and legal foundations of fiduciary constitutionalism are weak.

  1. * Professor of Law, Notre Dame Law School.
  2. ** Professor of Law, Associate Dean for International and Graduate Programs, and Director of the Notre Dame Program on Private Law, Notre Dame Law School. The authors are grateful for comments from Randy Barnett, Evan Bernick, Nathan Chapman, Evan Criddle, Evan Fox-Decent, Joshua Getzler, Andrew Gold, Albert Horsting, Andrew Kent, Sung Hui Kim, Gary Lawson, Ethan Leib, Ben McFarlane, Michael McConnell, David Pozen, Richard Primus, Richard Re, Lionel Smith, and Larry Solum, as well as attendees at the Third Annual International Fiduciary Law Conference held at Trinity College, Cambridge.
  3. See, e.g., Gary Lawson & Guy Seidman, “A Great Power of Attorney”: Understanding the Fiduciary Constitution (2017); Randy E. Barnett & Evan D. Bernick, The Letter and the Spirit: A Unified Theory of Originalism, 107 Geo. L.J. 1, 18 (2018); Andrew Kent, Ethan J. Leib & Jed Handelsman Shugerman, Faithful Execution and Article II, 132 Harv. L. Rev. 2111 (2019); Ethan J. Leib & Stephen R. Galoob, Fiduciary Principles and Public Offices, in The Oxford Handbook of Fiduciary Law 303 (Evan J. Criddle, Paul B. Miller & Robert H. Sitkoff eds., 2019); Ethan J. Leib & Andrew Kent, Fiduciary Law and the Law of Public Office: Suggestions for a Research Agenda, Wm. & Mary L. Rev. (forthcoming 2021) (on file with authors); Ethan J. Leib & Jed Handelsman Shugerman, Fiduciary Constitutionalism: Implications for Self-Pardons and Non-Delegation, 17 Geo. J.L. & Pub. Pol’y 463 (2019); Ethan J. Leib, David L. Ponet & Michael Serota, A Fiduciary Theory of Judging, 101 Calif. L. Rev. 699 (2013); Robert G. Natelson, The Constitution and the Public Trust, 52 Buff. L. Rev. 1077, 1140 (2004) [hereinafter Natelson, The Constitution and the Public Trust].
  4. Different scholars writing about what we call the “fiduciary Constitution” might have their own nomenclature. Our choice of terms, however, is not original and is not meant to be pejorative. See Lawson & Seidman, supra note 1 (title); Kent et al., supra note 1, at 2182; Leib & Shugerman, supra note 1 (title); id. at 464.
  5. E.g., Lawson & Seidman, supra note 1, at 91–98.
  6. See Leib & Shugerman, supra note 1, at 468–69, 475.
  7. See Lawson & Seidman, supra note 1, at 151–53, 170–71.
  8. See Leib & Shugerman, supra note 1, at 479–85.
  9. See generally Seth Davis, The False Promise of Fiduciary Government, 89 Notre Dame L. Rev. 1145 (2014) (analyzing differences between private fiduciaries and public officials and critiquing the lack of authority for fiduciary constitutionalism); Richard Primus, The Elephant Problem, 17 Geo. J.L. & Pub. Pol’y 373 (2019) (critically reviewing the evidence and methodology in Lawson & Seidman, supra note 1). Others have also criticized the over-extension of fiduciary concepts, albeit in different contexts. E.g., Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497 (2019).
  10. See Leib & Shugerman, supra note 1, at 477–79.
  11. Lawson & Seidman, supra note 1, at 112.
  12. Id. at 75 (referring to James Iredell’s quote regarding power of attorney).
  13. Barnett & Bernick, supra note 1, at 18–21; see also id. at 19 nn.81 & 83 (discussing common fiduciary relationships and duties); cf. Lawson & Seidman, supra note 1, at 76 (“[W]e think it close to obvious that the Constitution, as a legal document, is best understood as some kind of agency or fiduciary instrument, whereas the case for viewing it specifically as (or as like) a power of attorney is more attenuated.”); Leib et al., supra note 1, at 708, 712–13 (recognizing differences among different kinds of fiduciaries, as well as differences between public and private law, but relying on a general “fiduciary principle”).
  14. See, e.g., Barnett & Bernick, supra note 1, at 19–21.
  15. E.g., Lawson & Seidman, supra note 1, at 6 (“[W]e are making no claims about the extent to which the meaning we uncover should or must contribute to legal decision making.”); id. at 11 (“Again, we frame these interpretative conclusions in hypothetical form: to the extent that the Constitution can be seen as a fiduciary instrument, or in some cases as a fiduciary instrument of a particular kind, certain conclusions about the document’s meaning follow from that identification.”). The hedges and qualifications are more pronounced—and thus the conclusions more circumspect—in the article by Kent, Leib, and Shugerman than in some of the other literature. See, e.g., Kent et al., supra note 1, at 2190 (“We do not opine here on the way the framers envisioned enforcing the President’s duty of loyalty and avoiding self-dealing.”).
  16. E.g., Lawson & Seidman, supra note 1, at 7 (“Now to our affirmative project: understanding the fiduciary character of the Constitution is important not simply as a historical matter but also for its contribution to constitutional interpretation.”); id. at 11; Leib & Shugerman, supra note 1, at 465 (“[T]his article delves further into this language’s [i.e. the Take Care Clause’s] likely meaning, indicating how it can establish enforceable duties for public officials.”); see also Kent et al., supra note 1, at 2119 (claiming “that the best historical understanding of the meaning of the Faithful Execution Clauses is that they impose duties that we today—and some in the eighteenth century as well—would call fiduciary”). Richard Primus and Suzanna Sherry note this oscillation in Lawson and Seidman’s argument. Primus, supra note 7, at 400, 402–04; Suzanna Sherry, The Imaginary Constitution, 17 Geo. J.L. & Pub. Pol’y 441, 447–49 (2019) (reviewing Lawson & Seidman, supra note 1). For discussion of a similar tendency in Kent et al., supra note 1, see infra note 87.
  17. See infra Part II.
  18. E.g., Barnett & Bernick, supra note 1, at 20–21 (asserting that the Constitution’s “organization and language sounds in eighteenth-century fiduciary law”). More cautious on this point is Kent et al., supra note 1, at 2179–80 (“[W]hat the three meanings we can attribute to the [Faithful Execution] Clauses have in common is that they are all part of the basic ways the private law constrains fiduciary discretion and power.”).
  19. Contra Lawson & Seidman, supra note 1, at 62 (“The fiduciary responsibilities of a trustee and an attorney do not differ in any way material to our project.”).
  20. See, e.g., Kent et al., supra note 1, 2180–81 (describing the “crystalliz[ing]” of “the ‘private’ fiduciary law we would recognize today” as not occurring in America until late in the eighteenth century, and concluding that “a fiduciary law of ‘private’ offices was unlikely to have been plucked off-the-rack by the Philadelphia Convention drafters and applied to public offices”); id. at 2179 (“Our historical findings about the original meaning of the Faithful Execution Clauses align with core features of modern fiduciary law . . . . ”); Leib & Shugerman, supra note 1, at 468 (suggesting doubt about whether “private fiduciary law was itself fully formed at the time of the founding”).
  21. Leib & Shugerman, supra note 1, at 468–69 (“[Article II of the U.S. Constitution] uses the language of faith and care to signal to courts and to executive officials that the President was supposed to be held to the same kinds of fiduciary obligations to which corporate officers, trustees, and lawyers are routinely held today in the private sector.”).
  22. But cf. Davis, supra note 7, at 1182–95 (discussing whether that is advisable).
  23. See infra notes 161 and 164 and accompanying text. We do recognize that there is a spectrum of views about how much the interpretation of the constitutional text should be informed by the legal categories at the time of ratification (as part of context). The more one separates the text from its legal context, the more room there is to integrate constitutional law and political morality, and the less constraint there is from the original understanding (with the familiar virtues and vices of that interpretive equilibrium).
  24. See infra Section I.A.

