Doe v. Federal Democratic Republic of Ethiopia , 189 F. Supp. 3d 6 ( 2016 )


Menu:
  •                                UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    JOHN DOE, a.k.a. KIDANE,
    Plaintiff,
    v.
    Civil Action No. 14-372 (RDM)
    FEDERAL DEMOCRATIC REPUBLIC OF
    ETHIOPIA,
    Defendant.
    MEMORANDUM OPINION AND ORDER
    The central question presented in this case is whether federal law permits the plaintiff, a
    U.S. citizen born in Ethiopia who remains active in the Ethiopian diaspora, to maintain suit in
    this Court against the Federal Democratic Republic of Ethiopia for its alleged surreptitious
    monitoring and recording of his (and his family’s) computer activities and communications in
    Silver Spring, Maryland. Plaintiff claims that, in doing so, Ethiopia violated Title III of the
    Omnibus Crime Control and Safe Streets Act of 1968 (“Wiretap Act”), 18 U.S.C. § 2510 et seq.,
    and committed the common law tort of “intrusion upon seclusion” in violation of Maryland law.
    Ethiopia has appeared, but moves to dismiss on numerous grounds.
    As explained below, the Court concludes that the Wiretap Act does not create a private
    cause of action against a foreign state and that the plaintiff’s state-law tort claim is barred by the
    Foreign Sovereign Immunities Act (“FSIA”), 28 U.S.C. §§ 1602–1611. The Court, accordingly,
    GRANTS Ethiopia’s motion and dismisses the amended complaint.
    I. BACKGROUND
    For present purposes, the Court accepts at true the allegations of the amended complaint,
    along with the incorporated material. 1 See Price v. Socialist People’s Libyan Arab Jamahiriya,
    
