                               UNITED STATES DISTRICT COURT
                               FOR THE DISTRICT OF COLUMBIA


 JOHN DOE, a.k.a. KIDANE,

                 Plaintiff,

         v.
                                                            Civil Action No. 14-372 (RDM)
 FEDERAL DEMOCRATIC REPUBLIC OF
 ETHIOPIA,

                 Defendant.


                              MEMORANDUM OPINION AND ORDER

       The central question presented in this case is whether federal law permits the plaintiff, a

U.S. citizen born in Ethiopia who remains active in the Ethiopian diaspora, to maintain suit in

this Court against the Federal Democratic Republic of Ethiopia for its alleged surreptitious

monitoring and recording of his (and his family’s) computer activities and communications in

Silver Spring, Maryland. Plaintiff claims that, in doing so, Ethiopia violated Title III of the

Omnibus Crime Control and Safe Streets Act of 1968 (“Wiretap Act”), 18 U.S.C. § 2510 et seq.,

and committed the common law tort of “intrusion upon seclusion” in violation of Maryland law.

Ethiopia has appeared, but moves to dismiss on numerous grounds.

       As explained below, the Court concludes that the Wiretap Act does not create a private

cause of action against a foreign state and that the plaintiff’s state-law tort claim is barred by the

Foreign Sovereign Immunities Act (“FSIA”), 28 U.S.C. §§ 1602–1611. The Court, accordingly,

GRANTS Ethiopia’s motion and dismisses the amended complaint.
                                       I. BACKGROUND

       For present purposes, the Court accepts at true the allegations of the amended complaint,

along with the incorporated material. 1 See Price v. Socialist People’s Libyan Arab Jamahiriya,

294 F.3d 82, 93 (D.C. Cir. 2002) (when reviewing “a plaintiff’s unchallenged factual allegations

to determine whether they are sufficient to deprive a foreign state defendant of sovereign

immunity, [the court must] assume those allegations to be true” (citations omitted)); Gordon v.

United States Capitol Police, 778 F.3d 158, 163–64 (D.C. Cir. 2015) (under Federal Rule of

Civil Procedure 12(b)(6), the court “must accept the complaint’s allegations as true and draw all

reasonable inferences in favor of the non-moving party”).

       Plaintiff John Doe, who uses the pseudonym “Kidane” in connection with his political

activities, is a U.S. citizen who was born in Ethiopia and has lived in the United States since

obtaining asylum in the early 1990s. Dkt. 1-1 ¶ 3; Dkt. 26 at ¶¶ 3, 19, 20. At all relevant times,

Kidane resided in Silver Spring, Maryland, where he has remained active “within the Ethiopian

Diaspora.” Dkt. 26 ¶¶ 19, 20. He asserts that “the Ethiopian government monitors political

dissidents at home and abroad . . . through the use of electronic surveillance,” id. ¶ 25, and that

he was subjected to such surveillance by means of a program secretly installed on his personal

computer, controlled by the Ethiopian government or its agents, and used by them to monitor and

record his computer activities and communications. See id. ¶¶ 3, 5, 9.




1
  Had Ethiopia presented evidence disputing the “factual underpinnings of” Kidane’s invocation
of an exception to the FSIA, the Court would have been required to “go beyond the pleadings
and [to] resolve any disputed issues of fact the resolution of which is necessary to a ruling upon
the motion to dismiss.” Phoenix Consulting v. Republic of Angola, 216 F.3d 36, 40 (D.C. Cir.
2000). But, because Ethiopia has not done so, the Court must resolve Ethiopia’s motion based
on the facts as alleged.
                                                  2
       According to the complaint, in late 2012 or early 2013, Kidane’s personal computer,

located at his home in Maryland, “bec[a]me infected with clandestine computer programs known

as FinSpy.” Id. ¶ 4. FinSpy is “a system for monitoring and gathering information from

electronic devices, including computers and mobile phones, without the knowledge of the

device’s user.” Id. ¶ 6. It is allegedly “sold exclusively to government agencies and is not

available to the general public.” Id.; see also id., Ex. A (describing the FinSpy product). Kidane

attributes the FinSpy infection of his computer to an email “sent by or on behalf of Ethiopia that

was thereafter forwarded to” him by a third party. Id. ¶ 5. The complaint does not state where

the original third-party recipient was located; Ethiopia argues, however, that the content of the

email, which is appended to the complaint, suggests that the original recipient may have resided

in London. See id., Ex. C (translation stating, in part, “[y]ou took your family to London . . . .”).

In any event, Kidane does not allege or argue that Ethiopia sent the email directly to him or to

anyone else located in the United States.

       The email contained a Trojan Horse attachment that “trick[ed]” Kidane into opening it,

Dkt. 26 ¶¶ 38, 41, “caus[ing] a clandestine client program to be surreptitiously downloaded onto

his computer,” id. ¶ 5, and resulting in the installation of the FinSpy software, id. The FinSpy

software allegedly “took what amounts to complete control over the operating system” of his

computer. Id. According to the complaint, FinSpy contains “modules” for “extracting saved

passwords from more than 20 different” programs, “for . . . recording Internet telephone calls,

text messages, and file transfers transmitted through the Skype application,” “for covertly

recording audio from a computer’s microphone even when no Skype calls are taking place,” “for

recording every keystroke on the computer,” and “for recording a picture of the contents

displayed on a computer’s screen.” Id. ¶ 36–37.



                                                  3
       Kidane alleges that once FinSpy infected his computer, it “began contemporaneously

recording some, if not all, of the activities undertaken by users of the computer, including

[Kidane] and members of his family.” Id. He alleges that it “surreptitiously intercepted and

contemporaneously recorded dozens of [his] private Skype Internet phone calls, recorded

portions or complete copies of a number of [his] emails,” and copied a web search conducted by

his son for a ninth-grade research assignment. Id. ¶ 3. He further avers that evidence of these

activities was found in various “FinSpy trace files” on his computer. See id. ¶¶ 55–60, 64–77.

These trace files included, for example, “files consistent with FinSpy’s naming convention [that]

contain portions or complete copies of [Kidane’s] private and highly confidential Skype

conversations.” Id. ¶ 69.

       Kidane further alleges that the FinSpy software installed on his computer communicated

with a computer server located in Ethiopia. Id. ¶ 10. As explained in the complaint and attached

exhibits, computers that have been infected with the FinSpy software typically communicate

with a designated “FinSpy Master” server via a “FinSpy Relay.” Id. ¶¶ 35, 43–51, Ex. A. The

“FinSpy Master” determines whether, under the applicable FinSpy license terms, a given copy of

the software will be activated. Id. ¶¶ 44–45, Ex. A. Once the software is activated, the FinSpy

Master “sends commands to [the] infected device[] and receives gathered information” from that

device. Id. ¶ 35. According to a report attached to the complaint, “a recently acquired [FinSpy]

malware sample” shows that the malware has used “images of members of the Ethiopian

opposition group, Ginbot 7, as bait, and that it has communicated with a FinSpy Command &

Control server in Ethiopia.” Dkt. 26, Ex. B. In particular, the malware communications “can be

found in [an] address block run by Ethio Telecom, Ethiopia’s state owned telecommunications

provider.” Id. Kidane alleges that “the FinSpy Relay and FinSpy Master servers with which



                                                 4
[his] computer in Maryland was controlled are located inside Ethiopia and controlled by

Defendant Ethiopia,” id. ¶ 85, and that the FinSpy installation “took instructions from a FinSpy

relay controlled by Defendant Ethiopia,” id. ¶ 84. He further alleges that FinSpy, but not all of

the distinct trace files, “appears to have been removed” from his computer just five days after the

publication of a report that disclosed “the technical details of the FinSpy Relay” used by

Ethiopia. Id. ¶ 77.

       The complaint contains two counts: a claim under the Wiretap Act, alleging that Ethiopia

illicitly intercepted Kidane’s Skype calls and “other data,” id. ¶¶ 92–100, and a claim under

Maryland tort law for intrusion upon seclusion, alleging that Ethiopia unlawfully monitored and

recorded Kidane’s and his family’s private computer activities, including Skype calls, emails,

and web searches, id. ¶¶ 101–105. Citing a fear of retaliation against himself and his family

members in the United States and Ethiopia, Kidane moved for leave to proceed

pseudonymously—as either John Doe or using the name “Kidane.” See Dkt. 1-1 at 11–13. The

Court granted that motion. See Dkt. 2.

