Binyam Mohamed v. Jeppesen Dataplan, Inc. ( 2010 )


Menu:
  •                  FOR PUBLICATION
    UNITED STATES COURT OF APPEALS
    FOR THE NINTH CIRCUIT
    BINYAM MOHAMED; ABOU ELKASSIM         
    BRITEL; AHMED AGIZA; MOHAMED
    FARAG AHMAD BASHMILAH; BISHER
    AL-RAWI,                                     No. 08-15693
    Plaintiffs-Appellants,
    v.                            D.C. No.
    5:07-CV-02798-JW
    JEPPESEN DATAPLAN, INC.,                       OPINION
    Defendant-Appellee,
    UNITED STATES OF AMERICA,
    Intervenor-Appellee.
    
    Appeal from the United States District Court
    for the Northern District of California
    James Ware, District Judge, Presiding
    Argued and Submitted En Banc
    December 15, 2009—San Francisco, California
    Filed September 8, 2010
    Before: Alex Kozinski, Chief Judge, Mary M. Schroeder,
    William C. Canby, Michael Daly Hawkins,
    Sidney R. Thomas, Raymond C. Fisher,
    Richard A. Paez, Richard C. Tallman,
    Johnnie B. Rawlinson, Consuelo M. Callahan and
    Carlos T. Bea, Circuit Judges.
    Opinion by Judge Fisher;
    Concurrence by Judge Bea;
    Dissent by Judge Hawkins
    13515
    MOHAMED v. JEPPESEN DATAPLAN          13519
    COUNSEL
    Steven M. Watt, Ben Wizner (argued), Jameel Jaffer and Ste-
    ven R. Shapiro, American Civil Liberties Union Foundation,
    New York, New York; Ann Brick and Julia Harumi Mass,
    American Civil Liberties Union Foundation of Northern Cali-
    fornia, San Francisco, California; Paul Hoffman, Schonbrun
    13520          MOHAMED v. JEPPESEN DATAPLAN
    DeSimone Seplow Harris & Hoffman LLP, Venice, Califor-
    nia; Hope Metcalf, National Litigation Project, Allard K.
    Lowenstein International Human Rights Clinic, Yale Law
    School, New Haven, Connecticut, for the plaintiffs-appellants.
    Clive Stafford-Smith and Zachary KatzNelson, Reprieve,
    London, England, for plaintiff-appellant Binyam Mohamed.
    Margaret L. Satterthwaite and Amna Akbar, International
    Human Rights Clinic, Washington Square Legal Services,
    Inc., New York, New York, for plaintiff-appellant Mohamed
    Farag Ahmad Bashmilah.
    Daniel P. Collins (argued), Paul J. Watford, Mark R. Yohalem
    and Henry Weissmann, Munger, Tolles & Olson LLP, Los
    Angeles, California, for defendant-appellee Jeppesen Data-
    plan, Inc.
    Ian Heath Gershengorn, Michael F. Hertz, Joseph P. Russon-
    iello, Douglas N. Letter (argued), Sharon Swingle and
    Michael P. Abate, United States Department of Justice, Wash-
    ington, D.C., for intervenor-appellee United States of Amer-
    ica.
    Gary Bostwick and Jean-Paul Jassy, Bostwick & Jassy LLP,
    Los Angeles, California, for amici curiae Professors William
    G. Weaver and Robert M. Pallitto.
    Barbara Moses and David J. Stankiewicz, Morvillo, Abra-
    mowitz, Grand, Iason, Anello & Bohrer, P.C., New York,
    New York; Aziz Huq and Jonathan Hafetz, Brennan Center
    for Justice at NYU School of Law, New York, New York, for
    amici curiae former United States diplomats.
    Wiliam J. Aceves, California Western School of Law, San
    Diego, California; Gerald Staberock and Carlos Lopez, Inter-
    national Commission of Jurists, Geneva, Switzerland; Carla
    Ferstman, Lorna McGregor and Lucy Moxham, REDRESS,
    MOHAMED v. JEPPESEN DATAPLAN               13521
    London, United Kingdom; Denna R. Hurwitz, Human Rights
    Program, University of Virginia School of Law, Charlottes-
    ville, Virginia, for amici curiae REDRESS and the Interna-
    tional Commission of Jurists.
    Stephen I. Vladeck, American University Washington College
    of Law, Washington, D.C.; Natalie L. Bridgeman, Law
    Offices of Natalie L. Bridgeman, San Francisco, California,
    for amici curiae professors of constitutional law, federal juris-
    diction and foreign relations law.
    Andrew G. McBride, Thomas R. McCarthy and Stephen J.
    Obermeier, Wiley Rein LLP, Washington, D.C., for amicus
    curiae Foundation for the Defense of Democracies.
    Daniel J. Popeo and Richard A. Samp, Washington Legal
    Foundation, Washington, D.C., for amici curiae Washington
    Legal Foundation and Allied Educational Foundation.
    Richard R. Wiebe, Law Office of Richard R. Wiebe, San
    Francisco, California; Cindy A. Cohn, Lee Tien, Kurt Opsahl,
    Kevin S. Bankston, Corynne Mcherry and James S. Tyre,
    Electronic Frontier Foundation, San Francisco, California, for
    amicus curiae Electronic Frontier Foundation.
    James M. Ringer, Clifford Chance US LLP, New York, New
    York, for amici curiae Commonwealth Lawyers Association
    and JUSTICE.
    OPINION
    FISHER, Circuit Judge:
    This case requires us to address the difficult balance the
    state secrets doctrine strikes between fundamental principles
    of our liberty, including justice, transparency, accountability
    13522            MOHAMED v. JEPPESEN DATAPLAN
    and national security. Although as judges we strive to honor
    all of these principles, there are times when exceptional cir-
    cumstances create an irreconcilable conflict between them.
    On those rare occasions, we are bound to follow the Supreme
    Court’s admonition that “even the most compelling necessity
    cannot overcome the claim of privilege if the court is ulti-
    mately satisfied that [state] secrets are at stake.” United States
    v. Reynolds, 
    345 U.S. 1
    , 11 (1953). After much deliberation,
    we reluctantly conclude this is such a case, and the plaintiffs’
    action must be dismissed. Accordingly, we affirm the judg-
    ment of the district court.
    I.   BACKGROUND
    We begin with the factual and procedural history relevant
    to this appeal. In doing so, we largely draw upon the three-
    judge panel’s language in Mohamed v. Jeppesen Dataplan,
    Inc., 
    579 F.3d 943
    , 949-52 (9th Cir.) (Jeppesen I), rehearing
    en banc granted, 
    586 F.3d 1108
     (9th Cir. 2009). We empha-
    size that this factual background is based only on the allega-
    tions of plaintiffs’ complaint, which at this stage in the
    litigation we construe “in the light most favorable to the plain-
    tiff[s], taking all [their] allegations as true and drawing all
    reasonable inferences from the complaint in [their] favor.”
    Doe v. United States, 
    419 F.3d 1058
    , 1062 (9th Cir. 2005).
    Whether plaintiffs’ allegations are in fact true has not been
    decided in this litigation, and, given the sensitive nature of the
    allegations, nothing we say in this opinion should be under-
    stood otherwise.
    A.     Factual Background
    1.    The Extraordinary Rendition Program
    Plaintiffs allege that the Central Intelligence Agency
    (“CIA”), working in concert with other government agencies
    and officials of foreign governments, operated an extraordi-
    nary rendition program to gather intelligence by apprehending
    MOHAMED v. JEPPESEN DATAPLAN              13523
    foreign nationals suspected of involvement in terrorist activi-
    ties and transferring them in secret to foreign countries for
    detention and interrogation by United States or foreign offi-
    cials. According to plaintiffs, this program has allowed agents
    of the U.S. government “to employ interrogation methods that
    would [otherwise have been] prohibited under federal or inter-
    national law.” Relying on documents in the public domain,
    plaintiffs, all foreign nationals, claim they were each pro-
    cessed through the extraordinary rendition program. They also
    make the following individual allegations.
    Plaintiff Ahmed Agiza, an Egyptian national who had been
    seeking asylum in Sweden, was captured by Swedish authori-
    ties, allegedly transferred to American custody and flown to
    Egypt. In Egypt, he claims he was held for five weeks “in a
    squalid, windowless, and frigid cell,” where he was “severely
    and repeatedly beaten” and subjected to electric shock
    through electrodes attached to his ear lobes, nipples and geni-
    tals. Agiza was held in detention for two and a half years,
    after which he was given a six-hour trial before a military
    court, convicted and sentenced to 15 years in Egyptian prison.
    According to plaintiffs, “[v]irtually every aspect of Agiza’s
    rendition, including his torture in Egypt, has been publicly
    acknowledged by the Swedish government.”
    Plaintiff Abou Elkassim Britel, a 40-year-old Italian citizen
    of Moroccan origin, was arrested and detained in Pakistan on
    immigration charges. After several months in Pakistani deten-
    tion, Britel was allegedly transferred to the custody of Ameri-
    can officials. These officials dressed Britel in a diaper and a
    torn t-shirt and shackled and blindfolded him for a flight to
    Morocco. Once in Morocco, he says he was detained incom-
    municado by Moroccan security services at the Temara
    prison, where he was beaten, deprived of sleep and food and
    threatened with sexual torture, including sodomy with a bottle
    and castration. After being released and re-detained, Britel
    says he was coerced into signing a false confession, convicted
    13524             MOHAMED v. JEPPESEN DATAPLAN
    of terrorism-related charges and sentenced to 15 years in a
    Moroccan prison.
    Plaintiff Binyam Mohamed, a 28-year-old Ethiopian citizen
    and legal resident of the United Kingdom, was arrested in
    Pakistan on immigration charges. Mohamed was allegedly
    flown to Morocco under conditions similar to those described
    above, where he claims he was transferred to the custody of
    Moroccan security agents. These Moroccan authorities alleg-
    edly subjected Mohamed to “severe physical and psychologi-
    cal torture,” including routinely beating him and breaking his
    bones. He says they cut him with a scalpel all over his body,
    including on his penis, and poured “hot stinging liquid” into
    the open wounds. He was blindfolded and handcuffed while
    being made “to listen to extremely loud music day and night.”
    After 18 months in Moroccan custody, Mohamed was alleg-
    edly transferred back to American custody and flown to
    Afghanistan. He claims he was detained there in a CIA “dark
    prison” where he was kept in “near permanent darkness” and
    subjected to loud noise, such as the recorded screams of
    women and children, 24 hours a day. Mohamed was fed spar-
    ingly and irregularly and in four months he lost between 40
    and 60 pounds. Eventually, Mohamed was transferred to the
    U.S. military prison at Guantanamo Bay, Cuba, where he
    remained for nearly five years. He was released and returned
    to the United Kingdom during the pendency of this appeal.1
    Plaintiff Bisher al-Rawi, a 39-year-old Iraqi citizen and
    legal resident of the United Kingdom, was arrested in Gambia
    while traveling on legitimate business. Like the other plain-
    tiffs, al-Rawi claims he was put in a diaper and shackles and
    placed on an airplane, where he was flown to Afghanistan. He
    1
    Mohamed’s allegations have been discussed in other litigation in both
    the United States and the United Kingdom. See Mohammed v. Obama, 
    689 F. Supp. 2d 38
     (D.D.C. 2009); R (Mohamed) v. Secretary of State for For-
    eign and Commonwealth Affairs, [2010] EWCA (Civ) 65 (decision of the
    United Kingdom Court of Appeal).
    MOHAMED v. JEPPESEN DATAPLAN              13525
    says he was detained in the same “dark prison” as Mohamed
    and loud noises were played 24 hours per day to deprive him
    of sleep. Al-Rawi alleges he was eventually transferred to
    Bagram Air Base, where he was “subjected to humiliation,
    degradation, and physical and psychological torture by U.S.
    officials,” including being beaten, deprived of sleep and
    threatened with death. Al-Rawi was eventually transferred to
    Guantanamo; in preparation for the flight, he says he was
    “shackled and handcuffed in excruciating pain” as a result of
    his beatings. Al-Rawi was eventually released from Guanta-
    namo and returned to the United Kingdom.
    Plaintiff Farag Ahmad Bashmilah, a 38-year-old Yemeni
    citizen, says he was apprehended by agents of the Jordanian
    government while he was visiting Jordan to assist his ailing
    mother. After a brief detention during which he was “subjec-
    t[ed] to severe physical and psychological abuse,” Bashmilah
    claims he was given over to agents of the U.S. government,
    who flew him to Afghanistan in similar fashion as the other
    plaintiffs. Once in Afghanistan, Bashmilah says he was placed
    in solitary confinement, in 24-hour darkness, where he was
    deprived of sleep and shackled in painful positions. He was
    subsequently moved to another cell where he was subjected
    to 24-hour light and loud noise. Depressed by his conditions,
    Bashmilah attempted suicide three times. Later, Bashmilah
    claims he was transferred by airplane to an unknown CIA
    “black site” prison, where he “suffered sensory manipulation
    through constant exposure to white noise, alternating with
    deafeningly loud music” and 24-hour light. Bashmilah alleges
    he was transferred once more to Yemen, where he was tried
    and convicted of a trivial crime, sentenced to time served
    abroad and released.
    2.   Jeppesen’s Alleged Involvement in the Rendition
    Program
    Plaintiffs contend that publicly available information estab-
    lishes that defendant Jeppesen Dataplan, Inc., a U.S. corpora-
    13526             MOHAMED v. JEPPESEN DATAPLAN
    tion, provided flight planning and logistical support services
    to the aircraft and crew on all of the flights transporting each
    of the five plaintiffs among the various locations where they
    were detained and allegedly subjected to torture. The com-
    plaint asserts “Jeppesen played an integral role in the forced”
    abductions and detentions and “provided direct and substan-
    tial services to the United States for its so-called ‘extraordi-
    nary rendition’ program,” thereby “enabling the clandestine
    and forcible transportation of terrorism suspects to secret
    overseas detention facilities.” It also alleges that Jeppesen
    provided this assistance with actual or constructive “knowl-
    edge of the objectives of the rendition program,” including
    knowledge that the plaintiffs “would be subjected to forced
    disappearance, detention, and torture” by U.S. and foreign
    government officials.2
    B.    Summary of the Claims
    Plaintiffs brought suit against Jeppesen under the Alien
    Tort Statute, 
    28 U.S.C. § 1350
    , alleging seven theories of lia-
    bility marshaled under two claims, one for “forced disappear-
    ance” and another for “torture and other cruel, inhuman or
    degrading treatment.” First Am. Compl. ¶¶ 253-66.
    With respect to the forced disappearance claim, plaintiffs
    assert four theories of liability: (1) direct liability for active
    participation, (2) conspiracy with agents of the United States,
    (3) aiding and abetting agents of the United States and (4)
    direct liability “because [Jeppesen] demonstrated a reckless
    disregard as to whether Plaintiffs would be subjected to
    forced disappearance through its participation in the extraor-
    dinary rendition program and specifically its provision of
    flight and logistical support services to aircraft and crew that
    it knew or reasonably should have known would be used to
    2
    Among the materials plaintiffs filed in opposition to the government’s
    motion to dismiss is a former Jeppesen employee’s declaration, which
    plaintiffs assert demonstrates this knowledge. See Dissent at 13561 n.3.
    MOHAMED v. JEPPESEN DATAPLAN               13527
    transport them to secret detention and interrogation.” Id.
    ¶¶ 254-57.
    On the torture and degrading treatment claim, plaintiffs
    assert three theories of liability: (1) conspiracy with agents of
    the U.S. in plaintiffs’ torture and degrading treatment, (2) aid-
    ing and abetting agents of the U.S. in subjecting plaintiffs to
    torture and degrading treatment and (3) direct liability “be-
    cause [Jeppesen] demonstrated a reckless disregard as to
    whether Plaintiffs would be subjected to torture or other cruel,
    inhuman, or degrading treatment by providing flight and
    logistical support to aircraft and crew it knew or reasonably
    should have known would be used in the extraordinary rendi-
    tion program to transport them to detention and interroga-
    tion.” Id. ¶¶ 262-64.
    Regarding Jeppesen’s alleged actual or constructive knowl-
    edge that its services were being used to facilitate “forced dis-
    appearance,” plaintiffs allege that Jeppesen “knew or
    reasonably should have known that the flights involved the
    transportation of terror suspects pursuant to the extraordinary
    rendition program,” that their “knowledge of the objectives of
    the rendition program” may be inferred from the fact that they
    allegedly “falsified flight plans submitted to European air traf-
    fic control authorities to avoid public scrutiny of CIA flights”
    and that a Jeppesen employee admitted actual knowledge that
    the company was performing extraordinary rendition flights
    for the U.S. government. Id. ¶¶ 16, 17, 56. Similarly, plain-
    tiffs allege that Jeppesen knew or should have known that that
    torture would result because it should have known it was car-
    rying terror suspects for the CIA and that “the governments
    of the destination countries routinely subject detainees to tor-
    ture and other forms of cruel, inhuman, or degrading treat-
    ment.” Id. ¶¶ 17, 56. They also rely on U.S. State Department
    country reports describing torture as “routine” in some of the
    countries to which plaintiffs were allegedly rendered, and
    note that Jeppesen claims on its website that it “monitors
    13528            MOHAMED v. JEPPESEN DATAPLAN
    political and security situations” as part of its trip planning
    services. Id. ¶¶ 14, 42, 56.
    C.    Procedural History
    Before Jeppesen answered the complaint, the United States
    moved to intervene and to dismiss plaintiffs’ complaint under
    the state secrets doctrine. The then-Director of the CIA, Gen-
    eral Michael Hayden, filed two declarations in support of the
    motion to dismiss, one classified, the other redacted and
    unclassified. The public declaration states that “[d]isclosure of
    the information covered by this privilege assertion reasonably
    could be expected to cause serious — and in some instances,
    exceptionally grave — damage to the national security of the
    United States and, therefore, the information should be
    excluded from any use in this case.” It further asserts that “be-
    cause highly classified information is central to the allegations
    and issues in this case, the risk is great that further litigation
    will lead to disclosures harmful to U.S. national security and,
    accordingly, this case should be dismissed.”
    The district court granted the motions to intervene and dis-
    miss and entered judgment in favor of Jeppesen, stating that
    “at the core of Plaintiffs’ case against Defendant Jeppesen are
    ‘allegations’ of covert U.S. military or CIA operations in for-
    eign countries against foreign nationals — clearly a subject
    matter which is a state secret.” Plaintiffs appealed. A three-
    judge panel of this court reversed and remanded, holding that
    the government had failed to establish a basis for dismissal
    under the state secrets doctrine but permitting the government
    to reassert the doctrine at subsequent stages of the litigation.
    Jeppesen I, 
    579 F.3d at 953, 961-62
    . We took the case en
    banc to resolve questions of exceptional importance regarding
    the scope and application of the state secrets doctrine. See
    Fed. R. App. P. 35(a)(2).
    The government maintains its assertion of privilege on
    appeal, continuing to rely on General Hayden’s two declara-
    MOHAMED v. JEPPESEN DATAPLAN                 13529
    tions. While the appeal was pending Barack Obama suc-
    ceeded George W. Bush as President of the United States. On
    September 23, 2009, the Obama administration announced
    new policies for invoking the state secrets privilege, effective
    October 1, 2009, in a memorandum from the Attorney Gen-
    eral. See Memorandum from the Attorney Gen. to the Heads
    of Executive Dep’ts and Agencies on Policies and Procedures
    Governing Invocation of the State Secrets Privilege (Sept. 23,
    2009) (“Holder Memo”), http://www.justice.gov/opa/
    documents/state-secret-privileges.pdf. The government certi-
    fied both in its briefs and at oral argument before the en banc
    court that officials at the “highest levels of the Department of
    Justice” of the new administration had reviewed the assertion
    of privilege in this case and determined that it was appropriate
    under the newly announced policies. See Redacted, Unclassi-
    fied Br. for U.S. on Reh’g En Banc (“U.S. Br.”) 3.
    II.   STANDARD OF REVIEW
    We review de novo the interpretation and application of the
    state secrets doctrine and review for clear error the district
    court’s underlying factual findings. Al-Haramain Islamic
    Found., Inc. v. Bush, 
    507 F.3d 1190
    , 1196 (9th Cir. 2007).
    III.     THE STATE SECRETS DOCTRINE
    [1] The Supreme Court has long recognized that in excep-
    tional circumstances courts must act in the interest of the
    country’s national security to prevent disclosure of state
    secrets, even to the point of dismissing a case entirely. See
    Totten v. United States, 
    92 U.S. 105
    , 107 (1876). The contem-
    porary state secrets doctrine encompasses two applications of
    this principle. One completely bars adjudication of claims
    premised on state secrets (the “Totten bar”); the other is an
    evidentiary privilege (“the Reynolds privilege”) that excludes
    privileged evidence from the case and may result in dismissal
    of the claims.3 See United States v. Reynolds, 
    345 U.S. 1
    3
    Were this a criminal case, the state secrets doctrine would apply more
    narrowly. See El-Masri v. United States, 
    479 F.3d 296
    , 313 n.7 (4th Cir.
    13530             MOHAMED v. JEPPESEN DATAPLAN
    (1953). We first address the nature of these applications and
    then apply them to the facts of this case.
    A.    The Totten Bar
    In 1876 the Supreme Court stated “as a general principle[ ]
    that public policy forbids the maintenance of any suit in a
    court of justice, the trial of which would inevitably lead to the
    disclosure of matters which the law itself regards as confiden-
    tial.” Totten, 
    92 U.S. at 107
     (emphasis added). The Court
    again invoked the principle in 1953, citing Totten for the
    proposition that “where the very subject matter of the action”
    is “a matter of state secret,” an action may be “dismissed on
    the pleadings without ever reaching the question of evidence”
    because it is “so obvious that the action should never prevail
    over the privilege.” Reynolds, 
    345 U.S. at
    11 n.26. This appli-
    cation of Totten’s general principle — which we refer to as
    the Totten bar — is “designed not merely to defeat the
    asserted claims, but to preclude judicial inquiry” entirely.
    Tenet v. Doe, 
    544 U.S. 1
    , 7 n.4 (2005).
    The Court first applied this bar in Totten itself, where the
    estate of a Civil War spy sued the United States for breaching
    an alleged agreement to compensate the spy for his wartime
    espionage services. Setting forth the “general principle”
    quoted above, the Court held that the action was barred
    because it was premised on the existence of a “contract for
    secret services with the government,” which was “a fact not
    to be disclosed.” Totten, 
    92 U.S. at 107
    .
    A century later, the Court applied the Totten bar in Wein-
    berger v. Catholic Action of Hawaii/Peace Education Project,
    
