Secret Law
Secret Law
JONATHAN MANES*
The law cannot be a secret hidden from the public. This proposition strikes
most of us as uncontroversial—a basic premise of any legal order committed to
democratic accountability and the rule of law. Yet in this country secret law not
only exists, but has become an entrenched feature of contemporary national
security governance. From NSA surveillance to terrorist watch lists to targeted
killings, the most controversial national security programs of our time have all
been governed by secret rules, secret directives, and secret legal interpretations.
This Article sheds new light on this deeply unsettling state of affairs. It
pushes beyond a reflexive aversion to secret law to unpack the underlying
normative principles that both militate against secret law and motivate its
widespread use. Secret law poses grave threats to basic values of democratic
accountability, individual liberty, and separation of powers, but it also serves
pragmatic national security purposes. By clarifying these competing values, it is
possible to identify a number of distinct characteristics that make a given
example of secret law especially odious—or essentially benign. This Article thus
offers a systematic rubric for evaluating particular instances of secret law.
This Article also provides the first systematic review of the legal ecosystem
that governs secret law in the Executive Branch—what I call the “law of secret
law.” The picture that emerges is startling: existing law gives the Executive
Branch enormous discretion to keep law secret. Indeed, the courts have effec
tively endorsed the practice of secret law, and Congress has been almost
entirely quiescent in its face.
This Article proposes a novel reform agenda to transform this permissive
legal ecosystem into one that more adequately protects transparency values. It
offers core principles for a new framework statute limiting the practice of secret
law. In addition, it argues that courts can and should prompt democratic
deliberation over secret law (and legislative reconsideration of the status quo)
by adopting a constitutional clear statement rule against secret law that is
grounded in the text and structure of the Constitution.
* Assistant Clinical Professor of Law, State University of New York, University at Buffalo School of
Law; Affiliated Fellow, Yale Law School Information Society Project. © 2018, Jonathan Manes. The
author is grateful for feedback on earlier versions of this Article from Jack Balkin, Kiel Brennan-
Marquez, Michael Froomkin, Heidi Kitrosser, Harold Koh, Paul Kahn, Margot Kaminski, Dakota
Rudesill, David Schulz, Andrew Selbst, and Chuck Sims, as well as other participants in the Yale
Freedom of Expression Scholars Conference and Yale Information Society Project workshop, including
Enrique Armijo, David Thaw, Christina Mulligan, Colin Agur, BJ Ard, Valerie Belair-Gagnon, Rebecca
Crootof, Camilla Hrdy, Lauren Henry, Kate Klonick, Gabriel Michael, Kerry Monroe, Pranesh Prakash,
Esteve Sanz, and Cilla Smith. Special thanks to Anne Parham, Caroline Boisvert, Aneesha Sehgal,
Grace Song, and their colleagues at the Georgetown Law Journal who expertly edited this Article and
shepherded it to publication.
803
TABLE OF CONTENTS
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805
Effectiveness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
INTRODUCTION
The law cannot be a secret hidden from the public. This proposition strikes
most of us as uncontroversial—a basic premise of any legal order committed to
democratic accountability and the rule of law. The idea that the very rules that
empower and constrain the government could be kept secret from the public—
immune from its scrutiny and democratic deliberation—is deeply troubling. Yet
in this country secret law not only exists, but has become an entrenched feature
of contemporary national security governance. Indeed, over the past fifteen
years the government has consistently, vigorously, and openly defended its
authority to adopt and maintain secret legal rules; the courts have often en
dorsed this practice; and Congress has been almost entirely quiescent in its face.
Over and over in the post-9/11 era, the story of national security policymak
ing has been the story of secret law. The most controversial programs initiated
in response to the contemporary threat of terrorism have been founded upon
secret legal rules, secret legal interpretations, secret legal directives, or some
combination of the three. Although the notion of secret law is startling, there is
no doubt that it has become a regular part of national security governance. A
brief recitation of recent programs establishes this alarming claim.
Immediately after the 9/11 attacks, the administration of President George W.
Bush enacted a policy of warrantless domestic surveillance, apparently flouting
criminal prohibitions on domestic spying by intelligence agencies.1 It did so by
1. See generally OFFICES OF INSPECTORS GEN. OF THE DEP’T OF DEF. ET AL., REP. NO. 2009-0013-AS,
UNCLASSIFIED REPORT ON THE PRESIDENT’S SURVEILLANCE PROGRAM (2009), https://oig.justice.gov/special/s
0907.pdf [https://perma.cc/YN3M-HYYQ] [hereinafter PSP REPORT] (discussing the creation and under
lying policies of the President’s Surveillance Program); see also Morton H. Halperin & Jerry Berman, A
Legal Analysis of the NSA Warrantless Surveillance Program, CTR. FOR DEMOCRACY & TECH. 3–4 (Jan.
17, 2006), https://www.cdt.org/files/security/nsa/20060117halperinberman.pdf [https://perma.cc/TK7M
2359].
806 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
2. See PSP REPORT, supra note 1, at 5–14 (discussing the adoption of “new, highly classified
intelligence activities” authorized by President Bush, including authorized interceptions of international
communications).
3. See generally S. SELECT COMM. ON INTELLIGENCE, COMMITTEE STUDY OF THE CENTRAL INTELLIGENCE
AGENCY’S DETENTION AND INTERROGATION PROGRAM, S. REP. NO. 113-288 (2014), https://www.congress.gov/
113/crpt/srpt288/CRPT-113srpt288.pdf [https://perma.cc/K7JY-FQA2] (evaluating the CIA’s use of
“enhanced interrogation”); LARRY SIEMS, THE TORTURE REPORT: WHAT THE DOCUMENTS SAY ABOUT
AMERICA’S POST-9/11 TORTURE PROGRAM (2011) (providing a meticulous account of the Bush-era torture
program based on thousands of government documents).
4. See A Guide to the Memos on Torture, N.Y. TIMES (2005), http://www.nytimes.com/ref/international/
24MEMO-GUIDE.html [https://perma.cc/Q3AU-BCY8]; Andrew Cohen, The Torture Memos, 10 Years
Later, ATLANTIC (Feb. 6, 2012), https://www.theatlantic.com/national/archive/2012/02/the-torture-memos
10-years-later/252439 [https://perma.cc/X9BW-H25G].
5. See generally OFFICE OF THE INSPECTOR GEN., U.S. DEP’T OF JUSTICE, REVIEW OF THE TERRORIST
SCREENING CENTER (2005), https://oig.justice.gov/reports/FBI/a0527/final.pdf [https://perma.cc/U4Q6
NJHC] [hereinafter DOJ-OIG 2005] (discussing the creation of the Terrorist Screening Center to
synthesize numerous terrorist watch lists).
6. See id. at 99–100.
7. See Latif v. Holder, 28 F. Supp. 3d 1134, 1141 & n.3 (D. Or. 2014).
8. See James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, N.Y. TIMES
(Dec. 16, 2005), http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.
html [https://nyti.ms/2k90zpQ].
9. See PSP REPORT, supra note 1, at 30–31.
10. See Laura K. Donohue, Bulk Metadata Collection: Statutory and Constitutional Considerations,
37 HARV. J.L. & PUB. POL’Y 757, 759–60 (2014); Glenn Greenwald, NSA Collecting Phone Records of
Millions of Verizon Customers Daily, GUARDIAN (June 6, 2013, 6:05 AM), https://www.theguardian.com/
world/2013/jun/06/nsa-phone-records-verizon-court-order [https://perma.cc/9SAX-W3LK].
11. See In re Application of the Fed. Bureau of Investigation for an Order Requiring the Prod. of
Tangible Things from [REDACTED], Order No. BR 0605 1, 2 (FISA Ct. May 24, 2006). See generally
Donohue, supra note 10 (analyzing, in depth, the telephone call tracking program).
12. See Press Release, James R. Clapper, Dir. of Nat’l Intelligence, DNI Clapper Declassifies
Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign
Intelligence Surveillance Act (Nov. 18, 2013), https://icontherecord.tumblr.com/post/67419963949/dni
2018] SECRET LAW 807
Article unearths the basic principles and values that secret law offends, as well
as the purposes that secret law serves. Second, based on this discussion, this
Article describes a novel and systematic rubric for evaluating whether and to
what extent any given secret law is problematic. Third, this Article provides a
synoptic view of the legal ecosystem that governs secret law, or what I call the
“law of secret law.” Finally, it proposes a reform agenda to transform this legal
ecosystem, which currently allows secret law to flourish, into one that strictly
limits secret law to circumstances where it is justified according to stringent and
public standards.
This Article seeks to push beyond a reflexive aversion to secret law to unpack
the underlying normative principles that both militate against secret law and
motivate its widespread use in the national security context. By clarifying these
competing principles, it is possible to identify distinct characteristics of specific
secret laws that make them particularly odious—or particularly benign. Specifi
cally, this Article argues that certain secret laws can be assessed along five axes,
each of which describes a key characteristic of a given secret law. These axes
are (1) the extent of external effects, (2) the novelty and unforeseeability, (3) the
level of granularity at which the law is disclosed, (4) the expected duration of
secrecy, and (5) the depth or extent of secrecy. This Article contends that secret
laws are more problematic to the extent that they lie toward the extremes of one
or more of these axes. This multifactor test for assessing secret laws illuminates
what is really at stake in disagreements about the legitimacy of secret law,
moving beyond both a blanket rejection of secret law and a complete deference
to national security secrecy. Instead, debates about the legitimacy of a given
instance of secret law can more usefully be understood as disagreements about
where a secret law should lie along one or more of these axes—for example,
NAT’L SEC. J. 241 (2015). In addition, the Brennan Center for Justice published a remarkable report on
the problem of secret law that, among many other contributions, includes the most comprehensive
compilation of secret Department of Justice (DOJ) legal opinions that constitute governing law for the
Executive Branch. See ELIZABETH GOITEIN, BRENNAN CTR. FOR JUSTICE, THE NEW ERA OF SECRET LAW
(2016). Jonathan Hafetz authored an incisive and thoughtful examination of secret law that focuses, in
particular, on how such laws often take the form of fluid and indeterminate standards that tend to
expand discretion. See Jonathan Hafetz, A Problem of Standards?: Another Perspective on Secret Law,
57 WM. & MARY L. REV. 2141 (2016). Sudha Setty critiqued the practice of secret law from a historical
and comparative perspective. See Sudha Setty, No More Secret Laws: How Transparency of Executive
Branch Legal Policy Doesn’t Let the Terrorists Win, 57 KAN. L. REV. 579 (2009). The problem of secret
law in the courts—which can arise when courts seal their judicial opinions in full or part—has also
received some scholarly attention. See, e.g., Bankston, supra note 17 (discussing sealed judicial
opinions that elaborate legal standards governing various forms of electronic surveillance); Orin S.
Kerr, A Rule of Lenity for National Security Surveillance Law, 100 VA. L. REV. 1513, 1525 (2014)
(observing that secret decisions of the Foreign Intelligence Surveillance Court have produced “a body
of secret law that seems removed from what a majority of the public would approve”); Michael A. Sall,
Note, Classified Opinions: Habeas at Guantánamo and the Creation of Secret Law, 101 GEO. L.J. 1147,
1159–61 (2013) (arguing that judicial opinions in Guantanamo Bay habeas proceedings can establish
secret legal rules because such opinions are often heavily redacted to excise classified information,
thereby obscuring the precise contours of the legal rules that have been developed and elaborated in
those cases).
2018] SECRET LAW 809
whether a secret law’s external effects on the public are direct and significant
enough that secrecy is intolerable, or whether the rules developed in secret
should be disclosed in more granular detail.19
This Article is the first to attempt a systematic description of the law of secret
law—that is, the ecosystem of legal rules that govern the practice of secret law
in the Executive Branch, including the Due Process Clause, the Federal Register
Act, and the Freedom of Information Act.20 The upshot of this survey is that
there are, in practice, few legal constraints on the creation of secret law. The law
of secret law essentially gives the Executive Branch discretion to determine
whether and when the rules governing national security programs can be
shielded from the public and, thus, ordinary democratic oversight.
This legal ecosystem produces an equilibrium in which secret law prolifer
ates. Current legal arrangements vastly undervalue the principles that militate
against secret law. Moreover, they produce an equilibrium that is not only
suboptimal, but also unstable. National security leaks like the Snowden disclo
sures bring secret law into the light in fitful, unpredictable, and episodic ways.
Indeed, the Snowden disclosures were so momentous and disruptive precisely
because they revealed a body of law that had, for years, secretly empowered the
intelligence community in unforeseeable ways.
The law of secret law must be reformed to reset this equilibrium. This Article
proposes that Congress impose stringent limits that would be binding on the
Executive Branch and enforceable by the courts. This Article offers a novel
roadmap to obtain such reforms, arguing that courts should initiate legislative
reconsideration of secret law by recognizing that secret laws raise grave constitu
tional concerns and should not be permitted unless Congress has clearly autho
rized them. Indeed, as this Article will show, constitutional text, doctrine, and
structure support the notion that the Constitution is hostile to secret law in the
Executive Branch.21
If courts were to recognize this kind of constitutional “clear statement rule”
against secret law, they would effectively put the question of secret law to
Congress—if not outright prohibit it themselves. In other words, the courts
would be prompting a public and democratic deliberation about the second
19. Cf. Hafetz, supra note 18. Hafetz argues that the problem of secret law is often better regarded as
a problem of inadequately specified legal standards that leave too much room for discretion. Id. at
2150–52. On this account, the problem is not that the rules are not disclosed at a sufficiently granular
level, but that there are not sufficiently granular rules to disclose in the first place. Id.
20. Jameel Jaffer and Brett Max Kaufman recently offered a trenchant examination of the “working
law doctrine” under FOIA, which is one important aspect of the law of secret law. See Jameel Jaffer &
Brett Max Kaufman, A Resurgence of Secret Law, 126 YALE L.J. F. 242 (2016).
21. This argument builds upon existing literature exploring the constitutional limits on secrecy in the
Executive Branch. See, e.g., MARK J. ROZELL, EXECUTIVE PRIVILEGE: PRESIDENTIAL POWER, SECRECY, AND
ACCOUNTABILITY (Univ. Press of Kan., 3d ed., 2010) (1994); Heidi Kitrosser, Secrecy and Separated
Powers: Executive Privilege Revisited, 92 IOWA L. REV. 489, 514–15, 542–43 (2007); David E. Pozen,
Deep Secrecy, 62 STAN. L. REV. 257 (2010); Adam M. Samaha, Government Secrets, Constitutional
Law, and Platforms for Judicial Intervention, 53 UCLA L. REV. 909 (2006).
810 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
order question of when law can be kept secret and thus immune from public and
democratic oversight.
The Supreme Court has repeatedly issued this kind of “democracy-forcing”
decision in its post-9/11 national security cases22—similar intervention is neces
sary here. As it stands, we have stumbled into a system that permits secret law
essentially at will in the national security context. The courts should, at a
minimum, require our democratic institutions to make an explicit, public deci
sion about whether and when secret law is justified. In the absence of meaning
ful reform, we invite further creeping expansion of secret law, and we risk a
Kafkaesque state of affairs in which the public cannot know the rules by which
the government is playing.
***
This Article proceeds in five parts. Part I defines key terms, explaining what I
mean by “secret law” and why we should regard these kinds of internal
Executive Branch rules as “law.” Part II explores the normative terrain of secret
law, identifying three fundamental objections to secret law, as well as the four
principal rationales offered in its defense. Part III offers a systematic rubric for
assessing whether a given secret law is justifiable. Part IV is a synoptic tour of
the legal landscape in which secret law has taken root—what I call the “law
of secret law.” Finally, Part V offers a reform agenda to address the problem of
secret law and begins to sketch constitutional arguments that can be mounted
against the practice of secret law in the Executive Branch.
22. See Josh Benson, The Guantánamo Game: A Public Choice Perspective on Judicial Review in
Wartime, 97 CAL. L. REV. 1219, 1264–73 (2009); Cass R. Sunstein, Minimalism at War, 2004 SUP. CT.
REV. 47, 53–54 (“Courts should require clear congressional authorization before the [E]xecutive
intrudes on interests that have a strong claim to constitutional protection.”); Jack M. Balkin, Hamdan as
a Democracy-Forcing Decision, BALKINIZATION (June 29, 2006), https://balkin.blogspot.com/2006/06/
hamdan-as-democracy-forcing-decision.html [https://perma.cc/L4CZ-GH2F].
2018] SECRET LAW 811
23. For an example of a more formal definition of law, see 5 U.S.C. § 551(4) (2012), which defines a
“rule” for purposes of the Administrative Procedure Act.
24. Trevor W. Morrison, Constitutional Alarmism, 124 HARV. L. REV. 1688, 1711 & nn.90–91 (2011)
(book review) (reviewing BRUCE ACKERMAN, THE DECLINE AND FALL OF THE AMERICAN REPUBLIC (2010))
(“OLC generally will not provide legal advice if there is doubt about whether it will be followed.”); see
also Jaffer & Kaufman, supra note 20.
