Against Fiduciary Constitutionalism

A growing body of scholarship draws connections between fiduciary law and the Constitution. In much of this literature, the Constitution is described as a fiduciary instrument that establishes fiduciary duties, not least for the President of the United States.

This Article examines and critiques the claims of fiduciary constitutionalism. Although a range of arguments are made in this literature, there are common failings. Some of these involve a literalistic misreading of the works of leading political philosophers (e.g., Plato and Locke). Other failings involve fiduciary law, such as mistakes about how to identify fiduciary relationships and about the content and enforcement of fiduciary duties. Still other failings sound in constitutional law, including the attempt to locate the genre of the Constitution in the categories of private fiduciary law. These criticisms suggest weaknesses in the new and increasingly influential attempt to develop fiduciary constitutionalism.

Introduction

Recently, a number of scholars have argued that the U.S. Constitution resembles a fiduciary document, and that it imposes fiduciary duties on various actors, including the President of the United States.1.See, e.g., Gary Lawson & Guy Seidman, “A Great Power of Attorney”: Understanding the Fiduciary Constitution (2017); Randy E. Barnett & Evan D. Bernick, The Letter and the Spirit: A Unified Theory of Originalism, 107 Geo. L.J. 1, 18 (2018); Andrew Kent, Ethan J. Leib & Jed Handelsman Shugerman, Faithful Execution and Article II, 132 Harv. L. Rev. 2111 (2019); Ethan J. Leib & Stephen R. Galoob, Fiduciary Principles and Public Offices, in The Oxford Handbook of Fiduciary Law 303 (Evan J. Criddle, Paul B. Miller & Robert H. Sitkoff eds., 2019); Ethan J. Leib & Andrew Kent, Fiduciary Law and the Law of Public Office: Suggestions for a Research Agenda, Wm. & Mary L. Rev. (forthcoming 2021) (on file with authors); Ethan J. Leib & Jed Handelsman Shugerman, Fiduciary Constitutionalism: Implications for Self-Pardons and Non-Delegation, 17 Geo. J.L. & Pub. Pol’y 463 (2019); Ethan J. Leib, David L. Ponet & Michael Serota, A Fiduciary Theory of Judging, 101 Calif. L. Rev. 699 (2013); Robert G. Natelson, The Constitution and the Public Trust, 52 Buff. L. Rev. 1077, 1140 (2004) [hereinafter Natelson, The Constitution and the Public Trust].Show More When Barack Obama was President, some found in the “fiduciary Constitution”2.Different scholars writing about what we call the “fiduciary Constitution” might have their own nomenclature. Our choice of terms, however, is not original and is not meant to be pejorative. See Lawson & Seidman, supra note 1 (title); Kent et al., supra note 1, at 2182; Leib & Shugerman, supra note 1 (title); id. at 464.Show More a means by which a court could hold unconstitutional the signature achievement of his administration, the Affordable Care Act.3.E.g., Lawson & Seidman, supra note 1, at 91–98.Show More Now others find in fiduciary constitutionalism a means by which a court could find the present incumbent to have violated a proscription on self-dealing.4.See Leib & Shugerman, supra note 1, at 468–69, 475.Show More The fiduciary Constitution contains multitudes—everything from a handy way for an originalist to justify Bolling v. Sharpe5.See Lawson & Seidman, supra note 1, at 151–53, 170–71.Show More to a way for skeptics of the non-delegation doctrine to rein it in.6.See Leib & Shugerman, supra note 1, at 479–85.Show More The convenience and malleability of this new constitutional argument should make us wary.

This Article offers a critique of fiduciary constitutionalism, finding it bad fiduciary law and bad constitutional law. We are not the first to criticize fiduciary constitutionalism, and our work therefore builds on that of others, especially Seth Davis and Richard Primus.7.See generally Seth Davis, The False Promise of Fiduciary Government, 89 Notre Dame L. Rev. 1145 (2014) (analyzing differences between private fiduciaries and public officials and critiquing the lack of authority for fiduciary constitutionalism); Richard Primus, The Elephant Problem, 17 Geo. J.L. & Pub. Pol’y 373 (2019) (critically reviewing the evidence and methodology in Lawson & Seidman, supra note 1). Others have also criticized the over-extension of fiduciary concepts, albeit in different contexts. E.g., Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497 (2019).Show More

It is important at the outset to note that the burgeoning literature in favor of a fiduciary reading of the Constitution means that different scholars make different claims. Some analogize the Constitution to a trust,8.See Leib & Shugerman, supra note 1, at 477–79.Show More some to an agency relationship,9.Lawson & Seidman, supra note 1, at 112.Show More some to a power of attorney,10 10.Id. at 75 (referring to James Iredell’s quote regarding power of attorney).Show More and some to an attractively all-purpose generic “fiduciary” construct.11 11.Barnett & Bernick, supra note 1, at 18–21; see also id. at 19 nn.81 & 83 (discussing common fiduciary relationships and duties); cf. Lawson & Seidman, supra note 1, at 76 (“[W]e think it close to obvious that the Constitution, as a legal document, is best understood as some kind of agency or fiduciary instrument, whereas the case for viewing it specifically as (or as like) a power of attorney is more attenuated.”); Leib et al., supra note 1, at 708, 712–13 (recognizing differences among different kinds of fiduciaries, as well as differences between public and private law, but relying on a general “fiduciary principle”).Show More Some draw a straight line between a fiduciary law of the eighteenth century and the present.12 12.See, e.g., Barnett & Bernick, supra note 1, at 19–21.Show More Others admit there are differences between past and present, and thus offer a bevy of qualifications and hedges13 13.E.g., Lawson & Seidman, supra note 1, at 6 (“[W]e are making no claims about the extent to which the meaning we uncover should or must contribute to legal decision making.”); id. at 11 (“Again, we frame these interpretative conclusions in hypothetical form: to the extent that the Constitution can be seen as a fiduciary instrument, or in some cases as a fiduciary instrument of a particular kind, certain conclusions about the document’s meaning follow from that identification.”). The hedges and qualifications are more pronounced—and thus the conclusions more circumspect—in the article by Kent, Leib, and Shugerman than in some of the other literature. See, e.g., Kent et al., supra note 1, at 2190 (“We do not opine here on the way the framers envisioned enforcing the President’s duty of loyalty and avoiding self-dealing.”).Show More—but those tend to fall away as soon as the scholars turn to spelling out the “enforceable duties” that they want to see the courts administering.14 14.E.g., Lawson & Seidman, supra note 1, at 7 (“Now to our affirmative project: understanding the fiduciary character of the Constitution is important not simply as a historical matter but also for its contribution to constitutional interpretation.”); id. at 11; Leib & Shugerman, supra note 1, at 465 (“[T]his article delves further into this language’s [i.e. the Take Care Clause’s] likely meaning, indicating how it can establish enforceable duties for public officials.”); see also Kent et al., supra note 1, at 2119 (claiming “that the best historical understanding of the meaning of the Faithful Execution Clauses is that they impose duties that we today—and some in the eighteenth century as well—would call fiduciary”). Richard Primus and Suzanna Sherry note this oscillation in Lawson and Seidman’s argument. Primus, supra note 7, at 400, 402–04; Suzanna Sherry, The Imaginary Constitution, 17 Geo. J.L. & Pub. Pol’y 441, 447–49 (2019) (reviewing Lawson & Seidman, supra note 1). For discussion of a similar tendency in Kent et al., supra note 1, see infra note 87.Show More Some of the literature starts out cautious and then gallops away; some of it gallops from the start. But it all tends to be ambitious and thoroughly presentist.

This Article offers three main critiques of fiduciary constitutionalism:

The first is about contemporary fiduciary law. The fiduciary constitutionalists pervasively treat concepts as “fiduciary” that are in fact not limited to fiduciary law and instead have much a broader application, such as good faith.15 15.See infra Part II.Show More This matters because a point of connection between the Constitution and some area that can be characterized as fiduciary (e.g., trust, agency), as thin as it is, cannot sustain the fiduciary constitutionalist project if it is a point of connection with many areas of law.

The second is about historical anachronism. Some fiduciary constitutionalists rely on a “fiduciary law” of 1789 when there was in fact no such law.16 16.E.g., Barnett & Bernick, supra note 1, at 20–21 (asserting that the Constitution’s “organization and language sounds in eighteenth-century fiduciary law”). More cautious on this point is Kent et al., supra note 1, at 2179–80 (“[W]hat the three meanings we can attribute to the [Faithful Execution] Clauses have in common is that they are all part of the basic ways the private law constrains fiduciary discretion and power.”).Show More There were quite specific legal regimes for trust, agency, bailment, and so on. Some of these were at law, and some were in equity. Their standards of liability were different; their remedies were different; they differed in respect to defenses and the availability of a jury.17 17.Contra Lawson & Seidman, supra note 1, at 62 (“The fiduciary responsibilities of a trustee and an attorney do not differ in any way material to our project.”).Show More As other fiduciary constitutionalists concede, there was no pan-subject “fiduciary law” in 1789.18 18.See, e.g., Kent et al., supra note 1, 2180–81 (describing the “crystalliz[ing]” of “the ‘private’ fiduciary law we would recognize today” as not occurring in America until late in the eighteenth century, and concluding that “a fiduciary law of ‘private’ offices was unlikely to have been plucked off-the-rack by the Philadelphia Convention drafters and applied to public offices”); id. at 2179 (“Our historical findings about the original meaning of the Faithful Execution Clauses align with core features of modern fiduciary law . . . . ”); Leib & Shugerman, supra note 1, at 468 (suggesting doubt about whether “private fiduciary law was itself fully formed at the time of the founding”).Show More This abstraction is fatal to fiduciary constitutionalism.

The third is about how some fiduciary constitutionalists evade the anachronism problem. They try to escape this problem by tying the Constitution not to a fictional eighteenth-century “fiduciary law” but rather to fiduciary law of the twenty-first century.19 19.Leib & Shugerman, supra note 1, at 468–69 (“[Article II of the U.S. Constitution] uses the language of faith and care to signal to courts and to executive officials that the President was supposed to be held to the same kinds of fiduciary obligations to which corporate officers, trustees, and lawyers are routinely held today in the private sector.”).Show More That interpretive move is certainly available on some theories of constitutional interpretation—theories that would to a substantial degree integrate political morality and constitutional law, or theories that would allow the courts to legitimately turn what was originally a non-fiduciary Constitution into a fiduciary Constitution, creating and developing new fiduciary duties for government officers.20 20.But cf. Davis, supra note 7, at 1182–95 (discussing whether that is advisable).Show More But that is not the argument the fiduciary constitutionalists have made to date (though they are of course free to reshape their arguments going forward). Instead, the fiduciary constitutionalists have relied on text and structure as understood at the Founding.21 21.See infra notes 161 and 164 and accompanying text. We do recognize that there is a spectrum of views about how much the interpretation of the constitutional text should be informed by the legal categories at the time of ratification (as part of context). The more one separates the text from its legal context, the more room there is to integrate constitutional law and political morality, and the less constraint there is from the original understanding (with the familiar virtues and vices of that interpretive equilibrium).Show More And that more-or-less originalist argument does not hold if the Constitution can only be understood as fiduciary in light of present-day fiduciary law.

