KASPERSKY LAB, INC. AND KASPERSKY LABS LIMITED, APPELLANTS v. UNITED STATES DEPARTMENT OF HOMELAND SECURITY AND KIRSTJEN M. NIELSEN, IN HER OFFICIAL CAPACITY AS SECRETARY OF HOMELAND SECURITY, APPELLEES
No. 18-5176
United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT
Argued September 14, 2018 Decided November 30, 2018
Consolidated with 18-5177
Appeals from the United States District Court for the District of Columbia (No. 1:17-cv-02697) (No. 1:18-cv-00325)
Scott H. Christensen argued the cause for appellants. With him on the briefs were Ryan P. Fayhee and Stephen R. Halpin III.
Lewis S. Yelin, Attorney, U.S. Department of Justice, argued the cause for appellees. With him on the brief was H. Thomas Byron, III.
Before: TATEL, Circuit Judge, and EDWARDS and GINSBURG, Senior Circuit Judges.
Opinion for the Court filed by Circuit Judge TATEL.
I.
According to the allegations contained in Kaspersky‘s complaint, which we “must accept...as true” at the motion-to-dismiss stage, Tellabs, Inc. v. Makor Issues & Rights, Ltd., 551 U.S. 308, 322 (2007), Kaspersky Lab is one of the world‘s largest cybersecurity companies. See Complaint, Kaspersky Lab, Inc. v. United States, No. 1:18-cv-00325, ¶ 18 (D.D.C. Feb. 12, 2018) (“Compl.“). Kaspersky operates in 200 countries and territories and maintains 35 offices in 31 of those countries. Id. The United States is one of Kaspersky‘s most important geographic markets, and Kaspersky has “a substantial interest in its ability to conduct federal government business.” Id. ¶¶ 22–23.
Ranking among the world‘s top four cybersecurity vendors, Kaspersky “has successfully investigated and disrupted” cyberattacks by “Arabic-, Chinese-, English-, French-, Korean-, Russian-, and Spanish-speaking” hackers. Id. ¶¶ 20–21. Founded by a Russian national and headquartered in Moscow, Kaspersky boasts that its “presence in Russia and its deployment in areas of the world in which many sophisticated cyberthreats originate . . . makes it a unique and essential partner in the fight against such threats,” including hacker groups with suspected connections to Russian intelligence services. Id. ¶ 20.
The chorus of concern about Kaspersky began to swell in the spring of 2017. Between March and July of that year, Kaspersky garnered attention in at least five committee hearings before both houses of Congress. For example, at one hearing dedicated to the subject of Russian cyber-operations, Senator Marco Rubio highlighted “open source reports” detailing ties between Kaspersky‘s founder, Eugene Kaspersky, and the Russian Federal Security Service, successor to the KGB. Disinformation: A Primer in Russian Active Measures and Influence Campaigns Panel II: Hearing Before the Senate Committee on Intelligence, 115th Cong., pt. 2, at 40 (2017). And at a later hearing, Senator Rubio asked six heads of various U.S. intelligence agencies, including the Central Intelligence Agency and the Federal Bureau of Investigation, whether they would install Kaspersky software on their own computers. All six replied no. See Open Hearing on Worldwide Threats: Hearing Before the Senate Committee on Intelligence (“Worldwide Threats“), 115th Cong. 48 (2017).
In September 2017, the Acting Secretary of Homeland Security issued Binding Operational Directive 17-01 (the “Directive“), which required most federal agencies to begin removing “Kaspersky-branded products” from their information systems within 90 days. National Protection and Programs Directorate; Notification of Issuance of Binding Operational Directive 17-01 and Establishment of Procedures for Responses (“BOD-17-01“), 82 Fed. Reg. 43,782, 43,783 (Sept. 19, 2017). Invoking her statutory authority to issue directives “for purposes of safeguarding Federal information and information systems from a known or reasonably suspected information security threat, vulnerability, or risk,”
More congressional hearings followed. In October, the House Science Committee‘s Subcommittee on Oversight held a hearing on the potential threat posed by Kaspersky products to federal information systems. See Bolstering the Government‘s Cybersecurity: Assessing the Risk of Kaspersky Lab Products to the Federal Government: Hearing Before the House Subcommittee on Oversight, House Committee on Science, Space, and Technology, 115th Cong. 3 (2017). Several members expressed deep concerns about Eugene Kaspersky‘s personal and professional ties to Russia, citing reports that he was “educated at a KGB cryptography institute” and “worked for the Russian intelligence services before starting his software company.” Id. at 12 (statement of Donald S. Beyer); see also id. at 4 (statement of Lamar S. Smith); id. at 8 (statement of Darin LaHood). The Committee also heard testimony about the susceptibility of the company‘s software to Russian exploitation, with one expert explaining that due to Russia‘s permissive “telecommunications surveillance and monitoring laws,” Kaspersky could passively—in the absence of any “willful complicity or collaboration” in a Russian cyber-operation—provide the Russian government access to federal computers.
