Professional Documents
Culture Documents
United States v. Truong Dinh Hung, United States of America v. Ronald Louis Humphrey, 629 F.2d 908, 4th Cir. (1980)
United States v. Truong Dinh Hung, United States of America v. Ronald Louis Humphrey, 629 F.2d 908, 4th Cir. (1980)
2d 908
6 Fed. R. Evid. Serv. 449
Truong Dinh Hung, more familiarly known as David Truong, and Ronald
Humphrey were convicted of espionage, conspiracy to commit espionage and
several espionage-related offenses for transmitting classified United States
government information to representatives of the government of the Socialist
Republic of Vietnam. In these appeals, they seek reversal of their convictions
because of warrantless surveillance and searches, the alleged inapplicability of
the espionage statutes and the theft-of-government-property statute to the facts
of this case, several alleged Jencks Act violations, an alleged denial of
compulsory process, and claimed error in a number of the district court's
evidentiary rulings.
We hold that the warrantless searches and surveillance did not violate the
Fourth Amendment, that the espionage statutes were properly and
constitutionally applied to this case, that the defendants were not denied
compulsory process, and that the district court did not err in any of its
evidentiary rulings. Relying on the concurrent sentence doctrine, the majority
holds that we should not rule on defendants' claim that the theft-ofgovernment-property statute does not apply to this case. However, for myself, I
would conclude that the issue concerning the theft-of-government-property
statute should be addressed and that the statute does not encompass the actions
of the defendants. I would therefore reverse their convictions under that statute.
We are unanimous, however, in remanding the case to the district court for
further proceedings to determine whether documents produced by the
government near the end of trial contain Jencks Act material that should have
been supplied to the defense.
I.
3
and furnished the copies to Truong. In a statement given after his arrest,
Humphrey said that his motive was to improve relations between the North
Vietnamese government and the United States so that he could be reunited with
a woman whom he loved who was a prisoner of the North Vietnamese
government.
4
When the intelligence agencies first learned that Truong was transmitting
classified documents to Paris, they were understandably extremely anxious to
locate Truong's source for his data. Toward that end, the government conducted
a massive surveillance of Truong. Truong's phone was tapped and his
apartment was bugged from May, 1977 to January, 1978.1 The telephone
interception continued for 268 days and every conversation, with possibly one
exception, was monitored and virtually all were taped. The eavesdropping
device was operative for approximately 255 days and it ran continuously. No
court authorization was ever sought or obtained for the installation and
maintenance of the telephone tap or the bug. The government thus ascertained
that Humphrey was providing Truong with the copies of secret documents. This
leak of sensitive information of course ceased when Truong and Humphrey
were arrested on January 31, 1978.
II.
7
The district court accepted the government's argument that there exists a foreign
intelligence exception to the warrant requirement. The district court, however,
also decided that the executive could proceed without a warrant only so long as
the investigation was "primarily" a foreign intelligence investigation. The
district court decided that the FBI investigation had become primarily a
criminal investigation by July 20, 1977, and excluded all evidence secured
through warrantless surveillance after that date. Conversely, all evidence
secured before July 20 was not suppressed by the district court, because it
determined that during that period the investigation primarily concerned
foreign intelligence.
10
We agree with the district court that the Executive Branch need not always
obtain a warrant for foreign intelligence surveillance. Although the Supreme
Court has never decided the issue which is presented to us, it formulated the
analytical approach which we employ here in an analogous case, United States
v. United States District Court (Keith), 407 U.S. 297, 92 S.Ct. 2125, 32 L.Ed.2d
752 (1972). In Keith, the executive had conducted warrantless domestic
security surveillance. The Court posited two inquiries to guide the Fourth
Amendment determination of whether a warrant is required:
11the legitimate need of Government to safeguard domestic security requires the use
If
of electronic surveillance, the question is whether the needs of citizens for privacy
and free expression may not be better protected by requiring a warrant before such
surveillance is undertaken. We must also ask whether a warrant would unduly
frustrate the efforts of Government to protect itself from acts of subversion and
overthrow directed against it.
12
government needs, the Supreme Court concluded that the executive must seek a
warrant before it undertakes domestic security surveillance.
13
For several reasons, the needs of the executive are so compelling in the area of
foreign intelligence, unlike the area of domestic security, that a uniform
warrant requirement would, following Keith, "unduly frustrate" the President in
carrying out his foreign affairs responsibilities. First of all, attempts to counter
foreign threats to the national security require the utmost stealth, speed, and
secrecy. A warrant requirement would add a procedural hurdle that would
reduce the flexibility of executive foreign intelligence initiatives, in some cases
delay executive response to foreign intelligence threats, and increase the chance
of leaks regarding sensitive executive operations.2 See Zweibon v. Mitchell,
516 F.2d 594, 704 (D.C.Cir.1975) (Wilkey, J., concurring and dissenting).
14
15
Perhaps most crucially, the executive branch not only has superior expertise in
the area of foreign intelligence, it is also constitutionally designated as the preeminent authority in foreign affairs. See First National Bank v. Banco Nacional
de Cuba, 406 U.S. 759, 765-68, 92 S.Ct. 1808, 1812-1814, 32 L.Ed.2d 466
(1972); Oetjen v. Central Leather Co., 246 U.S. 297, 302, 38 S.Ct. 309, 310, 62
L.Ed. 726 (1918). The President and his deputies are charged by the
constitution with the conduct of the foreign policy of the United States in times
of war and peace. See United States v. Curtiss-Wright Corp., 299 U.S. 304, 57
S.Ct. 216, 81 L.Ed. 255 (1936). Just as the separation of powers in Keith forced
the executive to recognize a judicial role when the President conducts domestic
security surveillance, 407 U.S. at 316-18, 92 S.Ct. at 2136-2137, so the
separation of powers requires us to acknowledge the principal responsibility of
the President for foreign affairs and concomitantly for foreign intelligence
surveillance.