25. See generally H.L.A. HART, THE CONCEPT OF LAW (3d ed., 2012) (discussing law as a social
construction); Scott J. Shapiro, What Is the Internal Point of View?, 75 FORDHAM L. REV. 1157, 1161–65
(2006) (describing H.L.A. Hart’s account of social rules in term of rules that groups regard as binding
from the internal point of view). Many positivist accounts of law also rely on a version of the “rule of
recognition”—in other words, the acceptance of second-order rules that identify which primary rules
are binding. In contrast with formalized rules that identify valid laws passed by Congress or elaborated
by courts, second-order rules that identify internal laws within the Executive Branch are less stylized
and uniform. There is nevertheless little doubt that general agreement exists about which internal rules
are binding. “Both inside and outside of administration, agency rules, practices, and precedents are
812 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
taken both to have normative force and to be subject to normative critique concerning whether they
instantiate an appropriate vision of lawful administration.” Jerry L. Mashaw, Federal Administration
and Administrative Law in the Gilded Age, 119 YALE L.J. 1362, 1471 (2010); see Elizabeth Magill,
Foreword, Agency Self-Regulation, 77 GEO. WASH. L. REV. 859, 861 (2009).
26. Modern natural law theorists, such as Lon Fuller, are not primarily concerned with identifying
the social facts or practices that distinguish law from other norms; instead they argue that to qualify as
law, a system of rules must meet certain moral criteria. See generally LON L. FULLER, THE MORALITY OF
LAW (Yale Univ. rev. ed. 1969). Fuller argued that one of the eight principles essential to the “internal
morality of law” was that laws, properly so-called, must be made known to the public. See id. at 45,
49–51, 93. On this view, a system of laws in which the law is kept secret is essentially illegitimate—it
doesn’t satisfy the moral requirements of law. Id. at 49–51.
For purposes of this project, however, it would beg the question against the legitimacy of secret law
simply to posit that law must be public to be legitimate. The point of this Article is to examine the
special case where law is known only to government officials and not to the public. Indeed, Fuller
himself acknowledged that there may be circumstances in which “we must bow to grim necessity” and
keep law secret. Id. at 92. I thus employ a definition of law that does not include disclosure to the public
as a sine qua non.
27. See generally Meir Dan-Cohen, Decision Rules and Conduct Rules: On Acoustic Separation in
Criminal Law, 97 HARV. L. REV. 625 (1984) (distinguishing between “decision rules” directed to
officials and “conduct rules” directed to the public).
28. See 5 U.S.C. §§ 551, 553 (2012); Peter L. Strauss, Comment, The Rulemaking Continuum, 41
DUKE L.J. 1463, 1466–68 (2002).
29. See Robert Knowles, National Security Rulemaking, 41 FLA. ST. L. REV. 883, 883 (2014)
(explaining that a “national security exception from notice-and-comment” in the APA “insulate[s] most
national security rulemaking from public scrutiny and meaningful judicial review”).
30. See generally BRUCE WYMAN, THE PRINCIPLES OF THE ADMINISTRATIVE LAW GOVERNING THE
RELATIONS OF PUBLIC OFFICERS (1903).
2018] SECRET LAW 813
tive governance. Jerry Mashaw has long stressed the crucial and underappreci
ated role of such “internal law.”31 Gillian Metzger and Kevin Stack have
likewise revived and defended the idea of “internal administrative law” as a
distinctive form of law.32 Following these authors, I take the view that such
internal norms, which pervasively structure and govern bureaucracies, have a
philosophical and pragmatic claim to the status of law similar to the varieties of
“external” law that are more commonly studied in the literature.33
In addition to clarifying how I use the term “law,” it is worth explaining what
constitutes a “secret” law. I use the term “secret” to refer to laws that are not
officially made available to the general public. For instance, an Executive
Branch legal opinion that is shared with both Congress and the courts consti
tutes a secret law unless it has been disclosed to the broader public.
Of course, there are degrees of secrecy: secrecy varies to the extent that the
law in question is disseminated within the Executive Branch, across branches of
government, or even with subsets of the public.34 Thus, for instance, one might
ask whether a classified FISC opinion still counts as a secret law if it has been
shared with security-cleared lawyers outside of the government who work for
the telecommunications companies directed to carry out the surveillance but
who are subject to a strict nondisclosure obligation. On my account, even this
species of law constitutes a secret law because the rules in question cannot be
shared with the general public.
Variations in the degree of secrecy certainly matter, as I discuss below, but
because the purpose of this Article is to explore whether and when the general
public can be kept in the dark about what the law is, I reserve the phrase “secret
law” to describe those cases where the public at large is shut out.
31. See, e.g., Mashaw, supra note 25, at 1412–15; Jerry L. Mashaw, Foreword, The American Model
of Federal Administrative Law: Remembering the First One Hundred Years, 78 GEO. WASH. L. REV. 975
(2010); Jerry L. Mashaw, Reluctant Nationalists: Federal Administration and Administrative Law in the
Republican Era, 1801–1829, 116 YALE L.J. 1636 (2007).
32. See generally Gillian E. Metzger & Kevin M. Stack, Internal Administrative Law, 115 MICH. L.
REV. 1239 (2017).
33. See Mashaw, supra note 25; Metzger & Stack, supra note 32, at 1256–63; see also Magill, supra
note 25, at 861.
34. See Pozen, supra note 21, at 262–75 (offering a subtle exploration of the degrees of secrecy in
government).
814 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
35. Grayned v. City of Rockford, 408 U.S. 104, 109 (1972) (internal quotations, footnotes, and
alterations omitted).
36. See Frederick Schauer, Fear, Risk and the First Amendment: Unraveling the Chilling Effect, 58
B.U. L. REV. 685, 689–92 (1978) (discussing the chilling effect with respect to rights beyond free
speech); Note, The Chilling Effect in Constitutional Law, 69 COLUM. L. REV. 808 (1969) (same).
2018] SECRET LAW 815
from them. When the law is secret, citizens are at the mercy of the government,
unable to know what the law requires or whether the government is violating it.
Contemporary government watchlisting programs provide a prime example
of these problems. The government maintains a database of more than one
million individuals in its Terrorist Identities Datamart Environment.37 Approxi
mately 680,000 of these people have reportedly been watchlisted as “known or
suspected terrorists.”38 Thousands of these people are U.S. citizens or perma
nent residents.39 Subsets of those watchlisted are subject to overt restrictions,
such as being placed on the No-Fly List, which forbids air travel. Other effects
of watchlisting are more opaque. The watch lists are routinely shared with
federal agencies, local police, foreign governments, and certain private entities,
which use them in ways that are unclear to the public.40 When a watchlisted
individual encounters any such entity, he or she is liable to face, at a minimum,
increased scrutiny and lengthier questioning,41 but often much more serious
consequences.42
The government sought for years to keep the rules governing this enormously
complex and consequential apparatus secret.43 The rules only became public in
July 2014, when they were leaked to journalists.44 Up until that point the only
37. Jeremy Scahill & Ryan Devereaux, Watch Commander: Barack Obama’s Secret Terrorist-
Tracking System, By the Numbers, INTERCEPT (Aug. 5, 2014, 12:45 PM), https://theintercept.com/2014/
08/05/watch-commander [https://perma.cc/G6WL-LM32].
38. Id. (internal quotations omitted).
39. Id. (reproducing government document indicating that approximately 20,800 U.S. citizens or
permanent residents are included in the government’s database, of which 5,000 have been watchlisted);
see Walter Pincus, 1,600 Are Suggested Daily for the FBI’s List, WASH. POST (Nov. 1, 2009),
http://www.washingtonpost.com/wp-dyn/content/article/2009/10/31/AR2009103102141.html [https://
perma.cc/XZ6P-L8MT] (“Fewer than 5 percent of the people on the list are U.S. citizens or legal
permanent residents.”).
40. Scahill & Devereaux, supra note 37.
41. The government’s leaked Watchlisting Guidance directs agencies that “encounter” an individual
on the watch list to use their existing authorities to collect all manner of information about the
individual for subsequent addition to the database. See NAT’L COUNTERTERRORISM CTR., WATCHLISTING
GUIDANCE 59–71 (2013), https://www.documentcloud.org/documents/1227228–2013-watchlist-guidance.
html [https://perma.cc/RR74-FHF9] [hereinafter WATCHLISTING GUIDANCE]; NAT’L CRIME INFO. CTR.,
NCIC 2000 OPERATING MANUAL: KNOWN OR APPROPRIATELY SUSPECTED TERRORIST (KST) FILE § 5.2 (2000)
(indicating law enforcement officers who encounter a watchlisted person should contact the FBI’s
Terrorist Screening Center and gather a variety of information, among other steps).
42. See, e.g., First Amended Complaint ¶ 8, Tanvir v. Lynch, 128 F. Supp. 3d 756 (S.D.N.Y. 2015)
(Document No. 15) (alleging the FBI used the threat of continued placement on the No-Fly List to
coerce Muslim Americans to become informants); Adam Goldman, Lawsuit Alleges FBI Is Using
No-Fly List to Force Muslims to Become Informants, WASH. POST (Apr. 22, 2014), https://www.
washingtonpost.com/world/national-security/lawsuit-alleges-fbi-is-using-no-fly-list-to-force-muslims
to-become-informants/2014/04/22/1a62f566-ca27-11e3-a75e-463587891b57 [https://perma.cc/FN3A
JB2B].
43. See WATCHLISTING GUIDANCE, supra note 41, at 1 (indicating that no part of the guidance manual
may be released because it constitutes “Sensitive Security Information” pursuant to transportation
security regulations).
44. See Jeremy Scahill & Ryan Devereaux, Blacklisted: The Secret Government Rulebook for
Labeling You a Terrorist, INTERCEPT (July 23, 2014, 1:45 PM), https://theintercept.com/2014/07/23/
blacklisted [https://perma.cc/JM6N-VBR9]; see also March 2013 Watchlisting Guidance, INTERCEPT
816 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
legal rule the government had disclosed was that a “reasonable suspicion”
standard of proof is applied when deciding whether to add individuals to watch
lists.45 Furthermore, the government had refused to say what a person must be
reasonably suspected of doing to be added, let alone revealed the detailed
criteria elaborating upon these requirements or the processes by which such
decisions are made.46 Nor had the government explained what standard must be
met for one’s name to be removed from the lists.47 As a result of many years of
litigation, the government did eventually describe the general criteria governing
placement on one particular watch list, the No-Fly List, but it still refuses to
disclose details about the No-Fly List rules and it has not disclosed anything
about the rules applicable to other watch lists.48
As a result of this secrecy, individuals have been kept in the dark as to why
they might be included on a watch list, what they must show to get themselves
removed, or even the likely consequences of being placed on a watch list.
Individuals who are improperly watchlisted are unable to point to violations of
the rules because the rules are secret. The government, in turn, enjoys enormous
unchecked discretion in how it interprets and applies its secret rules. Perhaps
unsurprisingly, the government has at times applied its watchlisting rules ex
tremely broadly and sloppily.49 In one case, the government put a Stanford
University graduate student on the No-Fly List because an FBI agent misunder
stood a routine form and mistakenly designated her for inclusion.50 Despite the
error, the government fought for years in court to keep her on the list—and to
prevent her from obtaining judicial review—taking two appeals to the Ninth
Circuit.51 Eight years after the case was filed, following a trial at which the error
finally came to light, the district court could only describe her treatment by the
government as “Kafkaesque.”52
It seems inevitable that the specter of being watchlisted has deterred perfectly
lawful behavior, particularly in the American Muslim community, which is the
most affected by such efforts.53 Even if not deterred, individuals who are, or
who believe they might be, on the watch list live their lives under the forebod
ing specter of the government’s power and its secret rulebook.
The same dynamic exists in other areas where secret law regulates govern
ment activities. Secret rules governing surveillance, for instance, have led
individuals—particularly journalists and other professionals who owe duties of
confidentiality—to avoid using various means of communication because they
cannot be sure whether and how their communications will be protected.54
There is evidence of more subtle and widespread chilling effects on individual
behavior.55 Even if there were no empirical chilling effects, where the law is
secret, individuals live under the threat that they may at any time be caught up
in programs governed by rules that they are not permitted to learn.56
Where the law is secret, however, the democratic apparatus of public account
ability is short-circuited. If the substance of the law is secret, the public cannot
have any meaningful input or control over it.
The situation is particularly grave where not only the substance of the law is
secret, but where the public is also kept in the dark that a secret law even exists.
Nobody in 2002 would have rallied to oppose a law permitting waterboarding
because nobody then knew that the OLC had, in effect, written such a law
through its legal opinions authorizing the technique despite the criminal prohibi
tion against torture.58 When the existence of the law is kept secret, the most the
public can hope for is that officials making the law pause to imagine what the
public would think of the law if it were disclosed, and that this private thought
experiment—perhaps combined with the possibility of future disclosure—has
an effect on officials’ decision making. In this sense, secret lawmakers are only
accountable to a hypothetical public.
Even where the public knows that a secret law exists, democratic oversight is
severely weakened. It is simply impossible to effectively manipulate the levers
of democratic oversight when one is forced to speculate about what the law
says.
Take, for instance, the example of surveillance pursuant to section 215 of the
USA PATRIOT Act.59 Under that law, the public knew that the FISC, on
application from the FBI, could issue orders for disclosure of “tangible things”
that were “relevant to an authorized investigation.”60 But the specifics of how
the FISC interpreted section 215 were kept secret. The provision was scheduled
to sunset in 2010 and again in 2011, unless Congress voted to reauthorize it.61
Civil society groups took the opportunity to lobby intensively for changes, but
they were forced to speculate about how the law was being interpreted.62 As it
turns out, their speculations were way off the mark. Most groups lobbying for
changes were concerned about the perceived risk that the FBI would use the law
to target individuals based on their First Amendment protected activities.63 This
58. See S. SELECT COMM. ON INTELLIGENCE, COMMITTEE STUDY OF THE CENTRAL INTELLIGENCE AGENCY’S
DETENTION AND INTERROGATION PROGRAM: FINDINGS AND CONCLUSIONS, S. REP. NO. 113-288, at xiii–xv
(2014), https://www.congress.gov/113/crpt/srpt288/CRPT-113srpt288.pdf [https://perma.cc/K7JY-FQ
A2]; Memorandum from Jay S. Bybee, Assistant Attorney General, to Alberto R. Gonzales, Counsel to
the President (Aug. 1, 2002), https://nsarchive2.gwu.edu//NSAEBB/NSAEBB127/02.08.01.pdf [https://
perma.cc/7PHX-K72F].
59. USA PATRIOT Act of 2001, Pub. L. No. 107-56, § 215, 115 Stat. 272, 287–88 (2001) (codified
at 50 U.S.C. § 1861 (2012)).
60. 50 U.S.C. § 1861(b)(2)(A) (2012).
61. See CONG. RESEARCH SERV., 215-SUNSET, SUNSET OF SECTION 215 OF THE USA PATRIOT ACT OF
2001, 1 n.4 (2015), https://fas.org/sgp/crs/intel/215-sunset.pdf [https://perma.cc/R294-2XCG].
62. See, e.g., Protecting Constitutional Freedoms in the Face of Terrorism: Hearing Before the
Subcomm. on the Constitution, Federalism, and Prop. Rights of the S. Comm. on the Judiciary, 107th
Cong. 107–610 (2001) (statement of Jerry Berman, Executive Director, Center for Democracy and
Technology).
63. Reform the Patriot Act—Section 215, ACLU (Oct. 31, 2011), https://web.archive.org/web/
20111031065406/https://www.aclu.org/free-speech-national-security-technology-and-liberty/reform
2018] SECRET LAW 819
concern led groups to focus on the use of section 215 to obtain library
records—a powerful example of records cloaked by First Amendment inter
ests.64 Indeed, section 215 came to be known as the “library records” provision.65
Asked about these lobbying efforts after the Snowden disclosures revealed
the true scope of section 215 surveillance, Lee Tien, a civil liberties lawyer at
the Electronic Frontier Foundation, explained “[p]eople could see that those
kinds of records were very seriously connected to First Amendment activity and
the librarians were going to war on it.”66 Indeed, at that point the only public
evidence of abuse of section 215 involved FBI circumvention of the section’s
limited protection for First Amendment activity.67
It is hard to imagine a more misguided lobbying effort. As Tien reflected, “A
person might uncharitably think of us as lacking in imagination . . . .”68 But it is
difficult to blame anyone for failing to imagine that section 215 had been
interpreted to permit the indiscriminate mass collection of all domestic tele
phone records by the NSA (and that a parallel provision of law had been
interpreted to permit mass collection of Internet records). Yet the law had been
used in that way at least as far back as 2006, four years before it first came up
for reauthorization.69
[https://perma.cc/3D93-GB2R]. It was not until the Snowden disclosures that the public learned section
215 had been interpreted to authorize bulk collection in this way. See id.
70. I follow the terminology used by David Pozen. See Pozen, supra note 21, at 267. As Pozen
explains, the “depth” of a secret depends on how many people know of the secret, whether those people
are spread across multiple institutions or branches of government, how much they know, and how
quickly they find out. See id.