One thing, however, does need to be said in favor of the fiduciary constitutionalists’ claims. It is true that there is a long history in political thought of the use of trust and agency metaphors for governance. This figurative language appears in Plato and Cicero, in Locke and Hume.22 22.See infra Section I.A.Show More But this language offers moral guidance and political wisdom, not enforceable duties with remedies that can be awarded by courts. And mere metaphor is not the big game the fiduciary constitutionalists are pursuing. Against this long history of a figurative and legally thin understanding of public office as a trust, it becomes easier to recognize the fiduciary constitutionalist project for what it is: an earnest and literalistic misreading of the tradition and an insistence on taking figurative language that works across thousands of years of political theory and treating it as if it were an invocation of an inevitably more particular body of legal or equitable claims and remedies. There is no such body of claims and remedies that can support this move—not a fiduciary law of 1789 (once it is recognized as a fiction), and not present-day fiduciary law (once it is correctly described).

The remainder of this Article proceeds as follows. Part I analyzes the supposed antecedents of fiduciary constitutionalism—both the classical and early modern tradition in political theory and also more recent advances in fiduciary theory with which the fiduciary constitutionalists align themselves. Part II critiques the fiduciary law of fiduciary constitutionalism. Part III critiques the constitutional law of fiduciary constitutionalism. The idea that the Constitution ought to be understood as a fiduciary instrument is a well-meant and seemingly timely entrant into the constitutional discourse of the United States. But taken together, these critiques show that the historical, philosophical, and legal foundations of fiduciary constitutionalism are weak.

  1. * Professor of Law, Notre Dame Law School.
  2. ** Professor of Law, Associate Dean for International and Graduate Programs, and Director of the Notre Dame Program on Private Law, Notre Dame Law School. The authors are grateful for comments from Randy Barnett, Evan Bernick, Nathan Chapman, Evan Criddle, Evan Fox-Decent, Joshua Getzler, Andrew Gold, Albert Horsting, Andrew Kent, Sung Hui Kim, Gary Lawson, Ethan Leib, Ben McFarlane, Michael McConnell, David Pozen, Richard Primus, Richard Re, Lionel Smith, and Larry Solum, as well as attendees at the Third Annual International Fiduciary Law Conference held at Trinity College, Cambridge.
  3. See, e.g., Gary Lawson & Guy Seidman, “A Great Power of Attorney”: Understanding the Fiduciary Constitution (2017); Randy E. Barnett & Evan D. Bernick, The Letter and the Spirit: A Unified Theory of Originalism, 107 Geo. L.J. 1, 18 (2018); Andrew Kent, Ethan J. Leib & Jed Handelsman Shugerman, Faithful Execution and Article II, 132 Harv. L. Rev. 2111 (2019); Ethan J. Leib & Stephen R. Galoob, Fiduciary Principles and Public Offices, in The Oxford Handbook of Fiduciary Law 303 (Evan J. Criddle, Paul B. Miller & Robert H. Sitkoff eds., 2019); Ethan J. Leib & Andrew Kent, Fiduciary Law and the Law of Public Office: Suggestions for a Research Agenda, Wm. & Mary L. Rev. (forthcoming 2021) (on file with authors); Ethan J. Leib & Jed Handelsman Shugerman, Fiduciary Constitutionalism: Implications for Self-Pardons and Non-Delegation, 17 Geo. J.L. & Pub. Pol’y 463 (2019); Ethan J. Leib, David L. Ponet & Michael Serota, A Fiduciary Theory of Judging, 101 Calif. L. Rev. 699 (2013); Robert G. Natelson, The Constitution and the Public Trust, 52 Buff. L. Rev. 1077, 1140 (2004) [hereinafter Natelson, The Constitution and the Public Trust].
  4. Different scholars writing about what we call the “fiduciary Constitution” might have their own nomenclature. Our choice of terms, however, is not original and is not meant to be pejorative. See Lawson & Seidman, supra note 1 (title); Kent et al., supra note 1, at 2182; Leib & Shugerman, supra note 1 (title); id. at 464.
  5. E.g., Lawson & Seidman, supra note 1, at 91–98.
  6. See Leib & Shugerman, supra note 1, at 468–69, 475.
  7. See Lawson & Seidman, supra note 1, at 151–53, 170–71.
  8. See Leib & Shugerman, supra note 1, at 479–85.
  9. See generally Seth Davis, The False Promise of Fiduciary Government, 89 Notre Dame L. Rev. 1145 (2014) (analyzing differences between private fiduciaries and public officials and critiquing the lack of authority for fiduciary constitutionalism); Richard Primus, The Elephant Problem, 17 Geo. J.L. & Pub. Pol’y 373 (2019) (critically reviewing the evidence and methodology in Lawson & Seidman, supra note 1). Others have also criticized the over-extension of fiduciary concepts, albeit in different contexts. E.g., Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497 (2019).
  10. See Leib & Shugerman, supra note 1, at 477–79.
  11. Lawson & Seidman, supra note 1, at 112.
  12. Id. at 75 (referring to James Iredell’s quote regarding power of attorney).
  13. Barnett & Bernick, supra note 1, at 18–21; see also id. at 19 nn.81 & 83 (discussing common fiduciary relationships and duties); cf. Lawson & Seidman, supra note 1, at 76 (“[W]e think it close to obvious that the Constitution, as a legal document, is best understood as some kind of agency or fiduciary instrument, whereas the case for viewing it specifically as (or as like) a power of attorney is more attenuated.”); Leib et al., supra note 1, at 708, 712–13 (recognizing differences among different kinds of fiduciaries, as well as differences between public and private law, but relying on a general “fiduciary principle”).
  14. See, e.g., Barnett & Bernick, supra note 1, at 19–21.
  15. E.g., Lawson & Seidman, supra note 1, at 6 (“[W]e are making no claims about the extent to which the meaning we uncover should or must contribute to legal decision making.”); id. at 11 (“Again, we frame these interpretative conclusions in hypothetical form: to the extent that the Constitution can be seen as a fiduciary instrument, or in some cases as a fiduciary instrument of a particular kind, certain conclusions about the document’s meaning follow from that identification.”). The hedges and qualifications are more pronounced—and thus the conclusions more circumspect—in the article by Kent, Leib, and Shugerman than in some of the other literature. See, e.g., Kent et al., supra note 1, at 2190 (“We do not opine here on the way the framers envisioned enforcing the President’s duty of loyalty and avoiding self-dealing.”).
  16. E.g., Lawson & Seidman, supra note 1, at 7 (“Now to our affirmative project: understanding the fiduciary character of the Constitution is important not simply as a historical matter but also for its contribution to constitutional interpretation.”); id. at 11; Leib & Shugerman, supra note 1, at 465 (“[T]his article delves further into this language’s [i.e. the Take Care Clause’s] likely meaning, indicating how it can establish enforceable duties for public officials.”); see also Kent et al., supra note 1, at 2119 (claiming “that the best historical understanding of the meaning of the Faithful Execution Clauses is that they impose duties that we today—and some in the eighteenth century as well—would call fiduciary”). Richard Primus and Suzanna Sherry note this oscillation in Lawson and Seidman’s argument. Primus, supra note 7, at 400, 402–04; Suzanna Sherry, The Imaginary Constitution, 17 Geo. J.L. & Pub. Pol’y 441, 447–49 (2019) (reviewing Lawson & Seidman, supra note 1). For discussion of a similar tendency in Kent et al., supra note 1, see infra note 87.
  17. See infra Part II.
  18. E.g., Barnett & Bernick, supra note 1, at 20–21 (asserting that the Constitution’s “organization and language sounds in eighteenth-century fiduciary law”). More cautious on this point is Kent et al., supra note 1, at 2179–80 (“[W]hat the three meanings we can attribute to the [Faithful Execution] Clauses have in common is that they are all part of the basic ways the private law constrains fiduciary discretion and power.”).
  19. Contra Lawson & Seidman, supra note 1, at 62 (“The fiduciary responsibilities of a trustee and an attorney do not differ in any way material to our project.”).
  20. See, e.g., Kent et al., supra note 1, 2180–81 (describing the “crystalliz[ing]” of “the ‘private’ fiduciary law we would recognize today” as not occurring in America until late in the eighteenth century, and concluding that “a fiduciary law of ‘private’ offices was unlikely to have been plucked off-the-rack by the Philadelphia Convention drafters and applied to public offices”); id. at 2179 (“Our historical findings about the original meaning of the Faithful Execution Clauses align with core features of modern fiduciary law . . . . ”); Leib & Shugerman, supra note 1, at 468 (suggesting doubt about whether “private fiduciary law was itself fully formed at the time of the founding”).
  21. Leib & Shugerman, supra note 1, at 468–69 (“[Article II of the U.S. Constitution] uses the language of faith and care to signal to courts and to executive officials that the President was supposed to be held to the same kinds of fiduciary obligations to which corporate officers, trustees, and lawyers are routinely held today in the private sector.”).
  22. But cf. Davis, supra note 7, at 1182–95 (discussing whether that is advisable).
  23. See infra notes 161 and 164 and accompanying text. We do recognize that there is a spectrum of views about how much the interpretation of the constitutional text should be informed by the legal categories at the time of ratification (as part of context). The more one separates the text from its legal context, the more room there is to integrate constitutional law and political morality, and the less constraint there is from the original understanding (with the familiar virtues and vices of that interpretive equilibrium).
  24. See infra Section I.A.

Secrecy Surrogates

Debates about how best to check executive branch abuses of secrecy focus on three sets of actors that have access to classified information and that traditionally have served—in one way or another—as our surrogates: congressional committees, federal courts, and leakers or whistleblowers. These actors provide only limited checks on the Executive’s misuse of secrecy, however. Most legal scholarship bemoans their flaws but concludes that the status quo is the best that we can do. This Article challenges this account, arguing that there is a different set of actors—a set of unsung “secrecy surrogates”—that can provide additional checks on the quality and legality of the Executive’s classified operations in the cyber, election, and counter-terrorism settings.

Technology companies, states and localities, and foreign allies have become an integral part of U.S. national security operations and enjoy some critical advantages over our traditional surrogates. These actors possess expertise about—and in some cases control—national security-related targets, making them essential partners for the Executive. Further, these surrogates have incentives to check the Executive in ways that advance the public law values of accuracy, accountability, and legality. Finally, unlike leakers, these unsung secrecy surrogates can challenge the Executive without revealing government secrets. These surrogates can only check government abuses of secrecy as long as the Executive requires their cooperation, but they have begun to supplement our traditional surrogates in important ways.

This Article maps the growing role of these unsung secrecy surrogates, argues that they are well-situated to address some persistent secrecy problems, and proposes ways to preserve and enhance the surrogates’ position in the secrecy ecosystem in the future.

Introduction

Misuse of government secrecy is in the headlines. Consider the revelation that White House officials transferred the transcript of President Trump’s call with Ukraine’s President to a highly classified stand-alone computer system to prevent leaks.1.Julian E. Barnes, Michael Crowley, Matthew Rosenberg & Mark Mazzetti, White House Classified Computer System Is Used To Hold Transcripts of Sensitive Calls, N.Y. Times (Sept. 29, 2019), https://www.nytimes.com/2019/09/27/us/politics/nsc-ukraine-call.html [https://perma.cc/F9ZC-68Z3]; seeDustin Volz, Andrew Duehren & Natalie Andrews, White House Official Feared Trump Transcript Leak Could Be Politically Damaging, Wall St. J. (Nov. 17, 2019, 5:52 AM), https://www.wsj.com/articles/white-house-official-feared-trump-transcript-leak-could-be-politically-damaging-11573942481 [https://perma.cc/LV53-PL42].Show More For many, this incident reflects a paradigmatic problem with government secrecy: actors in the Executive can employ it as a tool to avoid politically embarrassing or legally problematic revelations.2.See, e.g., Ayesha Rascoe & Franco Ordoñez, Former Officials Say White House’s Use of Secret System Is Unusual, ‘Disturbing,’ NPR (Sept. 27, 2019, 5:40 AM), https://www.npr.org/2019/09/27/764759182/former-officials-say-white-houses-use-of-secret-system-is-unusual-disturbing [https://perma.cc/7PBJ-5MF8] (quoting former White House official as stating that “[t]his seems to be nothing more than an abuse of the classification and the information security system to safeguard not the information, but to effect a cover-up” (internal quotation marks omitted)).Show More This episode proved to be a success story. A government whistleblower carefully followed statutory procedures, and the Intelligence Community Inspector General shared the whistleblower’s complaint with Congress, which held impeachment hearings to judge the President’s actions. Yet the case may be just as notable for its uniqueness, given how infrequently the whistleblowing process works as intended.