       Ethiopia moved to dismiss the complaint, see Dkt. 27, and, after the matter was fully

briefed, the Court held oral argument on Ethiopia’s motion. In light of the fact that the case

presents “substantial issues relating to the interpretation and application of the Foreign Sovereign

Immunities Act’s non-commercial tort exception, 28 U.S.C. § 1605(a)(5), including the

discretionary function exception and the ‘entire tort’ rule,” the Court then provided the United

States with the opportunity to file a brief. See Dkt. 35. The United States responded that it was

“actively considering whether to file a Statement of Interest as permitted by 28 U.S.C. § 517,”

and requested additional time to “complete its deliberations,” and, if appropriate, to file a




                                                  5
Statement of Interest. Dkt. 37. The United States ultimately declined, however, to file a brief at

this stage of the proceeding. Dkt. 38.

                                           II. ANALYSIS

        Ethiopia moves to dismiss on multiple grounds, contending both that this Court lacks

jurisdiction under the FSIA and that Kidane fails to state a claim under the Wiretap Act because

the Act does not provide a cause of action against a foreign state. See Dkt. 27. In the ordinary

course, the Court would start with the jurisdictional question, because jurisdiction is a

precondition to the Court’s “power to declare the law, and when it ceases to exist, the only

function remaining to the court is that of announcing the fact and dismissing the cause.” Steel

Co. v. Citizens for a Better Env’t, 523 U.S. 83, 94 (1998) (quoting Ex parte McCardle, 74 US (7

Wall) 506, 514 (1868)).

        In Vermont Agency of Natural Resources v. United States ex rel. Stevens, 529 U.S. 765

(2000), however, the Supreme Court recognized a narrow exception to this rule. There, as here,

the Court possessed Article III jurisdiction but was called upon to decide whether sovereign

immunity—there, the Eleventh Amendment immunity of the state of Vermont—barred the

action. Id. at 778. Before resolving that jurisdictional question, however, the Court concluded

that it was appropriate to consider whether the relevant statute “permit[ed] the cause of action

[Congress] create[d] to be asserted against States.” Id. at 779. As the Supreme Court explained,

“[w]hen . . . two questions [of this sort] are at issue, not only is the statutory question ‘logically

antecedent to the existence of’ the . . . question” of sovereign immunity, “but also there is no

realistic possibility that addressing the statutory question will expand the Court’s power beyond

the limits that the jurisdictional restriction has imposed.” Id.

        The same is true with respect to Kidane’s claim under the Wiretap Act. The question



                                                   6
whether Congress intended to subject foreign sovereigns to suit under the Wiretap Act is

antecedent to the question whether Ethiopia would, under the FSIA, be immune from suit for any

such violation. As in Vermont Agency of Natural Resources, moreover, resolving the statutory

question first does not risk expanding the Court’s power beyond the jurisdictional limits

prescribed by Congress; indeed, both the statutory and jurisdictional issues pose essentially the

same question—did Congress intend to subject foreign states to suit in U.S. courts under the

Wiretap Act? The Court, accordingly, starts with the question whether the Wiretap Act applies

to foreign states before turning to the application of the FSIA.

A.     Applicability of the Wiretap Act to Foreign States

       The Wiretap Act imposes criminal penalties and establishes a private cause of action for,

among other things, the unauthorized interception of “any wire, oral, or electronic

communication.” 18 U.S.C. § 2511(1) (liability); see also id. §§ 2511(4) (criminal

penalties), 2520(a) (private cause of action for civil damages). According to Ethiopia, however,

the Wiretap Act does not apply to foreign states. That contention raises two distinct questions:

First, does the prohibition on unauthorized interception of communications contained in section

2511(1) of the Wiretap Act apply to governmental entities? Second, if not, does the civil cause

of action created in the Act nonetheless authorize private litigants to sue governmental entities,

including foreign states, for violations of section 2511(1)?

       As usual, the Court “begin[s] with the text of the statute.” Kasten v. Saint-Gobain

Performance Plastics Corp., 563 U.S. 1, 7 (2011). The prohibition of the Wiretap Act at issue in

this case is found in section 2511(1)(a), which makes it a crime for “any person” to

“intentionally intercept[], endeavor[] to intercept, or procure[] any other person to intercept . . .

any wire, oral, or electronic communication” without lawful authorization. The term “person,”



                                                   7
in turn, is defined as “any employee, or agent of the United States or any State or political

subdivision thereof, and any individual, partnership, association, joint stock company, trust, or

corporation.” Id. § 2510(6). Thus, by its plain terms, the prohibition in section 2511(1)(a) does

not apply to governmental entities; rather, it is limited to suits against those acting on behalf of

the United States and state and local governments, other individuals, and various non-

governmental entities. That reading of the statute is consistent, moreover, with the “longstanding

interpretative presumption that ‘person’ does not include the sovereign,” Vermont Agency of

Nat’l Res., 529 U.S. at 780, and with the legislative history of the Wiretap Act, which indicates

that even though the “definition [of ‘person’] explicitly includes any officer or employee of the

United States or any State or political subdivision of a State,” it excludes “the governmental units

themselves,” S. Rep. No. 90-1097 (1968), reprinted in 1968 U.S.C.C.A.N. 2112, 2179. The

Court, accordingly, concludes that the prohibition on unauthorized interception of wire, oral, or

electronic communications contained in section 2511(1)(a) does not apply to governmental

entities, much less foreign states.

       Kidane does not resist this line of reasoning, but instead argues that two amendments to

the provision of the Wiretap Act establishing a private cause of action for civil damages, section

2520, opened the door to private suits against governmental entities, including foreign states, for

violations of section 2511(1)(a) of the Act. As originally enacted in 1968, section 2520 provided

a cause of action for a “person whose wire or oral communication is intercepted . . . in violation

of this chapter . . . against any person who intercepts . . . such communications.” See Omnibus

Crime Control and Safe Streets Act of 1968, Pub. L. No. 90-351, Title III, § 802, 82 Stat. 213

(1968) (emphasis added). In 1986, however, Congress enacted the Electronic Communications

Privacy Act (“ECPA”), which—along with a more comprehensive overhaul of the privacy laws



                                                  8
to address electronic communications—modified section 2520 to permit recovery “from the

person or entity which engaged in that violation [of this chapter].” Pub. L. No. 99-508, Title I,

§ 103, 100 Stat. 1848 (1986) (emphasis added). Then, in 2001, Congress again amended section

2520 in the PATRIOT Act. That amendment changed the relevant language to its current form,

which provides that a person who has been subjected to the unlawful interception of his wire,

oral, or electronic communications may sue “the person or entity, other than the United States,

which engaged in that violation.” Pub. L. No. 107-56, Title I, § 223, 115 Stat. 293, 384 (2001)

(codified at 18 U.S.C. § 2520(a) (2012)) (emphasis added).

       As Kidane correctly observes, the phrase “or entity” in section 2520(a) “logically must

refer to [at least some] governmental entities in order to have meaning and effect.” Dkt. 28 at

19. A number of courts considering claims against local governments have so held. 2 As they

explain, “[t]he addition of the words ‘[or] entity’ can only mean a governmental entity because

prior to the 1986 amendments, the definition of ‘person’ already included business entities. In

order for [the addition of] the term [‘entity’ to section 2520] not to be superfluous, the term

‘entity’ [must] mean[] governmental entities.” Adams, 250 F.3d at 985. In addition, although

there is no legislative history discussing ECPA’s addition of the phrase “or entity” to section

2520, ECPA simultaneously “added the same language to the civil liability provision for



2
   See Adams v. City of Battle Creek, 250 F.3d 980, 985–86 (6th Cir. 2001); Garza v. Bexar
Metro. Water Dist., 639 F. Supp. 2d 770, 773–75 (W.D. Tex. 2009); Williams v. City of Tulsa,
393 F. Supp. 2d 1124, 1132 (N.D. Okla. 2005); Conner v. Tate, 130 F. Supp. 2d 1370, 1373–74
(N.D. Ga. 2001); Dorris v. Absher, 959 F. Supp. 813, 820 (M.D. Tenn. 1997), aff’d in part, rev’d
in part on other grounds, 179 F.3d 420 (6th Cir. 1999); PBA Local No. 38 v. Woodbridge Police
Dep’t, 832 F. Supp. 808, 823 (D.N.J. 1993); Bodunde v. Parizek, No. 93-1464, 1993 WL
189941, at *3–4 (N.D. Ill. May 28, 1993); Huber v. N. Carolina State Univ., 594 S.E.2d 402, 407
(N.C. 2004). See also Organizacion JD Ltda. v. U.S. Dep’t of Justice, 18 F.3d 91, 95 (2d Cir.
1994) (holding parallel cause of action in section 2707 for violations of the Stored
Communications Act covers municipality). The D.C. Circuit has not addressed the issue.