    454 U.S. 139
    , 146-47 (1981). There, the plaintiffs sued under
    2007) (“[T]he Executive’s authority to protect [state secrets] is much
    broader in civil matters than in criminal prosecutions.”); see also Reyn-
    olds, 
    345 U.S. at 12
    .
    MOHAMED v. JEPPESEN DATAPLAN                     13531
    the National Environmental Policy Act of 1969, 
    42 U.S.C. § 4321
     et seq., to compel the Navy to prepare an environmen-
    tal impact statement regarding a military facility where the
    Navy allegedly proposed to store nuclear weapons. The Court
    held that the allegations were “beyond judicial scrutiny”
    because, “[d]ue to national security reasons, . . . the Navy can
    neither admit nor deny that it proposes to store nuclear weap-
    ons at [the facility].” 
    Id.
     (citing Totten, 
    92 U.S. at 107
    ).
    The Court more recently reaffirmed and explained the Tot-
    ten bar in a case involving two former Cold War spies who
    accused the CIA of reneging on a commitment to provide
    financial support in exchange for their espionage services.
    Relying on “Totten’s core concern” of “preventing the exis-
    tence of the plaintiffs’ relationship with the Government from
    being revealed,” the Court held that the action was, like Tot-
    ten and Weinberger, incapable of judicial review. Tenet, 
    544 U.S. at 8-10
    .4
    [2] Plaintiffs contend that the Totten bar applies only to a
    narrow category of cases they say are not implicated here,
    namely claims premised on a plaintiff’s espionage relation-
    ship with the government. We disagree. We read the Court’s
    discussion of Totten in Reynolds to mean that the Totten bar
    applies to cases in which “the very subject matter of the
    action” is “a matter of state secret.” Reynolds, 
    345 U.S. at
    11
    n.26. “[A] contract to perform espionage” is only an example.
    