The same subcommittee held a second hearing on November 14, this time to survey agencies’ compliance with the Directive. See Bolstering the Government‘s Cybersecurity: A Survey of Compliance with the DHS Directive: Hearing Before the House Subcommittee on Oversight, House Committee on Science, Space, and Technology, 115th Cong. 22 (2017). The subcommittee heard testimony from Jeanette Manfra, Assistant Secretary for Cybersecurity and Communications at the Department of Homeland Security, who described the Department‘s rationale for issuing the Directive. She emphasized three concerns. First, “certain Kaspersky officials” enjoy “ties” to “Russian intelligence and other government officials.” Id. at 19. Second, Russian law “allow[s] Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks.” Id. And third, all antivirus software, including Kaspersky‘s, receives “broad access” to the systems on which it operates. Id. So like a thief who has stolen a security guard‘s master key, a cyberattacker can exploit antivirus software‘s “elevated privileges” to inflict serious damage on the systems the software ostensibly protects. Id. In the Department‘s view, Manfra concluded, the Directive “is a reasonable, measured approach to the information security risks posed by... [Kaspersky] products to the federal government.” Id.
Congress apparently agreed with the Department of Homeland Security‘s assessment that Kaspersky software presented a serious threat. Earlier, in July 2017, when considering the Senate version of the National Defense Authorization Act for Fiscal Year 2018 (“NDAA“), the Senate Armed Services Committee, citing “reports that the Moscow-based company might be vulnerable to Russian government influence,” recommended adding a provision that would prohibit the Department of Defense from using any Kaspersky software. Senate Armed Services Committee, NDAA FY18 Executive Summary 10 (2017), http://go.usa.gov/xU5JC; see also S. Rep. No. 115-125, at 302 (2017) (recommending “a provision that would prohibit any component of the Department of Defense from using, whether directly or through work with or on behalf of another element of the United States Government, . . . any software platform developed, in whole or in part, by Kaspersky Lab or any entity of which Kaspersky Lab has a majority ownership“). Later, after the Senate received the House version of the NDAA, Senator Jeanne Shaheen introduced an amendment that would prohibit all federal agencies from using Kaspersky products. See S. Amd. 663, 163 Cong. Rec. S4578 (daily ed. July 27, 2017). The final version of the NDAA, which included a version of Shaheen‘s amendment, see H.R. Rep. No. 115-404, at 460–62 (2017) (Conf. Rep.), passed the House on November 14 and the Senate on November 16.
The legislative prohibition on Kaspersky products appears in section 1634 of the NDAA. Subsections (a) and (b) require that, beginning October 1, 2018:
No department, agency, organization, or other element of the Federal Government may use, whether directly or through work with or on behalf of another department, agency, organization, or element of the Federal Government, any hardware, software, or services developed or provided, in whole or in part, by—(1) Kaspersky Lab (or any successor entity); (2) any entity that controls, is controlled by, or is under common control with Kaspersky Lab; or (3) any
entity of which Kaspersky Lab has majority ownership.
NDAA, Pub. L. No. 115-91, § 1634, 131 Stat. 1283, 1740 (2017). In contrast to the narrow focus of subsections (a) and (b), subsection (c) of section 1634 mandates a broader review of federal cybersecurity, directing the Secretary of Defense, in consultation with other agency heads, to review and report on “the procedures for removing suspect products or services from the information technology networks of the Federal Government.” Id. § 1634(c).