    294 F.3d 82
    , 93 (D.C. Cir. 2002) (when reviewing “a plaintiff’s unchallenged factual allegations
    to determine whether they are sufficient to deprive a foreign state defendant of sovereign
    immunity, [the court must] assume those allegations to be true” (citations omitted)); Gordon v.
    United States Capitol Police, 
    778 F.3d 158
    , 163–64 (D.C. Cir. 2015) (under Federal Rule of
    Civil Procedure 12(b)(6), the court “must accept the complaint’s allegations as true and draw all
    reasonable inferences in favor of the non-moving party”).
    Plaintiff John Doe, who uses the pseudonym “Kidane” in connection with his political
    activities, is a U.S. citizen who was born in Ethiopia and has lived in the United States since
    obtaining asylum in the early 1990s. Dkt. 1-1 ¶ 3; Dkt. 26 at ¶¶ 3, 19, 20. At all relevant times,
    Kidane resided in Silver Spring, Maryland, where he has remained active “within the Ethiopian
    Diaspora.” Dkt. 26 ¶¶ 19, 20. He asserts that “the Ethiopian government monitors political
    dissidents at home and abroad . . . through the use of electronic surveillance,” 
    id. ¶ 25,
    and that
    he was subjected to such surveillance by means of a program secretly installed on his personal
    computer, controlled by the Ethiopian government or its agents, and used by them to monitor and
    record his computer activities and communications. See 
    id. ¶¶ 3,
    5, 9.
    1
    Had Ethiopia presented evidence disputing the “factual underpinnings of” Kidane’s invocation
    of an exception to the FSIA, the Court would have been required to “go beyond the pleadings
    and [to] resolve any disputed issues of fact the resolution of which is necessary to a ruling upon
    the motion to dismiss.” Phoenix Consulting v. Republic of Angola, 
    216 F.3d 36
    , 40 (D.C. Cir.
    2000). But, because Ethiopia has not done so, the Court must resolve Ethiopia’s motion based
    on the facts as alleged.
    2
    According to the complaint, in late 2012 or early 2013, Kidane’s personal computer,
    located at his home in Maryland, “bec[a]me infected with clandestine computer programs known
    as FinSpy.” 
    Id. ¶ 4.
    FinSpy is “a system for monitoring and gathering information from
    electronic devices, including computers and mobile phones, without the knowledge of the
    device’s user.” 
    Id. ¶ 6.
    It is allegedly “sold exclusively to government agencies and is not
    available to the general public.” Id.; see also 
    id., Ex. A
    (describing the FinSpy product). Kidane
    attributes the FinSpy infection of his computer to an email “sent by or on behalf of Ethiopia that
    was thereafter forwarded to” him by a third party. 
    Id. ¶ 5.
    The complaint does not state where
    the original third-party recipient was located; Ethiopia argues, however, that the content of the
    email, which is appended to the complaint, suggests that the original recipient may have resided
    in London. See 
    id., Ex. C
    (translation stating, in part, “[y]ou took your family to London . . . .”).
    In any event, Kidane does not allege or argue that Ethiopia sent the email directly to him or to
    anyone else located in the United States.
    The email contained a Trojan Horse attachment that “trick[ed]” Kidane into opening it,
    Dkt. 26 ¶¶ 38, 41, “caus[ing] a clandestine client program to be surreptitiously downloaded onto
    his computer,” 
    id. ¶ 5,
    and resulting in the installation of the FinSpy software, 
    id. The FinSpy
    software allegedly “took what amounts to complete control over the operating system” of his
    computer. 
    Id. According to
    the complaint, FinSpy contains “modules” for “extracting saved
    passwords from more than 20 different” programs, “for . . . recording Internet telephone calls,
    text messages, and file transfers transmitted through the Skype application,” “for covertly
    recording audio from a computer’s microphone even when no Skype calls are taking place,” “for
    recording every keystroke on the computer,” and “for recording a picture of the contents
    displayed on a computer’s screen.” 
    Id. ¶ 36–37.
    3
    Kidane alleges that once FinSpy infected his computer, it “began contemporaneously
    recording some, if not all, of the activities undertaken by users of the computer, including
    [Kidane] and members of his family.” 
    Id. He alleges
    that it “surreptitiously intercepted and
    contemporaneously recorded dozens of [his] private Skype Internet phone calls, recorded
    portions or complete copies of a number of [his] emails,” and copied a web search conducted by
    his son for a ninth-grade research assignment. 
    Id. ¶ 3.
    He further avers that evidence of these
    activities was found in various “FinSpy trace files” on his computer. See 
    id. ¶¶ 55–60,
    64–77.
    These trace files included, for example, “files consistent with FinSpy’s naming convention [that]
    contain portions or complete copies of [Kidane’s] private and highly confidential Skype
    conversations.” 
    Id. ¶ 69.
    Kidane further alleges that the FinSpy software installed on his computer communicated
    with a computer server located in Ethiopia. 
    Id. ¶ 10.
    As explained in the complaint and attached
    exhibits, computers that have been infected with the FinSpy software typically communicate
    with a designated “FinSpy Master” server via a “FinSpy Relay.” 
    Id. ¶¶ 35,
    43–51, Ex. A. The
    “FinSpy Master” determines whether, under the applicable FinSpy license terms, a given copy of
    the software will be activated. 
    Id. ¶¶ 44–45,
    Ex. A. Once the software is activated, the FinSpy
    Master “sends commands to [the] infected device[] and receives gathered information” from that
    device. 
    Id. ¶ 35.
    According to a report attached to the complaint, “a recently acquired [FinSpy]
    malware sample” shows that the malware has used “images of members of the Ethiopian
    opposition group, Ginbot 7, as bait, and that it has communicated with a FinSpy Command &
    Control server in Ethiopia.” Dkt. 26, Ex. B. In particular, the malware communications “can be
    found in [an] address block run by Ethio Telecom, Ethiopia’s state owned telecommunications
    provider.” 
    Id. Kidane alleges
    that “the FinSpy Relay and FinSpy Master servers with which
    4
    [his] computer in Maryland was controlled are located inside Ethiopia and controlled by
    Defendant Ethiopia,” 
    id. ¶ 85,
    and that the FinSpy installation “took instructions from a FinSpy
    relay controlled by Defendant Ethiopia,” 
    id. ¶ 84.
    He further alleges that FinSpy, but not all of
    the distinct trace files, “appears to have been removed” from his computer just five days after the
    publication of a report that disclosed “the technical details of the FinSpy Relay” used by
    Ethiopia. 
    Id. ¶ 77.
    The complaint contains two counts: a claim under the Wiretap Act, alleging that Ethiopia
    illicitly intercepted Kidane’s Skype calls and “other data,” 
    id. ¶¶ 92–100,
    and a claim under
    Maryland tort law for intrusion upon seclusion, alleging that Ethiopia unlawfully monitored and
    recorded Kidane’s and his family’s private computer activities, including Skype calls, emails,
    and web searches, 
    id. ¶¶ 101–105.
    Citing a fear of retaliation against himself and his family
    members in the United States and Ethiopia, Kidane moved for leave to proceed
    pseudonymously—as either John Doe or using the name “Kidane.” See Dkt. 1-1 at 11–13. The
    Court granted that motion. See Dkt. 2.
    Ethiopia moved to dismiss the complaint, see Dkt. 27, and, after the matter was fully
    briefed, the Court held oral argument on Ethiopia’s motion. In light of the fact that the case
    presents “substantial issues relating to the interpretation and application of the Foreign Sovereign
    Immunities Act’s non-commercial tort exception, 28 U.S.C. § 1605(a)(5), including the
    discretionary function exception and the ‘entire tort’ rule,” the Court then provided the United
    States with the opportunity to file a brief. See Dkt. 35. The United States responded that it was
    “actively considering whether to file a Statement of Interest as permitted by 28 U.S.C. § 517,”
    and requested additional time to “complete its deliberations,” and, if appropriate, to file a
    5
    Statement of Interest. Dkt. 37. The United States ultimately declined, however, to file a brief at
    this stage of the proceeding. Dkt. 38.
    II. ANALYSIS
    Ethiopia moves to dismiss on multiple grounds, contending both that this Court lacks
    jurisdiction under the FSIA and that Kidane fails to state a claim under the Wiretap Act because
    the Act does not provide a cause of action against a foreign state. See Dkt. 27. In the ordinary
    course, the Court would start with the jurisdictional question, because jurisdiction is a
    precondition to the Court’s “power to declare the law, and when it ceases to exist, the only
    function remaining to the court is that of announcing the fact and dismissing the cause.” Steel
    Co. v. Citizens for a Better Env’t, 
    523 U.S. 83
    , 94 (1998) (quoting Ex parte McCardle, 74 US (7
    Wall) 506, 514 (1868)).
    In Vermont Agency of Natural Resources v. United States ex rel. Stevens, 
