Doe v. Federal Democratic Republic of Ethiopia

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA JOHN DOE, a.k.a. KIDANE, Plaintiff, v. Civil Action No. 14-372 (RDM) FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA, Defendant. MEMORANDUM OPINION AND ORDER The central question presented in this case is whether federal law permits the plaintiff, a U.S. citizen born in Ethiopia who remains active in the Ethiopian diaspora, to maintain suit in this Court against the Federal Democratic Republic of Ethiopia for its alleged surreptitious monitoring and recording of his (and his family’s) computer activities and communications in Silver Spring, Maryland. Plaintiff claims that, in doing so, Ethiopia violated Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“Wiretap Act”), 18 U.S.C. § 2510 et seq., and committed the common law tort of “intrusion upon seclusion” in violation of Maryland law. Ethiopia has appeared, but moves to dismiss on numerous grounds. As explained below, the Court concludes that the Wiretap Act does not create a private cause of action against a foreign state and that the plaintiff’s state-law tort claim is barred by the Foreign Sovereign Immunities Act (“FSIA”), 28 U.S.C. §§ 1602–1611. The Court, accordingly, GRANTS Ethiopia’s motion and dismisses the amended complaint. I. BACKGROUND For present purposes, the Court accepts at true the allegations of the amended complaint, along with the incorporated material. 1 See Price v. Socialist People’s Libyan Arab Jamahiriya, 294 F.3d 82, 93 (D.C. Cir. 2002) (when reviewing “a plaintiff’s unchallenged factual allegations to determine whether they are sufficient to deprive a foreign state defendant of sovereign immunity, [the court must] assume those allegations to be true” (citations omitted)); Gordon v. United States Capitol Police, 778 F.3d 158, 163–64 (D.C. Cir. 2015) (under Federal Rule of Civil Procedure 12(b)(6), the court “must accept the complaint’s allegations as true and draw all reasonable inferences in favor of the non-moving party”). Plaintiff John Doe, who uses the pseudonym “Kidane” in connection with his political activities, is a U.S. citizen who was born in Ethiopia and has lived in the United States since obtaining asylum in the early 1990s. Dkt. 1-1 ¶ 3; Dkt. 26 at ¶¶ 3, 19, 20. At all relevant times, Kidane resided in Silver Spring, Maryland, where he has remained active “within the Ethiopian Diaspora.” Dkt. 26 ¶¶ 19, 20. He asserts that “the Ethiopian government monitors political dissidents at home and abroad . . . through the use of electronic surveillance,” id. ¶ 25, and that he was subjected to such surveillance by means of a program secretly installed on his personal computer, controlled by the Ethiopian government or its agents, and used by them to monitor and record his computer activities and communications. See id. ¶¶ 3, 5, 9. 1 Had Ethiopia presented evidence disputing the “factual underpinnings of” Kidane’s invocation of an exception to the FSIA, the Court would have been required to “go beyond the pleadings and [to] resolve any disputed issues of fact the resolution of which is necessary to a ruling upon the motion to dismiss.” Phoenix Consulting v. Republic of Angola, 216 F.3d 36, 40 (D.C. Cir. 2000). But, because Ethiopia has not done so, the Court must resolve Ethiopia’s motion based on the facts as alleged. 2 According to the complaint, in late 2012 or early 2013, Kidane’s personal computer, located at his home in Maryland, “bec[a]me infected with clandestine computer programs known as FinSpy.” Id. ¶ 4. FinSpy is “a system for monitoring and gathering information from electronic devices, including computers and mobile phones, without the knowledge of the device’s user.” Id. ¶ 6. It is allegedly “sold exclusively to government agencies and is not available to the general public.” Id.; see also id., Ex. A (describing the FinSpy product). Kidane attributes the FinSpy infection of his computer to an email “sent by or on behalf of Ethiopia that was thereafter forwarded to” him by a third party. Id. ¶ 5. The complaint does not state where the original third-party recipient was located; Ethiopia argues, however, that the content of the email, which is appended to the complaint, suggests that the original recipient may have resided in London. See id., Ex. C (translation stating, in part, “[y]ou took your family to London . . . .”). In any event, Kidane does not allege or argue that Ethiopia sent the email directly to him or to anyone else located in the United States. The email contained a Trojan Horse attachment that “trick[ed]” Kidane into opening it, Dkt. 26 ¶¶ 38, 41, “caus[ing] a clandestine client program to be surreptitiously downloaded onto his computer,” id. ¶ 5, and resulting in the installation of the FinSpy software, id. The FinSpy software allegedly “took what amounts to complete control over the operating system” of his computer. Id. According to the complaint, FinSpy contains “modules” for “extracting saved passwords from more than 20 different” programs, “for . . . recording Internet telephone calls, text messages, and file transfers transmitted through the Skype application,” “for covertly recording audio from a computer’s microphone even when no Skype calls are taking place,” “for recording every keystroke on the computer,” and “for recording a picture of the contents displayed on a computer’s screen.” Id. ¶ 36–37. 3 Kidane alleges that once FinSpy infected his computer, it “began contemporaneously recording some, if not all, of the activities undertaken by users of the computer, including [Kidane] and members of his family.” Id. He alleges that it “surreptitiously intercepted and contemporaneously recorded dozens of [his] private Skype Internet phone calls, recorded portions or complete copies of a number of [his] emails,” and copied a web search conducted by his son for a ninth-grade research assignment. Id. ¶ 3. He further avers that evidence of these activities was found in various “FinSpy trace files” on his computer. See id. ¶¶ 55–60, 64–77. These trace files included, for example, “files consistent with FinSpy’s naming convention [that] contain portions or complete copies of [Kidane’s] private and highly confidential Skype conversations.” Id. ¶ 69. Kidane further alleges that the FinSpy software installed on his computer communicated with a computer server located in Ethiopia. Id. ¶ 10. As explained in the complaint and attached exhibits, computers that have been infected with the FinSpy software typically communicate with a designated “FinSpy Master” server via a “FinSpy Relay.” Id. ¶¶ 35, 43–51, Ex. A. The “FinSpy Master” determines whether, under the applicable FinSpy license terms, a given copy of the software will be activated. Id. ¶¶ 44–45, Ex. A. Once the software is activated, the FinSpy Master “sends commands to [the] infected device[] and receives gathered information” from that device. Id. ¶ 35. According to a report attached to the complaint, “a recently acquired [FinSpy] malware sample” shows that the malware has used “images of members of the Ethiopian opposition group, Ginbot 7, as bait, and that it has communicated with a FinSpy Command & Control server in Ethiopia.” Dkt. 26, Ex. B. In particular, the malware communications “can be found in [an] address block run by Ethio Telecom, Ethiopia’s state owned telecommunications provider.” Id. Kidane alleges that “the FinSpy Relay and FinSpy Master servers with which 4 [his] computer in Maryland was controlled are located inside Ethiopia and controlled by Defendant Ethiopia,” id. ¶ 85, and that the FinSpy installation “took instructions from a FinSpy relay controlled by Defendant Ethiopia,” id. ¶ 84. He further alleges that FinSpy, but not all of the distinct trace files, “appears to have been removed” from his computer just five days after the publication of a report that disclosed “the technical details of the FinSpy Relay” used by Ethiopia. Id. ¶ 77. The complaint contains two counts: a claim under the Wiretap Act, alleging that Ethiopia illicitly intercepted Kidane’s Skype calls and “other data,” id. ¶¶ 92–100, and a claim under Maryland tort law for intrusion upon seclusion, alleging that Ethiopia unlawfully monitored and recorded Kidane’s and his family’s private computer activities, including Skype calls, emails, and web searches, id. ¶¶ 101–105. Citing a fear of retaliation against himself and his family members in the United States and Ethiopia, Kidane moved for leave to proceed pseudonymously—as either John Doe or using the name “Kidane.” See Dkt. 1-1 at 11–13. The Court granted that motion. See Dkt. 2. Ethiopia moved to dismiss the complaint, see Dkt. 27, and, after the matter was fully briefed, the Court held oral argument on Ethiopia’s motion. In light of the fact that the case presents “substantial issues relating to the interpretation and application of the Foreign Sovereign Immunities Act’s non-commercial tort exception, 28 U.S.C. § 1605(a)(5), including the discretionary function exception and the ‘entire tort’ rule,” the Court then provided the United States with the opportunity to file a brief. See Dkt. 35. The United States responded that it was “actively considering whether to file a Statement of Interest as permitted by 28 U.S.C. § 517,” and requested additional time to “complete its deliberations,” and, if appropriate, to file a 5 Statement of Interest. Dkt. 37. The United States ultimately declined, however, to file a brief at this stage of the proceeding. Dkt. 38. II. ANALYSIS Ethiopia moves to dismiss on multiple grounds, contending both that this Court lacks jurisdiction under the FSIA and that Kidane fails to state a claim under the Wiretap Act because the Act does not provide a cause of action against a foreign state. See Dkt. 27. In the ordinary course, the Court would start with the jurisdictional question, because jurisdiction is a precondition to the Court’s “power to declare the law, and when it ceases to exist, the only function remaining to the court is that of announcing the fact and dismissing the cause.” Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 94 (1998) (quoting Ex parte McCardle, 74 US (7 Wall) 506, 514 (1868)). In Vermont Agency of Natural Resources v. United States ex rel. Stevens, 529 U.S. 765 (2000), however, the Supreme Court recognized a narrow exception to this rule. There, as here, the Court possessed Article III jurisdiction but was called upon to decide whether sovereign immunity—there, the Eleventh Amendment immunity of the state of Vermont—barred the action. Id. at 778. Before resolving that jurisdictional question, however, the Court concluded that it was appropriate to consider whether the relevant statute “permit[ed] the cause of action [Congress] create[d] to be asserted against States.” Id. at 779. As the Supreme Court explained, “[w]hen . . . two questions [of this sort] are at issue, not only is the statutory question ‘logically antecedent to the existence of’ the . . . question” of sovereign immunity, “but also there is no realistic possibility that addressing the statutory question will expand the Court’s power beyond the limits that the jurisdictional restriction has imposed.” Id. The same is true with respect to Kidane’s claim under the Wiretap Act. The question 6 whether Congress intended to subject foreign sovereigns to suit under the Wiretap Act is antecedent to the question whether Ethiopia would, under the FSIA, be immune from suit for any such violation. As in Vermont Agency of Natural Resources, moreover, resolving the statutory question first does not risk expanding the Court’s power beyond the jurisdictional limits prescribed by Congress; indeed, both the statutory and jurisdictional issues pose essentially the same question—did Congress intend to subject foreign states to suit in U.S. courts under the Wiretap Act? The Court, accordingly, starts with the question whether the Wiretap Act applies to foreign states before turning to the application of the FSIA. A. Applicability of the Wiretap Act to Foreign States The Wiretap Act imposes criminal penalties and establishes a private cause of action for, among other things, the unauthorized interception of “any wire, oral, or electronic communication.” 18 U.S.C. § 2511(1) (liability); see also id. §§ 2511(4) (criminal penalties), 2520(a) (private cause of action for civil damages). According to Ethiopia, however, the Wiretap Act does not apply to foreign states. That contention raises two distinct questions: First, does the prohibition on unauthorized interception of communications contained in section 2511(1) of the Wiretap Act apply to governmental entities? Second, if not, does the civil cause of action created in the Act nonetheless authorize private litigants to sue governmental entities, including foreign states, for violations of section 2511(1)? As usual, the Court “begin[s] with the text of the statute.” Kasten v. Saint-Gobain Performance Plastics Corp., 563 U.S. 1, 7 (2011). The prohibition of the Wiretap Act at issue in this case is found in section 2511(1)(a), which makes it a crime for “any person” to “intentionally intercept[], endeavor[] to intercept, or procure[] any other person to intercept . . . any wire, oral, or electronic communication” without lawful authorization. The term “person,” 7 in turn, is defined as “any employee, or agent of the United States or any State or political subdivision thereof, and any individual, partnership, association, joint stock company, trust, or corporation.” Id. § 2510(6). Thus, by its plain terms, the prohibition in section 2511(1)(a) does not apply to governmental entities; rather, it is limited to suits against those acting on behalf of the United States and state and local governments, other individuals, and various non- governmental entities. That reading of the statute is consistent, moreover, with the “longstanding interpretative presumption that ‘person’ does not include the sovereign,” Vermont Agency of Nat’l Res., 529 U.S. at 780, and with the legislative history of the Wiretap Act, which indicates that even though the “definition [of ‘person’] explicitly includes any officer or employee of the United States or any State or political subdivision of a State,” it excludes “the governmental units themselves,” S. Rep. No. 90-1097 (1968), reprinted in 1968 U.S.C.C.A.N. 2112, 2179. The Court, accordingly, concludes that the prohibition on unauthorized interception of wire, oral, or electronic communications contained in section 2511(1)(a) does not apply to governmental entities, much less foreign states. Kidane does not resist this line of reasoning, but instead argues that two amendments to the provision of the Wiretap Act establishing a private cause of action for civil damages, section 2520, opened the door to private suits against governmental entities, including foreign states, for violations of section 2511(1)(a) of the Act. As originally enacted in 1968, section 2520 provided a cause of action for a “person whose wire or oral communication is intercepted . . . in violation of this chapter . . . against any person who intercepts . . . such communications.” See Omnibus Crime Control and Safe Streets Act of 1968, Pub. L. No. 90-351, Title III, § 802, 82 Stat. 213 (1968) (emphasis added). In 1986, however, Congress enacted the Electronic Communications Privacy Act (“ECPA”), which—along with a more comprehensive overhaul of the privacy laws 8 to address electronic communications—modified section 2520 to permit recovery “from the person or entity which engaged in that violation [of this chapter].” Pub. L. No. 99-508, Title I, § 103, 100 Stat. 1848 (1986) (emphasis added). Then, in 2001, Congress again amended section 2520 in the PATRIOT Act. That amendment changed the relevant language to its current form, which provides that a person who has been subjected to the unlawful interception of his wire, oral, or electronic communications may sue “the person or entity, other than the United States, which engaged in that violation.” Pub. L. No. 107-56, Title I, § 223, 115 Stat. 293, 384 (2001) (codified at 18 U.S.C. § 2520(a) (2012)) (emphasis added). As Kidane correctly observes, the phrase “or entity” in section 2520(a) “logically must refer to [at least some] governmental entities in order to have meaning and effect.” Dkt. 28 at 19. A number of courts considering claims against local governments have so held. 2 As they explain, “[t]he addition of the words ‘[or] entity’ can only mean a governmental entity because prior to the 1986 amendments, the definition of ‘person’ already included business entities. In order for [the addition of] the term [‘entity’ to section 2520] not to be superfluous, the term ‘entity’ [must] mean[] governmental entities.” Adams, 250 F.3d at 985. In addition, although there is no legislative history discussing ECPA’s addition of the phrase “or entity” to section 2520, ECPA simultaneously “added the same language to the civil liability provision for 2 See Adams v. City of Battle Creek, 250 F.3d 980, 985–86 (6th Cir. 2001); Garza v. Bexar Metro. Water Dist., 639 F. Supp. 2d 770, 773–75 (W.D. Tex. 2009); Williams v. City of Tulsa, 393 F. Supp. 2d 1124, 1132 (N.D. Okla. 2005); Conner v. Tate, 130 F. Supp. 2d 1370, 1373–74 (N.D. Ga. 2001); Dorris v. Absher, 959 F. Supp. 813, 820 (M.D. Tenn. 1997), aff’d in part, rev’d in part on other grounds, 179 F.3d 420 (6th Cir. 1999); PBA Local No. 38 v. Woodbridge Police Dep’t, 832 F. Supp. 808, 823 (D.N.J. 1993); Bodunde v. Parizek, No. 93-1464, 1993 WL 189941, at *3–4 (N.D. Ill. May 28, 1993); Huber v. N. Carolina State Univ., 594 S.E.2d 402, 407 (N.C. 2004). See also Organizacion JD Ltda. v. U.S. Dep’t of Justice, 18 F.3d 91, 95 (2d Cir. 1994) (holding parallel cause of action in section 2707 for violations of the Stored Communications Act covers municipality). The D.C. Circuit has not addressed the issue. 