                                                  9
interception of stored wire and electronic communications” contained in 18 U.S.C. § 2707

(Stored Communications Act). Id. “The Senate [and House] Committee Report[s] summarizing

[section] 2707, the parallel section for liability for intercepting stored communications,

specifically state[] that the word ‘entity’ includes governmental entities.” Id.; see also S. Rep.

No. 99-541, at 43 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3597; H.R. Rep. No. 99-647 at

74 (1986). If ECPA’s addition of the word “entity” to section 2707 included “governmental

entities,” Kidane posits that the same must be true for ECPA’s addition of the same language to

section 2520.

       The 2001 amendment to section 2520 contained in the PATRIOT Act, likewise, supports

the conclusion that at least some governmental entities are subject to suit for violating at least

certain provisions of the Wiretap Act. The addition of the phrase “other than the United States”

as a modifier of the word “entity” in section 2520(a) confirms that “entity” must cover some

governmental bodies. See Garza, 639 F. Supp. 2d at 775; Williams, 393 F. Supp. 2d at 1132;

Huber, 594 S.E.2d at 407. Although “[w]hat limited legislative history exists is silent on the

addition of this language,” Williams, 393 F. Supp. 2d at 1132-33, the phrase “other than the

United States” would have been unnecessary unless Congress understood the preceding term

“entity” otherwise to encompass governmental entities. See id.; Garza, 639 F. Supp. 2d at 775;

Huber, 594 S.E.2d at 407.

       For these reasons, the Court does not doubt that the term “entity,” as used in section

2520, refers to at least some governmental entities for some purposes. See also Seitz v. City of

Elgin, 719 F.3d 654, 657–60 (7th Cir. 2013) (“The plain meaning of ‘entity’ includes

government units.”). But that does not answer the question whether Congress intended to expose

those entities to suits for violations of section 2511(1)(a) in particular, as opposed to suits for



                                                  10
violations of other prohibitions in the Wiretap Act. Many courts considering claims against local

governments have assumed the former, without elaboration. 3 But, as explained above, the plain

language of section 2511(1)(a) applies only to “persons,” and that phrase is defined in a manner

that does not include governmental entities.

       The courts that hold that the amendments to section 2520 permit a civil action against

local governmental entities for a violation of section 2511(1) treat those amendments as

implicitly amending the definition of “person” and the scope of section 2511(1). See supra n.3.

That conclusion turns on the premise that the phrase “person or entity, other than the United

States” makes sense only if section 2511(1) is construed to reach the conduct of governmental

“entities” “other than the United States.” That is, although “[s]ection 2520 itself creates no

substantive rights,” Seitz, 719 F.3d at 657, many courts assume that the amendments to section

2520 covering governmental entities can be given meaning only if they are construed to have

imposed a corresponding duty on governmental entities under section 2511(1) not to unlawfully

intercept, endeavor to intercept, or procure another person to intercept communications.

       The problem with this argument is that it is not at all difficult to give meaning to

Congress’s creation of a cause of action against governmental entities other than the United

States without expanding the scope of section 2511(1) or implicitly amending the statutory

definition of “person” to include governmental entities. As the Seventh Circuit has explained, at

the same time that Congress added the phrase “or entity” to section 2520, it also added section

2511(3)(a) to the Wiretap Act. See Seitz, 719 F.3d at 659. Like section 2511(1), that section



3
   See Adams, 250 F.3d at 985–86; Garza, 639 F. Supp. 2d at 773–75; Williams, 393 F. Supp. 2d
at 1132; Conner, 130 F. Supp. 2d at 1373–74; Dorris, 959 F. Supp. at 820; PBA Local No. 38,
832 F. Supp. at 823; Bodunde, 1993 WL 189941, at *3–4; Huber, 594 S.E.2d at 407. But see
Seitz, 719 F.3d at 657–60.

                                                11
prohibits specified conduct but, unlike section 2511(1), it applies to any “person or entity.” Id.

(emphasis added). In particular, with certain exceptions, section 2511(3)(a) prohibits “a person

or entity providing an electronic communication service to the public [from] intentionally

divulg[ing] the contents of any communication . . . while in transmission on that service to any

person or entity other than an addressee or intended recipient of such communication.” 18

U.S.C. § 2511(3)(a) (emphasis added). It is thus not surprising that, at the same time that

Congress added this prohibitory language to the statute, it also amended section “2520 to match

the ‘person or entity’ language used in [section] 2511(3). Without that change, parties could sue

a ‘person’ who violated [section] 2511(3)(a) but not an entity even though [section] 2511(3)

explicitly referenced both.” 4 Seitz, 719 F.3d at 658–59 (internal footnotes and citation omitted).

See also Adams v. Luzerne Cty., 36 F. Supp. 3d 511, 523 (M.D. Pa. 2014); Whitaker v. Barksdale

Air Force Base, No. 14-2342, 2015 WL 574697, at *5 (W.D. La. Feb. 11, 2015); Anderson v.

City of Columbus, Georgia, 374 F. Supp. 2d 1240, 1244–46 (M.D. Ga. 2005). As a result, the

Court can give sections 2510(6) and 2511(1) their plain meaning, while also “giv[ing] meaning

to each word of [section] 2520[(a)].” Seitz, 719 F.3d at 658.

       Kidane might, instead, be understood to contend that, even if Congress did not expand

the scope of sections 2510(6) and 2511(1) through the amendments to section 2520, it amended

section 2520 to create a cause of action against a government for substantive violations of section

2511(1) committed by individuals acting on behalf of that state—based, for example, on

respondeat superior liability. Under this theory, even though a foreign government is not itself



4
  Although section 2511(3)(a) addresses “person[s]” or “entit[ies]” who provide “an electronic
communication service to the public,” the provision is not limited to the regulation of private
enterprise. “Apparently, municipal governments have, in fact, entered or attempted to enter the
telecommunications business.” Seitz, 719 F.3d at 659.


                                                 12
subject to section 2511(1), it may be vicariously liable for violations of section 2511(1)

committed by its agents, who are “individuals” and thus arguably “persons” as defined in section

2510(6).

       This argument, however, cannot be squared with the text of the Wiretap Act for two

reasons. First, section 2520 permits a party whose communications were unlawfully intercepted

to “recover from the person or entity, other than the United States, which engaged in that

violation.” 18 U.S.C. § 2520(1) (emphases added). Accordingly, the “person or entity” subject

to suit must be the same “person or entity” that violated the statute. Second, permitting suit

against a governmental entity that could not itself “engage[] in” a violation of section 2511(1) is

also at odds with the statutory definition of “person” contained in section 2510(6). In that

definition, Congress defined the specific types of juridical bodies capable of violating section

2511(1) to include a “partnership, association, joint stock company, trust, or corporation.” 18

U.S.C. § 2510(6). Because these entities can act only through their members, agents, officers,

and employees, the definition necessarily already encompasses a concept of agent-principal or

vicarious liability. To graft yet an additional theory of such liability onto section 2520 would

undermine the balance that Congress struck. Cf. Cicippio-Puleo v. Islamic Republic of Iran, 353

F.3d 1024, 1036 (D.C. Cir. 2004) (declining to imply cause of action against foreign government

where “the liability imposed by [28 U.S.C. § 1605(a)(7)] is precisely limited to ‘an official,

employee, or agent of a foreign state designated as a state sponsor of terrorism’”).

       The Court, accordingly, concludes that section 2520 of the Wiretap Act does not create a

civil cause of action against a foreign state for interceptions of wire, oral, or electronic

communications in violation of section 2511(1), and thus GRANTS Ethiopia’s motion to

dismiss Count One of the complaint.



                                                  13
B.     Foreign Sovereign Immunities Act

       The conclusion that Congress did not create a private cause of action against foreign

states for violations of section 2511(1) of the Wiretap Act does not resolve the case, because

Kidane also asserts a claim based on the common law tort of intrusion upon seclusion. See Dkt.

26 ¶¶ 101–05. Under Maryland law, this tort requires “the intentional intrusion upon the solitude

or seclusion of another or his private affairs or concerns [in a manner] that would be highly

offensive to a reasonable person.” Pemberton v. Bethlehem Steel Corp., 502 A.2d 1101, 1116

(Md. Ct. Spec. App. 1986) (citing Restatement (Second) of Tort, § 652B (1977)). The question

remains whether the FSIA bars Kidane from asserting this claim against Ethiopia.

       Although the FSIA was not enacted until 1976, foreign sovereign immunity dates back to

the earliest days of the Republic. See Verlinden B.V. v. Central Bank of Nigeria, 461 U.S. 480,

486 (1983). Originally, the United States accorded foreign states absolute immunity from suit in

its courts. See Restatement (Third) of the Foreign Relations Law of the United States, ch. 5,

subch. A, intro. n. (1987 & 2016 Supp.) (“Until the twentieth century, sovereign immunity from

the jurisdiction of foreign states seemed to have no exceptions.”); see also Republic of Mexico v.