71. See, e.g., AM. CIVIL LIBERTIES UNION, supra note 64, at 32.
72. Peter Shane makes a similar point, arguing that the lack of scrutiny that results from secrecy can
lead to poor decision making, particularly with respect to advice from Executive Branch lawyers. Peter
M. Shane, Executive Branch Self-Policing in Times of Crisis: The Challenges for Conscientious Legal
Analysis, 5 J. NAT’L SEC. L. & POL’Y 507, 508 (2012).
73. See, e.g., Sean Gallagher, You May Already Be a Winner in NSA’s “Three-Degrees” Surveillance
Sweepstakes!, ARS TECHNICA (July 18, 2013, 4:00 PM), http://arstechnica.com/information-technology/
2013/07/you-may-already-be-a-winner-in-nsas-three-degrees-surveillance-sweepstakes [https://perma.cc/
8QX5-EFRM].
74. See, e.g., Declaration of Professor Edward W. Felten ¶ 24, Am. Civil Liberties Union v. Clapper,
959 F. Supp. 2d 724 (S.D.N.Y. 2013) (ECF No. 27); Matt Blaze, Opinion, Phew, NSA Is Just Collecting
Metadata. (You Should Still Worry), WIRED (June 19, 2013, 9:30 AM), http://www.wired.com/2013/06/
phew-it-was-just-metadata-not-think-again [https://perma.cc/WC2E-F7QC]; Matthew Harwood, My Life
in Circles: Why Metadata Is Incredibly Intimate, ACLU (July 29, 2013, 3:19 PM), https://www.aclu.org/
blog/technology-and-liberty-national-security/my-life-circles-why-metadata-incredibly-intimate [https://
perma.cc/K7Z5-HA5V]; Mike Masnick, Anyone Brushing Off NSA Surveillance Because It’s ‘Just
Metadata’ Doesn’t Know What Metadata Is, TECHDIRT (July 8, 2013, 11:24 AM), https://www.techdirt.
com/articles/20130708/01453123733/anyone-brushing-off-nsa-surveillance-because-its-just-metadata
doesnt-know-what-metadata-is.shtm [https://perma.cc/MS6L-DUXU]; Kurt Opsahl, Why Metadata
2018] SECRET LAW 821
Lawyers, for their part, quickly began raising Fourth Amendment concerns
that the FISC had apparently never considered. For instance, they pointed out
that in the Supreme Court’s 2012 decision in United States v. Jones,75 five
concurring Justices joined opinions suggesting that Fourth Amendment protec
tions might be triggered by certain kinds of pervasive data collection about
individuals even if smaller scale collection of the same type of information
would raise no constitutional concerns.76
In response to this input from outside experts, the Obama Administration
announced significant reforms to the section 215 program,77 Congress passed
legislation to narrow the law and improve it,78 and one circuit court held that
the program—as it had been run pre-Snowden—was illegal.79 None of this
progress would have been possible had the secret interpretation of section 215
remained hidden from the public.
In short, secret law short-circuits ordinary democratic checks on lawmaking.
In practice, this means that public pressure that would otherwise lead to changes
and improvements in the law will be absent or misdirected. In extreme cases—
particularly where the public does not even know about the existence of the law
or where Congress is kept in the dark—secret lawmaking can amount to a kind
of oligarchy: lawmaking entrusted to an elite few who need not be concerned
about the public’s views regarding the governing rules they enact.80
justiciable case. Secrecy thus undermines external checks on the conduct of the
Executive Branch in the national security sphere, which, in turn, limits opportu
nities for external reinforcement of internal constraints within the Executive
Branch.81 I explain and illustrate each problem in turn.
Both of the principal functions of Congress—to make laws and oversee their
implementation by the Executive—are impeded when the law is kept secret
from the public. The most obvious problems occur when the law is not only
kept from the public, but is only shared with a few select members of Congress.
Members of Congress are hamstrung when they are not permitted to freely
share information with all of their colleagues or the public: they cannot hold
public hearings, they cannot issue public subpoenas, and they cannot make
speeches because all of these activities would involve disseminating classified
information.82 Instead, members of Congress are relegated to working an inside
game, attempting to expand the circle of legislators privy to the secret law in
hopes of rallying efforts to engage in effective oversight or legislative efforts.83
But even when every member of Congress has access to a secret law,
Congress’s ability to discharge its oversight and legislative functions will be
greatly diminished for a number of reasons. Where the law is secret, it is
extraordinarily difficult to mount a legislative campaign to amend the law.84 It is
particularly difficult to muster legislative support, often in the face of executive
opposition, to fix a problem that the public does not even know about. There are
few rewards for a member of Congress to support such an initiative. Members
with strong principled objections to the secret law may propose amendments,
but in the absence of any public pressure to act others will prefer to abide the
status quo.
These difficulties are compounded by the strict restrictions members of
Congress face in reviewing, discussing, and sharing classified information. It
appears that congressional access to secret law is typically accomplished by an
opt-in system: members must go out of their way to review the secret materials
81. See Gillian E. Metzger, The Interdependent Relationship Between Internal and External Separa
tion of Powers, 59 EMORY L.J. 423, 437–47 (2009) (arguing that external checks and balances reinforce
internal constraints on executive power).
82. See generally Heidi Kitrosser, Congressional Oversight of National Security Activities: Improv
ing Information Funnels, 29 CARDOZO L. REV. 1049 (2008).
83. As Professor Heidi Kitrosser has detailed, the rules governing the handling of classified
information in Congress do not give individual members of Congress the power to decide to disclose
information to colleagues. Instead, decisions about disseminating such information are entrusted to the
Executive, or else put to a vote of the relevant committees. See id. at 1080. Each house reserves the
right to make classified information public upon a majority vote of an entire house, but it does not
appear that this mechanism has been invoked even once. See id. at 1081–83; see also DENIS MC
DONOUGH ET AL., CTR. FOR AM. PROGRESS, NO MERE OVERSIGHT: CONGRESSIONAL OVERSIGHT OF INTELLI
GENCE IS BROKEN 27 (2006), https://cdn.americanprogress.org/wp-content/uploads/kf/ nomereoversight
.pdf [https://perma.cc/C6GX-SNR2].
84. See supra notes 59–71 and accompanying text (discussing the failed legislative campaign to
reform section 215 of the USA PATRIOT Act prior to the Snowden disclosures about how broadly that
provision had been interpreted).
2018] SECRET LAW 823
in a specified secure facility after undertaking the necessary oaths and other
formalities.85 Thus, many of one’s colleagues in Congress may not even be
“read in” to the secret law. Still worse, expert staff members and legal counsel
may not be cleared to see the information, severely hampering all but the most
diligent and expert members of Congress.86
The result of all these restrictions is that any congressional deliberation will
be stilted and cumbersome. And even if, despite these restrictions, there is a
movement within Congress to conduct oversight, it can happen only in closed
sessions, which are much less effective than open sessions precisely because
they lack the power to focus public attention on an issue and trigger outside
groups to engage with it.
The example of section 215 illustrates all of these difficulties. By the time the
PATRIOT Act was scheduled to sunset in 2011, the DOJ appeared to have made
available to members of Congress its secret interpretation of the law, which had
by then been endorsed by the FISC. But few members of Congress learned that
the law was in fact being interpreted to permit bulk collection of essentially all
domestic telephone records because this information was strictly controlled and
restricted.87 Indeed, one of the original sponsors of the PATRIOT Act, Represen
tative Jim Sensenbrenner, has since related that he would not have voted to
reauthorize the law in 2011 had he known how it was being applied.88
Secrecy also stymied the small handful of legislators who began sounding the
alarm about section 215 early. One senator went so far as to propose amend
ments that would have required disclosure of significant secret interpretations of
section 215.89 But those senators were unable to make a proper public case for
their amendment. Instead, to avoid divulging classified law, they were forced to
resort only to ambiguous hypotheticals about how the current law might permit
abuses.90 Unsurprisingly, relatively few members of Congress were moved to
vote in favor of the proposed amendments.91
85. See FREDERICK M. KAISER, CONG. RESEARCH SERV., RS20748, PROTECTION OF CLASSIFIED INFORMA
TION BY CONGRESS: PRACTICES AND PROPOSALS 1–3 (2011) (describing restrictions on access to classified
information by members of Congress).
86. See Andrea Peterson, Obama Says NSA Has Plenty of Congressional Oversight. But One
Congressman Says It’s a Farce, WASH. POST (Oct. 9, 2013), http://www.washingtonpost.com/blogs/the
switch/wp/2013/10/09/obama-says-nsa-has-plenty-of-congressional-oversight-but-one-congressman-says
its-a-farce [https://perma.cc/64BE-8X2K] (“[Rep.] Amash also noted that the release he had to sign to
view classified documents prohibited him from discussing them with anyone—including other mem
bers of Congress who all have clearance to discuss them.”).
87. See Am. Civil Liberties Union v. Clapper, 785 F.3d 787, 820 (2d Cir. 2015).
88. See id.; Jim Sensenbrenner, Opinion, How Obama Has Abused the Patriot Act, L.A. TIMES (Aug.
19, 2013), http://articles.latimes.com/2013/aug/19/opinion/la-oe-sensenbrenner-data-patriot-act-obama
20130819 [https://perma.cc/M4XQ-VRYB].
89. See 158 CONG. REC. S8,397–98 (daily ed. Dec. 27, 2012) (statement of Sen. Merkley).
90. See 158 CONG. REC. S8,398–407 (daily ed. Dec. 27, 2012); Declan McCullagh, Patriot Act
Renewed Despite Warnings of ‘Secret’ Law, CNET (May 28, 2011, 6:08 AM PDT), http://www.cnet.com/
news/patriot-act-renewed-despite-warnings-of-secret-law [https://perma.cc/KE33-N75K].
91. 158 CONG. REC. S8,427–28 (daily ed. Dec. 27, 2012) (recording votes on Senate Amendment
3435 regarding public disclosure of significant FISC opinions, which failed 37–54).
824 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
By contrast, once the secret interpretations of section 215 were made public
by Snowden—and members of Congress were made to feel the weight of public
opinion—similar amendments were passed into law with a bipartisan major
ity.92 Until the secret law of section 215 became public, Congress was unable to
act as an effective check on the Executive Branch; once the law was public,
Congress was able to discharge its role.
Secret law also impedes the ability of the courts to function as an indepen
dent check on the lawfulness of executive action. It does so for a simple reason:
if the law governing a program is secret, it will often be impossible to develop
cases to challenge the program. Even when lawyers do manage to bring cases to
court, secret law creates numerous obstacles to obtaining a decision on the
merits.
This was illustrated most starkly by Clapper v. Amnesty International USA, in
which a group of lawyers, journalists, and human rights researchers brought suit
to challenge foreign electronic surveillance under the FISA Amendments Act
because the law forced them to take costly measures to avoid the likelihood that
their confidential communications would be intercepted.93 The Supreme Court
dismissed the case for lack of standing because the plaintiffs did not know to a
certainty that their communications had been surveilled, and so, in the Court’s
view, could not prove an injury sufficient to establish their standing.94
Even in cases where plaintiffs can establish standing, the state secrets privi
lege will often stand as an obstacle to adjudication.95 For instance, in response
to a lawsuit challenging the legality of the planned targeted killing of a citizen,
the government argued that the case could not be litigated because essential
facts about the program—including the detailed legal rationale96—were state
secrets. Although that case was ultimately dismissed on other grounds (the
political question doctrine and standing), the state secrets privilege stood as an
additional obstacle to adjudication had those two grounds been overcome.97
92. See USA FREEDOM Act of 2015, Pub. L. No. 114-23, 129 Stat. 268 (2015).
93. 568 U.S. 398, 401–02 (2013).
94. Id.
95. See generally Laura K. Donohue, The Shadow of State Secrets, 159 U. PENN. L. REV. 77 (2010)
(documenting how the state secrets privilege has evolved from an evidentiary privilege into a tool to
prevent cases from proceeding to the merits).
96. See Public Declaration and Assertion of Military and State Secrets Privilege by Robert M. Gates,
Secretary of Defense ¶ 5(B), Al-Aulaqi v. Obama, 727 F. Supp. 2d 1 (D.D.C. 2010), ECF No. 15-5
(asserting state secrets privilege over “criteria or procedures DoD may utilize in connection with such
military operations”); Declaration and Formal Claim of State Secrets Privilege and Statutory Privileges
by Leon E. Panetta, Director, Central Intelligence Agency ¶ 3, Al-Aulaqi v. Obama, 727 F. Supp. 2d 1
(D.D.C. 2010), ECF No. 15-6.
97. See Al-Aulaqi, 727 F. Supp. at 53. Steve Vladeck and Andy Wright question whether greater
transparency would lead to better oversight given the myriad obstacles that have been placed in the way
of plaintiffs seeking to challenge national security programs. See Steve Vladeck & Andy Wright, Why
(Some) Secrecy is Good for Civil Liberties, JUST SECURITY (July 25, 2014, 8:18 AM), http://justsecurity.
org/13189/secrecy-civil-liberties [https://perma.cc/94JN-KHH8]. But secrecy stands as an additional
obstacle, and would often preclude litigation even if other threshold obstacles were eliminated.
2018] SECRET LAW 825
To be sure, that a law is secret does not always preclude a court’s involve
ment, but it does mean that certain aspects of the adjudication will almost
always be conducted in secret, usually ex parte, with participation only by the
government. This has been the typical practice in the FISC.98 But ordinary
Article III courts have contemplated secret procedures, too.99 Adjudication in
such circumstances is fraught with familiar practical difficulties that are only
heightened in the national security context: courts operating ex parte cannot
have full adversarial argument or benefit from helpful public scrutiny and expert
participation.100
I do not mean to argue here that there can be no checks and balances where
the law is secret. At least where the law is not a “deep secret”—in other words,
the existence of a law is not itself secret, utterly unknown to coordinate
branches of government101—there may be opportunities for some interbranch
contestation outside of public view.102 But, as I have argued, such external
constraints will be severely compromised when public scrutiny is cut out of the
equation.
Moreover, a number of scholars have argued that checks and balances
internal to the Executive Branch can serve as constraints on the exercise of
executive power.103 There are difficult questions about whether internal adminis
104. See, e.g., Magill, supra note 103; Metzger, supra note 81, at 441–42.
105. See Metzger, supra note 81, at 442–47.
106. See Dawn E. Johnsen, Faithfully Executing the Laws: Internal Legal Constraints on Executive
Power, 54 UCLA L. REV. 1559, 1596–600 (2007) (“Perhaps most essential to avoiding a culture in
which OLC becomes merely an advocate of the administration’s policy preferences is transparency in
the specific legal advice that informs executive action, as well as in the general governing processes and
standards.”); Cornelia T.L. Pillard, The Unfulfilled Promise of the Constitution in Executive Hands, 103
MICH. L. REV. 676, 703, 749–51 (2005) (“The more the public understands what is at stake in executive
constitutionalism, the more pressure it can bring to bear on the executive to do it fully and well.”).
107. See, e.g., Elec. Privacy Info. Ctr. v. U.S. Dep’t of Justice, 584 F. Supp. 2d 65, 71, 73–74
(D.D.C. 2008) (explaining government may withhold legal opinions regarding Presidential Surveillance
Program, even though program was no longer in operation, because to do otherwise would reveal
classified information about methods of intelligence gathering); see also infra notes 240–43 and
2018] SECRET LAW 827
This argument may have significant force where it applies, but on close
inspection it applies much more narrowly than it might appear. This is for three
reasons. First, the fact that a secret law relates to a secret program does not
imply that disclosure of the secret rules would disclose the sensitive parts of the
program. For instance, in the foreign surveillance context pre-Snowden, the
government consistently refused to disclose the rules that governed how it must
treat the communications of U.S. persons collected in the course of targeting
foreigners.108 But keeping such rules—known as “minimization” rules—secret
did not serve to protect the secrecy of the surveillance capabilities or activities
of the government, but mostly to obscure the protections afforded to U.S.
persons caught up in such collection activities.109 It was therefore arguably
unnecessary to keep the minimization rules secret to protect the sensitive
aspects of the program.110 Prompted by the Snowden disclosures, the govern
ment has now released the rules with certain redactions.
Second, laws relating to a secret program typically reveal sensitive informa
tion about the program only if the laws are highly specific and granular. More
general statements of law can often be disclosed without revealing secret
operational details.111 The example of foreign surveillance again offers a useful
illustration. Merely disclosing the government’s interpretation of the surveil
lance authorities need not reveal any operational details about the capacities of
the agency to intercept or analyze information or about who is targeted, how
they are targeted, or how often. Disclosure of laws at this intermediate level of
granularity need only reveal the permissible scope of collection. It is only when
one steps down a level of granularity—to, say, determinations about the lawful
ness of targeting a specific group of individuals or rules governing how to
deploy or install particular collection tools—that disclosing government rules
accompanying text (collecting cases where the courts have permitted law to be withheld in response to
FOIA requests).
108. These minimization rules were first made public by The Guardian as a result of the Snowden
disclosures. See Glenn Greenwald & James Ball, The Top Secret Rules That Allow NSA to Use U.S.