    529 U.S. 765
    (2000), however, the Supreme Court recognized a narrow exception to this rule. There, as here,
    the Court possessed Article III jurisdiction but was called upon to decide whether sovereign
    immunity—there, the Eleventh Amendment immunity of the state of Vermont—barred the
    action. 
    Id. at 778.
    Before resolving that jurisdictional question, however, the Court concluded
    that it was appropriate to consider whether the relevant statute “permit[ed] the cause of action
    [Congress] create[d] to be asserted against States.” 
    Id. at 779.
    As the Supreme Court explained,
    “[w]hen . . . two questions [of this sort] are at issue, not only is the statutory question ‘logically
    antecedent to the existence of’ the . . . question” of sovereign immunity, “but also there is no
    realistic possibility that addressing the statutory question will expand the Court’s power beyond
    the limits that the jurisdictional restriction has imposed.” 
    Id. The same
    is true with respect to Kidane’s claim under the Wiretap Act. The question
    6
    whether Congress intended to subject foreign sovereigns to suit under the Wiretap Act is
    antecedent to the question whether Ethiopia would, under the FSIA, be immune from suit for any
    such violation. As in Vermont Agency of Natural Resources, moreover, resolving the statutory
    question first does not risk expanding the Court’s power beyond the jurisdictional limits
    prescribed by Congress; indeed, both the statutory and jurisdictional issues pose essentially the
    same question—did Congress intend to subject foreign states to suit in U.S. courts under the
    Wiretap Act? The Court, accordingly, starts with the question whether the Wiretap Act applies
    to foreign states before turning to the application of the FSIA.
    A.     Applicability of the Wiretap Act to Foreign States
    The Wiretap Act imposes criminal penalties and establishes a private cause of action for,
    among other things, the unauthorized interception of “any wire, oral, or electronic
    communication.” 18 U.S.C. § 2511(1) (liability); see also 
    id. §§ 2511(4)
    (criminal
    penalties), 2520(a) (private cause of action for civil damages). According to Ethiopia, however,
    the Wiretap Act does not apply to foreign states. That contention raises two distinct questions:
    First, does the prohibition on unauthorized interception of communications contained in section
    2511(1) of the Wiretap Act apply to governmental entities? Second, if not, does the civil cause
    of action created in the Act nonetheless authorize private litigants to sue governmental entities,
    including foreign states, for violations of section 2511(1)?
    As usual, the Court “begin[s] with the text of the statute.” Kasten v. Saint-Gobain
    Performance Plastics Corp., 
    563 U.S. 1
    , 7 (2011). The prohibition of the Wiretap Act at issue in
    this case is found in section 2511(1)(a), which makes it a crime for “any person” to
    “intentionally intercept[], endeavor[] to intercept, or procure[] any other person to intercept . . .
    any wire, oral, or electronic communication” without lawful authorization. The term “person,”
    7
    in turn, is defined as “any employee, or agent of the United States or any State or political
    subdivision thereof, and any individual, partnership, association, joint stock company, trust, or
    corporation.” 
    Id. § 2510(6).
    Thus, by its plain terms, the prohibition in section 2511(1)(a) does
    not apply to governmental entities; rather, it is limited to suits against those acting on behalf of
    the United States and state and local governments, other individuals, and various non-
    governmental entities. That reading of the statute is consistent, moreover, with the “longstanding
    interpretative presumption that ‘person’ does not include the sovereign,” Vermont Agency of
    Nat’l 
    Res., 529 U.S. at 780
    , and with the legislative history of the Wiretap Act, which indicates
    that even though the “definition [of ‘person’] explicitly includes any officer or employee of the
    United States or any State or political subdivision of a State,” it excludes “the governmental units
    themselves,” S. Rep. No. 90-1097 (1968), reprinted in 1968 U.S.C.C.A.N. 2112, 2179. The
    Court, accordingly, concludes that the prohibition on unauthorized interception of wire, oral, or
    electronic communications contained in section 2511(1)(a) does not apply to governmental
    entities, much less foreign states.
    Kidane does not resist this line of reasoning, but instead argues that two amendments to
    the provision of the Wiretap Act establishing a private cause of action for civil damages, section
    2520, opened the door to private suits against governmental entities, including foreign states, for
    violations of section 2511(1)(a) of the Act. As originally enacted in 1968, section 2520 provided
    a cause of action for a “person whose wire or oral communication is intercepted . . . in violation
    of this chapter . . . against any person who intercepts . . . such communications.” See Omnibus
    Crime Control and Safe Streets Act of 1968, Pub. L. No. 90-351, Title III, § 802, 82 Stat. 213
    (1968) (emphasis added). In 1986, however, Congress enacted the Electronic Communications
    Privacy Act (“ECPA”), which—along with a more comprehensive overhaul of the privacy laws
    8
    to address electronic communications—modified section 2520 to permit recovery “from the
    person or entity which engaged in that violation [of this chapter].” Pub. L. No. 99-508, Title I,
    § 103, 100 Stat. 1848 (1986) (emphasis added). Then, in 2001, Congress again amended section
    2520 in the PATRIOT Act. That amendment changed the relevant language to its current form,
    which provides that a person who has been subjected to the unlawful interception of his wire,
    oral, or electronic communications may sue “the person or entity, other than the United States,
    which engaged in that violation.” Pub. L. No. 107-56, Title I, § 223, 115 Stat. 293, 384 (2001)
    (codified at 18 U.S.C. § 2520(a) (2012)) (emphasis added).
    As Kidane correctly observes, the phrase “or entity” in section 2520(a) “logically must
    refer to [at least some] governmental entities in order to have meaning and effect.” Dkt. 28 at
    19. A number of courts considering claims against local governments have so held. 2 As they
    explain, “[t]he addition of the words ‘[or] entity’ can only mean a governmental entity because
    prior to the 1986 amendments, the definition of ‘person’ already included business entities. In
    order for [the addition of] the term [‘entity’ to section 2520] not to be superfluous, the term
    ‘entity’ [must] mean[] governmental entities.” 
    Adams, 250 F.3d at 985
    . In addition, although
    there is no legislative history discussing ECPA’s addition of the phrase “or entity” to section
    2520, ECPA simultaneously “added the same language to the civil liability provision for
    2
    See Adams v. City of Battle Creek, 
    250 F.3d 980
    , 985–86 (6th Cir. 2001); Garza v. Bexar
    Metro. Water Dist., 
    639 F. Supp. 2d 770
    , 773–75 (W.D. Tex. 2009); Williams v. City of Tulsa,
    
    393 F. Supp. 2d 1124
    , 1132 (N.D. Okla. 2005); Conner v. Tate, 
    130 F. Supp. 2d 1370
    , 1373–74
    (N.D. Ga. 2001); Dorris v. Absher, 
    959 F. Supp. 813
    , 820 (M.D. Tenn. 1997), aff’d in part, rev’d
    in part on other grounds, 
    179 F.3d 420
    (6th Cir. 1999); PBA Local No. 38 v. Woodbridge Police
    Dep’t, 
    832 F. Supp. 808
    , 823 (D.N.J. 1993); Bodunde v. Parizek, No. 93-1464, 
    1993 WL 189941
    , at *3–4 (N.D. Ill. May 28, 1993); Huber v. N. Carolina State Univ., 
    594 S.E.2d 402
    , 407
    (N.C. 2004). See also Organizacion JD Ltda. v. U.S. Dep’t of Justice, 
    18 F.3d 91
    , 95 (2d Cir.
    1994) (holding parallel cause of action in section 2707 for violations of the Stored
    Communications Act covers municipality). The D.C. Circuit has not addressed the issue.
    9
    interception of stored wire and electronic communications” contained in 18 U.S.C. § 2707
    (Stored Communications Act). 
    Id. “The Senate
    [and House] Committee Report[s] summarizing
    [section] 2707, the parallel section for liability for intercepting stored communications,
    specifically state[] that the word ‘entity’ includes governmental entities.” Id.; see also S. Rep.
    No. 99-541, at 43 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3597; H.R. Rep. No. 99-647 at
    74 (1986). If ECPA’s addition of the word “entity” to section 2707 included “governmental
    entities,” Kidane posits that the same must be true for ECPA’s addition of the same language to
    section 2520.
    The 2001 amendment to section 2520 contained in the PATRIOT Act, likewise, supports
    the conclusion that at least some governmental entities are subject to suit for violating at least
    certain provisions of the Wiretap Act. The addition of the phrase “other than the United States”
    as a modifier of the word “entity” in section 2520(a) confirms that “entity” must cover some
    governmental bodies. See 
    Garza, 639 F. Supp. 2d at 775
    ; 
    Williams, 393 F. Supp. 2d at 1132
    ;
    