The President signed the NDAA in mid-December 2017, just a few days after the Secretary finalized the Directive.
Kaspersky filed suit shortly thereafter—or, more precisely, two Kasperskys filed two suits. Kaspersky Lab, Inc., a Massachusetts corporation, and Kaspersky Labs Limited, its U.K. parent (collectively, “Kaspersky“), first filed a complaint against the Department of Homeland Security. See Complaint, Kaspersky Lab, Inc. v. U.S. Department of Homeland Security, No. 1:17-cv-02697, ¶ 21 (D.D.C. Dec. 18, 2017). This case challenged the Directive under the
The district court consolidated the two cases for the purpose of resolving related dispositive motions, namely, cross-motions for summary judgment and a motion to dismiss in the Directive Case and a motion to dismiss in the NDAA Case. Kaspersky Lab, Inc. v. U.S. Department of Homeland Security, No. 1:17-cv-02697 (D.D.C. Feb. 16, 2018). The district court granted the government‘s motion to dismiss the NDAA Case for failure to state a claim, concluding that Kaspersky had failed to plausibly allege that section 1634 constitutes a bill of attainder. See Kaspersky Lab, Inc. v. U.S. Department of Homeland Security, 311 F. Supp. 3d 187, 205–18, 223 (D.D.C. 2018). Furthermore, because section 1634 covers more products and more agencies than the Directive, the court concluded that invalidating the Directive alone would redress none of Kaspersky‘s injuries, so it dismissed the Directive Case for lack of Article III standing. See id. at 218-23.
Kaspersky now appeals both orders. We review de novo a “district court‘s dismissal of a complaint for lack of standing or for failure to state a claim.” Washington Alliance of Technology Workers v. U.S. Department of Homeland Security, 892 F.3d 332, 339 (D.C. Cir. 2018). We begin with the NDAA Case.
II.
This court has previously assumed without deciding that the Bill of Attainder Clause‘s protection applies to corporations such as Kaspersky. See BellSouth Corp. v. FCC (“BellSouth I“), 144 F.3d 58, 63 (D.C. Cir. 1998) (“We assume, as do the parties, that the Bill of Attainder Clause protects corporations as well as individuals.“); see also Consolidated Edison Co. of New York v. Pataki, 292 F.3d 338, 349 (2d Cir. 2002) (holding that corporations are “individuals” protected by the Bill of Attainder Clause).
To subjects of the British crown, bills of attainder meant a very particular thing: “parliamentary acts sentencing named persons to death without the benefit of a judicial trial.” BellSouth I, 144 F.3d at 62. But our Constitution sweeps more broadly. Since early in our history, the Bill of Attainder Clause has been understood to prohibit all “bills of pains and penalties“—legislative acts imposing on specified individuals or classes punishments less severe than death, such as banishment, imprisonment, denial of the right to vote, or confiscation of property. See Foretich v. United States, 351 F.3d 1198, 1217 (D.C. Cir. 2003) (listing bills of pains and penalties); BellSouth I, 144 F.3d at 64 (same).
In the last two centuries, legislatures have innovated beyond death and banishment. But as punishments evolved over time, so too did the courts’ interpretation of the Clause. “Our treatment of the scope of the Clause has never precluded the possibility that new burdens and deprivations might be legislatively fashioned that are inconsistent with the bill of attainder guarantee.” Nixon v. Administrator of General Services, 433 U.S. 425, 475 (1977). It is the job of the courts to “prevent[] Congress from circumventing the clause by cooking up newfangled ways to punish disfavored individuals or groups.” BellSouth I, 144 F.3d at 65.