Data Without a Warrant, GUARDIAN (June 20, 2013, 6:59 PM), https://www.theguardian.com/world/
2013/jun/20/fisa-court-nsa-without-warrant [https://perma.cc/T548-PF9W]. The government subsequently de
classified and released the minimization rules. See Press Release, James R. Clapper, supra note 12.
109. The government previously withheld the minimization rules as classified on the grounds that
their disclosure would reveal intelligence sources, methods, and capabilities that are properly secret.
See Am. Civil Liberties Union v. Office of Dir. of Nat’l Intelligence, No. 10-cv-4419, 2012 WL
1117114, at *1 (S.D.N.Y. Mar. 30, 2012) (upholding agency determination to withhold records under
Exemption 1). Although these minimization rules relate to intelligence collection, they do not reveal
anything about those intelligence activities per se—for example, who is being targeted, what kinds of
communications the government is able to access, how the government collects the information, or how
much information is collected. Instead, the minimization rules disclose only what the government may
do with U.S. persons’ information after it has been acquired.
110. One might make the argument that disclosing the limits on how the government may use
information it has collected about U.S. persons could permit a nefarious actor to game those rules to its
advantage. This concern—that disclosure of the rules could permit circumvention of government
efforts—is discussed in the next section. See infra Section II.B.2.
111. See infra Section III.C (discussing varying granularity of secret laws).
828 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
112. In the wake of the Snowden disclosures, the government has responded by disclosing previ
ously secret law that precisely straddles these levels of granularity. See, e.g., Memorandum Opinion,
No. [REDACTED], at 29–30 (FISA Ct. Oct. 3, 2011) (Bates, J.) (disclosing details about the legal
scope of permissible surveillance while redacting information about who is targeted, among other
operational details); Press Release, Shawn Turner, Dir. of Pub. Affairs, Office of the Dir. of Nat’l
Intelligence, DNI Declassifies Intelligence Community Documents Regarding Collection Under Sec
tion 702 of the Foreign Intelligence Surveillance Act (FISA) (Aug. 21, 2013), http://icontherecord.tumblr.
com/post/58944252298/dni-declassifies-intelligence-community-documents [https://perma.cc/7EN7
72HY] (officially disclosing the opinion above).
113. See Am. Civil Liberties Union v. Central Intelligence Agency, 109 F. Supp. 3d 220, 225
(D.D.C. 2015), aff’d sub nom. Am. Civil Liberties Union v. U.S. Dep’t of Justice, 640 F. App’x 9,
11–12 (D.C. Cir. 2016) (per curiam) (permitting the government to continue to withhold certain legal
memoranda regarding drone strikes nearly six years after litigation seeking disclosure commenced).
114. See Cora Currier, How the Gov’t Talks About a Drone Program It Won’t Acknowledge Exists,
PROPUBLICA (Sept. 13, 2012, 12:14 PM), https://www.propublica.org/article/how-the-govt-talks-about-a
drone-program-it-wont-acknowledge [https://perma.cc/BQC7-5SZ2]; Lena Groeger & Cora Currier,
Stacking Up the Administration’s Drone Claims, PROPUBLICA (Sept. 13, 2012, 1:15 PM), http://projects.
propublica.org/graphics/cia-drones-strikes [https://perma.cc/TYE4-V9DA] (collecting hundreds of pub
lic statements by government officials regarding drone strikes).
115. Cf. N.Y. Times Co. v. U.S. Dep’t of Justice, 756 F.3d 100, 113–15 (2d Cir. 2014) (holding the
cumulative effect of official government statements regarding targeted killings waived claims to
secrecy over a particular OLC memo).
116. See Jack Goldsmith, Release the al-Aulaqi OLC Opinion, or Its Reasoning, LAWFARE (Oct. 3,
2011, 7:45 AM), http://www.lawfareblog.com/2011/10/release-the-al-aulaqi-olc-opinion-or-its-reasoning
[https://perma.cc/C3RX-UXQ4].
2018] SECRET LAW 829
For these three reasons, the notion that law must be kept secret to protect
secret operations can be overblown. There may still be circumstances where the
argument is sound; these constitute the hard cases, and I discuss how to deal
with them in the next few Parts.
117. See Brian H. Bix, Secrecy and the Nature of Law 5–6 (Oct. 21, 2013) (unpublished manu
script), https://www.law.upenn.edu/live/files/2418-bixsecrecy-and-the-nature-of-law-full [https://perma.
cc/9NZL-EMTF].
118. See, e.g., Elec. Privacy Info. Ctr. v. U.S. Dep’t of Justice, 511 F. Supp. 2d 56, 69 (D.D.C. 2007)
(quoting declaration of then-OLC director Steven Bradbury) (crediting government’s contention that
disclosing legal opinions regarding the terms of the warrantless wiretapping program authorized by
President Bush “would compromise the effectiveness of the Program to the detriment of national
security” (internal quotations and citation omitted)).
119. See id.
120. See Memorandum of Law in Opposition to Plaintiff’s Motion to Lift the Nondisclosure
Requirement as to the Attachment to the National Security Letter at 5–6, Doe v. Holder, 703 F. Supp. 2d
313 (S.D.N.Y. 2010) (arguing that permitting disclosure of the types of information the FBI can seek
pursuant to a national security letter would impede effectiveness of national security investigations).
121. Cf. Latif v. Holder, 28 F. Supp. 3d 1134, 1154 (D. Or. 2014).
122. See Opposition to Plaintiff’s Motion for Preliminary Injunction and Memorandum in Support
of Defendants’ Motion to Dismiss at 56, Al-Aulaqi v. Obama, 727 F. Supp. 2d 1 (D.D.C. 2010) (No.
10-cv-1469).
830 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
3. Paternalistic Lawmaking
Philosopher Duncan MacIntosh has argued that law may be kept secret not
just to prevent bad actors from subverting it, but also to prevent a well-
intentioned but misguided public from “destroying” laws that are, in fact, in the
public’s interest, even if unpopular.126 This is a concededly paternalistic argu
ment, resting on the presumption that elite insiders understand better than the
public itself what is in the public’s interest. The argument is so discordant with
123. See Use of Force Policy Database, POLICE USE OF FORCE PROJECT, http://useofforceproject.org/
database [https://perma.cc/9X5C-FFM7] (compiling use of force policies for the 100 largest U.S. city
policy departments).
124. Indeed, several courts have adjudicated whether border searches are legal and, in the process,
they have established public legal rules governing such searches. See, e.g., United States v. Arnold, 533
F.3d 1003, 1008–10 (9th Cir. 2008) (setting out Fourth Amendment standards that generally permit
suspicionless searches of a laptop at the border, with two narrow exceptions); United States v. Ickes, 393 F.3d
501, 505–06 (4th Cir. 2005) (holding that border searches can be conducted without suspicion).
125. See Dan-Cohen, supra note 27, at 665–67, 673–74 (explaining that the legitimacy of transmit
ting internal government rules hidden from public view requires “evaluating competing substantive
moral considerations”).
126. See Duncan MacIntosh, Logically Private Laws 2 (Oct. 25, 2013) (unpublished manuscript),
https://www.law.upenn.edu/live/files/2453-macintoshlogically-private-laws-full [https://perma.cc/H6J8
5DDR].
2018] SECRET LAW 831
127. A version of the argument has sometimes been invoked to justify keeping certain judicial
decisions secret. The idea is that a redacted (or summarized) judicial decision adjudicating mostly
classified subject matter is more likely to confuse the public than illuminate it. See, e.g., In re Orders of
this Court Interpreting Section 215 of the PATRIOT Act, No. Misc. 13–02, 2014 WL 5442058, at *5
(FISA Ct. Aug. 7, 2014) (considering this argument but finding it inapplicable); In re Motion for
Release of Court Records, 526 F. Supp. 2d 484, 495 (FISA Ct. 2007) (“The benefits from a partial
release of declassified portions of the requested materials would be diminished, insofar as release with
redactions may confuse or obscure, rather than illuminate, the decisions in question.”).
128. See generally Adrian Vermeule, Our Schmittian Administrative Law, 122 HARV. L. REV. 1095
(2009) (arguing that contemporary administrative law contains various legal doctrines that create
domains in which the Executive Branch is free from legal constraint).
129. Compare id. at 1108 (calling the Executive Branch’s power in times of crises “Schmittian” and
suggesting the Executive will always find loopholes to act without constraint), with Evan J. Criddle,
Mending Holes in the Rule of (Administrative) Law, 104 NW. U. L. REV. 1271 (2010) (explaining that
loopholes giving the Executive Branch so much discretion could be closed without compromising an
agency’s ability to respond in an emergency).
832 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
If evading public scrutiny for the sake of evading negative public scrutiny is
an acceptable justification for keeping laws secret, we have travelled a signifi
cant way down the road away from the consent of the governed and meaningful
democratic control of government. In any case, the premise of the argument—
that the public would precipitously and irrationally strip the government of
important powers—appears to be severely overblown. If anything, the lesson of
the 9/11 era is that when controversial secret programs eventually become
public, they will often be ratified and entrenched—perhaps with minor
modifications—rather than eliminated.130
130. Examples abound. Military Commissions established unilaterally by the President, struck down
as unconstitutional in Hamdan v. Rumsfeld, 548 U.S. 557, 590–95 (2006), were subsequently enacted
by Congress. See Military Commissions Act of 2006, Pub. L. No. 109-366, 120 Stat. 2600 (2006)
(codified as amended in scattered sections of 10, 18, 28, 42 U.S.C.). Revelations about warrantless
spying carried out by the President and aided by telecommunications companies—all apparently in
violation of FISA—were followed by an enactment ratifying the President’s surveillance activities and
giving telecommunications companies retroactive immunity. See Foreign Intelligence Surveillance Act
of 1978 Amendments Act of 2008, Pub. L. No. 110-261, 122 Stat. 2436 (2008); Protect America Act of
2007, Pub. L. No. 110-55, 121 Stat. 552 (2007); EDWARD C. LIU, CONG. RESEARCH SERV., RL34600,
RETROACTIVE IMMUNITY PROVIDED BY THE FISA AMENDMENTS ACT OF 2008 (2008); James Risen, Bush
Signs Law to Widen Reach for Wiretapping, N.Y. TIMES (Aug. 6, 2007), http://www.nytimes.com/2007/
08/06/washington/06nsa.html [https://nyti.ms/2jBuhqu]. One notable exception is the government’s
practice of torture, which ceased part way through the Bush Administration and was subsequently
repudiated by the Obama Administration. See S. SELECT COMM. ON INTELLIGENCE, supra note 58, at
15–16 (summarizing the demise of the Bush-era torture program); Exec. Order No. 13,491, 74 Fed.
Reg. 4,893–96 (Jan. 22, 2009) (strictly limiting the interrogation techniques that may be used by U.S.
agencies). More recently, however, President Trump has openly discussed bringing back torture,
although the Administration has taken no formal public steps in that direction. See Adam Serwer, Can
Trump Bring Back Torture?, ATLANTIC (Jan. 26, 2017), https://www.theatlantic.com/politics/archive/
2017/01/trump-torture/514463 [https://perma.cc/YL52-PRJH]. Congress has now enacted legislative
reforms regarding NSA bulk collection of domestic calling records, although many NSA surveillance
programs remain untouched. See USA FREEDOM Act of 2015, Pub. L. No. 114-23, 129 Stat. 268
(2015); David Cole, Reining in the NSA, N.Y. REV. OF BOOKS (June 2, 2015, 3:40 PM), http://www.
nybooks.com/daily/2015/06/02/nsa-surveillance-congress-sunset [https://perma.cc/7YVN-9MH9].
131. Elec. Privacy Info. Ctr. v. U.S. Dep’t of Justice, 584 F. Supp. 2d 65, 76 (D.D.C. 2008).
132. See Memorandum in Support of Defendants’ Motion to Dismiss at 35–38, Citizens for
Responsibility and Ethics in Wash. v. U.S. Dep’t of Justice, 164 F. Supp. 3d 145 (D.D.C. 2016) (No.
13-cv-1291).
133. In addition, the attorney–client privilege is sometimes invoked as a ground to keep authoritative
legal opinions secret. This argument fails to appreciate the unique function of legal advice by certain
2018] SECRET LAW 833
by the Attorney General or President, yet they are often unpublished.134 Many
former officials of the OLC have expressed the view that such opinions should
presumptively be published, acknowledging that absent special circumstances,
publishing such opinions would not harm the deliberative process of govern
ment and might, in fact, improve it.135
The concern for protecting the deliberative process of government seems
misdirected in a fundamental way when the question is whether to disclose
law—the rules and interpretations that government officials regard as binding.
When one speaks of secret law, one is no longer in the realm of “deliberating”
over policy, but rather establishing it or carrying it out. To be sure, some legal
opinions may play an important role in deliberations over all manner of
government policy, but it cannot harm the integrity of those deliberations to
disclose their outcomes, including the legal positions and parameters accepted
as authoritative.136
In this Part, I have examined the normative terrain on which battles about
secret law are fought. I have surveyed the considerations that militate against
secret law and also those that motivate its use. But this broad account of the
normative concerns about secret law is perhaps too abstracted from the concrete
details of any particular case to offer guidance as to whether secret law is
justified. Accordingly, in the next Part, I identify five distinct and independent
criteria against which a particular instance of secret law can be measured. Each
of these criteria engages one or more of the broad normative considerations just
offered. By paying attention to these more concrete measures, it is possible to
government lawyers. Unlike an attorney advising a private client, legal opinions of Executive Branch
lawyers can, if regarded as binding statements of law, actually establish the law that the government
follows—not merely provide guidance about the law. See Brennan Ctr. for Justice v. U.S. Dep’t of
Justice, 697 F.3d 184, 207–08 (2d Cir. 2012).
134. See Morrison, supra note 24, 1725.
135. See, e.g., id. at 1724–26 (arguing that publication of OLC opinions is desirable to permit
meaningful checks and balances and to motivate OLC lawyers to write opinions that live up to the
standards of the office); see also Restoring the Rule of Law: Hearing Before the Subcomm. on the
Constitution of the S. Comm. on the Judiciary, 110th Cong. 186 (2008) (joint statement of David J.
Barron, Walter E. Dellinger, Dawn E. Johnsen, Neil J. Kinkopf, Martin S. Lederman, Trevor W.
Morrison, and Christopher H. Schroeder); Secret Law and the Threat to Democratic and Accountable
Government: Hearing Before the Subcomm. on the Constitution of the S. Comm. on the Judiciary, 110th
Cong. 126–27 (2008) [hereinafter Secret Law Hearing] (statement of Dawn E. Johnsen); Harold
Hongju Koh, Protecting the Office of Legal Counsel from Itself, 15 CARDOZO L. REV. 513, 517 (1993);
Setty, supra note 18, at 601–10. These authors—and OLC itself—have typically identified deliberative
process concerns as obstacles to disclosure only in narrow circumstances and instead cite the need to
protect classified information or circumvention of law enforcement as legitimate reasons for withhold
ing. See, e.g., Morrison, supra note 24, at 1725; Memorandum from David J. Barron, Acting Assistant
Attorney General, for Attorneys of the Office 5–6 (July 16, 2010).
136. In some instances, legal opinions are peppered with information that could reveal the delibera
tive process of the government. For instance, a legal opinion may include descriptions of rejected
policy options, the views of various stakeholders, or the internal history of a given proposal. But the
inclusion of such material cannot be grounds for keeping the legal content in an opinion secret; the
solution is simply to redact the deliberative material. Even if redaction is not feasible, it will often be
possible to prepare a legal summary divorced from sensitive facts.
834 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
identify what is truly in dispute in debates about the legitimacy of secret law
and what might be done about it.
137. See, e.g., David S. Kris, On the Bulk Collection of Tangible Things, 7 J. NAT’L SEC. L & POL’Y
209, 273–75 (2014) (explaining, with respect to the Covert Action statute and FISA laws, that “it might
be impossible, in many cases, to explain those [legal] interpretations [of the Covert Action statute]
without revealing the most sensitive classified information” and that for years the Intelligence Commu
nity “concluded . . . that the legal interpretation [of FISA permitting bulk collection] was so embedded
in its factual and operational context that revealing it would harm national security”).
2018] SECRET LAW 835
A. EXTERNAL EFFECTS
Disputes about secret law can turn on the extent to which the law in question
affects the public, as contrasted with a law whose effects are solely internal to
the government. Although mere housekeeping rules that structure internal gov
ernment operations will rarely draw criticism when kept secret, internal rules
that regulate how the government interacts with the public will often raise grave
concerns.138 Rules attaching penalties or other negative consequences to private
conduct will be the most controversial.139 Thus, disputes over secret law may
turn on the degree to which the law in question affects the public. The greater
and more direct the effects are on the public, the stronger the case against
secrecy.
Isolating external effects as an important characteristic of secret law makes
sense in light of the normative concerns, discussed above, that militate against
secret law.140 In particular, threats to individual liberty and democratic participa
tion tend to grow in direct proportion to a secret law’s effects on the public. This
is because objections to secret law on the grounds of individual liberty are
strongest where individuals are directly affected by exercises of state power
according to secret rules. Likewise, democratic concerns are heightened where
the public is prevented from having a meaningful say about rules that directly
affect them.