Indeed, legal scholars and political scientists have long decried the current state of affairs, in which the Executive exercises near total control over secret government information with few external checks. A substantial literature wrestles with how to manage the genuine need for secrecy about many national security operations in a democracy whose government should be accountable to the people. Government secrecy can foster four types of problems. First, the Executive can employ secrecy to conceal unlawful acts, such as spying on political enemies. Second, the Executive can use secrecy to conceal poor or controversial judgments or policies. Third, the Executive can use secrecy to conceal incompetent, empirically wrong, or insufficient intelligence and analysis.3.See Loch K. Johnson, Governing in the Absence of Angels: On the Practice of Intelligence Accountability in the United States, in Who’s Watching the Spies? Establishing Intelligence Service Accountability 57, 61 (Hans Born, Loch K. Johnson & Ian Leigh eds., 2005) (quoting intelligence scholar as stating that the major problem facing U.S. intelligence in 2005 was that the “CIA [had] not been gathering enough quality data”).Show More Each of these three types of missteps is embarrassing to the Executive and creates incentives to conceal the underlying action.4.See Frederick A.O. Schwarz Jr., Democracy in the Dark: The Seduction of Government Secrecy 2 (2015) (“[T]oo much is kept secret not to protect America but to keep embarrassing or illegal conduct from Americans.”).Show More Fourth, making decisions in secret insulates the Executive from having to justify and defend those decisions in public.5.Robert M. Pallitto & William G. Weaver, Presidential Secrecy and the Law 3 (2007) (noting executive interest in “maintain[ing] presidential prerogative against congressional inquiries and judicial orders”); id. at 6 (“Where a president may do what is desired in secret, there is no reason to withstand the ordeal of a political battle to achieve the same ends.”); H.R. Select Comm. To Investigate Covert Arms Transactions with Iran & S. Select Comm. on Secret Military Assistance to Iran and the Nicaraguan Opposition, 100th Cong., Rep. of the Congressional Committees Investigating the Iran-Contra Affair, Minority Report 450, 515 (Comm. Print 1987) (stating that the President should undertake “democratic persuasion” to develop support for his policies and that he will not succeed “unless the public is exposed to and persuaded by a clear, sustained, and principled debate on the merits”); David E. Pozen, Deep Secrecy, 62 Stan. L. Rev. 257, 279 (2010) (discussing how secrecy provides “insulation from scrutiny”).Show More All of these possible abuses of secrecy engender public skepticism about the government and make it harder for the public—and U.S. allies—to trust the Executive in cases in which secrecy truly is necessary.6.See Pozen, supra note 5, at 280; S. Select Comm. To Study Governmental Operations with Respect to Intel. Activities, Final Report, S. Rep. No. 94-755, at 4 (1976) (“[T]here are many necessary and proper governmental activities that must be conducted in secrecy. . . . [However,] intelligence activities conducted outside the framework of the Constitution and statutes can undermine the treasured values guaranteed in the Bill of Rights. Further, if the intelligence agencies act in ways inimical to declared national purposes, they damage the reputation, power, and influence of the United States abroad.”).Show More

Legal scholarship about government secrecy usually focuses on three sets of actors that check and balance executive branch secrecy to reduce abuse.7.See, e.g., Rahul Sagar, Secrets and Leaks: The Dilemma of State Secrecy (2013) (considering role of Congress, the courts, whistleblowers, and leakers in managing government secrecy); Pallitto & Weaver, supra note 5 (considering Congress, the courts, and leaks); Michael P. Colaresi, Democracy Declassified: The Secrecy Dilemma in National Security 181 (2014) (discussing role of legislatures, freedom of information laws, and press freedom laws in checking executive secrecy); Mark Fenster, The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information (2017) (discussing the role of the press, freedom of information laws, anti-corruption non-governmental organizations, and leaks); Pozen, supra note 5, at 269, 274 (focusing on deep secret keeping by executive officials, treating Congress and the courts as the primary recipients of shallow secrets, and assuming that very few private actors generally will be aware of government secrets); Johnson, supra note 3, at 58 (noting that the “most consistent and serious manifestation of intelligence oversight has come not from presidential commissions, but from the media and the Congress”); Josh Chafetz, Whose Secrets?, 127 Harv. L. Rev. F. 86, 87 (2013) (emphasizing the role of Congress in the secrecy regime).Show More Two sets of actors lie in the Executive’s co-equal branches of government. In the 1970s, Congress created two intelligence committees—the Senate Select Committee on Intelligence (“SSCI”) and the House Permanent Select Committee on Intelligence (“HPSCI”)—in the wake of the Church and Pike Committees’ reports. The intelligence committees, which conduct much of their work in secret, directly oversee the intelligence community and its activities.8.Members of the committees that oversee military and foreign relations issues also have access to classified information relevant to their legislative and oversight tasks.Show More The 1970s reforms also produced the Foreign Intelligence Surveillance Court, in which Article III judges authorize executive surveillance for foreign intelligence purposes. Article III courts also review classified information and activities in cases involving state secrets, Freedom of Information Act litigation, and certain criminal cases.

Although not constitutionally linked to the public in the way that Congress and federal courts are, whistleblowers and leakers constitute a third set of actors who attempt to bring abuses (or alleged abuses) to the attention of actors outside the Executive. In the national security setting, leakers emerge from within the executive branch itself and usually remain anonymous. They reveal classified information to the public, often by sharing it with journalists who report on the programs or intelligence contained in the leak. Whistleblowers, on the other hand, follow a statutory process of revealing abuses to their agency’s inspector general and then potentially to members of Congress.

Some view these three sets of actors as surrogates for the broader public, which does not and often should not have access to government secrets. As the literature makes clear, however, all three groups are imperfect surrogates. Congressional committees lack the robust incentives and sometimes the deep experience necessary to check the Executive’s national security activities. Federal courts often doubt their own competence to evaluate secret government programs and so accord substantial deference to executive claims that certain disclosures will harm national security. Leakers reveal information sporadically and can harm genuine national security equities when they do so. Leaking classified information also generally violates criminal law. And whistleblowing is fraught: those who blow the whistle often are subject to retaliation, even though statutes prohibit such responses.

Notwithstanding the flaws in the capabilities and performance of these three groups, many have concluded that the current state of affairs is the best we can do. This Article challenges that conclusion, arguing that this model overlooks at least three other sets of actors who increasingly can and do play a role in curbing misuses of executive secrecy.9.I have argued elsewhere that other actors and mechanisms constrain the Executive in its classified operations, including executive branch lawyers and norms of reason giving. See Ashley Deeks, Checks and Balances from Abroad, 83 U. Chi. L. Rev. 65 (2016) [hereinafter Deeks, Checks and Balances]; Ashley S. Deeks, Secret Reason-Giving, 129 Yale L.J. 612 (2020) [hereinafter Deeks, Reason-Giving]; Ashley S. Deeks, The Substance of Secret Agreements and the Role of Government Lawyers, 111 AJIL Unbound 474 (2018).Show More In recent decades, the national security threat landscape has shifted from one of overt, kinetic state-to-state conflict to a landscape dominated by non-state actors and clandestine, hostile operations by foreign governments using new technologies. In light of these new threats, which manifest themselves in the form of pernicious cyber operations, election interference, and terrorist acts, three groups have assumed critical—though underappreciated—roles in the U.S. national security ecosystem.10 10.Additional actors play a role in what this Article terms the “secrecy ecosystem.” These actors include the Privacy and Civil Liberties Oversight Board, the Presidential Intelligence Advisory Board (“PIAB”), and the Defense Advisory Board. See, e.g., Kenneth Michael Absher, Michael C. Desch & Roman Popadiuk, Privileged and Confidential: The Secret History of the President’s Intelligence Advisory Board (2012) (discussing the PIAB); Johnson, supra note 3, at 73 (noting that when Brent Scowcroft was Chair of the PIAB, he produced a “hard-hitting review” of the intelligence organization). For reasons of space, however, this Article does not address the role of these other secrecy surrogates.Show More U.S. technology companies,11 11.By “technology companies,” I mean large social media, software, and computer technology companies such as Google, Microsoft, and Facebook, as well as companies that provide cybersecurity services, such as FireEye/Mandiant, Crowdstrike, and IronNet.Show More states and localities, and foreign allies all possess the capacities and incentives to check problematic uses of government secrecy. For example, technology companies exchange threat information and operational details of cyber attacks with government officials, comparing intelligence and sometimes litigating to contest government decisions to keep programs secret.12 12.Similar interactions conceivably occur with utility companies and private banks because these companies have been targets of thousands of hostile cyber operations. The Intelligence Community’s 2019 Threat Assessment noted, “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016.” Daniel R. Coats, Dir. of Nat’l Intel., Statement for the Record: Worldwide Threat Assessment of the U.S. Intelli-gence Community 6 (2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR—SSCI.pdf [https://perma.cc/M7DS-WPY4]. Further, the Intelligence Community is authorized to disseminate “classified reports to critical infrastructure entities authorized to receive them.” Off. of the Dir. of Nat’l Intel., Dep’t of Homeland Sec., Dep’t of Def. & Dep’t of Just., Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government Under the Cybersecurity Information Sharing Act of 2015, at 13 (2016), https://www.us-cert. gov/sites/default/files/ais_files/Federal_Government_Sharing_Guidance_(103).pdf. [https://p erma.cc/HYH7-XUCD]. This Article focuses on technology companies because they are most likely to be sophisticated consumers (and providers) of intelligence on cyber operations. Some utility companies are reportedly insufficiently focused on cybersecurity and thus are poorly positioned—at least right now—to play a significant role in checking a sophisticated actor like the Executive. For a critique of utility company cybersecurity practices, see Joseph Marks & Tonya Riley, The Cybersecurity 202: Activist Wants Court To Name and Shame Electric Utilities for Violating Cybersecurity Rules, Wash. Post (Dec. 3, 2019, 4:35 AM), https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/12/0­3/the-cybersecurity-202-activist-wants-court-to-name-and-shame-electric-utilities-for-viol­ating-cybersecurity-rules/5de550bf88e0fa652bbbdb18/ [https://perma.cc/N43C-Z4ZL]; Catherine Stupp, Utilities Are Prime Targets for Cyberattacks, WSJ Pro Cybersecurity (Aug. 7, 2019, 11:19 AM), https://www.wsj.com/articles/utilities-are-prime-target-for-cyberattacks-11565170204 [https://perma.cc/2S5J-EJU6] (“Utilities often don’t have enough employees with security clearance that lets them quickly get classified information about cyber threats from the federal government.”). Utilities, banks, and other operators of critical infrastructure may play a greater checking function in the future as they gain more experience with these threats. For a report recommending that the government enhance its sharing of classified information with utilities grid operators, see Nat’l Comm’n on Grid Resilience, Grid Resilience: Priorities for the Next Administration 28 (2020), https://gridresilience.org/wp-content/uploads/2020/08/NCGR-Report-2020-Full.pdf [https://perma.cc/5QMV-XUAN].Show More Foreign allies sometimes disagree with the U.S. intelligence community’s substantive intelligence judgments, challenging the United States to produce more or better intelligence.13 13.For example, the Trump Administration has tried for more than a year to persuade allies not to employ Huawei equipment in their 5G networks and has received pushback from a range of foreign governments. Robbie Gramer & Lara Seligman, Can the U.S.-U.K. Special Relationship Weather the Huawei Storm?, Foreign Pol’y (Jan. 30, 2020, 5:10 PM), https://foreignpolicy.com/2020/01/30/huawei-intelligence-united-states-britain-trump-5g-in­frastructure-concerns-digital-espionage-special-relationship-five-eyes/ [https://perma.cc/7Z­48-TKWX].Show More Although there are limited public examples of states and localities challenging secret executive activities directly in the election and cyber arenas, these sub-federal officials have the potential to do so because they possess fine-grained information about the election systems and critical infrastructure that are the targets of hostile cyber operations.14 14.For instance, in 2013, Los Angeles created a Cyber Intrusion Command Center, City of Los Angeles, Exec. Directive No. 2 (Oct. 30, 2013), https://www.lamayor.org/sites/g/files/wph446/f/page/file/ED2_with_signature_and_letterhead.pdf?1426620047 [https://perma.cc/6E9C-JC7M] (anticipating collaboration with the FBI and other federal agencies), and in 2017, New York City created its own Cyber Command, City of New York, Exec. Order No. 28 (July 11, 2017), https://www1.nyc.gov/a­ssets/home/downloads/pdf/executive-orders/2017/eo_28.pdf [https://perma.cc/7CNG-HA­MH] (anticipating collaboration with federal and state government agencies and the private sector); see also Brennan Weiss, Inside New York City Cyber Command, Bus. Insider (May 5, 2018, 8:00 AM), https://www.businessinsider.com/nyc-cyber-command-protecting-new-yorkers-2018-4 [https://perma.cc/46VA-MWC7].Show More Further, they historically have challenged certain federal counter-terrorism programs, which suggests that they may start to push back in the election and cyber settings as they gain expertise about the threat landscape.15 15.See Matthew C. Waxman, National Security Federalism in the Age of Terror, 64 Stan. L. Rev. 289, 333 (2012).Show More