16
In sum, because of the need of the executive branch for flexibility, its practical
experience, and its constitutional competence, the courts should not require the
executive to secure a warrant each time it conducts foreign intelligence
surveillance. Accord, United States v. Butenko, 494 F.2d 593 (3 Cir.), cert.
denied sub nom., Ivanov v. United States, 419 U.S. 881, 95 S.Ct. 147, 42
L.Ed.2d 121 (1974); United States v. Brown, 484 F.2d 418 (5 Cir. 1973), cert.
denied, 415 U.S. 960, 94 S.Ct. 1490, 39 L.Ed.2d 575 (1974); United States v.
Clay, 430 F.2d 165 (5 Cir. 1970), rev'd on other grounds, 403 U.S. 698, 91
S.Ct. 2068, 29 L.Ed.2d 810 (1971).4 Contra, Zweibon v. Mitchell, 516 F.2d
594 (D.C.Cir.1975) (dictum in plurality opinion in case involving surveillance
of domestic organization having an effect on foreign relations but acting neither
as the agent of nor in collaboration with a foreign power).
17
18
The surveillance in this case clearly satisfied this limitation upon the foreign
intelligence exception to the warrant requirement. Krall, the government agent,
Second, as the district court ruled, the executive should be excused from
securing a warrant only when the surveillance is conducted "primarily" for
foreign intelligence reasons. We think that the district court adopted the proper
test, because once surveillance becomes primarily a criminal investigation, the
courts are entirely competent to make the usual probable cause determination,
and because, importantly, individual privacy interests come to the fore and
government foreign policy concerns recede when the government is primarily
attempting to form the basis for a criminal prosecution. We thus reject the
government's assertion that, if surveillance is to any degree directed at
gathering foreign intelligence, the executive may ignore the warrant
requirement of the Fourth Amendment.
20
The defendants urge that the "primarily" test does not go far enough to protect
privacy interests. They argue that the government should be able to avoid the
warrant requirement only when the surveillance is conducted "solely" for
foreign policy reasons. The proposed "solely" test is unacceptable, however,
because almost all foreign intelligence investigations are in part criminal
investigations. Although espionage prosecutions are rare, there is always the
possibility that the targets of the investigation will be prosecuted for criminal
violations.5 Thus, if the defendants' "solely" test were adopted, the executive
would be required to obtain a warrant almost every time it undertakes foreign
intelligence surveillance, and, as indicated above, such a requirement would fail
to give adequate consideration to the needs and responsibilities of the executive
in the foreign intelligence area.
21
In this case, the district court concluded that on July 20, 1977, the investigation
of Truong had become primarily a criminal investigation. Although the
Criminal Division of the Justice Department had been aware of the
investigation from its inception, until summer the Criminal Division had not
taken a central role in the investigation. On July 19 and July 20, however,
several memoranda circulated between the Justice Department and the various
intelligence and national security agencies indicating that the government had
begun to assemble a criminal prosecution. On the facts of this case, the district
court's finding that July 20 was the critical date when the investigation became
primarily a criminal investigation was clearly correct.
22
Therefore, because there was more than enough evidence to indicate that
Truong had collaborated with the Vietnamese government and because the
district court did not err in choosing July 20 as the date when the investigation
became primarily a criminal investigation, we do not disturb the decision of the
district court to exclude all evidence obtained through the surveillance after
July 20 but to permit the government to introduce evidence secured through the
surveillance before July 20.
23
24
Even if a warrant is not required, the Fourth Amendment requires that the
surveillance be "reasonable." The reasonableness of the surveillance is
determined by examining the circumstances of the particular case. Scott v.
United States, 436 U.S. 128, 98 S.Ct. 1717, 56 L.Ed.2d 168 (1978).
25
For seventy days prior to July 20, FBI agents intercepted all of Truong's phone
calls; and, for almost as long a period, the agents listened to Truong's
conversations with visitors in his apartment.6 As the district court observed, the
surveillance was nonetheless reasonable, and we agree.
26
because the government agents could never be sure whether a particular caller
would reveal that he was a source of the documents sometime during his
conversation with Truong. As well, when the government eavesdrops on
clandestine groups like this one, investigators often find it necessary to
intercept all calls in order to record possible code language or oblique
references to the illegal scheme. See United States v. Clerkley, 556 F.2d 709 (4
Cir.1977), cert. denied sub nom. London v. United States, 436 U.S. 930, 98
S.Ct. 2830, 56 L.Ed.2d 775 (1978) (approving blanket surveillance of numbers
operation in order to determine the participants). Thus, on the facts of this case,
the surveillance conducted by the government agents was reasonable.7
C. Package Search
27
The FBI and the CIA searched one of the packages Truong sent to Paris by
Krall without either the authorization of the Attorney General or a search
warrant. Because the government agents did not receive executive
authorization, the foreign intelligence exception to the warrant requirement
does not legitimate this search. Nevertheless, because Truong did not have a
legitimate expectation of privacy in the package, see United States v.
Rabinowitz, 339 U.S. 56, 65-66, 70 S.Ct. 430, 435, 94 L.Ed. 653 (1950), the
district court did not err in permitting the contents of the package to be admitted
into evidence.
28
III.
29
these convictions.
A. Espionage Statutes
30
The jury found that the defendants had violated three espionage provisions, 18
U.S.C. 794(a), 794(c), and 793(e). Two principal objections are made by
the defendants to their convictions under these statutes, and we will consider
them in order:
31
32
A common prerequisite for a conviction under each of the statutes is that the
defendant transmit information "relating to the national defense." The
defendants argue that this phrase limits the reach of the statutes to military
matters and assert that none of the materials transmitted by Truong and
Humphrey related to the "national defense" thus defined.