This dynamic with respect to external effects can be neatly illustrated with an
example from the context of targeted killings and drone strikes. The legal
standards and procedures that set out when the government may engage in
targeted killings are directed internally—to the officials who decide and ulti
mately carry out the targeted killing—but they also have momentous external
effects because they set out the circumstances in which a person is liable to be
killed without process.141 Secrecy in this context arouses strong opposition. By
contrast, the internal rules governing administrative aspects of the targeted
killing program—for example, the rules governing maintenance and testing of
remotely piloted aircraft used to carry out targeted killings142—typically have
fewer, if any, effects outside the government. Even if the two sets of rules were
equally hidden from the public, the targeting rules would provoke much more
justifiable opposition than the maintenance rules. This is precisely because only
138. Secret surveillance laws are a prime example of the latter type.
139. Examples of secret laws of this type include rules governing the No-Fly list and targeted
killings.
140. See supra Section II.A.
141. See N.Y. Times Co. v. U.S. Dep’t of Justice, 756 F.3d 100, 124–51 (2d Cir. 2014) (Appendix A)
(setting forth a redacted version of the OLC memo that provided the legal framework governing the
targeting of a U.S. citizen in Yemen).
142. See Whitney Amstutz, Reaper Maintainers Ensure ISR Mission Accomplishment, U.S. AIR
FORCE (Mar. 30, 2015), http://www.af.mil/News/Article-Display/Article/581953/reaper-maintainers
ensure-isr-mission-accomplishment/.
836 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
the former rules immediately affect the public and, therefore, directly engage
anti-secrecy values of individual liberty and democratic oversight.
143. See Secret Law Hearing, supra note 135, at 124 (testimony of Dawn E. Johnsen) (noting the
Bush Administration’s domestic surveillance program did not comply with the requirements of the
FISA).
144. In re Nat’l Sec. Agency Telecommc’ns. Records Litig., 700 F. Supp. 2d 1182, 1195–96 (N.D.
Cal. 2010) (quoting H.R. REP. NO. 95-1283, pt. 1, at 21 (1978)), aff’d in part, rev’d in part on other
grounds sub nom. Al-Haramain Islamic Found. v. Obama, 705 F.3d 845 (9th Cir. 2012).
145. See Charlie Savage, Senators Say Patriot Act Is Being Misinterpreted, N.Y. TIMES (May 26,
2011), http://www.nytimes.com/2011/05/27/us/27patriot.html [https//nyti.ms/2nx0ajy].
146. See 50 U.S.C. § 1861(a)(1), (b)(2)(A) (2012).
2018] SECRET LAW 837
C. GRANULARITY
Secret laws vary with respect to the level of granularity at which they have
been described publicly. This constitutes a third dimension along which secret
laws can be measured. At the least granular level are descriptions of the broad
legal principles governing a national security program. For instance, a public
statement that various surveillance activities “shall be conducted in a manner
consistent with the [F]ourth [A]mendment to the Constitution of the United
States” is an extremely general description of the applicable rules.149 Such
statements reveal little about the specific rules that govern, and so they permit
little meaningful democratic participation or accountability regarding the sub
stance of the law.
At the other end of the spectrum are the most detailed, granular rules for a
particular program, including the detailed rules that frontline officials must
follow when running a program, as well as any specific interpretations or
exceptions to those rules. Disclosing such granular details will alleviate transpar
ency concerns but is also more likely to reveal the kind of sensitive facts about
secret programs that the government seeks to protect. It is in this terrain—
between rules that are uselessly general and revealingly specific—that debates
over secret law are typically waged. Indeed, many disagreements over the
propriety of secret law are best understood as disputes about the level of
granularity at which rules should be disclosed.
Take, again, the example of the NSL statute described briefly above.150 The
statute allows the FBI to order electronic service providers to turn over users’
“electronic communication transactional records” without first obtaining authori
zation from a court.151 But “electronic communication transactional records” is
147. See Am. Civil Liberties Union v. Clapper, 785 F.3d 787, 815–19 (2d Cir. 2015) (recounting the
FISC’s interpretation of section 215 and rejecting it as inconsistent with the PATRIOT Act).
148. 18 U.S.C. § 2709(b)(1) (2012).
149. 50 U.S.C. § 1881a(b)(5).
150. See supra note 148 and accompanying text.
151. 18 U.S.C. § 2709(a).
838 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
not defined in the statute or in any public rule. Without such disclosure, the
public only has a general sense of what the statute allows. It is clear, for
example, that it permits the FBI to obtain information like the “to,” “from,” and
“date/time” headers in emails. But what about, say, location information col
lected by GPS-enabled phones?152 Or a history of searches entered into Google?
Or a history of websites visited? The FBI has resisted efforts to disclose how it
interprets the provision, contending that doing so would reveal a law enforce
ment technique.153 At least one court has pushed back against this secrecy and,
as a result, we learned that the FBI had secretly interpreted “electronic communi
cation transactional records” to encompass cell-site location information, which
can be used to identify the location of a cell phone.154
This kind of disagreement is essentially one about the level of granularity at
which internal rules and interpretations should be made public. Focusing on the
degree of specificity permits a sharper articulation of the normative dispute
between secrecy and transparency—in other words, whether disclosure of more
granular details is warranted in light of the benefits to transparency values and
any marginal risks of disclosure.
D. DURATION
A fourth important characteristic of secret laws is how long the public will be
kept in the dark. Limiting the length of time a secret law will stay secret serves
as a mechanism to modulate the tension with transparency values by setting an
expiration date on secret law. At a minimum, a time limit can ensure that the
determination of whether secrecy remains necessary will be revisited at regular
intervals. These kinds of time limits ease concerns about the separation of
powers and democratic oversight of secret law because they promise that such
checks and balances will only be postponed, not eliminated.
Although, in theory, time limits on secrecy can serve as important limits on
secret law, in practice they are a difficult solution. This is because a secrecy
determination, once made, carries with it the considerable weight of inertia. If
disclosure poses any conceivable risk, the status quo is likely to prevail. For this
reason, expressions of a non-binding commitment to divulge secret law within a
certain time period tend to founder.155 On the other hand, statutory time limits
152. See Jonathan Manes, Online Service Providers and Surveillance Law Transparency, 125 YALE
L.J. F. 343, 350 (2016), https://www.yalelawjournal.org/pdf/Manes_PDF_za9rzsda.pdf [https://perma.cc/
PH68-LDCQ].
153. See Doe v. Holder, 703 F. Supp. 2d 313, 316 (S.D.N.Y. 2010).
154. See Decision and Order at 19, Merrill v. Lynch, No. 14-cv-9763 (S.D.N.Y. Aug. 28, 2015),
https://yale.app.box.com/v/nicholas-merrill-sdny-decision [https://perma.cc/94PS-EJ36]. At the time this
Article was being written, the Supreme Court was considering a case that could clarify the law that
governs searches for cell-site location information, including whether the Fourth Amendment requires a
warrant in order to obtain such information. See Carpenter v. United States, 819 F.3d 880 (6th Cir.
2016), cert. granted, 137 S. Ct. 2211 (2017).
155. The manner in which the law governing NSA surveillance was disclosed provides an example
of this dynamic. For years prior to the Snowden disclosures, President Obama had signaled that he
2018] SECRET LAW 839
E. DEPTH
Finally, some secret laws are more closely held than others. At the far end of
the spectrum are laws that are “deep secrets”—instances where the existence of
the law is closely held to a small group of similarly placed officials.158 At the
other end of the spectrum are laws that are widely shared across all three
branches of government and perhaps also with certain security-cleared contrac
tors or other individuals outside government.
Secret laws are often less problematic the shallower they are. The deepest
secrets will be immune even from interbranch oversight, but shallower secrets
may be amenable to certain checks and balances.159 For instance, disclosing to
Congress (or to at least some of its members)160 the existence of a secret law
wished to have a broader debate about the scope of intelligence activities. See, e.g., Howard A.
Schmidt, Protecting Our Values and Cyberspace Together, WHITE HOUSE BLOG (Dec. 16, 2011, 7:41
PM), https://obamawhitehouse.archives.gov/blog/2011/12/16/protecting-our-values-and-cyberspace
together [https://perma.cc/L6N7-MLC3]. But no disclosures or meaningful public debate were forthcom
ing. It was only after the Snowden leaks that the government began to declassify its legal opinions and
directives. See Spencer Ackerman, FISA Judge: Snowden’s NSA Disclosures Triggered Important
Spying Debate, GUARDIAN (Sept. 13, 2013, 1:14 PM), https://www.theguardian.com/world/2013/sep/13/
edward-snowden-nsa-disclosures-judge [https://perma.cc/TG6N-LAWJ].
156. An example of a decision-forcing mechanism is the requirement that prosecutors disclose to
criminal defendants whether FISA surveillance was used to develop evidence in the government’s case.
See Patrick Toomey & Brett Max Kaufman, The Notice Paradox: Secret Surveillance, Criminal
Defendants & The Right to Notice, 54 SANTA CLARA L. REV. 843, 896–97 (2014).
157. But see generally Emily Berman, The Paradox of Counterterrorism Sunset Provisions, 81
FORDHAM L. REV. 1777 (2013) (arguing that sunset provisions may not be effective at prompting
reconsideration of national security policies).
158. See Pozen, supra note 21, at 267–75.
159. Pozen doubts that secret laws could ever remain particularly deep secrets, given that it is
typically necessary to involve relatively large numbers of people within the Executive Branch to
execute a law of any import. See id. at 274 n.51. The experience of the President’s Surveillance
Program illustrates these secrecy dynamics: at least for some length of time, the program was among
the deepest secrets of government, known only to a handful of government officials. See PSP REPORT,
supra note 1, at 14–15. As Pozen predicts, however, the program became a shallower secret as it grew,
until it was ultimately disclosed to the public by The New York Times (and then partially confirmed by
the President) approximately four years after it began. See Pozen, supra note 21, at 280–81; see also
PSP REPORT, supra note 1, at 16–17, 29, 36.
160. According to statute and interbranch practice, the administration often reveals secret law only
to a select few members of Congress. See Kitrosser, supra note 82, at 1054–58. This poses oversight
problems of its own. See id. at 1068–69 (describing the difficulties of meaningful congressional
oversight in this context). With respect to intelligence matters, the Covert Action statute permits the
administration to disclose presidential findings only to the so-called “Gang of Eight,” comprising the
most senior member of each party in the House and Senate and in the Intelligence Committees of each
house. See 50 U.S.C. § 3093(c)(2) (2012). The administration has sometimes chosen to disclose secret
laws to an even more limited subset of Congress. For instance, the first briefing regarding the
840 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
means that those members, in theory at least, can begin to agitate for greater
transparency and oversight.161 By contrast, where the law is known only to
certain parts of the Executive Branch, there are no opportunities for external
checks and balances and internal checks will be weakened.162
***
In this Part, I have sought to define a systematic rubric that assists in
determining whether secret law is acceptable in any given case, or at least to
clarify what is in dispute in any given debate over secret law. In the next Part, I
examine how these disputes are actually resolved in practice and when the law
permits the Executive Branch to keep the law secret.
President’s warrantless surveillance program, in late October 2001, included only four members. See
PSP REPORT, supra note 1, at 16. Some months thereafter, the chief judge of the FISC was briefed on
the program. Id. at 17.
161. See Kitrosser, supra note 82, at 1069–70.
162. See supra notes 103–06 and accompanying text; see also Metzger, supra note 81, at 437–47
(arguing that external constraints reinforce internal checks within the Executive Branch and that
internal constraints can, in turn, permit greater external checks and balances).
163. 5 U.S.C. § 552 (2012).
164. 44 U.S.C. §§ 1501–1511 (2012).
165. U.S. CONST. amend. V; see Papachristou v. City of Jacksonville, 405 U.S. 156, 162, 171 (1972)
(holding unconstitutional a statute that failed to provide notice of what conduct it prohibited).
166. U.S. CONST. amend. I; see Richmond Newspapers, Inc. v. Virginia, 448 U.S. 555, 577 (1980)
(establishing First Amendment right of access to court proceedings); Co. Doe v. Pub. Citizen, 749 F.3d
2018] SECRET LAW 841
the sealing of judicial opinions,167 and the Presentment and Journal Clauses of
the Constitution (applicable to Congress).168 The law governing unauthorized
leaks might also be regarded as part of the law of secret law insofar as leaks are
a significant means by which secret laws come to light.169
Each of these sources of law regulates whether and when the law must be
made public or may be kept secret. Where these sources of law permit excep
tions to a disclosure obligation—or impose no disclosure obligation at all—
there is space for the creation of secret law.
It is important to note that the boundaries between domains where the law
must be made public and those where it may arguably be kept secret are often
unclear or disputed. Determining where these boundaries lie is difficult when
the scope—or even the existence—of certain pockets of secret law may remain
unknown. In any case, I do not purport to provide a comprehensive statement of
the law of secret law, but rather a synoptic view of the most important features
of the legal ecosystem that regulates secret law in the Executive Branch. These
are the Due Process Clause, the Federal Register Act (and certain other statutory
disclosure obligations on Presidential lawmaking), and the Freedom of Informa
tion Act. The description provided here will illustrate the overall structure of the
law of secret law and the key tensions and tendencies within it. It will also
246, 267–68 (4th Cir. 2014) (holding First Amendment right of access extends to court opinions);
Lowenschuss v. W. Publ’g Co., 542 F.2d 180, 185 (3d Cir. 1976) (“[U]nder our system of jurisprudence
the judiciary has the duty of publishing and disseminating its decisions.”).
167. See, e.g., United States v. Mentzos, 462 F.3d 830, 843 n.4 (8th Cir. 2006) (denying motion to
seal because “decisions of the court are a matter of public record” and no exception applied); Union Oil
Co. of Cal. v. Leavell, 220 F.3d 562, 567–68 (7th Cir. 2000) (rejecting party’s request to seal
proceedings because “judicial proceedings are public” and “genuine trade secrets” exception did not
apply); D. CONN. R. CIV. P. 5(e)(1)(b)(3) (discussing local rules for sealing). See generally Motion of the
American Civil Liberties Union for the Release of Court Records, In Re Ops. & Orders of This Ct.
Containing Novel or Significant Interpretations of Law at 11–15, No. 16-01 (Foreign Intel. Surv. Ct.
Oct. 19, 2016), https://law.yale.edu/system/files/area/center/mfia/document/2016_motion_2.pdf [https://
perma.cc/ETS4-RP26] (documenting the history of judicial publication of opinions).
168. U.S. CONST. art. I, § 5, cl. 3; id. art. I, § 7, cl. 2.
169. Unauthorized leaks are usually—but not always—illegal. See Mary-Rose Papandrea, Leaker
Traitor Whistleblower Spy: National Security Leaks and the First Amendment, 94 B.U. L. REV. 449,
490–512 (2014) (discussing the legal framework that governs leaks); David E. Pozen, The Leaky
Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information, 127
HARV. L. REV. 512, 522–27 (2013) (same); Morton H. Halperin, Criminal Penalties for Disclosing
Classified Information to the Press in the United States, RIGHT2INFO.ORG (2012), http://www.right2info.
org/resources/publications/Halperin_CriminalPenaltiesforDisclosingClassifiedInformationtothePressin
theUnitedStates.pdf [http://perma.cc/5RYB-9K39] (same). Commentators disagree about whether the First
Amendment protects some leaks of classified information. Compare Heidi Kitrosser, Free Speech Aboard the
Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information, 6 J. NAT’L
SEC. L. & POL’Y 409, 411 (2013) (arguing in favor of First Amendment protection for classified information
leaks), and Papandrea, supra, at 453 (same), with GABRIEL SCHOENFELD, NECESSARY SECRETS: NATIONAL SECURITY,
THE MEDIA, AND THE RULE OF LAW 81 (2010) (contending that the First Amendment does not protect unauthor
ized disclosures of classified information), Rodney A. Smolla, Information as Contraband: The First Amend
ment and Liability for Trafficking in Speech, 96 NW. U. L. REV. 1099, 1167–68 (2002) (same), and Geoffrey R.
Stone, WikiLeaks and the First Amendment, 64 FED. COMM. L.J. 477, 485 (2012) (same).
842 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
motivate the reform proposals I describe in the next Part, which aim to make the
law of secret law more attentive to anti-secrecy values already discussed.
“Living under a rule of law entails various suppositions, one of which is that
‘[all persons] are entitled to be informed as to what the State commands or
forbids.’”170 The Due Process Clause has thus been interpreted to impose a
constitutional obligation on the state to say what the law is—at least sometimes.
The principle has its home in criminal law, where statutes defining offenses will
be struck down if they are too vague,171 will be interpreted narrowly where they
are ambiguous,172 and will only be applied prospectively.173 These constitu
tional rules protect the principle that individuals may not suffer criminal
penalties or “grave” civil consequences174 if they cannot know in advance the
law to which they are subject.