These three groups have several important advantages over our traditional secrecy surrogates. First, they possess specific expertise about the new threats and new targets that Congress, the courts, and leakers might not. Certain technology companies and many allies are highly specialized in intelligence-gathering and analysis, and so are particularly well-suited to detect problematic executive performance in the secrecy space.16 16.A possible analogy is to the role of auditors, who verify the accuracy of the government’s records (here, its intelligence and analysis) and point out deficiencies in its operations. For the use of the concept of substantive audits in the intelligence setting, see Eric Posner, It’s Time to Audit America’s Secrets, Foreign Pol’y (Feb. 2, 2018, 5:13 PM), https://foreignpolicy.com/2018/02/02/its-time-to-audit-all-of-americas-secrets/ [https://per­ma.cc/LK65-W4NA]; Elizabeth Goitein & J. William Leonard, Opinion, America’s Unnecessary Secrets, N.Y. Times (Nov. 7, 2011), https://www.nytimes.com/­2011/11/07/opinion/national-security-and-americas-unnecessary-secrets.html [https://perma.cc/2UAL-GFKL] (arguing that one way to combat government over-classification is to allow agencies’ inspectors general to “audit officials’ classification decisions”).Show More Second, each of the three groups brings to the table irreplaceable access to information and infrastructure that the Executive needs to perform its job.17 17.See Michael Wines, State Officials Say They Are Told Too Little About Election Threats, N.Y. Times (Feb. 19, 2018), https://www.nytimes.com/2018/02/19/us/elections-states-hacking.html [https://perma.cc/77LU-KFCV] (describing the relationship between the Department of Homeland Security and local election officials as an “arranged marriage”).Show More For technology companies, it is the ability to observe and defend the front lines of critical infrastructure systems, attribute the sources of cyber attacks, and operate the very systems that are subject to foreign manipulation. For states and localities, it is control over and knowledge about election operations and machinery (and other critical infrastructure at the sub-federal level), as well as ground-level intelligence about terrorist activities inside the United States. For foreign allies, it is intelligence and expertise that the United States may not possess about shared threats. The Executive has persistent incentives to share intelligence with these actors to allow them to take necessary steps to enhance U.S. national security. This, in turn, renders them an audience that the Executive must persuade of the soundness of its intelligence and proposed operations.18 18.Deeks, Reason-Giving, supra note 9.Show More Third, unlike leakers, these three groups are positioned to challenge secret government operations without revealing those operations.19 19.Those who frame the government secrecy debate as a choice between secrecy and disclosure thus are misframing the issue. See Philip H. Melanson, Secrecy Wars 8, 183 (2001) (describing the “ongoing battle between secret keepers and those seeking access”).Show More

These, then, are our unsung “secrecy surrogates”: actors who are given access to secret information that average U.S. citizens are not and who can improve secret executive operations and help mitigate abuses. By “surrogates,” I do not mean that these groups have a direct constitutional, contractual, or agency relationship with the national populace—they generally do not.20 20.There is an irony here: in certain areas of classified government operations, these actors, which lack a constitutional relationship to our national polity, may be better positioned to alter the non-public behavior of the Executive than the courts and congressional committees, which are our direct surrogates.Show More Instead, I mean that these groups serve as our surrogates in a more general sense: as actors who take our place or are given a particular role in government operations because we are not able to serve in that role ourselves. In particular, these surrogates are positioned to enhance the Executive’s adherence to public law values by (1) stimulating the Executive to improve the accuracy of its intelligence; (2) diminishing the Executive’s opportunity to undertake illegal actions; and (3) increasing the Executive’s accountability for its classified choices.21 21.See Jody Freeman, Private Parties, Public Functions and the New Administrative Law, 52 Admin. L. Rev. 813, 818–19 (2000) (listing “openness, fairness, participation, consistency, rationality, impartiality, and accessibility of judicial review” as well as accountability and legality as public law values); id. at 819 (“Private actors are not just rent-seekers that exacerbate the traditional democracy problem in administrative law; they are also regulatory resources capable of contributing to the efficacy and legitimacy of administration.”); Michael Taggart, The Province of Administrative Law Determined?, in The Province of Administrative Law 1, 3 (Michael Taggart ed., 1997) (defining public law values to include openness, participation, accountability, honesty, and rationality); Mark Aronson, A Public Lawyer’s Response to Privatisation and Outsourcing, in The Province of Administrative Law 40, 43 (Michael Taggart ed., 1997).Show More It is difficult to obtain empirical, unclassified information about the full range of effects of these secrecy surrogates, and so this Article’s conclusions are necessarily tentative. However, based on available analyses of the ways that technology companies, foreign allies, and states and localities have behaved to date in the surveillance,22 22.Alan Z. Rozenshtein, Surveillance Intermediaries, 70 Stan. L. Rev. 99, 106 (2018).Show More cybersecurity,23 23.Kristen E. Eichensehr, Public-Private Cybersecurity, 95 Tex. L. Rev. 467, 471 (2017) [hereinafter Eichensehr, Public-Private Cybersecurity].Show More and counter-terrorism24 24.Waxman, supra note 15.Show More settings, it is clear that these actors can help ensure that U.S. intelligence operations are attentive to legal, procedural, and accuracy concerns and have begun to play this role.

David Pozen has argued that it is preferable in a democratic system like ours, in which the government must keep certain information secret, for those secrets to be shallow rather than deep. (By deep secrets, he means government secrets that only a small number of similarly situated officials know.)25 25.Pozen, supra note 5, at 274 (“[A] government secret is deep if a small group of similarly situated officials conceals its existence from the public and from other officials, such that the outsiders’ ignorance precludes them from learning about, checking, or influencing the keepers’ use of the information.”).Show More In his view, which I share, our system should favor shallow secrecy whenever possible, because doing so “will systematically lead to . . . outcomes that are deemed acceptable from a greater variety of perspectives, that have been more thoroughly reasoned and refined through a dialogic vetting process, that are better documented, that take longer to be finalized, and that are more likely to be publicized.”26 26.Id. at 275.Show More He argues that we can shift a secret from being deep to shallow by expanding the number and types of people who know the secret, even if the underlying information remains classified. Pozen, however, contemplates this as occurring primarily by expanding the number and type of secret keepers within the executive branch itself, as well as within Congress.27 27.Id. at 329–30, 333.Show More This Article argues that the Executive has, by necessity, begun to expand and diversify the number and type of secret keepers in areas that reach far beyond the executive branch or Congress. In so doing, the government is both decreasing the depth of its secrets and positioning these actors to check some of the persistent problems of government secrecy: the concealment of incompetent execution or illegality and the ability of the Executive to avoid justifying its decisions to outsiders.

This new system of surrogates, like the existing one it supplements, is imperfect. For many of the same reasons that our traditional secrecy surrogates do not act as fully faithful agents for the public, these secrecy surrogates offer only partial fixes to our secrecy challenges, even if they are independently powerful actors.28 28.Several scholars have considered government secrecy problems through a principal-agent lens. Daniel Epps identifies three mechanisms that could help reduce agency costs in the secrecy setting, one of which is the use of proxies. Daniel Epps, Note, Mechanisms of Secrecy, 121 Harv. L. Rev. 1556, 1558 (2008). Epps explores the use of proxies only briefly, however, and focuses on government actors who have a direct duty to the public (the FISC and the Executive). His note does not consider the operations of other proxies, such as those treated here as surrogates. Sidney Shapiro and Reina Steinzor use agency theory to evaluate how to hold Congress and the Executive accountable to the public in the face “burgeoning secrecy.” Sidney A. Shapiro & Rena I. Steinzor, The People’s Agent: Executive Branch Secrecy and Accountability in an Age of Terrorism, 69 Law & Contemp. Probs. 99, 101 (2006). They focus on who should have the power to declassify information, however, not on how other actors can check secret U.S. military and intelligence activities.Show More They have their own pathologies and policy preferences, have incomplete access to classified information, and could serve as a new source of leaks. These actors will not supplant the existing messiness of today’s interplay among the Executive, Congress, the courts, and leakers. Rather, they will supplement the reach of existing surrogates, expanding what Jack Goldsmith has framed, in the wider national security setting, as a “synopticon”—a distributed network of actors that surveils the Executive.29 29.Jack Goldsmith, Power and Constraint: The Accountable Presidency After 9/11, at 205–07 (2012).Show More This Article argues that adding knowledgeable players to the “secrecy synopticon” who can provide increased checks and monitoring without sacrificing much secrecy is a desirable development worth sustaining.

This Article makes three contributions. First, it shows descriptively that there are several unsung actors in the government secrecy ecosystem that help guard against the Executive’s misuse of secrecy, and that any evaluation of government secrecy that ignores these actors is importantly incomplete. It is well-understood that these types of actors play an important checking function in the public parts of government operations.30 30.See, e.g., Freeman, supra note 21, at 816–17 (describing how private actors participate publicly in governance through the regulatory process).Show More This Article shows that these actors also serve a checking function behind the veil of secrecy. Second, it analyzes the features of these groups that allow them to provide these checks. It draws attention to their role as necessary actors in the conduct of national security today; their on-the-ground expertise; and their ability to challenge the Executive without disclosing classified information. Third, the Article offers a normative defense of this development, identifying the surrogates’ incentives to improve the quality of intelligence, challenge legally questionable executive activities, and demand reasons for secret decisions. Thinking about the existence, role, and possibilities of these unsung secrecy surrogates can sharpen how we approach the challenges of government secrecy; identify where the coincidences of interest lie between these surrogates and the national public; suggest ways to preserve salutary overlaps in interest; and allow us to see where the most pressing gaps in oversight remain.