This job is not always straightforward. For example, in the post-Civil War years, the Supreme Court invalidated as bills of attainder laws prohibiting confederate sympathizers from serving as priests and lawyers, see Cummings v. Missouri, 71 U.S. 277, 319 (1866); Ex Parte Garland, 71 U.S. 333, 377–78 (1866), but not a law prohibiting convicted felons from practicing medicine, see Hawker v. New York, 170 U.S. 189, 191–92 (1898). Similarly, in the early Cold War period, the Court held that an alien was not punished by “the mere denial” of his Social Security benefits after the government deported him for being a communist. See Flemming v. Nestor, 363 U.S. 603, 605, 617 (1960). By contrast, the Court did invalidate as legislative punishments one statute in which Congress had mandated that “no salary or compensation should be paid” to three named federal employees suspected of engaging in “subversive” communist activities, United States v. Lovett, 328 U.S. 303, 305–13 (1946), and another statute in which Congress “ma[de] it a crime for a member of the Communist Party to serve as an officer or . . . an employee of a labor union,” United States v. Brown, 381 U.S. 437, 438 (1965).
As this abridged history demonstrates, each bill of attainder case “has turned on its own highly particularized context.” Flemming, 363 U.S. at 616. Regardless of their particulars, however, all bills of attainder share two basic elements: “a law is prohibited under the bill of attainder clause ‘if it (1) applies with specificity, and (2) imposes punishment.‘” Foretich, 351 F.3d at 1217 (quoting BellSouth Corp. v. FCC (“BellSouth II“), 162 F.3d 678, 683 (D.C. Cir. 1998)).
A “punishment” is something more than a burden. See Selective Service System v. Minnesota Public Interest Research Group, 468 U.S. 841, 851 (1984) (“That burdens are placed on citizens by federal authority does not make those burdens punishment.“). The task, then, is to distinguish permissible burdens from impermissible punishments. To do so, the Supreme Court instructs courts to conduct “three necessary inquiries“:
(1) whether the challenged statute falls within the historical meaning of legislative punishment; (2) whether the statute, “viewed in terms of the type and severity of burdens imposed, reasonably can be said to further nonpunitive legislative purposes“; and (3) whether the legislative record “evinces a congressional intent to punish.”
Id. at 852 (quoting Nixon, 433 U.S. at 473, 475–76, 478). This court, while observing that “[t]he Court has applied each of these criteria as an independent—though not necessarily decisive—indicator of punitiveness,” has explained that “the second factor—the so-called ‘functional test‘—‘invariably appears to be the most important of the three.‘” Foretich, 351 F.3d at 1218 (quoting BellSouth II, 162 F.3d at 684) (internal quotation marks omitted). We shall therefore begin with that test.
Functional Test
Courts need a sorting mechanism for distinguishing statutes with punitive purposes from statutes with merely burdensome effects. Put another way, the ultimate question is whether the burden is a means to an end or an end in and of itself. Seeking to answer this question, the functional test asks “whether the law under challenge, viewed in terms of the type and severity of burdens imposed, reasonably can be said to further nonpunitive legislative purposes.” Nixon, 433 U.S. at 475–76. As we explained in our most recent bill of attainder case, Foretich v. United States, 351 F.3d at 1221, “where there exists a significant imbalance between the magnitude of the burden imposed and a purported nonpunitive purpose, the statute cannot reasonably be said to further nonpunitive purposes.” In short: identify the purpose, ascertain the burden, and assess the balance between the two.
Importantly, the functional test provides an inferential tool; it does not impose an independent requirement. Although a serious imbalance may support an inference that the legislature‘s purported nonpunitive objective serves as a “smokescreen” for some undisclosed punitive purpose, BellSouth I, 144 F.3d at 66, an imperfect fit between purpose and burden does not necessarily prove punitive intent. The difference is nuanced but crucial: the question is not whether a burden is proportionate to the objective, but rather whether the burden is so disproportionate that it “belies any purported nonpunitive goals.” Foretich, 351 F.3d at 1222.
Over the years and across cases, courts have considered a wide variety of factors in conducting this functional inquiry. Generally speaking, these factors fall into two categories.