    Huber, 594 S.E.2d at 407
    . Although “[w]hat limited legislative history exists is silent on the
    addition of this language,” 
    Williams, 393 F. Supp. 2d at 1132
    -33, the phrase “other than the
    United States” would have been unnecessary unless Congress understood the preceding term
    “entity” otherwise to encompass governmental entities. See id.; 
    Garza, 639 F. Supp. 2d at 775
    ;
    
    Huber, 594 S.E.2d at 407
    .
    For these reasons, the Court does not doubt that the term “entity,” as used in section
    2520, refers to at least some governmental entities for some purposes. See also Seitz v. City of
    Elgin, 
    719 F.3d 654
    , 657–60 (7th Cir. 2013) (“The plain meaning of ‘entity’ includes
    government units.”). But that does not answer the question whether Congress intended to expose
    those entities to suits for violations of section 2511(1)(a) in particular, as opposed to suits for
    10
    violations of other prohibitions in the Wiretap Act. Many courts considering claims against local
    governments have assumed the former, without elaboration. 3 But, as explained above, the plain
    language of section 2511(1)(a) applies only to “persons,” and that phrase is defined in a manner
    that does not include governmental entities.
    The courts that hold that the amendments to section 2520 permit a civil action against
    local governmental entities for a violation of section 2511(1) treat those amendments as
    implicitly amending the definition of “person” and the scope of section 2511(1). 
    See supra
    n.3.
    That conclusion turns on the premise that the phrase “person or entity, other than the United
    States” makes sense only if section 2511(1) is construed to reach the conduct of governmental
    “entities” “other than the United States.” That is, although “[s]ection 2520 itself creates no
    substantive rights,” 
    Seitz, 719 F.3d at 657
    , many courts assume that the amendments to section
    2520 covering governmental entities can be given meaning only if they are construed to have
    imposed a corresponding duty on governmental entities under section 2511(1) not to unlawfully
    intercept, endeavor to intercept, or procure another person to intercept communications.
    The problem with this argument is that it is not at all difficult to give meaning to
    Congress’s creation of a cause of action against governmental entities other than the United
    States without expanding the scope of section 2511(1) or implicitly amending the statutory
    definition of “person” to include governmental entities. As the Seventh Circuit has explained, at
    the same time that Congress added the phrase “or entity” to section 2520, it also added section
    2511(3)(a) to the Wiretap Act. See 
    Seitz, 719 F.3d at 659
    . Like section 2511(1), that section
    3
    See 
    Adams, 250 F.3d at 985
    –86; 
    Garza, 639 F. Supp. 2d at 773
    –75; 
    Williams, 393 F. Supp. 2d at 1132
    ; 
    Conner, 130 F. Supp. 2d at 1373
    –74; 
    Dorris, 959 F. Supp. at 820
    ; PBA Local No. 
    38, 832 F. Supp. at 823
    ; Bodunde, 
    1993 WL 189941
    , at *3–4; 
    Huber, 594 S.E.2d at 407
    . But see
    
    Seitz, 719 F.3d at 657
    –60.
    11
    prohibits specified conduct but, unlike section 2511(1), it applies to any “person or entity.” 
    Id. (emphasis added).
    In particular, with certain exceptions, section 2511(3)(a) prohibits “a person
    or entity providing an electronic communication service to the public [from] intentionally
    divulg[ing] the contents of any communication . . . while in transmission on that service to any
    person or entity other than an addressee or intended recipient of such communication.” 18
    U.S.C. § 2511(3)(a) (emphasis added). It is thus not surprising that, at the same time that
    Congress added this prohibitory language to the statute, it also amended section “2520 to match
    the ‘person or entity’ language used in [section] 2511(3). Without that change, parties could sue
    a ‘person’ who violated [section] 2511(3)(a) but not an entity even though [section] 2511(3)
    explicitly referenced both.” 4 
    Seitz, 719 F.3d at 658
    –59 (internal footnotes and citation omitted).
    See also Adams v. Luzerne Cty., 
    36 F. Supp. 3d 511
    , 523 (M.D. Pa. 2014); Whitaker v. Barksdale
    Air Force Base, No. 14-2342, 
    2015 WL 574697
    , at *5 (W.D. La. Feb. 11, 2015); Anderson v.
    City of Columbus, Georgia, 
    374 F. Supp. 2d 1240
    , 1244–46 (M.D. Ga. 2005). As a result, the
    Court can give sections 2510(6) and 2511(1) their plain meaning, while also “giv[ing] meaning
    to each word of [section] 2520[(a)].” 
    Seitz, 719 F.3d at 658
    .
    Kidane might, instead, be understood to contend that, even if Congress did not expand
    the scope of sections 2510(6) and 2511(1) through the amendments to section 2520, it amended
    section 2520 to create a cause of action against a government for substantive violations of section
    2511(1) committed by individuals acting on behalf of that state—based, for example, on
    respondeat superior liability. Under this theory, even though a foreign government is not itself
    4
    Although section 2511(3)(a) addresses “person[s]” or “entit[ies]” who provide “an electronic
    communication service to the public,” the provision is not limited to the regulation of private
    enterprise. “Apparently, municipal governments have, in fact, entered or attempted to enter the
    telecommunications business.” 
    Seitz, 719 F.3d at 659
    .
    12
    subject to section 2511(1), it may be vicariously liable for violations of section 2511(1)
    committed by its agents, who are “individuals” and thus arguably “persons” as defined in section
    2510(6).
    This argument, however, cannot be squared with the text of the Wiretap Act for two
    reasons. First, section 2520 permits a party whose communications were unlawfully intercepted
    to “recover from the person or entity, other than the United States, which engaged in that
    violation.” 18 U.S.C. § 2520(1) (emphases added). Accordingly, the “person or entity” subject
    to suit must be the same “person or entity” that violated the statute. Second, permitting suit
    against a governmental entity that could not itself “engage[] in” a violation of section 2511(1) is
    also at odds with the statutory definition of “person” contained in section 2510(6). In that
    definition, Congress defined the specific types of juridical bodies capable of violating section
    2511(1) to include a “partnership, association, joint stock company, trust, or corporation.” 18
    U.S.C. § 2510(6). Because these entities can act only through their members, agents, officers,
    and employees, the definition necessarily already encompasses a concept of agent-principal or
    vicarious liability. To graft yet an additional theory of such liability onto section 2520 would
    undermine the balance that Congress struck. Cf. Cicippio-Puleo v. Islamic Republic of Iran, 
    353 F.3d 1024
    , 1036 (D.C. Cir. 2004) (declining to imply cause of action against foreign government
    where “the liability imposed by [28 U.S.C. § 1605(a)(7)] is precisely limited to ‘an official,
    employee, or agent of a foreign state designated as a state sponsor of terrorism’”).
    The Court, accordingly, concludes that section 2520 of the Wiretap Act does not create a
    civil cause of action against a foreign state for interceptions of wire, oral, or electronic
    communications in violation of section 2511(1), and thus GRANTS Ethiopia’s motion to
    dismiss Count One of the complaint.
    13
    B.     Foreign Sovereign Immunities Act
    The conclusion that Congress did not create a private cause of action against foreign
    states for violations of section 2511(1) of the Wiretap Act does not resolve the case, because
    Kidane also asserts a claim based on the common law tort of intrusion upon seclusion. See Dkt.
    26 ¶¶ 101–05. Under Maryland law, this tort requires “the intentional intrusion upon the solitude
    or seclusion of another or his private affairs or concerns [in a manner] that would be highly
    offensive to a reasonable person.” Pemberton v. Bethlehem Steel Corp., 
    502 A.2d 1101
    , 1116
    (Md. Ct. Spec. App. 1986) (citing Restatement (Second) of Tort, § 652B (1977)). The question
    remains whether the FSIA bars Kidane from asserting this claim against Ethiopia.
    Although the FSIA was not enacted until 1976, foreign sovereign immunity dates back to
    the earliest days of the Republic. See Verlinden B.V. v. Central Bank of Nigeria, 
    461 U.S. 480
    ,
    486 (1983). Originally, the United States accorded foreign states absolute immunity from suit in
    its courts. See Restatement (Third) of the Foreign Relations Law of the United States, ch. 5,
    subch. A, intro. n. (1987 & 2016 Supp.) (“Until the twentieth century, sovereign immunity from
    the jurisdiction of foreign states seemed to have no exceptions.”); see also Republic of Mexico v.
    Hoffman, 
    324 U.S. 30
    , 35 (1945); The Schooner Exchange v. M’Faddon, 11 U.S. (7 Cranch) 116,
    136–37, 146 (1812). Beginning in the 1950s, however, the United States adopted the
    “restrictive” theory of sovereign immunity under which “sovereign or public actions” of a state
    are immunized, but “private acts” are not. See Letter from Jack B. Tate, Acting Legal Adviser,
    U.S. Dep’t of State, to Philip B. Perlman, Acting Attorney Gen., reprinted in Alfred Dunhill of
    London, Inc. v. Cuba, 
    425 U.S. 682
    , 711–715 (1976). In the State Department’s view, absolute
    foreign sovereign immunity had become “inconsistent with the action of the Government of the
    United States in subjecting itself to suit in these same courts in both contract and tort,” and “the
    14
    widespread and increasing practice on the part of governments of engaging in commercial
    activities [made] necessary a practice which will enable persons doing business with them to
    have their rights determined in the courts.” 
    Id. at 714.
    Almost a quarter-century later, Congress enacted the FSIA, which, with modest
    refinements, codified the restrictive theory of immunity. See 
    Verlinden, 461 U.S. at 488
    . Since
    its enactment, the FSIA has “provide[d] the sole basis for obtaining jurisdiction over a foreign
    state in the courts of this country.” Argentine Republic v. Amerada Hess Shipping Corp., 
    488 U.S. 428
    , 434 (1989). The Act provides a foreign state with “‘presumptive[] immun[ity] from
    the jurisdiction of United States courts’ unless one of the Act’s express exceptions to sovereign
    immunity applies.” OBB Personenverkehr AG v. Sachs, 
    136 S. Ct. 390
    , 394 (2015) (quoting
    Saudi Arabia v. Nelson, 
    507 U.S. 349
    , 355 (1993)); see also 28 U.S.C. § 1604. “When one of
    [the] . . . specified exceptions applies,” however, “‘the foreign state [is] liable in the same
    manner and to the same extent as a private individual under like circumstances.’” 
    Verlinden, 461 U.S. at 488
    –89 (quoting 28 U.S.C. § 1606).
    Kidane invokes only one exception to the FSIA—the non-commercial tort exception. See
    Dkt. 26 ¶ 14. That exception to sovereign immunity applies to any case “not otherwise
    encompassed by” the commercial-activity exception
    in which money damages are sought against a foreign state for personal
    injury or death, or damage to or loss of property, occurring in the United
    States and caused by the tortious act or omission of that foreign state or of
    any official or employee of that foreign state while acting within the scope
    of his office or employment.
    28 U.S.C. § 1605(a)(5). There are two statutory “exceptions to the [non-commercial tort]
    exception,” MacArthur Area Citizens Ass’n v. Republic of Peru, 
    809 F.2d 918
    , 921 (D.C. Cir.
    1987), modified in other respects by 
    823 F.2d 606
    (D.C. Cir. 1987), both of which parallel
    15
    similar provisions in the Federal Torts Claims Act (“FTCA”). The first, known as the
    discretionary function exception, provides that a foreign state’s immunity is not waived with
    respect to “any claims based upon the exercise [of] a discretionary function.” See 28 U.S.C.
    § 1605(a)(5)(A). The second, known as the intentional tort exception, provides that immunity is
    not waived for claims alleging specified intentional torts, including “misrepresentation” and
    “deceit.” See 
    id. § 1605(a)(5)(B).
    Ethiopia contends that the non-commercial tort exception to immunity is inapplicable for
    four reasons: First, it argues that the complaint fails to identify any tortious conduct engaged in
    by an agent of Ethiopia while in the United States and that the tort, therefore, did not “occur[] in
    the United States” within the meaning of the exception. Second, it contends that, even if taken as
    true, Kidane’s allegations involve the type of conduct “grounded in social, economic, and
    political policy” that the discretionary function exception immunizes from suit. See United
    States v. Varig Airlines, 
    467 U.S. 797
    , 814 (1984). Third, it maintains that the alleged
    surreptitious infection of Kidane’s computer involves “misrepresentation” and “deceit” and that
    the intentional tort exception to the non-commercial tort exception therefore applies. Finally, it
    argues that Kidane has not alleged with sufficient specificity a claim for “money damages . . . for
    personal injury,” as required to fall within the non-commercial tort exception. As explained
    below, although the Court is unconvinced by three of Ethiopia’s arguments, it agrees that
    Kidane’s claim for intrusion upon his seclusion is barred by sovereign immunity because the
    “entire tort” was not committed in the United States.
    1. The Personal Injury Requirement and the Intentional Tort Exception
    The Court disposes of Ethiopia’s third and fourth contentions first, as they require only
    brief discussion. According to Ethiopia, Kidane’s claim for intrusion upon seclusion does not
    16
    seek “money damages . . . for personal injury” as required to invoke the non-commercial tort
    exception because the operative complaint contains only a conclusory allegation that Kidane
    suffered “emotional distress” as a result of Ethiopia’s alleged surveillance. Dkt. 27-2 at 23.
    Ethiopia stresses that Kidane’s original complaint did not include this allegation and argues that
    the amended complaint’s addition of the “bald assertion that [Kidane] suffered personal injury or
    emotional distress” does not clear the pleading hurdle established in Ashcroft v. Iqbal, 
    556 U.S. 662
    (2009), and Bell Atlantic Corp. v. Twombly, 
    550 U.S. 544
    (2007). Dkt. 27-2 at 23.
    The Court disagrees. Iqbal and Twombly require only that a plaintiff allege a claim with
    sufficient factual specificity that it is “plausible on its face.” 
    Iqbal, 556 U.S. at 678
    (quoting
    