33
34
Under either the strict definition urged by the defendants or the broad definition
endorsed by the Supreme Court in Gorin, the defendants transmitted
information which related to the national defense. The materials sent to Paris
included information which related directly to the United States military,
including information about Vietnamese designs on Thailand, American POW's
in Indochina, and American military materiel which had fallen into the hands of
the Vietnamese government. In addition, under the broader definition of
national defense, the packages contained a great deal of national defense
(2) Intent
36
The defendants base their second principal objection upon their claim that a
constitutional conviction under the espionage statutes must include a finding of
evil intent, i. e., intent to injure the United States or to aid a foreign nation.
They contend that their convictions under 794(a) and 794(c) are invalid
because the trial judge failed to instruct the jury that a finding of evil intent was
essential and that their convictions under 793(e) are invalid because 793(e)
itself does not contain evil intent as an element necessary for a conviction.
37
Under 794(a) and 794(c), the prosecution must prove that the defendant
acted "with intent or reason to believe" that transmission of the information will
injure the United States or aid a foreign nation. This scienter requirement is
critically important, because the Supreme Court relied upon it in Gorin, 312
U.S. at 26-27, 61 S.Ct. at 433-434 (1941), to rebut a claim that the espionage
statutes were unconstitutionally overbroad. The defendants insist that the
district judge's instructions in this case diluted the important scienter
requirement by suggesting that the defendant could be convicted for mere
negligence. This contention is insubstantial.
38
The district judge instructed the jury that to convict defendants it must find that
they acted "willfully and with an intent or reason to believe" that the
information would be used to injure the United States or to aid a foreign power.
The jury was also told that "reason to believe" meant that a defendant must be
shown to have known facts from which he concluded or reasonably should have
concluded that the information could be used for the prohibited purposes. The
latter did not mean, however, that the jury could convict merely upon a finding
that a defendant acted "negligently." Rather, the jury was instructed that a
defendant must act "willfully" which the jury was told meant "voluntarily and
intentionally and with a specific intent to do something the law forbids."
39
Section 793(e) does not contain the same strong scienter language of 794(a).
Rather, it requires only that the defendant have "reason to believe" that the
national defense information could be used to harm the United States or to aid a
foreign nation. The defendants contend that this less stringent language renders
the statute unconstitutionally overbroad. See generally Edgar & Schmidt, supra,
at 998-1020.
40
Even though 793(e) does not include scienter language identical to the
language of 794(a), it does require that the accused "willfully" transmit the
information. Evidently relying upon this language, the trial judge instructed the
jury that it must find that the defendants acted in bad faith before it could
convict, and defined bad faith as a "design to mislead or deceive another. That
is, not prompted by an honest mistake as to one's duties, but prompted by some
personal or underhanded motive." This instruction more than cured any
possible overbreadth of 793(e).10 See Gorin v. United States, 312 U.S. 19, 2728, 61 S.Ct. 429, 433-434, 85 L.Ed. 488 (1941); United States v. Dedeyan, 584
F.2d 36 (4 Cir. 1978); Edgar & Schmidt, supra, at 1020. 11
B. Espionage-Related Statutes
41
42
43
The jury found that Truong and Humphrey had acted in the United States as
unregistered agents of the Socialist Republic of Vietnam, a violation of 18
U.S.C. 951. The defendants make two challenges to their convictions. First,
they argue that the statute violated their privilege against self-incrimination
because they would have been forced to confess participation in illegal
espionage if they had registered. A registration provision violates the Fifth
Amendment, however, only if it is directed at a class of persons who are
inherently suspect of illegal activities. A neutral registration requirement, such
as this one directed at representatives of foreign nations, does not offend the
Fifth Amendment. See United States v. Walden, 411 F.2d 1109 (4 Cir.), cert.
denied, 396 U.S. 931, 90 S.Ct. 271, 24 L.Ed.2d 230 (1969).
44
The defendants also contend that 951 is impermissibly vague and overbroad.
Their principal objection is to the word "agent." "Agent" as used in this context,
however, is a readily understandable term which provides adequate notice of
the conduct proscribed by the statute.
D. 50 U.S.C. 783(b) and (c)
45
45
46
IV.
47
48
Robert Hall was Krall's CIA case officer. He made reports of his conversations
with Krall. Near the end of trial, the prosecution presented the district judge
with a large number of Hall's reports and cables concerning his conversations
with Krall. Because the government produced the material at a late date and
because there was a large number of documents, the district judge was candid
in stating that he was unable to examine them adequately. He said: "I have been
through it in a cursory manner, enough to determine that there is nothing . . ., in
very cursory reading (that) is any different than (Jencks Act material already
supplied to the defense)." The judge revealed his irritation with the prosecution
for producing the documents tardily and thereby preventing him from fully
carrying out his responsibilities: "Presuming the Court (evidently the Fourth
Circuit) finds to the contrary, the Government is going to lose this case just
because somebody in the CIA was being cute."
49
As these statements of the district judge reflect, there is no clear finding, on the
The need for a remand in this case is underscored by the fact that the
government has conceded in its brief before us that the documents contain
perhaps three Jencks Act statements by Krall. The government's description of
one of these statements suggests that one of Krall's conversations with Hall may
have differed from her testimony at trial. Krall testified that Phan Thanh Nam,
the head of the Vietnamese Paris mission, told her that Truong was among "our
people in Washington." The government states in its brief that Hall's report
recounts Krall's conversation with Nam without mentioning a reference to
Truong. This document could thus contain a Jencks Act statement which might
have been used to impeach Krall's testimony.
51
52
Krall made some written reports to Hall detailing her activities while in Paris.
These reports included descriptions of her actions relating to Truong. At trial,
The destruction of Jencks Act material may violate at least the spirit of the Act,
even if the material is destroyed without bad faith following a routine
procedure. See United States v. Missler, 414 F.2d 1293, 1304-05 (4 Cir. 1969),
cert. denied, 397 U.S. 913, 90 S.Ct. 912, 25 L.Ed.2d 93 (1970); United States v.
Johnson, 337 F.2d 180, 201-02 (4 Cir. 1964), aff'd, 383 U.S. 169, 86 S.Ct. 749,
15 L.Ed.2d 681 (1966). Whatever the Jencks Act consequences of the
destruction of "statements" by criminal investigators, the Jencks Act was not
violated in this case, because the reports were destroyed outside the context of a
criminal investigation.