Secrecy Surrogates

Debates about how best to check executive branch abuses of secrecy focus on three sets of actors that have access to classified information and that traditionally have served—in one way or another—as our surrogates: congressional committees, federal courts, and leakers or whistleblowers. These actors provide only limited checks on the Executive’s misuse of secrecy, however. Most legal scholarship bemoans their flaws but concludes that the status quo is the best that we can do. This Article challenges this account, arguing that there is a different set of actors—a set of unsung “secrecy surrogates”—that can provide additional checks on the quality and legality of the Executive’s classified operations in the cyber, election, and counter-terrorism settings.

Technology companies, states and localities, and foreign allies have become an integral part of U.S. national security operations and enjoy some critical advantages over our traditional surrogates. These actors possess expertise about—and in some cases control—national security-related targets, making them essential partners for the Executive. Further, these surrogates have incentives to check the Executive in ways that advance the public law values of accuracy, accountability, and legality. Finally, unlike leakers, these unsung secrecy surrogates can challenge the Executive without revealing government secrets. These surrogates can only check government abuses of secrecy as long as the Executive requires their cooperation, but they have begun to supplement our traditional surrogates in important ways.

This Article maps the growing role of these unsung secrecy surrogates, argues that they are well-situated to address some persistent secrecy problems, and proposes ways to preserve and enhance the surrogates’ position in the secrecy ecosystem in the future.

Introduction

Misuse of government secrecy is in the headlines. Consider the revelation that White House officials transferred the transcript of President Trump’s call with Ukraine’s President to a highly classified stand-alone computer system to prevent leaks.1.Julian E. Barnes, Michael Crowley, Matthew Rosenberg & Mark Mazzetti, White House Classified Computer System Is Used To Hold Transcripts of Sensitive Calls, N.Y. Times (Sept. 29, 2019), https://www.nytimes.com/2019/09/27/us/politics/nsc-ukraine-call.html [https://perma.cc/F9ZC-68Z3]; seeDustin Volz, Andrew Duehren & Natalie Andrews, White House Official Feared Trump Transcript Leak Could Be Politically Damaging, Wall St. J. (Nov. 17, 2019, 5:52 AM), https://www.wsj.com/articles/white-house-official-feared-trump-transcript-leak-could-be-politically-damaging-11573942481 [https://perma.cc/LV53-PL42].Show More For many, this incident reflects a paradigmatic problem with government secrecy: actors in the Executive can employ it as a tool to avoid politically embarrassing or legally problematic revelations.2.See, e.g., Ayesha Rascoe & Franco Ordoñez, Former Officials Say White House’s Use of Secret System Is Unusual, ‘Disturbing,’ NPR (Sept. 27, 2019, 5:40 AM), https://www.npr.org/2019/09/27/764759182/former-officials-say-white-houses-use-of-secret-system-is-unusual-disturbing [https://perma.cc/7PBJ-5MF8] (quoting former White House official as stating that “[t]his seems to be nothing more than an abuse of the classification and the information security system to safeguard not the information, but to effect a cover-up” (internal quotation marks omitted)).Show More This episode proved to be a success story. A government whistleblower carefully followed statutory procedures, and the Intelligence Community Inspector General shared the whistleblower’s complaint with Congress, which held impeachment hearings to judge the President’s actions. Yet the case may be just as notable for its uniqueness, given how infrequently the whistleblowing process works as intended.