Part I identifies how the Executive can abuse secrecy, as well as the strengths and weaknesses of our traditional secrecy surrogates. Part II argues that several recent developments in national security threats have positioned technology companies, states and localities, and foreign allies to serve as unsung secrecy surrogates. Part III explores the incentives that these actors have to serve as checks on executive abuses of secrecy and considers how those incentives are aligned with the public law values of legality, accountability, rationality, participation, and, to some extent, transparency. Part IV places these unsung surrogates in the context of a broader “secrecy synopticon.” It addresses challenges to the argument that the unsung surrogates can perform robust checking functions and proposes modest ways to enhance their role in the synopticon.

  1. * Professor, University of Virginia Law School. Thanks to George Cohen, Jen Daskal, Kristen Eichensehr, Mike Flowers, John Harrison, Debbie Hellman, Rebecca Ingber, Nate Jones, Aaron Karczmer, Matt Olsen, Daphna Renan, Rich Schragger, Paul Stephan, and participants in the 2019 Duke-Virginia Foreign Relations Roundtable and in workshops at Harvard Law School and the University of Houston Law Center for very helpful conversations and comments.

  2. Julian E. Barnes, Michael Crowley, Matthew Rosenberg & Mark Mazzetti, White House Classified Computer System Is Used To Hold Transcripts of Sensitive Calls, N.Y. Times (Sept. 29, 2019), https://www.nytimes.com/2019/09/27/us/politics/nsc-ukraine-call.html [https://perma.cc/F9ZC-68Z3]; see Dustin Volz, Andrew Duehren & Natalie Andrews, White House Official Feared Trump Transcript Leak Could Be Politically Damaging, Wall St. J. (Nov. 17, 2019, 5:52 AM), https://www.wsj.com/articles/white-house-official-feared-trump-transcript-leak-could-be-politically-damaging-11573942481 [https://perma.cc/LV53-PL42].

  3. See, e.g., Ayesha Rascoe & Franco Ordoñez, Former Officials Say White House’s Use of Secret System Is Unusual, ‘Disturbing,’ NPR (Sept. 27, 2019, 5:40 AM), https://www.npr.org/2019/09/27/764759182/former-officials-say-white-houses-use-of-secret-system-is-unusual-disturbing [https://perma.cc/7PBJ-5MF8] (quoting former White House official as stating that “[t]his seems to be nothing more than an abuse of the classification and the information security system to safeguard not the information, but to effect a cover-up” (internal quotation marks omitted)).

  4. See Loch K. Johnson, Governing in the Absence of Angels: On the Practice of Intelligence Accountability in the United States, in Who’s Watching the Spies? Establishing Intelligence Service Accountability 57, 61 (Hans Born, Loch K. Johnson & Ian Leigh eds., 2005) (quoting intelligence scholar as stating that the major problem facing U.S. intelligence in 2005 was that the “CIA [had] not been gathering enough quality data”).

  5. See Frederick A.O. Schwarz Jr., Democracy in the Dark: The Seduction of Government Secrecy 2 (2015) (“[T]oo much is kept secret not to protect America but to keep embarrassing or illegal conduct from Americans.”).

  6. Robert M. Pallitto & William G. Weaver, Presidential Secrecy and the Law 3 (2007) (noting executive interest in “maintain[ing] presidential prerogative against congressional inquiries and judicial orders”); id. at 6 (“Where a president may do what is desired in secret, there is no reason to withstand the ordeal of a political battle to achieve the same ends.”); H.R. Select Comm. To Investigate Covert Arms Transactions with Iran & S. Select Comm. on Secret Military Assistance to Iran and the Nicaraguan Opposition, 100th Cong., Rep. of the Congressional Committees Investigating the Iran-Contra Affair, Minority Report 450, 515 (Comm. Print 1987) (stating that the President should undertake “democratic persuasion” to develop support for his policies and that he will not succeed “unless the public is exposed to and persuaded by a clear, sustained, and principled debate on the merits”); David E. Pozen, Deep Secrecy, 62 Stan. L. Rev. 257, 279 (2010) (discussing how secrecy provides “insulation from scrutiny”).

  7. See Pozen, supra note 5, at 280; S. Select Comm. To Study Governmental Operations with Respect to Intel. Activities, Final Report, S. Rep. No. 94-755, at 4 (1976) (“[T]here are many necessary and proper governmental activities that must be conducted in secrecy. . . . [However,] intelligence activities conducted outside the framework of the Constitution and statutes can undermine the treasured values guaranteed in the Bill of Rights. Further, if the intelligence agencies act in ways inimical to declared national purposes, they damage the reputation, power, and influence of the United States abroad.”).

  8. See, e.g., Rahul Sagar, Secrets and Leaks: The Dilemma of State Secrecy (2013) (considering role of Congress, the courts, whistleblowers, and leakers in managing government secrecy); Pallitto & Weaver, supra note 5 (considering Congress, the courts, and leaks); Michael P. Colaresi, Democracy Declassified: The Secrecy Dilemma in National Security 181 (2014) (discussing role of legislatures, freedom of information laws, and press freedom laws in checking executive secrecy); Mark Fenster, The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information (2017) (discussing the role of the press, freedom of information laws, anti-corruption non-governmental organizations, and leaks); Pozen, supra note 5, at 269, 274 (focusing on deep secret keeping by executive officials, treating Congress and the courts as the primary recipients of shallow secrets, and assuming that very few private actors generally will be aware of government secrets); Johnson, supra note 3, at 58 (noting that the “most consistent and serious manifestation of intelligence oversight has come not from presidential commissions, but from the media and the Congress”); Josh Chafetz, Whose Secrets?, 127 Harv. L. Rev. F. 86, 87 (2013) (emphasizing the role of Congress in the secrecy regime).

  9. Members of the committees that oversee military and foreign relations issues also have access to classified information relevant to their legislative and oversight tasks.

  10. I have argued elsewhere that other actors and mechanisms constrain the Executive in its classified operations, including executive branch lawyers and norms of reason giving. See Ashley Deeks, Checks and Balances from Abroad, 83 U. Chi. L. Rev. 65 (2016) [hereinafter Deeks, Checks and Balances]; Ashley S. Deeks, Secret Reason-Giving, 129 Yale L.J. 612 (2020) [hereinafter Deeks, Reason-Giving]; Ashley S. Deeks, The Substance of Secret Agreements and the Role of Government Lawyers, 111 AJIL Unbound 474 (2018).

  11. Additional actors play a role in what this Article terms the “secrecy ecosystem.” These actors include the Privacy and Civil Liberties Oversight Board, the Presidential Intelligence Advisory Board (“PIAB”), and the Defense Advisory Board. See, e.g., Kenneth Michael Absher, Michael C. Desch & Roman Popadiuk, Privileged and Confidential: The Secret History of the President’s Intelligence Advisory Board (2012) (discussing the PIAB); Johnson, supra note 3, at 73 (noting that when Brent Scowcroft was Chair of the PIAB, he produced a “hard-hitting review” of the intelligence organization). For reasons of space, however, this Article does not address the role of these other secrecy surrogates.

  12. By “technology companies,” I mean large social media, software, and computer technology companies such as Google, Microsoft, and Facebook, as well as companies that provide cybersecurity services, such as FireEye/Mandiant, Crowdstrike, and IronNet.

  13. Similar interactions conceivably occur with utility companies and private banks because these companies have been targets of thousands of hostile cyber operations. The Intelligence Community’s 2019 Threat Assessment noted, “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016.” Daniel R. Coats, Dir. of Nat’l Intel., Statement for the Record: Worldwide Threat Assessment of the U.S. Intelli-
    gence Community 6 (2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR—SSCI.pdf [https://perma.cc/M7DS-WPY4]. Further, the Intelligence Community is authorized to disseminate “classified reports to critical infrastructure entities authorized to receive them.” Off. of the Dir. of Nat’l Intel., Dep’t of Homeland Sec., Dep’t of Def. & Dep’t of Just., Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government Under the Cybersecurity Information Sharing Act of 2015, at 13 (2016), https://www.us-cert. gov/sites/default/files/ais_files/Federal_Government_Sharing_Guidance_(103).pdf. [https://p erma.cc/HYH7-XUCD]. This Article focuses on technology companies because they are most likely to be sophisticated consumers (and providers) of intelligence on cyber operations. Some utility companies are reportedly insufficiently focused on cybersecurity and thus are poorly positioned—at least right now—to play a significant role in checking a sophisticated actor like the Executive. For a critique of utility company cybersecurity practices, see Joseph Marks & Tonya Riley, The Cybersecurity 202: Activist Wants Court To Name and Shame Electric Utilities for Violating Cybersecurity Rules, Wash. Post (Dec. 3, 2019, 4:35 AM), https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/12/0­3/the-cybersecurity-202-activist-wants-court-to-name-and-shame-electric-utilities-for-viol­ating-cybersecurity-rules/5de550bf88e0fa652bbbdb18/ [https://perma.cc/N43C-Z4ZL]; Catherine Stupp, Utilities Are Prime Targets for Cyberattacks, WSJ Pro Cybersecurity (Aug. 7, 2019, 11:19 AM), https://www.wsj.com/articles/utilities-are-prime-target-for-cyberattacks-11565170204 [https://perma.cc/2S5J-EJU6] (“Utilities often don’t have enough employees with security clearance that lets them quickly get classified information about cyber threats from the federal government.”). Utilities, banks, and other operators of critical infrastructure may play a greater checking function in the future as they gain more experience with these threats. For a report recommending that the government enhance its sharing of classified information with utilities grid operators, see Nat’l Comm’n on Grid Resilience, Grid Resilience: Priorities for the Next Administration 28 (2020), https://gridresilience.org/wp-content/uploads/2020/08/NCGR-Report-2020-Full.pdf [https://perma.cc/5QMV-XUAN].

  14. For example, the Trump Administration has tried for more than a year to persuade allies not to employ Huawei equipment in their 5G networks and has received pushback from a range of foreign governments. Robbie Gramer & Lara Seligman, Can the U.S.-U.K. Special Relationship Weather the Huawei Storm?, Foreign Pol’y (Jan. 30, 2020, 5:10 PM), https://foreignpolicy.com/2020/01/30/huawei-intelligence-united-states-britain-trump-5g-in­frastructure-concerns-digital-espionage-special-relationship-five-eyes/ [https://perma.cc/7Z­48-TKWX].

  15. For instance, in 2013, Los Angeles created a Cyber Intrusion Command
    Center, City of Los Angeles, Exec. Directive No. 2 (Oct. 30, 2013), https://www.lamayor.org/sites/g/files/wph446/f/page/file/ED2_with_signature_and_letterhead.pdf?1426620047 [https://perma.cc/6E9C-JC7M] (anticipating collaboration with the FBI and other federal agencies), and in 2017, New York City created its own Cyber Command, City of New York, Exec. Order No. 28 (July 11, 2017), https://www1.nyc.gov/a­ssets/home/downloads/pdf/executive-orders/2017/eo_28.pdf [https://perma.cc/7CNG-HA­MH] (anticipating collaboration with federal and state government agencies and the private sector); see also Brennan Weiss, Inside New York City Cyber Command, Bus. Insider (May 5, 2018, 8:00 AM), https://www.businessinsider.com/nyc-cyber-command-protecting-new-yorkers-2018-4 [https://perma.cc/46VA-MWC7].

