Against Fiduciary Constitutionalism

A growing body of scholarship draws connections between fiduciary law and the Constitution. In much of this literature, the Constitution is described as a fiduciary instrument that establishes fiduciary duties, not least for the President of the United States.

This Article examines and critiques the claims of fiduciary constitutionalism. Although a range of arguments are made in this literature, there are common failings. Some of these involve a literalistic misreading of the works of leading political philosophers (e.g., Plato and Locke). Other failings involve fiduciary law, such as mistakes about how to identify fiduciary relationships and about the content and enforcement of fiduciary duties. Still other failings sound in constitutional law, including the attempt to locate the genre of the Constitution in the categories of private fiduciary law. These criticisms suggest weaknesses in the new and increasingly influential attempt to develop fiduciary constitutionalism.

Introduction

Recently, a number of scholars have argued that the U.S. Constitution resembles a fiduciary document, and that it imposes fiduciary duties on various actors, including the President of the United States.1.See, e.g., Gary Lawson & Guy Seidman, “A Great Power of Attorney”: Understanding the Fiduciary Constitution (2017); Randy E. Barnett & Evan D. Bernick, The Letter and the Spirit: A Unified Theory of Originalism, 107 Geo. L.J. 1, 18 (2018); Andrew Kent, Ethan J. Leib & Jed Handelsman Shugerman, Faithful Execution and Article II, 132 Harv. L. Rev. 2111 (2019); Ethan J. Leib & Stephen R. Galoob, Fiduciary Principles and Public Offices, in The Oxford Handbook of Fiduciary Law 303 (Evan J. Criddle, Paul B. Miller & Robert H. Sitkoff eds., 2019); Ethan J. Leib & Andrew Kent, Fiduciary Law and the Law of Public Office: Suggestions for a Research Agenda, Wm. & Mary L. Rev. (forthcoming 2021) (on file with authors); Ethan J. Leib & Jed Handelsman Shugerman, Fiduciary Constitutionalism: Implications for Self-Pardons and Non-Delegation, 17 Geo. J.L. & Pub. Pol’y 463 (2019); Ethan J. Leib, David L. Ponet & Michael Serota, A Fiduciary Theory of Judging, 101 Calif. L. Rev. 699 (2013); Robert G. Natelson, The Constitution and the Public Trust, 52 Buff. L. Rev. 1077, 1140 (2004) [hereinafter Natelson, The Constitution and the Public Trust].Show More When Barack Obama was President, some found in the “fiduciary Constitution”2.Different scholars writing about what we call the “fiduciary Constitution” might have their own nomenclature. Our choice of terms, however, is not original and is not meant to be pejorative. See Lawson & Seidman, supra note 1 (title); Kent et al., supra note 1, at 2182; Leib & Shugerman, supra note 1 (title); id. at 464.Show More a means by which a court could hold unconstitutional the signature achievement of his administration, the Affordable Care Act.3.E.g., Lawson & Seidman, supra note 1, at 91–98.Show More Now others find in fiduciary constitutionalism a means by which a court could find the present incumbent to have violated a proscription on self-dealing.4.See Leib & Shugerman, supra note 1, at 468–69, 475.Show More The fiduciary Constitution contains multitudes—everything from a handy way for an originalist to justify Bolling v. Sharpe5.See Lawson & Seidman, supra note 1, at 151–53, 170–71.Show More to a way for skeptics of the non-delegation doctrine to rein it in.6.See Leib & Shugerman, supra note 1, at 479–85.Show More The convenience and malleability of this new constitutional argument should make us wary.

This Article offers a critique of fiduciary constitutionalism, finding it bad fiduciary law and bad constitutional law. We are not the first to criticize fiduciary constitutionalism, and our work therefore builds on that of others, especially Seth Davis and Richard Primus.7.See generally Seth Davis, The False Promise of Fiduciary Government, 89 Notre Dame L. Rev. 1145 (2014) (analyzing differences between private fiduciaries and public officials and critiquing the lack of authority for fiduciary constitutionalism); Richard Primus, The Elephant Problem, 17 Geo. J.L. & Pub. Pol’y 373 (2019) (critically reviewing the evidence and methodology in Lawson & Seidman, supra note 1). Others have also criticized the over-extension of fiduciary concepts, albeit in different contexts. E.g., Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497 (2019).Show More

It is important at the outset to note that the burgeoning literature in favor of a fiduciary reading of the Constitution means that different scholars make different claims. Some analogize the Constitution to a trust,8.See Leib & Shugerman, supra note 1, at 477–79.Show More some to an agency relationship,9.Lawson & Seidman, supra note 1, at 112.Show More some to a power of attorney,10 10.Id. at 75 (referring to James Iredell’s quote regarding power of attorney).Show More and some to an attractively all-purpose generic “fiduciary” construct.11 11.Barnett & Bernick, supra note 1, at 18–21; see also id. at 19 nn.81 & 83 (discussing common fiduciary relationships and duties); cf. Lawson & Seidman, supra note 1, at 76 (“[W]e think it close to obvious that the Constitution, as a legal document, is best understood as some kind of agency or fiduciary instrument, whereas the case for viewing it specifically as (or as like) a power of attorney is more attenuated.”); Leib et al., supra note 1, at 708, 712–13 (recognizing differences among different kinds of fiduciaries, as well as differences between public and private law, but relying on a general “fiduciary principle”).Show More Some draw a straight line between a fiduciary law of the eighteenth century and the present.12 12.See, e.g., Barnett & Bernick, supra note 1, at 19–21.Show More Others admit there are differences between past and present, and thus offer a bevy of qualifications and hedges13 13.E.g., Lawson & Seidman, supra note 1, at 6 (“[W]e are making no claims about the extent to which the meaning we uncover should or must contribute to legal decision making.”); id. at 11 (“Again, we frame these interpretative conclusions in hypothetical form: to the extent that the Constitution can be seen as a fiduciary instrument, or in some cases as a fiduciary instrument of a particular kind, certain conclusions about the document’s meaning follow from that identification.”). The hedges and qualifications are more pronounced—and thus the conclusions more circumspect—in the article by Kent, Leib, and Shugerman than in some of the other literature. See, e.g., Kent et al., supra note 1, at 2190 (“We do not opine here on the way the framers envisioned enforcing the President’s duty of loyalty and avoiding self-dealing.”).Show More—but those tend to fall away as soon as the scholars turn to spelling out the “enforceable duties” that they want to see the courts administering.14 14.E.g., Lawson & Seidman, supra note 1, at 7 (“Now to our affirmative project: understanding the fiduciary character of the Constitution is important not simply as a historical matter but also for its contribution to constitutional interpretation.”); id. at 11; Leib & Shugerman, supra note 1, at 465 (“[T]his article delves further into this language’s [i.e. the Take Care Clause’s] likely meaning, indicating how it can establish enforceable duties for public officials.”); see also Kent et al., supra note 1, at 2119 (claiming “that the best historical understanding of the meaning of the Faithful Execution Clauses is that they impose duties that we today—and some in the eighteenth century as well—would call fiduciary”). Richard Primus and Suzanna Sherry note this oscillation in Lawson and Seidman’s argument. Primus, supra note 7, at 400, 402–04; Suzanna Sherry, The Imaginary Constitution, 17 Geo. J.L. & Pub. Pol’y 441, 447–49 (2019) (reviewing Lawson & Seidman, supra note 1). For discussion of a similar tendency in Kent et al., supra note 1, see infra note 87.Show More Some of the literature starts out cautious and then gallops away; some of it gallops from the start. But it all tends to be ambitious and thoroughly presentist.

This Article offers three main critiques of fiduciary constitutionalism:

The first is about contemporary fiduciary law. The fiduciary constitutionalists pervasively treat concepts as “fiduciary” that are in fact not limited to fiduciary law and instead have much a broader application, such as good faith.15 15.See infra Part II.Show More This matters because a point of connection between the Constitution and some area that can be characterized as fiduciary (e.g., trust, agency), as thin as it is, cannot sustain the fiduciary constitutionalist project if it is a point of connection with many areas of law.

The second is about historical anachronism. Some fiduciary constitutionalists rely on a “fiduciary law” of 1789 when there was in fact no such law.16 16.E.g., Barnett & Bernick, supra note 1, at 20–21 (asserting that the Constitution’s “organization and language sounds in eighteenth-century fiduciary law”). More cautious on this point is Kent et al., supra note 1, at 2179–80 (“[W]hat the three meanings we can attribute to the [Faithful Execution] Clauses have in common is that they are all part of the basic ways the private law constrains fiduciary discretion and power.”).Show More There were quite specific legal regimes for trust, agency, bailment, and so on. Some of these were at law, and some were in equity. Their standards of liability were different; their remedies were different; they differed in respect to defenses and the availability of a jury.17 17.Contra Lawson & Seidman, supra note 1, at 62 (“The fiduciary responsibilities of a trustee and an attorney do not differ in any way material to our project.”).Show More As other fiduciary constitutionalists concede, there was no pan-subject “fiduciary law” in 1789.18 18.See, e.g., Kent et al., supra note 1, 2180–81 (describing the “crystalliz[ing]” of “the ‘private’ fiduciary law we would recognize today” as not occurring in America until late in the eighteenth century, and concluding that “a fiduciary law of ‘private’ offices was unlikely to have been plucked off-the-rack by the Philadelphia Convention drafters and applied to public offices”); id. at 2179 (“Our historical findings about the original meaning of the Faithful Execution Clauses align with core features of modern fiduciary law . . . . ”); Leib & Shugerman, supra note 1, at 468 (suggesting doubt about whether “private fiduciary law was itself fully formed at the time of the founding”).Show More This abstraction is fatal to fiduciary constitutionalism.