Hoffman, 324 U.S. 30, 35 (1945); The Schooner Exchange v. M’Faddon, 11 U.S. (7 Cranch) 116,

136–37, 146 (1812). Beginning in the 1950s, however, the United States adopted the

“restrictive” theory of sovereign immunity under which “sovereign or public actions” of a state

are immunized, but “private acts” are not. See Letter from Jack B. Tate, Acting Legal Adviser,

U.S. Dep’t of State, to Philip B. Perlman, Acting Attorney Gen., reprinted in Alfred Dunhill of

London, Inc. v. Cuba, 425 U.S. 682, 711–715 (1976). In the State Department’s view, absolute

foreign sovereign immunity had become “inconsistent with the action of the Government of the

United States in subjecting itself to suit in these same courts in both contract and tort,” and “the



                                                 14
widespread and increasing practice on the part of governments of engaging in commercial

activities [made] necessary a practice which will enable persons doing business with them to

have their rights determined in the courts.” Id. at 714.

       Almost a quarter-century later, Congress enacted the FSIA, which, with modest

refinements, codified the restrictive theory of immunity. See Verlinden, 461 U.S. at 488. Since

its enactment, the FSIA has “provide[d] the sole basis for obtaining jurisdiction over a foreign

state in the courts of this country.” Argentine Republic v. Amerada Hess Shipping Corp., 488

U.S. 428, 434 (1989). The Act provides a foreign state with “‘presumptive[] immun[ity] from

the jurisdiction of United States courts’ unless one of the Act’s express exceptions to sovereign

immunity applies.” OBB Personenverkehr AG v. Sachs, 136 S.Ct. 390, 394 (2015) (quoting

Saudi Arabia v. Nelson, 507 U.S. 349, 355 (1993)); see also 28 U.S.C. § 1604. “When one of

[the] . . . specified exceptions applies,” however, “‘the foreign state [is] liable in the same

manner and to the same extent as a private individual under like circumstances.’” Verlinden, 461

U.S. at 488–89 (quoting 28 U.S.C. § 1606).

       Kidane invokes only one exception to the FSIA—the non-commercial tort exception. See

Dkt. 26 ¶ 14. That exception to sovereign immunity applies to any case “not otherwise

encompassed by” the commercial-activity exception

       in which money damages are sought against a foreign state for personal
       injury or death, or damage to or loss of property, occurring in the United
       States and caused by the tortious act or omission of that foreign state or of
       any official or employee of that foreign state while acting within the scope
       of his office or employment.

28 U.S.C. § 1605(a)(5). There are two statutory “exceptions to the [non-commercial tort]

exception,” MacArthur Area Citizens Ass’n v. Republic of Peru, 809 F.2d 918, 921 (D.C. Cir.

1987), modified in other respects by 823 F.2d 606 (D.C. Cir. 1987), both of which parallel



                                                  15
similar provisions in the Federal Torts Claims Act (“FTCA”). The first, known as the

discretionary function exception, provides that a foreign state’s immunity is not waived with

respect to “any claims based upon the exercise [of] a discretionary function.” See 28 U.S.C.

§ 1605(a)(5)(A). The second, known as the intentional tort exception, provides that immunity is

not waived for claims alleging specified intentional torts, including “misrepresentation” and

“deceit.” See id. § 1605(a)(5)(B).

       Ethiopia contends that the non-commercial tort exception to immunity is inapplicable for

four reasons: First, it argues that the complaint fails to identify any tortious conduct engaged in

by an agent of Ethiopia while in the United States and that the tort, therefore, did not “occur[] in

the United States” within the meaning of the exception. Second, it contends that, even if taken as

true, Kidane’s allegations involve the type of conduct “grounded in social, economic, and

political policy” that the discretionary function exception immunizes from suit. See United

States v. Varig Airlines, 467 U.S. 797, 814 (1984). Third, it maintains that the alleged

surreptitious infection of Kidane’s computer involves “misrepresentation” and “deceit” and that

the intentional tort exception to the non-commercial tort exception therefore applies. Finally, it

argues that Kidane has not alleged with sufficient specificity a claim for “money damages . . . for

personal injury,” as required to fall within the non-commercial tort exception. As explained

below, although the Court is unconvinced by three of Ethiopia’s arguments, it agrees that

Kidane’s claim for intrusion upon his seclusion is barred by sovereign immunity because the

“entire tort” was not committed in the United States.

       1. The Personal Injury Requirement and the Intentional Tort Exception

       The Court disposes of Ethiopia’s third and fourth contentions first, as they require only

brief discussion. According to Ethiopia, Kidane’s claim for intrusion upon seclusion does not



                                                 16
seek “money damages . . . for personal injury” as required to invoke the non-commercial tort

exception because the operative complaint contains only a conclusory allegation that Kidane

suffered “emotional distress” as a result of Ethiopia’s alleged surveillance. Dkt. 27-2 at 23.

Ethiopia stresses that Kidane’s original complaint did not include this allegation and argues that

the amended complaint’s addition of the “bald assertion that [Kidane] suffered personal injury or

emotional distress” does not clear the pleading hurdle established in Ashcroft v. Iqbal, 556 U.S.

662 (2009), and Bell Atlantic Corp. v. Twombly, 550 U.S. 544 (2007). Dkt. 27-2 at 23.

       The Court disagrees. Iqbal and Twombly require only that a plaintiff allege a claim with

sufficient factual specificity that it is “plausible on its face.” Iqbal, 556 U.S. at 678 (quoting

Twombly, 550 U.S. at 570). Here, it is certainly plausible that an asylee would suffer emotional

distress upon learning that the foreign state from which he fled was surreptitiously intercepting

and recording his (and his family’s) Skype calls, email communications, and web searches. Dkt.

26 ¶ 4. And the fact that Kidane did not allege that he suffered emotional distress in his original

complaint does not mean that the allegation of emotional distress included in his amended

complaint should be greeted with skepticism, as Ethiopia suggests. Rather, at this stage of the

proceeding, and in light of the fact that Ethiopia has not introduced any controverting evidence,

the Court must take all plausible allegations contained in the operative complaint as true. See

Gordon, 778 F.3d at 163–64; Price, 294 F.3d at 93.

       Ethiopia’s contention that it is immune from liability for its alleged intrusion upon

Kidane’s intrusion under the intentional tort exception is equally flawed. See Dkt. 27-2 at 13.

The intentional tort exception renders the non-commercial tort exception inapplicable to claims

“arising out of malicious prosecution, abuse of process, libel, slander, misrepresentation, deceit,

or interference with contract rights.” 28 U.S.C. § 1605(a)(5)(B). It is true that Kidane alleges



                                                  17
that Ethiopia used trickery to place the FinSpy malware on his computer. But neither

misrepresentation nor deceit is an element of the tort of intrusion upon seclusion under Maryland

law. See Pemberton, 502 A.2d at 1116. It is the unreasonable invasion of a plaintiff’s privacy

that forms the core of the tort, and privacy torts are not among those enumerated in the

intentional tort proviso to the non-commercial tort exception. See 28 U.S.C. § 1605(a)(5)(B).

“Where Congress explicitly enumerates certain exceptions to a general prohibition, additional

exceptions are not to be implied, in the absence of evidence of a contrary legislative intent.”

Andrus v. Glover Const. Co., 446 U.S. 608, 616–17 (1980). The omission of privacy torts from

the intentional tort exception to the non-commercial tort exception is thus dispositive.

        The D.C. Circuit reached precisely this conclusion in a decision interpreting the FTCA’s

analogous intentional tort exception. See Black v. Sheraton Corp. of Am., 564 F.2d 531, 539

(D.C. Cir. 1977) (interpreting 28 U.S.C. § 2680). In that case, a lobbyist affiliated with Bobby

Baker, a long-time advisor to Lyndon Johnson, brought suit alleging that the government had

illegally eavesdropped on his conversations by installing a microphone in the wall of his hotel

room. Id. at 534–35. Rejecting an argument similar to Ethiopia’s, the Court of Appeals held that

“because invasion of privacy does not fall within an enumerated [intentional tort] exemption [in

the FTCA], such a claim is not barred by the doctrine of governmental immunity.” Id. at 539

n.3; see also Cruikshank v. United States, 431 F. Supp. 1355 (D. Haw. 1977). That same

conclusion applies with equal force in the present context. Kidane’s intrusion upon seclusion

claim is not among the enumerated intentional torts that fall outside the non-commercial tort

exception. And the mere fact that the allegedly illegal surveillance was conducted surreptitiously

is insufficient to bar his claim.