  16. See Matthew C. Waxman, National Security Federalism in the Age of Terror, 64 Stan. L. Rev. 289, 333 (2012).

  17.  A possible analogy is to the role of auditors, who verify the accuracy of the
    government’s records (here, its intelligence and analysis) and point out deficiencies
    in its operations. For the use of the concept of substantive audits in the intelligence
    setting, see Eric Posner, It’s Time to Audit America’s Secrets, Foreign Pol’y (Feb. 2, 2018, 5:13 PM), https://foreignpolicy.com/2018/02/02/its-time-to-audit-all-of-americas-secrets/ [https://per­ma.cc/LK65-W4NA]; Elizabeth Goitein & J. William Leonard,
    Opinion, America’s Unnecessary Secrets, N.Y. Times (Nov. 7, 2011), https://www.nytimes.com/­2011/11/07/opinion/national-security-and-americas-unnecessary-secrets.html [https://perma.cc/2UAL-GFKL] (arguing that one way to combat government over-classification is to allow agencies’ inspectors general to “audit officials’ classification decisions”).

  18. See Michael Wines, State Officials Say They Are Told Too Little About Election Threats, N.Y. Times (Feb. 19, 2018), https://www.nytimes.com/2018/02/19/us/elections-states-hacking.html [https://perma.cc/77LU-KFCV] (describing the relationship between the Department of Homeland Security and local election officials as an “arranged marriage”).

  19. Deeks, Reason-Giving, supra note 9.

  20.  Those who frame the government secrecy debate as a choice between secrecy and disclosure thus are misframing the issue. See Philip H. Melanson, Secrecy Wars 8, 183 (2001) (describing the “ongoing battle between secret keepers and those seeking access”).

  21. There is an irony here: in certain areas of classified government operations, these actors, which lack a constitutional relationship to our national polity, may be better positioned to alter the non-public behavior of the Executive than the courts and congressional committees, which are our direct surrogates.

  22. See Jody Freeman, Private Parties, Public Functions and the New Administrative Law, 52 Admin. L. Rev. 813, 818–19 (2000) (listing “openness, fairness, participation, consistency, rationality, impartiality, and accessibility of judicial review” as well as accountability and legality as public law values); id. at 819 (“Private actors are not just rent-seekers that exacerbate the traditional democracy problem in administrative law; they are also regulatory resources capable of contributing to the efficacy and legitimacy of administration.”); Michael Taggart, The Province of Administrative Law Determined?, in The Province of Administrative Law 1, 3 (Michael Taggart ed., 1997) (defining public law values to include openness, participation, accountability, honesty, and rationality); Mark Aronson, A Public Lawyer’s Response to Privatisation and Outsourcing, in The Province of Administrative Law 40, 43 (Michael Taggart ed., 1997).

  23. Alan Z. Rozenshtein, Surveillance Intermediaries, 70 Stan. L. Rev. 99, 106 (2018).

  24. Kristen E. Eichensehr, Public-Private Cybersecurity, 95 Tex. L. Rev. 467, 471 (2017) [hereinafter Eichensehr, Public-Private Cybersecurity].

  25. Waxman, supra note 15.

  26. Pozen, supra note 5, at 274 (“[A] government secret is deep if a small group of similarly situated officials conceals its existence from the public and from other officials, such that the outsiders’ ignorance precludes them from learning about, checking, or influencing the keepers’ use of the information.”).

  27. Id. at 275.

  28. Id. at 329–30, 333.

  29. Several scholars have considered government secrecy problems through a principal-agent lens. Daniel Epps identifies three mechanisms that could help reduce agency costs in the secrecy setting, one of which is the use of proxies. Daniel Epps, Note, Mechanisms of Secrecy, 121 Harv. L. Rev. 1556, 1558 (2008). Epps explores the use of proxies only briefly, however, and focuses on government actors who have a direct duty to the public (the FISC and the Executive). His note does not consider the operations of other proxies, such as those treated here as surrogates. Sidney Shapiro and Reina Steinzor use agency theory to evaluate how to hold Congress and the Executive accountable to the public in the face “burgeoning secrecy.” Sidney A. Shapiro & Rena I. Steinzor, The People’s Agent: Executive Branch Secrecy and Accountability in an Age of Terrorism, 69 Law & Contemp. Probs. 99, 101 (2006). They focus on who should have the power to declassify information, however, not on how other actors can check secret U.S. military and intelligence activities.

  30. Jack Goldsmith, Power and Constraint: The Accountable Presidency After 9/11, at 205–07 (2012).

  31. See, e.g., Freeman, supra note 21, at 816–17 (describing how private actors participate publicly in governance through the regulatory process).

Firearms, Extreme Risk, and Legal Design: “Red Flag” Laws and Due Process

Extreme risk protection order (“ERPO”) laws—often called “red flag” laws—permit the denial of firearms to individuals who a judge has determined present an imminent risk of harm to themselves or others. Following a wave of adoptions in the wake of the Parkland murders, such orders are now authorized by law in nineteen states and the District of Columbia and under consideration in many others. Advocates argue that they provide a tailored, individualized way to deter homicide, suicide, and even mass shootings by providing a tool for law enforcement or others to intervene when harm appears imminent, without having to wait for injury, lethality, or criminal actions to occur. But the laws have also garnered criticism and have become a primary target of the Second Amendment sanctuary movement.

As a matter of constitutional law, the most serious questions about ERPO laws involve not the right to keep and bear arms but due process. Such orders—like domestic violence restraining orders, to which they are often compared—can initially be issued ex parte, and critics often allege that this feature (and others including the burden of proof) raises constitutional problems.

This Article provides a comprehensive analysis of the applicable due process standards and identifies the primary issues of concern. It concludes that, despite some variation, current ERPOs generally satisfy the relevant standards. It also notes those features that are likely to give rise to the strongest challenges. The analysis both builds on and suggests lessons for other areas of regulation where laws are designed so as to lessen extreme risk.

Introduction

What process is due when people who pose an extreme risk of harm to themselves or others are temporarily deprived of a constitutional right? What design choices can legislators make to ensure that such deprivations provide constitutionally adequate protections?

Although such questions have arisen in many different contexts, including domestic violence restraining orders and civil commitments, they are now front and center for what is arguably the most important current development in firearms regulation: the spread of “extreme risk” or “red flag” laws that permit courts to order that firearms be temporarily removed from individuals who pose an imminent risk of harm to themselves or others. Advocates see these laws as an effective, targeted way to save lives while respecting the Second Amendment.1.See infra Section I.A.Show More Critics allege that they amount to “pre-crime” punishment and that they violate not only the right to keep and bear arms but also the due process guarantee.2.See infra note 159 and accompanying text (“pre-crime” comparison); infra notes 81–88 and accompanying text (Second Amendment critique); infra notes 29–30 (due process critique).Show More In fact, opposition to extreme risk laws has helped fuel the “Second Amendment sanctuary” movement, by which some local governments have pledged their refusal to enforce state and federal gun laws.3.Noah Shepardson, America’s Second Amendment Sanctuary Movement Is Alive and Well, Reason (Nov. 21, 2019, 4:00 PM), https://reason.com/2019/11/21/americas-second-amendment-sanctuary-movement-is-alive-and-well/ [https://perma.cc/XKV7-ADF4]; see also Scott Pelley, A Look at Red Flag Laws and the Battle Over One in Colorado, 60 Minutes, CBS News (Nov. 17, 2019), https://www.cbsnews.com/news/red-flag-gun-laws-a-standoff-in-colorado-60-minutes-2019-11-17/ [https://perma.cc/GF5D-BSH2] (examining Second Amendment sanctuaries in Colorado).Show More

Behind the political claims lies an enormously important and difficult set of questions regarding the ways in which the law can be constitutionally designed to account for risky-but-not-criminal behavior. Judges and scholars have long recognized that laws regulating on the basis of future risk raise a different and in many ways harder set of questions than those that, for example, punish prior behavior.4.Both categories, of course, may well be based on prior behavior—in the former set, that behavior is evidence of future risk; in the latter, it is the basis for retribution or some other governmental interest.Show More On the one hand, the law often restricts behavior on the basis of predictions. Even basic cost-benefit analysis—which is foundational to the regulatory state5.See Richard L. Revesz & Michael A. Livermore, Retaking Rationality: How Cost-Benefit Analysis Can Better Protect the Environment and Our Health910 (2008) (noting that the use of cost-benefit analysis has been a contentious issue in regulatory policy making for decades); Cass R. Sunstein, The Cost-Benefit Revolution34, 67 (2018) (describing how successive Presidents since Ronald Reagan have required that regulations promulgated during their administrations be justified on a cost-benefit basis).Show More—is largely forward-looking. Regulation of risk, in short, is nothing new.6.Nor, for that matter, is the notion that regulation often involves trading off one risk against another: denying a firearm to a particular person might lower the risk that he will misuse it, while raising the risk that he will be unable to defend himself in a time of need. For an influential analysis of the tradeoff question, seeRisk Versus Risk: Tradeoffs in Protecting Health and the Environment 3­–5 (John D. Graham & Jonathan Baert Wiener eds., 1995).Show More

But when such regulation intersects with constitutional rights and interests in the absence of a criminal conviction or its equivalent, harder questions arise about the necessary procedures and evidentiary burdens. Intuitively, restraining a person who has harmed others is different from restraining someone who is only at risk of doing so. There is no bright line: civil commitments, restraining orders, and the like all impose significant restraints in an effort to prevent future harms and are not categorically unconstitutional. Scholars have explored those related contexts7.For a sampling of the literature regarding involuntary commitments for mental illness, seeDavid L. Bazelon, Institutionalization, Deinstitutionalization and the Adversary Process, 75 Colum. L. Rev. 897, 899–900 (1975) (asking “[i]s confinement on the basis of ‘dangerousness’ alone constitutional?” and providing a skeptical answer); Veronica J. Manahan, When Our System of Involuntary Civil Commitment Fails Individuals with Mental Illness: Russell Weston and the Case for Effective Monitoring and Medication Delivery Mechanisms, 28 Law & Psych. Rev. 1, 32 (2004) (“Civil liberty concerns, as evidenced by the extensive due process protections afforded to those facing involuntary commitment, and the state’s interest in protecting all of its citizens, are fundamentally at odds.”); Alexander Tsesis, Due Process in Civil Commitments, 68 Wash. & Lee L. Rev. 253, 300–01 (2011) (arguing that civil commitment should require a beyond-a-reasonable-doubt standard of proof).Scholars have also explored due process protections as they apply to domestic violence restraining orders (“DVROs”) and similar legal restrictions. See, e.g., Shawn E. Fields, Debunking the Stranger-in-the-Bushes Myth: The Case for Sexual Assault Protection Orders, 2017 Wis. L. Rev. 429, 484 (arguing that sexual assault protection orders—which are different from DVROs—“should employ the lower preponderance-of-the-evidence standard to ensure that victims have an effective mechanism to seek prospective relief and governments have an effective tool in combating the sexual assault epidemic” and stating “[h]owever, procedural due process may require a more nuanced approach with respect to the types of evidentiary showings necessary to meet this standard and with the types of prospective relief available to petitioners”).Show More but have only recently devoted attention to these questions in the context of extreme risk laws,8.Timothy Zick, The Constitutional Case for “Red Flag” Laws, Jurist (Dec. 6, 2019, 8:39 PM), https://www.jurist.org/commentary/2019/12/timothy-zick-red-flag-laws/ [https://perm a.cc/G3TS-L53G]. Other scholars have looked at the due process implications of other types of similar statutory mechanisms, like DVROs with specific firearm prohibitions, Aaron Edward Brown, This Time I’ll Be Bulletproof: Using Ex Parte Firearm Prohibitions to Combat Intimate-Partner Violence, 50 Colum. Hum. Rts. L. Rev. 159, 196–98 (2019) (arguing that domestic violence ex parteorders for protection that prohibit firearm possession can survive due process challenges), or laws designed to disarm those in the throes of severe mental health crises, Fredrick E. Vars, Symptom-Based Gun Control, 46 Conn. L. Rev. 1633, 1646–47 (2014) (arguing that a law allowing temporary firearm removal from individuals suffering delusions or hallucinations would not violate due process). None, so far, has assessed the new spate of extreme risk laws passed predominantly in the last two years.Show More and this Article is the first to provide an in-depth examination of the due process issues they raise. (These are often called “red flag” laws, though that label might convey a stigma, so we will use the increasingly common “extreme risk” label.9.See Red Flag Laws: Examining Guidelines for State Action: Hearing Before the S. Comm. on the Judiciary, 116th Cong. (2019) (statement of Ronald Honberg, Senior Policy Advisor, National Alliance on Mental Illness) (describing the risk that “red flag” language can stigmatize individuals with mental illness).Show More)