First, a statute performs poorly on the functional test when its effect is significantly overbroad. See Foretich, 351 F.3d at 1222 (“A grave imbalance or disproportion between the burden and the purported nonpunitive purpose suggests punitiveness, even where the statute bears some minimal relation to nonpunitive
Second, a statute flounders on the functional test when its reach is underinclusive. Foretich, 351 F.3d at 1224 (“[T]he functional test necessarily takes account of the scope or selectivity of a statute in assessing the plausibility of alleged nonpunitive purposes.“). To be sure, selectivity alone does not a bill of attainder make. “[T]he Court has clearly stated that satisfaction of the specificity prong alone is not sufficient to find that a particular law implicates the bill of attainder clause, let alone violates it.” BellSouth II, 162 F.3d at 684. Nevertheless, a concern for specificity reappears in the punishment inquiry, and courts take note when a statute seemingly burdens one among equals. For example, in Foretich, we invalidated a statute that prevented a particular father accused of sexually abusing his daughter from having visitation “without the child‘s consent.” 351 F.3d at 1207 (quoting
Just how overbroad or underinclusive is too overbroad or underinclusive? On this issue, the cases are less than pellucid. On the one hand, the Bill of Attainder Clause does not require narrow tailoring. Congress enjoys leeway to select among more or less burdensome options, and it “may read the evidence before it in a different way than might this court or any other, so long as it remains clear that Congress was pursuing a legitimate nonpunitive purpose.” BellSouth II, 162 F.3d at 689. On the other hand, the functional test is “more exacting” than rational basis review. BellSouth I, 144 F.3d at 67. The functional inquiry demands not some conceivable nonpunitive purpose, but rather an actual nonpunitive purpose. See Foretich, 351 F.3d at 1223 (“[A] statute ... does not escape unconstitutionality merely because the Government can assert purposes that superficially appear to be nonpunitive.“).
So somewhere between the two poles of narrow tailoring and rational basis lies the functional test‘s tipping point. We have at times described the test as requiring a “coherent and reasonable nexus” or a “rational connection” between the burden imposed and nonpunitive purpose furthered. Id. at 1219, 1221. At other times, we have used somewhat more stringent language, demanding that courts “ensure that ‘the nonpunitive aims of an apparently prophylactic measure [are] sufficiently clear and convincing.‘” BellSouth II, 162 F.3d at 686 (alteration in original) (quoting BellSouth I, 144 F.3d at 65).
We begin with the nonpunitive interest at stake: the security of the federal government‘s information systems. Given the volume and variety of governmental functions conducted by and through computers, the district court hardly exaggerated when it described the government‘s networks as “extremely important strategic national assets.” Kaspersky Lab, 311 F. Supp. 3d at 192–93. And those assets need protection: as Congress recognized in the Federal Information Security Modernization Act of 2014, “the highly networked . . . Federal computing environment” faces significant “information security risks,” including the threat of “unauthorized access, use, disclosure, disruption, modification, or destruction of” government information.
While those cyber-threats emanate from all over the world, Russia might well top the list. As the Director of National Intelligence (DNI) testified to the Senate Select Committee on Intelligence in May 2017, “Russia is a full-scope cyber actor that will remain a major threat to [the] US Government . . . . Moscow has a highly advanced offensive cyber program, and in recent years, the Kremlin has assumed a more aggressive cyber posture.” Worldwide Threats, at 16 (statement of Daniel R. Coats). One need look no further, the DNI warned, than “Russia‘s efforts to influence the 2016 US election” to discern the “scope and sensitivity” of the targets Russia seems willing to attack. Id. In other words, Russia has demonstrated both the means and the willingness to launch cyber-operations against the U.S. government and its information systems.
Enter Kaspersky, a Russian company founded by a Russian citizen with its headquarters in Russia. In the months before enacting section 1634, Congress heard substantial expert testimony warning that Kaspersky‘s ties to Russia could jeopardize the integrity of the federal computers on which the company‘s products operate. With or without Kaspersky‘s willing cooperation, explained the experts, the Russian government could use Kaspersky products as a backdoor into federal information systems. Then, having gained privileged and undetected access, Russia could make all manner of mischief. The Acting Secretary of Homeland Security apparently agreed with these warnings. So Congress, after hearing all of this information, decided to disallow federal use of Kaspersky hardware, software, and services.