Indeed, legal scholars and political scientists have long decried the current state of affairs, in which the Executive exercises near total control over secret government information with few external checks. A substantial literature wrestles with how to manage the genuine need for secrecy about many national security operations in a democracy whose government should be accountable to the people. Government secrecy can foster four types of problems. First, the Executive can employ secrecy to conceal unlawful acts, such as spying on political enemies. Second, the Executive can use secrecy to conceal poor or controversial judgments or policies. Third, the Executive can use secrecy to conceal incompetent, empirically wrong, or insufficient intelligence and analysis.3.See Loch K. Johnson, Governing in the Absence of Angels: On the Practice of Intelligence Accountability in the United States, in Who’s Watching the Spies? Establishing Intelligence Service Accountability 57, 61 (Hans Born, Loch K. Johnson & Ian Leigh eds., 2005) (quoting intelligence scholar as stating that the major problem facing U.S. intelligence in 2005 was that the “CIA [had] not been gathering enough quality data”).Show More Each of these three types of missteps is embarrassing to the Executive and creates incentives to conceal the underlying action.4.See Frederick A.O. Schwarz Jr., Democracy in the Dark: The Seduction of Government Secrecy 2 (2015) (“[T]oo much is kept secret not to protect America but to keep embarrassing or illegal conduct from Americans.”).Show More Fourth, making decisions in secret insulates the Executive from having to justify and defend those decisions in public.5.Robert M. Pallitto & William G. Weaver, Presidential Secrecy and the Law 3 (2007) (noting executive interest in “maintain[ing] presidential prerogative against congressional inquiries and judicial orders”); id. at 6 (“Where a president may do what is desired in secret, there is no reason to withstand the ordeal of a political battle to achieve the same ends.”); H.R. Select Comm. To Investigate Covert Arms Transactions with Iran & S. Select Comm. on Secret Military Assistance to Iran and the Nicaraguan Opposition, 100th Cong., Rep. of the Congressional Committees Investigating the Iran-Contra Affair, Minority Report 450, 515 (Comm. Print 1987) (stating that the President should undertake “democratic persuasion” to develop support for his policies and that he will not succeed “unless the public is exposed to and persuaded by a clear, sustained, and principled debate on the merits”); David E. Pozen, Deep Secrecy, 62 Stan. L. Rev. 257, 279 (2010) (discussing how secrecy provides “insulation from scrutiny”).Show More All of these possible abuses of secrecy engender public skepticism about the government and make it harder for the public—and U.S. allies—to trust the Executive in cases in which secrecy truly is necessary.6.See Pozen, supra note 5, at 280; S. Select Comm. To Study Governmental Operations with Respect to Intel. Activities, Final Report, S. Rep. No. 94-755, at 4 (1976) (“[T]here are many necessary and proper governmental activities that must be conducted in secrecy. . . . [However,] intelligence activities conducted outside the framework of the Constitution and statutes can undermine the treasured values guaranteed in the Bill of Rights. Further, if the intelligence agencies act in ways inimical to declared national purposes, they damage the reputation, power, and influence of the United States abroad.”).Show More

Legal scholarship about government secrecy usually focuses on three sets of actors that check and balance executive branch secrecy to reduce abuse.7.See, e.g., Rahul Sagar, Secrets and Leaks: The Dilemma of State Secrecy (2013) (considering role of Congress, the courts, whistleblowers, and leakers in managing government secrecy); Pallitto & Weaver, supra note 5 (considering Congress, the courts, and leaks); Michael P. Colaresi, Democracy Declassified: The Secrecy Dilemma in National Security 181 (2014) (discussing role of legislatures, freedom of information laws, and press freedom laws in checking executive secrecy); Mark Fenster, The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information (2017) (discussing the role of the press, freedom of information laws, anti-corruption non-governmental organizations, and leaks); Pozen, supra note 5, at 269, 274 (focusing on deep secret keeping by executive officials, treating Congress and the courts as the primary recipients of shallow secrets, and assuming that very few private actors generally will be aware of government secrets); Johnson, supra note 3, at 58 (noting that the “most consistent and serious manifestation of intelligence oversight has come not from presidential commissions, but from the media and the Congress”); Josh Chafetz, Whose Secrets?, 127 Harv. L. Rev. F. 86, 87 (2013) (emphasizing the role of Congress in the secrecy regime).Show More Two sets of actors lie in the Executive’s co-equal branches of government. In the 1970s, Congress created two intelligence committees—the Senate Select Committee on Intelligence (“SSCI”) and the House Permanent Select Committee on Intelligence (“HPSCI”)—in the wake of the Church and Pike Committees’ reports. The intelligence committees, which conduct much of their work in secret, directly oversee the intelligence community and its activities.8.Members of the committees that oversee military and foreign relations issues also have access to classified information relevant to their legislative and oversight tasks.Show More The 1970s reforms also produced the Foreign Intelligence Surveillance Court, in which Article III judges authorize executive surveillance for foreign intelligence purposes. Article III courts also review classified information and activities in cases involving state secrets, Freedom of Information Act litigation, and certain criminal cases.

Although not constitutionally linked to the public in the way that Congress and federal courts are, whistleblowers and leakers constitute a third set of actors who attempt to bring abuses (or alleged abuses) to the attention of actors outside the Executive. In the national security setting, leakers emerge from within the executive branch itself and usually remain anonymous. They reveal classified information to the public, often by sharing it with journalists who report on the programs or intelligence contained in the leak. Whistleblowers, on the other hand, follow a statutory process of revealing abuses to their agency’s inspector general and then potentially to members of Congress.

Some view these three sets of actors as surrogates for the broader public, which does not and often should not have access to government secrets. As the literature makes clear, however, all three groups are imperfect surrogates. Congressional committees lack the robust incentives and sometimes the deep experience necessary to check the Executive’s national security activities. Federal courts often doubt their own competence to evaluate secret government programs and so accord substantial deference to executive claims that certain disclosures will harm national security. Leakers reveal information sporadically and can harm genuine national security equities when they do so. Leaking classified information also generally violates criminal law. And whistleblowing is fraught: those who blow the whistle often are subject to retaliation, even though statutes prohibit such responses.