The third is about how some fiduciary constitutionalists evade the anachronism problem. They try to escape this problem by tying the Constitution not to a fictional eighteenth-century “fiduciary law” but rather to fiduciary law of the twenty-first century.19 19.Leib & Shugerman, supra note 1, at 468–69 (“[Article II of the U.S. Constitution] uses the language of faith and care to signal to courts and to executive officials that the President was supposed to be held to the same kinds of fiduciary obligations to which corporate officers, trustees, and lawyers are routinely held today in the private sector.”).Show More That interpretive move is certainly available on some theories of constitutional interpretation—theories that would to a substantial degree integrate political morality and constitutional law, or theories that would allow the courts to legitimately turn what was originally a non-fiduciary Constitution into a fiduciary Constitution, creating and developing new fiduciary duties for government officers.20 20.But cf. Davis, supra note 7, at 1182–95 (discussing whether that is advisable).Show More But that is not the argument the fiduciary constitutionalists have made to date (though they are of course free to reshape their arguments going forward). Instead, the fiduciary constitutionalists have relied on text and structure as understood at the Founding.21 21.See infra notes 161 and 164 and accompanying text. We do recognize that there is a spectrum of views about how much the interpretation of the constitutional text should be informed by the legal categories at the time of ratification (as part of context). The more one separates the text from its legal context, the more room there is to integrate constitutional law and political morality, and the less constraint there is from the original understanding (with the familiar virtues and vices of that interpretive equilibrium).Show More And that more-or-less originalist argument does not hold if the Constitution can only be understood as fiduciary in light of present-day fiduciary law.

One thing, however, does need to be said in favor of the fiduciary constitutionalists’ claims. It is true that there is a long history in political thought of the use of trust and agency metaphors for governance. This figurative language appears in Plato and Cicero, in Locke and Hume.22 22.See infra Section I.A.Show More But this language offers moral guidance and political wisdom, not enforceable duties with remedies that can be awarded by courts. And mere metaphor is not the big game the fiduciary constitutionalists are pursuing. Against this long history of a figurative and legally thin understanding of public office as a trust, it becomes easier to recognize the fiduciary constitutionalist project for what it is: an earnest and literalistic misreading of the tradition and an insistence on taking figurative language that works across thousands of years of political theory and treating it as if it were an invocation of an inevitably more particular body of legal or equitable claims and remedies. There is no such body of claims and remedies that can support this move—not a fiduciary law of 1789 (once it is recognized as a fiction), and not present-day fiduciary law (once it is correctly described).

The remainder of this Article proceeds as follows. Part I analyzes the supposed antecedents of fiduciary constitutionalism—both the classical and early modern tradition in political theory and also more recent advances in fiduciary theory with which the fiduciary constitutionalists align themselves. Part II critiques the fiduciary law of fiduciary constitutionalism. Part III critiques the constitutional law of fiduciary constitutionalism. The idea that the Constitution ought to be understood as a fiduciary instrument is a well-meant and seemingly timely entrant into the constitutional discourse of the United States. But taken together, these critiques show that the historical, philosophical, and legal foundations of fiduciary constitutionalism are weak.

  1. * Professor of Law, Notre Dame Law School.
  2. ** Professor of Law, Associate Dean for International and Graduate Programs, and Director of the Notre Dame Program on Private Law, Notre Dame Law School. The authors are grateful for comments from Randy Barnett, Evan Bernick, Nathan Chapman, Evan Criddle, Evan Fox-Decent, Joshua Getzler, Andrew Gold, Albert Horsting, Andrew Kent, Sung Hui Kim, Gary Lawson, Ethan Leib, Ben McFarlane, Michael McConnell, David Pozen, Richard Primus, Richard Re, Lionel Smith, and Larry Solum, as well as attendees at the Third Annual International Fiduciary Law Conference held at Trinity College, Cambridge.
  3. See, e.g., Gary Lawson & Guy Seidman, “A Great Power of Attorney”: Understanding the Fiduciary Constitution (2017); Randy E. Barnett & Evan D. Bernick, The Letter and the Spirit: A Unified Theory of Originalism, 107 Geo. L.J. 1, 18 (2018); Andrew Kent, Ethan J. Leib & Jed Handelsman Shugerman, Faithful Execution and Article II, 132 Harv. L. Rev. 2111 (2019); Ethan J. Leib & Stephen R. Galoob, Fiduciary Principles and Public Offices, in The Oxford Handbook of Fiduciary Law 303 (Evan J. Criddle, Paul B. Miller & Robert H. Sitkoff eds., 2019); Ethan J. Leib & Andrew Kent, Fiduciary Law and the Law of Public Office: Suggestions for a Research Agenda, Wm. & Mary L. Rev. (forthcoming 2021) (on file with authors); Ethan J. Leib & Jed Handelsman Shugerman, Fiduciary Constitutionalism: Implications for Self-Pardons and Non-Delegation, 17 Geo. J.L. & Pub. Pol’y 463 (2019); Ethan J. Leib, David L. Ponet & Michael Serota, A Fiduciary Theory of Judging, 101 Calif. L. Rev. 699 (2013); Robert G. Natelson, The Constitution and the Public Trust, 52 Buff. L. Rev. 1077, 1140 (2004) [hereinafter Natelson, The Constitution and the Public Trust].
  4. Different scholars writing about what we call the “fiduciary Constitution” might have their own nomenclature. Our choice of terms, however, is not original and is not meant to be pejorative. See Lawson & Seidman, supra note 1 (title); Kent et al., supra note 1, at 2182; Leib & Shugerman, supra note 1 (title); id. at 464.
  5. E.g., Lawson & Seidman, supra note 1, at 91–98.
  6. See Leib & Shugerman, supra note 1, at 468–69, 475.
  7. See Lawson & Seidman, supra note 1, at 151–53, 170–71.
  8. See Leib & Shugerman, supra note 1, at 479–85.
  9. See generally Seth Davis, The False Promise of Fiduciary Government, 89 Notre Dame L. Rev. 1145 (2014) (analyzing differences between private fiduciaries and public officials and critiquing the lack of authority for fiduciary constitutionalism); Richard Primus, The Elephant Problem, 17 Geo. J.L. & Pub. Pol’y 373 (2019) (critically reviewing the evidence and methodology in Lawson & Seidman, supra note 1). Others have also criticized the over-extension of fiduciary concepts, albeit in different contexts. E.g., Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497 (2019).
  10. See Leib & Shugerman, supra note 1, at 477–79.
  11. Lawson & Seidman, supra note 1, at 112.
  12. Id. at 75 (referring to James Iredell’s quote regarding power of attorney).
  13. Barnett & Bernick, supra note 1, at 18–21; see also id. at 19 nn.81 & 83 (discussing common fiduciary relationships and duties); cf. Lawson & Seidman, supra note 1, at 76 (“[W]e think it close to obvious that the Constitution, as a legal document, is best understood as some kind of agency or fiduciary instrument, whereas the case for viewing it specifically as (or as like) a power of attorney is more attenuated.”); Leib et al., supra note 1, at 708, 712–13 (recognizing differences among different kinds of fiduciaries, as well as differences between public and private law, but relying on a general “fiduciary principle”).
  14. See, e.g., Barnett & Bernick, supra note 1, at 19–21.
  15. E.g., Lawson & Seidman, supra note 1, at 6 (“[W]e are making no claims about the extent to which the meaning we uncover should or must contribute to legal decision making.”); id. at 11 (“Again, we frame these interpretative conclusions in hypothetical form: to the extent that the Constitution can be seen as a fiduciary instrument, or in some cases as a fiduciary instrument of a particular kind, certain conclusions about the document’s meaning follow from that identification.”). The hedges and qualifications are more pronounced—and thus the conclusions more circumspect—in the article by Kent, Leib, and Shugerman than in some of the other literature. See, e.g., Kent et al., supra note 1, at 2190 (“We do not opine here on the way the framers envisioned enforcing the President’s duty of loyalty and avoiding self-dealing.”).
  16. E.g., Lawson & Seidman, supra note 1, at 7 (“Now to our affirmative project: understanding the fiduciary character of the Constitution is important not simply as a historical matter but also for its contribution to constitutional interpretation.”); id. at 11; Leib & Shugerman, supra note 1, at 465 (“[T]his article delves further into this language’s [i.e. the Take Care Clause’s] likely meaning, indicating how it can establish enforceable duties for public officials.”); see also Kent et al., supra note 1, at 2119 (claiming “that the best historical understanding of the meaning of the Faithful Execution Clauses is that they impose duties that we today—and some in the eighteenth century as well—would call fiduciary”). Richard Primus and Suzanna Sherry note this oscillation in Lawson and Seidman’s argument. Primus, supra note 7, at 400, 402–04; Suzanna Sherry, The Imaginary Constitution, 17 Geo. J.L. & Pub. Pol’y 441, 447–49 (2019) (reviewing Lawson & Seidman, supra note 1). For discussion of a similar tendency in Kent et al., supra note 1, see infra note 87.
  17. See infra Part II.
  18. E.g., Barnett & Bernick, supra note 1, at 20–21 (asserting that the Constitution’s “organization and language sounds in eighteenth-century fiduciary law”). More cautious on this point is Kent et al., supra note 1, at 2179–80 (“[W]hat the three meanings we can attribute to the [Faithful Execution] Clauses have in common is that they are all part of the basic ways the private law constrains fiduciary discretion and power.”).
  19. Contra Lawson & Seidman, supra note 1, at 62 (“The fiduciary responsibilities of a trustee and an attorney do not differ in any way material to our project.”).
  20. See, e.g., Kent et al., supra note 1, 2180–81 (describing the “crystalliz[ing]” of “the ‘private’ fiduciary law we would recognize today” as not occurring in America until late in the eighteenth century, and concluding that “a fiduciary law of ‘private’ offices was unlikely to have been plucked off-the-rack by the Philadelphia Convention drafters and applied to public offices”); id. at 2179 (“Our historical findings about the original meaning of the Faithful Execution Clauses align with core features of modern fiduciary law . . . . ”); Leib & Shugerman, supra note 1, at 468 (suggesting doubt about whether “private fiduciary law was itself fully formed at the time of the founding”).
  21. Leib & Shugerman, supra note 1, at 468–69 (“[Article II of the U.S. Constitution] uses the language of faith and care to signal to courts and to executive officials that the President was supposed to be held to the same kinds of fiduciary obligations to which corporate officers, trustees, and lawyers are routinely held today in the private sector.”).
  22. But cf. Davis, supra note 7, at 1182–95 (discussing whether that is advisable).
  23. See infra notes 161 and 164 and accompanying text. We do recognize that there is a spectrum of views about how much the interpretation of the constitutional text should be informed by the legal categories at the time of ratification (as part of context). The more one separates the text from its legal context, the more room there is to integrate constitutional law and political morality, and the less constraint there is from the original understanding (with the familiar virtues and vices of that interpretive equilibrium).
  24. See infra Section I.A.