In the past two years alone, a dozen states have adopted or expanded such laws. Although the details vary, their form is similar: law enforcement officers or sometimes family members or other professionals can petition a court for an extreme risk protection order (“ERPO”)10 10.In California, the order is known as a “gun violence restraining order” or “GVRO.” Cal. Penal Code § 18100 (Deering Supp. 2020).Show More that would require a person to surrender his or her firearms and refrain from acquiring new ones. After receiving the petition, the court can enter a short-term, ex parte ERPO if the petitioner carries his or her burden of proof (which can range from showing “good cause” to “clear and convincing” evidence11 11.See infra notes 302–09 and accompanying text; see also infra Section II.B (discussing constitutional principles for establishing burden of proof and how they should apply in the ERPO context).Show More). After a full, adversary hearing—at which petitioner again bears the burden of proof—the court can enter a lengthier, but still temporary, ERPO.12 12.See infranote 309 and accompanying text.Show More

Politically and empirically, it is easy to see why such laws are increasingly popular. They provide tailored, individualized risk assessments, rather than regulating people’s access to firearms based on their membership in broad classes like felons or the mentally ill.13 13.See infraSubsection I.B.1.Show MoreAnd although scholars are just beginning to evaluate the effectiveness of these new laws, early studies have shown encouraging results.14 14.See infra notes 70–82 and accompanying text. That extreme risk laws might be effective does not make them a panacea, nor should they distract from other forms of effective gun regulation. SeeJoseph Pomianowski & Ling Liang Dong, Red Flag Laws Are Red Herrings of Gun Control, Wired (Sept. 9, 2019, 9:00 AM), https://www.wired.com/story/red-flag-laws-are-red-herrings-of-gun-control/ [https://perma.cc/PSN8-B2UK].Show More This all points to ERPOs being an increasingly important part of the debate about gun rights and regulation going forward.

Of course, there are critics. Some argue that extreme risk laws violate the right to keep and bear arms.15 15.Ivan Pereira, Lawmaker Introduces ‘Anti-Red Flag’ Bill in Georgia To Combat Gun Control Proposals, ABC News (Jan. 15, 2020, 12:52 PM), https://abcnews.go.com/­US/lawmaker-introduces-anti-red-flag-bill-georgia-combat/story?id=68299434 [https://perm a.cc/7V9S-7CMX] (describing legislation introduced in Georgia to forbid extreme risk laws that bears the title “Anti-Red Flag—Second Amendment Conservation Act”).Show More These critics challenge the very notion of a law that allows disarming individuals who have not committed any crime. District of Columbia v. Heller, after all, said the Second Amendment “elevates above all other interests the right of law-abiding, responsible citizens to use arms in defense of hearth and home.”16 16.554 U.S. 570, 635 (2008) (emphasis added).Show More

The focus on the right to keep and bear arms is unsurprising, given the magnetic pull of the Second Amendment in nearly any political or legal discussion of gun regulation; the tendency is often to evaluate any proposed rule related to firearms for its conformity with that right in particular.17 17.See generally Joseph Blocher, Gun Rights Talk, 94 B.U. L. Rev. 813 (2014) (arguing that the invocation of the Second Amendment in debates over proposed gun control laws has defeated many of these measures).Show More But a myopic focus on the Second Amendment unnecessarily flattens the gun debate and minimizes different—and often stronger—constitutional claims.18 18.A federal court in California, for example, blocked on First Amendment grounds a Los Angeles law that would have required city contractors to disclose ties to the NRA. As the NRA put it, the “First Amendment Defends the Second.” See First Amendment Defends the Second, NRA-ILA (Dec. 16, 2019), https://www.nraila.org/articles/20191216/first-amendment-defends-the-second [https://perma.cc/L5TF-6PVS].Show More More generally, it demonstrates the importance of firearms law and scholarship which consider how gun rights intersect with other constitutional rights, including those emanating from the First,19 19.See, e.g., Timothy Zick, Arming Public Protests, 104 Iowa L. Rev. 223, 236–37 (2018) (considering, interalia, the First Amendment rights of speech and assembly and their interaction with the Second Amendment); Luke Morgan, Note, Leave Your Guns at Home: The Constitutionality of a Prohibition on Carrying Firearms at Political Demonstrations, 68 Duke L.J. 175, 179, 211–13 (2018) (same).Show More Fourth,20 20.See, e.g., Jeffrey Bellin, The Right To Remain Armed, 93 Wash. U. L. Rev. 1, 4–5 (2015) (considering implications for search and seizure).Show More and Fourteenth21 21.See, e.g., Pratheepan Gulasekaram, “The People” of the Second Amendment: Citizenship and the Right to Bear Arms, 85 N.Y.U. L. Rev. 1521, 1538 (2010) (illustrating and analyzing the difficulties of limiting “the people” to non-citizens).Show More Amendments.22 22.Not only do these other rights and interests intersect with the Second Amendment in important ways, but the courts have also borrowed from many of these frameworks when fleshing out the contours of the right to keep and bear arms. SeeJacob D. Charles, Constructing a Constitutional Right: Borrowing and Second Amendment Design Choices, 99 N.C. L. Rev. (forthcoming 2021) (manuscript at 1–2) (on file with the Virginia Law Review) (describing how courts and commentators have borrowed from other constitutional rights domains in creating a framework for the Second Amendment).Show More

In this increasingly rich and diverse area of constitutional law, scholarship, and rhetoric, due process has a particularly notable role to play. Consider the debate over “No Fly No Buy,” which would have forbidden gun purchases by those on the federal terror watch list. The proposal had broad23 23.See, e.g., Press Release, Quinnipiac Univ., Overwhelming Support for No-Fly, No-Buy Gun Law, Quinnipiac University National Poll Finds; Support for Background Checks Tops 90 Percent Again (June 30, 2016), https://poll.qu.edu/national/release-detail?ReleaseID=2364 [https://perma.cc/C74J-XGWG].Show More and bipartisan24 24.David M. Herszenhorn, Bipartisan Senate Group Proposes ‘No Fly, No Buy’ Gun Measure, N.Y. Times (June 21, 2016), https://www.nytimes.com/2016/06/22/us/politics/ senate-gun-control-no-fly-list-terrorism.html [https://perma.cc/4J99-TKVT].Show More political support. Some critics predictably argued that it violated the Second Amendment,25 25.See, e.g., Chris W. Cox, Gun Laws Don’t Deter Terrorists: Opposing View, USA Today (June 14, 2016, 1:01 AM), https://www.usatoday.com/story/opinion/2016/06/13/gun-laws-deter-terrorists-opposing-view/85844946/ [https://perma.cc/Q6S7-9C52].Show More but as a matter of doctrine the more serious objections had to do with due process.26 26.See Hina Shamsi & Christopher Anders, The Use of Error-Prone and Unfair Watchlists Is Not the Way To Regulate Guns in America, ACLU (June 20, 2016, 2:45 PM), https://www.aclu.org/blog/washington-markup/use-error-prone-and-unfair-watchlists-not-way-regulate-guns-america [https://perma.cc/YA9S-NYBS]; see also Joseph Greenlee, No Fly, No Buy (And No Due Process), Federalist Soc’y (Feb. 17, 2016), http://www.fed-soc.org/blog/detail/no-fly-no-buy-and-no-due-process [https://perma.cc/V4U6-7ERV].Show More Partly as a result, the proposal ultimately died in the Senate.27 27.Lisa Mascaro & Jill Ornitz, Senate Rejects New Gun Sales Restrictions, L.A. Times, June 21, 2016, at A8.Show More

A similar dynamic seems to be at work with ERPOs, except that the consequences are far more important, since such laws have been widely adopted.28 28.See infra Section I.A (describing the spread of extreme risk laws).Show More Although the Second Amendment continues to draw much of the attention, the more substantive and pressing concern is whether ERPOs violate gun owners’ due process rights. When the Senate held a hearing in 2019 about possibly providing federal incentives for state extreme risk laws, due process concerns were front and center.29 29.Marianne Levine, Senate GOP Open to States Allowing Narrow Gun Restriction, Politico (Mar. 26, 2019, 1:05 PM), https://www.politico.com/story/2019/03/26/senate-republicans-state-gun-law-reform-1237446 [https://perma.cc/F32F-F6EQ].Show More Indeed, in some areas of the states that have adopted extreme risk laws, local officials have vowed not to implement them. One Colorado sheriff put the critique bluntly: “This is the only bill I know of that allows law enforcement officers to take somebody’s property without due process.”30 30.Governor Polis Signs ERPO Into Law, Delta Cnty. Indep. (Apr. 17, 2019), https://www.deltacountyindependent.com/governor-polis-signs-erpo-into-law-cms-15033 [https://perma.cc/S2N7-NW6M].Show More

But, of course, that assumes the answer to the central question: do extreme risk laws provide due process? If so, then “due process” objections should be recognized for what they are: political rhetoric, rather than doctrinal claims.31 31.To be clear, we do not suppose that there is a bright line between “constitutional” and “political” claims—constitutional law and argument often occur outside the courts, and in fact the Second Amendment provides an especially robust and interesting example in that regard. SeeJacob D. Charles, The Right To Keep and Bear Arms Outside the Second Amendment 7 (Feb. 23, 2020) (unpublished manuscript) (on file with the Virginia Law Review).Show More If not, then no amount of political or empirical support will suffice, and this promising new avenue of gun regulation will be shut down by the courts.

This Article examines that question. Part I explains the spread and substance of current extreme risk laws. The wave of new extreme risk laws has encountered opposition from those who claim, often with little attention to the details of the different statutory regimes and the variety among them, that they violate due process. Part II lays out the relevant requirements of due process and applies that framework to the extreme risk context. Such an analysis can, we hope, be useful to lawmakers, litigants, judges, and scholars interested in designing or evaluating the constitutionality of extreme risk laws. Although we do not undertake an exhaustive or individualized assessment of various state laws, we conclude that the basic structure of existing extreme risk laws satisfies the requirements of due process.

The point of the analysis, however, is not to provide a blanket constitutional defense of extreme risk laws. The goal instead is to identify and explore an engaging set of constitutional issues raised by a new wave of firearm regulations. Those issues, in turn, are relevant to our understanding of how the Constitution intersects with risk regulation, and what options society has to protect itself from potential harms.