54
Krall acted as both an FBI agent and a CIA agent. As a CIA operative, she
provided a variety of information regarding the Vietnamese government, not
limited to the flow of documents from Truong to Paris. Her reports to Hall, her
CIA case officer, were part of her intelligence-gathering function for the CIA.
The reports were destroyed by Hall, acting as a CIA intelligence functionary, in
accordance with CIA practice designed to preserve the secrecy of sensitive
foreign operations. Krall's reports were thus prepared and destroyed in
conjunction with her role as an intelligence agent, not as an aspect of her role as
an informer in a criminal investigation. Therefore, even under the decisions of
those courts which have imposed sanctions for routine destruction of Jencks
Act statements by criminal investigators, see, e. g., United States v. Carrasco,
537 F.2d 372 (9 Cir. 1976), the prosecution would not be subject to sanctions
for the destruction of Krall's reports. In this case, the district court did not err
when it refused to impose sanctions on the prosecution for the destruction of
this possible Jencks Act material.13
V.
55
The defendants were also convicted of violating 18 U.S.C. 641. That statute
renders criminally liable any person who "converts to his use or the use of
another, or without authority, sells, conveys or disposes of any . . . thing of
value of the United States." The defendants were convicted under this statute
on the theory that they converted government property in the form of classified
information when they surreptitiously secured copies of secret documents in the
The defendants argue that their convictions must be reversed because the theft
of classified information falls outside the confines of this statute. They contend
that information cannot be "converted" because the common law tort of
conversion requires that the legitimate owner be deprived of possession, see
Pearson v. Dodd, 410 F.2d 701 (D.C.Cir.), cert. denied, 395 U.S. 947, 89 S.Ct.
2021, 23 L.Ed.2d 465 (1969). In this case, the defendants did not "convert" the
classified information by copying the documents, their theory goes, since the
United States Information Agency was not denied access to its information in
the process. Furthermore, the defendants assert, information is an intangible not
encompassed by 641, which speaks of tangible "things" of value.14 Therefore,
the defendants conclude that, because they obtained an intangible incapable of
conversion, their acts were not prohibited by the limited terms of 641.
57
For reasons set forth in the separate opinion of Judge Russell in which Judge
Hall concurs, the majority has concluded that, under the concurrent sentence
rule, this contention of the defendants should not be considered. I think
otherwise, and I will state first my reasons why I think the concurrent sentence
doctrine should not be invoked to bar review and next my views with respect to
the merits of defendants' contention.
58
an in banc court.
59
But even if the doctrine has continuing utility as a means of avoiding the
expenditure of judicial resources on the unnecessary decision of an issue, I
think that it is improper to invoke it here for at least two reasons. First, as the
government has sought to apply 641, there is in issue not merely the
defendants' guilt or innocence, but, as I later demonstrate, substantial first
amendment considerations. In my view, proper concern for the protection of
these important considerations should make us more hesitant to invoke the
concurrent sentence doctrine here than in the run-of-the-mill criminal case.
60
61
62
The legislative history of 641 does not mention the application of the statute
to the theft of government information. Section 641 is a venerable criminal
provision; its predecessors were first enacted in 1875. The statute was codified
in its present form in 1948 when the criminal code was revised. As might be
expected, the 19th century legislative history of the predecessor statutes does
not address the application of the statute to government information, almost
certainly because a Congress of that era would not foresee this issue. See
United States v. Lambert, 446 F.Supp. 890, 893 (D.Conn.1978), aff'd sub nom.
United States v. Girard, 601 F.2d 69 (2 Cir. 1979). And, because the 1948
revision was merely a consolidation of several provisions of the 1940 code,
Congress did not discuss the substantive reach of 641 when the statute was
enacted in its current form. In short, the legislative history reveals that Congress
has never directly considered the application of 641 to government
information. In enacting 641 and its predecessors, Congress did not express
an intent that the unauthorized disclosure of government information be either
included within or excluded from the criminal prohibitions of 641.
63
While the legislative history of the statute is inconclusive, the language of the
statute and the leading Supreme Court decision dealing with 641 establish
that the statute should not be construed as narrowly as the defendants would
like. The language of 641 itself is all-inclusive. By appending "thing of
value" onto the list of "any record, voucher, (or) money," Congress certainly
did not evince an intent to restrict the reach of 641. Nor did Congress
manifest a desire that 641 not include some wrongful appropriations of
government property when it chose the phrase "embezzles, purloins, or
knowingly converts . . . , or without authority, sells, conveys or disposes."
64
In Morissette v. United States, 342 U.S. 246, 271, 72 S.Ct. 240, 254, 96 L.Ed.