Notwithstanding the flaws in the capabilities and performance of these three groups, many have concluded that the current state of affairs is the best we can do. This Article challenges that conclusion, arguing that this model overlooks at least three other sets of actors who increasingly can and do play a role in curbing misuses of executive secrecy.9.I have argued elsewhere that other actors and mechanisms constrain the Executive in its classified operations, including executive branch lawyers and norms of reason giving. See Ashley Deeks, Checks and Balances from Abroad, 83 U. Chi. L. Rev. 65 (2016) [hereinafter Deeks, Checks and Balances]; Ashley S. Deeks, Secret Reason-Giving, 129 Yale L.J. 612 (2020) [hereinafter Deeks, Reason-Giving]; Ashley S. Deeks, The Substance of Secret Agreements and the Role of Government Lawyers, 111 AJIL Unbound 474 (2018).Show More In recent decades, the national security threat landscape has shifted from one of overt, kinetic state-to-state conflict to a landscape dominated by non-state actors and clandestine, hostile operations by foreign governments using new technologies. In light of these new threats, which manifest themselves in the form of pernicious cyber operations, election interference, and terrorist acts, three groups have assumed critical—though underappreciated—roles in the U.S. national security ecosystem.10 10.Additional actors play a role in what this Article terms the “secrecy ecosystem.” These actors include the Privacy and Civil Liberties Oversight Board, the Presidential Intelligence Advisory Board (“PIAB”), and the Defense Advisory Board. See, e.g., Kenneth Michael Absher, Michael C. Desch & Roman Popadiuk, Privileged and Confidential: The Secret History of the President’s Intelligence Advisory Board (2012) (discussing the PIAB); Johnson, supra note 3, at 73 (noting that when Brent Scowcroft was Chair of the PIAB, he produced a “hard-hitting review” of the intelligence organization). For reasons of space, however, this Article does not address the role of these other secrecy surrogates.Show More U.S. technology companies,11 11.By “technology companies,” I mean large social media, software, and computer technology companies such as Google, Microsoft, and Facebook, as well as companies that provide cybersecurity services, such as FireEye/Mandiant, Crowdstrike, and IronNet.Show More states and localities, and foreign allies all possess the capacities and incentives to check problematic uses of government secrecy. For example, technology companies exchange threat information and operational details of cyber attacks with government officials, comparing intelligence and sometimes litigating to contest government decisions to keep programs secret.12 12.Similar interactions conceivably occur with utility companies and private banks because these companies have been targets of thousands of hostile cyber operations. The Intelligence Community’s 2019 Threat Assessment noted, “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016.” Daniel R. Coats, Dir. of Nat’l Intel., Statement for the Record: Worldwide Threat Assessment of the U.S. Intelli-gence Community 6 (2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR—SSCI.pdf [https://perma.cc/M7DS-WPY4]. Further, the Intelligence Community is authorized to disseminate “classified reports to critical infrastructure entities authorized to receive them.” Off. of the Dir. of Nat’l Intel., Dep’t of Homeland Sec., Dep’t of Def. & Dep’t of Just., Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government Under the Cybersecurity Information Sharing Act of 2015, at 13 (2016), https://www.us-cert. gov/sites/default/files/ais_files/Federal_Government_Sharing_Guidance_(103).pdf. [https://p erma.cc/HYH7-XUCD]. This Article focuses on technology companies because they are most likely to be sophisticated consumers (and providers) of intelligence on cyber operations. Some utility companies are reportedly insufficiently focused on cybersecurity and thus are poorly positioned—at least right now—to play a significant role in checking a sophisticated actor like the Executive. For a critique of utility company cybersecurity practices, see Joseph Marks & Tonya Riley, The Cybersecurity 202: Activist Wants Court To Name and Shame Electric Utilities for Violating Cybersecurity Rules, Wash. Post (Dec. 3, 2019, 4:35 AM), https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/12/0­3/the-cybersecurity-202-activist-wants-court-to-name-and-shame-electric-utilities-for-viol­ating-cybersecurity-rules/5de550bf88e0fa652bbbdb18/ [https://perma.cc/N43C-Z4ZL]; Catherine Stupp, Utilities Are Prime Targets for Cyberattacks, WSJ Pro Cybersecurity (Aug. 7, 2019, 11:19 AM), https://www.wsj.com/articles/utilities-are-prime-target-for-cyberattacks-11565170204 [https://perma.cc/2S5J-EJU6] (“Utilities often don’t have enough employees with security clearance that lets them quickly get classified information about cyber threats from the federal government.”). Utilities, banks, and other operators of critical infrastructure may play a greater checking function in the future as they gain more experience with these threats. For a report recommending that the government enhance its sharing of classified information with utilities grid operators, see Nat’l Comm’n on Grid Resilience, Grid Resilience: Priorities for the Next Administration 28 (2020), https://gridresilience.org/wp-content/uploads/2020/08/NCGR-Report-2020-Full.pdf [https://perma.cc/5QMV-XUAN].Show More Foreign allies sometimes disagree with the U.S. intelligence community’s substantive intelligence judgments, challenging the United States to produce more or better intelligence.13 13.For example, the Trump Administration has tried for more than a year to persuade allies not to employ Huawei equipment in their 5G networks and has received pushback from a range of foreign governments. Robbie Gramer & Lara Seligman, Can the U.S.-U.K. Special Relationship Weather the Huawei Storm?, Foreign Pol’y (Jan. 30, 2020, 5:10 PM), https://foreignpolicy.com/2020/01/30/huawei-intelligence-united-states-britain-trump-5g-in­frastructure-concerns-digital-espionage-special-relationship-five-eyes/ [https://perma.cc/7Z­48-TKWX].Show More Although there are limited public examples of states and localities challenging secret executive activities directly in the election and cyber arenas, these sub-federal officials have the potential to do so because they possess fine-grained information about the election systems and critical infrastructure that are the targets of hostile cyber operations.14 14.For instance, in 2013, Los Angeles created a Cyber Intrusion Command Center, City of Los Angeles, Exec. Directive No. 2 (Oct. 30, 2013), https://www.lamayor.org/sites/g/files/wph446/f/page/file/ED2_with_signature_and_letterhead.pdf?1426620047 [https://perma.cc/6E9C-JC7M] (anticipating collaboration with the FBI and other federal agencies), and in 2017, New York City created its own Cyber Command, City of New York, Exec. Order No. 28 (July 11, 2017), https://www1.nyc.gov/a­ssets/home/downloads/pdf/executive-orders/2017/eo_28.pdf [https://perma.cc/7CNG-HA­MH] (anticipating collaboration with federal and state government agencies and the private sector); see also Brennan Weiss, Inside New York City Cyber Command, Bus. Insider (May 5, 2018, 8:00 AM), https://www.businessinsider.com/nyc-cyber-command-protecting-new-yorkers-2018-4 [https://perma.cc/46VA-MWC7].Show More Further, they historically have challenged certain federal counter-terrorism programs, which suggests that they may start to push back in the election and cyber settings as they gain expertise about the threat landscape.15 15.See Matthew C. Waxman, National Security Federalism in the Age of Terror, 64 Stan. L. Rev. 289, 333 (2012).Show More