    Id.
     This conclusion is confirmed by Weinberger, which relied
    on the Totten bar to hold that a case involving nuclear weap-
    ons secrets, and having nothing to do with espionage con-
    tracts, was “beyond judicial scrutiny.” See Weinberger, 454
    4
    Tenet also made clear that application of the Totten bar does not
    require a formal assertion of the state secrets privilege by the government
    that meets the procedural requirements explained in Reynolds and dis-
    cussed below. See Tenet, 
    544 U.S. at 8-9
     (applying the Totten bar); Doe
    v. Tenet, 
    329 F.3d 1135
    , 1151-52 (9th Cir. 2003) (underlying appellate
    decision noting that no formal assertion had yet been filed).
    13532             MOHAMED v. JEPPESEN DATAPLAN
    U.S. at 146-47; see also Tenet, 
    544 U.S. at 9
     (characterizing
    Weinberger as a case applying the Totten bar). Thus, although
    the claims in both Totten and Tenet were premised on the
    existence of espionage agreements, and even though the
    plaintiffs in both Totten and Tenet were themselves parties to
    the espionage agreements, the Totten bar rests on a general
    principle that extends beyond that specific context. We there-
    fore reject plaintiffs’ unduly narrow view of the Totten bar
    and reaffirm our holding in Al-Haramain that the bar “has
    evolved into the principle that where the very subject matter
    of a lawsuit is a matter of state secret, the action must be dis-
    missed without reaching the question of evidence.” Al-
    Haramain, 
    507 F.3d at 1197
    . As we explain below, the Totten
    bar is a narrow rule, but it is not as narrow as plaintiffs con-
    tend.
    We also disagree with plaintiffs’ related contention that the
    Totten bar cannot apply unless the plaintiff is a party to a
    secret agreement with the government. The environmental
    groups and individuals who were the plaintiffs in Weinberger
    were not parties to agreements with the United States, secret
    or otherwise. The purpose of the bar, moreover, is to prevent
    the revelation of state secrets harmful to national security, a
    concern no less pressing when the plaintiffs are strangers to
    the espionage agreement that their litigation threatens to
    reveal. Thus, even if plaintiffs were correct that the Totten bar
    is limited to cases premised on espionage agreements with the
    government, we would reject their contention that the bar is
    necessarily limited to cases in which the plaintiffs are them-
    selves parties to those agreements.
    B.    The Reynolds Privilege
    [3] In addition to the Totten bar, the state secrets doctrine
    encompasses a “privilege against revealing military [or state]
    secrets, a privilege which is well established in the law of evi-
    dence.” Reynolds, 
    345 U.S. at 6-7
    .5 A successful assertion of
    5
    The two applications of the doctrine remain distinct; Reynolds “in no
    way signaled [a] retreat from Totten’s broader holding.” Tenet, 
    544 U.S. at 9
    .
    MOHAMED v. JEPPESEN DATAPLAN               13533
    privilege under Reynolds will remove the privileged evidence
    from the litigation. Unlike the Totten bar, a valid claim of
    privilege under Reynolds does not automatically require dis-
    missal of the case. In some instances, however, the assertion
    of privilege will require dismissal because it will become
    apparent during the Reynolds analysis that the case cannot
    proceed without privileged evidence, or that litigating the case
    to a judgment on the merits would present an unacceptable
    risk of disclosing state secrets.
    Reynolds involved a military aircraft carrying secret elec-
    tronic equipment. 
    Id. at 3
    . After the plane crashed, the estates
    of three civilian observers killed in the accident brought tort
    claims against the government. In discovery, plaintiffs sought
    production of the Air Force’s official accident investigation
    report and the statements of three surviving crew members.
    The Air Force refused to produce the materials, citing the
    need to protect national security and military secrets. 
    Id.
     at 4-
    5. The district court ordered the government to produce the
    documents in camera so the court could determine whether
    they contained privileged material. When the government
    refused, the court sanctioned the government by establishing
    the facts on the issue of negligence in plaintiffs’ favor. 
    Id. at 5
    .
    The Supreme Court reversed and sustained the govern-
    ment’s claim of privilege because “there was a reasonable
    danger that the accident investigation report would contain
    references to the secret electronic equipment which was the
    primary concern of the mission.” 
    Id. at 10
    . The Court also
    provided guidance on how claims of privilege should be ana-
    lyzed and held that, under the circumstances, the district court
    should have sustained the privilege without even requiring the
    government to produce the report for in camera review. 
    Id. at 10-11
    . The Court did not, however, dismiss the case outright.
    Rather, given that the secret electronic equipment was unre-
    lated to the cause of the accident, it remanded to the district
    court, affording plaintiffs the opportunity to try to establish
    13534           MOHAMED v. JEPPESEN DATAPLAN
    their claims without the privileged accident report and witness
    statements. 
    Id. at 11
    .
    Analyzing claims under the Reynolds privilege involves
    three steps:
    First, we must “ascertain that the procedural require-
    ments for invoking the state secrets privilege have
    been satisfied.” Second, we must make an indepen-
    dent determination whether the information is privi-
    leged. . . . Finally, “the ultimate question to be
    resolved is how the matter should proceed in light of
    the successful privilege claim.”
    Al-Haramain, 
    507 F.3d at 1202
     (citation omitted) (quoting El-
    Masri v. United States, 
    479 F.3d 296
    , 304 (4th Cir. 2007)).
    We discuss these steps in turn.
    1.   Procedural Requirements
    a. Assertion of the privilege. “The privilege belongs to the
    Government and must be asserted by it; it can neither be
    claimed nor waived by a private party.” Reynolds, 
    345 U.S. at 7
     (footnotes omitted). The privilege “is not to be lightly
    invoked.” 
    Id.
     This is especially true when, as in this case, the
    government seeks not merely to preclude the production of
    particular items of evidence (as in Reynolds) but to obtain dis-
    missal of the entire action.
    [4] To ensure that the privilege is invoked no more often
    or extensively than necessary, Reynolds held that “[t]here
    must be a formal claim of privilege, lodged by the head of the
    department which has control over the matter, after actual per-
    sonal consideration by that officer.” 
    Id. at 7-8
     (footnote omit-
    ted). This certification is fundamental to the government’s
    claim of privilege. As we have observed in a different context,
    the decision to invoke the privilege must “be a serious, con-
    sidered judgment, not simply an administrative formality.”
    MOHAMED v. JEPPESEN DATAPLAN              13535
    United States v. W.R. Grace, 
    526 F.3d 499
    , 507-08 (9th Cir.
    2008) (en banc). The formal claim must reflect the certifying
    official’s personal judgment; responsibility for this task may
    not be delegated to lesser-ranked officials. The claim also
    must be presented in sufficient detail for the court to make an
    independent determination of the validity of the claim of priv-
    ilege and the scope of the evidence subject to the privilege.
    In the present case, General Michael Hayden, then-Director
    of the CIA, asserted the initial, formal claim of privilege and
    submitted detailed public and classified declarations. We were
    informed at oral argument that the current Attorney General,
    Eric Holder, has also reviewed and approved the ongoing
    claim of privilege. Although Reynolds does not require review
    and approval by the Attorney General when a different
    agency head has control of the matter, such additional review
    by the executive branch’s chief lawyer is appropriate and to
    be encouraged.
    [5] b. Timing. Plaintiffs contend that the government’s
    assertion of privilege was premature, urging that the Reynolds
    privilege cannot be raised before an obligation to produce
    specific evidence subject to a claim of privilege has actually
    arisen. We disagree. The privilege may be asserted at any
    time, even at the pleading stage.
    The privilege indisputably may be raised with respect to
    discovery requests seeking information the government con-
    tends is privileged. Courts have repeatedly sustained claims of
    privilege under those circumstances. See, e.g., Reynolds, 
    345 U.S. at 3
     (document production requests); Kasza v. Browner,
    
    133 F.3d 1159
    , 1170 (9th Cir. 1998) (various discovery
    requests); Halkin v. Helms, 
    690 F.2d 977
    , 985-87 (D.C. Cir.
    1982) (interrogatories, document production requests and oral
    depositions). In addition, the government may raise the privi-
    lege to prevent the disclosure of privileged information in a
    responsive pleading, as it did in Ellsberg v. Mitchell, 
    709 F.2d 51
    , 54 & n.6 (D.C. Cir. 1983), and Black v. United States, 62
    13536            MOHAMED v. JEPPESEN DATAPLAN
    F.3d 1115, 1117-19 (8th Cir. 1995). See Huey v. Honeywell,
    Inc., 
    82 F.3d 327
    , 333 (9th Cir. 1996) (explaining that the
    contents of an answer may be evidentiary); Lockwood v. Wolf
    Corp., 
    629 F.2d 603
    , 611 (9th Cir. 1980) (holding that admis-
    sions in opposing parties’ pleadings are admissible as evi-
    dence).
    We also conclude that the government may assert a Reyn-
    olds privilege claim prospectively, even at the pleading stage,
    rather than waiting for an evidentiary dispute to arise during
    discovery or trial. See, e.g., El-Masri, 
    479 F.3d at 308
    (“[D]ismissal at the pleading stage is appropriate if state
    secrets are so central to a proceeding that it cannot be litigated
    without threatening their disclosure.”); Black, 62 F.3d at
    1117-19 (dismissing the action at the pleading stage based on
    the government’s assertion of privilege over certain categories
    of information concerning U.S. intelligence operations);
    Farnsworth Cannon, Inc. v. Grimes, 
    635 F.2d 268
    , 281 (4th
    Cir. 1980) (en banc) (per curiam); see also Al-Haramain, 
    507 F.3d at 1201
     (recognizing that Reynolds may result in dis-
    missal even without “await[ing] preliminary discovery”). In
    some cases, the court may be able to determine with certainty
    from the nature of the allegations and the government’s decla-
    rations in support of its claim of secrecy that litigation must
    be limited or cut off in order to protect state secrets, even
    before any discovery or evidentiary requests have been made.
    In such cases, waiting for specific evidentiary disputes to arise
    would be both unnecessary and potentially dangerous. See
    Sterling v. Tenet, 
    416 F.3d 338
    , 344 (4th Cir. 2005) (“Courts
    are not required to play with fire and chance further disclosure
    — inadvertent, mistaken, or even intentional — that would
    defeat the very purpose for which the privilege exists.”). The
    showing the government must make to prevail on a claim of
    state secrets privilege may be especially difficult when
    attempted before any request for specific information or evi-
    dence has actually been made, but foreclosing the government
    from even trying to make that showing would be inconsistent
    with the need to protect state secrets.
    MOHAMED v. JEPPESEN DATAPLAN               13537
    2.   The Court’s Independent Evaluation of the Claim
    of Privilege
    When the privilege has been properly invoked, “we must
    make an independent determination whether the information
    is privileged.” Al-Haramain, 
    507 F.3d at 1202
    . The court
    must sustain a claim of privilege when it is satisfied, “from all
    the circumstances of the case, that there is a reasonable dan-
    ger that compulsion of the evidence will expose . . . matters
    which, in the interest of national security, should not be
    divulged.” Reynolds, 
    345 U.S. at 10
    . If this standard is met,
    the evidence is absolutely privileged, irrespective of the plain-
    tiffs’ countervailing need for it. See 
    id. at 11
     (“[E]ven the
    most compelling necessity cannot overcome the claim of priv-
    ilege if the court is ultimately satisfied that [state] secrets are
    at stake.”); Halkin, 
    690 F.2d at 990
    .
    This step in the Reynolds analysis “places on the court a
    special burden to assure itself that an appropriate balance is
    struck between protecting national security matters and pre-
    serving an open court system.” Al-Haramain, 
    507 F.3d at 1203
    . In evaluating the need for secrecy, “we acknowledge
    the need to defer to the Executive on matters of foreign policy
    and national security and surely cannot legitimately find our-
    selves second guessing the Executive in this arena.” 
    Id.
     But
    “the state secrets doctrine does not represent a surrender of
    judicial control over access to the courts.” El-Masri, 
    479 F.3d at 312
    . Rather, “to ensure that the state secrets privilege is
    asserted no more frequently and sweepingly than necessary,
    it is essential that the courts continue critically to examine
    instances of its invocation.” Ellsberg, 
    709 F.2d at 58
    . “We
    take very seriously our obligation to review the [government’s
    claims] with a very careful, indeed a skeptical, eye, and not
    to accept at face value the government’s claim or justification
    of privilege,” Al-Haramain, 
    507 F.3d at 1203
    , though we
    must “do so without forcing a disclosure of the very thing the
    privilege is designed to protect . . . . Too much judicial
    inquiry into the claim of privilege would force disclosure of
    13538           MOHAMED v. JEPPESEN DATAPLAN
    the thing the privilege was meant to protect, while a complete
    abandonment of judicial control would lead to intolerable
    abuses.” Reynolds, 
    345 U.S. at 8
    .
    [6] We do not offer a detailed definition of what consti-
    tutes a state secret. The Supreme Court in Reynolds found it
    sufficient to say that the privilege covers “matters which, in
    the interest of national security, should not be divulged.” 
    Id. at 10
    . We do note, however, that an executive decision to
    classify information is insufficient to establish that the infor-
    mation is privileged. See Ellsberg, 
    709 F.2d at 57
     (“[T]he
    privilege may not be used to shield any material not strictly
    necessary to prevent injury to national security.”). Although
    classification may be an indication of the need for secrecy,
    treating it as conclusive would trivialize the court’s role,
    which the Supreme Court has clearly admonished “cannot be
    abdicated to the caprice of executive officers.” Reynolds, 
    345 U.S. at 9-10
    .
    3.   How Should the Matter Proceed?
    When a court sustains a claim of privilege, it must then
    resolve “ ‘how the matter should proceed in light of the suc-
    cessful privilege claim.’ ” Al-Haramain, 
    507 F.3d at 1202
    (quoting El-Masri, 
    479 F.3d at 304
    ). The court must assess
    whether it is feasible for the litigation to proceed without the
    protected evidence and, if so, how.
    When the government successfully invokes the state secrets
    privilege, “the evidence is completely removed from the
    case.” Kasza, 
    133 F.3d at 1166
    . “ ‘[W]henever possible, sen-
    sitive information must be disentangled from nonsensitive
    information to allow for the release of the latter.’ ” 
    Id.
     (quot-
    ing Ellsberg, 
    709 F.2d at 57
    ). However, there will be occa-
    sions when, as a practical matter, secret and nonsecret
    information cannot be separated. In some cases, therefore, “it
    is appropriate that the courts restrict the parties’ access not
    only to evidence which itself risks the disclosure of a state
    MOHAMED v. JEPPESEN DATAPLAN               13539
    secret, but also those pieces of evidence or areas of question-
    ing which press so closely upon highly sensitive material that
    they create a high risk of inadvertent or indirect disclosures.”
    Bareford v. Gen. Dynamics Corp., 
    973 F.2d 1138
    , 1143-44
    (5th Cir. 1992); see also Kasza, 
    133 F.3d at 1166
     (“[I]f seem-
    ingly innocuous information is part of a . . . mosaic, the state
    secrets privilege may be invoked to bar its disclosure and the
    court cannot order the government to disentangle this infor-
    mation from other [i.e., secret] information.”).
    Ordinarily, simply excluding or otherwise walling off the
    privileged information may suffice to protect the state secrets
    and “ ‘the case will proceed accordingly, with no conse-
    quences save those resulting from the loss of evidence.’ ” Al-
    Haramain, 
    507 F.3d at 1204
     (quoting Ellsberg, 
    709 F.2d at 64
    ); see, e.g., Webster v. Doe, 
    486 U.S. 592
    , 604-05 (1988)
    (permitting case to continue without privileged evidence);
    Reynolds, 
    345 U.S. at 11-12
     (same).
    In some instances, however, application of the privilege
    may require dismissal of the action. When this point is
    reached, the Reynolds privilege converges with the Totten bar,
    because both require dismissal. There are three circumstances
    when the Reynolds privilege would justify terminating a case.
    First, if “the plaintiff cannot prove the prima facie elements
    of her claim with nonprivileged evidence, then the court may
    dismiss her claim as it would with any plaintiff who cannot
    prove her case.” Kasza, 
    133 F.3d at 1166
    ; see also Ellsberg,
    
