Feeds

Rendition lawsuit targets aerospace giant Boeing

Should the state secrets doctrine be used to protect government contractors?

Secure remote control for conventional and virtual desktops

Alone, in the middle of the night and nowhere, Khaled El-Masri discovered himself once again to be a free man. He had been left on a hilltop in Albania by his CIA captors, after nearly six months of torture in squalid detention at one of the CIA's black site prisons.

The German citizen eventually sued the CIA and lost after the CIA invoked the state secrets privilege in its own defense. But a new rendition case - this time targeting American aerospace powerhouse Boeing - is now working its way through a rather more sympathetic branch of the American legal system.

Last week, in the relatively liberal Ninth Circuit Court of Appeals, the American Civil Liberties Union filed a scathing indictment of both the Boeing subsidiary that milked the rendition flights for all they were worth, and the Bush administration's neurotic attempts to cloak even private litigants behind the state secrets doctrine.

The state secrets doctrine is an evidentiary privilege invoked by the government in the interests of national security, and El-Masri found himself in the Fourth Circuit Court of Appeals, which encompasses most of the American south and is the most conservative appellate circuit in the United States. Perhaps not surprisingly, the Fourth Circuit, tortured in its own intellectually paranoid way, took a traditionally narrow evidentiary privilege and expanded it beyond all recognition, effectively rendering the El-Masri case non-justiciable. The Supreme Court declined to hear his appeal.

¡Arriba Bushies!

The new case, Muhamed v. Jeppesen, takes aim at a subsidiary of American defense contractor Boeing that appears to have cornered the market on CIA rendition flights, and profited handsomely thereby. The filings even include a declaration by a former Jeppesen employee, who recounts the story of a senior manager reveling in how profitable the rendition racket was at an employee meet-and-greet in San Jose, only to have to explain to the confused new employees that he was talking about the "torture flights".

Recent Ninth Circuit decisions have treated the state secrets doctrine with the narrow interpretation traditionally accorded an evidentiary privilege, which means that Muhamed has a much better chance of getting his day in court than the unfortunate El-Masri ever did. The Ninth Circuit has been especially skeptical of allowing the doctrine to be invoked to cover evidence that is already in the public domain - and much of the evidence in the Muhamed case, from the flight plans registered by Jeppesen with European regulators to the witness accounts and the admissions by collaborating, friendly governments, is already out there. The plaintiffs in Muhamed can testify personally to their own mistreatment, which eliminates the tricky standing issues of the Al-Haramain surveillance case.

One particularly noxious aspect of Muhamed is that the US government is seeking to intervene in a private lawsuit and invoke the evidentiary privilege before Jeppesen has even answered the complaint, and before any evidentiary discovery at all has taken place - essentially strangling a lawsuit in its infancy on behalf of a favored contractor. Typically, a court vets the admissible evidence in camera to remove whatever might be construed to be a legitimate threat to national security, leaving whatever is left for the plaintiff to utilize. Only if the privilege eliminated consideration of a legitimate defense for a defendant would the lawsuit itself be dismissed.

The doctrine has been invoked more by the current administration than any in history, and reconsideration of this common law doctrine - which sits rather awkwardly within a system of limited federal power derived exclusively from the Constitution - is long overdue. The Supreme Court has not considered the state secrets doctrine since 1953 in Reynolds, and although it declined to reconsider the doctrine in El-Masri, the stark jurisdictional split between the Fourth Circuit and the Ninth on the state secrets doctrine means that reconsideration will have to come sooner rather than later.

Reynolds concerned the widows of air force pilots killed in a plane crash who sued the government on a negligence theory, only to have crucial evidence of government guilt withheld under the state secrets doctrine. When those documents were declassified in 2000, government claims that the documents concerned top secret electronics equipment were proven false - the documents in fact concerned mechanical defects that led to engine failure.

One can only hope that current and future victims of US government malfeasance and obfuscation will not have to wait 50 years for vindication.®

Burke Hansen, attorney at large, heads a San Francisco law office

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.