Secrecy Surrogates

Debates about how best to check executive branch abuses of secrecy focus on three sets of actors that have access to classified information and that traditionally have served—in one way or another—as our surrogates: congressional committees, federal courts, and leakers or whistleblowers. These actors provide only limited checks on the Executive’s misuse of secrecy, however. Most legal scholarship bemoans their flaws but concludes that the status quo is the best that we can do. This Article challenges this account, arguing that there is a different set of actors—a set of unsung “secrecy surrogates”—that can provide additional checks on the quality and legality of the Executive’s classified operations in the cyber, election, and counter-terrorism settings.

Technology companies, states and localities, and foreign allies have become an integral part of U.S. national security operations and enjoy some critical advantages over our traditional surrogates. These actors possess expertise about—and in some cases control—national security-related targets, making them essential partners for the Executive. Further, these surrogates have incentives to check the Executive in ways that advance the public law values of accuracy, accountability, and legality. Finally, unlike leakers, these unsung secrecy surrogates can challenge the Executive without revealing government secrets. These surrogates can only check government abuses of secrecy as long as the Executive requires their cooperation, but they have begun to supplement our traditional surrogates in important ways.

This Article maps the growing role of these unsung secrecy surrogates, argues that they are well-situated to address some persistent secrecy problems, and proposes ways to preserve and enhance the surrogates’ position in the secrecy ecosystem in the future.

Introduction

Misuse of government secrecy is in the headlines. Consider the revelation that White House officials transferred the transcript of President Trump’s call with Ukraine’s President to a highly classified stand-alone computer system to prevent leaks.1.Julian E. Barnes, Michael Crowley, Matthew Rosenberg & Mark Mazzetti, White House Classified Computer System Is Used To Hold Transcripts of Sensitive Calls, N.Y. Times (Sept. 29, 2019), https://www.nytimes.com/2019/09/27/us/politics/nsc-ukraine-call.html [https://perma.cc/F9ZC-68Z3]; seeDustin Volz, Andrew Duehren & Natalie Andrews, White House Official Feared Trump Transcript Leak Could Be Politically Damaging, Wall St. J. (Nov. 17, 2019, 5:52 AM), https://www.wsj.com/articles/white-house-official-feared-trump-transcript-leak-could-be-politically-damaging-11573942481 [https://perma.cc/LV53-PL42].Show More For many, this incident reflects a paradigmatic problem with government secrecy: actors in the Executive can employ it as a tool to avoid politically embarrassing or legally problematic revelations.2.See, e.g., Ayesha Rascoe & Franco Ordoñez, Former Officials Say White House’s Use of Secret System Is Unusual, ‘Disturbing,’ NPR (Sept. 27, 2019, 5:40 AM), https://www.npr.org/2019/09/27/764759182/former-officials-say-white-houses-use-of-secret-system-is-unusual-disturbing [https://perma.cc/7PBJ-5MF8] (quoting former White House official as stating that “[t]his seems to be nothing more than an abuse of the classification and the information security system to safeguard not the information, but to effect a cover-up” (internal quotation marks omitted)).Show More This episode proved to be a success story. A government whistleblower carefully followed statutory procedures, and the Intelligence Community Inspector General shared the whistleblower’s complaint with Congress, which held impeachment hearings to judge the President’s actions. Yet the case may be just as notable for its uniqueness, given how infrequently the whistleblowing process works as intended.

Indeed, legal scholars and political scientists have long decried the current state of affairs, in which the Executive exercises near total control over secret government information with few external checks. A substantial literature wrestles with how to manage the genuine need for secrecy about many national security operations in a democracy whose government should be accountable to the people. Government secrecy can foster four types of problems. First, the Executive can employ secrecy to conceal unlawful acts, such as spying on political enemies. Second, the Executive can use secrecy to conceal poor or controversial judgments or policies. Third, the Executive can use secrecy to conceal incompetent, empirically wrong, or insufficient intelligence and analysis.3.See Loch K. Johnson, Governing in the Absence of Angels: On the Practice of Intelligence Accountability in the United States, in Who’s Watching the Spies? Establishing Intelligence Service Accountability 57, 61 (Hans Born, Loch K. Johnson & Ian Leigh eds., 2005) (quoting intelligence scholar as stating that the major problem facing U.S. intelligence in 2005 was that the “CIA [had] not been gathering enough quality data”).Show More Each of these three types of missteps is embarrassing to the Executive and creates incentives to conceal the underlying action.4.See Frederick A.O. Schwarz Jr., Democracy in the Dark: The Seduction of Government Secrecy 2 (2015) (“[T]oo much is kept secret not to protect America but to keep embarrassing or illegal conduct from Americans.”).Show More Fourth, making decisions in secret insulates the Executive from having to justify and defend those decisions in public.5.Robert M. Pallitto & William G. Weaver, Presidential Secrecy and the Law 3 (2007) (noting executive interest in “maintain[ing] presidential prerogative against congressional inquiries and judicial orders”); id. at 6 (“Where a president may do what is desired in secret, there is no reason to withstand the ordeal of a political battle to achieve the same ends.”); H.R. Select Comm. To Investigate Covert Arms Transactions with Iran & S. Select Comm. on Secret Military Assistance to Iran and the Nicaraguan Opposition, 100th Cong., Rep. of the Congressional Committees Investigating the Iran-Contra Affair, Minority Report 450, 515 (Comm. Print 1987) (stating that the President should undertake “democratic persuasion” to develop support for his policies and that he will not succeed “unless the public is exposed to and persuaded by a clear, sustained, and principled debate on the merits”); David E. Pozen, Deep Secrecy, 62 Stan. L. Rev. 257, 279 (2010) (discussing how secrecy provides “insulation from scrutiny”).Show More All of these possible abuses of secrecy engender public skepticism about the government and make it harder for the public—and U.S. allies—to trust the Executive in cases in which secrecy truly is necessary.6.See Pozen, supra note 5, at 280; S. Select Comm. To Study Governmental Operations with Respect to Intel. Activities, Final Report, S. Rep. No. 94-755, at 4 (1976) (“[T]here are many necessary and proper governmental activities that must be conducted in secrecy. . . . [However,] intelligence activities conducted outside the framework of the Constitution and statutes can undermine the treasured values guaranteed in the Bill of Rights. Further, if the intelligence agencies act in ways inimical to declared national purposes, they damage the reputation, power, and influence of the United States abroad.”).Show More

Legal scholarship about government secrecy usually focuses on three sets of actors that check and balance executive branch secrecy to reduce abuse.7.See, e.g., Rahul Sagar, Secrets and Leaks: The Dilemma of State Secrecy (2013) (considering role of Congress, the courts, whistleblowers, and leakers in managing government secrecy); Pallitto & Weaver, supra note 5 (considering Congress, the courts, and leaks); Michael P. Colaresi, Democracy Declassified: The Secrecy Dilemma in National Security 181 (2014) (discussing role of legislatures, freedom of information laws, and press freedom laws in checking executive secrecy); Mark Fenster, The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information (2017) (discussing the role of the press, freedom of information laws, anti-corruption non-governmental organizations, and leaks); Pozen, supra note 5, at 269, 274 (focusing on deep secret keeping by executive officials, treating Congress and the courts as the primary recipients of shallow secrets, and assuming that very few private actors generally will be aware of government secrets); Johnson, supra note 3, at 58 (noting that the “most consistent and serious manifestation of intelligence oversight has come not from presidential commissions, but from the media and the Congress”); Josh Chafetz, Whose Secrets?, 127 Harv. L. Rev. F. 86, 87 (2013) (emphasizing the role of Congress in the secrecy regime).Show More Two sets of actors lie in the Executive’s co-equal branches of government. In the 1970s, Congress created two intelligence committees—the Senate Select Committee on Intelligence (“SSCI”) and the House Permanent Select Committee on Intelligence (“HPSCI”)—in the wake of the Church and Pike Committees’ reports. The intelligence committees, which conduct much of their work in secret, directly oversee the intelligence community and its activities.8.Members of the committees that oversee military and foreign relations issues also have access to classified information relevant to their legislative and oversight tasks.Show More The 1970s reforms also produced the Foreign Intelligence Surveillance Court, in which Article III judges authorize executive surveillance for foreign intelligence purposes. Article III courts also review classified information and activities in cases involving state secrets, Freedom of Information Act litigation, and certain criminal cases.