288 (1952), the Supreme Court confirmed that Congress intended the language
of 641 to sweep broadly:
65 has concerned codifiers of the larceny type offense is that gaps or crevices
What
have separated particular crimes of this general class and guilty men have escaped
through the breaches. The books contain a surfeit of cases drawing fine distinctions
between slightly different circumstances under which one may obtain wrongful
advantages from another's property. The codifiers wanted to reach all such
instances.15
66
67
While I would thus conclude that in some circumstances 641 may encompass
the unauthorized disclosure of government information, 641 must be applied
to the theft of government information with extreme care. Two particularly
acute problems arise when the statute is used to punish defendants who have
First, because the statute was not drawn with the unauthorized disclosure of
government information in mind, 641 is not carefully crafted to specify
exactly when disclosure of government information is illegal. The crucial
language is "without authority." The precise contours of that phrase are not selfevident. This ambiguity is particularly disturbing because government
information forms the basis of much of the discussion of public issues and, as a
result, the unclear language of the statute threatens to impinge upon rights
protected by the first amendment. Under 641 as it is written, no precise
standard controls the exercise of discretion by upper level government
employees when they decide whether to forbid or permit the disclosure of
government information. See Nimmer, National Security Secrets v. Free
Speech: The Issues Left Undecided in the Ellsberg Case, 26 Stan.L.Rev. 311,
322 (1974). Consequently, upper level government employees might use their
discretion in an arbitrary fashion to prevent the disclosure of government
information; and government employees, newspapers, and others could not be
confident in many circumstances that the disclosure of a particular piece of
government information was "authorized" within the meaning of 641. Thus,
the vagueness of the "without authority" standard could pose a serious threat to
public debate of national issues, thereby bringing the constitutional validity of
641 into question because of its chilling effect on the exercise of first
amendment rights. See Cox v. Louisiana, 379 U.S. 536, 85 S.Ct. 453, 13
L.Ed.2d 471 (1965).17
69
70
The Second Circuit has recently adopted the approach advocated by the
government when it ruled on the application of 641 to another category of
government information. In United States v. Girard, 601 F.2d 69 (2 Cir. 1979),
aff'g United States v. Lambert, 446 F.Supp. 890 (D.Conn.1978), the defendants
were charged with selling information obtained from the computers of the Drug
Enforcement Administration including the identities of informants and the
status of government drug investigations. The court determined that 641
encompassed the unauthorized disclosure of government information. The court
also confronted the vagueness and the resulting first amendment difficulties
contained within the statute. The court corrected these defects by reading
"without authority" to embody the pertinent Justice Department regulations and
the Agents Manual of the Drug Enforcement Administration, which
specifically forbade the disclosure of the government information at issue in
that case. By thus reasonably looking to the concrete definition of "without
authority" that governed the disclosure of a particular category of government
information, the court eliminated the vagueness of 641 as applied to the
defendants in that case.
71
This solution for the vagueness of 641 raises the second of the problems
which is caused by the application of 641 to the theft of government
information: the potential for conflict between 641 and other statutes
specifically addressed to the disclosure of government information. Section 641
has not been traditionally employed to punish those who make unauthorized
disclosures of government information. In fact, the decision of the Second
Circuit in Girard, handed down in 1979, was the first circuit decision to face the
issue squarely and apply the statute to the theft of government information.
Earlier, without much discussion, the Ninth Circuit had permitted a defendant
to be convicted under 641 for disclosing grand jury information. United
States v. Friedman, 445 F.2d 1076 (9 Cir.), cert. denied, 404 U.S. 958, 92 S.Ct.
326, 30 L.Ed.2d 275 (1971). Because Congress was never consciously aware
that 641 would punish the unauthorized disclosure of government information
and because this use of 641 is a relatively recent innovation, courts must be
cautious in interpreting 641 so that it is applied in a manner consistent with
the congressional design, if any, expressly governing the disclosure of a
particular type of government information.
72
73
Congress has legislated frequently and with precision with regard to the
unauthorized disclosure of classified information, and it has chosen to punish
only certain categories of disclosures and defendants. National defense
information is protected from disclosure by the espionage statutes, particularly
793(a), (b), (c) and 794. But those statutes only penalize a defendant who
acts "with intent or reason to believe that (the information will be used) to the
injury of the United States or to the advantage of (a) foreign nation."18
Classified information is also guarded from unauthorized disclosure by 18
U.S.C. 798. Section 798 does not contain the strict intent requirement of the
espionage statutes; it punishes anyone who acts "knowingly and willfully". But,
798 makes criminal the disclosure of only one class of classified information,
classified information concerning cryptography and communications. By
contrast, 50 U.S.C. 783(b) makes it unlawful to disclose any classified
information. That statute, however, places this strict prohibition only upon
government employees,19 and subjects even government employees to criminal
penalties only when the information is communicated to an agent of a foreign
government or a member of a Communist organization.20
74
75
76
enact a statute which would make criminal the mere unauthorized disclosure of
classified information. The present espionage statutes were enacted largely in
their present form in 1917 at the request of President Wilson. Although
Congress agreed to statutes aimed at espionage, it specifically rejected the
request of the President that it enact a criminal statute to punish the publication
of defense information in violation of presidential regulations. Concern for
public debate of defense issues and distrust of a war-time president's powers
converged to defeat the proposal to criminalize the publication of classified
information. Edgar & Schmidt, supra, at 940-41. Similar attempts were
unsuccessful immediately after World War II, in the late 1950's, in the mid
1960's, and in the 1970's.23 See Subcomm. on Secrecy and Disclosure of the
Senate Select Comm. on Intelligence, 95th Cong., 2d. Sess., National Security
Secrets and the Administration of Justice 17-19, 22 (Comm. Print 1978). Thus,
in the area of national security information, Congress has consciously refrained
from making it a crime merely to disclose classified information without
authority.
77
VI.
78
the State Department, while it did not press its earlier request for recall, also did
not rescind it. Soon thereafter, the ambassador left the United States pursuant to
his government's instructions. The defendants claim that they were thus denied
compulsory process. See Washington v. Texas, 388 U.S. 14, 87 S.Ct. 1920, 18
L.Ed.2d 1019 (1967).
79
Some courts have dismissed indictments when the government has deported
illegal aliens who were potential witnesses in the prosecution of a defendant.
See, e. g., United States v. Calzada, 579 F.2d 1358 (7 Cir. 1978); United States
v. Mendez-Rodriguez, 450 F.2d 1 (9 Cir. 1971). Those courts have ruled that
the government violated the defendant's right to compulsory process by placing
potential witnesses beyond his reach and beyond the jurisdiction of the court.
But we do not think these authorities applicable.
80
There are two critical distinctions between the deportation cases and this
diplomatic recall case. First, in the case of a diplomatic recall, the State
Department's interest in holding foreign diplomats to acceptable standards of
conduct is much more compelling than the government's interest in deporting
illegal aliens. When a foreign diplomat becomes engaged in outrageous and
perhaps sinister conduct, such as participation in an illegal conspiracy, the
United States government cannot decline to act. Thus, while the government's
interest in deporting illegal aliens may be outweighed by the defendant's right
to compulsory process, the balance does not tip so clearly in the defendant's
favor when the national government requests the recall of an errant
representative of another nation.