Viewed in context, section 1634 “has the earmarks of a rather conventional response” to a security risk: remove the risk. BellSouth I, 144 F.3d at 65. We think it worth emphasizing, moreover, that the government discontinued only its own use of Kaspersky products; all other individuals and companies in the universe of potential clients remain free to buy and use Kaspersky products as they please. To be sure, section 1634 may still impose serious financial and reputational costs on Kaspersky. And Congress, unable to predict the future, had no way of knowing for sure whether Kaspersky products would have caused harm if left in place. But “the severity
Kaspersky, however, accuses Congress of imposing a disproportionate burden. According to the company, Congress could have made section 1634 less burdensome by, for example, including a sunset provision, permitting the government to use Kaspersky products on the condition that the company cease operating in Russia, or prohibiting the use of Kaspersky‘s hardware and software but not its services. Or, so says Kaspersky, Congress could have done nothing, leaving it to the executive branch to remove the company from the rolls of approved federal contractors pursuant to the process (and procedural safeguards) contained in federal procurement regulations.
But the fact that Kaspersky can imagine slightly less restrictive measures does not demonstrate that the law Congress actually chose amounts to punishment. Take Kaspersky‘s suggestion that instead of legislating, “Congress could have referred the matter to the executive branch to consider” debarring Kaspersky under the procedures set forth in the Federal Acquisition Regulation. Appellants’ Br. 36. Debarment, however, prevents the government only from inking future contracts; it would neither require agencies to remove already-purchased Kaspersky products from their systems nor completely prevent third-party contractors from using Kaspersky products in fulfilling their own federal contracts. See
Similar deficiencies plague Kaspersky‘s other proposals: either the suggested alternative does not adequately protect federal information systems, or it does not substantially lessen the burden on Kaspersky. With respect to the proposals that fail to protect federal computers as well as section 1634 does—for example, including a sunset provision—those we reject for failure to offer genuinely workable alternatives. And with respect to the remaining proposals that lessen the burden on Kaspersky only slightly, or that swap one burden for another—for example, requiring Kaspersky to discontinue all Russian operations—we cannot infer from the marginal difference between those hypothetical statutes
Kaspersky also argues that it was unfairly “single[d] out” for mistreatment, Appellants’ Br. 15, and that Congress should have instead “passed a law of general applicability that prohibits the federal government from using products or services of any cybersecurity software producer that provides information to [Russian intelligence agencies], does business in Russia, has servers in Russia, or uses Russian networks,” Appellants’ Reply Br. 16. But Kaspersky identifies no cyber-product as vulnerable to malicious exploitation as Kaspersky‘s. And although the company accurately points out that many cyber-companies operate in Russia, we conclude that Congress, based on the evidence before it, could have reasonably determined that Kaspersky‘s Russian ties differ in degree and kind from these other companies‘. It was Kaspersky—not these other companies—about whom the experts sounded the alarm. Kaspersky, in other words, is in a class of its own.
Indeed, in this respect, this case closely resembles Nixon v. Administrator of General Services, which concerned a statute that had directed the Administrator of General Services “to take custody,” at least temporarily, of former-President Nixon‘s presidential papers and tape recordings. 433 U.S. at 429. The Court rejected Nixon‘s claim that the statute‘s specificity evinced punitive intent, concluding instead that Congress had permissibly created “a legitimate class of one” because “at the time of the Act‘s passage, only [Nixon‘s] materials demanded immediate attention.” Nixon, 433 U.S. at 472; see also BellSouth I, 144 F.3d at 67 (concluding, given the unique characteristics of BellSouth Corporation‘s operating companies, that their “differential treatment” under the statute at issue was “quite understandable without resort to inferences of punitive purpose“). The Court in Nixon also found it notable that in addition to offering a short-term Band-Aid solution to the problem presented by Nixon‘s records, the statute also established a commission to study the preservation of future administrations’ presidential materials. Id. As the Court saw it, the statute permissibly dealt with a pressing issue at hand while simultaneously acting to prevent the same problem from arising again.