Although not constitutionally linked to the public in the way that Congress and federal courts are, whistleblowers and leakers constitute a third set of actors who attempt to bring abuses (or alleged abuses) to the attention of actors outside the Executive. In the national security setting, leakers emerge from within the executive branch itself and usually remain anonymous. They reveal classified information to the public, often by sharing it with journalists who report on the programs or intelligence contained in the leak. Whistleblowers, on the other hand, follow a statutory process of revealing abuses to their agency’s inspector general and then potentially to members of Congress.

Some view these three sets of actors as surrogates for the broader public, which does not and often should not have access to government secrets. As the literature makes clear, however, all three groups are imperfect surrogates. Congressional committees lack the robust incentives and sometimes the deep experience necessary to check the Executive’s national security activities. Federal courts often doubt their own competence to evaluate secret government programs and so accord substantial deference to executive claims that certain disclosures will harm national security. Leakers reveal information sporadically and can harm genuine national security equities when they do so. Leaking classified information also generally violates criminal law. And whistleblowing is fraught: those who blow the whistle often are subject to retaliation, even though statutes prohibit such responses.

Notwithstanding the flaws in the capabilities and performance of these three groups, many have concluded that the current state of affairs is the best we can do. This Article challenges that conclusion, arguing that this model overlooks at least three other sets of actors who increasingly can and do play a role in curbing misuses of executive secrecy.9.I have argued elsewhere that other actors and mechanisms constrain the Executive in its classified operations, including executive branch lawyers and norms of reason giving. See Ashley Deeks, Checks and Balances from Abroad, 83 U. Chi. L. Rev. 65 (2016) [hereinafter Deeks, Checks and Balances]; Ashley S. Deeks, Secret Reason-Giving, 129 Yale L.J. 612 (2020) [hereinafter Deeks, Reason-Giving]; Ashley S. Deeks, The Substance of Secret Agreements and the Role of Government Lawyers, 111 AJIL Unbound 474 (2018).Show More In recent decades, the national security threat landscape has shifted from one of overt, kinetic state-to-state conflict to a landscape dominated by non-state actors and clandestine, hostile operations by foreign governments using new technologies. In light of these new threats, which manifest themselves in the form of pernicious cyber operations, election interference, and terrorist acts, three groups have assumed critical—though underappreciated—roles in the U.S. national security ecosystem.10 10.Additional actors play a role in what this Article terms the “secrecy ecosystem.” These actors include the Privacy and Civil Liberties Oversight Board, the Presidential Intelligence Advisory Board (“PIAB”), and the Defense Advisory Board. See, e.g., Kenneth Michael Absher, Michael C. Desch & Roman Popadiuk, Privileged and Confidential: The Secret History of the President’s Intelligence Advisory Board (2012) (discussing the PIAB); Johnson, supra note 3, at 73 (noting that when Brent Scowcroft was Chair of the PIAB, he produced a “hard-hitting review” of the intelligence organization). For reasons of space, however, this Article does not address the role of these other secrecy surrogates.Show More U.S. technology companies,11 11.By “technology companies,” I mean large social media, software, and computer technology companies such as Google, Microsoft, and Facebook, as well as companies that provide cybersecurity services, such as FireEye/Mandiant, Crowdstrike, and IronNet.Show More states and localities, and foreign allies all possess the capacities and incentives to check problematic uses of government secrecy. For example, technology companies exchange threat information and operational details of cyber attacks with government officials, comparing intelligence and sometimes litigating to contest government decisions to keep programs secret.12 12.Similar interactions conceivably occur with utility companies and private banks because these companies have been targets of thousands of hostile cyber operations. The Intelligence Community’s 2019 Threat Assessment noted, “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016.” Daniel R. Coats, Dir. of Nat’l Intel., Statement for the Record: Worldwide Threat Assessment of the U.S. Intelli-gence Community 6 (2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR—SSCI.pdf [https://perma.cc/M7DS-WPY4]. Further, the Intelligence Community is authorized to disseminate “classified reports to critical infrastructure entities authorized to receive them.” Off. of the Dir. of Nat’l Intel., Dep’t of Homeland Sec., Dep’t of Def. & Dep’t of Just., Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government Under the Cybersecurity Information Sharing Act of 2015, at 13 (2016), https://www.us-cert. gov/sites/default/files/ais_files/Federal_Government_Sharing_Guidance_(103).pdf. [https://p erma.cc/HYH7-XUCD]. This Article focuses on technology companies because they are most likely to be sophisticated consumers (and providers) of intelligence on cyber operations. Some utility companies are reportedly insufficiently focused on cybersecurity and thus are poorly positioned—at least right now—to play a significant role in checking a sophisticated actor like the Executive. For a critique of utility company cybersecurity practices, see Joseph Marks & Tonya Riley, The Cybersecurity 202: Activist Wants Court To Name and Shame Electric Utilities for Violating Cybersecurity Rules, Wash. Post (Dec. 3, 2019, 4:35 AM), https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/12/0­3/the-cybersecurity-202-activist-wants-court-to-name-and-shame-electric-utilities-for-viol­ating-cybersecurity-rules/5de550bf88e0fa652bbbdb18/ [https://perma.cc/N43C-Z4ZL]; Catherine Stupp, Utilities Are Prime Targets for Cyberattacks, WSJ Pro Cybersecurity (Aug. 7, 2019, 11:19 AM), https://www.wsj.com/articles/utilities-are-prime-target-for-cyberattacks-11565170204 [https://perma.cc/2S5J-EJU6] (“Utilities often don’t have enough employees with security clearance that lets them quickly get classified information about cyber threats from the federal government.”). Utilities, banks, and other operators of critical infrastructure may play a greater checking function in the future as they gain more experience with these threats. For a report recommending that the government enhance its sharing of classified information with utilities grid operators, see Nat’l Comm’n on Grid Resilience, Grid Resilience: Priorities for the Next Administration 28 (2020), https://gridresilience.org/wp-content/uploads/2020/08/NCGR-Report-2020-Full.pdf [https://perma.cc/5QMV-XUAN].Show More Foreign allies sometimes disagree with the U.S. intelligence community’s substantive intelligence judgments, challenging the United States to produce more or better intelligence.13 13.For example, the Trump Administration has tried for more than a year to persuade allies not to employ Huawei equipment in their 5G networks and has received pushback from a range of foreign governments. Robbie Gramer & Lara Seligman, Can the U.S.-U.K. Special Relationship Weather the Huawei Storm?, Foreign Pol’y (Jan. 30, 2020, 5:10 PM), https://foreignpolicy.com/2020/01/30/huawei-intelligence-united-states-britain-trump-5g-in­frastructure-concerns-digital-espionage-special-relationship-five-eyes/ [https://perma.cc/7Z­48-TKWX].Show More Although there are limited public examples of states and localities challenging secret executive activities directly in the election and cyber arenas, these sub-federal officials have the potential to do so because they possess fine-grained information about the election systems and critical infrastructure that are the targets of hostile cyber operations.14 14.For instance, in 2013, Los Angeles created a Cyber Intrusion Command Center, City of Los Angeles, Exec. Directive No. 2 (Oct. 30, 2013), https://www.lamayor.org/sites/g/files/wph446/f/page/file/ED2_with_signature_and_letterhead.pdf?1426620047 [https://perma.cc/6E9C-JC7M] (anticipating collaboration with the FBI and other federal agencies), and in 2017, New York City created its own Cyber Command, City of New York, Exec. Order No. 28 (July 11, 2017), https://www1.nyc.gov/a­ssets/home/downloads/pdf/executive-orders/2017/eo_28.pdf [https://perma.cc/7CNG-HA­MH] (anticipating collaboration with federal and state government agencies and the private sector); see also Brennan Weiss, Inside New York City Cyber Command, Bus. Insider (May 5, 2018, 8:00 AM), https://www.businessinsider.com/nyc-cyber-command-protecting-new-yorkers-2018-4 [https://perma.cc/46VA-MWC7].Show More Further, they historically have challenged certain federal counter-terrorism programs, which suggests that they may start to push back in the election and cyber settings as they gain expertise about the threat landscape.15 15.See Matthew C. Waxman, National Security Federalism in the Age of Terror, 64 Stan. L. Rev. 289, 333 (2012).Show More