                                                 18
       2. Whether the Tort “Occur[ed] in the United States”

       Whether the alleged intrusion upon Kidane’s intrusion “occur[ed] in the United States”

within the meaning of the non-commercial tort exception is a much closer question. Although it

is well-settled that the non-commercial tort exception “covers only torts occurring within the

territorial jurisdiction of the United States,” Amerada Hess Shipping Corp., 488 U.S. at 441, it is

unclear how that rule applies to the instant case, in which the alleged intrusion involves the

infiltration of Kidane’s computer located at his home in Maryland, yet no agent or employee of

Ethiopia is alleged to have ever set foot in the United States in connection with that tort.

       On its face, the non-commercial tort exception merely asks whether the suit is for

“money damages . . . for personal injury or death, or damage to or loss of property, occurring in

the United States and caused by the tortious act or omission of that foreign state or of any official

or employee of that foreign state.” 28 U.S.C. § 1605(a)(5) (emphasis added). Courts, however,

have repeatedly interpreted the phrase “occurring within the United States” to mean that the

“entire tort” must have occurred in the United States. See, e.g., Jerez v. Republic of Cuba, 775

F.3d 419, 424 (D.C. Cir. 2014); Asociacion de Reclamantes v. United Mexican States, 735 F.2d

1517, 1525 (D.C. Cir. 1984); O’Bryan v. Holy See, 556 F.3d 361, 382 (6th Cir. 2009); Von

Dardel v. USSR, 736 F. Supp. 1, 7 (D.D.C. 1990). Under these cases, the fact that the plaintiff

incurred an injury in the United States, or that the “alleged tort may have had effects in the

United States,” is insufficient to waive sovereign immunity. Amerada Hess Shipping Corp., 488

U.S. at 441 (emphasis added). Rather, “not only the injury but also the act precipitating that

injury . . . must occur in the United States.” Jerez, 775 F.3d at 424; see also Persinger v. Islamic

Republic of Iran, 729 F.2d 835, 842 (D.C. Cir. 1984) (“[B]oth the tort and the injury must occur

in the United States.”).



                                                 19
       As other courts have explained, this conclusion follows from both the text and legislative

history of the FSIA. As a textual matter, the language of the non-commercial tort exception,

which includes the “occurring in the United States” requirement, stands in marked contrast to the

language of the commercial tort exception, which applies to conduct “‘outside the territory of the

United States’ having a ‘direct effect’ inside the United States.” Amerada Hess Shipping Corp.,

488 U.S. at 441 (quoting 28 U.S.C. § 1605(a)(2)). 5 And the legislative history confirms that the

non-commercial tort exception applies only to torts occurring in the United States. “Congress’

primary purpose in enacting [section] 1605(a)(5) was to eliminate a foreign state’s immunity for

traffic accidents and other torts committed in the United States, for which liability is imposed

under domestic tort law.” Id. at 439–40 (emphasis added). Both the committee reports and the

proponents of the legislation repeatedly emphasized that liability would be limited to torts

committed within the United States. See H.R. Rep. No. 94-1487, at 21, reprinted in 1976

U.S.C.C.A.N. 6604 (“[T]he tortious act or omission must occur within the jurisdiction of the

United States.”); S. Rep. No. 94-1310, at 20 (1976) (same); Hearing on H.R. 3493 Before the

Subcomm. on Claims & Gov’t Relations of the H. Comm. on the Judiciary, 93d Cong., at 21

(1973) (“1973 Hearing”) (statement of Charles N. Brower, Acting Legal Adviser, Dep’t of State)

(although “cast in general terms,” the exception was “directed primarily to the problem of traffic

accidents,” and was intended to apply only to tort claims where “the negligent or wrongful act



5
  Neither party cites any decisions applying the FSIA’s non-commercial tort exception to torts
facilitated by the Internet and directed from abroad. At least one court has held that the FSIA’s
commercial tort exception, 28 U.S.C. § 1605(a)(2), waives sovereign immunity for acts
perpetrated over the Internet by a foreign state. See CYBERsitter, LLC v. P.R.C., 805 F. Supp. 2d
958, 975 (C.D. Cal. 2011) (holding that claims based on the misappropriation of plaintiff’s
software and its placement on the foreign state’s website fell within the commercial tort
exception). But decisions applying the commercial tort exception are inapplicable here because,
as explained above, that exception applies to claims based on an extraterritorial act that “causes a
direct effect in the United States.” 28 U.S.C. § 1605(a)(2) (emphasis added).
                                                20
took place in the United States”); see also 1973 Hearing at 34 (letter from Richard G.

Kleindienst, Attorney Gen., & William P. Rogers, Sec’y of State); 1973 Hearing at 42 (section-

by-section analysis).

       Here, it is undisputed that the alleged injury to Kidane occurred in the United States.

Ethiopia and Kidane propound very different theories, however, regarding where the allegedly

tortious act or acts occurred, each of which has some merit and neither of which wholly resolves

the question.

       According to Ethiopia, accepting the allegations of the complaint as true, “the acts

underlying the tort, as distinct from their alleged injurious effect, occurred overseas.” Dkt. 27-2

at 16 (emphases added). Ethiopia focuses on the fact that “[t]he actors who committed the

alleged tort, according to Plaintiff, were operating in Ethiopia, the computer servers were located

in Ethiopia, the spyware was maintained in Ethiopia, the commands came from Ethiopia, and

Plaintiff’s materials were viewed in Ethiopia.” Dkt. 27-2 at 11; see also id. at 9–11. In its view,

“inasmuch as both the acts and intent occurred overseas, the two alleged intentional torts have

their situs overseas and therefore, by definition did not occur entirely in the United States.” Id. at

17. Thus, according to Ethiopia, the location of the alleged tort—or at least a substantial portion

of it—was overseas because all of the alleged tortfeasors were located overseas and it is their

extraterritorial conduct that allegedly precipitated Kidane’s injury.

       Although not without some force, this argument is incomplete because it fails to grapple

with the modern world in which the Internet breaks down traditional conceptions of physical

presence. Thus, while the Congress that enacted the FSIA in 1976 envisioned the paradigmatic

case for liability as involving an embassy employee who causes an automobile accident while on

official business in the United States, see, e.g., H.R. Rep. No. 94-1487, at 29, we now live in an



                                                 21
age where, according to press reports, it is possible to hack remotely into a car’s electronics and

to cause the same crash from thousands of miles away. 6 Here, as Kidane points out, Ethiopia’s

alleged surveillance would fall squarely within the “entire tort” rule had it sent a “flesh-and-

blood agent into [Kidane’s] house to install a recording device.” Dkt. 28 at 27. Technology has

simply rendered the human agent obsolete.

        Kidane’s theory of where the tortious conduct occurred, in contrast, focuses not on the

physical location of the tortfeasor, but on the elements of the state law cause of action, asserting

that “every element of the asserted claim occurred in the United States—from the installation of

spyware on a U.S. computer, to the interception of electronic communications.” Dkt. 28 at 23.

As Kidane correctly points out, under Maryland law, “the gravamen of the tort [of intrusion upon

seclusion] is the intrusion into a private place or the invasion of a private seclusion that the

plaintiff has thrown about his person or affairs.” Dkt. 28 at 24 (quoting New Summit Assocs. Ltd.

P’ship v. Nistle, 533 A.2d 1350, 1354 (Md. Ct. Spec. App. 1987)). A plaintiff, moreover, need

not allege that a physical trespass occurred to state a claim for intrusion upon seclusion. See

Pearson v. Dodd, 410 F.2d 701, 704 (D.C. Cir. 1969). And, although no decision from the

Maryland courts has addressed the issue to date, the Court can assume for present purposes that

the mere “tapping” or “bugging” of personal communications is sufficient to state a claim, even

if no one ever listens to the plaintiff’s communications. See Hamberger v. Eastman, 206 A.2d

239, 242 (N.H. 1964) (rejecting contention that plaintiffs failed to state a claim for intrusion

upon seclusion because “there are no allegations that anyone listened or overheard sounds or




6
  See New York Times Bits Blog, Security Researchers Find A Way To Hack Cars (July 21,
2015), available at http://bits.blogs.nytimes.com//2015/07/21/security-researchers-find-a-way-
to-hack-cars/.