These three groups have several important advantages over our traditional secrecy surrogates. First, they possess specific expertise about the new threats and new targets that Congress, the courts, and leakers might not. Certain technology companies and many allies are highly specialized in intelligence-gathering and analysis, and so are particularly well-suited to detect problematic executive performance in the secrecy space.16 16.A possible analogy is to the role of auditors, who verify the accuracy of the government’s records (here, its intelligence and analysis) and point out deficiencies in its operations. For the use of the concept of substantive audits in the intelligence setting, see Eric Posner, It’s Time to Audit America’s Secrets, Foreign Pol’y (Feb. 2, 2018, 5:13 PM), https://foreignpolicy.com/2018/02/02/its-time-to-audit-all-of-americas-secrets/ [https://per­ma.cc/LK65-W4NA]; Elizabeth Goitein & J. William Leonard, Opinion, America’s Unnecessary Secrets, N.Y. Times (Nov. 7, 2011), https://www.nytimes.com/­2011/11/07/opinion/national-security-and-americas-unnecessary-secrets.html [https://perma.cc/2UAL-GFKL] (arguing that one way to combat government over-classification is to allow agencies’ inspectors general to “audit officials’ classification decisions”).Show More Second, each of the three groups brings to the table irreplaceable access to information and infrastructure that the Executive needs to perform its job.17 17.See Michael Wines, State Officials Say They Are Told Too Little About Election Threats, N.Y. Times (Feb. 19, 2018), https://www.nytimes.com/2018/02/19/us/elections-states-hacking.html [https://perma.cc/77LU-KFCV] (describing the relationship between the Department of Homeland Security and local election officials as an “arranged marriage”).Show More For technology companies, it is the ability to observe and defend the front lines of critical infrastructure systems, attribute the sources of cyber attacks, and operate the very systems that are subject to foreign manipulation. For states and localities, it is control over and knowledge about election operations and machinery (and other critical infrastructure at the sub-federal level), as well as ground-level intelligence about terrorist activities inside the United States. For foreign allies, it is intelligence and expertise that the United States may not possess about shared threats. The Executive has persistent incentives to share intelligence with these actors to allow them to take necessary steps to enhance U.S. national security. This, in turn, renders them an audience that the Executive must persuade of the soundness of its intelligence and proposed operations.18 18.Deeks, Reason-Giving, supra note 9.Show More Third, unlike leakers, these three groups are positioned to challenge secret government operations without revealing those operations.19 19.Those who frame the government secrecy debate as a choice between secrecy and disclosure thus are misframing the issue. See Philip H. Melanson, Secrecy Wars 8, 183 (2001) (describing the “ongoing battle between secret keepers and those seeking access”).Show More

These, then, are our unsung “secrecy surrogates”: actors who are given access to secret information that average U.S. citizens are not and who can improve secret executive operations and help mitigate abuses. By “surrogates,” I do not mean that these groups have a direct constitutional, contractual, or agency relationship with the national populace—they generally do not.20 20.There is an irony here: in certain areas of classified government operations, these actors, which lack a constitutional relationship to our national polity, may be better positioned to alter the non-public behavior of the Executive than the courts and congressional committees, which are our direct surrogates.Show More Instead, I mean that these groups serve as our surrogates in a more general sense: as actors who take our place or are given a particular role in government operations because we are not able to serve in that role ourselves. In particular, these surrogates are positioned to enhance the Executive’s adherence to public law values by (1) stimulating the Executive to improve the accuracy of its intelligence; (2) diminishing the Executive’s opportunity to undertake illegal actions; and (3) increasing the Executive’s accountability for its classified choices.21 21.See Jody Freeman, Private Parties, Public Functions and the New Administrative Law, 52 Admin. L. Rev. 813, 818–19 (2000) (listing “openness, fairness, participation, consistency, rationality, impartiality, and accessibility of judicial review” as well as accountability and legality as public law values); id. at 819 (“Private actors are not just rent-seekers that exacerbate the traditional democracy problem in administrative law; they are also regulatory resources capable of contributing to the efficacy and legitimacy of administration.”); Michael Taggart, The Province of Administrative Law Determined?, in The Province of Administrative Law 1, 3 (Michael Taggart ed., 1997) (defining public law values to include openness, participation, accountability, honesty, and rationality); Mark Aronson, A Public Lawyer’s Response to Privatisation and Outsourcing, in The Province of Administrative Law 40, 43 (Michael Taggart ed., 1997).Show More It is difficult to obtain empirical, unclassified information about the full range of effects of these secrecy surrogates, and so this Article’s conclusions are necessarily tentative. However, based on available analyses of the ways that technology companies, foreign allies, and states and localities have behaved to date in the surveillance,22 22.Alan Z. Rozenshtein, Surveillance Intermediaries, 70 Stan. L. Rev. 99, 106 (2018).Show More cybersecurity,23 23.Kristen E. Eichensehr, Public-Private Cybersecurity, 95 Tex. L. Rev. 467, 471 (2017) [hereinafter Eichensehr, Public-Private Cybersecurity].Show More and counter-terrorism24 24.Waxman, supra note 15.Show More settings, it is clear that these actors can help ensure that U.S. intelligence operations are attentive to legal, procedural, and accuracy concerns and have begun to play this role.

David Pozen has argued that it is preferable in a democratic system like ours, in which the government must keep certain information secret, for those secrets to be shallow rather than deep. (By deep secrets, he means government secrets that only a small number of similarly situated officials know.)25 25.Pozen, supra note 5, at 274 (“[A] government secret is deep if a small group of similarly situated officials conceals its existence from the public and from other officials, such that the outsiders’ ignorance precludes them from learning about, checking, or influencing the keepers’ use of the information.”).Show More In his view, which I share, our system should favor shallow secrecy whenever possible, because doing so “will systematically lead to . . . outcomes that are deemed acceptable from a greater variety of perspectives, that have been more thoroughly reasoned and refined through a dialogic vetting process, that are better documented, that take longer to be finalized, and that are more likely to be publicized.”26 26.Id. at 275.Show More He argues that we can shift a secret from being deep to shallow by expanding the number and types of people who know the secret, even if the underlying information remains classified. Pozen, however, contemplates this as occurring primarily by expanding the number and type of secret keepers within the executive branch itself, as well as within Congress.27 27.Id. at 329–30, 333.Show More This Article argues that the Executive has, by necessity, begun to expand and diversify the number and type of secret keepers in areas that reach far beyond the executive branch or Congress. In so doing, the government is both decreasing the depth of its secrets and positioning these actors to check some of the persistent problems of government secrecy: the concealment of incompetent execution or illegality and the ability of the Executive to avoid justifying its decisions to outsiders.