These constitutional rules implicitly forbid secret law, but only where the law
quite directly regulates the public and only where it implicates constitutionally
protected interests. Under the Due Process Clause, there can be no criminal
prosecution, for example, for violating a secret law. But these safeguards apply
only where the law treads upon an individual’s constitutionally cognizable
interests in life, liberty, or property.175 Moreover, even where cognizable inter
ests are engaged, the notice requirements of the Due Process Clause are weaker
where the law prescribes no criminal sanction or grave civil penalty.176 For
example, with respect to civil laws prescribing only monetary penalties, the
courts have required, in most cases, only “fair notice,” which can be satisfied
simply by informing the regulated entity, rather than the public at large, that
they are in violation of the law.177 Where an agency chooses to enforce its own
internal interpretations of a law or regulation, the Due Process Clause does not
require the agency to publish those internal—in other words, secret—
interpretations to the general public. Instead, the Due Process Clause is satisfied
if the agency simply provides the regulated entity with a private warning in
advance of enforcement that the agency believes particular conduct to be
170. Papachristou, 405 U.S. at 162 (quoting Lanzetta v. New Jersey, 306 U.S. 451, 453 (1939)
(alteration in original)).
171. See, e.g., Boyce Motor Lines, Inc. v. United States, 342 U.S. 337, 340 (1952); Connally v. Gen.
Constr. Co., 269 U.S. 385, 391 (1926).
172. See, e.g., United States v. Bass, 404 U.S. 336, 347 (1971).
173. U.S. CONST. art. I, § 10, cl. 1.
174. See Jordan v. DeGeorge, 341 U.S. 223, 231 (1951) (considering vagueness challenge to law
specifying when an immigrant may be deported).
175. See U.S. CONST. amend. V.
176. See Jordan, 341 U.S. at 231 (applying due process protections established in criminal cases to
the context of civil deportation proceedings because of the “grave” consequences at stake).
177. See, e.g., Gen. Elec. Co. v. U.S. EPA, 53 F.3d 1324, 1328–29 (D.C. Cir. 1995) (applying “fair
notice” standard to EPA regulation enforceable by civil fine); Gates & Fox Co. v. Occupational Safety
& Health Review Comm’n, 790 F.2d 154, 156 (D.C. Cir. 1986) (applying “fair notice” standard in
context of sanctions for violating OSHA regulation).
2018] SECRET LAW 843
illegal.178
Due process obligations to publish the law are therefore fairly circumscribed;
in the national security context they may be narrower still. This question was
brought to court in the context of the targeted killings of U.S. citizens abroad. In
2009, the American Civil Liberties Union and Center for Constitutional Rights
filed suit arguing, among other things, that a planned drone strike targeting a
U.S. citizen in Yemen violated the Due Process Clause because the government
had failed to disclose the applicable legal rules and standards specifying when
citizens could be killed outside of a traditional battlefield context.179 In re
sponse, the government argued that no such disclosure was required,180 offering
two reasons: first, that disclosure of the rules would harm national security,181
and second, that disclosure of the rules was unnecessary because the targeted
individual would know that playing an operational role in a terrorist organiza
tion (as the individual in question was alleged to have done) made him liable to
be killed under general domestic and international law standards.182 In other
words, the government contended that in the national security context, due
process does not require the government to disclose its legal standards even for
killing U.S. citizens, so long as the citizen is presumed to be on notice that he is
liable to have his life taken.183 Courts in other cases implicating security
concerns have dismissed due process arguments for the disclosure of secret law
on similar grounds.184
Due process is weak protection in the national security context for another
reason: although programs like surveillance and watchlisting have serious
consequences for individuals and raise significant civil liberties concerns, they
may nevertheless fail to trigger any due process notice requirements because
These examples show that due process is weak medicine against secret law
for a broad range of national security programs.190 Where laws do not prescribe
consequences that directly implicate constitutionally protected interests, due
process will have nothing to say. And even if due process rights are engaged,
they may be satisfied by providing individual notice or warnings, rather than by
publicly disclosing the governing rules.
The most prominent sources of law currently regulating secret law in the
Executive Branch are not constitutional but statutory: The Federal Register Act
(FRA) and The Freedom of Information Act (FOIA). These statutes purport to
require that legal rules be published but, as I will show, each offers plenty of
space for law to hide. I discuss the FRA and other potential legal constraints on
presidential discretion to make secret law in this section. In the next section, I
explain how FOIA regulates secret law in the Executive Branch more broadly.
The FRA was a landmark piece of legislation when enacted in 1935. It
established, finally, a centralized place where agency law would be published,
the Federal Register.191 The law was specifically meant to address a problem of
secret law; before its enactment, administrative lawmaking was so disorderly
and haphazard that even “[t]he officers of the government itself frequently [did]
not know the applicable regulations.”192 Administrative rules were secret not
because they were intentionally concealed but because they were buried inside
the many new and expanding federal bureaucracies of the New Deal era.
The FRA sought to fix the problem by mandating centralized publication of
“Presidential proclamations and Executive orders” of “general applicability and
legal effect” so long as they were not “effective only against Federal agencies or
persons in their capacity as officers.”193 In other words, executive laws that
regulated the public—those with the most direct external effects—should be
published.
Unfortunately, this mandate was mostly voluntary. The statute left it to the
President to determine which documents were of “general applicability and
190. See generally Erin Murphy, Paradigms of Restraint, 57 DUKE L.J. 1321 (2008) (describing
programs that evade due process protection).
191. Federal Register Act, Pub. L. No. 74-220, § 3, 49 Stat. 500, 500–01 (1935) (codified as
amended at 44 U.S.C. §§ 1501–1511 (2012)).
192. See Erwin N. Griswold, Government in Ignorance of the Law—A Plea for Better Publication of
Executive Legislation, 48 HARV. L. REV. 198, 204 & n.24 (1934). In two particularly embarrassing
instances, government lawyers litigated a criminal case up to the Supreme Court before realizing that
the regulations in question had been changed or withdrawn. See Panama Refining Co. v. Ryan, 293 U.S.
388, 412 (1935) (explaining that “the persons affected, the prosecuting authorities, and the courts, were
alike ignorant of the alteration” in the applicable provision of law, such that “the attack in this respect
was upon a provision which did not exist”); United States v. Smith, 293 U.S. 633 (1934) (dismissing
case upon discovering the regulation had changed); Griswold, supra, at 204 & n.24; The Federal
Register and the Code of Federal Regulations—A Reappraisal, 80 HARV. L. REV. 439, 440 & n.15
(1966).
193. See Federal Register Act § 5(a)(1).
846 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
legal effect” and therefore required publication.194 The law’s only unequivocal
requirement was to publish “document[s] or order[s] which . . . prescribe a
penalty.”195 This state of affairs continues to this day.196
As a result, the FRA is an extraordinarily weak protection against secret law,
giving the President broad discretion to determine which executive orders must
be published. Indeed, the requirements of the FRA can be entirely evaded
simply by calling a presidential directive something other than an “executive
order” or “proclamation.”197 Thus, unsurprisingly, presidents have been issuing
unpublished national security directives almost since the FRA was enacted,198
under names like Presidential Policy Directive or, more recently, National
Security Presidential Memorandum.199 According to the DOJ, such unpublished
directives have the same force of law as executive orders promulgated pursuant
to the FRA.200
The President’s discretion goes beyond issuing secret directives and extends
even to secretly modifying public directives. The administration of President
George W. Bush secretly revoked or modified public executive orders so that
the law on the books was not in fact the law being applied internally.201 Because
the changes were made via secret directives, both Congress and the public
remained unaware of the discrepancy for years.202
Congress has imposed only modest additional constraints on the President’s
power to make law in secret in the national security context. In some circum
stances, Congress has imposed a requirement, often waivable, that certain
203. See 28 U.S.C. § 530D(a), (e) (2012). The President need only notify the leadership of each
party in each house, the general counsel of each house, and the chair and ranking members of each
house’s Committee on the Judiciary. § 530D(a)(2).
204. Id. § 530D(e) (emphasis added). Only the President enjoys this power. Other Cabinet officials—
notably the Attorney General—must always disclose to Congress when they decide not to apply a
statute on the grounds of its unconstitutionality. Id.
205. See Secret Law Hearing, supra note 135, at 128–29 (testimony of Dawn E. Johnsen); Johnsen,
supra note 106, at 1598–600.
206. See Secret Law Hearing, supra note 135, at 128–29 (testimony of Dawn E. Johnsen). A bill
introduced in 2008 would have required congressional notification when the Attorney General inter
preted statutes to avoid constitutional concerns under Article II of the Constitution or separation of
powers principles. See OLC Reporting Act of 2008, S. 3501, 110th Cong. § 2 (2008). The bill was
never enacted.
207. The disclosure requirements of FOIA are discussed infra Section IV.C.
208. See Kissinger v. Reporters Comm. for Freedom of the Press, 445 U.S. 136, 156 (1980). But not
all components of the Executive Office of the President are exempt. Compare Soucie v. David, 448 F.2d
1067, 1075–76 (D.C. Cir. 1971) (holding Office of Science and Technology is subject to FOIA), with
Main St. Legal Servs., Inc. v. Nat’l Sec. Council, 811 F.3d 542, 553 (2d Cir. 2016) (explaining the
National Security Council is not subject to FOIA).
209. See, e.g., Ctr. for Effective Gov’t v. U.S. Dep’t of State, 7 F. Supp. 3d 16, 29 (D.D.C. 2013)
(ordering disclosure of Presidential Policy Directive that had been widely distributed within the
government).
848 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
FRA, FOIA leaves the President free to keep law secret in the first
instance.
The President thus enjoys significant latitude to exercise his lawmaking
functions in secret. Where the President decides not to share his determinations
with the public, he is essentially free to make that choice. Disclosure to
Congress is only sometimes required and these requirements, too, can be
evaded. The law of secret law leaves Presidents with remarkable latitude to
legislate in secret if and when they choose.
The Freedom of Information Act is perhaps the most important element of the
law of secret law. FOIA is the principal framework statute governing secrecy in
the Executive Branch and the public’s most powerful tool to force disclosure of
documents, including legal texts.210 It creates a presumption that all Executive
Branch records are public, subject only to certain enumerated exemptions.211
However, as explained below, those exemptions have increasingly been inter
preted to authorize the government to withhold law, threatening to transform
FOIA from a statute that was meant as a bulwark against secret law into a
statute that legitimizes it.
FOIA was enacted in 1966, establishing a tripartite disclosure regime that
persists to this day. It requires, first, that some materials, including formal
statements of agency law, must be affirmatively published in the Federal
Register.212 Second, other materials, including agency opinions and interpreta
tions, must also be made available automatically in reading rooms and on
line.213 Third, any and all other agency records are presumptively available to
everyone—but only upon request.214
FOIA is most famous for this last provision, but the first two—which require
affirmative disclosure of agency law—are key elements of the law of secret law.
Specifically, the Federal Register provision requires disclosure of “substantive
rules of general applicability adopted as authorized by law” and “statements of
general policy or interpretations formulated and adopted by the agency,” in
addition to “the nature and requirements of all formal and informal procedures,”
“rules of procedure,” and “statements of the general course and method by
210. See Pozen, supra note 21, at 314 n.204 (describing FOIA as a “super-statute” and explaining
that “FOIA introduced a norm of open access to government documents that has commanded deep
public loyalty, taken on a quasi-constitutional valence, and spawned a vast network of imitator laws at
all levels of United States government and in democracies around the world. FOIA is such a good
example of a super-statute that it is surprising no one has assigned it the label yet.” (citing William N.
Eskridge, Jr. & John Ferejohn, Super-Statutes, 50 DUKE L.J. 1215, 1216 (2001) for the term “super-
statute”)).
211. See U.S. Dep’t of Air Force v. Rose, 425 U.S. 352, 360–61 (1976); Oglesby v. U.S. Dep’t of
Army, 79 F.3d 1172, 1176 (D.C. Cir. 1996).
212. 5 U.S.C. § 552(a)(1) (2012).
213. See id. § 552(a)(2).
214. Id. § 552(a)(3).
2018] SECRET LAW 849
which [the agency’s] functions are channeled and determined.”215 The reading
room provision supplements these disclosure requirements by mandating that
agencies make available any other documents that might constitute authoritative
rules or guidance—in other words, “statements of policy and interpretations”
that are not otherwise published in the Federal Register, such as those that are
not of “general applicability,” as well as agency “opinions,” “orders,” and
“administrative staff manuals and instructions to staff that affect a member of
the public.”216
On their face, these two provisions appear to require affirmative disclosure of
much, perhaps all, secret law. On closer inspection they do much less. For
starters, the government takes a narrow view of its affirmative disclosure
obligations. For instance, the government has repeatedly maintained that OLC
opinions do not constitute the kinds of “opinions” or “interpretations” encom
passed within FOIA’s reading room provision because such opinions are not
always formally “adopted” by the agency for which they are written.217
Worse still, FOIA allows agencies to fail to publish without significant
consequence. Courts have thus far done little to clarify the scope of the
affirmative disclosure provisions of FOIA218 and have only recently affirmed
that courts even have authority to order prospective compliance with those
215. Id. § 552(a)(1). The predecessor to this provision in section 3 of the Administrative Procedure
Act (APA) was narrower. For instance, the original provision, which FOIA replaced, limited the
publication requirement for “substantive rules . . . and statements of general policy or interpretations”
to those “adopted . . . for the guidance of the public.” Administrative Procedure Act (APA), Pub. L. No.
79-404 § 3(a), 60 Stat. 237, 238 (1946). The APA also completely excluded any “matter relating solely
to the internal management of an agency.” APA § 3. FOIA eliminated these provisions, suggesting it
was intended to require publication of general rules and policies governing internal operations of
government, and not just those imposing requirements on public conduct. See 5 U.S.C. § 552(a)(1)(D).
216. 5 U.S.C. § 552(a)(2). Again, the parallel provision in the original APA was much narrower,
requiring only that “all rules” be published as well as “final opinions or orders in the adjudication of
cases.” APA § 3(b). FOIA adds the requirements to disclose “statements of policy and interpretations”
not found in the Federal Register, as well as “administrative staff manuals and instructions to staff that
affect a member of the public.” 5 U.S.C. § 552(a)(2).
217. See, e.g., Memorandum in Support of Defendants’ Motion to Dismiss at 25–26, Citizens for
Responsibility & Ethics in Wash. v. U.S. Dep’t of Justice, 164 F. Supp. 3d 145 (D.D.C. 2016) (No.
13-cv-1291).
218. The Campaign for Accountability is currently engaged in litigation seeking a prospective
injunction that would require the OLC to affirmatively disclose opinions that constitute binding law for
the Executive Branch. See Campaign for Accountability v. U.S. Dep’t of Justice, No. 16-cv-1068, 2017
WL 4480828, at *1 (D.D.C. Oct. 6, 2017). The district court dismissed the plaintiff’s complaint on the
grounds that its request for an order requiring disclosure of “all [OLC] opinions that have precedential
effect within the Executive Branch” failed to identify a sufficiently specific subset of OLC opinions
plausibly within the ambit of FOIA’s reading room provision. Id. at *1, *15–16 (emphasis in original).
The plaintiff subsequently identified five specific categories of OLC opinions that it contends are
subject to affirmative disclosure. See Amended Complaint for Injunctive and Declaratory Relief at
13–19, Campaign for Accountability, 2017 WL 4480828 (D.D.C. Oct. 27, 2017), https://
campaignforaccountability.org/work/office-legal-counsel-filings [https://perma.cc/Y3FZ-G9GP]. As of
this writing, litigation remains ongoing.
850 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
219. The D.C. Circuit recently held that courts only have authority to enforce the affirmative
disclosure provisions of FOIA by ordering prospective disclosure to a particular requester; they lack
authority to order prospective disclosure to the general public. See Citizens for Responsibility & Ethics
in Wash. v. U.S. Dep’t of Justice, 846 F.3d 1235, 1244 (D.C. Cir. 2017). As of this writing, the same
issue is on appeal in the Ninth Circuit. See Animal Legal Def. Fund v. U.S. Dep’t of Agriculture, No.
17-cv-949, 2017 WL 2352009, at *5 (N.D. Cal. May 31, 2017) (adopting the D.C. Circuit’s holding),
subsequent determination, 2017 WL 3478848 (N.D. Cal. Aug. 14, 2017), appeal filed, No. 17-16858
(9th Cir. Sept. 14, 2017).
220. FOIA provides that where an agency fails to publish a legal text as required—be it a rule,
opinion, or order—it cannot be used against a member of the public. See 5 U.S.C. § 552(a)(1)–(2)
(2012). But these preclusion rules are tempered by a statutory exception excluding an affected person
who has actual notice of the terms of the unpublished document. See id. § 552(a)(1). Thus, this
mechanism fails meaningfully to incentivize disclosure to the general public because notice to affected
individuals suffices. Such a weak preclusion rule does not incentivize agencies to publish laws they
would rather withhold.