                                                  22
voices originating from plaintiffs’ bedroom”); New Summit Assocs. Ltd. P’ship, 533 A.2d at

1354 (“[P]laintiff was not required to prove that a particular individual actually observed her”

through peephole); Pearson, 410 F.2d at 704 & nn.10 & 14 (citing Hamberger with approval and

stating that “[t]he tort is completed with the obtaining of the information by improperly intrusive

means”). 7 The question for the factfinder, then, is simply whether the defendant intentionally

intruded “upon the solitude or seclusion of another or his private affairs or concerns” in a manner

that “would be highly offensive to a reasonable person.” Restatement (Second) of Torts § 652B.

       Neither the text of the FSIA nor existing case law clearly resolves whether Ethiopia or

Kidane’s conception of where the alleged tort occurred for purposes of the non-commercial tort

exception is correct, and the question is a close one. Three considerations, however, convince

the Court that Ethiopia’s view is more compelling:

       First, the question of where the “entire tort” occurred cannot be wholly divorced from the

physical location of the tortfeasors. Kidane stresses that the tort of intrusion upon seclusion does

not require that he prove that Ethiopia ever transferred information from his computer to a

computer located in Ethiopia or that anyone in Ethiopia—or anywhere else—actually listened to

or read his communications; all that was required was that Ethiopia took control of his computer

and caused that computer to make illicit copies of the relevant communications. But that view of

where the tort occurred ignores the fact that all of the acts by Ethiopia or its agents that allegedly

precipitated the tort occurred outside the United States. Jerez, 775 F.3d at 424. The complaint

does not suggest that the email containing the malware was prepared in the United States or that


7
  But see Marks v. Bell Tel. Co. of Pennsylvania, 331 A.2d 424, 431 (Pa. 1975) (“In the absence
of an overhearing of a private communication, this tort has not been committed.”); LeCrone v.
Ohio Bell Tel. Co., 201 N.E.2d 533, 538 (Ohio Ct. App. 1963) (“[I]n our opinion, the only
possible act which could constitute an invasion in the present case is the eavesdropping itself,
and the connection or tap here constitutes only a preparation for that invasion of privacy.”).

                                                  23
it was sent from within the United States. And, as Ethiopia notes, Kidane does not even allege

that anyone acting on behalf of Ethiopia purposefully sent the email to him or to anyone else in

the United States; rather, the translation attached to the complaint suggests that the email may

have been sent to someone in London, who forwarded it (directly or through others) to Kidane in

the United States. Dkt. 26 ¶ 5 & Ex. C. Kidane, moreover, fails to identify any case applying

the non-commercial tort exception to circumstances, like those alleged here, where the

precipitating acts of the relevant tortfeasor occurred outside the United States. And, although it

is also true that no decision has rejected application of the exception in circumstances like those

alleged here, courts have at least hinted that the “entire tort” requirement is not satisfied where

actions taken outside the United States precipitate events in the United States. Cf. O’Bryan, 556

F.3d at 370, 385 (declining to apply non-commercial tort exception to claims attacking a policy

against reporting sexual abuse, where the sexual abuse occurred in the United States, but the

policy was “presumably” promulgated abroad); Olsen v. Gov’t of Mexico, 729 F.2d 641, 644,

646 (9th Cir. 1984) (rejecting Mexico’s claim of immunity based on fact that airplane was

maintained outside the United States where “one entire tort . . .—the negligent piloting of the

aircraft—. . . occurred in the United States”).

       In Kidane’s view, little turns on the fact that all of the acts of the alleged tortfeasors

occurred overseas. He argues that the D.C. Circuit applies an “essential locus” test, requiring

only that “the injury and the act that proximately causes that injury” occur in the United States,

and that the acts taken by Ethiopia or its agents that occurred in Ethiopia were merely

“collateral” to commission of the alleged tort. Dkt. 28 at 23. Under this theory, the “essential

locus” of the tort is Maryland—“where [his] computer was when it was accessed and infected

with spyware, and where he was when his communications were intercepted by Ethiopia’s



                                                  24
FinSpy device,” id.—and not Ethiopia—where the tort was allegedly planned and set in motion.

Kidane is surely right that the mere fact that “some foreign conduct” occurred overseas is

insufficient to render a sovereign immune. Dkt. 28 at 26. If that were the case, then an

assassination plotted overseas but carried out on American soil would garner immunity, cf.

Letelier v. Republic of Chile, 488 F. Supp. 665, 673–74 (D.D.C. 1980), and “foreign states

[would be encouraged] to allege that some tortious conduct occurred outside the United States,”

Olsen, 729 F.2d at 646.

       But, even assuming that the acts that allegedly occurred in Ethiopia were merely

“collateral” to the commandeering of Kidane’s computer, the Court is unconvinced that the D.C.

Circuit has adopted an “essential locus” test. Kidane bases his “essential locus” argument solely

on the D.C. Circuit’s decision in Asociacion de Reclamantes v. United Mexican States. In that

case, the Court held that Mexico was immune from a suit challenging its failure to compensate

its citizens for land claims it assumed under a treaty with the United States, because the allegedly

tortious failure to compensate occurred outside the United States. 735 F.2d at 1524–25. Kidane

correctly notes that the Court of Appeals wrote that “[e]ven if the allegedly tortious failure to

compensate had the effect of retroactively rendering the prior acts [of entering the treaty] on

United States soil tortious, at the very least the entire tort would not have occurred here, and

indeed we think its essential locus would remain Mexico.” Reclamantes, 735 F.2d at 1525

(emphasis added). That assertion, however, came only after the Court had already concluded

that “the entire tort would not have occurred here,” and after it cited with approval the assertion

in In re Sedco, Inc. that “the tort, in whole, must occur in the United States.” Id. (quoting In re

Sedco, Inc., 543 F. Supp. 561, 567 (S.D. Tex. 1982)) (emphasis added). The Court’s reference to

the “essential locus” of the tort, accordingly, was at most an alternative, a fortioiri holding. Any



                                                 25
doubt regarding this reading of Reclamantes, moreover, is put to rest by subsequent decisions in

this jurisdiction that have treated Reclamantes as establishing the “clear” rule that “the entire

tort” must occur in the United States. See Jerez, 775 F.3d at 424; Von Dardel, 736 F. Supp. at 7;

see also O’Bryan, 556 F.3d at 382.

       A more recent decision from the D.C. Circuit is arguably more on point, although the

Court is also unpersuaded that it vindicates Kidane’s position. In Jerez v. Republic of Cuba, the

plaintiff sought to recover for torture that the Cuban government allegedly inflicted upon him

while incarcerated in Cuba, including injecting him with the hepatitis C virus. 775 F.3d at 421.

The district court held that Cuba was immune from suit because the “alleged tort . . . occurred in

Cuba,” and because “none of the defendants . . . was within the United States.” Id. at 424. On

appeal, Jerez argued that “the virus continue[d] to replicate in his body” after he arrived in the

United States, and that each replication of the virus constituted a separate tort. Id. The D.C.

Circuit rejected that argument, holding that the tort occurred in Cuba where Jerez was infected,

and that the replication of the virus in the United States merely constituted an ongoing injury—

and not a series of new torts. Id. But the Court went on to discuss, albeit briefly, how the “entire

tort” rule might apply to torts precipitated by acts taken overseas that otherwise occur entirely in

the United States. In particular, Jerez argued that his claim was analogous to a claim based on “a

foreign agent’s delivery into the United States of an anthrax package or a bomb.” Id.; see also

Br. for Appellant, at 25, Jerez v. Republic of Cuba, 775 F.3d 419 (No. 13-7141), 2014 WL

1713091 (positing hypothetical of anthrax “package that was mailed from abroad”). In response,

the Court of Appeals drew a distinction between Jerez’s case, in which Cuba’s alleged “infliction

of injury on Jerez occurred entirely in Cuba,” and Jerez’s hypotheticals, where “the infliction of

injury by the hypothetical anthrax package or bomb would occur entirely in the United States.”



                                                 26
775 F.3d at 424.

       Although the hypothetical of an anthrax package or bomb mailed from outside the United

States is arguably analogous to the sending of malware that infected a computer located in the

United States, the Court is leery of reading Jerez to provide substantial guidance regarding the

application of the non-commercial tort exception to torts committed remotely. Most notably,

that is not what was at issue in Jerez; to the contrary, the Court of Appeals unambiguously held

that the alleged tort “occurred entirely in Cuba,” where Jerez was infected with the hepatitis C

virus. Id. at 421. The fact that the Court went on to distinguish Jerez’s hypotheticals on the

ground that “the infliction of injury” in the hypothetical occurred entirely in the United States

was thus dicta. But, even beyond that, the Court did not conclude that the hypothetical tort

would have occurred entirely within the United States, but only that, unlike in Jerez’s case, the

“injury” would have been “inflicted” in the United States. Id.