These three groups have several important advantages over our traditional secrecy surrogates. First, they possess specific expertise about the new threats and new targets that Congress, the courts, and leakers might not. Certain technology companies and many allies are highly specialized in intelligence-gathering and analysis, and so are particularly well-suited to detect problematic executive performance in the secrecy space.16 16.A possible analogy is to the role of auditors, who verify the accuracy of the government’s records (here, its intelligence and analysis) and point out deficiencies in its operations. For the use of the concept of substantive audits in the intelligence setting, see Eric Posner, It’s Time to Audit America’s Secrets, Foreign Pol’y (Feb. 2, 2018, 5:13 PM), https://foreignpolicy.com/2018/02/02/its-time-to-audit-all-of-americas-secrets/ [https://per­ma.cc/LK65-W4NA]; Elizabeth Goitein & J. William Leonard, Opinion, America’s Unnecessary Secrets, N.Y. Times (Nov. 7, 2011), https://www.nytimes.com/­2011/11/07/opinion/national-security-and-americas-unnecessary-secrets.html [https://perma.cc/2UAL-GFKL] (arguing that one way to combat government over-classification is to allow agencies’ inspectors general to “audit officials’ classification decisions”).Show More Second, each of the three groups brings to the table irreplaceable access to information and infrastructure that the Executive needs to perform its job.17 17.See Michael Wines, State Officials Say They Are Told Too Little About Election Threats, N.Y. Times (Feb. 19, 2018), https://www.nytimes.com/2018/02/19/us/elections-states-hacking.html [https://perma.cc/77LU-KFCV] (describing the relationship between the Department of Homeland Security and local election officials as an “arranged marriage”).Show More For technology companies, it is the ability to observe and defend the front lines of critical infrastructure systems, attribute the sources of cyber attacks, and operate the very systems that are subject to foreign manipulation. For states and localities, it is control over and knowledge about election operations and machinery (and other critical infrastructure at the sub-federal level), as well as ground-level intelligence about terrorist activities inside the United States. For foreign allies, it is intelligence and expertise that the United States may not possess about shared threats. The Executive has persistent incentives to share intelligence with these actors to allow them to take necessary steps to enhance U.S. national security. This, in turn, renders them an audience that the Executive must persuade of the soundness of its intelligence and proposed operations.18 18.Deeks, Reason-Giving, supra note 9.Show More Third, unlike leakers, these three groups are positioned to challenge secret government operations without revealing those operations.19 19.Those who frame the government secrecy debate as a choice between secrecy and disclosure thus are misframing the issue. See Philip H. Melanson, Secrecy Wars 8, 183 (2001) (describing the “ongoing battle between secret keepers and those seeking access”).Show More

These, then, are our unsung “secrecy surrogates”: actors who are given access to secret information that average U.S. citizens are not and who can improve secret executive operations and help mitigate abuses. By “surrogates,” I do not mean that these groups have a direct constitutional, contractual, or agency relationship with the national populace—they generally do not.20 20.There is an irony here: in certain areas of classified government operations, these actors, which lack a constitutional relationship to our national polity, may be better positioned to alter the non-public behavior of the Executive than the courts and congressional committees, which are our direct surrogates.Show More Instead, I mean that these groups serve as our surrogates in a more general sense: as actors who take our place or are given a particular role in government operations because we are not able to serve in that role ourselves. In particular, these surrogates are positioned to enhance the Executive’s adherence to public law values by (1) stimulating the Executive to improve the accuracy of its intelligence; (2) diminishing the Executive’s opportunity to undertake illegal actions; and (3) increasing the Executive’s accountability for its classified choices.21 21.See Jody Freeman, Private Parties, Public Functions and the New Administrative Law, 52 Admin. L. Rev. 813, 818–19 (2000) (listing “openness, fairness, participation, consistency, rationality, impartiality, and accessibility of judicial review” as well as accountability and legality as public law values); id. at 819 (“Private actors are not just rent-seekers that exacerbate the traditional democracy problem in administrative law; they are also regulatory resources capable of contributing to the efficacy and legitimacy of administration.”); Michael Taggart, The Province of Administrative Law Determined?, in The Province of Administrative Law 1, 3 (Michael Taggart ed., 1997) (defining public law values to include openness, participation, accountability, honesty, and rationality); Mark Aronson, A Public Lawyer’s Response to Privatisation and Outsourcing, in The Province of Administrative Law 40, 43 (Michael Taggart ed., 1997).Show More It is difficult to obtain empirical, unclassified information about the full range of effects of these secrecy surrogates, and so this Article’s conclusions are necessarily tentative. However, based on available analyses of the ways that technology companies, foreign allies, and states and localities have behaved to date in the surveillance,22 22.Alan Z. Rozenshtein, Surveillance Intermediaries, 70 Stan. L. Rev. 99, 106 (2018).Show More cybersecurity,23 23.Kristen E. Eichensehr, Public-Private Cybersecurity, 95 Tex. L. Rev. 467, 471 (2017) [hereinafter Eichensehr, Public-Private Cybersecurity].Show More and counter-terrorism24 24.Waxman, supra note 15.Show More settings, it is clear that these actors can help ensure that U.S. intelligence operations are attentive to legal, procedural, and accuracy concerns and have begun to play this role.

David Pozen has argued that it is preferable in a democratic system like ours, in which the government must keep certain information secret, for those secrets to be shallow rather than deep. (By deep secrets, he means government secrets that only a small number of similarly situated officials know.)25 25.Pozen, supra note 5, at 274 (“[A] government secret is deep if a small group of similarly situated officials conceals its existence from the public and from other officials, such that the outsiders’ ignorance precludes them from learning about, checking, or influencing the keepers’ use of the information.”).Show More In his view, which I share, our system should favor shallow secrecy whenever possible, because doing so “will systematically lead to . . . outcomes that are deemed acceptable from a greater variety of perspectives, that have been more thoroughly reasoned and refined through a dialogic vetting process, that are better documented, that take longer to be finalized, and that are more likely to be publicized.”26 26.Id. at 275.Show More He argues that we can shift a secret from being deep to shallow by expanding the number and types of people who know the secret, even if the underlying information remains classified. Pozen, however, contemplates this as occurring primarily by expanding the number and type of secret keepers within the executive branch itself, as well as within Congress.27 27.Id. at 329–30, 333.Show More This Article argues that the Executive has, by necessity, begun to expand and diversify the number and type of secret keepers in areas that reach far beyond the executive branch or Congress. In so doing, the government is both decreasing the depth of its secrets and positioning these actors to check some of the persistent problems of government secrecy: the concealment of incompetent execution or illegality and the ability of the Executive to avoid justifying its decisions to outsiders.

This new system of surrogates, like the existing one it supplements, is imperfect. For many of the same reasons that our traditional secrecy surrogates do not act as fully faithful agents for the public, these secrecy surrogates offer only partial fixes to our secrecy challenges, even if they are independently powerful actors.28 28.Several scholars have considered government secrecy problems through a principal-agent lens. Daniel Epps identifies three mechanisms that could help reduce agency costs in the secrecy setting, one of which is the use of proxies. Daniel Epps, Note, Mechanisms of Secrecy, 121 Harv. L. Rev. 1556, 1558 (2008). Epps explores the use of proxies only briefly, however, and focuses on government actors who have a direct duty to the public (the FISC and the Executive). His note does not consider the operations of other proxies, such as those treated here as surrogates. Sidney Shapiro and Reina Steinzor use agency theory to evaluate how to hold Congress and the Executive accountable to the public in the face “burgeoning secrecy.” Sidney A. Shapiro & Rena I. Steinzor, The People’s Agent: Executive Branch Secrecy and Accountability in an Age of Terrorism, 69 Law & Contemp. Probs. 99, 101 (2006). They focus on who should have the power to declassify information, however, not on how other actors can check secret U.S. military and intelligence activities.Show More They have their own pathologies and policy preferences, have incomplete access to classified information, and could serve as a new source of leaks. These actors will not supplant the existing messiness of today’s interplay among the Executive, Congress, the courts, and leakers. Rather, they will supplement the reach of existing surrogates, expanding what Jack Goldsmith has framed, in the wider national security setting, as a “synopticon”—a distributed network of actors that surveils the Executive.29 29.Jack Goldsmith, Power and Constraint: The Accountable Presidency After 9/11, at 205–07 (2012).Show More This Article argues that adding knowledgeable players to the “secrecy synopticon” who can provide increased checks and monitoring without sacrificing much secrecy is a desirable development worth sustaining.

This Article makes three contributions. First, it shows descriptively that there are several unsung actors in the government secrecy ecosystem that help guard against the Executive’s misuse of secrecy, and that any evaluation of government secrecy that ignores these actors is importantly incomplete. It is well-understood that these types of actors play an important checking function in the public parts of government operations.30 30.See, e.g., Freeman, supra note 21, at 816–17 (describing how private actors participate publicly in governance through the regulatory process).Show More This Article shows that these actors also serve a checking function behind the veil of secrecy. Second, it analyzes the features of these groups that allow them to provide these checks. It draws attention to their role as necessary actors in the conduct of national security today; their on-the-ground expertise; and their ability to challenge the Executive without disclosing classified information. Third, the Article offers a normative defense of this development, identifying the surrogates’ incentives to improve the quality of intelligence, challenge legally questionable executive activities, and demand reasons for secret decisions. Thinking about the existence, role, and possibilities of these unsung secrecy surrogates can sharpen how we approach the challenges of government secrecy; identify where the coincidences of interest lie between these surrogates and the national public; suggest ways to preserve salutary overlaps in interest; and allow us to see where the most pressing gaps in oversight remain.

Part I identifies how the Executive can abuse secrecy, as well as the strengths and weaknesses of our traditional secrecy surrogates. Part II argues that several recent developments in national security threats have positioned technology companies, states and localities, and foreign allies to serve as unsung secrecy surrogates. Part III explores the incentives that these actors have to serve as checks on executive abuses of secrecy and considers how those incentives are aligned with the public law values of legality, accountability, rationality, participation, and, to some extent, transparency. Part IV places these unsung surrogates in the context of a broader “secrecy synopticon.” It addresses challenges to the argument that the unsung surrogates can perform robust checking functions and proposes modest ways to enhance their role in the synopticon.