9 interception of stored wire and electronic communications” contained in 18 U.S.C. § 2707 (Stored Communications Act). Id. “The Senate [and House] Committee Report[s] summarizing [section] 2707, the parallel section for liability for intercepting stored communications, specifically state[] that the word ‘entity’ includes governmental entities.” Id.; see also S. Rep. No. 99-541, at 43 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3597; H.R. Rep. No. 99-647 at 74 (1986). If ECPA’s addition of the word “entity” to section 2707 included “governmental entities,” Kidane posits that the same must be true for ECPA’s addition of the same language to section 2520. The 2001 amendment to section 2520 contained in the PATRIOT Act, likewise, supports the conclusion that at least some governmental entities are subject to suit for violating at least certain provisions of the Wiretap Act. The addition of the phrase “other than the United States” as a modifier of the word “entity” in section 2520(a) confirms that “entity” must cover some governmental bodies. See Garza, 639 F. Supp. 2d at 775; Williams, 393 F. Supp. 2d at 1132; Huber, 594 S.E.2d at 407. Although “[w]hat limited legislative history exists is silent on the addition of this language,” Williams, 393 F. Supp. 2d at 1132-33, the phrase “other than the United States” would have been unnecessary unless Congress understood the preceding term “entity” otherwise to encompass governmental entities. See id.; Garza, 639 F. Supp. 2d at 775; Huber, 594 S.E.2d at 407. For these reasons, the Court does not doubt that the term “entity,” as used in section 2520, refers to at least some governmental entities for some purposes. See also Seitz v. City of Elgin, 719 F.3d 654, 657–60 (7th Cir. 2013) (“The plain meaning of ‘entity’ includes government units.”). But that does not answer the question whether Congress intended to expose those entities to suits for violations of section 2511(1)(a) in particular, as opposed to suits for 10 violations of other prohibitions in the Wiretap Act. Many courts considering claims against local governments have assumed the former, without elaboration. 3 But, as explained above, the plain language of section 2511(1)(a) applies only to “persons,” and that phrase is defined in a manner that does not include governmental entities. The courts that hold that the amendments to section 2520 permit a civil action against local governmental entities for a violation of section 2511(1) treat those amendments as implicitly amending the definition of “person” and the scope of section 2511(1). See supra n.3. That conclusion turns on the premise that the phrase “person or entity, other than the United States” makes sense only if section 2511(1) is construed to reach the conduct of governmental “entities” “other than the United States.” That is, although “[s]ection 2520 itself creates no substantive rights,” Seitz, 719 F.3d at 657, many courts assume that the amendments to section 2520 covering governmental entities can be given meaning only if they are construed to have imposed a corresponding duty on governmental entities under section 2511(1) not to unlawfully intercept, endeavor to intercept, or procure another person to intercept communications. The problem with this argument is that it is not at all difficult to give meaning to Congress’s creation of a cause of action against governmental entities other than the United States without expanding the scope of section 2511(1) or implicitly amending the statutory definition of “person” to include governmental entities. As the Seventh Circuit has explained, at the same time that Congress added the phrase “or entity” to section 2520, it also added section 2511(3)(a) to the Wiretap Act. See Seitz, 719 F.3d at 659. Like section 2511(1), that section 3 See Adams, 250 F.3d at 985–86; Garza, 639 F. Supp. 2d at 773–75; Williams, 393 F. Supp. 2d at 1132; Conner, 130 F. Supp. 2d at 1373–74; Dorris, 959 F. Supp. at 820; PBA Local No. 38, 832 F. Supp. at 823; Bodunde, 1993 WL 189941, at *3–4; Huber, 594 S.E.2d at 407. But see Seitz, 719 F.3d at 657–60. 11 prohibits specified conduct but, unlike section 2511(1), it applies to any “person or entity.” Id. (emphasis added). In particular, with certain exceptions, section 2511(3)(a) prohibits “a person or entity providing an electronic communication service to the public [from] intentionally divulg[ing] the contents of any communication . . . while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication.” 18 U.S.C. § 2511(3)(a) (emphasis added). It is thus not surprising that, at the same time that Congress added this prohibitory language to the statute, it also amended section “2520 to match the ‘person or entity’ language used in [section] 2511(3). Without that change, parties could sue a ‘person’ who violated [section] 2511(3)(a) but not an entity even though [section] 2511(3) explicitly referenced both.” 4 Seitz, 719 F.3d at 658–59 (internal footnotes and citation omitted). See also Adams v. Luzerne Cty., 36 F. Supp. 3d 511, 523 (M.D. Pa. 2014); Whitaker v. Barksdale Air Force Base, No. 14-2342, 2015 WL 574697, at *5 (W.D. La. Feb. 11, 2015); Anderson v. City of Columbus, Georgia, 374 F. Supp. 2d 1240, 1244–46 (M.D. Ga. 2005). As a result, the Court can give sections 2510(6) and 2511(1) their plain meaning, while also “giv[ing] meaning to each word of [section] 2520[(a)].” Seitz, 719 F.3d at 658. Kidane might, instead, be understood to contend that, even if Congress did not expand the scope of sections 2510(6) and 2511(1) through the amendments to section 2520, it amended section 2520 to create a cause of action against a government for substantive violations of section 2511(1) committed by individuals acting on behalf of that state—based, for example, on respondeat superior liability. Under this theory, even though a foreign government is not itself 4 Although section 2511(3)(a) addresses “person[s]” or “entit[ies]” who provide “an electronic communication service to the public,” the provision is not limited to the regulation of private enterprise. “Apparently, municipal governments have, in fact, entered or attempted to enter the telecommunications business.” Seitz, 719 F.3d at 659. 12 subject to section 2511(1), it may be vicariously liable for violations of section 2511(1) committed by its agents, who are “individuals” and thus arguably “persons” as defined in section 2510(6). This argument, however, cannot be squared with the text of the Wiretap Act for two reasons. First, section 2520 permits a party whose communications were unlawfully intercepted to “recover from the person or entity, other than the United States, which engaged in that violation.” 18 U.S.C. § 2520(1) (emphases added). Accordingly, the “person or entity” subject to suit must be the same “person or entity” that violated the statute. Second, permitting suit against a governmental entity that could not itself “engage[] in” a violation of section 2511(1) is also at odds with the statutory definition of “person” contained in section 2510(6). In that definition, Congress defined the specific types of juridical bodies capable of violating section 2511(1) to include a “partnership, association, joint stock company, trust, or corporation.” 18 U.S.C. § 2510(6). Because these entities can act only through their members, agents, officers, and employees, the definition necessarily already encompasses a concept of agent-principal or vicarious liability. To graft yet an additional theory of such liability onto section 2520 would undermine the balance that Congress struck. Cf. Cicippio-Puleo v. Islamic Republic of Iran, 353 F.3d 1024, 1036 (D.C. Cir. 2004) (declining to imply cause of action against foreign government where “the liability imposed by [28 U.S.C. § 1605(a)(7)] is precisely limited to ‘an official, employee, or agent of a foreign state designated as a state sponsor of terrorism’”). The Court, accordingly, concludes that section 2520 of the Wiretap Act does not create a civil cause of action against a foreign state for interceptions of wire, oral, or electronic communications in violation of section 2511(1), and thus GRANTS Ethiopia’s motion to dismiss Count One of the complaint. 13 B. Foreign Sovereign Immunities Act The conclusion that Congress did not create a private cause of action against foreign states for violations of section 2511(1) of the Wiretap Act does not resolve the case, because Kidane also asserts a claim based on the common law tort of intrusion upon seclusion. See Dkt. 26 ¶¶ 101–05. Under Maryland law, this tort requires “the intentional intrusion upon the solitude or seclusion of another or his private affairs or concerns [in a manner] that would be highly offensive to a reasonable person.” Pemberton v. Bethlehem Steel Corp., 502 A.2d 1101, 1116 (Md. Ct. Spec. App. 1986) (citing Restatement (Second) of Tort, § 652B (1977)). The question remains whether the FSIA bars Kidane from asserting this claim against Ethiopia. Although the FSIA was not enacted until 1976, foreign sovereign immunity dates back to the earliest days of the Republic. See Verlinden B.V. v. Central Bank of Nigeria, 461 U.S. 480, 486 (1983). Originally, the United States accorded foreign states absolute immunity from suit in its courts. See Restatement (Third) of the Foreign Relations Law of the United States, ch. 5, subch. A, intro. n. (1987 & 2016 Supp.) (“Until the twentieth century, sovereign immunity from the jurisdiction of foreign states seemed to have no exceptions.”); see also Republic of Mexico v. Hoffman, 324 U.S. 30, 35 (1945); The Schooner Exchange v. M’Faddon, 11 U.S. (7 Cranch) 116, 136–37, 146 (1812). Beginning in the 1950s, however, the United States adopted the “restrictive” theory of sovereign immunity under which “sovereign or public actions” of a state are immunized, but “private acts” are not. See Letter from Jack B. Tate, Acting Legal Adviser, U.S. Dep’t of State, to Philip B. Perlman, Acting Attorney Gen., reprinted in Alfred Dunhill of London, Inc. v. Cuba, 425 U.S. 682, 