So too, here. No one argues that Kaspersky presents the only possible gap in the federal computer system‘s defenses. But Congress had ample evidence that Kaspersky posed the most urgent potential threat, and this court must give Congress “sufficient latitude to choose among competing policy alternatives,” lest “our bill of attainder analysis . . . ‘cripple the very process of legislating.’” Foretich, 351 F.3d at 1222–23 (quoting Nixon, 433 U.S. at 470); cf. Clements v. Fashing, 457 U.S. 957, 969 (1982) (holding, in the context of an equal-protection challenge, that “[a] [s]tate [may] regulate ‘one step at a time, addressing itself to the phase of the problem which seems most acute’” (quoting Williamson v. Lee Optical of Oklahoma Inc., 348 U.S. 483, 489 (1955))). The Bill of Attainder Clause does not make perfect the enemy of the good. Furthermore, like the statute at issue in Nixon, section 1634 contains not
At the end of the day, the functional test does not require that Congress precisely calibrate the burdens it imposes to the goals it seeks to further or to the threats it seeks to mitigate. Instead, the test requires only that Congress refrain from “‘pill[ing] on’ . . . additional, entirely unnecessary burden[s].” Foretich, 351 F.3d at 1228 (Tatel, J., concurring in part and concurring in the judgment) (quoting Consolidated Edison Co., 292 F.3d at 354). And given the reasonable balance between the burden imposed by
Historical Test
Having failed to make a persuasive showing on the functional test, Kaspersky faces an uphill battle. Foretich, 351 F.3d at 1218 (“[C]ompelling proof on [the functional test] may be determinative.“). Although we cannot rule out the possibility that a persuasive showing on the historical or motivational tests could overcome a challenger‘s failure to raise a suspicion of punitiveness under the functional test, this, as we are about to explain, is not such a case—indeed, not even close.
Under the historical test, we ask “whether the challenged statute falls within the historical meaning of legislative punishment.” Selective Service System, 468 U.S. at 852. This question overlaps significantly with the functional test because, historically, “legislative punishment” existed where the burden imposed so dramatically outweighed the benefit gained that courts could infer only a punitive purpose. “[T]he substantial experience of both England and the United States with [bills of attainder],” the Supreme Court explained in Nixon, “offers a ready checklist of deprivations and disabilities so disproportionately severe and so inappropriate to nonpunitive ends that they unquestionably have been held to fall within the proscription of [the Bill of Attainder Clause].” Nixon, 433 U.S. at 473; see also Foretich, 351 F.3d at 1219 (explaining that early Supreme Court bill-of-attainder cases “foreshadowed the development of the functional test“).
Despite the apparent redundancy of the historical inquiry, we must double-check our functional-test work by comparing
As Kaspersky admits, “‘the particular burden imposed’ by
In support of this claim, Kaspersky highlights two characteristics shared by many historic bills of attainder: excluding or expelling individuals from a profession, and “mark[ing] specified persons with a brand of infamy or disloyalty.” Foretich, 351 F.3d at 1219. In particular, Kaspersky cites four Supreme Court cases—two from the Civil War and two from the Cold War—in which, as previously noted, the Court invalidated statutes that excluded, respectively, former confederate sympathizers and communists from particular vocations, including, in one case, from government service. See Cummings, 71 U.S. 277 (prohibiting ex-rebel sympathizers from serving as priests); Ex Parte Garland, 71 U.S. 333 (denying ex-confederate sympathizers admission to the bar); Lovett, 328 U.S. 303 (cutting off salary to certain “subversive” government employees); Brown, 381 U.S. 437 (criminalizing communists’ service as officers in labor unions). Kaspersky also relies on our decision in Foretich, in which we concluded that “deprivation of parental rights and the opprobrium of being branded a criminal child abuser . . . may be of even greater magnitude than many of [the burdens] at issue in the historical cases.” Foretich, 351 F.3d at 1220. Based on these decisions, Kaspersky argues that
The historical punishments Kaspersky cites are readily distinguishable from the burden
In particular, the stain of a “brand of infamy or disloyalty” matters most to flesh-and-blood humans. These are people who, most likely, have but one country of citizenship—a country in which they exercise civic privileges available exclusively to living individuals, such as voting, running for office, or serving in the armed forces. They are people who have neighbors and colleagues and communities in whose good graces they hope to remain. And they are people who have families and friends whose own reputations and happiness are tied, at least in part, to their own.