  1. * Professor, University of Virginia Law School. Thanks to George Cohen, Jen Daskal, Kristen Eichensehr, Mike Flowers, John Harrison, Debbie Hellman, Rebecca Ingber, Nate Jones, Aaron Karczmer, Matt Olsen, Daphna Renan, Rich Schragger, Paul Stephan, and participants in the 2019 Duke-Virginia Foreign Relations Roundtable and in workshops at Harvard Law School and the University of Houston Law Center for very helpful conversations and comments.

  2. Julian E. Barnes, Michael Crowley, Matthew Rosenberg & Mark Mazzetti, White House Classified Computer System Is Used To Hold Transcripts of Sensitive Calls, N.Y. Times (Sept. 29, 2019), https://www.nytimes.com/2019/09/27/us/politics/nsc-ukraine-call.html [https://perma.cc/F9ZC-68Z3]; see Dustin Volz, Andrew Duehren & Natalie Andrews, White House Official Feared Trump Transcript Leak Could Be Politically Damaging, Wall St. J. (Nov. 17, 2019, 5:52 AM), https://www.wsj.com/articles/white-house-official-feared-trump-transcript-leak-could-be-politically-damaging-11573942481 [https://perma.cc/LV53-PL42].

  3. See, e.g., Ayesha Rascoe & Franco Ordoñez, Former Officials Say White House’s Use of Secret System Is Unusual, ‘Disturbing,’ NPR (Sept. 27, 2019, 5:40 AM), https://www.npr.org/2019/09/27/764759182/former-officials-say-white-houses-use-of-secret-system-is-unusual-disturbing [https://perma.cc/7PBJ-5MF8] (quoting former White House official as stating that “[t]his seems to be nothing more than an abuse of the classification and the information security system to safeguard not the information, but to effect a cover-up” (internal quotation marks omitted)).

  4. See Loch K. Johnson, Governing in the Absence of Angels: On the Practice of Intelligence Accountability in the United States, in Who’s Watching the Spies? Establishing Intelligence Service Accountability 57, 61 (Hans Born, Loch K. Johnson & Ian Leigh eds., 2005) (quoting intelligence scholar as stating that the major problem facing U.S. intelligence in 2005 was that the “CIA [had] not been gathering enough quality data”).

  5. See Frederick A.O. Schwarz Jr., Democracy in the Dark: The Seduction of Government Secrecy 2 (2015) (“[T]oo much is kept secret not to protect America but to keep embarrassing or illegal conduct from Americans.”).

  6. Robert M. Pallitto & William G. Weaver, Presidential Secrecy and the Law 3 (2007) (noting executive interest in “maintain[ing] presidential prerogative against congressional inquiries and judicial orders”); id. at 6 (“Where a president may do what is desired in secret, there is no reason to withstand the ordeal of a political battle to achieve the same ends.”); H.R. Select Comm. To Investigate Covert Arms Transactions with Iran & S. Select Comm. on Secret Military Assistance to Iran and the Nicaraguan Opposition, 100th Cong., Rep. of the Congressional Committees Investigating the Iran-Contra Affair, Minority Report 450, 515 (Comm. Print 1987) (stating that the President should undertake “democratic persuasion” to develop support for his policies and that he will not succeed “unless the public is exposed to and persuaded by a clear, sustained, and principled debate on the merits”); David E. Pozen, Deep Secrecy, 62 Stan. L. Rev. 257, 279 (2010) (discussing how secrecy provides “insulation from scrutiny”).

  7. See Pozen, supra note 5, at 280; S. Select Comm. To Study Governmental Operations with Respect to Intel. Activities, Final Report, S. Rep. No. 94-755, at 4 (1976) (“[T]here are many necessary and proper governmental activities that must be conducted in secrecy. . . . [However,] intelligence activities conducted outside the framework of the Constitution and statutes can undermine the treasured values guaranteed in the Bill of Rights. Further, if the intelligence agencies act in ways inimical to declared national purposes, they damage the reputation, power, and influence of the United States abroad.”).

  8. See, e.g., Rahul Sagar, Secrets and Leaks: The Dilemma of State Secrecy (2013) (considering role of Congress, the courts, whistleblowers, and leakers in managing government secrecy); Pallitto & Weaver, supra note 5 (considering Congress, the courts, and leaks); Michael P. Colaresi, Democracy Declassified: The Secrecy Dilemma in National Security 181 (2014) (discussing role of legislatures, freedom of information laws, and press freedom laws in checking executive secrecy); Mark Fenster, The Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information (2017) (discussing the role of the press, freedom of information laws, anti-corruption non-governmental organizations, and leaks); Pozen, supra note 5, at 269, 274 (focusing on deep secret keeping by executive officials, treating Congress and the courts as the primary recipients of shallow secrets, and assuming that very few private actors generally will be aware of government secrets); Johnson, supra note 3, at 58 (noting that the “most consistent and serious manifestation of intelligence oversight has come not from presidential commissions, but from the media and the Congress”); Josh Chafetz, Whose Secrets?, 127 Harv. L. Rev. F. 86, 87 (2013) (emphasizing the role of Congress in the secrecy regime).

  9. Members of the committees that oversee military and foreign relations issues also have access to classified information relevant to their legislative and oversight tasks.

  10. I have argued elsewhere that other actors and mechanisms constrain the Executive in its classified operations, including executive branch lawyers and norms of reason giving. See Ashley Deeks, Checks and Balances from Abroad, 83 U. Chi. L. Rev. 65 (2016) [hereinafter Deeks, Checks and Balances]; Ashley S. Deeks, Secret Reason-Giving, 129 Yale L.J. 612 (2020) [hereinafter Deeks, Reason-Giving]; Ashley S. Deeks, The Substance of Secret Agreements and the Role of Government Lawyers, 111 AJIL Unbound 474 (2018).

  11. Additional actors play a role in what this Article terms the “secrecy ecosystem.” These actors include the Privacy and Civil Liberties Oversight Board, the Presidential Intelligence Advisory Board (“PIAB”), and the Defense Advisory Board. See, e.g., Kenneth Michael Absher, Michael C. Desch & Roman Popadiuk, Privileged and Confidential: The Secret History of the President’s Intelligence Advisory Board (2012) (discussing the PIAB); Johnson, supra note 3, at 73 (noting that when Brent Scowcroft was Chair of the PIAB, he produced a “hard-hitting review” of the intelligence organization). For reasons of space, however, this Article does not address the role of these other secrecy surrogates.

  12. By “technology companies,” I mean large social media, software, and computer technology companies such as Google, Microsoft, and Facebook, as well as companies that provide cybersecurity services, such as FireEye/Mandiant, Crowdstrike, and IronNet.

  13. Similar interactions conceivably occur with utility companies and private banks because these companies have been targets of thousands of hostile cyber operations. The Intelligence Community’s 2019 Threat Assessment noted, “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016.” Daniel R. Coats, Dir. of Nat’l Intel., Statement for the Record: Worldwide Threat Assessment of the U.S. Intelli-
    gence Community 6 (2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR—SSCI.pdf [https://perma.cc/M7DS-WPY4]. Further, the Intelligence Community is authorized to disseminate “classified reports to critical infrastructure entities authorized to receive them.” Off. of the Dir. of Nat’l Intel., Dep’t of Homeland Sec., Dep’t of Def. & Dep’t of Just., Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government Under the Cybersecurity Information Sharing Act of 2015, at 13 (2016), https://www.us-cert. gov/sites/default/files/ais_files/Federal_Government_Sharing_Guidance_(103).pdf. [https://p erma.cc/HYH7-XUCD]. This Article focuses on technology companies because they are most likely to be sophisticated consumers (and providers) of intelligence on cyber operations. Some utility companies are reportedly insufficiently focused on cybersecurity and thus are poorly positioned—at least right now—to play a significant role in checking a sophisticated actor like the Executive. For a critique of utility company cybersecurity practices, see Joseph Marks & Tonya Riley, The Cybersecurity 202: Activist Wants Court To Name and Shame Electric Utilities for Violating Cybersecurity Rules, Wash. Post (Dec. 3, 2019, 4:35 AM), https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/12/0­3/the-cybersecurity-202-activist-wants-court-to-name-and-shame-electric-utilities-for-viol­ating-cybersecurity-rules/5de550bf88e0fa652bbbdb18/ [https://perma.cc/N43C-Z4ZL]; Catherine Stupp, Utilities Are Prime Targets for Cyberattacks, WSJ Pro Cybersecurity (Aug. 7, 2019, 11:19 AM), https://www.wsj.com/articles/utilities-are-prime-target-for-cyberattacks-11565170204 [https://perma.cc/2S5J-EJU6] (“Utilities often don’t have enough employees with security clearance that lets them quickly get classified information about cyber threats from the federal government.”). Utilities, banks, and other operators of critical infrastructure may play a greater checking function in the future as they gain more experience with these threats. For a report recommending that the government enhance its sharing of classified information with utilities grid operators, see Nat’l Comm’n on Grid Resilience, Grid Resilience: Priorities for the Next Administration 28 (2020), https://gridresilience.org/wp-content/uploads/2020/08/NCGR-Report-2020-Full.pdf [https://perma.cc/5QMV-XUAN].

  14. For example, the Trump Administration has tried for more than a year to persuade allies not to employ Huawei equipment in their 5G networks and has received pushback from a range of foreign governments. Robbie Gramer & Lara Seligman, Can the U.S.-U.K. Special Relationship Weather the Huawei Storm?, Foreign Pol’y (Jan. 30, 2020, 5:10 PM), https://foreignpolicy.com/2020/01/30/huawei-intelligence-united-states-britain-trump-5g-in­frastructure-concerns-digital-espionage-special-relationship-five-eyes/ [https://perma.cc/7Z­48-TKWX].