221. As discussed below, the government has refused to disclose secret law by relying on FOIA’s
exemption for classified national security information and related exemptions. See infra notes 230–43
and accompanying text. Courts have largely endorsed this position in lawsuits seeking documents under
FOIA’s disclosure-upon-request provision. See infra notes 242–43 and accompanying text. The same
reasoning would appear to exclude classified or otherwise exempt rules from FOIA’s affirmative
disclosure provisions. See 5 U.S.C. § 552(b)(1) (stating that “[t]his section”—that is, the entire FOIA
including the affirmative disclosure provisions—“does not apply to matters that are specifically
authorized . . . to be kept secret in the interest of national defense or foreign policy and are in fact
properly classified.” (emphasis added)).
222. The requirement of individual notice has been weakened by the courts, which have essentially
adopted a harmless error rule: The government is precluded from using an unpublished rule against an
individual only if the individual can show that “they have been in fact adversely affected by the lack of
notice,” in the sense that “[they] would have been able to pursue an alternative course of conduct” or
otherwise avoid the consequence envisioned by the secret law had the law in question had been
published. All. for Cannabis Therapeutics v. DEA., 15 F.3d 1131, 1136 (D.C. Cir. 1994) (internal
quotation marks and citation omitted).
223. See Memorandum from David J. Barron, Acting Assistant Attorney General, to OLC Attorneys
1, 5–6 (July 16, 2010), http://www.justice.gov/sites/default/files/olc/legacy/2010/08/26/olc-legal-advice
opinions.pdf [https://perma.cc/2RFH-RNXE] (describing “best practices OLC attorneys should follow
in providing . . . formal written opinions”); Campaign for Accountability, 2017 WL 4480828, at *4.
2018] SECRET LAW 851
Equally important to the law of secret law are the exemptions written into
FOIA itself.224 FOIA includes nine enumerated categories of records not subject
to disclosure that permit the government to withhold records even in response to
a specific disclosure request.225 If secret law can be withheld under any of these
exemptions, FOIA becomes a license for secret law rather than a limit.
There is good reason to believe that the exemptions were not meant to permit
withholding of agency law. FOIA was enacted specifically to correct the deficien
cies of its predecessor, the Administrative Procedure Act, which gave agencies
essentially unfettered discretion to withhold agency law and other material.226
Against this backdrop, FOIA’s affirmative disclosure provisions were meant to
ensure both that law would not remain practically obscure227 and that officials
would be required to publish agency law in the first place.228 Relatedly, it has
long been clear that FOIA’s exemptions “must be narrowly construed” to
advance “the basic policy that disclosure, not secrecy, is the dominant objective
of the Act.”229
In FOIA’s early years, the courts strongly endorsed this view, establishing the
“secret law” doctrine (also known as the “working law” doctrine) that limited
the scope of FOIA exemptions so that they could not be used to withhold
agency law.230 The Supreme Court explicitly endorsed this anti-secret law
principle in 1975 in NLRB v. Sears, Roebuck & Co.231 In that case, the
government argued that certain agency interpretations of law were exempt
under Exemption 5, which permits the withholding of internal government
communications that are subject to privilege, particularly the deliberative pro
cess privilege.232 The Court rejected this argument, holding that “Exemption 5,
properly construed, calls for ‘disclosure of all “opinions and interpretations”
which embody the agency’s effective law and policy.’”233 The Court reasoned
that the structure of the Act, particularly the provisions regarding automatic
publication of agency law, “represents a strong congressional aversion to ‘secret
(agency) law,’ and represents an affirmative congressional purpose to require
disclosure of documents which have ‘the force and effect of law.’”234
Some lower courts subsequently extended the secret law doctrine articulated
in Sears, Roebuck & Co. to limit the scope of other privileges that can be
asserted under Exemption 5, including the attorney–client privilege.235 The
secret law doctrine also acted as a limit on the now-defunct “High 2” exemp
tion, which permitted agencies to withhold documents that could be used to
“circumvent agency regulation.”236
But in more recent years, the courts have retreated from this anti-secret law
principle, progressively narrowing the scope of the secret law doctrine, declin
ing to extend application of the doctrine beyond Exemption 5, and explicitly
permitting the government to maintain secret law in cases involving national
security and law enforcement exemptions. Indeed, a number of district courts
have now found that the secret law doctrine is no limit to Exemption 1 (which
permits the withholding of properly classified information),237 Exemption 3
(which incorporates statutory protections specific to the CIA, NSA, and other
explicitly described as serving a statutory policy against secret law: “The purpose of this limitation is to
prevent bodies of ‘secret law’ from being built up and applied by government agencies.” Schwartz v.
Internal Revenue Serv., 511 F.2d 1303, 1305 (D.C. Cir. 1975).
231. 421 U.S. 132, 153 (1975).
232. See id. at 148; see also 5 U.S.C. § 552(b)(5) (2012).
233. Sears, 421 U.S. at 153 (citation omitted).
234. Id. (citations omitted).
235. See Brennan Ctr. for Justice v. U.S. Dep’t of Justice, 697 F.3d 184, 207–08 (2d Cir. 2012); Tax
Analysts v. IRS, 117 F.3d 607, 619 (D.C. Cir. 1997). But see Am. Civil Liberties Union v. NSA, No.
13-cv-9198, 2017 WL 1155910, at *10–11 (S.D.N.Y. Mar. 27, 2017) (holding that the secret law or
“working law” doctrine does not apply to the presidential communications privilege).
236. In Crooker v. Bureau of Alcohol, Tobacco & Firearms, 670 F.2d 1051 (D.C. Cir. 1981) (en
banc), the D.C. Circuit held that Exemption 2, which by its terms permits withholding of documents
“related solely to the internal personnel rules and practices of an agency,” 5 U.S.C. § 552(b)(2), also
encompassed a broad exemption for documents where “disclosure significantly risks circumvention of
federal statutes or regulations.” Crooker, 670 F.2d at 1053. The Court imported the “secret law”
doctrine as a limit on the exemption. Id. at 1073 (considering and rejecting whether the documents in
question constituted secret law). Thirty years later, the Supreme Court overruled Crooker, holding that
Exemption 2 does not include any exemption for risks of circumvention at all, and that it is only
concerned with personnel and human resources matters. See Milner v. U.S. Dep’t of Navy, 562 U.S.
562, 573–77 (2011).
237. 5 U.S.C. § 522(b)(1).
2018] SECRET LAW 853
agencies),238 and Exemption 7(E) (which permits the withholding of law enforce
ment “techniques and procedures”).239 The trend in these cases has been to find
that the secret law doctrine simply does not apply to these exemptions.240 In
other words, the government can use these exemptions to withhold documents
that articulate internal law on the same basis that it can withhold any ordinary
document.241 The Second Circuit, in dicta, brushed aside the notion that the
working law doctrine stands as a limit to withholding “documents [that] are
classified and thus protected under Exemption 1.”242 In an unpublished opinion,
the D.C. Circuit appears to have held that Exemption 1 permits the withholding
of documents even if doing so would, as the plaintiff argued, “effectively
sanction secret law in contravention of FOIA’s principal purposes.”243
In addition to refusing to extend the secret law doctrine as a limit to national
security and law enforcement exemptions, the lower courts have taken a narrow
view of what even constitutes law for purposes of the existing secret law
doctrine under Exemption 5. The D.C. Circuit requires that the legal text in
question be “expressly adopted” by an agency or “incorporate[d] by reference”
into its policy.244 Courts have come to interpret these requirements stringently,
rejecting a pragmatic approach to whether a legal text constitutes working law
and instead requiring formal, explicit, and overt adoption of a legal rule or
opinion for it to come within the secret law doctrine. For instance, the courts
have repeatedly held that OLC opinions can be withheld on the grounds that the
agency that sought the legal opinion did not formally adopt or incorporate the
entire opinion into its own policy, even if the OLC opinion did, in practice,
authoritatively set legal parameters for the agency.245
This formalist approach to what constitutes agency law radically narrows
FOIA’s protection against secret law. So long as the government officially
disclaims formal adoption of a legal interpretation or rule, the government may
withhold memoranda, directives, and opinions that are—as a matter of social
fact and actual agency practice—treated as binding on government officials.246
Still worse, the courts have placed the burden of proof on the FOIA requester to
demonstrate whether the legal opinion sought has in fact been formally adopted
as agency policy—even though the government is typically the only party in a
position to know whether that is the case.247
These developments in the secret law doctrine have essentially drawn a
roadmap for agencies to create secret law, rather than putting up a roadblock
against it. Agencies wishing to keep law secret simply need to take care not to
explicitly or overtly “adopt” a legal interpretation as “policy.” Even when a
legal rule or interpretation is officially adopted, it can be withheld just as easily
as any other agency record simply by marking it “classified” or invoking
another national security or law enforcement exemption.
Thus, paradoxically, FOIA—a statute that was intended to uproot secret
law—is being interpreted to codify the Executive’s discretion to keep law
secret. In the absence of judicial or legislative intervention to reverse this trend
toward endorsing secret law, FOIA may serve to institutionalize secret law as a
prerogative of the Executive Branch.
In addition, for structural and practical reasons, FOIA would be an imperfect
check against secret law even if it had not been interpreted to allow secret law.
Most importantly, to file a FOIA request, a member of the public must know
what to ask for, and from whom.248 But there is nothing in FOIA that requires
the government to inform the public about the rules or interpretations that it has
adopted in secret; secrecy determinations are themselves typically made in
secret. So members of the public will often be in a position only to make an
educated guess about what secret law may exist—relying on press reports,
245. See, e.g., N.Y. Times Co., 806 F.3d at 687; Elect. Frontier Found., 739 F.3d at 10 (“Even if the
OLC Opinion describes the legal parameters of what the FBI is permitted to do, it does not state or
determine the FBI’s policy.”); Jaffer & Kaufman, supra note 20, at 246.
246. See Jaffer & Kaufman, supra note 20, at 249.
247. See N.Y. Times Co. v. U.S. Dep’t of Justice, 915 F. Supp. 2d 508, 546–49 (S.D.NY. 2013)
(permitting government to withhold OLC memo regarding targeted killing of citizen on grounds
plaintiffs could not prove that the memo had been “expressly adopted” or that the memo sought was the
basis for public comments of the government legal position on the issue), rev’d in part, 756 F.3d 100
(2d Cir. 2014).
248. See 5 U.S.C. § 552(a)(3)(A) (2012) (noting request must be submitted to particular agency and
“reasonably describe” records sought). Many agencies have divided themselves into multiple distinct
units for FOIA purposes, further complicating the requester’s task. See, e.g., 28 C.F.R. §§ 16.1(c),
16.3(a) (2017) (describing DOJ’s decentralized system for processing FOIA requests).
2018] SECRET LAW 855
249. FOIA requires a response within twenty days, but this is perhaps the most frequently violated
law in the U.S. Code. See 5 U.S.C. § 552(a)(6)(A)(i). The remedy for a violation is that a requester may
file suit. Id. § 552(a)(6)(C).
250. This is known as a “Glomar” response. See Nathan Freed Wessler, “[We] Can Neither Confirm
Nor Deny the Existence or Nonexistence of Records Responsive to Your Request”: Reforming the
Glomar Response Under FOIA, 85 N.Y.U. L. REV. 1381, 1382 (2010). For an entertaining history of the
Glomar response—including where it got its name—see Neither Confirm Nor Deny, RADIOLAB (Feb. 12,
2014, 4:00 PM), http://www.radiolab.org/story/confirm-nor-deny [https://perma.cc/3VJS-N5DZ].
251. See Pozen, supra note 21, at 313 n.203 (discussing the relationship between the Glomar
response and deep secrets).
252. For example, the first lawsuit seeking disclosure of the legal basis for targeted killings was filed
in June 2010. See Am. Civil Liberties Union v. U.S. Dep’t of Justice, 808 F. Supp. 2d 280, 284 (D.D.C.
2011) (Note: the author was among counsel for the plaintiffs in the initial stages of that litigation.). It
took a separate lawsuit and four years of litigation before a single legal opinion on the issue was
disclosed. See N.Y. Times Co. v. U.S. Dep’t of Justice, 756 F.3d 100 (2d Cir. 2014). That litigation
continued for two more years, producing only a handful of additional documents. See Am. Civil
Liberties Union v. U.S. Dep’t of Justice, 844 F.3d 126 (2d Cir. 2016). Related litigation remained
ongoing at the time of writing. See Am. Civil Liberties Union v. U.S. Dep’t of Justice, No. 15-cv-1954,
2016 WL 8259331 (S.D.N.Y. Aug. 8, 2016), appeal pending, No. 17-157 (2d Cir. Jan. 18, 2017).
856 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
Agencies can also simply stamp the relevant documents “classified” and with
hold them under Exemption 1 or take advantage of related FOIA exemptions for
national security or law enforcement information. In such cases, the courts will
not enforce any secret law doctrine and will almost always defer to Executive
Branch determinations.253 As the courts have retreated from any robust anti-
secret law principles, what has been left behind is a system that gives the
Executive Branch enormous and mostly unchecked discretion to decide whether
to keep its internal law secret.
253. See generally Margaret B. Kwoka, Securing Access to National Security Information, 67
ADMIN. L. REV. ACCORD 78 (2014); Susan Nevelow Mart & Tom Ginsburg, [Dis-]Informing the People’s
Discretion: Judicial Deference Under the National Security Exemption of the Freedom of Information
Act, 66 ADMIN. L. REV. 725 (2014).
254. From the perspective of an official deciding whether to keep rules secret, the risks from
disclosure—any incremental threat to national security—will be much more vivid than the dispersed
benefits of transparency. Indeed, it is the primary job of those in the national security establishment to
look for such risks and avoid them whenever possible. Moreover, once a secrecy decision is made in the
bureaucracy, it enjoys the benefit of inertia. Changing course in favor of more disclosure will face
often-insurmountable hurdles, typically involving significant interagency consultation and consensus.
These and other incentives toward executive secrecy have been widely explored in the literature on
government overclassification, and there is little reason to believe they would be any less powerful
when it comes to secret law. See, e.g., ELIZABETH GOITEIN & DAVID M. SHAPIRO, BRENNAN CENTER FOR
JUSTICE, REDUCING OVERCLASSIFICATION THROUGH ACCOUNTABILITY 21–32 (2011); Steven Aftergood,
Reducing Government Secrecy: Finding What Works, 27 YALE L. & POL’Y REV. 399, 401–04 (2009).
255. See supra Section IV.C.
256. As a formal matter, each house of Congress also reserves the right to publicly disclose
classified information upon a majority vote, but that mechanism has never been invoked. See Kitrosser,
supra note 82, at 1080–83.
2018] SECRET LAW 857
pressure from litigation, Congress, the media, unauthorized leaks,257 and the
public has—over the course of several years—prompted the administration to
voluntarily change course and disclose some secret law.258 That this kind of
“transparency campaign” is necessary to make a particular secret law public
demonstrates that our current system is one in which the legal equilibrium
permits far too much secrecy. Executive discretion to keep law secret is effectively
governed by the vicissitudes of politics and whistleblowers—not by law.
A reform agenda for secret law would reset this equilibrium by creating a
legal regime that gives significant weight to transparency values and renders
257. In recent years, secret law has almost always come to light as a direct or indirect result of
unauthorized, extralegal leaks. The Snowden disclosures of NSA surveillance are the prime example,
but other examples abound. See, e.g., Glenn Greenwald & Betsy Reed, Secret Docs Reveal: President
Trump Has Inherited an FBI with Vast Hidden Powers, INTERCEPT (Jan. 31, 2017, 7:38 AM), https://
theintercept.com/2017/01/31/secret-docs-reveal-president-trump-has-inherited-an-fbi-with-vast
hidden-powers/ [https://perma.cc/T3LZ-W2SQ] (reporting on leak of previously redacted portions of
FBI Domestic Investigations and Operations Guidance and other documents); Michael Isikoff, Justice
Department Memo Reveals Legal Case for Drone Strikes on Americans, NBC NEWS (Feb. 4, 2013, 5:57
PM), http://investigations.nbcnews.com/_news/2013/02/04/16843014-justice-department-memo-reveals
legal-case-for-drone-strikes-on-americans?lite [https://perma.cc/4GSR-HK9P] (reporting on leaked DOJ
white paper describing legal rules governing targeted killings of U.S. citizens); Dana Priest & R. Jeffrey
Smith, Memo Offered Justification for Use of Torture, WASH. POST (June 8, 2004), http://www.
washingtonpost.com/wp-dyn/articles/A23373-2004Jun7.html [https://perma.cc/7LEB-TMLD] (report
ing on leaked memo authorizing torture); James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers
Without Courts, N.Y. TIMES (Dec. 16, 2005), http://www.nytimes.com/2005/12/16/politics/bush-lets-us
spy-on-callers-without-courts.html?smid=pl-share [https://nyti.ms/2k90zpQ] (reporting on leaked de
tails of warrantless wiretapping rules).
258. The disclosure of the memo governing targeted killing of citizens is a prime example of a
transparency campaign slowly prying secret law loose. Litigation seeking to force disclosure of the
memos began in 2010 but foundered for years, with judges repeatedly deferring to the government’s
claims of secrecy. See Am. Civil Liberties Union v. U.S. Dep’t of Justice, 808 F. Supp. 2d 280, 301
(D.D.C. 2011) (upholding secrecy), rev’d sub nom. Am. Civil Liberties Union v. CIA, 710 F.3d 422
(D.C. Cir. 2013) (holding government could no longer refuse to confirm or deny existence of records
but remained free to resist disclosure on other grounds); Complaint, Am. Civil Liberties Union v. U.S.