    709 F.2d at 65
    . Second, “ ‘if the privilege deprives the defen-
    dant of information that would otherwise give the defendant
    a valid defense to the claim, then the court may grant sum-
    mary judgment to the defendant.’ ” Kasza, 
    133 F.3d at 1166
    (quoting Bareford, 
    973 F.2d at 1141
    ); accord In re Sealed
    Case, 
    494 F.3d 139
    , 153 (D.C. Cir. 2007); see also, e.g.,
    Tenenbaum v. Simonini, 
    372 F.3d 776
    , 777 (6th Cir. 2004).
    [7] Third, and relevant here, even if the claims and
    defenses might theoretically be established without relying on
    13540           MOHAMED v. JEPPESEN DATAPLAN
    privileged evidence, it may be impossible to proceed with the
    litigation because — privileged evidence being inseparable
    from nonprivileged information that will be necessary to the
    claims or defenses — litigating the case to a judgment on the
    merits would present an unacceptable risk of disclosing state
    secrets. See, e.g., In re Sealed Case, 
    494 F.3d at 153
     (“If the
    district court determines that the subject matter of a case is so
    sensitive that there is no way it can be litigated without risk-
    ing national secrets, then the case must be dismissed.”); El-
    Masri, 
    479 F.3d at 308
     (“[A] proceeding in which the state
    secrets privilege is successfully interposed must be dismissed
    if the circumstances make clear that privileged information
    will be so central to the litigation that any attempt to proceed
    will threaten that information’s disclosure.”); Bareford, 
    973 F.2d at 1144
     (“We are compelled to conclude that the trial of
    this case would inevitably lead to a significant risk that highly
    sensitive information concerning this defense system would
    be disclosed.”); Fitzgerald v. Penthouse Int’l, Ltd., 
    776 F.2d 1236
    , 1241-42 (4th Cir. 1985) (“[I]n some circumstances sen-
    sitive military secrets will be so central to the subject matter
    of the litigation that any attempt to proceed will threaten dis-
    closure of the privileged matters.”); Farnsworth Cannon, 
    635 F.2d at 281
     (dismissing the action at the outset because “any
    attempt on the part of the plaintiff to establish a prima facie
    case would so threaten disclosure of state secrets that the
    overriding interest of the United States and the preservation
    of its state secrets precludes any further attempt to pursue this
    litigation”); 
    id. at 279-80
     (Phillips, J., specially concurring
    and dissenting from the three-judge panel decision) (conclud-
    ing that “litigation should be entirely foreclosed at the outset
    by dismissal of the action” if it appears that “the danger of
    inadvertent compromise of the protected state secrets out-
    weighs the public and private interests in attempting formally
    to resolve the dispute while honoring the privilege”). As we
    shall explain, this circumstance exists here and requires dis-
    missal.
    MOHAMED v. JEPPESEN DATAPLAN                     13541
    IV.    APPLICATION
    We therefore turn to the application of the state secrets doc-
    trine in this case. The government contends that plaintiffs’
    lawsuit should be dismissed, whether under the Totten bar or
    the Reynolds privilege, because “state secrets are so central to
    this case that permitting further proceeding[s] would create an
    intolerable risk of disclosure that would jeopardize national
    security.” U.S. Br. 13.6 Plaintiffs argue that the Totten bar
    does not apply and that, even if the government is entitled to
    some protection under the Reynolds privilege, at least some
    claims survive. The district court appears to have dismissed
    the action under the Totten bar, making a “threshold determi-
    nation” that “the very subject matter of the case is a state
    secret.” Having dismissed on that basis, the district court did
    not address whether application of the Reynolds privilege
    would require dismissal.
    We do not find it quite so clear that the very subject matter
    of this case is a state secret. Nonetheless, having conducted
    our own detailed analysis, we conclude that the district court
    reached the correct result because dismissal is warranted even
    under Reynolds. Recognizing the serious consequences to
    plaintiffs of dismissal, we explain our ruling so far as possible
    within the considerable constraints imposed on us by the state
    secrets doctrine itself.
    A.    The Totten Bar
    The categorical, “absolute protection [the Court] found nec-
    essary in enunciating the Totten rule” is appropriate only in
    narrow circumstances. Tenet, 
    544 U.S. at 11
    . The Totten bar
    applies only when the “very subject matter” of the action is
    a state secret — i.e., when it is “obvious” without conducting
    6
    The government’s classified briefing and supporting declarations pro-
    vide more specific support for the government’s state secrets contentions.
    This information is crucial to our decision. See El-Masri, 
    479 F.3d at 312
    .
    13542              MOHAMED v. JEPPESEN DATAPLAN
    the detailed analysis required by Reynolds “that the action
    [c]ould never prevail over the privilege.” Reynolds, 
    345 U.S. at
    11 n.26. The Court has applied the Totten bar on just three
    occasions, involving two different kinds of state secrets: In
    Tenet and Totten the Court applied the Totten bar to “the dis-
    tinct class of cases that depend upon clandestine spy relation-
    ships,” see Tenet, 
    544 U.S. at 9-10
    ; Totten, 
    92 U.S. at 107
    ,
    and in Weinberger the Court applied the Totten bar to a case
    that depended on whether the Navy proposed to store nuclear
    weapons at a particular facility, see Weinberger, 
    454 U.S. at 146-47
    . Although the Court has not limited the Totten bar to
    cases premised on secret espionage agreements or the location
    of nuclear weapons, neither has it offered much guidance on
    when the Totten bar applies beyond these limited circum-
    stances. Because the Totten bar is rarely applied and not
    clearly defined, because it is a judge-made doctrine with
    extremely harsh consequences and because conducting a more
    detailed analysis will tend to improve the accuracy, transpar-
    ency and legitimacy of the proceedings, district courts pres-
    ented with disputes about state secrets should ordinarily
    undertake a detailed Reynolds analysis before deciding
    whether dismissal on the pleadings is justified.
    Here, some of plaintiffs’ claims might well fall within the
    Totten bar. In particular, their allegations that Jeppesen con-
    spired with agents of the United States in plaintiffs’ forced
    disappearance, torture and degrading treatment are premised
    on the existence of an alleged covert relationship between
    Jeppesen and the government — a matter that the Fourth Cir-
    cuit has concluded is “practically indistinguishable from that
    categorically barred by Totten and Tenet.” El-Masri, 
    479 F.3d at 309
    .7 On the other hand, allegations based on plaintiffs’
    7
    We do not decide whether any of plaintiffs’ claims are cognizable
    under the Alien Tort Statute (“ATS”). But assuming that the conspiracy
    claims are cognizable, they require proof of an agreement. See, e.g., Pres-
    byterian Church of Sudan v. Talisman Energy, Inc., 
    582 F.3d 244
    , 260 (2d
    Cir. 2009) (holding that conspiracy liability under the ATS would require
    MOHAMED v. JEPPESEN DATAPLAN                      13543
    theory that Jeppesen should be liable simply for what it
    “should have known” about the alleged unlawful extraordi-
    nary rendition program while participating in it are not so
    obviously tied to proof of a secret agreement between Jep-
    pesen and the government.
    [8] We do not resolve the difficult question of precisely
    which claims may be barred under Totten because application
    of the Reynolds privilege leads us to conclude that this litiga-
    tion cannot proceed further. We rely on the Reynolds privilege
    rather than the Totten bar for several reasons. First, the gov-
    ernment has asserted the Reynolds privilege along with the
    Totten bar, inviting the further inquiry Reynolds requires and
    presenting a record that compels dismissal even on this alter-
    nate ground. Second, we have discretion to affirm on any
    basis supported by the record. See Thigpen v. Roberts, 
    468 U.S. 27
    , 29-30 (1984); Shanks v. Dressel, 
    540 F.3d 1082
    ,
    1086 (9th Cir. 2008). Third, resolving this case under Reyn-
    olds avoids difficult questions about the precise scope of the
    Totten bar and permits us to conduct a searching judicial
    review, fulfilling our obligation under Reynolds “to review
    the [government’s claim] with a very careful, indeed a skepti-
    cal, eye, and not to accept at face value the government’s
    either an “agreement” or “ ‘a criminal intention to participate in a common
    criminal design’ ”) (quoting Prosecutor v. Tadic, Case No. IT-94-1-A,
    Appeal Judgment, ¶ 206 (July 15, 1999)); Cabello v. Fernandez-Larios,
    
    402 F.3d 1148
    , 1159 (11th Cir. 2005) (holding that conspiracy liability
    under the ATS requires proof that “two or more persons agreed to commit
    a wrongful act”). Plaintiffs’ allegations confirm that their conspiracy
    claims depend on proof of a covert relationship. See, e.g., First Am.
    Compl. ¶ 255 (“Jeppesen entered into an agreement with agents of the
    United States to unlawfully render Plaintiffs to secret detention in
    Morocco, Egypt, and Afghanistan.”); id. ¶ 262 (“Defendant entered into
    an agreement with agents of the United States to provide flight and logisti-
    cal support services to aircraft and crew used in the extraordinary rendi-
    tion program to unlawfully render Plaintiffs to detention and interrogation
    in Morocco, Egypt, and Afghanistan, where they would be subjected to
    acts of torture and other cruel, inhuman or degrading treatment.”).
    13544              MOHAMED v. JEPPESEN DATAPLAN
    claim or justification of privilege.” Al-Haramain, 
    507 F.3d at 1203
    .8
    B.   The Reynolds Privilege
    [9] There is no dispute that the government has complied
    with Reynolds’ procedural requirements for invoking the state
    secrets privilege by filing General Hayden’s formal claim of
    privilege in his public declaration.9 We therefore focus on the
    second and third steps in the Reynolds analysis: First, whether
    and to what extent the matters the government contends must
    be kept secret are in fact matters of state secret; and second,
    if they are, whether the action can be litigated without relying
    on evidence that would necessarily reveal those secrets or
    press so closely upon them as to create an unjustifiable risk
    that they would be revealed. In doing so, we explain our deci-
    sion as much as we can without compromising the secrets we
    are required to protect.
    1. Whether and to What Extent the Evidence Is
    Privileged
    [10] The government asserts the state secrets privilege
    over four categories of evidence. In particular, the govern-
    ment contends that neither it nor Jeppesen should be com-
    pelled, through a responsive pleading, discovery responses or
    otherwise, to disclose: “[1] information that would tend to
    confirm or deny whether Jeppesen or any other private entity
    assisted the CIA with clandestine intelligence activities; [2]
    8
    This skepticism is all the more justified in cases that allege serious
    government wrongdoing. Such allegations heighten the risk that govern-
    ment officials may be motivated to invoke the state secrets doctrine not
    only by their obligation to protect national security but also by a desire to
    protect themselves or their associates from scrutiny.
    9
    As previously noted, the government filed declarations meeting the
    procedural requirements for the Reynolds privilege even though such dec-
    larations are not strictly necessary to support a Totten claim. See Tenet,
    
    544 U.S. at 11
    .
    MOHAMED v. JEPPESEN DATAPLAN              13545
    information about whether any foreign government cooper-
    ated with the CIA in clandestine intelligence activities; [3]
    information about the scope or operation of the CIA terrorist
    detention and interrogation program; [or 4] any other informa-
    tion concerning CIA clandestine intelligence operations that
    would tend to reveal intelligence activities, sources, or meth-
    ods.” U.S. Br. 7-8. These indisputably are matters that the
    state secrets privilege may cover. See, e.g., Tenet, 
    544 U.S. at 11
     (emphasizing the “absolute protection” the state secrets
    doctrine affords against revealing espionage relationships);
    CIA v. Sims, 
    471 U.S. 159
    , 175 (1985) (“Even a small chance
    that some court will order disclosure of a source’s identity
    could well impair intelligence gathering and cause sources to
    ‘close up like a clam.’ ”); In re Sealed Case, 
    494 F.3d at 152
    (prohibiting “all discussion of intelligence sources, capabili-
    ties, and the like”); Al-Haramain, 
    507 F.3d at 1204
     (applying
    the privilege to “the means, sources and methods of intelli-
    gence gathering”); Ellsberg, 
    709 F.2d at 57
     (applying the
    privilege to the “disclosure of intelligence-gathering methods
    or capabilities”).
    [11] We have thoroughly and critically reviewed the gov-
    ernment’s public and classified declarations and are con-
    vinced that at least some of the matters it seeks to protect
    from disclosure in this litigation are valid state secrets,
    “which, in the interest of national security, should not be
    divulged.” Reynolds, 
    345 U.S. at 10
    . The government’s classi-
    fied disclosures to the court are persuasive that compelled or
    inadvertent disclosure of such information in the course of lit-
    igation would seriously harm legitimate national security
    interests. In fact, every judge who has reviewed the govern-
    ment’s formal, classified claim of privilege in this case agrees
    that in this sense the claim of privilege is proper, although we
    have different views as to the scope of the privilege and its
    impact on plaintiffs’ case. The plaintiffs themselves “do not
    dispute that, during the course of litigation, there may well be
    relevant evidence that may be properly withheld pursuant to
    the privilege.” Br. of Plaintiffs-Appellants 26. See El-Masri,
    13546               MOHAMED v. JEPPESEN DATAPLAN
    