    Twombly, 550 U.S. at 570
    ). Here, it is certainly plausible that an asylee would suffer emotional
    distress upon learning that the foreign state from which he fled was surreptitiously intercepting
    and recording his (and his family’s) Skype calls, email communications, and web searches. Dkt.
    26 ¶ 4. And the fact that Kidane did not allege that he suffered emotional distress in his original
    complaint does not mean that the allegation of emotional distress included in his amended
    complaint should be greeted with skepticism, as Ethiopia suggests. Rather, at this stage of the
    proceeding, and in light of the fact that Ethiopia has not introduced any controverting evidence,
    the Court must take all plausible allegations contained in the operative complaint as true. See
    
    Gordon, 778 F.3d at 163
    –64; 
    Price, 294 F.3d at 93
    .
    Ethiopia’s contention that it is immune from liability for its alleged intrusion upon
    Kidane’s intrusion under the intentional tort exception is equally flawed. See Dkt. 27-2 at 13.
    The intentional tort exception renders the non-commercial tort exception inapplicable to claims
    “arising out of malicious prosecution, abuse of process, libel, slander, misrepresentation, deceit,
    or interference with contract rights.” 28 U.S.C. § 1605(a)(5)(B). It is true that Kidane alleges
    17
    that Ethiopia used trickery to place the FinSpy malware on his computer. But neither
    misrepresentation nor deceit is an element of the tort of intrusion upon seclusion under Maryland
    law. See 
    Pemberton, 502 A.2d at 1116
    . It is the unreasonable invasion of a plaintiff’s privacy
    that forms the core of the tort, and privacy torts are not among those enumerated in the
    intentional tort proviso to the non-commercial tort exception. See 28 U.S.C. § 1605(a)(5)(B).
    “Where Congress explicitly enumerates certain exceptions to a general prohibition, additional
    exceptions are not to be implied, in the absence of evidence of a contrary legislative intent.”
    Andrus v. Glover Const. Co., 
    446 U.S. 608
    , 616–17 (1980). The omission of privacy torts from
    the intentional tort exception to the non-commercial tort exception is thus dispositive.
    The D.C. Circuit reached precisely this conclusion in a decision interpreting the FTCA’s
    analogous intentional tort exception. See Black v. Sheraton Corp. of Am., 
    564 F.2d 531
    , 539
    (D.C. Cir. 1977) (interpreting 28 U.S.C. § 2680). In that case, a lobbyist affiliated with Bobby
    Baker, a long-time advisor to Lyndon Johnson, brought suit alleging that the government had
    illegally eavesdropped on his conversations by installing a microphone in the wall of his hotel
    room. 
    Id. at 534–35.
    Rejecting an argument similar to Ethiopia’s, the Court of Appeals held that
    “because invasion of privacy does not fall within an enumerated [intentional tort] exemption [in
    the FTCA], such a claim is not barred by the doctrine of governmental immunity.” 
    Id. at 539
    n.3; see also Cruikshank v. United States, 
    431 F. Supp. 1355
    (D. Haw. 1977). That same
    conclusion applies with equal force in the present context. Kidane’s intrusion upon seclusion
    claim is not among the enumerated intentional torts that fall outside the non-commercial tort
    exception. And the mere fact that the allegedly illegal surveillance was conducted surreptitiously
    is insufficient to bar his claim.
    18
    2. Whether the Tort “Occur[ed] in the United States”
    Whether the alleged intrusion upon Kidane’s intrusion “occur[ed] in the United States”
    within the meaning of the non-commercial tort exception is a much closer question. Although it
    is well-settled that the non-commercial tort exception “covers only torts occurring within the
    territorial jurisdiction of the United States,” Amerada Hess Shipping 
    Corp., 488 U.S. at 441
    , it is
    unclear how that rule applies to the instant case, in which the alleged intrusion involves the
    infiltration of Kidane’s computer located at his home in Maryland, yet no agent or employee of
    Ethiopia is alleged to have ever set foot in the United States in connection with that tort.
    On its face, the non-commercial tort exception merely asks whether the suit is for
    “money damages . . . for personal injury or death, or damage to or loss of property, occurring in
    the United States and caused by the tortious act or omission of that foreign state or of any official
    or employee of that foreign state.” 28 U.S.C. § 1605(a)(5) (emphasis added). Courts, however,
    have repeatedly interpreted the phrase “occurring within the United States” to mean that the
    “entire tort” must have occurred in the United States. See, e.g., Jerez v. Republic of Cuba, 
    775 F.3d 419
    , 424 (D.C. Cir. 2014); Asociacion de Reclamantes v. United Mexican States, 
    735 F.2d 1517
    , 1525 (D.C. Cir. 1984); O’Bryan v. Holy See, 
    556 F.3d 361
    , 382 (6th Cir. 2009); Von
    Dardel v. USSR, 
    736 F. Supp. 1
    , 7 (D.D.C. 1990). Under these cases, the fact that the plaintiff
    incurred an injury in the United States, or that the “alleged tort may have had effects in the
    United States,” is insufficient to waive sovereign immunity. Amerada Hess Shipping 
    Corp., 488 U.S. at 441
    (emphasis added). Rather, “not only the injury but also the act precipitating that
    injury . . . must occur in the United States.” 
    Jerez, 775 F.3d at 424
    ; see also Persinger v. Islamic
    Republic of Iran, 
    729 F.2d 835
    , 842 (D.C. Cir. 1984) (“[B]oth the tort and the injury must occur
    in the United States.”).
    19
    As other courts have explained, this conclusion follows from both the text and legislative
    history of the FSIA. As a textual matter, the language of the non-commercial tort exception,
    which includes the “occurring in the United States” requirement, stands in marked contrast to the
    language of the commercial tort exception, which applies to conduct “‘outside the territory of the
    United States’ having a ‘direct effect’ inside the United States.” Amerada Hess Shipping 
    Corp., 488 U.S. at 441
    (quoting 28 U.S.C. § 1605(a)(2)). 5 And the legislative history confirms that the
    non-commercial tort exception applies only to torts occurring in the United States. “Congress’
    primary purpose in enacting [section] 1605(a)(5) was to eliminate a foreign state’s immunity for
    traffic accidents and other torts committed in the United States, for which liability is imposed
    under domestic tort law.” 
    Id. at 439–40
    (emphasis added). Both the committee reports and the
    proponents of the legislation repeatedly emphasized that liability would be limited to torts
    committed within the United States. See H.R. Rep. No. 94-1487, at 21, reprinted in 1976
    U.S.C.C.A.N. 6604 (“[T]he tortious act or omission must occur within the jurisdiction of the
    United States.”); S. Rep. No. 94-1310, at 20 (1976) (same); Hearing on H.R. 3493 Before the
    Subcomm. on Claims & Gov’t Relations of the H. Comm. on the Judiciary, 93d Cong., at 21
    (1973) (“1973 Hearing”) (statement of Charles N. Brower, Acting Legal Adviser, Dep’t of State)
    (although “cast in general terms,” the exception was “directed primarily to the problem of traffic
    accidents,” and was intended to apply only to tort claims where “the negligent or wrongful act
    5
    Neither party cites any decisions applying the FSIA’s non-commercial tort exception to torts
    facilitated by the Internet and directed from abroad. At least one court has held that the FSIA’s
    commercial tort exception, 28 U.S.C. § 1605(a)(2), waives sovereign immunity for acts
    perpetrated over the Internet by a foreign state. See CYBERsitter, LLC v. P.R.C., 
    805 F. Supp. 2d 958
    , 975 (C.D. Cal. 2011) (holding that claims based on the misappropriation of plaintiff’s
    software and its placement on the foreign state’s website fell within the commercial tort
    exception). But decisions applying the commercial tort exception are inapplicable here because,
    as explained above, that exception applies to claims based on an extraterritorial act that “causes a
    direct effect in the United States.” 28 U.S.C. § 1605(a)(2) (emphasis added).
    20
    took place in the United States”); see also 1973 Hearing at 34 (letter from Richard G.
    Kleindienst, Attorney Gen., & William P. Rogers, Sec’y of State); 1973 Hearing at 42 (section-
    by-section analysis).
    Here, it is undisputed that the alleged injury to Kidane occurred in the United States.
    Ethiopia and Kidane propound very different theories, however, regarding where the allegedly
    tortious act or acts occurred, each of which has some merit and neither of which wholly resolves
    the question.
    According to Ethiopia, accepting the allegations of the complaint as true, “the acts
    underlying the tort, as distinct from their alleged injurious effect, occurred overseas.” Dkt. 27-2
    at 16 (emphases added). Ethiopia focuses on the fact that “[t]he actors who committed the
    alleged tort, according to Plaintiff, were operating in Ethiopia, the computer servers were located
    in Ethiopia, the spyware was maintained in Ethiopia, the commands came from Ethiopia, and
    Plaintiff’s materials were viewed in Ethiopia.” Dkt. 27-2 at 11; see also 
    id. at 9–11.
    In its view,
    “inasmuch as both the acts and intent occurred overseas, the two alleged intentional torts have
    their situs overseas and therefore, by definition did not occur entirely in the United States.” 
    Id. at 17.
    Thus, according to Ethiopia, the location of the alleged tort—or at least a substantial portion
    of it—was overseas because all of the alleged tortfeasors were located overseas and it is their
    extraterritorial conduct that allegedly precipitated Kidane’s injury.
    Although not without some force, this argument is incomplete because it fails to grapple
    with the modern world in which the Internet breaks down traditional conceptions of physical
    presence. Thus, while the Congress that enacted the FSIA in 1976 envisioned the paradigmatic
    case for liability as involving an embassy employee who causes an automobile accident while on
    official business in the United States, see, e.g., H.R. Rep. No. 94-1487, at 29, we now live in an
    21
    age where, according to press reports, it is possible to hack remotely into a car’s electronics and
    to cause the same crash from thousands of miles away. 6 Here, as Kidane points out, Ethiopia’s
    alleged surveillance would fall squarely within the “entire tort” rule had it sent a “flesh-and-
    blood agent into [Kidane’s] house to install a recording device.” Dkt. 28 at 27. Technology has
    simply rendered the human agent obsolete.
    Kidane’s theory of where the tortious conduct occurred, in contrast, focuses not on the
    physical location of the tortfeasor, but on the elements of the state law cause of action, asserting
    that “every element of the asserted claim occurred in the United States—from the installation of
    spyware on a U.S. computer, to the interception of electronic communications.” Dkt. 28 at 23.
    As Kidane correctly points out, under Maryland law, “the gravamen of the tort [of intrusion upon
    seclusion] is the intrusion into a private place or the invasion of a private seclusion that the
    plaintiff has thrown about his person or affairs.” Dkt. 28 at 24 (quoting New Summit Assocs. Ltd.
    P’ship v. Nistle, 
    533 A.2d 1350
    , 1354 (Md. Ct. Spec. App. 1987)). A plaintiff, moreover, need
    not allege that a physical trespass occurred to state a claim for intrusion upon seclusion. See
    Pearson v. Dodd, 
    410 F.2d 701
    , 704 (D.C. Cir. 1969). And, although no decision from the
    Maryland courts has addressed the issue to date, the Court can assume for present purposes that
    the mere “tapping” or “bugging” of personal communications is sufficient to state a claim, even
    if no one ever listens to the plaintiff’s communications. See Hamberger v. Eastman, 
    206 A.2d 239
    , 242 (N.H. 1964) (rejecting contention that plaintiffs failed to state a claim for intrusion
    upon seclusion because “there are no allegations that anyone listened or overheard sounds or
    6
    See New York Times Bits Blog, Security Researchers Find A Way To Hack Cars (July 21,
    2015), available at http://bits.blogs.nytimes.com//2015/07/21/security-researchers-find-a-way-
    to-hack-cars/.
    22
    voices originating from plaintiffs’ bedroom”); New Summit Assocs. Ltd. 
    P’ship, 533 A.2d at 1354
    (“[P]laintiff was not required to prove that a particular individual actually observed her”
    through peephole); 
    Pearson, 410 F.2d at 704
    & nn.10 & 14 (citing Hamberger with approval and
    stating that “[t]he tort is completed with the obtaining of the information by improperly intrusive
    means”). 7 The question for the factfinder, then, is simply whether the defendant intentionally
    intruded “upon the solitude or seclusion of another or his private affairs or concerns” in a manner
    that “would be highly offensive to a reasonable person.” Restatement (Second) of Torts § 652B.
    Neither the text of the FSIA nor existing case law clearly resolves whether Ethiopia or
    Kidane’s conception of where the alleged tort occurred for purposes of the non-commercial tort
    exception is correct, and the question is a close one. Three considerations, however, convince
    the Court that Ethiopia’s view is more compelling:
    First, the question of where the “entire tort” occurred cannot be wholly divorced from the
    physical location of the tortfeasors. Kidane stresses that the tort of intrusion upon seclusion does
    not require that he prove that Ethiopia ever transferred information from his computer to a
    computer located in Ethiopia or that anyone in Ethiopia—or anywhere else—actually listened to
    or read his communications; all that was required was that Ethiopia took control of his computer
    and caused that computer to make illicit copies of the relevant communications. But that view of
    where the tort occurred ignores the fact that all of the acts by Ethiopia or its agents that allegedly
    precipitated the tort occurred outside the United States. 
    Jerez, 775 F.3d at 424
    . The complaint
    does not suggest that the email containing the malware was prepared in the United States or that
    7
    But see Marks v. Bell Tel. Co. of Pennsylvania, 
    331 A.2d 424
    , 431 (Pa. 1975) (“In the absence
    of an overhearing of a private communication, this tort has not been committed.”); LeCrone v.
    Ohio Bell Tel. Co., 
    201 N.E.2d 533
    , 538 (Ohio Ct. App. 1963) (“[I]n our opinion, the only
    possible act which could constitute an invasion in the present case is the eavesdropping itself,
    and the connection or tap here constitutes only a preparation for that invasion of privacy.”).
    23
    it was sent from within the United States. And, as Ethiopia notes, Kidane does not even allege
    that anyone acting on behalf of Ethiopia purposefully sent the email to him or to anyone else in
    the United States; rather, the translation attached to the complaint suggests that the email may
    have been sent to someone in London, who forwarded it (directly or through others) to Kidane in
    the United States. Dkt. 26 ¶ 5 & Ex. C. Kidane, moreover, fails to identify any case applying
    the non-commercial tort exception to circumstances, like those alleged here, where the
    precipitating acts of the relevant tortfeasor occurred outside the United States. And, although it
    is also true that no decision has rejected application of the exception in circumstances like those
    alleged here, courts have at least hinted that the “entire tort” requirement is not satisfied where
    actions taken outside the United States precipitate events in the United States. Cf. 
    O’Bryan, 556 F.3d at 370
    , 385 (declining to apply non-commercial tort exception to claims attacking a policy
    against reporting sexual abuse, where the sexual abuse occurred in the United States, but the
    policy was “presumably” promulgated abroad); Olsen v. Gov’t of Mexico, 
    729 F.2d 641
    , 644,
    646 (9th Cir. 1984) (rejecting Mexico’s claim of immunity based on fact that airplane was
    maintained outside the United States where “one entire tort . . .—the negligent piloting of the
    aircraft—. . . occurred in the United States”).
    In Kidane’s view, little turns on the fact that all of the acts of the alleged tortfeasors
    occurred overseas. He argues that the D.C. Circuit applies an “essential locus” test, requiring
    only that “the injury and the act that proximately causes that injury” occur in the United States,
    and that the acts taken by Ethiopia or its agents that occurred in Ethiopia were merely
    “collateral” to commission of the alleged tort. Dkt. 28 at 23. Under this theory, the “essential
    locus” of the tort is Maryland—“where [his] computer was when it was accessed and infected
    with spyware, and where he was when his communications were intercepted by Ethiopia’s
    24
    FinSpy device,” id.—and not Ethiopia—where the tort was allegedly planned and set in motion.
    Kidane is surely right that the mere fact that “some foreign conduct” occurred overseas is
    insufficient to render a sovereign immune. Dkt. 28 at 26. If that were the case, then an
    assassination plotted overseas but carried out on American soil would garner immunity, cf.
    Letelier v. Republic of Chile, 
    488 F. Supp. 665
    , 673–74 (D.D.C. 1980), and “foreign states
    [would be encouraged] to allege that some tortious conduct occurred outside the United States,”
    