       Second, to the extent that it is uncertain whether Congress intended to permit suit in U.S.

courts for torts precipitated from abroad, the D.C. Circuit has cautioned against converting the

non-commercial tort exception “into a broad exception for all alleged torts that bear some

relationship to the United States.” Reclamantes, 735 F.2d at 1525. To be sure, the fact that

Congress focused on traffic accidents committed by “officials and employees of foreign

sovereigns” while “in this country” does not define the full scope of the non-commercial tort

exception. Id. But it does convey something about the types of tortious conduct that Congress

had in mind when it enacted the exception, and the instant allegations are far afield from that

paradigmatic case. Id. The Court, moreover, must proceed cautiously where application of the

exception would arguably shift the balance that Congress struck between the desire to afford

members of the public a remedy for torts committed in the United States by foreign employees



                                                 27
and officials and the interest in maintaining comity with foreign states. Applying the exception

to torts precipitated exclusively beyond the borders of the United States—by tortfeasors who

neither set foot in this Country nor directly caused a tort to be committed here—implicates that

balance. As the D.C. Circuit observed in a different context, “[i]f Congress had meant to remove

sovereign immunity for governments acting on their own territory, with all of the potential for

international discord and for foreign government retaliation that that involves, it is hardly likely

that Congress would have ignored those topics and discussed instead automobile accidents in this

country.” Persinger, 729 F.2d at 841.

       Put differently, the question whether to afford a foreign state immunity from suit

inherently involves a political judgment, raising sensitive issues of foreign relations. When

Congress enacted the FSIA, it decided to leave it to the courts to apply the rules that the

Executive Branch had adopted over many years and that Congress had, with minor adjustment,

embodied in the FSIA. But, at the same time, it did not confer common law authority on the

courts to adjust the rules of foreign sovereign immunity to new and unanticipated events that

might arise. To the contrary, the FSIA starts from the premise that foreign states are entitled to

immunity, and then carves out limited—and specific—exceptions to that rule. See 1973 Hearing

at 21 (statement of Charles N. Brower, Acting Legal Adviser, Dep’t of State). To the extent that

the present dispute seeks to open the door to a new and previously unrecognized class of cases

against foreign states made possible by technological changes, that type of judgment is better left

to Congress, which has, in fact, amended the FSIA in recent years to address evolving threats—

most notably, the emergence of state-sponsored terrorism. See Pub. L. No. 110-181, Div. A,

Title X, § 1083(a)(1), 122 Stat. 338 (2008) (codified at 28 U.S.C. § 1605A (2012)).

       Third, and finally, the legislative history of the non-commercial tort exception, although



                                                 28
limited, provides additional support for the conclusion that Congress did not intend to reach torts

precipitated by the actions of tortfeasors outside the United States. One of the primary goals of

the FSIA to bring U.S. rules of foreign sovereign immunity in line with the practices of other

nations, and, in particular, to subject foreign states that commit torts in the United States to the

same rules of immunity applied against the United States abroad. See Hearings on H.R. 11,315

Before the Subcomm. on Admin. Law & Gov’t Relations of the H. Comm. on the Judiciary, 94th

Cong. 29 (1976) (“1976 Hearing”); 1973 Hearing at 29. Prior to enactment of the FSIA, the

United States was often subject to tort suits—most often in Europe—alleging claims that could

not be brought against foreign states in U.S. courts. See S. Rep. No. 94-1310, at 10–11 (1976).

As explained during the hearings on the FSIA, “almost all countries in Western Europe [had

come to] follow[] the restrictive theory of sovereign immunity, and permitted . . . suit against the

United States in contract and in tort where the necessary contacts with the forum were present.”

1976 Hearings at 32 (statement of Bruno Ristau, Chief, Foreign Litigation Section, Civil

Division, Dep’t of Justice). The non-commercial tort exception, accordingly, can be understood

to permit suit against foreign states for torts committed in the United States “to the same extent

that the United States [was] subject to suit in most foreign countries.” Id. at 29.

       This same legislative history also reflects an understanding of the European model that

Congress sought to mirror. In particular, the legislative record included a copy of the European

Convention on State Immunity, which was scheduled to “come into force” roughly a week later.

1976 Hearing at 37. When asked at a hearing whether there was “any inconsistency between that

new convention and th[e] bill” that became the FSIA, the Legal Advisor to the State Department

answered “no,” with the sole qualification that the FSIA went “somewhat further” regarding the

execution of judgments against foreign states. Id. The relevant provision of the European



                                                  29
Convention on State Immunity provided:

       A Contracting State cannot claim immunity from the jurisdiction of a court of
       another Contracting State in proceedings which relate to redress for injury to the
       person or damage to tangible property, if the facts which occasioned the injury or
       damage occurred in the territory of the State of the forum, and if the author or the
       injury or damage was present in that territory at the time when those acts
       occurred.

Article 11, European Convention on State Immunity, reprinted in 1976 Hearings 39 (emphasis

added); see also 1973 Hearing at 32 (referring to proposed convention). The non-commercial

tort exception thus sought to parallel the European waiver of sovereign immunity, which

required the tortfeasor’s physical presence in the jurisdiction of suit.

       For the foregoing reasons, the Court holds that Kidane’s claim for intrusion upon

seclusion is barred by the “entire tort” rule. The political branches may ultimately deem it

advisable to permit suits against foreign sovereigns who, without setting foot on American soil,

use technology to commit torts against persons located here. But “[i]f the [FSIA] is to be altered,

that is a function for the same body that adopted it.” Black, 564 F.2d at 539 (interpreting FTCA).

Absent further action by Congress, any remedy for such alleged misconduct must take place at a

diplomatic level.

       3. The Discretionary Function Exception

       Although the Court has already concluded that both of Kidane’s claims must be

dismissed, given the likelihood that its decision will be appealed and in the interest of judicial

efficiency, the Court will also address Ethiopia’s final argument why the FSIA bars this action—

an argument that is substantial, if ultimately unpersuasive. In particular, Ethiopia argues that the

FSIA’s discretionary function exception bars Kidane’s claim because the alleged conduct

“involve[s] an element of choice” and is exactly the kind of “quintessentially political” decision,

Dkt. 27-2 at 20, that the exception was designed to shield. The Court disagrees.

                                                  30
       The FSIA’s discretionary function exception bars a claim that would otherwise fall within

the non-commercial tort exception if it is “based upon the exercise or performance or the failure

to exercise or perform a discretionary function[,] regardless of whether the discretion be abused.”

28 U.S.C. § 1605(a)(5)(A). As the D.C. Circuit has explained, the FSIA’s discretionary function

exception is “analogous” to the FTCA’s similar exception. See MacArthur Area Citizens Ass’n,

809 F.2d at 922. The D.C. Circuit follows a two-part test in determining whether governmental

conduct is shielded as discretionary. Under that test, a court first asks “whether any statute,

regulation, or policy specifically prescribes a course of action for an employee to follow.”

Banneker Ventures, LLC v. Graham, 798 F.3d 1119, 1143 (D.C. Cir. 2015). If the employee was

following such a policy, his conduct was non-discretionary and subject to liability. Id. Second,

if the tortfeasor’s conduct was not directed by some statute or policy, but instead was the result

of discretion, the court asks if “the exercise of discretion [was] grounded in social, economic, or

political goals,” thus making it “an exercise of governmental judgment and so immune.” Id.

       Ethiopia argues that its conduct falls under the second of these prongs. In its view,

because the act of spying on individuals living abroad is a “quintessentially political” one, Dkt.

27-2 at 20, the FSIA’s discretionary function exception shields such conduct from suit. Kidane,

for his part, argues that a corollary rule to the discretionary function exception makes clear that

the alleged conduct falls outside the exception. See Dkt. 28 at 31–32. The Supreme Court has

long held that when a U.S. official acts outside a grant of discretionary authority, “there will be

no shelter from liability because there is no room for choice and the action will be contrary to

policy.” See United States v. Gaubert, 499 U.S. 315, 324 (1991). As the D.C. Circuit has

explained this rule, “[a] government official has no discretion to violate the binding laws,

regulations, or policies that define the extent of his official powers.” Red Lake Band of



                                                 31
Chippewa Indians v. United States, 800 F.2d 1178, 1196 (D.C. Cir. 1986). Most courts that have

considered the issue have therefore concluded that the FTCA’s discretionary function exception

does not shield acts barred by statute, regulation, or policy—that is, the exception does not apply

to illegal acts. See Banneker Ventures, 798 F.3d at 1143 (holding that there is “no difference

between a prescription by policy that leaves no room for choice and a proscription that does the

same”); cf. Castro v. United States, 608 F.3d 266, 271 n.1 (5th Cir. 2010) (en banc) (Stewart, J.,

dissenting) (collecting cases). Pursuant to this rule, courts have concluded, for instance, that the

FTCA’s discretionary function exception does not shield government officials who unlawfully

open private mail. See Birnbaum v. United States, 588 F.2d 319, 329 (2d Cir. 1978);

Cruikshank, 431 F. Supp. at 1359.