    479 F.3d at 308-13
     (affirming the dismissal of a case involv-
    ing essentially the same types of claims on the basis of the
    states secrets doctrine).
    [12] We are precluded from explaining precisely which
    matters the privilege covers lest we jeopardize the secrets we
    are bound to protect. See Black, 62 F.3d at 1119 (“Care in
    protecting state secrets is necessary not only during a court’s
    review of the evidence, but in its subsequent treatment of the
    question in any holding; a properly phrased opinion should
    not strip the veil from state secrets even if ambiguity results
    in a loss of focus and clarity.”). We can say, however, that the
    secrets fall within one or more of the four categories identi-
    fied by the government and that we have independently and
    critically confirmed that their disclosure could be expected to
    cause significant harm to national security.
    2.    Effect on the Proceedings
    Having determined that the privilege applies, we next
    determine whether the case must be dismissed under the
    Reynolds privilege.10 We have thoroughly considered plain-
    tiffs’ claims, several possible defenses and the prospective
    10
    As noted earlier, the district court did not conduct a detailed analysis
    of plaintiffs’ several claims because it concluded that the subject matter
    of the entire case is a state secret and therefore dismissed under the Totten
    bar. One option, vigorously urged by the dissent, would be to remand to
    the district court for that court to conduct a more detailed analysis in the
    first instance. As the case has developed during these en banc proceedings,
    however, we find remand unnecessary because our own Reynolds analysis
    persuades us that the litigation cannot proceed. Although it would have
    been preferable for the district court to conduct this analysis first, we now
    have had to do it ourselves and it makes no sense to suspend our own
    judgment that — given the record before us and the nature of plaintiffs’
    claims — this case realistically cannot be litigated against Jeppesen with-
    out compromising state secrets. There is thus no point, and much risk, in
    remanding to the district court to go through the Reynolds analysis as the
    dissent would prefer. We accept and respect the principles that motivate
    the dissent, but those principles do not justify prolonging the process here.
    MOHAMED v. JEPPESEN DATAPLAN                       13547
    path of this litigation. We also have carefully and skeptically
    reviewed the government’s classified submissions, which
    include supplemental information not presented to the district
    court. We rely heavily on these submissions, which describe
    the state secrets implicated here, the harm to national security
    that the government believes would result from explicit or
    implicit disclosure and the reasons why, in the government’s
    view, further litigation would risk that disclosure.
    [13] Given plaintiffs’ extensive submission of public docu-
    ments and the stage of the litigation, we do not rely on the
    first two circumstances in which the Reynolds privilege
    requires dismissal — that is, whether plaintiffs could prove a
    prima facie case without privileged evidence, or whether the
    privilege deprives Jeppesen of evidence that would otherwise
    give it a valid defense to plaintiffs’ claims. See Kasza, 
    133 F.3d at 1166
    ; supra Part III.B.3.11 Instead, we assume without
    deciding that plaintiffs’ prima facie case and Jeppesen’s
    defenses may not inevitably depend on privileged evidence.
    Proceeding on that assumption, we hold that dismissal is
    11
    As noted before, see supra n. 7 and related text, at least some of plain-
    tiffs’ claims would require proof of an agreement or covert relationship
    between the government and Jeppesen. These claims might well be barred
    under Totten and certainly would fall even under a Reynolds analysis. The
    dissent, however, suggests that plaintiffs could establish a prima facie case
    for at least two of their claims without relying on privileged evidence and
    perhaps without any discovery at all — namely, that Jeppesen recklessly
    provided flight and logistical support for rendition flights while it knew or
    should have known its support was being used for forced disappearance
    and torture. See Dissent Appendix. Although our holding does not require
    us to resolve this question, we are not so sure. Plaintiffs’ reliance on infor-
    mation set forth in the dissent’s Appendix would have to overcome evi-
    dentiary and other obstacles, such as hearsay problems and the fact that
    the vast majority of the media reports cited as putting Jeppesen on notice
    were published after Jeppesen’s services were alleged to have occurred.
    In any event, our own analysis under the third aspect of Reynolds per-
    suades us these “knew or should have known” claims must be dismissed
    as well.
    13548              MOHAMED v. JEPPESEN DATAPLAN
    nonetheless required under Reynolds because there is no feasi-
    ble way to litigate Jeppesen’s alleged liability without creat-
    ing an unjustifiable risk of divulging state secrets. See El-
    Masri, 
    479 F.3d at 312
     (coming to the same conclusion in a
    related and comparable case), cert. denied, 
    552 U.S. 947
    (2007).12
    12
    In El-Masri, the Supreme Court declined to review the Fourth Cir-
    cuit’s dismissal of similar claims against the various United States govern-
    ment and corporate actors alleged to be more directly responsible for the
    rendition and interrogation programs at issue here. Nothing in the
    Supreme Court’s state secrets jurisprudence suggests that plaintiffs’ claims
    here, against an alleged provider of logistical support to those programs,
    should proceed where claims against the government and corporate actors
    who plaintiffs allege were primarily responsible failed.
    As the dissent correctly notes, we have previously disapproved of El-
    Masri for conflating the Totten bar’s “very subject matter” inquiry with
    the Reynolds privilege. See Al-Haramain, 
    507 F.3d at 1201
    . We adhere to
    that approach today by maintaining a distinction between the Totten bar
    on the one hand and the Reynolds privilege on the other. See Tenet, 
    544 U.S. at 9
     (explaining that Reynolds “in no way signaled our retreat from
    Totten’s broader holding that lawsuits premised on alleged espionage
    agreements are altogether forbidden”). Maintaining that distinction, how-
    ever, does not mean that the Reynolds privilege can never be raised pro-
    spectively or result in a dismissal at the pleading stage. As we explained
    in Al-Haramain (as do we in the text), the Totten bar and the Reynolds
    privilege form a “continuum of analysis.” 
    507 F.3d at 1201
    . A case may
    fall outside the Totten bar because its “very subject matter” is not a state
    secret, and yet it may become clear in conducting a Reynolds analysis that
    plaintiffs cannot establish a prima facie case, that defendants are deprived
    of a valid defense or that the case cannot be litigated without presenting
    either a certainty or an unacceptable risk of revealing state secrets. When
    that point is reached, including, if applicable, at the pleading stage, dis-
    missal is appropriate under the Reynolds privilege. Notwithstanding its
    erroneous conflation of the Totten bar and the Reynolds privilege, we rely
    on El-Masri because it properly concluded — with respect to allegations
    comparable to those here — that “virtually any conceivable response to
    [plaintiffs’] allegations would disclose privileged information,” and, there-
    fore, that the action could not be litigated “without threatening the disclo-
    sure” of state secrets. El-Masri, 
    479 F.3d at 308, 310
    .
    MOHAMED v. JEPPESEN DATAPLAN              13549
    [14] We reach this conclusion because all seven of plain-
    tiffs’ claims, even if taken as true, describe Jeppesen as pro-
    viding logistical support in a broad, complex process, certain
    aspects of which, the government has persuaded us, are abso-
    lutely protected by the state secrets privilege. Notwithstanding
    that some information about that process has become public,
    Jeppesen’s alleged role and its attendant liability cannot be
    isolated from aspects that are secret and protected. Because
    the facts underlying plaintiffs’ claims are so infused with
    these secrets, any plausible effort by Jeppesen to defend
    against them would create an unjustifiable risk of revealing
    state secrets, even if plaintiffs could make a prima facie case
    on one or more claims with nonprivileged evidence. See
    Kasza, 
    133 F.3d at 1170
    ; Black, 62 F.3d at 1118 (“[P]roof of
    ‘the factual allegations in the Amended Complaint are so tied
    to the privileged information that further litigation will consti-
    tute an undue threat that privileged information will be dis-
    closed.’ ”) (quoting and affirming the district court);
    Bareford, 
    973 F.2d at 1144
     (“[T]he danger that witnesses
    might divulge some privileged material during cross-
    examination is great because the privileged and non-
    privileged material are inextricably linked. We are compelled
    to conclude that the trial of this case would inevitably lead to
    a significant risk that highly sensitive information concerning
    this defense system would be disclosed.”); Fitzgerald, 
    776 F.2d at 1243
     (“In examining witnesses with personal knowl-
    edge of relevant military secrets, the parties would have every
    incentive to probe dangerously close to the state secrets them-
    selves. In these circumstances, state secrets could be compro-
    mised even without direct disclosure by a witness.”);
    Farnsworth Cannon, 
    635 F.2d at 281
     (“[T]he plaintiff and its
    lawyers would have every incentive to probe as close to the
    core secrets as the trial judge would permit. Such probing in
    open court would inevitably be revealing. It is evident that
    any attempt on the part of the plaintiff to establish a prima
    facie case would so threaten disclosure of state secrets that the
    overriding interest of the United States and the preservation
    of its state secrets precludes any further attempt to pursue this
    13550           MOHAMED v. JEPPESEN DATAPLAN
    litigation.”); see also In re Sealed Case, 
    494 F.3d at 152-54
    (acknowledging the appropriateness of dismissal when
    unprivileged and privileged matters are so entwined that the
    risk of disclosure of privileged material is unacceptably high,
    although concluding that the case before the court did not fall
    within that category).
    Here, further litigation presents an unacceptable risk of dis-
    closure of state secrets no matter what legal or factual theories
    Jeppesen would choose to advance during a defense. Whether
    or not Jeppesen provided logistical support in connection with
    the extraordinary rendition and interrogation programs, there
    is precious little Jeppesen could say about its relevant conduct
    and knowledge without revealing information about how the
    United States government does or does not conduct covert
    operations. Our conclusion holds no matter what protective
    procedures the district court might employ. Adversarial litiga-
    tion, including pretrial discovery of documents and witnesses
    and the presentation of documents and testimony at trial, is
    inherently complex and unpredictable. Although district
    courts are well equipped to wall off isolated secrets from dis-
    closure, the challenge is exponentially greater in exceptional
    cases like this one, where the relevant secrets are difficult or
    impossible to isolate and even efforts to define a boundary
    between privileged and unprivileged evidence would risk dis-
    closure by implication. In these rare circumstances, the risk of
    disclosure that further proceedings would create cannot be
    averted through the use of devices such as protective orders
    or restrictions on testimony.
    [15] Dismissal at the pleading stage under Reynolds is a
    drastic result and should not be readily granted. We are not
    persuaded, however, by the dissent’s views that the state
    secrets privilege can never be “asserted during the pleading
    stage to excise entire allegations,” or that the government
    must be required “to make its claims of state secrets with
    regard to specific items of evidence or groups of such items
    as their use is sought in the lawsuit.” Dissent 13560, 13565.
    MOHAMED v. JEPPESEN DATAPLAN               13551
    A case may fall outside the Totten bar and yet it may become
    clear during the Reynolds analysis that dismissal is required
    at the outset. See Al-Haramain, 
    507 F.3d at 1201
     (explaining
    that the Totten bar and the Reynolds privilege form a “contin-
    uum of analysis,” and that in some cases “the suit itself may
    not be barred because of its subject matter and yet ultimately,
    the state secrets privilege may nonetheless preclude the case
    from proceeding to the merits,” even without “await[ing] pre-
    liminary discovery”). Here, our detailed Reynolds analysis
    reveals that the claims and possible defenses are so infused
    with state secrets that the risk of disclosing them is both
    apparent and inevitable. Dismissal under these circumstances,
    like dismissal under the Totten bar, reflects the general princi-
    ple that “public policy forbids the maintenance of any suit in
    a court of justice, the trial of which would inevitably lead to
    the disclosure of matters which the law itself regards as confi-
    dential, and respecting which it will not allow the confidence
    to be violated.” Totten, 
    92 U.S. at 107
    .
    ***
    Although we are necessarily precluded from explaining
    precisely why this case cannot be litigated without risking dis-
    closure of state secrets, or the nature of the harm to national
    security that we are convinced would result from further liti-
    gation, we are able to offer a few observations.
    [16] First, we recognize that plaintiffs have proffered hun-
    dreds of pages of publicly available documents, many
    catalogued in the dissent’s Appendix, that they say corrobo-
    rate some of their allegations concerning Jeppesen’s alleged
    participation in aspects of the extraordinary rendition pro-
    gram. As the government has acknowledged, its claim of priv-
    ilege does not extend to public documents. Accordingly, we
    do not hold that any of the documents plaintiffs have submit-
    ted are subject to the privilege; rather, we conclude that even
    assuming plaintiffs could establish their entire case solely
    through nonprivileged evidence — unlikely as that may be —
    13552           MOHAMED v. JEPPESEN DATAPLAN
    any effort by Jeppesen to defend would unjustifiably risk dis-
    closure of state secrets. Cf. El-Masri, 
    479 F.3d at 309
     (con-
    cluding that “virtually any conceivable response [by
    government defendants to claims based on factual allegations
    materially identical to this case’s] . . . would disclose privi-
    leged information”).
    [17] Second, we do not hold that the existence of the
    extraordinary rendition program is itself a state secret. The
    program has been publicly acknowledged by numerous gov-
    ernment officials including the President of the United States.
    Even if its mere existence may once have been a “matter[ ]
    which, in the interest of national security, should not be
    divulged,” it is not a state secret now. Reynolds, 
    345 U.S. at 10
    ; cf. Al-Haramain, 
    507 F.3d at 1193
     (concluding “[i]n light
    of extensive government disclosures” that a warrantless
    wiretapping program was not a matter of state secret). None-
    theless, partial disclosure of the existence and even some
    aspects of the extraordinary rendition program does not pre-
    clude other details from remaining state secrets if their disclo-
    sure would risk grave harm to national security. See Al-
    Haramain, 
    507 F.3d at 1203
     (concluding that some undis-
    closed details of the wiretapping program were entitled to
    protection under the state secrets privilege); Halkin, 
    690 F.2d at 994
     (“We reject, as we have previously, the theory that
    ‘because some information about the project ostensibly is now
    in the public domain, nothing about the project in which the
    appellants have expressed an interest can properly remain
    classified’ or otherwise privileged from disclosure.” (quoting
    Military Audit Project v. Casey, 
    656 F.2d 724
    , 752 (D.C. Cir.
    1981))); see also Bareford, 
    973 F.2d at 1144
     (explaining that
    in some circumstances, “disclosure of information by govern-
    ment officials can be prejudicial to government interests, even
    if the information has already been divulged from non-
    government sources”).
    Third, we acknowledge the government’s certification at
    oral argument that its assertion of the state secrets privilege
    MOHAMED v. JEPPESEN DATAPLAN              13553
    comports with the revised standards set forth in the current
    administration’s September 23, 2009 memorandum, adopted
    several years after the government first invoked the privilege
    in this case. Those standards require the responsible agency
    to show that “assertion of the privilege is necessary to protect
    information the unauthorized disclosure of which reasonably
    could be expected to cause significant harm to the national
    defense or foreign relations.” Holder Memo, supra, at 1. They
    also mandate that the Department of Justice “will not defend
    an invocation of the privilege in order to: (i) conceal viola-
    tions of the law, inefficiency, or administrative error; (ii) pre-
    vent embarrassment to a person, organization, or agency of
    the United States government; (iii) restrain competition; or
    (iv) prevent or delay the release of information the release of
    which would not reasonably be expected to cause significant
    harm to national security.” Id. at 2. That certification here is
    consistent with our independent conclusion, having reviewed
    the government’s public and classified declarations, that the
    government is not invoking the privilege to avoid embarrass-
    ment or to escape scrutiny of its recent controversial transfer
    and interrogation policies, rather than to protect legitimate
    national security concerns.
    V.    OTHER REMEDIES
    Our holding today is not intended to foreclose — or to pre-
    judge — possible nonjudicial relief, should it be warranted for
    any of the plaintiffs. Denial of a judicial forum based on the
    state secrets doctrine poses concerns at both individual and
    structural levels. For the individual plaintiffs in this action,
    our decision forecloses at least one set of judicial remedies,
    and deprives them of the opportunity to prove their alleged
    mistreatment and obtain damages. At a structural level, termi-
    nating the case eliminates further judicial review in this civil
    litigation, one important check on alleged abuse by govern-
    ment officials and putative contractors. Other remedies may
    partially mitigate these concerns, however, although we rec-
    13554              MOHAMED v. JEPPESEN DATAPLAN
    ognize each of these options brings with it its own set of con-
    cerns and uncertainties.
    First, that the judicial branch may have deferred to the
    executive branch’s claim of privilege in the interest of
    national security does not preclude the government from hon-
    oring the fundamental principles of justice. The government,
    having access to the secret information, can determine
    whether plaintiffs’ claims have merit and whether misjudg-
    ments or mistakes were made that violated plaintiffs’ human
    rights. Should that be the case, the government may be able
    to find ways to remedy such alleged harms while still main-
    taining the secrecy national security demands. For instance,
    the government made reparations to Japanese Latin Ameri-
    cans abducted from Latin America for internment in the
    United States during World War II. See Mochizuki v. United
    States, 
    43 Fed. Cl. 97
     (1999).13
    Second, Congress has the authority to investigate alleged
    wrongdoing and restrain excesses by the executive branch.14
    “The power of the Congress to conduct investigations is
    inherent in the legislative process.” Watkins v. United States,
    