  15. For instance, in 2013, Los Angeles created a Cyber Intrusion Command
    Center, City of Los Angeles, Exec. Directive No. 2 (Oct. 30, 2013), https://www.lamayor.org/sites/g/files/wph446/f/page/file/ED2_with_signature_and_letterhead.pdf?1426620047 [https://perma.cc/6E9C-JC7M] (anticipating collaboration with the FBI and other federal agencies), and in 2017, New York City created its own Cyber Command, City of New York, Exec. Order No. 28 (July 11, 2017), https://www1.nyc.gov/a­ssets/home/downloads/pdf/executive-orders/2017/eo_28.pdf [https://perma.cc/7CNG-HA­MH] (anticipating collaboration with federal and state government agencies and the private sector); see also Brennan Weiss, Inside New York City Cyber Command, Bus. Insider (May 5, 2018, 8:00 AM), https://www.businessinsider.com/nyc-cyber-command-protecting-new-yorkers-2018-4 [https://perma.cc/46VA-MWC7].

  16. See Matthew C. Waxman, National Security Federalism in the Age of Terror, 64 Stan. L. Rev. 289, 333 (2012).

  17.  A possible analogy is to the role of auditors, who verify the accuracy of the
    government’s records (here, its intelligence and analysis) and point out deficiencies
    in its operations. For the use of the concept of substantive audits in the intelligence
    setting, see Eric Posner, It’s Time to Audit America’s Secrets, Foreign Pol’y (Feb. 2, 2018, 5:13 PM), https://foreignpolicy.com/2018/02/02/its-time-to-audit-all-of-americas-secrets/ [https://per­ma.cc/LK65-W4NA]; Elizabeth Goitein & J. William Leonard,
    Opinion, America’s Unnecessary Secrets, N.Y. Times (Nov. 7, 2011), https://www.nytimes.com/­2011/11/07/opinion/national-security-and-americas-unnecessary-secrets.html [https://perma.cc/2UAL-GFKL] (arguing that one way to combat government over-classification is to allow agencies’ inspectors general to “audit officials’ classification decisions”).

  18. See Michael Wines, State Officials Say They Are Told Too Little About Election Threats, N.Y. Times (Feb. 19, 2018), https://www.nytimes.com/2018/02/19/us/elections-states-hacking.html [https://perma.cc/77LU-KFCV] (describing the relationship between the Department of Homeland Security and local election officials as an “arranged marriage”).

  19. Deeks, Reason-Giving, supra note 9.

  20.  Those who frame the government secrecy debate as a choice between secrecy and disclosure thus are misframing the issue. See Philip H. Melanson, Secrecy Wars 8, 183 (2001) (describing the “ongoing battle between secret keepers and those seeking access”).

  21. There is an irony here: in certain areas of classified government operations, these actors, which lack a constitutional relationship to our national polity, may be better positioned to alter the non-public behavior of the Executive than the courts and congressional committees, which are our direct surrogates.

  22. See Jody Freeman, Private Parties, Public Functions and the New Administrative Law, 52 Admin. L. Rev. 813, 818–19 (2000) (listing “openness, fairness, participation, consistency, rationality, impartiality, and accessibility of judicial review” as well as accountability and legality as public law values); id. at 819 (“Private actors are not just rent-seekers that exacerbate the traditional democracy problem in administrative law; they are also regulatory resources capable of contributing to the efficacy and legitimacy of administration.”); Michael Taggart, The Province of Administrative Law Determined?, in The Province of Administrative Law 1, 3 (Michael Taggart ed., 1997) (defining public law values to include openness, participation, accountability, honesty, and rationality); Mark Aronson, A Public Lawyer’s Response to Privatisation and Outsourcing, in The Province of Administrative Law 40, 43 (Michael Taggart ed., 1997).

  23. Alan Z. Rozenshtein, Surveillance Intermediaries, 70 Stan. L. Rev. 99, 106 (2018).

  24. Kristen E. Eichensehr, Public-Private Cybersecurity, 95 Tex. L. Rev. 467, 471 (2017) [hereinafter Eichensehr, Public-Private Cybersecurity].

  25. Waxman, supra note 15.

  26. Pozen, supra note 5, at 274 (“[A] government secret is deep if a small group of similarly situated officials conceals its existence from the public and from other officials, such that the outsiders’ ignorance precludes them from learning about, checking, or influencing the keepers’ use of the information.”).

  27. Id. at 275.

  28. Id. at 329–30, 333.

  29. Several scholars have considered government secrecy problems through a principal-agent lens. Daniel Epps identifies three mechanisms that could help reduce agency costs in the secrecy setting, one of which is the use of proxies. Daniel Epps, Note, Mechanisms of Secrecy, 121 Harv. L. Rev. 1556, 1558 (2008). Epps explores the use of proxies only briefly, however, and focuses on government actors who have a direct duty to the public (the FISC and the Executive). His note does not consider the operations of other proxies, such as those treated here as surrogates. Sidney Shapiro and Reina Steinzor use agency theory to evaluate how to hold Congress and the Executive accountable to the public in the face “burgeoning secrecy.” Sidney A. Shapiro & Rena I. Steinzor, The People’s Agent: Executive Branch Secrecy and Accountability in an Age of Terrorism, 69 Law & Contemp. Probs. 99, 101 (2006). They focus on who should have the power to declassify information, however, not on how other actors can check secret U.S. military and intelligence activities.

  30. Jack Goldsmith, Power and Constraint: The Accountable Presidency After 9/11, at 205–07 (2012).

  31. See, e.g., Freeman, supra note 21, at 816–17 (describing how private actors participate publicly in governance through the regulatory process).

Conflicts of Precedent

The law of the circuit doctrine requires three-judge panels in the federal courts of appeals to give stare decisis effect to past decisions of the circuit, which can only be overruled by the circuit sitting en banc or by the U.S. Supreme Court. This doctrine presents a recurring dilemma for circuit panels: the applicability of circuit precedent that is undermined by, but not conclusively overruled by, intervening Supreme Court precedent. The circuits have developed disparate approaches to addressing these scenarios: some permit three-judge panels to overrule undermined circuit precedent, others require an en banc proceeding to reject circuit precedent that is not unequivocally overruled by the Supreme Court, and still others have an internal procedure for circuit judges to agree on the proper approach.

This Note explores how federal courts of appeals ought to treat undermined-but-not-overruled circuit precedent. It first rejects the potential argument that horizontal stare decisis in the court of appeals is compelled by the Constitution or by statute. As such, the Note explains how the values of uniformity, institutional legitimacy, accuracy, reliance, and judicial economy are served by the practices of vertical and horizontal stare decisis, and it concludes that those values are better served by following vertical precedent than horizontal. Accordingly, this Note argues that circuit panels should apply a presumption in favor of overruling undermined precedent to align circuit doctrine with recent Supreme Court decisions. Moreover, the Note argues that the strength of this presumption should be tailored to the context of the case. By re-orienting the focus of precedent toward Supreme Court decisions rather than contradicted circuit doctrine, the courts of appeals can bring greater uniformity to the content of federal law, enhance efficiency within the legal system, and better enable the Supreme Court to realize its position atop the judicial hierarchy.

I. Introduction

Recall the classic case of Flood v. Kuhn, where the U.S. Supreme Court had to decide whether the Sherman Antitrust Act applied to professional baseball.1.407 U.S. 258, 259 (1972).Show More The Court was not writing on a blank slate in Kuhn; fifty years earlier in Federal Baseball Club of Baltimore Inc. v. National League of Professional Baseball Clubs, it held that the Sherman Act did not cover professional baseball.2.259 U.S. 200, 209 (1922).Show More But in the meantime, the Supreme Court had interpreted the Sherman Act to reach professional boxing3.United States v. Int’l Boxing Club of N.Y., Inc., 348 U.S. 236, 242 (1955).Show More and football.4.Radovich v. Nat’l Football League, 352 U.S. 445, 452 (1957). The Supreme Court had also reaffirmed Federal Baseball Club’s holding in Toolson v. New York Yankees, Inc., 346 U.S. 356 (1953) (per curiam), but that case was decided before International Boxing Club or Radovich.Show More By the time of Flood v. Kuhn, Federal Baseball Club was an outlier, and yet the Court adhered to baseball’s unique exemption from antitrust liability on the grounds of stare decisis.5.Kuhn, 407 U.S. at 283–84.Show More

Now let’s put a twist on that story. Imagine that at Time 1, a federal court of appeals, rather than the Supreme Court, decided Federal Baseball Club and held professional baseball to be exempt from the Sherman Act. Subsequently at Time 2, the U.S. Supreme Court held that the Sherman Act was applicable to professional boxing and football. At Time 3, the equivalent of Flood v. Kuhn, challenging the continued viability of Federal Baseball Club, comes before the court of appeals. How should the court proceed in light of the Time 2 Supreme Court decisions that cast doubt on, but do not directly overturn, the appellate court’s Time 1 precedent?