711–715 (1976). In the State Department’s view, absolute foreign sovereign immunity had become “inconsistent with the action of the Government of the United States in subjecting itself to suit in these same courts in both contract and tort,” and “the 14 widespread and increasing practice on the part of governments of engaging in commercial activities [made] necessary a practice which will enable persons doing business with them to have their rights determined in the courts.” Id. at 714. Almost a quarter-century later, Congress enacted the FSIA, which, with modest refinements, codified the restrictive theory of immunity. See Verlinden, 461 U.S. at 488. Since its enactment, the FSIA has “provide[d] the sole basis for obtaining jurisdiction over a foreign state in the courts of this country.” Argentine Republic v. Amerada Hess Shipping Corp., 488 U.S. 428, 434 (1989). The Act provides a foreign state with “‘presumptive[] immun[ity] from the jurisdiction of United States courts’ unless one of the Act’s express exceptions to sovereign immunity applies.” OBB Personenverkehr AG v. Sachs, 136 S.Ct. 390, 394 (2015) (quoting Saudi Arabia v. Nelson, 507 U.S. 349, 355 (1993)); see also 28 U.S.C. § 1604. “When one of [the] . . . specified exceptions applies,” however, “‘the foreign state [is] liable in the same manner and to the same extent as a private individual under like circumstances.’” Verlinden, 461 U.S. at 488–89 (quoting 28 U.S.C. § 1606). Kidane invokes only one exception to the FSIA—the non-commercial tort exception. See Dkt. 26 ¶ 14. That exception to sovereign immunity applies to any case “not otherwise encompassed by” the commercial-activity exception in which money damages are sought against a foreign state for personal injury or death, or damage to or loss of property, occurring in the United States and caused by the tortious act or omission of that foreign state or of any official or employee of that foreign state while acting within the scope of his office or employment. 28 U.S.C. § 1605(a)(5). There are two statutory “exceptions to the [non-commercial tort] exception,” MacArthur Area Citizens Ass’n v. Republic of Peru, 809 F.2d 918, 921 (D.C. Cir. 1987), modified in other respects by 823 F.2d 606 (D.C. Cir. 1987), both of which parallel 15 similar provisions in the Federal Torts Claims Act (“FTCA”). The first, known as the discretionary function exception, provides that a foreign state’s immunity is not waived with respect to “any claims based upon the exercise [of] a discretionary function.” See 28 U.S.C. § 1605(a)(5)(A). The second, known as the intentional tort exception, provides that immunity is not waived for claims alleging specified intentional torts, including “misrepresentation” and “deceit.” See id. § 1605(a)(5)(B). Ethiopia contends that the non-commercial tort exception to immunity is inapplicable for four reasons: First, it argues that the complaint fails to identify any tortious conduct engaged in by an agent of Ethiopia while in the United States and that the tort, therefore, did not “occur[] in the United States” within the meaning of the exception. Second, it contends that, even if taken as true, Kidane’s allegations involve the type of conduct “grounded in social, economic, and political policy” that the discretionary function exception immunizes from suit. See United States v. Varig Airlines, 467 U.S. 797, 814 (1984). Third, it maintains that the alleged surreptitious infection of Kidane’s computer involves “misrepresentation” and “deceit” and that the intentional tort exception to the non-commercial tort exception therefore applies. Finally, it argues that Kidane has not alleged with sufficient specificity a claim for “money damages . . . for personal injury,” as required to fall within the non-commercial tort exception. As explained below, although the Court is unconvinced by three of Ethiopia’s arguments, it agrees that Kidane’s claim for intrusion upon his seclusion is barred by sovereign immunity because the “entire tort” was not committed in the United States. 1. The Personal Injury Requirement and the Intentional Tort Exception The Court disposes of Ethiopia’s third and fourth contentions first, as they require only brief discussion. According to Ethiopia, Kidane’s claim for intrusion upon seclusion does not 16 seek “money damages . . . for personal injury” as required to invoke the non-commercial tort exception because the operative complaint contains only a conclusory allegation that Kidane suffered “emotional distress” as a result of Ethiopia’s alleged surveillance. Dkt. 27-2 at 23. Ethiopia stresses that Kidane’s original complaint did not include this allegation and argues that the amended complaint’s addition of the “bald assertion that [Kidane] suffered personal injury or emotional distress” does not clear the pleading hurdle established in Ashcroft v. Iqbal, 556 U.S. 662 (2009), and Bell Atlantic Corp. v. Twombly, 550 U.S. 544 (2007). Dkt. 27-2 at 23. The Court disagrees. Iqbal and Twombly require only that a plaintiff allege a claim with sufficient factual specificity that it is “plausible on its face.” Iqbal, 556 U.S. at 678 (quoting Twombly, 550 U.S. at 570). Here, it is certainly plausible that an asylee would suffer emotional distress upon learning that the foreign state from which he fled was surreptitiously intercepting and recording his (and his family’s) Skype calls, email communications, and web searches. Dkt. 26 ¶ 4. And the fact that Kidane did not allege that he suffered emotional distress in his original complaint does not mean that the allegation of emotional distress included in his amended complaint should be greeted with skepticism, as Ethiopia suggests. Rather, at this stage of the proceeding, and in light of the fact that Ethiopia has not introduced any controverting evidence, the Court must take all plausible allegations contained in the operative complaint as true. See Gordon, 778 F.3d at 163–64; Price, 294 F.3d at 93. Ethiopia’s contention that it is immune from liability for its alleged intrusion upon Kidane’s intrusion under the intentional tort exception is equally flawed. See Dkt. 27-2 at 13. The intentional tort exception renders the non-commercial tort exception inapplicable to claims “arising out of malicious prosecution, abuse of process, libel, slander, misrepresentation, deceit, or interference with contract rights.” 28 U.S.C. § 1605(a)(5)(B). It is true that Kidane alleges 17 that Ethiopia used trickery to place the FinSpy malware on his computer. But neither misrepresentation nor deceit is an element of the tort of intrusion upon seclusion under Maryland law. See Pemberton, 502 A.2d at 1116. It is the unreasonable invasion of a plaintiff’s privacy that forms the core of the tort, and privacy torts are not among those enumerated in the intentional tort proviso to the non-commercial tort exception. See 28 U.S.C. § 1605(a)(5)(B). “Where Congress explicitly enumerates certain exceptions to a general prohibition, additional exceptions are not to be implied, in the absence of evidence of a contrary legislative intent.” Andrus v. Glover Const. Co., 446 U.S. 608, 616–17 (1980). The omission of privacy torts from the intentional tort exception to the non-commercial tort exception is thus dispositive. The D.C. Circuit reached precisely this conclusion in a decision interpreting the FTCA’s analogous intentional tort exception. See Black v. Sheraton Corp. of Am., 564 F.2d 531, 539 (D.C. Cir. 1977) (interpreting 28 U.S.C. § 2680). In that case, a lobbyist affiliated with Bobby Baker, a long-time advisor to Lyndon Johnson, brought suit alleging that the government had illegally eavesdropped on his conversations by installing a microphone in the wall of his hotel room. Id. at 534–35. Rejecting an argument similar to Ethiopia’s, the Court of Appeals held that “because invasion of privacy does not fall within an enumerated [intentional tort] exemption [in the FTCA], such a claim is not barred by the doctrine of governmental immunity.” Id. at 539 n.3; see also Cruikshank v. United States, 431 F. Supp. 1355 (D. Haw. 1977). That same conclusion applies with equal force in the present context. Kidane’s intrusion upon seclusion claim is not among the enumerated intentional torts that fall outside the non-commercial tort exception. And the mere fact that the allegedly illegal surveillance was conducted surreptitiously is insufficient to bar his claim. 18 2. Whether the Tort “Occur[ed] in the United States” Whether the alleged intrusion upon Kidane’s intrusion “occur[ed] in the United States” within the meaning of the non-commercial tort exception is a much closer question. Although it is well-settled that the non-commercial tort exception “covers only torts occurring within the territorial jurisdiction of the United States,” Amerada Hess Shipping Corp., 488 U.S. at 441, it is unclear how that rule applies to the instant case, in which the alleged intrusion involves the infiltration of Kidane’s computer located at his home in Maryland, yet no agent or employee of Ethiopia is alleged to have ever set foot in the United States in connection with that tort. On its face, the non-commercial tort exception merely asks whether the suit is for “money damages . . . for personal injury or death, or damage to or loss of property, occurring in the United States and caused by the tortious act or omission of that foreign state or of any official or employee of that foreign state.” 