81
Second, when a diplomat is the potential witness, he may well not testify even
if he remains in the United States. Because of diplomatic immunity, the witness
is not amenable to judicial process. The diplomat may testify only if his
government waives his immunity. Therefore, even if the United States
government forces a foreign representative to leave, the government may not
have prejudiced the defendant, because the foreign nation might have refused to
permit its representative to testify in a United States criminal prosecution if he
had stayed. As a consequence, the defendant's claim of a denial of compulsory
process is very attenuated when a foreign diplomat is the unavailable witness.
82
Because of the bar of diplomatic immunity and because of the national interest
in taking action against diplomats who misbehave, we conclude that, in order to
demonstrate a denial of compulsory process, the defendant must go further than
to point to a missing diplomat/witness and government involvement in the
diplomat's recall. Accord, United States v. Butenko, 384 F.2d 554, 567 (3 Cir.
1967) vacated and remanded on other grounds, 394 U.S. 165, 89 S.Ct. 961, 22
We therefore hold that in a case such as this one a defendant must show
prejudice by demonstrating that the foreign government would have waived the
diplomatic immunity of its representative.25 Without such a showing, there is no
reason to believe that the defendant was harmed by the potential witness'
absence and there is likewise no reason to penalize the United States
government for taking appropriate action against an errant diplomat. In this
case, the defendants have failed to supply the necessary proof, and therefore
there is no basis on which to conclude that the defendants were denied
compulsory process.26
VII.
84
85
Krall testified that in April she delivered a package from Truong to Dong,
president of the Vietnamese Association in Paris. Two persons arrived at
Dong's headquarters; Dong told Krall that they were Vietnamese officials. Krall
testified that the two unidentified officials told Dong, "I hope you get a package
from America," and after Dong handed them the package, "What a perfect time
for these government arrivals." The defendants object that these statements
were inadmissible hearsay.
86
These statements, however, were made by coconspirators and thus fall within
the coconspirator exception to the hearsay rule, Fed.R.Evid. 801(d)(2)(E). The
defendants rely on United States v. Stroupe, 538 F.2d 1063 (4 Cir. 1976), in
support of their claim that the evidence was inadmissible. But in Stroupe, the
out-of-court statement was ruled inadmissible because the only real evidence of
conspiracy was provided by the hearsay statement itself. Here, Krall's
testimony, not merely the statements of the out-of-court declarant, provided
evidence of the conspiracy. Therefore, under Fed.R.Evid. 801(d)(2)(E), the
statements were admissible. See United States v. Jones, 542 F.2d 186, 203 (4
Cir.), cert. denied, 426 U.S. 922, 96 S.Ct. 2629, 49 L.Ed.2d 375 (1976).
B. Admission of Truong's Library
87
trial. Truong had contended that his interest in the cables obtained from
Humphrey was a benign scholarly preoccupation with Vietnam and
Vietnamese-American relations. Found among Truong's books and papers were
a State Department Telecommunications Handbook which included
classification codes, parts of the State Department Biographical Register which
were annotated by hand to indicate which of the employees were "spooks,"
pictures of Truong in the company of the Vietnamese ambassador who was an
unindicted coconspirator, and handwritten notes on espionage and counterespionage. These materials were undoubtedly relevant to determining the nature
of Truong's interest in the materials Humphrey gave him, an issue put before
the court by Truong himself. The district judge decided that the probative value
of this evidence outweighed its possible prejudicial effect, Fed.R.Evid. 403, and
we find no error in his determination.27VIII.
88
89
AFFIRMED.
90
91
92
In the district court the defendants were convicted under the espionage counts
in the indictment and each received a sentence of fifteen years. They also were
convicted under three other counts, including the count under 641. They
received sentences of five years under each of these counts. All sentences were
to run concurrently. The opinion of Judge Winter sustains all these convictions
save that under 641. His opinion would reverse the conviction under this
count. It was, however, the position of the Government, as stated in its brief,
and reiterated in oral argument, that "if this Court affirms appellants'
convictions on any of those counts (that is, the counts other than that under
641), there is no occasion for it to consider appellants' contentions regarding
their Section 641 convictions." In short, it declares that under the concurrent
sentence rule, it is unnecessary in this case to review the conviction of the
defendants under 641. I agree.
93
94
case, in which there was, as here, a concurrent sentence under a 641 count
which the court declined to review for the same reasons assigned by me for
declining to review like convictions in these cases.
95
For eighty-five days, from June to September, 1977, the FBI also video-taped
Humphrey's activities in his office at the United States Information Agency
See note 4, infra, for a discussion of the Foreign Intelligence Surveillance Act
of 1978, which authorizes the Chief Justice to choose seven judges to pass on
similar issues. That statute, however, limits the authority of the judge over such
issues by prescribing a "clearly erroneous" standard of review. The statute will
encourage the development of foreign intelligence expertise among these seven
judges by empowering them to hear all foreign intelligence warrant requests
Since the surveillance was conducted in this case, Congress has enacted the
Foreign Intelligence Surveillance Act of 1978, 50 U.S.C. 1801 et seq. That
statute requires that executive officials seek prior judicial approval for some
foreign intelligence surveillance. The Act does not, however, transport the
traditional Fourth Amendment warrant requirement unaltered into the foreign
intelligence field. The statute does not contain a blanket warrant requirement;
rather, it exempts certain categories of foreign intelligence surveillance. 50
U.S.C. 1802. Nor does the statute require the executive to satisfy the usual
standards for the issuance of a warrant; the executive need demonstrate only
probable cause that the target is a foreign power or a foreign agent and, in the
case of United States citizens and resident aliens, that the government is not
clearly erroneous in believing that the information sought is the desired foreign
As Attorney General Bell testified at the hearing on the motion to suppress the
fruits of the surveillance: "Let me say that every one of these
counterintelligence investigations involved, nearly all of them that I have seen,
involves crime in an incidental way. You never know when you might turn up
with something you might want to prosecute."