    354 U.S. 178
    , 187 (1957); accord Eastland v. U.S. Service-
    13
    Other governments have committed to doing this. See, e.g., Prime
    Minister David Cameron, A Statement Given by the Prime Minister to the
    House of Commons on the Treatment of Terror Suspects (July 6, 2010),
    http://www.number10.gov.uk/news/statements-and-articles/2010/07/
    statement-on-detainees-52943 (“[W]e are committed to mediation with
    those who have brought civil claims about their detention in Guantanamo.
    And wherever appropriate, we will offer compensation.”).
    14
    In addition, Congress has constituted independent investigatory bodies
    within the executive branch. See, e.g., 50 U.S.C. § 403q (establishing the
    Office of Inspector General in the Central Intelligence Agency “to initiate
    and conduct independently inspections, investigations, and audits relating
    to programs and operations of the Agency”); see also Office of Inspector
    General, Central Intelligence Agency, Special Review: Counterterrorism
    Detention and Interrogation Activities (September 2001 — October 2003),
    May 7, 2004 (partially redacted), available at http://graphics8.
    nytimes.com/packages/pdf/politics/20090825-DETAIN/2004CIAIG.pdf.
    MOHAMED v. JEPPESEN DATAPLAN                     13555
    men’s Fund, 
    421 U.S. 491
    , 504 (1975). “Congress unques-
    tionably has . . . broad authority to investigate, to inform the
    public, and, ultimately, to legislate against suspected corrup-
    tion and abuse of power in the Executive Branch.” Nixon v.
    Adm’r of Gen. Servs., 
    433 U.S. 425
    , 498 (1977) (Powell, J.,
    concurring); see also Branzburg v. Hayes, 
    408 U.S. 665
    , 741
    (1972) (Stewart, J., dissenting) (“We have long recognized
    the value of the role played by legislative investigations
    . . . .”).
    Third, Congress also has the power to enact private bills.
    See Nixon v. Fitzgerald, 
    457 U.S. 731
    , 762 n.5 (1982) (Bur-
    ger, C.J., concurring) (“For uncompensated injuries Congress
    may in its discretion provide separate nonjudicial remedies
    such as private bills.”); Plaut v. Spendthrift Farm, Inc., 
    514 U.S. 211
    , 239 n.9 (1995) (“Private bills in Congress are still
    common, and were even more so in the days before establish-
    ment of the Claims Court.”); Office of Pers. Mgmt. v. Rich-
    mond, 
    496 U.S. 414
    , 431 (1990) (“Congress continues to
    employ private legislation to provide remedies in individual
    cases of hardship.”). Because as a general matter the federal
    courts are better equipped to handle claims, see Kosak v.
    United States, 
    465 U.S. 848
    , 867-69 (1984) (Stevens, J., dis-
    senting), Congress can refer the case to the Court of Federal
    Claims to make a recommendation before deciding whether to
    enact a private bill, see 
    28 U.S.C. § 1492
    ; see also Banfi
    Prods. Corp. v. United States, 
    40 Fed. Cl. 107
    , 109 (1997),
    although Congress alone will make the ultimate decision.
    When national security interests deny alleged victims of
    wrongful governmental action meaningful access to a judicial
    forum, private bills may be an appropriate alternative remedy.15
    15
    Proceedings in the Court of Federal Claims following congressional
    referral may pose some of the same problems that require dismissal here
    — the Court of Federal Claims must avoid disclosure of state secrets too.
    The referral proceedings might be less problematic than this lawsuit, how-
    ever, because, for example, the question of third-party liability would not
    be the focus: a private bill addresses compensation by the government, not
    13556              MOHAMED v. JEPPESEN DATAPLAN
    Fourth, Congress has the authority to enact remedial legis-
    lation authorizing appropriate causes of action and procedures
    to address claims like those presented here. When the state
    secrets doctrine “compels the subordination of appellants’
    interest in the pursuit of their claims to the executive’s duty
    to preserve our national security, this means that remedies for
    . . . violations that cannot be proven under existing legal stan-
    dards, if there are to be such remedies, must be provided by
    Congress. That is where the government’s power to remedy
    wrongs is ultimately reposed.” Halkin v. Helms, 
    690 F.2d at 1001
     (footnote omitted).
    VI.    CONCLUSION
    We, like the dissent, emphasize that it should be a rare case
    when the state secrets doctrine leads to dismissal at the outset
    of a case. Nonetheless, there are such cases — not just those
    subject to Totten’s per se rule, but those where the mandate
    for dismissal is apparent even under the more searching
    examination required by Reynolds. This is one of those rare
    cases.
    For all the reasons the dissent articulates — including the
    impact on human rights, the importance of constitutional pro-
    tections and the constraints of a judge-made doctrine — we
    do not reach our decision lightly or without close and skepti-
    cal scrutiny of the record and the government’s case for
    secrecy and dismissal. We expect our decision today to
    by third parties. In addition, Congress might tailor its referral to protect
    state secrets, by, for example, requiring the Court of Federal Claims to
    make its recommendation based solely on the plaintiffs’ own testimony
    and nonprivileged documents in the public domain. Moreover, Congress
    presumably possesses the power to restrict application of the state secrets
    privilege in the referral proceedings. Cf. Al-Haramain, 
    507 F.3d at
    1205-
    06 (remanding to the district court to consider whether the Foreign Intelli-
    gence Surveillance Act, 
    50 U.S.C. § 1806
    (f), preempts the state secrets
    privilege).
    MOHAMED v. JEPPESEN DATAPLAN                    13557
    inform district courts that Totten has its limits, that every
    effort should be made to parse claims to salvage a case like
    this using the Reynolds approach, that the standards for
    peremptory dismissal are very high and it is the district
    court’s role to use its fact-finding and other tools to full
    advantage before it concludes that the rare step of dismissal
    is justified. We also acknowledge that this case presents a
    painful conflict between human rights and national security.
    As judges, we have tried our best to evaluate the competing
    claims of plaintiffs and the government and resolve that con-
    flict according to the principles governing the state secrets
    doctrine set forth by the United States Supreme Court.
    [18] For the reasons stated, we hold that the government’s
    valid assertion of the state secrets privilege warrants dismissal
    of the litigation, and affirm the judgment of the district court.16
    The government shall bear all parties’ costs on appeal.
    AFFIRMED.
    BEA, Circuit Judge, concurring:
    I concur with Judge Fisher’s well-reasoned opinion and
    join fully in his result. I also concur with Judge Fisher’s anal-
    ysis with respect to United States v. Reynolds, 
    345 U.S. 1
    (1953). I write separately only because I would decide this
    case under Totten v. United States, 
    92 U.S. 105
    , 107 (1876).
    16
    We do not share the dissent’s confidence that the present proceedings
    come within Federal Rule of Civil Procedure 12(b)(6). Dissent 13559-60,
    13565. Reynolds necessarily entails consideration of materials outside the
    pleadings: at minimum, the Reynolds analysis requires the court to review
    the government’s formal claim of privilege. That fact alone calls into
    question reliance on Rule 12(b)(6). See Lee v. City of Los Angeles, 
    250 F.3d 668
    , 688 (9th Cir. 2001).
    13558           MOHAMED v. JEPPESEN DATAPLAN
    The Totten bar requires our courts to dismiss cases “where
    the very subject matter of the action” is “a matter of state
    secret.” Reynolds, 
    345 U.S. at
    11 n.26. In this case, every
    claim in the Plaintiffs’ complaint is based on the allegation
    that officials of the United States government arrested and
    detained Plaintiffs and subjected them to specific interroga-
    tion techniques. Those alleged facts, not merely Jeppesen’s
    role in such activities, are a matter of state secret.
    HAWKINS,         Circuit  Judge, with whom Judges
    SCHROEDER, CANBY, THOMAS, and PAEZ, Circuit
    Judges, join, dissenting:
    A Flawed Procedure
    I agree with my colleagues in the majority that United
    States v. Reynolds, 
    345 U.S. 1
     (1953), is a rule of evidence,
    requiring courts to undertake a careful review of evidence that
    might support a claim or defense to determine whether either
    could be made without resort to legitimate state secrets. I part
    company concerning when and where that review should take
    place.
    The majority dismisses the case in its entirety before Jep-
    pesen has even filed an answer to Plaintiffs’ complaint. Out-
    side of the narrow Totten context, the state secrets privilege
    has never applied to prevent parties from litigating the truth
    or falsity of allegations, or facts, or information simply
    because the government regards the truth or falsity of the alle-
    gations to be secret. Within the Reynolds framework, dis-
    missal is justified if and only if specific privileged evidence
    is itself indispensable to establishing either the truth of the
    plaintiffs’ allegations or a valid defense that would otherwise
    be available to the defendant. See, e.g., Kasza v. Browner, 
    133 F.3d 1159
    , 1166 (9th Cir. 1998).
    MOHAMED v. JEPPESEN DATAPLAN                      13559
    This is important, because an approach that focuses on spe-
    cific evidence after issues are joined has the benefit of confin-
    ing the operation of the state secrets doctrine so that it will
    sweep no more broadly than clearly necessary. The state
    secrets doctrine is a judicial construct without foundation in
    the Constitution, yet its application often trumps what we
    ordinarily consider to be due process of law. This case now
    presents a classic illustration. Plaintiffs have alleged facts,
    which must be taken as true for purposes of a motion to dis-
    miss, that any reasonable person would agree to be gross vio-
    lations of the norms of international law, remediable under the
    Alien Tort Statute. They have alleged in detail Jeppesen’s
    complicity or recklessness in participating in these violations.
    The government intervened, and asserted that the suit would
    endanger state secrets. The majority opinion here accepts that
    threshold objection by the government, so Plaintiffs’ attempt
    to prove their case in court is simply cut off. They are not
    even allowed to attempt to prove their case by the use of non-
    secret evidence in their own hands or in the hands of third
    parties.
    It is true that, judicial construct though it is, the state
    secrets doctrine has become embedded in our controlling
    decisional law. Government claims of state secrets therefore
    must be entertained by the judiciary. But the doctrine is so
    dangerous as a means of hiding governmental misbehavior
    under the guise of national security, and so violative of com-
    mon rights to due process, that courts should confine its appli-
    cation to the narrowest circumstances that still protect the
    government’s essential secrets.1 When, as here, the doctrine is
    1
    Abuse of the Nation’s information classification system is not unheard
    of. Former U.S. Solicitor General Erwin Griswold, who argued the gov-
    ernment’s case in the Pentagon Papers matter, later explained in a Wash-
    ington Post editorial that “[i]t quickly becomes apparent to any person
    who has considerable experience with classified material that there is mas-
    sive overclassification, and that the principal concern of the classifiers is
    not with national security, but rather with governmental embarrassment of
    13560              MOHAMED v. JEPPESEN DATAPLAN
    successfully invoked at the threshold of litigation, the claims
    of secret are necessarily broad and hypothetical. The result is
    a maximum interference with the due processes of the courts,
    on the most general claims of state secret privilege. It is far
    better to require the government to make its claims of state
    secrets with regard to specific items of evidence or groups of
    such items as their use is sought in the lawsuit. An official
    certification that evidence is truly a state secret will be more
    focused if the head of a department must certify that specific
    evidence sought in the course of litigation is truly a secret and
    cannot be revealed without danger to overriding, essential
    government interests. And when responsive pleading is com-
    plete and discovery under way, judgments as to whether
    secret material is essential to Plaintiffs’ case or Jeppesen’s
    defense can be made more accurately.
    one sort or another.” Erwin N. Griswold, Secrets Not Worth Keeping: the
    Courts and Classified Information, Wash. Post, Feb. 15, 1989, at A25.
    Former Attorney General Herbert Brownell similarly complained in a
    1953 letter to President Eisenhower that classification procedures were
    then “so broadly drawn and loosely administered as to make it possible for
    government officials to cover up their own mistakes and even their wrong-
    doing under the guise of protecting national security.” Letter from Attor-
    ney General Herbert Brownell to President Dwight Eisenhower (June
    15,1953) (quoted in Kenneth R. Mayer, With the Stroke of a Pen: Execu-
    tive Orders and Presidential Power 145 (2001)).
    Even in Reynolds, avoidance of embarrassment—not preservation of
    state secrets—appears to have motivated the Executive’s invocation of the
    privilege. There the Court credited the government’s assertion that “this
    accident occurred to a military plane which had gone aloft to test secret
    electronic equipment,” and that “there was a reasonable danger that the
    accident investigation report would contain references to the secret elec-
    tronic equipment which was the primary concern of the mission.” 
    345 U.S. at 10
    . In 1996, however, the “secret” accident report involved in that case
    was declassified. A review of the report revealed, not “details of any secret
    project the plane was involved in,” but “[i]nstead, . . . a horror story of
    incompetence, bungling, and tragic error.” Garry Wills, Why the Govern-
    ment Can Legally Lie, 56 N.Y. Rev. of Books 32, 33 (2009). Courts
    should be concerned to prevent a concentration of unchecked power that
    would permit such abuses.
    MOHAMED v. JEPPESEN DATAPLAN                      13561
    By refusing to examine the voluminous public record mate-
    rials submitted by Plaintiffs in support of their claims,2 and by
    failing to undertake an analysis of Jeppesen’s ability to defend
    against those claims, the district court forced every judge of
    the court of appeals to undertake that effort. This was no
    small undertaking. Materials the government considers top
    secret had to be moved securely back and forth across the
    country and made available in a “cone of silence” environ-
    ment to first the three-judge panel assigned the case and then
    the twenty-seven active judges of this court to evaluate
    whether the case merited en banc consideration. This quite lit-
    erally put the cart before the horse, depriving a reviewing
    court of a record upon which its traditional review function
    could be carried out.3 This is more than a matter of conve-
    nience. Making factual determinations is the particular prov-
    ince of trial courts and for sound reason: they are good at it.
    Not directing the district court to do that work sends exactly
    the wrong message in the handling of these critical and sensi-
    tive cases. Finding remand “unnecessary,” as the majority
    does here, [Maj. Op. at 13546, n.10], not only rewards district
    courts for failing to do their job, but ensures that future
    appeals courts will have to do that job for them.4
    This is an appeal from a Rule 12 dismissal, which means
    that the district court was required to assume that the well-
    pleaded allegations of the complaint are true, and that we
    2
    A summary of the some 1,800 pages of that information appears as an
    Appendix to this dissent.
    3
    In another context, the Supreme Court has pointed out the structural
    problems created when appellate courts are presented with undeveloped
    records. Johnson v. Jones, 
    515 U.S. 304
    , 309, 316-17 (1998).
    4
    I have confidence in the ability of district judges to make such determi-
    nations, and in the process of handling information which the government
    considers secret. Dismissing this suit out of fear of “compelled or inadver-
    tent disclosure” of secret information during the course of litigation, [Maj.
    Op. at 13545], assumes that the government might make mistakes in what
    it produces, or that district courts might compel the disclosure of docu-
    ments legitimately covered by the state secrets privilege.
    13562               MOHAMED v. JEPPESEN DATAPLAN
    “construe the complaint in the light most favorable to the
    plaintiff[s].” Doe v. United States, 
    419 F.3d 1058
    , 1062 (9th
    Cir. 2005). The majority minimizes the importance of these
    requirements by gratuitously attaching “allegedly” to nearly
    each sentence describing what Plaintiffs say happened to
    them, and by quickly dismissing the voluminous publicly
    available evidence supporting those allegations, including that
    Jeppesen knew what was going on when it arranged flights
    described by one of its own officials as “torture flights.”5
    Instead, the majority assumes that even if Plaintiffs’ prima
    facie case and Jeppesen’s defense did not depend on privi-
    leged evidence, dismissal is required “because there is no fea-
    sible way to litigate Jeppesen’s alleged liability without
    creating an unjustifiable risk of divulging state secrets.” [Maj.
    Op. at 13548]. But Jeppesen has yet to answer or even to oth-
    erwise plead, so we have no idea what those defenses or
    assertions might be. Making assumptions about the contours
    of future litigation involves mere speculation, and doing so
    flies straight in the face of long standing principles of Rule 12
    law by extending the inquiry to what might be divulged in
    future litigation.6
    5
    According to the sworn declaration of former Jeppesen employee Sean
    Belcher, the Director of Jeppesen International Trip Planning Services,
    Bob Overby, told him, “ ‘We do all the extraordinary rendition flights,’ ”
    which he also referred to as “ ‘the torture flights’ ” or “spook flights.” Bel-
    cher stated that “there were some employees who were not comfortable
    with that aspect of Jeppesen’s business” because they knew “ ‘some of
    these flights end up’ ” with the passengers being tortured. He noted that
    Overby had explained, “ ‘that’s just the way it is, we’re doing them’ ”
    because “the rendition flights paid very well.”
    6
    See 5 Charles A. Wright & Arthur R. Miller, Federal Practice and
    Procedure § 1356 (3d ed. 2010) (Rule 12(b)(6) inquiries are “essentially
    . . . limited to the content of the complaint”); see also Tellabs, Inc. v.
    Makor Issues & Rights, Ltd., 
    551 U.S. 308
    , 322-23 (2007) (listing permis-
    sible evidence to consider in a 12(b)(6) motion, with no mention of pro-
    spective evidence, and with emphasis on an examination of the
    “underlying facts”); Williston Basin Interstate Pipeline Co. v. An Exclu-
    sive Gas Storage Leasehold & Easement in the Cloverly Subterranean
    Geological Formation, 
    524 F.3d 1090
    , 1096 (9th Cir. 2008) (the court
    MOHAMED v. JEPPESEN DATAPLAN                      13563
    We should have remanded this matter to district court to do
    the Reynolds work that should have been done in the first
    place.
    Because of this fundamental defect in the posture of this
    matter, the remainder of the dissent focuses on the scope of
    the state secrets privilege rather than its application to specu-
    lative facts.
    The Totten Bar
    While it chooses not to apply it, the majority correctly
    recites the general interpretation of the non-justiciability bar
    of Totten v. United States, 
    92 U.S. 105
     (1876).7 However, its
    definition of Totten’s scope—applying to “any case in which
    ‘the very subject matter of the action’ is ‘a matter of state
    secret’ ”[Maj. Op. at 13531]—and the concurrence’s full-
    blown embrace of its application here merit response.
    Courts have applied the Totten bar in one of two scenarios:
    (1) The plaintiff is party to a secret agreement with the govern-
    ment;8 or (2) The plaintiff sues to solicit information from the
    government on a “state secret” matter.9 See Weinberger v.
    may consider in a 12(b)(6) motion “only allegations contained in the
    pleadings, exhibits attached to the complaint, and matters properly subject
    to judicial notice”) (citing Outdoor Media Grp., Inc. v. City of Beaumont,
    