This new system of surrogates, like the existing one it supplements, is imperfect. For many of the same reasons that our traditional secrecy surrogates do not act as fully faithful agents for the public, these secrecy surrogates offer only partial fixes to our secrecy challenges, even if they are independently powerful actors.28 28.Several scholars have considered government secrecy problems through a principal-agent lens. Daniel Epps identifies three mechanisms that could help reduce agency costs in the secrecy setting, one of which is the use of proxies. Daniel Epps, Note, Mechanisms of Secrecy, 121 Harv. L. Rev. 1556, 1558 (2008). Epps explores the use of proxies only briefly, however, and focuses on government actors who have a direct duty to the public (the FISC and the Executive). His note does not consider the operations of other proxies, such as those treated here as surrogates. Sidney Shapiro and Reina Steinzor use agency theory to evaluate how to hold Congress and the Executive accountable to the public in the face “burgeoning secrecy.” Sidney A. Shapiro & Rena I. Steinzor, The People’s Agent: Executive Branch Secrecy and Accountability in an Age of Terrorism, 69 Law & Contemp. Probs. 99, 101 (2006). They focus on who should have the power to declassify information, however, not on how other actors can check secret U.S. military and intelligence activities.Show More They have their own pathologies and policy preferences, have incomplete access to classified information, and could serve as a new source of leaks. These actors will not supplant the existing messiness of today’s interplay among the Executive, Congress, the courts, and leakers. Rather, they will supplement the reach of existing surrogates, expanding what Jack Goldsmith has framed, in the wider national security setting, as a “synopticon”—a distributed network of actors that surveils the Executive.29 29.Jack Goldsmith, Power and Constraint: The Accountable Presidency After 9/11, at 205–07 (2012).Show More This Article argues that adding knowledgeable players to the “secrecy synopticon” who can provide increased checks and monitoring without sacrificing much secrecy is a desirable development worth sustaining.

This Article makes three contributions. First, it shows descriptively that there are several unsung actors in the government secrecy ecosystem that help guard against the Executive’s misuse of secrecy, and that any evaluation of government secrecy that ignores these actors is importantly incomplete. It is well-understood that these types of actors play an important checking function in the public parts of government operations.30 30.See, e.g., Freeman, supra note 21, at 816–17 (describing how private actors participate publicly in governance through the regulatory process).Show More This Article shows that these actors also serve a checking function behind the veil of secrecy. Second, it analyzes the features of these groups that allow them to provide these checks. It draws attention to their role as necessary actors in the conduct of national security today; their on-the-ground expertise; and their ability to challenge the Executive without disclosing classified information. Third, the Article offers a normative defense of this development, identifying the surrogates’ incentives to improve the quality of intelligence, challenge legally questionable executive activities, and demand reasons for secret decisions. Thinking about the existence, role, and possibilities of these unsung secrecy surrogates can sharpen how we approach the challenges of government secrecy; identify where the coincidences of interest lie between these surrogates and the national public; suggest ways to preserve salutary overlaps in interest; and allow us to see where the most pressing gaps in oversight remain.

Part I identifies how the Executive can abuse secrecy, as well as the strengths and weaknesses of our traditional secrecy surrogates. Part II argues that several recent developments in national security threats have positioned technology companies, states and localities, and foreign allies to serve as unsung secrecy surrogates. Part III explores the incentives that these actors have to serve as checks on executive abuses of secrecy and considers how those incentives are aligned with the public law values of legality, accountability, rationality, participation, and, to some extent, transparency. Part IV places these unsung surrogates in the context of a broader “secrecy synopticon.” It addresses challenges to the argument that the unsung surrogates can perform robust checking functions and proposes modest ways to enhance their role in the synopticon.

  1. * Professor, University of Virginia Law School. Thanks to George Cohen, Jen Daskal, Kristen Eichensehr, Mike Flowers, John Harrison, Debbie Hellman, Rebecca Ingber, Nate Jones, Aaron Karczmer, Matt Olsen, Daphna Renan, Rich Schragger, Paul Stephan, and participants in the 2019 Duke-Virginia Foreign Relations Roundtable and in workshops at Harvard Law School and the University of Houston Law Center for very helpful conversations and comments.

  2. Julian E. Barnes, Michael Crowley, Matthew Rosenberg & Mark Mazzetti, White House Classified Computer System Is Used To Hold Transcripts of Sensitive Calls, N.Y. Times (Sept. 29, 2019), https://www.nytimes.com/2019/09/27/us/politics/nsc-ukraine-call.html [https://perma.cc/F9ZC-68Z3]; see Dustin Volz, Andrew Duehren & Natalie Andrews, White House Official Feared Trump Transcript Leak Could Be Politically Damaging, Wall St. J. (Nov. 17, 2019, 5:52 AM), https://www.wsj.com/articles/white-house-official-feared-trump-transcript-leak-could-be-politically-damaging-11573942481 [https://perma.cc/LV53-PL42].

  3. See, e.g., Ayesha Rascoe & Franco Ordoñez, Former Officials Say White House’s Use of Secret System Is Unusual, ‘Disturbing,’ NPR (Sept. 27, 2019, 5:40 AM), https://www.npr.org/2019/09/27/764759182/former-officials-say-white-houses-use-of-secret-system-is-unusual-disturbing [https://perma.cc/7PBJ-5MF8] (quoting former White House official as stating that “[t]his seems to be nothing more than an abuse of the classification and the information security system to safeguard not the information, but to effect a cover-up” (internal quotation marks omitted)).

  4. See Loch K. Johnson, Governing in the Absence of Angels: On the Practice of Intelligence Accountability in the United States, in Who’s Watching the Spies? Establishing Intelligence Service Accountability 57, 61 (Hans Born, Loch K. Johnson & Ian Leigh eds., 2005) (quoting intelligence scholar as stating that the major problem facing U.S. intelligence in 2005 was that the “CIA [had] not been gathering enough quality data”).

  5. See Frederick A.O. Schwarz Jr., Democracy in the Dark: The Seduction of Government Secrecy 2 (2015) (“[T]oo much is kept secret not to protect America but to keep embarrassing or illegal conduct from Americans.”).