       Kidane argues that because Ethiopia’s conduct would have violated U.S. criminal law—

indeed, would have been a “serious felon[y] under federal law,” Dkt. 28 at 31–32—it cannot be

protected by the FSIA’s discretionary function exception. There is little discussion in the

caselaw, however, about how the rule limiting the FTCA’s discretionary function exception to

the acts of an officer acting within “the extent of his official powers,” see Red Lake, 800 F.2d at

1196, applies in the context of the FSIA’s analogous exception. The central inquiry under the

FTCA’s discretionary function exception is which statute, rule, or policy permitted the relevant

U.S. official to exercise “policy judgment”—that is, which rule defines and limits that official’s

“official powers.” See Dalehite v. United States, 346 U.S. 15, 36 (1953). But it is less clear how

courts should go about identifying such rules when assessing the “discretion” of foreign officials,

not U.S. officials, to act. Should courts look to U.S. law or to international law? Cf. Letelier,

588 F. Supp. at 675 (considering “both national and international law”). Is the law of the foreign




                                                 32
country relevant? Cf. Liu v. Republic of China, 892 F.2d 1419, 1431 (9th Cir. 1989) (concluding

that it is).

          Not surprisingly, Ethiopia argues for the broadest interpretation of the scope of the

exception. Citing this Court’s decision in Letelier, 588 F. Supp. 655, it contends that the

“legality of the [foreign state’s] activity [under U.S. law] is not the test, but rather whether the

activity violates universal norms, such as murder and torture.” Dkt. 29 at 16. But Letelier did

not hold any such thing. The question in that case was whether Chile’s assassination of a U.S.-

based diplomat was shielded by the FSIA’s discretionary function exception. The Court held

that it was not, explaining that foreign officials lack “discretion” within the meaning of the FSIA

to commit any acts that are “clearly contrary to the precepts of humanity as recognized in both

national and international law.” 488 F. Supp. at 675. The Court said nothing, however, about

whether foreign officials have the “discretion” to commit less serious offenses, or, indeed, about

whether the ultimate touchstone is “national” or “international” law. Cf. Curtis A. Bradley &

Jack L. Goldsmith, Pinochet and International Human Rights Litigation, 97 Mich. L. Rev. 2129,

2154–55 (1999) (criticizing Letelier’s reliance on international law). Yet, other than Letelier,

Ethiopia offers no authority to support its proposed interpretation of the discretionary function

exception. That interpretation, moreover, would render foreign sovereigns immune from

dramatically more suits under the FSIA than the United States is under the FTCA, and is thus at

odds with Congress’s goal of “plac[ing] foreign states in the same position before the United

States courts as is the United States itself” when sued under the FTCA. Restatement (Third) of

the Foreign Relations Law of the United States § 454 n.3.

         The Court also rejects Ethiopia’s contention that Ethiopian law should govern the scope

of the FSIA’s discretionary function exception. As a threshold matter, it is not clear why



                                                  33
Congress would have intended the analysis in an FSIA suit to turn on the meaning of foreign

law—an analysis that both the Court and the parties (or at least the plaintiff) are poorly

positioned to perform. Cf. Liu, 892 F.2d at 1431–32. Even if it were practical for the Court to

conduct such an inquiry, moreover, treating foreign law as central to the analysis would run

contrary to Congress’s intent to place the United States and foreign states on similar footing in

U.S. courts. Such an approach would also seem to reward foreign states for adopting rules

permitting or encouraging tortious activity in the United States—a purpose that it is difficult to

ascribe to Congress. Perhaps most significantly, a focus on foreign authority to act would at

least at times require U.S. courts—including state courts, which are also charged with applying

the FSIA, see 28 U.S.C. § 1605(a)—to “launch[] inquiries into the type of governments that

obtain in particular foreign nations,” whether particular foreign actions are grounded in law or

“are merely [actions] turning upon the whim or caprice of government officials, whether the

representation of consuls, ambassadors, and other representatives of foreign nations is credible or

made in good faith,” and whether particular foreign officials were acting with the implicit or

explicit authorization of their superiors. See Zschernig v. Miller, 389 U.S. 429, 434 (1968).

Such a construction of the Act, in other words, could raise distinct foreign relations concerns

going far beyond those already inherent in subjecting foreign states to suit.

       Instead, the Court concludes that, in creating a discretionary function exception under the

FSIA, Congress did not mean to shield “discretionary” acts by foreign states when those acts

involve serious violations of U.S. criminal law. Such a reading of the exception is consistent

with the D.C. Circuit’s sole opinion touching upon this question, MacArthur Area Citizens

Association v. Republic of Peru, 809 F.2d 918. In that case, a Washington, D.C. neighborhood

association sued Peru for converting a local building, which had been zoned for residential use,



                                                 34
into its chancery. See id. at 919. Among other questions, the case turned on whether the

discretionary function exception barred the suit. Id. at 921–23. In rejecting the plaintiffs’

contention that “Peru’s acts [we]re criminal and thus [could] not be discretionary,” the Court of

Appeals acknowledged that “case law buttresses the proposition that a criminal act cannot be

discretionary,” but concluded that Peru had not been shown to have violated any criminal law.

Id. at 922 n.4. It added:

         [I]t is hardly clear that, even if a criminal act were shown, it would automatically
        prevent designation of Peru’s acts as discretionary. The cases on which appellant
        relies involve criminal acts of a rather different character and order. See, e.g.,
        Letelier, 488 F. Supp. at 673 (involving “assassination of an individual or
        individuals, action that is clearly contrary to the precepts of humanity as
        recognized in both national and international law”). We think it not unduly bold
        to conclude that violations, if any, of a zoning ordinance do not rise to the level of
        actions malum in se.

Id. Thus, albeit in dicta, MacArthur Area suggests that the discretionary function exception does

not shield acts by foreign officials that violate federal criminal law, at least if the conduct is

malum in se. 8 The Restatement provides a similar standard, suggesting that the exception should

not apply to “serious criminal act[s].” Restatement (Third) of the Foreign Relations Law of the

United States § 454 n.3.

        On the present record, the Court can neither conclude that a serious criminal act occurred

nor reject the possibility that it did. Various criminal laws, including, most prominently, the




8
  The D.C. Circuit also distinguished cases holding that “[a] government official has no
discretion to violate the binding laws, regulations, or policies that define the scope of his official
powers,” see Red Lake, 800 F.2d at 1196, on the ground that “[t]here [wa]s no indication in the
record that the” Peruvian officials “were acting ultra vires.” 809 F.2d at 922 n.3. For the
reasons explained above, the Court is unconvinced that the FSIA’s discretionary function
exception turns on whether the foreign official was acting within the scope of her authority under
foreign law in committing the alleged tort. In any event, nothing in MacArthur Area suggests
that authorization under foreign law is sufficient to invoke the discretionary function exception
where the conduct at issue constitutes a serious violation of U.S. criminal law.
                                                  35
Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., make computer trespass a

federal crime. See S. Rep. No. 104-357, at 11 (1996) (explaining that the CFAA applies to all

computer trespasses). Similarly, even though the relevant provision of the Wiretap Act does not

apply to foreign states, see supra at 7–13, it does apply to the actions of “individuals,” and would

arguably apply to actions committed by those employed by foreign states. Ethiopia argues that

its immunity from suit under the FSIA does not depend on whether it violated these statutes, but

does not argue, at this stage, that it did not do so. The Court is thus left without the necessary

record upon which to draw a conclusion regarding Ethiopia’s conduct (and, accordingly, the

applicability of the discretionary function exception). In light of its previous conclusion that the

suit should be dismissed under the “entire tort” rule, the Court has no need to direct further

briefing on these issues. It has no difficulty, however, rejecting Ethiopia’s overbroad

interpretations of the scope of the discretionary function exception, and concluding that when a

plaintiff alleges underlying conduct that constitutes a serious violation of a U.S. criminal statute,

the FSIA’s discretionary function exception does not apply.

                                       IV. CONCLUSION

       For the foregoing reasons, it is hereby ORDERED that Ethiopia’s motion to dismiss,

Dkt. 27, is GRANTED. The Clerk shall enter final judgment.

       SO ORDERED.


                                                              /s/ Randolph D. Moss
                                                              RANDOLPH D. MOSS
                                                              United States District Judge

Date: May 24, 2016




                                                 36