The FBI surveillance continued for over 260 days. Because the district court
suppressed all evidence obtained from the surveillance after July 20, only the
seventy-day period preceding that date is relevant. The district court also ruled
that the blanket surveillance after July 20 was unreasonable, because the
government had succeeded in identifying Humphrey as the sole source of the
documents by that date
A letter and another package were searched without a warrant but with
executive authorization. Because both of those searches took place before July
20, in accordance with our resolution of the issue of a foreign intelligence
warrant exception, we conclude that neither of these warrantless searches
violated the Fourth Amendment
The defense raises another challenge to the espionage convictions based upon
the district court's instruction on classification of documents. An examination of
the instruction reveals, however, that it was entirely proper. First, the district
judge informed the jury that it might "consider the testimony that the
documents were classified." Certainly the classification of the documents was
relevant to the question of whether they related to the "national defense." See
United States v. Dedeyan, 584 F.2d 36, 40-41 (4 Cir.1978). Second, the district
judge correctly instructed the jury that the official nature of the documents
would be pertinent to whether their transmission would injure the United States
or aid a foreign nation. Finally, the jury was told that the defendants would not
be guilty of transmitting national defense information if the information were
available in the public domain. Thus, the district court did not place too great an
emphasis on the classification of the documents or their official nature and
specifically instructed the jury that transmission of publicly available
information did not fall within the statutory prohibitions
10
Section 793(e) contains another possible ambiguity. It punishes only those who
have "unauthorized possession" of national defense information. The trial judge
provided adequate content for this phrase by advising the jury that a person
would have authorized possession if he had an appropriate security clearance
and if he gained access to the document because it was necessary to the
performance of his official duties
11
12
The district court will, of course, be strict in its application of harmless error
We reject two other Jencks Act claims raised by the defendants. First, the
defendants contend that the district judge should have held a hearing under
Campbell v. United States, 365 U.S. 85, 81 S.Ct. 421, 5 L.Ed.2d 428 (1961)
(Campbell I ), to determine whether documents prepared by Hall contained
Jencks Act statements of Krall. Unlike the situation in Campbell I, in this case
there was no need for a hearing to gather extrinsic evidence in order to
determine whether Hall's reports contained "statements." Because Hall
sometimes used quotation marks in his reports, the defense suggested that Hall's
reports amounted to a "substantially verbatim recital" of Krall's comments to
him. 18 U.S.C. 3500(e)(2). By reading the reports and examining the context
in which the quotation marks were used, the district judge could determine on
his own whether the quotation marks enclosed Krall's exact words or whether
the quotation marks were used by Hall merely as literary devices. Here, then,
no hearing was necessary
Second, the defendants argue that the district judge withheld Jencks Act
material from them because it was classified. Although the district judge
commented that there was "a little more burden" in this case than the usual
Jencks Act case because the documents were classified, he did not employ a
standard that would deny the defendants information to which they were
entitled under the Jencks Act. Rather, he indicated by his comments only that
he applied the Jencks Act in this instance more strictly than he would in the
ordinary case. In fact, the district judge admitted that he had "turned over things
arguably useful though repetitious."
14
One case has limited 641 to tangibles. Chappell v. United States, 270 F.2d
274 (9 Cir. 1959). That case held that an Air Force officer did not violate 641
by appropriating the labor of an airman while on duty, because the airman's
labor was an intangible outside the scope of 641
15
therefore the Court would not infer that Congress had deleted criminal intent as
an element of the crimes. 342 U.S. at 263, 72 S.Ct. at 249. This holding that
Congress meant to include the critical element of criminal intent when it
codified these common law crimes does not undercut the Court's separate
holding that Congress intended to criminalize a broad range of wrongful
takings, beyond the confines of the common law, which were committed with
criminal intent.
16
See also United States v. Friedman, 445 F.2d 1076 (9 Cir.), cert. denied sub
nom. Jacobs v. United States, 404 U.S. 958, 92 S.Ct. 326, 30 L.Ed.2d 275
(1971). One district court has concluded that 641 does not include the
unauthorized copying of government documents. United States v. Hubbard, 474
F.Supp. 64, 79-80 (D.D.C.1979) (dicta)
Courts which have interpreted other criminal statutes containing phrases similar
to "thing of value" have decided that the statutory language included both
tangible and intangible property. See, e. g., United States v. Zouras, 497 F.2d
1115 (7 Cir. 1974); United States v. Bottone, 365 F.2d 389 (2 Cir.), cert.
denied, 385 U.S. 974, 87 S.Ct. 514, 17 L.Ed.2d 437 (1966).
17
18
Two of the espionage statutes appear to reach much further, and, on first
reading, seem to penalize the merely willful disclosure of most classified
information. 18 U.S.C. 793(d) and (e). It has been suggested that Congress
did not intend these statutes to have such a broad meaning. See Edgar &
Schmidt, The Espionage Statutes and Publication of Defense Information, 73
Colum.L.Rev. 929, 1031-57 (1973). I would not need to decide exactly how far
these statutes extend. I would need only to hold that, whatever the precise scope
of 793(d) and (e), the general terms of 641 should not be employed to serve
as a broad prohibition against the authorized disclosure of classified
information when Congress has chosen to enact a series of criminal statutes
directly aimed at classified information
19
20
See also 18 U.S.C. 793(f), which punishes anyone, "being entrusted with or
having lawful possession" of national defense documents, who (1) permits
them to be destroyed through gross negligence or (2) fails to report their illegal
When it enacted 798, Congress certainly did not conceive that 641 would
prevent the unauthorized disclosure of classified information. In fact, the House
Report assumed that, other than the predecessor of 798, the espionage statutes
were the only criminal statutes which protected classified information. The
House Report explained that the espionage statutes did not provide sufficient
protection for classified communications information because under the
espionage statutes, "unauthorized revelation of information of this kind can be
penalized only if it can be proved that the person making the revelation did so
with an intent to injure the United States." H.R.Rep.No.1895, 81st Cong., 2d
Sess. (1950), reprinted in (1950) U.S.Code Cong.Serv., pp. 2297, 2298. The
Report went on to note that former government employees would not be subject
to penalties for disclosing classified communications information:
During the recent war there were many persons who acquired some
information covered by this bill in the course of their duties. Most of these
individuals are no longer connected with the services and are not now
prohibited from making disclosures which can be most damaging to the
security of the United States. They are subject to the temptations of personal
gain and of publicity in making sensational disclosures of the personal
information within the purview of this act.