28 U.S.C. § 1605(a)(5) (emphasis added). Courts, however, have repeatedly interpreted the phrase “occurring within the United States” to mean that the “entire tort” must have occurred in the United States. See, e.g., Jerez v. Republic of Cuba, 775 F.3d 419, 424 (D.C. Cir. 2014); Asociacion de Reclamantes v. United Mexican States, 735 F.2d 1517, 1525 (D.C. Cir. 1984); O’Bryan v. Holy See, 556 F.3d 361, 382 (6th Cir. 2009); Von Dardel v. USSR, 736 F. Supp. 1, 7 (D.D.C. 1990). Under these cases, the fact that the plaintiff incurred an injury in the United States, or that the “alleged tort may have had effects in the United States,” is insufficient to waive sovereign immunity. Amerada Hess Shipping Corp., 488 U.S. at 441 (emphasis added). Rather, “not only the injury but also the act precipitating that injury . . . must occur in the United States.” Jerez, 775 F.3d at 424; see also Persinger v. Islamic Republic of Iran, 729 F.2d 835, 842 (D.C. Cir. 1984) (“[B]oth the tort and the injury must occur in the United States.”). 19 As other courts have explained, this conclusion follows from both the text and legislative history of the FSIA. As a textual matter, the language of the non-commercial tort exception, which includes the “occurring in the United States” requirement, stands in marked contrast to the language of the commercial tort exception, which applies to conduct “‘outside the territory of the United States’ having a ‘direct effect’ inside the United States.” Amerada Hess Shipping Corp., 488 U.S. at 441 (quoting 28 U.S.C. § 1605(a)(2)). 5 And the legislative history confirms that the non-commercial tort exception applies only to torts occurring in the United States. “Congress’ primary purpose in enacting [section] 1605(a)(5) was to eliminate a foreign state’s immunity for traffic accidents and other torts committed in the United States, for which liability is imposed under domestic tort law.” Id. at 439–40 (emphasis added). Both the committee reports and the proponents of the legislation repeatedly emphasized that liability would be limited to torts committed within the United States. See H.R. Rep. No. 94-1487, at 21, reprinted in 1976 U.S.C.C.A.N. 6604 (“[T]he tortious act or omission must occur within the jurisdiction of the United States.”); S. Rep. No. 94-1310, at 20 (1976) (same); Hearing on H.R. 3493 Before the Subcomm. on Claims & Gov’t Relations of the H. Comm. on the Judiciary, 93d Cong., at 21 (1973) (“1973 Hearing”) (statement of Charles N. Brower, Acting Legal Adviser, Dep’t of State) (although “cast in general terms,” the exception was “directed primarily to the problem of traffic accidents,” and was intended to apply only to tort claims where “the negligent or wrongful act 5 Neither party cites any decisions applying the FSIA’s non-commercial tort exception to torts facilitated by the Internet and directed from abroad. At least one court has held that the FSIA’s commercial tort exception, 28 U.S.C. § 1605(a)(2), waives sovereign immunity for acts perpetrated over the Internet by a foreign state. See CYBERsitter, LLC v. P.R.C., 805 F. Supp. 2d 958, 975 (C.D. Cal. 2011) (holding that claims based on the misappropriation of plaintiff’s software and its placement on the foreign state’s website fell within the commercial tort exception). But decisions applying the commercial tort exception are inapplicable here because, as explained above, that exception applies to claims based on an extraterritorial act that “causes a direct effect in the United States.” 28 U.S.C. § 1605(a)(2) (emphasis added). 20 took place in the United States”); see also 1973 Hearing at 34 (letter from Richard G. Kleindienst, Attorney Gen., & William P. Rogers, Sec’y of State); 1973 Hearing at 42 (section- by-section analysis). Here, it is undisputed that the alleged injury to Kidane occurred in the United States. Ethiopia and Kidane propound very different theories, however, regarding where the allegedly tortious act or acts occurred, each of which has some merit and neither of which wholly resolves the question. According to Ethiopia, accepting the allegations of the complaint as true, “the acts underlying the tort, as distinct from their alleged injurious effect, occurred overseas.” Dkt. 27-2 at 16 (emphases added). Ethiopia focuses on the fact that “[t]he actors who committed the alleged tort, according to Plaintiff, were operating in Ethiopia, the computer servers were located in Ethiopia, the spyware was maintained in Ethiopia, the commands came from Ethiopia, and Plaintiff’s materials were viewed in Ethiopia.” Dkt. 27-2 at 11; see also id. at 9–11. In its view, “inasmuch as both the acts and intent occurred overseas, the two alleged intentional torts have their situs overseas and therefore, by definition did not occur entirely in the United States.” Id. at 17. Thus, according to Ethiopia, the location of the alleged tort—or at least a substantial portion of it—was overseas because all of the alleged tortfeasors were located overseas and it is their extraterritorial conduct that allegedly precipitated Kidane’s injury. Although not without some force, this argument is incomplete because it fails to grapple with the modern world in which the Internet breaks down traditional conceptions of physical presence. Thus, while the Congress that enacted the FSIA in 1976 envisioned the paradigmatic case for liability as involving an embassy employee who causes an automobile accident while on official business in the United States, see, e.g., H.R. Rep. No. 94-1487, at 29, we now live in an 21 age where, according to press reports, it is possible to hack remotely into a car’s electronics and to cause the same crash from thousands of miles away. 6 Here, as Kidane points out, Ethiopia’s alleged surveillance would fall squarely within the “entire tort” rule had it sent a “flesh-and- blood agent into [Kidane’s] house to install a recording device.” Dkt. 28 at 27. Technology has simply rendered the human agent obsolete. Kidane’s theory of where the tortious conduct occurred, in contrast, focuses not on the physical location of the tortfeasor, but on the elements of the state law cause of action, asserting that “every element of the asserted claim occurred in the United States—from the installation of spyware on a U.S. computer, to the interception of electronic communications.” Dkt. 28 at 23. As Kidane correctly points out, under Maryland law, “the gravamen of the tort [of intrusion upon seclusion] is the intrusion into a private place or the invasion of a private seclusion that the plaintiff has thrown about his person or affairs.” Dkt. 28 at 24 (quoting New Summit Assocs. Ltd. P’ship v. Nistle, 533 A.2d 1350, 1354 (Md. Ct. Spec. App. 1987)). A plaintiff, moreover, need not allege that a physical trespass occurred to state a claim for intrusion upon seclusion. See Pearson v. Dodd, 410 F.2d 701, 704 (D.C. Cir. 1969). And, although no decision from the Maryland courts has addressed the issue to date, the Court can assume for present purposes that the mere “tapping” or “bugging” of personal communications is sufficient to state a claim, even if no one ever listens to the plaintiff’s communications. See Hamberger v. Eastman, 206 A.2d 239, 242 (N.H. 1964) (rejecting contention that plaintiffs failed to state a claim for intrusion upon seclusion because “there are no allegations that anyone listened or overheard sounds or 6 See New York Times Bits Blog, Security Researchers Find A Way To Hack Cars (July 21, 2015), available at http://bits.blogs.nytimes.com//2015/07/21/security-researchers-find-a-way- to-hack-cars/. 22 voices originating from plaintiffs’ bedroom”); New Summit Assocs. Ltd. P’ship, 533 A.2d at 1354 (“[P]laintiff was not required to prove that a particular individual actually observed her” through peephole); Pearson, 410 F.2d at 704 & nn.10 & 14 (citing Hamberger with approval and stating that “[t]he tort is completed with the obtaining of the information by improperly intrusive means”). 7 The question for the factfinder, then, is simply whether the defendant intentionally intruded “upon the solitude or seclusion of another or his private affairs or concerns” in a manner that “would be highly offensive to a reasonable person.” Restatement (Second) of Torts § 652B. Neither the text of the FSIA nor existing case law clearly resolves whether Ethiopia or Kidane’s conception of where the alleged tort occurred for purposes of the non-commercial tort exception is correct, and the question is a close one. Three considerations, however, convince the Court that Ethiopia’s view is more compelling: First, the question of where the “entire tort” occurred cannot be wholly divorced from the physical location of the tortfeasors. Kidane stresses that the tort of intrusion upon seclusion does not require that he prove that Ethiopia ever transferred information from his computer to a computer located in Ethiopia or that anyone in Ethiopia—or anywhere else—actually listened to or read his communications; all that was required was that Ethiopia took control of his computer and caused that computer to make illicit copies of the relevant communications. But that view of where the tort occurred ignores the fact that all of the acts by Ethiopia or its agents that allegedly precipitated the tort occurred outside the United States. Jerez, 775 F.3d at 424. The complaint does not suggest that the email containing the malware was prepared in the United States or that 7 But see Marks v. Bell Tel. Co. of Pennsylvania, 331 A.2d 424, 431 (Pa. 1975) (“In the absence of an overhearing of a private communication, this tort has not been committed.”); LeCrone v. Ohio Bell Tel. Co., 201 N.E.2d 533, 538 (Ohio Ct. App. 1963) (“[I]n our opinion, the only possible act which could constitute an invasion in the present case is the eavesdropping itself, and the connection or tap here constitutes only a preparation for that invasion of privacy.”). 