  6. Robert M. Pallitto & William G. Weaver, Presidential Secrecy and the Law 3 (2007) (noting executive interest in “maintain[ing] presidential prerogative against congressional inquiries and judicial orders”); id. at 6 (“Where a president may do what is desired in secret, there is no reason to withstand the ordeal of a political battle to achieve the same ends.”); H.R. Select Comm. To Investigate Covert Arms Transactions with Iran & S. Select Comm. on Secret Military Assistance to Iran and the Nicaraguan Opposition, 100th Cong., Rep. of the Congressional Committees Investigating the Iran-Contra Affair, Minority Report 450, 515 (Comm. Print 1987) (stating that the President should undertake “democratic persuasion” to develop support for his policies and that he will not succeed “unless the public is exposed to and persuaded by a clear, sustained, and principled debate on the merits”); David E. Pozen, Deep Secrecy, 62 Stan. L. Rev. 257, 279 (2010) (discussing how secrecy provides “insulation from scrutiny”).

  7. See Pozen, supra note 5, at 280; S. Select Comm. To Study Governmental Operations with Respect to Intel. Activities, Final Report, S. Rep. No. 94-755, at 4 (1976) (“[T]here are many necessary and proper governmental activities that must be conducted in secrecy. . . . [However,] intelligence activities conducted outside the framework of the Constitution and statutes can undermine the treasured values guaranteed in the Bill of Rights. Further, if the intelligence agencies act in ways inimical to declared national purposes, they damage the reputation, power, and influence of the United States abroad.”).

  8. See, e.g., Rahul Sagar, Secrets and Leaks: The Dilemma of State Secrecy (2013) (considering role of Congress, the courts, whistleblowers, and leakers in managing government secrecy); Pallitto & Weaver, supra note 5 (considering Congress, the courts, and leaks); Michael P. Colaresi, Democracy Declassified: The Secrecy Dilemma in National Security 181 (2014) (discussing role of legislatures, freedom of information laws, and press freedom laws in checking executive secrecy); Mark Fenster, The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information (2017) (discussing the role of the press, freedom of information laws, anti-corruption non-governmental organizations, and leaks); Pozen, supra note 5, at 269, 274 (focusing on deep secret keeping by executive officials, treating Congress and the courts as the primary recipients of shallow secrets, and assuming that very few private actors generally will be aware of government secrets); Johnson, supra note 3, at 58 (noting that the “most consistent and serious manifestation of intelligence oversight has come not from presidential commissions, but from the media and the Congress”); Josh Chafetz, Whose Secrets?, 127 Harv. L. Rev. F. 86, 87 (2013) (emphasizing the role of Congress in the secrecy regime).

  9. Members of the committees that oversee military and foreign relations issues also have access to classified information relevant to their legislative and oversight tasks.

  10. I have argued elsewhere that other actors and mechanisms constrain the Executive in its classified operations, including executive branch lawyers and norms of reason giving. See Ashley Deeks, Checks and Balances from Abroad, 83 U. Chi. L. Rev. 65 (2016) [hereinafter Deeks, Checks and Balances]; Ashley S. Deeks, Secret Reason-Giving, 129 Yale L.J. 612 (2020) [hereinafter Deeks, Reason-Giving]; Ashley S. Deeks, The Substance of Secret Agreements and the Role of Government Lawyers, 111 AJIL Unbound 474 (2018).

  11. Additional actors play a role in what this Article terms the “secrecy ecosystem.” These actors include the Privacy and Civil Liberties Oversight Board, the Presidential Intelligence Advisory Board (“PIAB”), and the Defense Advisory Board. See, e.g., Kenneth Michael Absher, Michael C. Desch & Roman Popadiuk, Privileged and Confidential: The Secret History of the President’s Intelligence Advisory Board (2012) (discussing the PIAB); Johnson, supra note 3, at 73 (noting that when Brent Scowcroft was Chair of the PIAB, he produced a “hard-hitting review” of the intelligence organization). For reasons of space, however, this Article does not address the role of these other secrecy surrogates.

  12. By “technology companies,” I mean large social media, software, and computer technology companies such as Google, Microsoft, and Facebook, as well as companies that provide cybersecurity services, such as FireEye/Mandiant, Crowdstrike, and IronNet.

  13. Similar interactions conceivably occur with utility companies and private banks because these companies have been targets of thousands of hostile cyber operations. The Intelligence Community’s 2019 Threat Assessment noted, “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016.” Daniel R. Coats, Dir. of Nat’l Intel., Statement for the Record: Worldwide Threat Assessment of the U.S. Intelli-
    gence Community 6 (2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR—SSCI.pdf [https://perma.cc/M7DS-WPY4]. Further, the Intelligence Community is authorized to disseminate “classified reports to critical infrastructure entities authorized to receive them.” Off. of the Dir. of Nat’l Intel., Dep’t of Homeland Sec., Dep’t of Def. & Dep’t of Just., Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government Under the Cybersecurity Information Sharing Act of 2015, at 13 (2016), https://www.us-cert. gov/sites/default/files/ais_files/Federal_Government_Sharing_Guidance_(103).pdf. [https://p erma.cc/HYH7-XUCD]. This Article focuses on technology companies because they are most likely to be sophisticated consumers (and providers) of intelligence on cyber operations. Some utility companies are reportedly insufficiently focused on cybersecurity and thus are poorly positioned—at least right now—to play a significant role in checking a sophisticated actor like the Executive. For a critique of utility company cybersecurity practices, see Joseph Marks & Tonya Riley, The Cybersecurity 202: Activist Wants Court To Name and Shame Electric Utilities for Violating Cybersecurity Rules, Wash. Post (Dec. 3, 2019, 4:35 AM), https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/12/0­3/the-cybersecurity-202-activist-wants-court-to-name-and-shame-electric-utilities-for-viol­ating-cybersecurity-rules/5de550bf88e0fa652bbbdb18/ [https://perma.cc/N43C-Z4ZL]; Catherine Stupp, Utilities Are Prime Targets for Cyberattacks, WSJ Pro Cybersecurity (Aug. 7, 2019, 11:19 AM), https://www.wsj.com/articles/utilities-are-prime-target-for-cyberattacks-11565170204 [https://perma.cc/2S5J-EJU6] (“Utilities often don’t have enough employees with security clearance that lets them quickly get classified information about cyber threats from the federal government.”). Utilities, banks, and other operators of critical infrastructure may play a greater checking function in the future as they gain more experience with these threats. For a report recommending that the government enhance its sharing of classified information with utilities grid operators, see Nat’l Comm’n on Grid Resilience, Grid Resilience: Priorities for the Next Administration 28 (2020), https://gridresilience.org/wp-content/uploads/2020/08/NCGR-Report-2020-Full.pdf [https://perma.cc/5QMV-XUAN].