  1. * Lanty L. Smith ’67 Professor of Law, Duke University School of Law.
  2. ** Lecturing Fellow & Executive Director, Center for Firearms Law, Duke University School of Law.Many thanks to Saul Cornell, Dave Kopel, Anne Levinson, Darrell Miller, Kelly Roskam, Eric Ruben, Jeff Swanson, Fredrick Vars, Julia Weber, Shawn Fields, and Tim Zick for invaluable comments and feedback, as well as to the participants at the University of Alabama School of Law symposium, “Seeing Red: Risk-Based Gun Regulation.”
  3. See infra Section I.A.
  4. See infra note 159 and accompanying text (“pre-crime” comparison); infra notes 81–88 and accompanying text (Second Amendment critique); infra notes 29–30 (due process critique).
  5. Noah Shepardson, America’s Second Amendment Sanctuary Movement Is Alive and Well, Reason (Nov. 21, 2019, 4:00 PM), https://reason.com/2019/11/21/americas-
    second-amendment-sanctuary-movement-is-alive-and-well/ [https://perma.cc/XKV7-ADF4]; see also Scott Pelley, A Look at Red Flag Laws and the Battle Over One in Colorado, 60 Minutes, CBS News (Nov. 17, 2019), https://www.cbsnews.com/news/red-flag-gun-laws-a-standoff-in-colorado-60-minutes-2019-11-17/ [https://perma.cc/GF5D-BSH2] (examining Second Amendment sanctuaries in Colorado).
  6. Both categories, of course, may well be based on prior behavior—in the former set, that behavior is evidence of future risk; in the latter, it is the basis for retribution or some other governmental interest.
  7. See Richard L. Revesz & Michael A. Livermore, Retaking Rationality: How Cost-Benefit Analysis Can Better Protect the Environment and Our Health
    9

    10

    (2008) (noting that the use of cost-benefit analysis has been a contentious issue in regulatory policy making for decades); Cass R. Sunstein, The Cost-Benefit Revolution

    3

    4, 6–7

    (2018) (describing how successive Presidents since Ronald Reagan have required that regulations promulgated during their administrations be justified on a cost-benefit basis).

  8. Nor, for that matter, is the notion that regulation often involves trading off one risk against another: denying a firearm to a particular person might lower the risk that he will misuse it, while raising the risk that he will be unable to defend himself in a time of need. For an influential analysis of the tradeoff question, see Risk Versus Risk: Tradeoffs in Protecting Health and the Environment 3­–5 (John D. Graham & Jonathan Baert Wiener eds., 1995).
  9. For a sampling of the literature regarding involuntary commitments for mental illness, see David L. Bazelon, Institutionalization, Deinstitutionalization and the Adversary Process, 75 Colum. L. Rev
    .

    897, 899–900 (1975) (asking “[i]s confinement on the basis of ‘dangerousness’ alone constitutional?” and providing a skeptical answer); Veronica J. Manahan, When Our System of Involuntary Civil Commitment Fails Individuals with Mental Illness: Russell Weston and the Case for Effective Monitoring and Medication Delivery Mechanisms, 28 Law & Psych. Rev

    .

    1, 32 (2004) (“Civil liberty concerns, as evidenced by the extensive due process protections afforded to those facing involuntary commitment, and the state’s interest in protecting all of its citizens, are fundamentally at odds.”); Alexander Tsesis, Due Process in Civil Commitments, 68 Wash. & Lee L. Rev

    .

    253, 300–01 (2011) (arguing that civil commitment should require a beyond-a-reasonable-doubt standard of proof).

    Scholars have also explored due process protections as they apply to domestic violence restraining orders (“DVROs”) and similar legal restrictions. See, e.g., Shawn E. Fields, Debunking the Stranger-in-the-Bushes Myth: The Case for Sexual Assault Protection Orders, 2017 Wis. L. Rev. 429, 484 (arguing that sexual assault protection orders—which are different from DVROs—“should employ the lower preponderance-of-the-evidence standard to ensure that victims have an effective mechanism to seek prospective relief and governments have an effective tool in combating the sexual assault epidemic” and stating “[h]owever, procedural due process may require a more nuanced approach with respect to the types of evidentiary showings necessary to meet this standard and with the types of prospective relief available to petitioners”).

  10. Timothy Zick, The Constitutional Case for “Red Flag” Laws, Jurist (Dec. 6, 2019, 8:39 PM), https://www.jurist.org/commentary/2019/12/timothy-zick-red-flag-laws/ [https://perm a.cc/G3TS-L53G]. Other scholars have looked at the due process implications of other types of similar statutory mechanisms, like DVROs with specific firearm prohibitions, Aaron Edward Brown, This Time I’ll Be Bulletproof: Using Ex Parte Firearm Prohibitions to Combat Intimate-Partner Violence, 50 Colum. Hum. Rts. L. Rev. 159, 196–98 (2019) (arguing that domestic violence ex parte orders for protection that prohibit firearm possession can survive due process challenges), or laws designed to disarm those in the throes of severe mental health crises, Fredrick E. Vars, Symptom-Based Gun Control, 46 Conn. L. Rev
    .

    1633, 1646–47 (2014) (arguing that a law allowing temporary firearm removal from individuals suffering delusions or hallucinations would not violate due process). None, so far, has assessed the new spate of extreme risk laws passed predominantly in the last two years.

  11. See Red Flag Laws: Examining Guidelines for State Action: Hearing Before the S. Comm. on the Judiciary, 116th Cong. (2019) (statement of Ronald Honberg, Senior Policy Advisor, National Alliance on Mental Illness) (describing the risk that “red flag” language can stigmatize individuals with mental illness).
  12. In California, the order is known as a “gun violence restraining order” or “GVRO.” Cal. Penal Code § 18100 (Deering Supp. 2020).
  13. See infra notes 302–09 and accompanying text; see also infra Section II.B (discussing constitutional principles for establishing burden of proof and how they should apply in the ERPO context).
  14. See infra note 309 and accompanying text.
  15. See infra Subsection I.B.1.
  16. See infra notes 70–82 and accompanying text. That extreme risk laws might be effective does not make them a panacea, nor should they distract from other forms of effective gun regulation. See Joseph Pomianowski & Ling Liang Dong, Red Flag Laws Are Red Herrings of Gun Control, Wired (Sept. 9, 2019, 9:00 AM), https://www.wired.com/story/red-flag-laws-are-red-herrings-of-gun-control/ [https://perma.cc/PSN8-B2UK].
  17. Ivan Pereira, Lawmaker Introduces ‘Anti-Red Flag’ Bill in Georgia To Combat Gun Control Proposals, ABC News (Jan. 15, 2020, 12:52 PM), https://abcnews.go.com/­US/lawmaker-introduces-anti-red-flag-bill-georgia-combat/story?id=68299434 [https://perm a.cc/7V9S-7CMX] (describing legislation introduced in Georgia to forbid extreme risk laws that bears the title “Anti-Red Flag—Second Amendment Conservation Act”).
  18. 554 U.S. 570, 635 (2008) (emphasis added).
  19. See generally Joseph Blocher, Gun Rights Talk, 94 B.U. L. Rev. 813 (2014) (arguing that the invocation of the Second Amendment in debates over proposed gun control laws has defeated many of these measures).
  20. A federal court in California, for example, blocked on First Amendment grounds a Los Angeles law that would have required city contractors to disclose ties to the NRA. As the NRA put it, the “First Amendment Defends the Second.” See First Amendment Defends the Second, NRA-ILA (Dec. 16, 2019), https://www.nraila.org/articles/20191216/first-amendment-defends-the-second [https://perma.cc/L5TF-6PVS].
  21. See, e.g., Timothy Zick, Arming Public Protests, 104 Iowa L. Rev. 223, 236–37 (2018) (considering, inter alia, the First Amendment rights of speech and assembly and their interaction with the Second Amendment); Luke Morgan, Note, Leave Your Guns at Home: The Constitutionality of a Prohibition on Carrying Firearms at Political Demonstrations, 68 Duke L.J
    .

    175, 179, 211–13 (2018) (same).

  22. See, e.g., Jeffrey Bellin, The Right To Remain Armed, 93 Wash. U. L. Rev
    .

    1, 4–5 (2015) (considering implications for search and seizure).

  23. See, e.g., Pratheepan Gulasekaram, “The People” of the Second Amendment: Citizenship and the Right to Bear Arms, 85 N.Y.U. L. Rev
    .

    1521, 1538 (2010) (illustrating and analyzing the difficulties of limiting “the people” to non-citizens).

  24. Not only do these other rights and interests intersect with the Second Amendment in important ways, but the courts have also borrowed from many of these frameworks when fleshing out the contours of the right to keep and bear arms. See Jacob D. Charles, Constructing a Constitutional Right: Borrowing and Second Amendment Design Choices, 99 N.C. L. Rev. (forthcoming 2021) (manuscript at 1–2) (on file with the Virginia Law Review) (describing how courts and commentators have borrowed from other constitutional rights domains in creating a framework for the Second Amendment).
  25. See, e.g., Press Release, Quinnipiac Univ., Overwhelming Support for No-Fly, No-Buy Gun Law, Quinnipiac University National Poll Finds; Support for Background Checks Tops 90 Percent Again (June 30, 2016), https://poll.qu.edu/national/release-detail?ReleaseID=2364 [https://perma.cc/C74J-XGWG].
  26. David M. Herszenhorn, Bipartisan Senate Group Proposes ‘No Fly, No Buy’ Gun Measure, N.Y. Times (June 21, 2016), https://www.nytimes.com/2016/06/22/us/politics/ senate-gun-control-no-fly-list-terrorism.html [https://perma.cc/4J99-TKVT].
  27. See, e.g., Chris W. Cox, Gun Laws Don’t Deter Terrorists: Opposing View, USA Today (June 14, 2016, 1:01 AM), https://www.usatoday.com/story/opinion/2016/06/13/gun-laws-deter-terrorists-opposing-view/85844946/ [https://perma.cc/Q6S7-9C52].
  28. See Hina Shamsi & Christopher Anders, The Use of Error-Prone and Unfair Watchlists Is Not the Way To Regulate Guns in America, ACLU (June 20, 2016, 2:45 PM), https://www.aclu.org/blog/washington-markup/use-error-prone-and-unfair-watchlists-not-way-regulate-guns-america [https://perma.cc/YA9S-NYBS]; see also Joseph Greenlee, No Fly, No Buy (And No Due Process), Federalist Soc’y (Feb. 17, 2016), http://www.fed-soc.org/blog/detail/no-fly-no-buy-and-no-due-process [https://perma.cc/V4U6-7ERV].
  29. Lisa Mascaro & Jill Ornitz, Senate Rejects New Gun Sales Restrictions, L.A. Times
    ,

    June 21, 2016, at A8.

  30. See infra Section I.A (describing the spread of extreme risk laws).
  31. Marianne Levine, Senate GOP Open to States Allowing Narrow Gun Restriction, Politico (Mar. 26, 2019, 1:05 PM), https://www.politico.com/story/2019/03/26/senate-republicans-state-gun-law-reform-1237446 [https://perma.cc/F32F-F6EQ].
  32. Governor Polis Signs ERPO Into Law, Delta Cnty. Indep. (Apr. 17, 2019), https://www.deltacountyindependent.com/governor-polis-signs-erpo-into-law-cms-15033 [https://perma.cc/S2N7-NW6M].
  33. To be clear, we do not suppose that there is a bright line between “constitutional” and “political” claims—constitutional law and argument often occur outside the courts, and in fact the Second Amendment provides an especially robust and interesting example in that regard. See Jacob D. Charles, The Right To Keep and Bear Arms Outside the Second Amendment 7 (Feb. 23, 2020) (unpublished manuscript) (on file with the Virginia Law Review).