    506 F.3d 895
    , 899-900 (9th Cir. 2007)).
    7
    See, e.g., Wilson v. Libby, 
    535 F.3d 697
    , 710 (D.C. Cir. 2008) (discuss-
    ing “the justiciability doctrine of Totten v. United States”); Am. Civil Lib-
    erties Union v. Nat’l Sec. Agency, 
    493 F.3d 644
    , 650 n.2 (6th Cir. 2007)
    (the Totten rule is a “rule of non-justiciability”); Al-Haramain Islamic
    Found., Inc. v. Bush, 
    507 F.3d 1190
    , 1197 (9th Cir. 2007) (the Totten rule
    is “a rule of non-justiciability, akin to a political question”).
    8
    Totten itself involved the estate of a former Civil War spy seeking
    compensation. 
    92 U.S. 105
    . See also Tenet v. Doe, 
    544 U.S. 1
    , 10 (2005)
    (suit against CIA director for failure to provide financial compensation for
    Cold War services).
    9
    This category of Totten-bar cases is distinct from those involving a
    plaintiff’s attempt to solicit information from the government via the Free-
    13564              MOHAMED v. JEPPESEN DATAPLAN
    Catholic Action of Hawaii/Peace Educ. Project, 
    454 U.S. 139
    , 146 (1981) (Totten bar applies to suit against the United
    States Navy for failure to file an environmental impact state-
    ment regarding a “nuclear capable” facility where Navy
    would have to admit or deny proposed storage of nuclear
    weapons at the facility). More generally, the Totten bar has
    been applied to suits against the government, and never to a
    plaintiff’s suit against a third-party/non-governmental entity.
    Here, the “very subject matter” of this lawsuit is Jeppesen’s
    involvement in an overseas detention program. Plaintiffs are
    neither parties to a secret agreement with the government, nor
    are they attempting, as the result of this lawsuit, to solicit
    information from the government on a “state secret” matter.
    Rather, they are attempting to remedy “widespread violations
    of individual constitutional rights” occurring in a program
    whose existence has been made public. See Hepting v. AT&T,
    
    439 F. Supp. 2d 974
    , 993 (N.D. Cal. 2006).
    Totten’s logic simply cannot be stretched to encompass the
    claims here, as they are brought by third-party plaintiffs
    against non-government defendant actors for their involve-
    dom of Information Act (FOIA). Weinberger, which has a FOIA element,
    was decided on FOIA grounds and Totten grounds, and relevant here is the
    Totten-related decision. See Weinberger v. Catholic Action of
    Hawaii/Peace Educ. Project, 
    454 U.S. 139
    , 146 (1981). The FOIA cases
    are easily distinguishable. The FOIA cases entail litigation for the sole and
    independent purpose of obtaining disclosure of classified information. See
    
    5 U.S.C. § 552
    (a)(4)(B); see also, e.g., Alfred A. Knopf, Inc. v. Colby, 
    509 F.2d 1362
    , 1370 (4th Cir. 1975) (addressing the court’s authority under
    FOIA to order the disclosure of classified information for publication in
    a book). While “an informed citizenry [is] vital to the functioning of a
    democratic society,” Dep’t of Interior v. Klamath Water Users Protective
    Ass’n, 
    532 U.S. 1
    , 16 (2001) (internal quotations omitted), the balance of
    interests will more often tilt in favor of the Executive when disclosure is
    the primary end in and of itself. FOIA therefore predictably entails greater
    deference to the national classification system than does the state secrets
    doctrine.
    MOHAMED v. JEPPESEN DATAPLAN                      13565
    ment in tortious activities.10 Nothing Plaintiffs have done sup-
    ports a conclusion that their “lips [are] to be for ever sealed
    respecting” the claim on which they sue, such that filing this
    lawsuit would in itself defeat recovery. See Totten, 
    92 U.S. at 106
    .
    Instead of “avoid[ing] difficult questions about the precise
    scope of the Totten bar” [Maj. Op. at 13543], the majority
    ought to have found the Totten bar inapplicable, and rejected
    the district court’s analysis.11 Totten cannot and does not
    apply to Plaintiffs’ claims.
    The Reynolds Evidentiary Privilege
    The majority correctly describes Reynolds as a rule of evi-
    dence, which only the government may assert. [Maj. at
    13534-35]. However, Reynolds cannot, as the majority con-
    tends, be asserted during the pleading stage to excise entire
    allegations.
    The majority argues that because pleadings can serve as
    evidence, see Huey v. Honeywell, Inc., 
    82 F.3d 327
    , 333 (9th
    Cir. 1996); Lockwood v. Wolf Corp., 
    629 F.2d 603
    , 611 (9th
    Cir. 1980), the state secrets privilege “may be asserted at any
    time, even at the pleading stage.” [Maj. Op. at 13535-36].
    10
    See Terkel v. AT&T Corp., 
    441 F. Supp. 2d 899
    , 907 (N.D. III. 2006)
    (refusing to apply Totten because “the plaintiffs in this case were not par-
    ties to the alleged contract nor did they agree to its terms; rather, they
    claim that the performance of an alleged contract entered into by others
    would violate their statutory rights”); Am. Civil Liberties Union v. Nat’l
    Sec. Agency, 
    438 F. Supp. 2d 754
    , 763 (E.D. Mich. 2006) (refusing to
    apply Totten because it “applies [only] to actions where there is a secret
    espionage relationship between the Plaintiff and the Government”),
    vacated on other grounds, 
    493 F.3d 644
     (6th Cir. 2007).
    11
    Nor can the choice to affirm the district court under Reynolds be justi-
    fied as an affirmance on “any basis supported by the record.” [Maj. Op.
    at 13543]. The result the majority seeks here, a dismissal of Plaintiffs’
    case in its entirety, is not supported by the case law.
    13566           MOHAMED v. JEPPESEN DATAPLAN
    Thus, the majority argues, this court would be incorrect to
    conclude that neither the Federal Rules nor Reynolds would
    permit us to dismiss this case at the pleadings stage on the
    basis of an evidentiary privilege that must be invoked during
    discovery or at trial. In the majority’s view, the privilege
    applies at the pleadings stage in such a manner that permits
    it to remove from a complaint any allegations where “secret
    and nonsecret information cannot be separated.” [Maj. Op. at
    13538].
    Whatever validity there may be to the idea that evidentiary
    privileges can apply at the pleadings stage, it is wrong to sug-
    gest that such an application would permit the removal of
    entire allegations resulting in out-and-out dismissal of the
    entire suit. Instead, the state secrets privilege operates at the
    pleadings stage to except from the implications of Rule
    8(b)(6) the refusal to answer certain allegations, not, as the
    government contends, to permit the government or Jeppesen
    to avoid filing a responsive pleading at all. [Maj. Op. at
    13544-45]. In the Fifth Amendment context, the Fourth Cir-
    cuit has explained that the privilege against self-incrimination
    “protects an individual . . . from answering specific allega-
    tions in a complaint or filing responses to interrogatories in a
    civil action where the answers” would violate his rights under
    the privilege. N. River Ins. Co., Inc. v. Stefanou, 
    831 F.2d 484
    , 486-87 (4th Cir. 1987). Accordingly, “when properly
    invoked, the fifth amendment privilege against self-
    incrimination . . . can avoid the operation of Rule [8(b)(6)].”
    