23 it was sent from within the United States. And, as Ethiopia notes, Kidane does not even allege that anyone acting on behalf of Ethiopia purposefully sent the email to him or to anyone else in the United States; rather, the translation attached to the complaint suggests that the email may have been sent to someone in London, who forwarded it (directly or through others) to Kidane in the United States. Dkt. 26 ¶ 5 & Ex. C. Kidane, moreover, fails to identify any case applying the non-commercial tort exception to circumstances, like those alleged here, where the precipitating acts of the relevant tortfeasor occurred outside the United States. And, although it is also true that no decision has rejected application of the exception in circumstances like those alleged here, courts have at least hinted that the “entire tort” requirement is not satisfied where actions taken outside the United States precipitate events in the United States. Cf. O’Bryan, 556 F.3d at 370, 385 (declining to apply non-commercial tort exception to claims attacking a policy against reporting sexual abuse, where the sexual abuse occurred in the United States, but the policy was “presumably” promulgated abroad); Olsen v. Gov’t of Mexico, 729 F.2d 641, 644, 646 (9th Cir. 1984) (rejecting Mexico’s claim of immunity based on fact that airplane was maintained outside the United States where “one entire tort . . .—the negligent piloting of the aircraft—. . . occurred in the United States”). In Kidane’s view, little turns on the fact that all of the acts of the alleged tortfeasors occurred overseas. He argues that the D.C. Circuit applies an “essential locus” test, requiring only that “the injury and the act that proximately causes that injury” occur in the United States, and that the acts taken by Ethiopia or its agents that occurred in Ethiopia were merely “collateral” to commission of the alleged tort. Dkt. 28 at 23. Under this theory, the “essential locus” of the tort is Maryland—“where [his] computer was when it was accessed and infected with spyware, and where he was when his communications were intercepted by Ethiopia’s 24 FinSpy device,” id.—and not Ethiopia—where the tort was allegedly planned and set in motion. Kidane is surely right that the mere fact that “some foreign conduct” occurred overseas is insufficient to render a sovereign immune. Dkt. 28 at 26. If that were the case, then an assassination plotted overseas but carried out on American soil would garner immunity, cf. Letelier v. Republic of Chile, 488 F. Supp. 665, 673–74 (D.D.C. 1980), and “foreign states [would be encouraged] to allege that some tortious conduct occurred outside the United States,” Olsen, 729 F.2d at 646. But, even assuming that the acts that allegedly occurred in Ethiopia were merely “collateral” to the commandeering of Kidane’s computer, the Court is unconvinced that the D.C. Circuit has adopted an “essential locus” test. Kidane bases his “essential locus” argument solely on the D.C. Circuit’s decision in Asociacion de Reclamantes v. United Mexican States. In that case, the Court held that Mexico was immune from a suit challenging its failure to compensate its citizens for land claims it assumed under a treaty with the United States, because the allegedly tortious failure to compensate occurred outside the United States. 735 F.2d at 1524–25. Kidane correctly notes that the Court of Appeals wrote that “[e]ven if the allegedly tortious failure to compensate had the effect of retroactively rendering the prior acts [of entering the treaty] on United States soil tortious, at the very least the entire tort would not have occurred here, and indeed we think its essential locus would remain Mexico.” Reclamantes, 735 F.2d at 1525 (emphasis added). That assertion, however, came only after the Court had already concluded that “the entire tort would not have occurred here,” and after it cited with approval the assertion in In re Sedco, Inc. that “the tort, in whole, must occur in the United States.” Id. (quoting In re Sedco, Inc., 543 F. Supp. 561, 567 (S.D. Tex. 1982)) (emphasis added). The Court’s reference to the “essential locus” of the tort, accordingly, was at most an alternative, a fortioiri holding. Any 25 doubt regarding this reading of Reclamantes, moreover, is put to rest by subsequent decisions in this jurisdiction that have treated Reclamantes as establishing the “clear” rule that “the entire tort” must occur in the United States. See Jerez, 775 F.3d at 424; Von Dardel, 736 F. Supp. at 7; see also O’Bryan, 556 F.3d at 382. A more recent decision from the D.C. Circuit is arguably more on point, although the Court is also unpersuaded that it vindicates Kidane’s position. In Jerez v. Republic of Cuba, the plaintiff sought to recover for torture that the Cuban government allegedly inflicted upon him while incarcerated in Cuba, including injecting him with the hepatitis C virus. 775 F.3d at 421. The district court held that Cuba was immune from suit because the “alleged tort . . . occurred in Cuba,” and because “none of the defendants . . . was within the United States.” Id. at 424. On appeal, Jerez argued that “the virus continue[d] to replicate in his body” after he arrived in the United States, and that each replication of the virus constituted a separate tort. Id. The D.C. Circuit rejected that argument, holding that the tort occurred in Cuba where Jerez was infected, and that the replication of the virus in the United States merely constituted an ongoing injury— and not a series of new torts. Id. But the Court went on to discuss, albeit briefly, how the “entire tort” rule might apply to torts precipitated by acts taken overseas that otherwise occur entirely in the United States. In particular, Jerez argued that his claim was analogous to a claim based on “a foreign agent’s delivery into the United States of an anthrax package or a bomb.” Id.; see also Br. for Appellant, at 25, Jerez v. Republic of Cuba, 775 F.3d 419 (No. 13-7141), 2014 WL 1713091 (positing hypothetical of anthrax “package that was mailed from abroad”). In response, the Court of Appeals drew a distinction between Jerez’s case, in which Cuba’s alleged “infliction of injury on Jerez occurred entirely in Cuba,” and Jerez’s hypotheticals, where “the infliction of injury by the hypothetical anthrax package or bomb would occur entirely in the United States.” 26 775 F.3d at 424. Although the hypothetical of an anthrax package or bomb mailed from outside the United States is arguably analogous to the sending of malware that infected a computer located in the United States, the Court is leery of reading Jerez to provide substantial guidance regarding the application of the non-commercial tort exception to torts committed remotely. Most notably, that is not what was at issue in Jerez; to the contrary, the Court of Appeals unambiguously held that the alleged tort “occurred entirely in Cuba,” where Jerez was infected with the hepatitis C virus. Id. at 421. The fact that the Court went on to distinguish Jerez’s hypotheticals on the ground that “the infliction of injury” in the hypothetical occurred entirely in the United States was thus dicta. But, even beyond that, the Court did not conclude that the hypothetical tort would have occurred entirely within the United States, but only that, unlike in Jerez’s case, the “injury” would have been “inflicted” in the United States. Id. Second, to the extent that it is uncertain whether Congress intended to permit suit in U.S. courts for torts precipitated from abroad, the D.C. Circuit has cautioned against converting the non-commercial tort exception “into a broad exception for all alleged torts that bear some relationship to the United States.” Reclamantes, 735 F.2d at 1525. To be sure, the fact that Congress focused on traffic accidents committed by “officials and employees of foreign sovereigns” while “in this country” does not define the full scope of the non-commercial tort exception. Id. But it does convey something about the types of tortious conduct that Congress had in mind when it enacted the exception, and the instant allegations are far afield from that paradigmatic case. Id. The Court, moreover, must proceed cautiously where application of the exception would arguably shift the balance that Congress struck between the desire to afford members of the public a remedy for torts committed in the United States by foreign employees 27 and officials and the interest in maintaining comity with foreign states. Applying the exception to torts precipitated exclusively beyond the borders of