Dep’t of Justice, No. 10-cv-436 (D.D.C. June 1, 2010) (seeking the release of records relating to the use
of drones to target and kill individuals); N.Y. Times Co. v. U.S. Dep’t of Justice, 915 F. Supp. 2d 508,
553 (S.D.N.Y. 2013) (upholding secrecy), rev’d, 756 F.3d 100 (2d Cir. 2014) (holding government
waived secrecy and privilege as to legal analysis of OLC memorandum). In the meantime, Congress
applied pressure by holding up the nomination of John Brennan to lead the CIA. See Michael D. Shear
& Scott Shane, Congress to See Memo Backing Drone Attacks on Americans, N.Y. TIMES (Feb. 6,
2013), http://www.nytimes.com/2013/02/07/us/politics/obama-orders-release-of-drone-memos-to
lawmakers.html [https://nyti.ms/2jHsjGD]. As a result, it seems, Congress disclosed the OLC memo to
the congressional intelligence committees. Id. At nearly the same time, the press obtained a leaked copy
of an unofficial DOJ “white paper” summarizing the still-secret memo. See Isikoff, supra note 257. The
Second Circuit subsequently ordered disclosure of parts of the memo on the grounds that the
government had waived its right to withhold it by disclosing the white paper and other information.
N.Y. Times Co. v. U.S. Dep’t of Justice, 756 F.3d 100, 116–17, 124 (2d Cir. 2014). Under pressure from
Congress, which was holding up the nomination of David Barron, the author of the OLC memo, to a
judgeship on the First Circuit, the government elected not to seek further appellate review and
voluntarily disclosed the memo with redactions. See Ashley Parker, Memo Approving Targeted Killing
of U.S. Citizen to Be Released, N.Y. TIMES (May 20, 2014), https://www.nytimes.com/2014/05/21/us/
politics/memo-approving-targeted-killing-of-us-citizen-to-be-released.html?smid=pl-share [https://nyti.
ms/2jHJ84p].
858 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
secret law an exceptional practice that is permitted, if at all, only where truly
necessary and justified.259 In what follows, I offer certain principles that should
guide any such reform efforts and outline one promising pathway for reform
that calls upon the authority and expertise of both the courts and Congress to
rein in the practice of secret law in the Executive.
The brief tour of the current law of secret law in Part IV, combined with the
distinctions among secret laws introduced in Part III, point to a reform agenda
that would rein in the practice of secret law. I propose three essential principles
to guide such reform.
First, there should be no such thing as a secret law whose very existence is a
secret. When it comes to rules that govern the conduct of officials, the public
must always know—at a minimum—that a secret law exists.260 Second, the
extent of secrecy must always be kept to an absolute minimum. This should
include a requirement that government officials pay specific attention to the five
key characteristics of secret law.261 It should also require that decisions to keep
law secret meet a higher standard of justification than the ordinary standard
required to classify mere facts.262 Third, the legal standards that govern secret
law should themselves be established in public by statute and should be
enforceable by the courts. Just as FOIA empowers the courts to adjudicate
compliance with laws restricting secrecy, the courts should be able to adjudicate
whether the Executive Branch is complying with strict and public limits on
secret law. In what follows, I briefly elaborate on each of these principles.
259. See Margaret Kwoka, Leaking and Legitimacy, 48 U.C. DAVIS L. REV. 1387, 1455–56 (2015)
(reforming national security secrecy laws to permit more disclosure of information through formal
means may reduce incentives to leak and could result in a better equilibrium between national security
and government transparency); Pozen, supra note 169, at 581–82 (“Surely we would have less leaking
of classified information if we had less classified information. Not only would there be fewer
documents to pilfer, but people might treat the secrecy rules with more respect.”).
260. Accord Rudesill, supra note 18, at 344; GOITEIN, supra note 18, at 68–69.
261. See supra Part III.
262. Accord GOITEIN, supra note 18, at 64–65.
2018] SECRET LAW 859
oversight.263
It is perhaps no surprise that multiple commentators have endorsed this same
principle. Dakota Rudesill, writing about the problem of secret legislation
enacted by Congress, has proposed that there should be public notices—or “bell
ringers”—every time such a law is enacted.264 Elizabeth Goitein of the Brennan
Center for Justice made a similar proposal with respect to all varieties of secret
law.265 I add my voice to that growing consensus.
268. Exec. Order. No. 13,526 § 1.1(a)(4), 75 Fed. Reg. 707 (Dec. 29, 2009) (emphasis added). In
addition to this minimal showing of risk, three additional requirements must be met to classify
information: an “original classification authority” must be the one to classify; the information must be
“owned by, produced by or for, or [be] under the control of the United States Government;” and “the
information [must] fall[] within one or more of the categories of” classifiable subject matter. Id.
§ 1.1(a)(1)–(3).
269. One concrete option is to borrow the stringent standard that governs secrecy in the Judicial
Branch and other contexts in which the First Amendment right of access applies. In those circum
stances, secrecy is permitted only to serve an “overriding interest based on findings that closure is
essential to preserve higher values.” Dhiab v. Obama, 70 F. Supp. 3d 486, 493 (D.D.C. 2014) (quoting
Press-Enter. Co. v. Super. Ct. of Cal., 464 U.S. 501, 510 (1984)). More to the point, the “party seeking
closure must show a ‘substantial probability’ of harm to an ‘overriding interest,’”—more than merely a
“‘reasonable likelihood’ of harm,” as with ordinary classification rules. See id. (quoting Press-Enter.
Co., 478 U.S. at 13–15). In addition, “any limit on public access . . . must be ‘narrowly tailored to serve
that interest,’” id. (quoting Press Enter., 464 U.S. at 510), and it must be effective in protecting the
threatened interest. Press Enter., 478 U.S. at 14.
270. See, e.g., James R. Clapper, Dir. of Nat’l Intelligence, Testimony at Open Hearing on Foreign
Intelligence Surveillance Authorities, U.S. S. Select Comm. on Intelligence (Sept. 26, 2013), https://
icontherecord.tumblr.com/post/62344881129/remarks-as-prepared-for-delivery-by-director-of [https://
perma.cc/T7KA-WFBW] (“Over the past three months, I’ve declassified and publicly released a series
of documents related to both Section 215 of the PATRIOT Act and Section 702 of the Foreign
Intelligence Surveillance Act. I did that to facilitate informed public debate about the important
intelligence collection programs that operate under these authorities.”).
271. See generally Letter from Hon. Reggie B. Walton, Presiding Judge, U.S. Foreign Intelligence
Surveillance Court to Sen. Dianne Feinstein (Mar. 27, 2013), https://fas.org/irp/agency/doj/fisa/fisc
032713.pdf [https://perma.cc/YTA5-XSS7].
272. See USA FREEDOM Act of 2015, Pub. L. No. 114-23, 129 Stat. 268 (2015).
2018] SECRET LAW 861
280. See Kris, supra note 137, at 275–76 (explaining government sought for years to find ways to
disclose FISC opinions without compromising the underlying programs but was unable to do so).
281. A case-by-case approach could be enacted by imposing a strict time limit on how long laws
may be kept secret without specific congressional authorization. Congress could, for example, require
the Executive to provide an annual report listing secret legal opinions, rules, and other legally binding
instruments, and further require that all such texts be published within twelve months unless Congress
endorses continued secrecy through subsequent legislation. This kind of statute would effectively
impose a uniform sunset provision on all secret laws, making transparency the default rule. Of course,
such a law would impose a significant decisional burden on Congress and, in any case, sunset
provisions in national security legislation have not turned out to be particularly effective checks on the
Executive. See generally Berman, supra note 157 (discussing the effectiveness of sunset rules in the
national security context).
282. See supra notes 244–47.
2018] SECRET LAW 863
material improperly withheld.289 The public can press this system of checks and
balances into action simply by filing suit seeking disclosure. The genius of
FOIA was to split the atom of executive secrecy among all three branches and
the public.290 The framework statute I have proposed is meant to have the same
effect with respect to secret law.
Just as FOIA wrested control from the Executive Branch over government
secrecy in general, a strong framework statute for secret law is meant to replace
a system of executive discretion with one governed by stringent criteria estab
lished by Congress and enforceable by the courts and public. The hope is that
by cabining executive discretion, such reforms would shift the legal equilibrium
to a position that better respects the transparency values that militate against
secrecy.
B. FORCING PUBLIC DELIBERATION OVER SECRET LAW: A ROLE FOR THE COURTS
The idea that Congress would take up, on its own initiative, something like
the framework statute I have envisioned here may seem fantastical. Congress
has acquiesced in the practice of secret law for the past fifteen years.291 In that
time, it has legislated limits on secret law only once by requiring the disclosure
of redacted FISA court opinions.292 And that reform was made only as a result
of the fallout of the most spectacular and consequential leak of the last forty
years. What could motivate Congress to upend the status quo?
I end this Article by proposing a doctrinal innovation that would both limit
the practice of secret law and force more robust congressional participation in
the ecosystem regulating secret law: the courts should adopt a constitutional
presumption against secret law. Specifically, the courts should adopt a canon of
statutory interpretation that statutes will not be read to permit secret law unless
Congress has clearly and affirmatively said otherwise.293 Under this kind of
clear statement rule, statutes that otherwise permit the government to withhold
information would not suffice to authorize it to withhold law. Most notably, the
Executive Branch could no longer keep legal texts secret on the basis of
ordinary FOIA exemptions for national security and law enforcement informa
tion. Instead, the government would need to obtain specific congressional
approval to keep law secret, for example, by enacting and following a frame
work statute governing secret law along the lines proposed above.294
294. This stands in contrast to previous case law, in which the court has observed that “there is no
textual basis in FOIA for a freestanding ‘secret law doctrine.’” N.Y. Times Co. v. U.S. Dep’t of Justice,
872 F. Supp. 2d 309, 317 (S.D.N.Y. 2012). Had the court applied a presumption against secret law, the
inquiry would not have been whether FOIA specifically removes secret law from the government’s
power to withhold records, but rather whether the law specifically grants the government power to
withhold law.
295. See supra notes 240–47, 253 and accompanying text (discussing courts’ reluctance to order
disclosure of information over the national security objections of government).
296. See ADRIAN VERMEULE, JUDGING UNDER UNCERTAINTY: AN INSTITUTIONAL THEORY OF LEGAL
INTERPRETATION 132–35 (2006) (explaining that clear statement rules are a form of democracy-forcing
statutory interpretation); Cass R. Sunstein, Nondelegation Canons, 67 U. CHI. L. REV. 315 (2000)
(arguing clear statement rules amount to nondelegation rules forbidding the Executive from taking
certain actions on its own).
297. See Benson, supra note 22; Sunstein, supra note 22; Balkin, supra note 22.
866 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
will be on notice of what may be kept secret and will at least be able to
participate in the second-order decision—through the ordinary legislative
process—about whether and when to permit law to be kept secret.
There are objections to this proposal. Clear statement rules have come under
criticism as an inappropriate exercise of judicial power.298 Even if a court did
adopt a clear statement rule against secret law in a particular case and ordered
disclosure on that basis, Congress could simply respond by endorsing secrecy in
that particular instance—rather than enacting a broader framework limiting
secret law.299 Moreover, Congress’s involvement may not ensure that the line
between secrecy and disclosure will be drawn in an appropriate place. To the
contrary, Congress could decide to explicitly delegate broad secret lawmaking
authority, only further entrenching the problematic practice. But requiring the
entire legislative apparatus of government to decide when we will be governed
by secret laws seems the best way to make such decisions in a democracy. The
courts are in a unique position to force this kind of healthy democratic
deliberation.
298. See John F. Manning, Clear Statement Rules and the Constitution, 110 COLUM. L. REV. 399, 404
(2010) (arguing the Constitution should not be read to include general constitutional values enforceable
through clear statement rules, and instead constitutional values only “find concrete expression in many
discrete constitutional provisions, which prescribe the means of implementing the value in question”).
299. Cf. Am. Civil Liberties Union v. U.S. Dep’t of Def., 40 F. Supp. 3d 377, 380–82 (S.D.N.Y.
2014) (recounting Congress’s enactment of a law specifically empowering the Secretary of Defense to
withhold images of detainees being abused, in response to a judicial decision ordering those images
disclosed).
300. See Sunstein, supra note 296, at 330–37 (“[N]ondelegation canons fall in three principal
categories. Some are inspired by the Constitution; others involve issues of sovereignty; still others have
their foundations in public policy.”); Eskridge & Frickey, supra note 293, at 596–97.
301. See supra Parts II–III.
302. See supra Section V.B.1.
2018] SECRET LAW 867
merely to draw the contours within which such an argument might be con
structed. A more sustained examination of the constitutional limits on secret law
is a project for another day.
Although there is no single provision of the Constitution forbidding secret
law, there are a number of features of the Constitution’s text and structure that,
taken together, strongly suggest a constitutional presumption that law will be
public.303
The most obvious of such provisions are the Presentment Clause and the
Journal Clause. The latter, which requires each house of Congress to keep a
“Journal of its Proceedings,” contains an explicit presumption in favor of
openness: “Each House shall . . . from time to time publish [its Journal], except
ing such Parts as may in their Judgment require Secrecy.”304 Accordingly, the
Constitution presumes that when each house passes bills and takes other actions
it will do so in public, unless it specifically decides to do so in secret. The
Presentment Clause, in turn, requires bills enacted by both houses to “be
presented to the President of the United States; [i]f he approve he shall sign it,
but if not he shall return it.”305 Although the Presentment Clause does not
contain any explicit transparency provisions, it refers back to the Journal
Clause, with its explicit presumption of openness.306 Taken together, the two
clauses strongly suggest that the Constitution envisions lawmaking as a presump
tively public process.
Additional constitutional support for a presumption against secret law may be
found in the First Amendment’s guarantees of the rights to freedom of speech,
freedom of the press, freedom of assembly, and the right to petition. It is
commonly understood that, among other purposes, these protections of the First
Amendment are a “method of securing participation by the members of the
society in social, including political, decision making.”307 But if the public is
kept in the dark about the very law that governs, public participation in political
decision making will be severely constrained.
Similar considerations led the Supreme Court to recognize in the First
Amendment a qualified right of access to courts and other official proceedings
and records.308 In particular, the Court has held that where there is a tradition of
303. This discussion draws upon the work of Heidi Kitrosser, David Pozen, Mark Rozell, and Adam
Samaha, each of whom has discussed the constitutional status of secrecy in various contexts. See
ROZELL, supra note 21, at 8–11, 20–29, 44–49; Kitrosser, supra note 21, at 514–15; Pozen, supra note
21, at 292–323; Samaha, supra note 21, at 941–76.
304. U.S. CONST. art. I, § 5, cl. 3.
305. U.S. CONST. art. I, § 7, cl. 2.
306. See id. (requiring the objections of the President exercising a veto to be entered on the Journal
of the house where the bill originated, and requiring the votes for and against an override of the veto to
be “entered on the Journal of each House respectively”).
307. Thomas I. Emerson, Toward a General Theory of the First Amendment, 72 YALE L.J. 877, 878
(1963).
308. See, e.g., Richmond Newspapers, Inc. v. Virginia, 448 U.S. 555, 572 (1980) (“People in an
open society do not demand infallibility from their institutions, but it is difficult for them to accept what
they are prohibited from observing.”).
868 THE GEORGETOWN LAW JOURNAL [Vol. 106:803
power among the federal and state governments, delegating to the Executive
Branch the power to execute the laws, and otherwise regulating the lawmaking
authority of government. To the extent that the Constitution can be read to
contain some implicit restrictions on secrecy,315 they must be strongest with
respect to the law itself.
CONCLUSION
Secret law has become a regular feature of governance in this country,
particularly with respect to national security and law enforcement activities of
government. The practice is deeply problematic from a number of perspectives.
This Article attempts to clarify what is at stake in disputes over secret law to
more rigorously assess the harms of secret law and to suggest how tensions
between transparency and secrecy might be mitigated. Ultimately, however, to
reconcile the basic tension between secret law and elementary constitutional
commitments, it will be necessary to bring the practice out of the shadows and
to require every branch of government—and the public, too—to participate in
decisions over its proper place.
315. See Richmond Newspapers, Inc. v. Virginia, 448 U.S. 555, 576–80 (1980) (holding First
Amendment limits secrecy where there is a longstanding history of openness); id. at 589 (Brennan, J.,
concurring) (explaining First Amendment limits secrecy where openness in a particular governmental
process serves that process itself); Pozen, supra note 21, at 292–323 (arguing the Constitution forbids,
at a minimum, “deep secrecy”—that is, it prohibits one branch of government from taking actions that
no other branch of government is permitted to know exist); Samaha, supra note 21, at 963–68 (arguing
courts could build on existing statutory structures, including FOIA, to enforce constitutionally grounded
expansion or contraction of access rights based on the Constitution’s structural logic and its commit
ment to democratic popular accountability).