  14. For example, the Trump Administration has tried for more than a year to persuade allies not to employ Huawei equipment in their 5G networks and has received pushback from a range of foreign governments. Robbie Gramer & Lara Seligman, Can the U.S.-U.K. Special Relationship Weather the Huawei Storm?, Foreign Pol’y (Jan. 30, 2020, 5:10 PM), https://foreignpolicy.com/2020/01/30/huawei-intelligence-united-states-britain-trump-5g-in­frastructure-concerns-digital-espionage-special-relationship-five-eyes/ [https://perma.cc/7Z­48-TKWX].

  15. For instance, in 2013, Los Angeles created a Cyber Intrusion Command
    Center, City of Los Angeles, Exec. Directive No. 2 (Oct. 30, 2013), https://www.lamayor.org/sites/g/files/wph446/f/page/file/ED2_with_signature_and_letterhead.pdf?1426620047 [https://perma.cc/6E9C-JC7M] (anticipating collaboration with the FBI and other federal agencies), and in 2017, New York City created its own Cyber Command, City of New York, Exec. Order No. 28 (July 11, 2017), https://www1.nyc.gov/a­ssets/home/downloads/pdf/executive-orders/2017/eo_28.pdf [https://perma.cc/7CNG-HA­MH] (anticipating collaboration with federal and state government agencies and the private sector); see also Brennan Weiss, Inside New York City Cyber Command, Bus. Insider (May 5, 2018, 8:00 AM), https://www.businessinsider.com/nyc-cyber-command-protecting-new-yorkers-2018-4 [https://perma.cc/46VA-MWC7].

  16. See Matthew C. Waxman, National Security Federalism in the Age of Terror, 64 Stan. L. Rev. 289, 333 (2012).

  17.  A possible analogy is to the role of auditors, who verify the accuracy of the
    government’s records (here, its intelligence and analysis) and point out deficiencies
    in its operations. For the use of the concept of substantive audits in the intelligence
    setting, see Eric Posner, It’s Time to Audit America’s Secrets, Foreign Pol’y (Feb. 2, 2018, 5:13 PM), https://foreignpolicy.com/2018/02/02/its-time-to-audit-all-of-americas-secrets/ [https://per­ma.cc/LK65-W4NA]; Elizabeth Goitein & J. William Leonard,
    Opinion, America’s Unnecessary Secrets, N.Y. Times (Nov. 7, 2011), https://www.nytimes.com/­2011/11/07/opinion/national-security-and-americas-unnecessary-secrets.html [https://perma.cc/2UAL-GFKL] (arguing that one way to combat government over-classification is to allow agencies’ inspectors general to “audit officials’ classification decisions”).

  18. See Michael Wines, State Officials Say They Are Told Too Little About Election Threats, N.Y. Times (Feb. 19, 2018), https://www.nytimes.com/2018/02/19/us/elections-states-hacking.html [https://perma.cc/77LU-KFCV] (describing the relationship between the Department of Homeland Security and local election officials as an “arranged marriage”).

  19. Deeks, Reason-Giving, supra note 9.

  20.  Those who frame the government secrecy debate as a choice between secrecy and disclosure thus are misframing the issue. See Philip H. Melanson, Secrecy Wars 8, 183 (2001) (describing the “ongoing battle between secret keepers and those seeking access”).

  21. There is an irony here: in certain areas of classified government operations, these actors, which lack a constitutional relationship to our national polity, may be better positioned to alter the non-public behavior of the Executive than the courts and congressional committees, which are our direct surrogates.

  22. See Jody Freeman, Private Parties, Public Functions and the New Administrative Law, 52 Admin. L. Rev. 813, 818–19 (2000) (listing “openness, fairness, participation, consistency, rationality, impartiality, and accessibility of judicial review” as well as accountability and legality as public law values); id. at 819 (“Private actors are not just rent-seekers that exacerbate the traditional democracy problem in administrative law; they are also regulatory resources capable of contributing to the efficacy and legitimacy of administration.”); Michael Taggart, The Province of Administrative Law Determined?, in The Province of Administrative Law 1, 3 (Michael Taggart ed., 1997) (defining public law values to include openness, participation, accountability, honesty, and rationality); Mark Aronson, A Public Lawyer’s Response to Privatisation and Outsourcing, in The Province of Administrative Law 40, 43 (Michael Taggart ed., 1997).

  23. Alan Z. Rozenshtein, Surveillance Intermediaries, 70 Stan. L. Rev. 99, 106 (2018).

  24. Kristen E. Eichensehr, Public-Private Cybersecurity, 95 Tex. L. Rev. 467, 471 (2017) [hereinafter Eichensehr, Public-Private Cybersecurity].

  25. Waxman, supra note 15.

  26. Pozen, supra note 5, at 274 (“[A] government secret is deep if a small group of similarly situated officials conceals its existence from the public and from other officials, such that the outsiders’ ignorance precludes them from learning about, checking, or influencing the keepers’ use of the information.”).

  27. Id. at 275.

  28. Id. at 329–30, 333.

  29. Several scholars have considered government secrecy problems through a principal-agent lens. Daniel Epps identifies three mechanisms that could help reduce agency costs in the secrecy setting, one of which is the use of proxies. Daniel Epps, Note, Mechanisms of Secrecy, 121 Harv. L. Rev. 1556, 1558 (2008). Epps explores the use of proxies only briefly, however, and focuses on government actors who have a direct duty to the public (the FISC and the Executive). His note does not consider the operations of other proxies, such as those treated here as surrogates. Sidney Shapiro and Reina Steinzor use agency theory to evaluate how to hold Congress and the Executive accountable to the public in the face “burgeoning secrecy.” Sidney A. Shapiro & Rena I. Steinzor, The People’s Agent: Executive Branch Secrecy and Accountability in an Age of Terrorism, 69 Law & Contemp. Probs. 99, 101 (2006). They focus on who should have the power to declassify information, however, not on how other actors can check secret U.S. military and intelligence activities.

  30. Jack Goldsmith, Power and Constraint: The Accountable Presidency After 9/11, at 205–07 (2012).

  31. See, e.g., Freeman, supra note 21, at 816–17 (describing how private actors participate publicly in governance through the regulatory process).