the United States—by tortfeasors who neither set foot in this Country nor directly caused a tort to be committed here—implicates that balance. As the D.C. Circuit observed in a different context, “[i]f Congress had meant to remove sovereign immunity for governments acting on their own territory, with all of the potential for international discord and for foreign government retaliation that that involves, it is hardly likely that Congress would have ignored those topics and discussed instead automobile accidents in this country.” Persinger, 729 F.2d at 841. Put differently, the question whether to afford a foreign state immunity from suit inherently involves a political judgment, raising sensitive issues of foreign relations. When Congress enacted the FSIA, it decided to leave it to the courts to apply the rules that the Executive Branch had adopted over many years and that Congress had, with minor adjustment, embodied in the FSIA. But, at the same time, it did not confer common law authority on the courts to adjust the rules of foreign sovereign immunity to new and unanticipated events that might arise. To the contrary, the FSIA starts from the premise that foreign states are entitled to immunity, and then carves out limited—and specific—exceptions to that rule. See 1973 Hearing at 21 (statement of Charles N. Brower, Acting Legal Adviser, Dep’t of State). To the extent that the present dispute seeks to open the door to a new and previously unrecognized class of cases against foreign states made possible by technological changes, that type of judgment is better left to Congress, which has, in fact, amended the FSIA in recent years to address evolving threats— most notably, the emergence of state-sponsored terrorism. See Pub. L. No. 110-181, Div. A, Title X, § 1083(a)(1), 122 Stat. 338 (2008) (codified at 28 U.S.C. § 1605A (2012)). Third, and finally, the legislative history of the non-commercial tort exception, although 28 limited, provides additional support for the conclusion that Congress did not intend to reach torts precipitated by the actions of tortfeasors outside the United States. One of the primary goals of the FSIA to bring U.S. rules of foreign sovereign immunity in line with the practices of other nations, and, in particular, to subject foreign states that commit torts in the United States to the same rules of immunity applied against the United States abroad. See Hearings on H.R. 11,315 Before the Subcomm. on Admin. Law & Gov’t Relations of the H. Comm. on the Judiciary, 94th Cong. 29 (1976) (“1976 Hearing”); 1973 Hearing at 29. Prior to enactment of the FSIA, the United States was often subject to tort suits—most often in Europe—alleging claims that could not be brought against foreign states in U.S. courts. See S. Rep. No. 94-1310, at 10–11 (1976). As explained during the hearings on the FSIA, “almost all countries in Western Europe [had come to] follow[] the restrictive theory of sovereign immunity, and permitted . . . suit against the United States in contract and in tort where the necessary contacts with the forum were present.” 1976 Hearings at 32 (statement of Bruno Ristau, Chief, Foreign Litigation Section, Civil Division, Dep’t of Justice). The non-commercial tort exception, accordingly, can be understood to permit suit against foreign states for torts committed in the United States “to the same extent that the United States [was] subject to suit in most foreign countries.” Id. at 29. This same legislative history also reflects an understanding of the European model that Congress sought to mirror. In particular, the legislative record included a copy of the European Convention on State Immunity, which was scheduled to “come into force” roughly a week later. 1976 Hearing at 37. When asked at a hearing whether there was “any inconsistency between that new convention and th[e] bill” that became the FSIA, the Legal Advisor to the State Department answered “no,” with the sole qualification that the FSIA went “somewhat further” regarding the execution of judgments against foreign states. Id. The relevant provision of the European 29 Convention on State Immunity provided: A Contracting State cannot claim immunity from the jurisdiction of a court of another Contracting State in proceedings which relate to redress for injury to the person or damage to tangible property, if the facts which occasioned the injury or damage occurred in the territory of the State of the forum, and if the author or the injury or damage was present in that territory at the time when those acts occurred. Article 11, European Convention on State Immunity, reprinted in 1976 Hearings 39 (emphasis added); see also 1973 Hearing at 32 (referring to proposed convention). The non-commercial tort exception thus sought to parallel the European waiver of sovereign immunity, which required the tortfeasor’s physical presence in the jurisdiction of suit. For the foregoing reasons, the Court holds that Kidane’s claim for intrusion upon seclusion is barred by the “entire tort” rule. The political branches may ultimately deem it advisable to permit suits against foreign sovereigns who, without setting foot on American soil, use technology to commit torts against persons located here. But “[i]f the [FSIA] is to be altered, that is a function for the same body that adopted it.” Black, 564 F.2d at 539 (interpreting FTCA). Absent further action by Congress, any remedy for such alleged misconduct must take place at a diplomatic level. 3. The Discretionary Function Exception Although the Court has already concluded that both of Kidane’s claims must be dismissed, given the likelihood that its decision will be appealed and in the interest of judicial efficiency, the Court will also address Ethiopia’s final argument why the FSIA bars this action— an argument that is substantial, if ultimately unpersuasive. In particular, Ethiopia argues that the FSIA’s discretionary function exception bars Kidane’s claim because the alleged conduct “involve[s] an element of choice” and is exactly the kind of “quintessentially political” decision, Dkt. 27-2 at 20, that the exception was designed to shield. The Court disagrees. 30 The FSIA’s discretionary function exception bars a claim that would otherwise fall within the non-commercial tort exception if it is “based upon the exercise or performance or the failure to exercise or perform a discretionary function[,] regardless of whether the discretion be abused.” 28 U.S.C. § 1605(a)(5)(A). As the D.C. Circuit has explained, the FSIA’s discretionary function exception is “analogous” to the FTCA’s similar exception. See MacArthur Area Citizens Ass’n, 809 F.2d at 922. The D.C. Circuit follows a two-part test in determining whether governmental conduct is shielded as discretionary. Under that test, a court first asks “whether any statute, regulation, or policy specifically prescribes a course of action for an employee to follow.” Banneker Ventures, LLC v. Graham, 798 F.3d 1119, 1143 (D.C. Cir. 2015). If the employee was following such a policy, his conduct was non-discretionary and subject to liability. Id. Second, if the tortfeasor’s conduct was not directed by some statute or policy, but instead was the result of discretion, the court asks if “the exercise of discretion [was] grounded in social, economic, or political goals,” thus making it “an exercise of governmental judgment and so immune.” Id. Ethiopia argues that its conduct falls under the second of these prongs. In its view, because the act of spying on individuals living abroad is a “quintessentially political” one, Dkt. 27-2 at 20, the FSIA’s discretionary function exception shields such conduct from suit. Kidane, for his part, argues that a corollary rule to the discretionary function exception makes clear that the alleged conduct falls outside the exception. See Dkt. 28 at 31–32. The Supreme Court has long held that when a U.S. official acts outside a grant of discretionary authority, “there will be no shelter from liability because there is no room for choice and the action will be contrary to policy.” See United States v. Gaubert, 499 U.S. 315, 324 (1991). As the D.C. Circuit has explained this rule, “[a] government official has no discretion to violate the binding laws, regulations, or policies that define the extent of his official powers.” Red Lake Band of 31 Chippewa Indians v. United States, 800 F.2d 1178, 1196 (D.C. Cir. 1986). Most courts that have considered the issue have therefore concluded that the FTCA’s discretionary function exception does not shield acts barred by statute, regulation, or policy—that is, the exception does not apply to illegal acts. See Banneker Ventures, 798 F.3d at 1143 (holding that there is “no difference between a prescription by policy that leaves no room for choice and a proscription that does the same”); cf. Castro v. United States, 608 F.3d 266, 271 n.1 (5th Cir. 2010) (en banc) (Stewart, J., dissenting) (collecting cases). Pursuant to this rule, courts have concluded, for instance, that the FTCA’s discretionary function exception does not shield government officials who unlawfully open private mail. See Birnbaum v. United States, 588 F.2d 319, 329 (2d Cir. 1978); Cruikshank, 431 F. Supp. at 1359. Kidane argues that because Ethiopia’s conduct would have violated U.S. criminal