Corporations are very different. To be sure, corporations may derive substantial financial value from their brands’ reputations. But that is precisely the point: reputation is an asset that companies cultivate, manage, and monetize. It is not a quality integral to a company‘s emotional well-being, and its diminution exacts no psychological cost. This is why, for example, “[t]he law of libel has long reflected the distinction between corporate and human plaintiffs by limiting corporate recovery
Because human beings and corporate entities are so dissimilar, any analogy between the statutes that courts have found to qualify as bills of attainder and
Furthermore, all of the Supreme Court‘s employment ban cases have involved “a legislative enactment barring designated individuals or groups from participation in specified employments or vocations.” Nixon, 433 U.S. at 474. Not so with
To the contrary, rather than an employment ban,
At bottom, then, a wide valley separates
Motivational Test
The motivational test asks “whether the legislative record ‘evinces a congressional intent to punish.‘” Selective Service System, 468 U.S. at 852 (quoting Nixon, 433 U.S. at 478). As we explained in Foretich, “[g]iven the obvious constraints on the usefulness of legislative history as an indicator of Congress‘s collective purpose,” statutes rarely struggle to satisfy the motivational test. 351 F.3d at 1225. Indeed, “this prong by itself is not determinative in the absence of ‘unmistakable evidence of punitive intent.‘” Id. at 855 n.15.
Kaspersky not only fails to offer such unmistakable evidence; it very nearly fails to offer any evidence whatsoever. Kaspersky relies solely on a handful of public comments made by Senator Shaheen, the sponsor of the amendment that became
The trouble with Kaspersky‘s reliance on Shaheen‘s comments is twofold. First, we detect no punitive intent in the senator‘s statements. To the contrary, she expressed a desire to take action to protect federal information systems—a nonpunitive objective. And second, even if Shaheen‘s statements did reveal a personal desire to punish Kaspersky, the company cites no corroborating evidence indicating that other members of Congress shared her supposedly punitive motivations. “[S]everal isolated statements are not sufficient to evince punitive intent,” and cannot render a statute a bill of attainder without any other indicia of punishment.” Foretich, 351 F.3d at 1225 (quoting BellSouth II, 162 F.3d at 690) (internal quotation marks omitted). Therefore, like the functional and historical tests, the motivational test does nothing to support Kaspersky‘s argument that
III.
Before concluding our consideration of the NDAA Case, we need to address a procedural concern raised by Kaspersky. As a general rule, ”
Although we cannot rule out the possibility that the district court improperly comingled facts from the two separate cases, we need not reach that issue. Because we are reviewing the district court‘s dismissal de novo, even if that court impermissibly ventured outside the pleadings, we can affirm based on the available permissible evidence. Among the information a court may consider on a motion to dismiss are “public records subject to judicial notice.” Kaempe v. Myers, 367 F.3d 958, 965 (D.C. Cir. 2004). “A federal court may take judicial notice of ‘a fact that is not subject to reasonable dispute’ if it . . . ‘can be accurately and readily determined from sources whose accuracy cannot reasonably be questioned.‘” Hurd v. District of Columbia, 864 F.3d 671, 686 (D.C. Cir. 2017) (quoting
IV.
Having concluded that
As the district court recognized, however, Kaspersky has a serious standing problem.
And indeed it does. Thus, as the district court explained, “even if . . . the Court were to order the rescission of the [Directive], [Kaspersky‘s] harms would not be redressed.” Kaspersky Lab, 311 F. Supp. 3d at 219. It is well-settled that courts lack jurisdiction to hear cases in which the plaintiff fails to identify a redressable injury. See Simon v. Eastern Kentucky Welfare Rights Organization, 426 U.S. 26, 38 (1976) (holding that to demonstrate standing, a plaintiff must show “an injury to himself that is likely to be redressed by a favorable decision“). Therefore, because courts “ha[ve] no jurisdiction to proceed to the merits of a lawsuit where [their] ultimate decision will have no real effect,” Kaspersky Lab, 311 F. Supp. 3d at 219, we shall affirm the district court‘s dismissal of the Directive Case for lack of subject matter jurisdiction.
V.
For the foregoing reasons, we affirm the district court‘s dismissal of the NDAA Case for failure to state a claim upon which relief can be granted, as well as its dismissal of the Directive Case for lack of jurisdiction.
So ordered.