    Id. at 487
    .
    But a proper invocation of the privilege does not excuse a
    defendant from the requirement to file a responsive pleading;
    the obligation is to answer those allegations that can be
    answered and to make a specific claim of the privilege as to
    the rest, so the suit can move forward. 
    Id.
     (citing 5 C. Wright
    & A. Miller, Federal Practice and Procedure § 1280, at 360
    (1969)).
    MOHAMED v. JEPPESEN DATAPLAN                      13567
    According to this rationale, Plaintiffs are correct that the
    government moving forward may assert the state secrets privi-
    lege to prevent Jeppesen from answering any allegations,
    where the answer would constitute evidence properly pro-
    tected by the privilege. But, recognizing that the privilege
    may apply at the pleadings stage to prevent defendants from
    answering certain allegations vis-a-vis operation of Rule
    8(b)(6) does not mean the privilege can be used to remove
    altogether certain subject matters from a lawsuit. Observing
    that pleadings may constitute evidence, in other words, does
    not transform an evidentiary privilege into an immunity doc-
    trine.12 The state secrets privilege, as an evidentiary privilege,
    12
    It is not at all clear that the Reynolds privilege can be asserted at the
    pleading stage, as the majority claims. [See Maj. Op. at 13535]. Ellsberg
    v. Mitchell, 
    709 F.2d 51
    , 52 (D.C. Cir. 1983), on which the majority relies,
    involved the formal claim of state secrets privilege entered by the United
    States in opposition to the plaintiffs’ motion to compel discovery and,
    while the opinion references the government’s amended answer to the
    complaint in a footnote, it focuses centrally on the refusal of the defen-
    dants “to respond to any of the plaintiffs’ remaining allegations or ques-
    tions” as presented in the plaintiffs’ submitted interrogatories. 
    Id.
     at 53-54
    & n.6. In Black v. United States, 
    62 F.3d 1115
    , 1117 (8th Cir. 1995), on
    which the majority also relies, the Eighth Circuit dismissed a suit against
    the CIA by an electrical engineer with government security clearances at
    the pleading stage because the main information Black sought in his com-
    plaint, which would “confirm or deny Black’s alleged contacts with gov-
    ernment officers,” was the basis of Black’s claim. Without it, his suit
    could not go forward. Here, where Plaintiffs arguably have ample public
    information to proceed with their suit, we do not have such a cut-and-dried
    case of privilege. [See Dissent App’x].
    Moreover, pleadings are not considered evidence. See United States v.
    Zermeno, 
    66 F.3d 1058
    , 1062 (9th Cir. 1995) (“The government’s asser-
    tions in its pleadings are not evidence.”); S. Pac. Co. v. Conway, 
    115 F.2d 746
    , 750 (9th Cir. 1940) (“[T]he office of a pleading is to state ultimate
    facts and not evidence of such facts.”). If the government is seeking to
    excise entire allegations with the invocation of the privilege at the plead-
    ing stage, such an invocation would require an assertion that the very sub-
    ject matter of the lawsuit is a state secret, and not the assertion of an
    evidentiary privilege. See Moliero v. FBI, 
    749 F.2d 815
    , 821 (D.C. Cir.
    1984) (where “the whole object of the suit and of the discovery is to estab-
    13568               MOHAMED v. JEPPESEN DATAPLAN
    is relevant not to the sufficiency of the complaint, but only to
    the sufficiency of evidence available to later substantiate the
    complaint.
    Because the Reynolds privilege, like any other evidentiary
    privilege, “ ‘extends only to [evidence] and not to facts,’ ”
    Upjohn Co. v. United States, 
    449 U.S. 383
    , 395-96 (1981)
    (quoting Philadelphia v. Westinghouse Elec. Corp., 
    205 F. Supp. 830
    , 831 (E.D. Pa. 1962)), it cannot be invoked to pre-
    vent a litigant from persuading a jury of the truth or falsity of
    an allegation by reference to non-privileged evidence, regard-
    less whether privileged evidence might also be probative of
    the truth or falsity of the allegation.13
    lish a fact that is a state secret,” compliance with discovery as a whole can
    be “excused in gross, without the necessity of examining individual docu-
    ments”); cf. Al-Haramain, 
    507 F.3d at 1197
     (applying Reynolds directly
    to evidence—a sealed document—where privilege was asserted in
    response to government’s accidental disclosure of documents to the plain-
    tiffs, and declining to find “the very subject matter” of the suit to be a state
    secret). Here, while the majority declines to reach the Totten bar question,
    the “very subject matter” of this lawsuit—Jeppesen’s involvement in an
    overseas detention program—has been publicly acknowledged and is not
    a state secret.
    13
    Contrary to the majority’s assertion, the Reynolds privilege cannot be
    asserted prospectively, without an examination of the evidence on an item-
    by-item basis. To conclude that Reynolds, like Totten, applies to prevent
    the litigation of allegations, rather than simply discovery of evidence,
    would be to erode the distinction between the two versions of the doctrine.
    Moreover, the Eighth Circuit case on which the majority relies, Black, 
    62 F.3d at 1117
    , was ultimately not a prospective assertion of the Reynolds
    privilege. While the government asserted the privilege in response to the
    plaintiff’s amended complaint, ultimately, the privilege was asserted as to
    one piece of information, without which the plaintiff could not proceed;
    he could not bring an intentional infliction of emotional distress claim
    against the CIA without information about any existing contacts with gov-
    ernment officers. 
    Id.
     The information on his contacts, which the plaintiff
    attempted to solicit via his complaint, was privileged. 
    Id.
     To say Black
    permits the assertion of the Reynolds privilege in the pleading stage is to
    misstate its holding.
    MOHAMED v. JEPPESEN DATAPLAN                      13569
    Reynolds and Rule 12(b)(6)
    The majority claims there is “no feasible way to litigate
    Jeppesen’s alleged liability without creating an unjustifiable
    risk of divulging state secrets,”14 [Maj. Op. at 13548], ignor-
    ing well-established principles of civil procedure which, at
    this stage of the litigation, do not permit the prospective eval-
    uation of hypothetical claims of privilege that the government
    has yet to raise and the district court has yet to consider.
    Our task in reviewing the grant of a Rule 12 motion to dis-
    miss “is necessarily a limited one.” Scheuer v. Rhodes, 
    416 U.S. 232
    , 236 (1974). We are not to determine whether a par-
    ticular party will ultimately prevail, but instead only whether
    the complaint “state[s] a claim upon which relief can be grant-
    ed,” Fed. R. Civ. Pro. 12(b)(6). If Plaintiffs here have stated
    a claim on which relief can be granted, they should have an
    opportunity to present evidence in support of their allegations,
    without regard for the likelihood of ultimate success. See Sch-
    euer, 
    416 U.S. at 236
     (a district court acts “prematurely” and
    “erroneously” when it dismisses a well-pleaded complaint,
    thereby “preclud[ing] any opportunity for the plaintiffs” to
    establish their case “by subsequent proof”); see also Bell Atl.
    Corp. v. Twombly, 
    550 U.S. 544
    , 556 (2007) (“[A] well-
    pleaded complaint may proceed even if it appears ‘that a
    14
    The majority cites El-Masri v. United States, 
    479 F.3d 296
    , 308-13
    (4th Cir. 2007), as a comparable case wherein the court found further liti-
    gation risked disclosure of state secrets and threatened grave harm to
    American national security. [Maj. Op. at 13548, citing El-Masri, 
    479 F.3d at 312
    ]. However, noting that the Fourth Circuit appears to have “merged
    the concept of ‘subject matter’ with the notion of proof of a prima facie
    case,” this court in Al-Haramain expressly rejected El-Masri’s logic. 
    507 F.3d at 1201
    . In the Ninth Circuit, “the ‘subject matter’ of a lawsuit [is not
    necessarily] one and the same [as] the facts necessary to litigate the case.”
    
    Id.
     Accordingly, “[b]ecause the Fourth Circuit has accorded an expansive
    meaning to the ‘subject matter’ of an action, one that we have not adopted,
    El-Masri does not support dismissal based on the subject matter of the
    suit.” 
    Id.
    13570              MOHAMED v. JEPPESEN DATAPLAN
    recovery is very remote and unlikely.’ ” (quoting Scheuer,
    
    416 U.S. at 236
    )).
    This limited inquiry—a long-standing feature of the Rules
    of Civil Procedure—serves a sensible judicial purpose. We
    simply cannot resolve whether the Reynolds evidentiary privi-
    lege applies without (1) an actual request for discovery of spe-
    cific evidence, (2) an explanation from Plaintiffs of their need
    for the evidence, and (3) a formal invocation of the privilege
    by the government with respect to that evidence, explaining
    why it must remain confidential. See Reynolds, 
    345 U.S. at
    8-
    9 (“the principles which control the application of the privi-
    lege” require a “formal claim of privilege” by the government
    with respect to the challenged evidence); 
    id. at 10-11
     (the
    court must consider the litigants’ “showing of necessity” for
    the requested evidence in determining whether “the occasion
    for invoking the privilege is appropriate”). Nor can we deter-
    mine whether the parties will be able to establish their cases
    without use of privileged evidence without also knowing what
    non-privileged evidence they will marshal. See Crater Corp.
    v. Lucent Techs., Inc., 
    423 F.3d 1260
    , 1267-68 (Fed. Cir.
    2005) (“deciding the impact of the government’s assertion of
    the state secrets privilege” before the record is “adequately
    developed” puts “the cart before the horse”). Thus neither the
    Federal Rules nor Reynolds would permit us to dismiss this
    case for “failure to state a claim upon which relief can be
    granted,” Fed. R. Civ. Pro. 12(b)(6), on the basis of an evi-
    dentiary privilege relevant, not to the sufficiency of the com-
    plaint, but only to the sufficiency of evidence available to
    later substantiate the complaint.15
    15
    While the government styled its motion below as a “Motion to Dis-
    miss or, in the Alternative, for Summary Judgment,” the district court did
    not grant summary judgment, but rather dismissal—and it could not have
    done otherwise. A party is entitled to summary judgment only if “the
    pleadings, the discovery and disclosure materials on file, and any affida-
    vits show that there is no genuine issue as to any material fact.” Fed. R.
    Civ. Pro. 56(c). Here, because Jeppesen has not even answered the com-
    MOHAMED v. JEPPESEN DATAPLAN                      13571
    A decision to remand would have the additional benefit of
    conforming with “the general rule . . . that a federal appellate
    court does not consider an issue not passed on below,” and
    will allow the district court to apply Reynolds in the first
    instance. See Singleton v. Wulff, 
    428 U.S. 106
    , 120 (1976);
    see also Johnson v. California, 
    543 U.S. 499
    , 515 (2005) (cit-
    ing Consol. Rail Corp. v. Gottshall, 
    512 U.S. 532
    , 557-58
    (1994) (reversing and remanding for the lower court to apply
    the correct legal standard in the first instance)).
    The majority’s analysis here is premature. This court
    should not determine that there is no feasible way to litigate
    Jeppesen’s liability without disclosing state secrets; such a
    determination is the district court’s to make once a responsive
    pleading has been filed, or discovery requests made. We
    should remand for the government to assert the privilege with
    respect to secret evidence, and for the district court to deter-
    mine what evidence is privileged and whether any such evi-
    dence is indispensable either to Plaintiffs’ prima facie case or
    to a valid defense otherwise available to Jeppesen. Only if
    privileged evidence is indispensable to either party should it
    dismiss the complaint.
    Conclusion
    The majority concludes its opinion with a recommendation
    of alternative remedies. Not only are these remedies insuffi-
    plaint, it is uncertain which allegations are in dispute, much less which
    disputes might raise genuine issues of material fact.
    The procedural posture of this case thus differs fundamentally from that
    in Kasza, which involved a grant of summary judgment. See Frost v.
    Perry, 
    191 F. Supp. 1459
    , 1465-67 (D. Nev. 1996), aff’d sub nom Kasza,
    
    133 F.3d 1159
     (granting summary judgment because “the privilege, as
    invoked, covered various items of discovery requested by Plaintiffs,”
    including “various photographic exhibits” and “under seal . . . affidavits,”
    and therefore “Plaintiffs have failed to establish a genuine issue as to any
    material fact without running afoul of the military and state secrets privi-
    lege”).
    13572           MOHAMED v. JEPPESEN DATAPLAN
    cient, but their suggestion understates the severity of the con-
    sequences to Plaintiffs from the denial of judicial relief.
    Suggesting, for example, that the Executive could “honor[ ]
    the fundamental principles of justice” by determining
    “whether plaintiffs’ claims have merit,” [see Maj. Op. at
    13554] disregards the concept of checks and balances. Permit-
    ting the executive to police its own errors and determine the
    remedy dispensed would not only deprive the judiciary of its
    role, but also deprive Plaintiffs of a fair assessment of their
    claims by a neutral arbiter. The majority’s suggestion of pay-
    ment of reparations to the victims of extraordinary rendition,
    such as those paid to Japanese Latin Americans for the injus-
    tices suffered under Internment during World War II, over
    fifty years after those injustices were suffered [Maj. Op. at
    13554], elevates the impractical to the point of absurdity.
    Similarly, a congressional investigation, private bill, or enact-
    ing of “remedial legislation,” [Maj. Op. at 13556], leaves to
    the legislative branch claims which the federal courts are bet-
    ter equipped to handle. See Kosak v. United States, 
    465 U.S. 848
    , 867 (1984) (Stevens, J., dissenting).
    Arbitrary imprisonment and torture under any circumstance
    is a “ ‘gross and notorious . . . act of despotism.’ ” Hamdi v.
    Rumsfeld, 
    542 U.S. 507
    , 556 (2004) (Scalia, J., dissenting)
    (quoting 1 Blackstone 131-33 (1765)). But “ ‘confinement
    [and abuse] of the person, by secretly hurrying him to
    [prison], where his sufferings are unknown or forgotten; is a
    less public, a less striking, and therefore a more dangerous
    engine of arbitrary government.’ ” 
    Id.
     (Scalia, J., dissenting)
    (quoting 1 Blackstone 131-33 (1765)) (emphasis added).
    I would remand to the district court to determine whether
    Plaintiffs can establish the prima facie elements of their
    claims or whether Jeppesen could defend against those claims
    without resort to state secrets evidence.
    

Document Info

Docket Number: 08-15693

Filed Date: 9/8/2010

Precedential Status: Precedential

Modified Date: 2/19/2016

Authorities (51)

CITY OF PHILADELPHIA, PENNSYLVANIA v. Westinghouse Electric ... , 205 F. Supp. 830 ( 1962 )

Lawrence M. Bareford, Individually v. General Dynamics ... , 973 F.2d 1138 ( 1992 )

khaled-el-masri-v-united-states-of-america-intervenor-appellee-and , 39 A.L.R. Fed. 2d 597 ( 2007 )

J.B.C. Lockwood, Jr., Successor to Sanford M. Sage, Trustee ... , 629 F.2d 603 ( 1980 )

Tenet v. Doe , 125 S. Ct. 1230 ( 2005 )

Hepting v. AT & T Corp. , 439 F. Supp. 2d 974 ( 2006 )

95-cal-daily-op-serv-7472-95-daily-journal-dar-12795-united-states , 66 F.3d 1058 ( 1995 )

Branzburg v. Hayes , 92 S. Ct. 2646 ( 1972 )

Upjohn Co. v. United States , 101 S. Ct. 677 ( 1981 )

Singleton v. Wulff , 96 S. Ct. 2868 ( 1976 )

Central Intelligence Agency v. Sims , 105 S. Ct. 1881 ( 1985 )

Plaut v. Spendthrift Farm, Inc. , 115 S. Ct. 1447 ( 1995 )

Kosak v. United States , 104 S. Ct. 1519 ( 1984 )

Tarkel v. at & T Corp. , 441 F. Supp. 2d 899 ( 2006 )

mary-sanders-lee-individually-and-as-the-conservator-for-the-estate-of , 250 F.3d 668 ( 2001 )

james-w-fitzgerald-v-penthouse-international-ltd-meredith-printing , 776 F.2d 1236 ( 1985 )

john-doe-and-jane-doe-v-george-j-tenet-individually-and-as-director-of , 329 F.3d 1135 ( 2003 )

Scheuer v. Rhodes , 94 S. Ct. 1683 ( 1974 )

Office of Personnel Management v. Richmond , 110 S. Ct. 2465 ( 1990 )

American Civil Liberties Union v. National Security Agency , 16 A.L.R. Fed. 2d 749 ( 2006 )

View All Authorities »