law— indeed, would have been a “serious felon[y] under federal law,” Dkt. 28 at 31–32—it cannot be protected by the FSIA’s discretionary function exception. There is little discussion in the caselaw, however, about how the rule limiting the FTCA’s discretionary function exception to the acts of an officer acting within “the extent of his official powers,” see Red Lake, 800 F.2d at 1196, applies in the context of the FSIA’s analogous exception. The central inquiry under the FTCA’s discretionary function exception is which statute, rule, or policy permitted the relevant U.S. official to exercise “policy judgment”—that is, which rule defines and limits that official’s “official powers.” See Dalehite v. United States, 346 U.S. 15, 36 (1953). But it is less clear how courts should go about identifying such rules when assessing the “discretion” of foreign officials, not U.S. officials, to act. Should courts look to U.S. law or to international law? Cf. Letelier, 588 F. Supp. at 675 (considering “both national and international law”). Is the law of the foreign 32 country relevant? Cf. Liu v. Republic of China, 892 F.2d 1419, 1431 (9th Cir. 1989) (concluding that it is). Not surprisingly, Ethiopia argues for the broadest interpretation of the scope of the exception. Citing this Court’s decision in Letelier, 588 F. Supp. 655, it contends that the “legality of the [foreign state’s] activity [under U.S. law] is not the test, but rather whether the activity violates universal norms, such as murder and torture.” Dkt. 29 at 16. But Letelier did not hold any such thing. The question in that case was whether Chile’s assassination of a U.S.- based diplomat was shielded by the FSIA’s discretionary function exception. The Court held that it was not, explaining that foreign officials lack “discretion” within the meaning of the FSIA to commit any acts that are “clearly contrary to the precepts of humanity as recognized in both national and international law.” 488 F. Supp. at 675. The Court said nothing, however, about whether foreign officials have the “discretion” to commit less serious offenses, or, indeed, about whether the ultimate touchstone is “national” or “international” law. Cf. Curtis A. Bradley & Jack L. Goldsmith, Pinochet and International Human Rights Litigation, 97 Mich. L. Rev. 2129, 2154–55 (1999) (criticizing Letelier’s reliance on international law). Yet, other than Letelier, Ethiopia offers no authority to support its proposed interpretation of the discretionary function exception. That interpretation, moreover, would render foreign sovereigns immune from dramatically more suits under the FSIA than the United States is under the FTCA, and is thus at odds with Congress’s goal of “plac[ing] foreign states in the same position before the United States courts as is the United States itself” when sued under the FTCA. Restatement (Third) of the Foreign Relations Law of the United States § 454 n.3. The Court also rejects Ethiopia’s contention that Ethiopian law should govern the scope of the FSIA’s discretionary function exception. As a threshold matter, it is not clear why 33 Congress would have intended the analysis in an FSIA suit to turn on the meaning of foreign law—an analysis that both the Court and the parties (or at least the plaintiff) are poorly positioned to perform. Cf. Liu, 892 F.2d at 1431–32. Even if it were practical for the Court to conduct such an inquiry, moreover, treating foreign law as central to the analysis would run contrary to Congress’s intent to place the United States and foreign states on similar footing in U.S. courts. Such an approach would also seem to reward foreign states for adopting rules permitting or encouraging tortious activity in the United States—a purpose that it is difficult to ascribe to Congress. Perhaps most significantly, a focus on foreign authority to act would at least at times require U.S. courts—including state courts, which are also charged with applying the FSIA, see 28 U.S.C. § 1605(a)—to “launch[] inquiries into the type of governments that obtain in particular foreign nations,” whether particular foreign actions are grounded in law or “are merely [actions] turning upon the whim or caprice of government officials, whether the representation of consuls, ambassadors, and other representatives of foreign nations is credible or made in good faith,” and whether particular foreign officials were acting with the implicit or explicit authorization of their superiors. See Zschernig v. Miller, 389 U.S. 429, 434 (1968). Such a construction of the Act, in other words, could raise distinct foreign relations concerns going far beyond those already inherent in subjecting foreign states to suit. Instead, the Court concludes that, in creating a discretionary function exception under the FSIA, Congress did not mean to shield “discretionary” acts by foreign states when those acts involve serious violations of U.S. criminal law. Such a reading of the exception is consistent with the D.C. Circuit’s sole opinion touching upon this question, MacArthur Area Citizens Association v. Republic of Peru, 809 F.2d 918. In that case, a Washington, D.C. neighborhood association sued Peru for converting a local building, which had been zoned for residential use, 34 into its chancery. See id. at 919. Among other questions, the case turned on whether the discretionary function exception barred the suit. Id. at 921–23. In rejecting the plaintiffs’ contention that “Peru’s acts [we]re criminal and thus [could] not be discretionary,” the Court of Appeals acknowledged that “case law buttresses the proposition that a criminal act cannot be discretionary,” but concluded that Peru had not been shown to have violated any criminal law. Id. at 922 n.4. It added: [I]t is hardly clear that, even if a criminal act were shown, it would automatically prevent designation of Peru’s acts as discretionary. The cases on which appellant relies involve criminal acts of a rather different character and order. See, e.g., Letelier, 488 F. Supp. at 673 (involving “assassination of an individual or individuals, action that is clearly contrary to the precepts of humanity as recognized in both national and international law”). We think it not unduly bold to conclude that violations, if any, of a zoning ordinance do not rise to the level of actions malum in se. Id. Thus, albeit in dicta, MacArthur Area suggests that the discretionary function exception does not shield acts by foreign officials that violate federal criminal law, at least if the conduct is malum in se. 8 The Restatement provides a similar standard, suggesting that the exception should not apply to “serious criminal act[s].” Restatement (Third) of the Foreign Relations Law of the United States § 454 n.3. On the present record, the Court can neither conclude that a serious criminal act occurred nor reject the possibility that it did. Various criminal laws, including, most prominently, the 8 The D.C. Circuit also distinguished cases holding that “[a] government official has no discretion to violate the binding laws, regulations, or policies that define the scope of his official powers,” see Red Lake, 800 F.2d at 1196, on the ground that “[t]here [wa]s no indication in the record that the” Peruvian officials “were acting ultra vires.” 809 F.2d at 922 n.3. For the reasons explained above, the Court is unconvinced that the FSIA’s discretionary function exception turns on whether the foreign official was acting within the scope of her authority under foreign law in committing the alleged tort. In any event, nothing in MacArthur Area suggests that authorization under foreign law is sufficient to invoke the discretionary function exception where the conduct at issue constitutes a serious violation of U.S. criminal law. 35 Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., make computer trespass a federal crime. See S. Rep. No. 104-357, at 11 (1996) (explaining that the CFAA applies to all computer trespasses). Similarly, even though the relevant provision of the Wiretap Act does not apply to foreign states, see supra at 7–13, it does apply to the actions of “individuals,” and would arguably apply to actions committed by those employed by foreign states. Ethiopia argues that its immunity from suit under the FSIA does not depend on whether it violated these statutes, but does not argue, at this stage, that it did not do so. The Court is thus left without the necessary record upon which to draw a conclusion regarding Ethiopia’s conduct (and, accordingly, the applicability of the discretionary function exception). In light of its previous conclusion that the suit should be dismissed under the “entire tort” rule, the Court has no need to direct further briefing on these issues. It has no difficulty, however, rejecting Ethiopia’s overbroad interpretations of the scope of the discretionary function exception, and concluding that when a plaintiff alleges underlying conduct that constitutes a serious violation of a U.S. criminal statute, the FSIA’s discretionary function exception does not apply. IV. CONCLUSION For the foregoing reasons, it is hereby ORDERED that Ethiopia’s motion to dismiss, Dkt. 27, is GRANTED. The Clerk shall enter final judgment. SO ORDERED. /s/ Randolph D. Moss RANDOLPH D. MOSS United States District Judge Date: May 24, 2016 36