This type of case poses a significant dilemma for stare decisis in the federal courts of appeals. Under the law of the circuit doctrine, circuit precedents are binding on that court unless a majority of active judges in the circuit overturn a decision in an en banc proceeding or the precedent is directly overruled by the Supreme Court.6.See, e.g., Lewis v. Humboldt Acquisition Corp., 634 F.3d 879, 881 (6th Cir. 2011) (en banc).Show More But in some circuits, when a Supreme Court decision casts doubt on—without directly overruling—a prior circuit precedent, a panel of court of appeals judges can overrule that precedent and bypass an en banc proceeding.7.See, e.g.,United States v. Villareal-Amarillas, 562 F.3d 892, 898 n.4 (8th Cir. 2009).Show More In other circuits, a panel’s authority to overrule circuit precedent under these circumstances is very narrowly circumscribed.8.See, e.g.,United States v. Staten, 466 F.3d 708, 717–20 (9th Cir. 2006).Show More This type of situation commonly arises when the Supreme Court interprets a statute that bears some relation to the one addressed by a circuit precedent. The issue also presents itself when the Supreme Court interprets the same constitutional or statutory provision as the circuit precedent but considers different factual subject matter.

The problem of undermined-but-not-overruled circuit precedent is a recurring dilemma for federal courts of appeals.9.Andrew C. Michaels, Implicit Overruling and Foreign Lost Profits, 25 B.U. J. Sci. & Tech. L. 408, 409 (2019) (“[H]ow might a court choose between following a directly-on-point circuit panel precedent, versus a subsequent Supreme Court case that is less directly on point but arguably overruled that panel precedent? Despite the fact that federal circuit courts (and district courts) are faced with this question on a regular basis, the answer is not clear.”).Show More The Sixth Circuit, for example, recently faced this dilemma in Jacobs v. Alam.10 10.915 F.3d 1028 (6th Cir. 2019).Show More The plaintiff filed a Bivens11 11.Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388 (1971).Show More action against federal law enforcement agents to recover damages for excessive force, false arrest, malicious prosecution, fabrication of evidence, and civil conspiracy.12 12.Jacobs, 915 F.3d at 1033.Show More The Sixth Circuit (but not the Supreme Court) had previously recognized Bivens claims for damages in all of those contexts.13 13.See Webb v. United States, 789 F.3d 647, 659–60, 666–72 (6th Cir. 2015) (discussing the merits of Bivens actions for malicious prosecution, false arrest, fabrication of evidence, and civil conspiracy); Burley v. Gagacki, 729 F.3d 610, 621 (6th Cir. 2013) (explaining plaintiff’s burden for an excessive force Bivens action).Show More But after those Sixth Circuit decisions, the Supreme Court decided Ziglar v. Abbasi, which concluded that if a case presents a new Bivens context that is “different in a meaningful way from previous Bivens cases decided by [the Supreme] Court,” then the deciding court should not make a Bivens remedy available if there are “special factors counselling hesitation.”14 14.137 S. Ct. 1843, 1857, 1859 (2017) (emphasis added) (quoting Carlson v. Green, 446 U.S. 14, 18 (1980)) (internal quotation marks omitted).Show More The Sixth Circuit panel in Jacobs recognized that had Abbasi not been decided, “defendants’ appeal would have no merit” under circuit precedent.15 15.Jacobs, 915 F.3d at 1036.Show More But although Abbasi did not directly overrule those Bivens circuit precedents,16 16.AccordLoumiet v. United States, 292 F. Supp. 3d 222, 229 (D.D.C. 2017) (rejecting the theory that “after Abbasi, a district court may no longer rely on circuit court precedent recognizing a Bivens cause of action in a context that has not expressly been recognized (or expressly rejected) by the Supreme Court”).Show More the decision called into question whether they were still good law, or whether the court needed to perform a special factors analysis. Ultimately, the Jacobs panel did not “deem these Sixth Circuit precedents inconsistent with Ziglar [v. Abbasi],” and thus, it concluded that it was bound to follow them without resort to a special factors analysis.17 17. Jacobs, 915 F.3d at 1036–39.Show More

The D.C. Circuit, however, took the opposite tack in the context of Bivens claims following Ziglar v. Abbasi. In Loumiet v. United States, the court considered whether to permit a Bivens action for a First Amendment retaliation claim.18 18.948 F.3d 376, 378 (D.C. Cir. 2020).Show More Although the D.C. Circuit had previously recognized Bivens claims in this context,19 19.See, e.g., Haynesworth v. Miller, 820 F.2d 1245, 1255 (D.C. Cir. 1987) (holding that “retaliatory prosecution constitutes an actionable First Amendment wrong redressable under Bivens” (footnote omitted)).Show More the court held that “those cases have been overtaken by Abbasi’s holding that the new-context analysis may consider only Supreme Court decisions approving Bivens actions.”20 20.Loumiet, 948 F.3d at 382.Show More Instead, the D.C. Circuit panel performed a special factors analysis and held that a Bivens remedy was not available for First Amendment retaliation, despite the fact that its own circuit precedents supported a contrary decision.21 21.Id.at 382–86; accordVanderklok v. United States, 868 F.3d 189, 198–99 (3d Cir. 2017) (concluding that “[the circuit’s own] past pronouncements are thus not controlling” in the context of Bivens claims that had not been addressed by the Supreme Court).Show More

While the problem of undermined circuit precedent is frequently presented, the circuits have not developed a sufficiently nuanced framework for handling these challenging cases. The courts of appeals take disparate approaches in addressing these situations, and notably, no circuit tailors its approach to the specific legal context presented by the case.

In light of the motivations behind vertical and horizontal stare decisis, this Note argues that circuit court panels ought to apply a general presumption in favor of overruling an undermined circuit precedent. Importantly, however, special circumstances justify a stronger or weaker application of this general rule. This Note proceeds in four parts. Part II examines how the federal courts of appeals have handled latent conflicts between on-point circuit precedents and intervening Supreme Court cases that undermine those decisions. Part III explores the practice of stare decisis in the American judiciary. It explains the potential constitutional, statutory, and pragmatic sources of vertical and horizontal precedent at the court of appeals level. Part IV proposes an approach for how courts of appeals ought to handle these conflicts grounded in the justifications behind vertical and horizontal stare decisis. Part V concludes.

  1. * J.D., University of Virginia School of Law, 2020. Winner of the Roger and Madeleine Traynor Prize. Special thanks are first owed to my advisor Caleb Nelson, who provided invaluable commentary and direction throughout this project. I would also like to thank those whose feedback further refined the paper, including Hanaa Khan, Jackson Myers, Jonah Panikar, and the rest of the Virginia Law Review’s hard-working staff. Final and most important thanks are owed to my wife, Allyson Dickman, whose editorial assistance and constant encouragement made this Note possible.

  2. 407 U.S. 258, 259 (1972).

  3. 259 U.S. 200, 209 (1922).

  4. United States v. Int’l Boxing Club of N.Y., Inc., 348 U.S. 236, 242 (1955).

  5. Radovich v. Nat’l Football League, 352 U.S. 445, 452 (1957). The Supreme Court had also reaffirmed Federal Baseball Club’s holding in Toolson v. New York Yankees, Inc., 346 U.S. 356 (1953) (per curiam), but that case was decided before International Boxing Club or Radovich.

  6. Kuhn, 407 U.S. at 283–84.

  7. See, e.g., Lewis v. Humboldt Acquisition Corp., 634 F.3d 879, 881 (6th Cir. 2011) (en banc).

  8. See, e.g., United States v. Villareal-Amarillas, 562 F.3d 892, 898 n.4 (8th Cir. 2009).

  9. See, e.g., United States v. Staten, 466 F.3d 708, 717–20 (9th Cir. 2006).

  10. Andrew C. Michaels, Implicit Overruling and Foreign Lost Profits, 25 B.U. J. Sci. & Tech. L. 408, 409 (2019) (“[H]ow might a court choose between following a directly-on-point circuit panel precedent, versus a subsequent Supreme Court case that is less directly on point but arguably overruled that panel precedent? Despite the fact that federal circuit courts (and district courts) are faced with this question on a regular basis, the answer is not clear.”).

  11. 915 F.3d 1028 (6th Cir. 2019).

  12. Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388 (1971).

  13. Jacobs, 915 F.3d at 1033.

  14. See Webb v. United States, 789 F.3d 647, 659–60, 666–72 (6th Cir. 2015) (discussing the merits of Bivens actions for malicious prosecution, false arrest, fabrication of evidence, and civil conspiracy); Burley v. Gagacki, 729 F.3d 610, 621 (6th Cir. 2013) (explaining plaintiff’s burden for an excessive force Bivens action).

  15. 137 S. Ct. 1843, 1857, 1859 (2017) (emphasis added) (quoting Carlson v. Green, 446 U.S. 14, 18 (1980)) (internal quotation marks omitted).

  16. Jacobs, 915 F.3d at 1036.

  17. Accord Loumiet v. United States, 292 F. Supp. 3d 222, 229 (D.D.C. 2017) (rejecting the theory that “after Abbasi, a district court may no longer rely on circuit court precedent recognizing a Bivens cause of action in a context that has not expressly been recognized (or expressly rejected) by the Supreme Court”).

  18. Jacobs, 915 F.3d at 1036–39.

  19. 948 F.3d 376, 378 (D.C. Cir. 2020).

  20. See, e.g., Haynesworth v. Miller, 820 F.2d 1245, 1255 (D.C. Cir. 1987) (holding that “retaliatory prosecution constitutes an actionable First Amendment wrong redressable under Bivens” (footnote omitted)).

  21. Loumiet, 948 F.3d at 382.

  22. Id. at 382–86; accord Vanderklok v. United States, 868 F.3d 189, 198–99 (3d Cir. 2017) (concluding that “[the circuit’s own] past pronouncements are thus not controlling” in the context of Bivens claims that had not been addressed by the Supreme Court).