Id.
The Report described the congressional response to this security threat by
emphasizing the limited nature of the criminal prohibition embodied in 798:
This bill makes it a crime to reveal the methods, techniques, and material used
in the transmission by this Nation of enciphered or coded messages. It does not
control in any way the free dissemination of information which might be
transmitted by code or cipher.
Id.
Thus, in 1950 Congress felt that, after it enacted 798, the criminal code would
contain two prohibitions against the unauthorized disclosure of classified
information: the espionage statutes, which are constricted by their intent
requirement, and 798, which protected one narrow category of classified
information. It would greatly disrupt the network of carefully confined criminal
prohibitions Congress thought it had enacted in 1950, a network which has
remained largely unchanged until the present day, if the courts permitted 641
to serve as a criminal prohibition against the merely willful unauthorized
disclosure of any classified information.
22
I also note that currently Congress is debating an addition to the criminal code
which would make it unlawful for certain persons to disclose another category
of classified information, the names of covert agents serving the United States
intelligence agencies. See S. 2284, 96th Cong., 2d Sess. 701 (1980).
According to the sponsor of the Senate bill, this proposed statute would punish
only those who have had authorized access to the classified information. The
authors of the bill felt that they "should concentrate (their efforts) on those who
have abused their trust" because of "reasons relating to constitutional
considerations." 126 Cong.Rec. S. 1306 (daily ed. February 8, 1980) (remarks
of Sen. Huddleston). If 641 were applied to classified information, as the
government urges in this case, this congressional debate would be to a great
extent moot, because 641 would punish anyone who disclosed any classified
information, including the names of covert agents
23
24
The government urges that the conviction be upheld on the theory that the
defendants stole government property in the form of Humphrey's work time and
xeroxing facilities when Humphrey copied the documents during working
hours at the United States Information Agency. The Third Circuit in United
States v. DiGilio, 538 F.2d 972 (1976), cert. denied sub nom. Lupo v. United
States, 429 U.S. 1038, 97 S.Ct. 733, 50 L.Ed.2d 749 (1977), recently upheld a
conviction under 641 based on this theory. In this case, however, the
defendants were indicted based on the conversion of the information, not the
theft of government xeroxing resources, and the judge's jury instructions
likewise only dealt with conversion of information. Therefore, I think this
rationale is unavailable to affirm the convictions and pass no judgment upon
the validity of this method of proceeding under 641
25
Importantly, there is no evidence in this case that the government acted in bad
faith. While the State Department did not make every effort to prevent the
ambassador from leaving the United States, the government fully complied
with the limited terms of the court order issued by the district judge. As the
district court ruled, the order only instructed the government to refrain from
taking further affirmative action to expel the ambassador from the United
States. Thus, the order did not require the government to withdraw its recall
request, nor did it require the government to take other steps to convince the
ambassador to remain in the United States. By failing to rescind its recall
request, then, the State Department did not act in bad faith
Moreover, there is no proof that the State Department made the recall request
merely to deny the defense a favorable witness.
26
In addition, we note that the defendants have not argued that the government
failed to cooperate with them in any efforts to secure the presence of the
Vietnamese ambassador at trial. After the ambassador left the United States, the
district judge extracted a pledge from the government that it would aid the
defendants in an attempt to convince the Vietnamese government to allow the
ambassador to appear at trial. Neither party has informed the court of the result
of the defendants' entreaties to the Vietnamese government, if any were made,
and we infer from this silence that the government did not violate its pledge
27
this case.
During his rebuttal, the prosecutor argued that disclosures of secret information
could harm the national defense even if they "wouldn't put Russians on
Pennsylvania Avenue." Although the comment may have been overblown, it
was not so inflammatory as to require reversal, particularly in light of the
equally rhetorical argument of the defense and in light of the fact that the Soviet
Union did not play a role in this case. The prosecutor also made comments in
his rebuttal that might be interpreted as shifting the burden of proof in some
areas to the defense. The district judge interrupted the prosecutor's rebuttal and
corrected any misimpressions through corrective instructions, and, in addition,
the district judge's final instructions included the usual burden of proof
directives.
Finally, we reject the defendants' contentions that the indictment was
insufficient and that the voir dire was inadequate.
1
Barnes v. United States (1973) 412 U.S. 837, 848, n.16, 93 S.Ct. 2357, 2364
n.16, 37 L.Ed.2d 380; Lawn v. United States (1958) 355 U.S. 339, 359, 78
S.Ct. 311, 322, 2 L.Ed.2d 321; Roviaro v. United States (1957) 353 U.S. 53,
59, n.6, 77 S.Ct. 623, 627 n.6, 1 L.Ed.2d 639; Hirabayashi v. United States
(1943) 320 U.S. 81, 85, 63 S.Ct. 1375, 1378, 87 L.Ed. 1774
United States v. Powell (4th Cir. 1969) 407 F.2d 582, 585, cert. denied, 395
U.S. 966, 89 S.Ct. 2113, 23 L.Ed.2d 753; United States v. Wechsler (4th Cir.
1968) 392 F.2d 344, 348, cert. denied, 392 U.S. 932, 88 S.Ct. 2283, 20 L.Ed.2d
1389; United States v. Jacobs (4th Cir. 1967) 386 F.2d 170, 172