    Olsen, 729 F.2d at 646
    .
    But, even assuming that the acts that allegedly occurred in Ethiopia were merely
    “collateral” to the commandeering of Kidane’s computer, the Court is unconvinced that the D.C.
    Circuit has adopted an “essential locus” test. Kidane bases his “essential locus” argument solely
    on the D.C. Circuit’s decision in Asociacion de Reclamantes v. United Mexican States. In that
    case, the Court held that Mexico was immune from a suit challenging its failure to compensate
    its citizens for land claims it assumed under a treaty with the United States, because the allegedly
    tortious failure to compensate occurred outside the United 
    States. 735 F.2d at 1524
    –25. Kidane
    correctly notes that the Court of Appeals wrote that “[e]ven if the allegedly tortious failure to
    compensate had the effect of retroactively rendering the prior acts [of entering the treaty] on
    United States soil tortious, at the very least the entire tort would not have occurred here, and
    indeed we think its essential locus would remain Mexico.” 
    Reclamantes, 735 F.2d at 1525
    (emphasis added). That assertion, however, came only after the Court had already concluded
    that “the entire tort would not have occurred here,” and after it cited with approval the assertion
    in In re Sedco, Inc. that “the tort, in whole, must occur in the United States.” 
    Id. (quoting In
    re
    Sedco, Inc., 
    543 F. Supp. 561
    , 567 (S.D. Tex. 1982)) (emphasis added). The Court’s reference to
    the “essential locus” of the tort, accordingly, was at most an alternative, a fortioiri holding. Any
    25
    doubt regarding this reading of Reclamantes, moreover, is put to rest by subsequent decisions in
    this jurisdiction that have treated Reclamantes as establishing the “clear” rule that “the entire
    tort” must occur in the United States. See 
    Jerez, 775 F.3d at 424
    ; Von 
    Dardel, 736 F. Supp. at 7
    ;
    see also 
    O’Bryan, 556 F.3d at 382
    .
    A more recent decision from the D.C. Circuit is arguably more on point, although the
    Court is also unpersuaded that it vindicates Kidane’s position. In Jerez v. Republic of Cuba, the
    plaintiff sought to recover for torture that the Cuban government allegedly inflicted upon him
    while incarcerated in Cuba, including injecting him with the hepatitis C 
    virus. 775 F.3d at 421
    .
    The district court held that Cuba was immune from suit because the “alleged tort . . . occurred in
    Cuba,” and because “none of the defendants . . . was within the United States.” 
    Id. at 424.
    On
    appeal, Jerez argued that “the virus continue[d] to replicate in his body” after he arrived in the
    United States, and that each replication of the virus constituted a separate tort. 
    Id. The D.C.
    Circuit rejected that argument, holding that the tort occurred in Cuba where Jerez was infected,
    and that the replication of the virus in the United States merely constituted an ongoing injury—
    and not a series of new torts. 
    Id. But the
    Court went on to discuss, albeit briefly, how the “entire
    tort” rule might apply to torts precipitated by acts taken overseas that otherwise occur entirely in
    the United States. In particular, Jerez argued that his claim was analogous to a claim based on “a
    foreign agent’s delivery into the United States of an anthrax package or a bomb.” Id.; see also
    Br. for Appellant, at 25, Jerez v. Republic of Cuba, 
    775 F.3d 419
    (No. 13-7141), 
    2014 WL 1713091
    (positing hypothetical of anthrax “package that was mailed from abroad”). In response,
    the Court of Appeals drew a distinction between Jerez’s case, in which Cuba’s alleged “infliction
    of injury on Jerez occurred entirely in Cuba,” and Jerez’s hypotheticals, where “the infliction of
    injury by the hypothetical anthrax package or bomb would occur entirely in the United States.”
    
    26 775 F.3d at 424
    .
    Although the hypothetical of an anthrax package or bomb mailed from outside the United
    States is arguably analogous to the sending of malware that infected a computer located in the
    United States, the Court is leery of reading Jerez to provide substantial guidance regarding the
    application of the non-commercial tort exception to torts committed remotely. Most notably,
    that is not what was at issue in Jerez; to the contrary, the Court of Appeals unambiguously held
    that the alleged tort “occurred entirely in Cuba,” where Jerez was infected with the hepatitis C
    virus. 
    Id. at 421.
    The fact that the Court went on to distinguish Jerez’s hypotheticals on the
    ground that “the infliction of injury” in the hypothetical occurred entirely in the United States
    was thus dicta. But, even beyond that, the Court did not conclude that the hypothetical tort
    would have occurred entirely within the United States, but only that, unlike in Jerez’s case, the
    “injury” would have been “inflicted” in the United States. 
    Id. Second, to
    the extent that it is uncertain whether Congress intended to permit suit in U.S.
    courts for torts precipitated from abroad, the D.C. Circuit has cautioned against converting the
    non-commercial tort exception “into a broad exception for all alleged torts that bear some
    relationship to the United States.” 
    Reclamantes, 735 F.2d at 1525
    . To be sure, the fact that
    Congress focused on traffic accidents committed by “officials and employees of foreign
    sovereigns” while “in this country” does not define the full scope of the non-commercial tort
    exception. 
    Id. But it
    does convey something about the types of tortious conduct that Congress
    had in mind when it enacted the exception, and the instant allegations are far afield from that
    paradigmatic case. 
    Id. The Court,
    moreover, must proceed cautiously where application of the
    exception would arguably shift the balance that Congress struck between the desire to afford
    members of the public a remedy for torts committed in the United States by foreign employees
    27
    and officials and the interest in maintaining comity with foreign states. Applying the exception
    to torts precipitated exclusively beyond the borders of the United States—by tortfeasors who
    neither set foot in this Country nor directly caused a tort to be committed here—implicates that
    balance. As the D.C. Circuit observed in a different context, “[i]f Congress had meant to remove
    sovereign immunity for governments acting on their own territory, with all of the potential for
    international discord and for foreign government retaliation that that involves, it is hardly likely
    that Congress would have ignored those topics and discussed instead automobile accidents in this
    country.” 
    Persinger, 729 F.2d at 841
    .
    Put differently, the question whether to afford a foreign state immunity from suit
    inherently involves a political judgment, raising sensitive issues of foreign relations. When
    Congress enacted the FSIA, it decided to leave it to the courts to apply the rules that the
    Executive Branch had adopted over many years and that Congress had, with minor adjustment,
    embodied in the FSIA. But, at the same time, it did not confer common law authority on the
    courts to adjust the rules of foreign sovereign immunity to new and unanticipated events that
    might arise. To the contrary, the FSIA starts from the premise that foreign states are entitled to
    immunity, and then carves out limited—and specific—exceptions to that rule. See 1973 Hearing
    at 21 (statement of Charles N. Brower, Acting Legal Adviser, Dep’t of State). To the extent that
    the present dispute seeks to open the door to a new and previously unrecognized class of cases
    against foreign states made possible by technological changes, that type of judgment is better left
    to Congress, which has, in fact, amended the FSIA in recent years to address evolving threats—
    most notably, the emergence of state-sponsored terrorism. See Pub. L. No. 110-181, Div. A,
    Title X, § 1083(a)(1), 122 Stat. 338 (2008) (codified at 28 U.S.C. § 1605A (2012)).
    Third, and finally, the legislative history of the non-commercial tort exception, although
    28
    limited, provides additional support for the conclusion that Congress did not intend to reach torts
    precipitated by the actions of tortfeasors outside the United States. One of the primary goals of
    the FSIA to bring U.S. rules of foreign sovereign immunity in line with the practices of other
    nations, and, in particular, to subject foreign states that commit torts in the United States to the
    same rules of immunity applied against the United States abroad. See Hearings on H.R. 11,315
    Before the Subcomm. on Admin. Law & Gov’t Relations of the H. Comm. on the Judiciary, 94th
    Cong. 29 (1976) (“1976 Hearing”); 1973 Hearing at 29. Prior to enactment of the FSIA, the
    United States was often subject to tort suits—most often in Europe—alleging claims that could
    not be brought against foreign states in U.S. courts. See S. Rep. No. 94-1310, at 10–11 (1976).
    As explained during the hearings on the FSIA, “almost all countries in Western Europe [had
    come to] follow[] the restrictive theory of sovereign immunity, and permitted . . . suit against the
    United States in contract and in tort where the necessary contacts with the forum were present.”
    1976 Hearings at 32 (statement of Bruno Ristau, Chief, Foreign Litigation Section, Civil
    Division, Dep’t of Justice). The non-commercial tort exception, accordingly, can be understood
    to permit suit against foreign states for torts committed in the United States “to the same extent
    that the United States [was] subject to suit in most foreign countries.” 
    Id. at 29.
    This same legislative history also reflects an understanding of the European model that
    Congress sought to mirror. In particular, the legislative record included a copy of the European
    Convention on State Immunity, which was scheduled to “come into force” roughly a week later.
    1976 Hearing at 37. When asked at a hearing whether there was “any inconsistency between that
    new convention and th[e] bill” that became the FSIA, the Legal Advisor to the State Department
    answered “no,” with the sole qualification that the FSIA went “somewhat further” regarding the
    execution of judgments against foreign states. 
    Id. The relevant
    provision of the European
    29
    Convention on State Immunity provided:
    A Contracting State cannot claim immunity from the jurisdiction of a court of
    another Contracting State in proceedings which relate to redress for injury to the
    person or damage to tangible property, if the facts which occasioned the injury or
    damage occurred in the territory of the State of the forum, and if the author or the
    injury or damage was present in that territory at the time when those acts
    occurred.
    Article 11, European Convention on State Immunity, reprinted in 1976 Hearings 39 (emphasis
    added); see also 1973 Hearing at 32 (referring to proposed convention). The non-commercial
    tort exception thus sought to parallel the European waiver of sovereign immunity, which
    required the tortfeasor’s physical presence in the jurisdiction of suit.
    For the foregoing reasons, the Court holds that Kidane’s claim for intrusion upon
    seclusion is barred by the “entire tort” rule. The political branches may ultimately deem it
    advisable to permit suits against foreign sovereigns who, without setting foot on American soil,
    use technology to commit torts against persons located here. But “[i]f the [FSIA] is to be altered,
    that is a function for the same body that adopted it.” 
    Black, 564 F.2d at 539
    (interpreting FTCA).
    Absent further action by Congress, any remedy for such alleged misconduct must take place at a
    diplomatic level.
    3. The Discretionary Function Exception
    Although the Court has already concluded that both of Kidane’s claims must be
    dismissed, given the likelihood that its decision will be appealed and in the interest of judicial
    efficiency, the Court will also address Ethiopia’s final argument why the FSIA bars this action—
    an argument that is substantial, if ultimately unpersuasive. In particular, Ethiopia argues that the
    FSIA’s discretionary function exception bars Kidane’s claim because the alleged conduct
    “involve[s] an element of choice” and is exactly the kind of “quintessentially political” decision,
    Dkt. 27-2 at 20, that the exception was designed to shield. The Court disagrees.
    30
    The FSIA’s discretionary function exception bars a claim that would otherwise fall within
    the non-commercial tort exception if it is “based upon the exercise or performance or the failure
    to exercise or perform a discretionary function[,] regardless of whether the discretion be abused.”
    28 U.S.C. § 1605(a)(5)(A). As the D.C. Circuit has explained, the FSIA’s discretionary function
    exception is “analogous” to the FTCA’s similar exception. See MacArthur Area Citizens 
    Ass’n, 809 F.2d at 922
    . The D.C. Circuit follows a two-part test in determining whether governmental
    conduct is shielded as discretionary. Under that test, a court first asks “whether any statute,
    regulation, or policy specifically prescribes a course of action for an employee to follow.”
    Banneker Ventures, LLC v. Graham, 
    798 F.3d 1119
    , 1143 (D.C. Cir. 2015). If the employee was
    following such a policy, his conduct was non-discretionary and subject to liability. 
    Id. Second, if
    the tortfeasor’s conduct was not directed by some statute or policy, but instead was the result
    of discretion, the court asks if “the exercise of discretion [was] grounded in social, economic, or
    political goals,” thus making it “an exercise of governmental judgment and so immune.” 
    Id. Ethiopia argues
    that its conduct falls under the second of these prongs. In its view,
    because the act of spying on individuals living abroad is a “quintessentially political” one, Dkt.
    27-2 at 20, the FSIA’s discretionary function exception shields such conduct from suit. Kidane,
    for his part, argues that a corollary rule to the discretionary function exception makes clear that
    the alleged conduct falls outside the exception. See Dkt. 28 at 31–32. The Supreme Court has
    long held that when a U.S. official acts outside a grant of discretionary authority, “there will be
    no shelter from liability because there is no room for choice and the action will be contrary to
    policy.” See United States v. Gaubert, 
    499 U.S. 315
    , 324 (1991). As the D.C. Circuit has
    explained this rule, “[a] government official has no discretion to violate the binding laws,
    regulations, or policies that define the extent of his official powers.” Red Lake Band of
    31
    Chippewa Indians v. United States, 
    800 F.2d 1178
    , 1196 (D.C. Cir. 1986). Most courts that have
    considered the issue have therefore concluded that the FTCA’s discretionary function exception
    does not shield acts barred by statute, regulation, or policy—that is, the exception does not apply
    to illegal acts. See Banneker 
    Ventures, 798 F.3d at 1143
    (holding that there is “no difference
    between a prescription by policy that leaves no room for choice and a proscription that does the
    same”); cf. Castro v. United States, 
    608 F.3d 266
    , 271 n.1 (5th Cir. 2010) (en banc) (Stewart, J.,
    dissenting) (collecting cases). Pursuant to this rule, courts have concluded, for instance, that the
    FTCA’s discretionary function exception does not shield government officials who unlawfully
    open private mail. See Birnbaum v. United States, 
    588 F.2d 319
    , 329 (2d Cir. 1978);
    
    Cruikshank, 431 F. Supp. at 1359
    .
    Kidane argues that because Ethiopia’s conduct would have violated U.S. criminal law—
    indeed, would have been a “serious felon[y] under federal law,” Dkt. 28 at 31–32—it cannot be
    protected by the FSIA’s discretionary function exception. There is little discussion in the
    caselaw, however, about how the rule limiting the FTCA’s discretionary function exception to
    the acts of an officer acting within “the extent of his official powers,” see Red 
    Lake, 800 F.2d at 1196
    , applies in the context of the FSIA’s analogous exception. The central inquiry under the
    FTCA’s discretionary function exception is which statute, rule, or policy permitted the relevant
    U.S. official to exercise “policy judgment”—that is, which rule defines and limits that official’s
    “official powers.” See Dalehite v. United States, 
    346 U.S. 15
    , 36 (1953). But it is less clear how
    courts should go about identifying such rules when assessing the “discretion” of foreign officials,
    not U.S. officials, to act. Should courts look to U.S. law or to international law? Cf. 
    Letelier, 588 F. Supp. at 675
    (considering “both national and international law”). Is the law of the foreign
    32
    country relevant? Cf. Liu v. Republic of China, 
    892 F.2d 1419
    , 1431 (9th Cir. 1989) (concluding
    that it is).
    Not surprisingly, Ethiopia argues for the broadest interpretation of the scope of the
    exception. Citing this Court’s decision in Letelier, 
    588 F. Supp. 655
    , it contends that the
    “legality of the [foreign state’s] activity [under U.S. law] is not the test, but rather whether the
    activity violates universal norms, such as murder and torture.” Dkt. 29 at 16. But Letelier did
    not hold any such thing. The question in that case was whether Chile’s assassination of a U.S.-
    based diplomat was shielded by the FSIA’s discretionary function exception. The Court held
    that it was not, explaining that foreign officials lack “discretion” within the meaning of the FSIA
    to commit any acts that are “clearly contrary to the precepts of humanity as recognized in both
    national and international 
    law.” 488 F. Supp. at 675
    . The Court said nothing, however, about
    whether foreign officials have the “discretion” to commit less serious offenses, or, indeed, about
    whether the ultimate touchstone is “national” or “international” law. Cf. Curtis A. Bradley &
    Jack L. Goldsmith, Pinochet and International Human Rights Litigation, 
    97 Mich. L
    . Rev. 2129,
    2154–55 (1999) (criticizing Letelier’s reliance on international law). Yet, other than Letelier,
    Ethiopia offers no authority to support its proposed interpretation of the discretionary function
    exception. That interpretation, moreover, would render foreign sovereigns immune from
    dramatically more suits under the FSIA than the United States is under the FTCA, and is thus at
    odds with Congress’s goal of “plac[ing] foreign states in the same position before the United
    States courts as is the United States itself” when sued under the FTCA. Restatement (Third) of
    the Foreign Relations Law of the United States § 454 n.3.
    The Court also rejects Ethiopia’s contention that Ethiopian law should govern the scope
    of the FSIA’s discretionary function exception. As a threshold matter, it is not clear why
    33
    Congress would have intended the analysis in an FSIA suit to turn on the meaning of foreign
    law—an analysis that both the Court and the parties (or at least the plaintiff) are poorly
    positioned to perform. Cf. 
    Liu, 892 F.2d at 1431
    –32. Even if it were practical for the Court to
    conduct such an inquiry, moreover, treating foreign law as central to the analysis would run
    contrary to Congress’s intent to place the United States and foreign states on similar footing in
    U.S. courts. Such an approach would also seem to reward foreign states for adopting rules
    permitting or encouraging tortious activity in the United States—a purpose that it is difficult to
    ascribe to Congress. Perhaps most significantly, a focus on foreign authority to act would at
    least at times require U.S. courts—including state courts, which are also charged with applying
    the FSIA, see 28 U.S.C. § 1605(a)—to “launch[] inquiries into the type of governments that
    obtain in particular foreign nations,” whether particular foreign actions are grounded in law or
    “are merely [actions] turning upon the whim or caprice of government officials, whether the
    representation of consuls, ambassadors, and other representatives of foreign nations is credible or
    made in good faith,” and whether particular foreign officials were acting with the implicit or
    explicit authorization of their superiors. See Zschernig v. Miller, 
    389 U.S. 429
    , 434 (1968).
    Such a construction of the Act, in other words, could raise distinct foreign relations concerns
    going far beyond those already inherent in subjecting foreign states to suit.
    Instead, the Court concludes that, in creating a discretionary function exception under the
    FSIA, Congress did not mean to shield “discretionary” acts by foreign states when those acts
    involve serious violations of U.S. criminal law. Such a reading of the exception is consistent
    with the D.C. Circuit’s sole opinion touching upon this question, MacArthur Area Citizens
    Association v. Republic of Peru, 
    809 F.2d 918
    . In that case, a Washington, D.C. neighborhood
    association sued Peru for converting a local building, which had been zoned for residential use,
    34
    into its chancery. See 
    id. at 919.
    Among other questions, the case turned on whether the
    discretionary function exception barred the suit. 
    Id. at 921–23.
    In rejecting the plaintiffs’
    contention that “Peru’s acts [we]re criminal and thus [could] not be discretionary,” the Court of
    Appeals acknowledged that “case law buttresses the proposition that a criminal act cannot be
    discretionary,” but concluded that Peru had not been shown to have violated any criminal law.
    
    Id. at 922
    n.4. It added:
    [I]t is hardly clear that, even if a criminal act were shown, it would automatically
    prevent designation of Peru’s acts as discretionary. The cases on which appellant
    relies involve criminal acts of a rather different character and order. See, e.g.,
    
    Letelier, 488 F. Supp. at 673
    (involving “assassination of an individual or
    individuals, action that is clearly contrary to the precepts of humanity as
    recognized in both national and international law”). We think it not unduly bold
    to conclude that violations, if any, of a zoning ordinance do not rise to the level of
    actions malum in se.
    
    Id. Thus, albeit
    in dicta, MacArthur Area suggests that the discretionary function exception does
    not shield acts by foreign officials that violate federal criminal law, at least if the conduct is
    malum in se. 8 The Restatement provides a similar standard, suggesting that the exception should
    not apply to “serious criminal act[s].” Restatement (Third) of the Foreign Relations Law of the
    United States § 454 n.3.
    On the present record, the Court can neither conclude that a serious criminal act occurred
    nor reject the possibility that it did. Various criminal laws, including, most prominently, the
    8
    The D.C. Circuit also distinguished cases holding that “[a] government official has no
    discretion to violate the binding laws, regulations, or policies that define the scope of his official
    powers,” see Red 
    Lake, 800 F.2d at 1196
    , on the ground that “[t]here [wa]s no indication in the
    record that the” Peruvian officials “were acting ultra 
    vires.” 809 F.2d at 922
    n.3. For the
    reasons explained above, the Court is unconvinced that the FSIA’s discretionary function
    exception turns on whether the foreign official was acting within the scope of her authority under
    foreign law in committing the alleged tort. In any event, nothing in MacArthur Area suggests
    that authorization under foreign law is sufficient to invoke the discretionary function exception
    where the conduct at issue constitutes a serious violation of U.S. criminal law.
    35
    Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., make computer trespass a
    federal crime. See S. Rep. No. 104-357, at 11 (1996) (explaining that the CFAA applies to all
    computer trespasses). Similarly, even though the relevant provision of the Wiretap Act does not
    apply to foreign states, see supra at 7–13, it does apply to the actions of “individuals,” and would
    arguably apply to actions committed by those employed by foreign states. Ethiopia argues that
    its immunity from suit under the FSIA does not depend on whether it violated these statutes, but
    does not argue, at this stage, that it did not do so. The Court is thus left without the necessary
    record upon which to draw a conclusion regarding Ethiopia’s conduct (and, accordingly, the
    applicability of the discretionary function exception). In light of its previous conclusion that the
    suit should be dismissed under the “entire tort” rule, the Court has no need to direct further
    briefing on these issues. It has no difficulty, however, rejecting Ethiopia’s overbroad
    interpretations of the scope of the discretionary function exception, and concluding that when a
    plaintiff alleges underlying conduct that constitutes a serious violation of a U.S. criminal statute,
    the FSIA’s discretionary function exception does not apply.
    IV. CONCLUSION
    For the foregoing reasons, it is hereby ORDERED that Ethiopia’s motion to dismiss,
    Dkt. 27, is GRANTED. The Clerk shall enter final judgment.
    SO ORDERED.
    /s/ Randolph D. Moss
    RANDOLPH D. MOSS
    United States District Judge
    Date: May 24, 2016
    36
    

Document Info

Docket Number: Civil Action No. 2014-0372

Citation Numbers: 189 F. Supp. 3d 6, 2016 U.S. Dist. LEXIS 67909, 2016 WL 3023996

Judges: Judge Randolph D. Moss

Filed Date: 5/24/2016

Precedential Status: Precedential

Modified Date: 11/7/2024

Authorities (43)

Marks v. Bell Tel. Co. of Penn. , 460 Pa. 73 ( 1975 )

Garza v. Bexar Metropolitan Water District , 639 F. Supp. 2d 770 ( 2009 )

Dalehite v. United States , 73 S. Ct. 956 ( 1953 )

Zschernig v. Miller , 88 S. Ct. 664 ( 1968 )

Kasten v. Saint-Gobain Performance Plastics Corp. , 131 S. Ct. 1325 ( 2011 )

Verlinden B. v. v. Central Bank of Nigeria , 103 S. Ct. 1962 ( 1983 )

organizacion-jd-ltda-and-manufacturas-jd-ltda-v-us-department-of , 18 F.3d 91 ( 1994 )

New Summit Associates Ltd. Partnership v. Nistle , 73 Md. App. 351 ( 1987 )

Pamela A. Dorris v. Charles Absher and Della Absher , 179 F.3d 420 ( 1999 )

Saudi Arabia v. Nelson , 113 S. Ct. 1471 ( 1993 )

Vermont Agency of Natural Resources v. United States Ex Rel.... , 120 S. Ct. 1858 ( 2000 )

Conner v. Tate , 130 F. Supp. 2d 1370 ( 2001 )

CYBERSITTER, LLC v. People's Republic of China , 805 F. Supp. 2d 958 ( 2011 )

Dorris v. Absher , 959 F. Supp. 813 ( 1997 )

Anderson v. City of Columbus, Georgia , 374 F. Supp. 2d 1240 ( 2005 )

Price v. Socialist People's Libyan Arab Jamahiriya , 294 F.3d 82 ( 2002 )

Phoenix Consulting, Inc. v. Republic of Angola , 216 F.3d 36 ( 2000 )

Drew Pearson and Jack Anderson v. Thomas J. Dodd , 410 F.2d 701 ( 1969 )

United States v. Gaubert , 111 S. Ct. 1267 ( 1991 )

United States v. S.A. Empresa De Viacao Aerea Rio Grandense , 104 S. Ct. 2755 ( 1984 )

View All Authorities »