Clift v. United States

808 F. Supp. 101, 1991 U.S. Dist. LEXIS 20852, 1991 WL 438452
CourtDistrict Court, D. Connecticut
DecidedDecember 30, 1991
DocketCiv. N-76-37 (EBB)
StatusPublished
Cited by2 cases

This text of 808 F. Supp. 101 (Clift v. United States) is published on Counsel Stack Legal Research, covering District Court, D. Connecticut primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Clift v. United States, 808 F. Supp. 101, 1991 U.S. Dist. LEXIS 20852, 1991 WL 438452 (D. Conn. 1991).

Opinion

RULING ON DEFENDANT’S MOTION TO DISMISS

ELLEN B. BURNS, Chief Judge.

On January 23, 1976, the Plaintiff, Eugene Emerson Clift, brought this action under the Invention Secrecy Act, 35 U.S.C. § 183, alleging that the Government has used, in exact or similar form, a cryptographic encoding device that the Plaintiff has patented under U.S. Patent No. 3,495,-038, entitled “Cryptographic System.”

The facts of this case are set forth in Clift v. United States, 597 F.2d 826 (2d Cir.1979), and are repeated here in part. The Plaintiff filed a patent application for a cryptographic device in March 1968. On November 6, 1968, the Commissioner of Patents issued a secrecy order on the application under 35 U.S.C. § 181. 1 In February 1969 Clift filed an administrative claim for compensation under 35 U.S.C. § 183 2 *103 for damages caused by the imposition of the secrecy order and for the Government’s use of the invention. The Government rescinded the secrecy order on June 12, 1969, and letters patent were issued in February 1970. On January 23, 1970, the Government denied the Plaintiff’s administrative claim on the grounds that (i) the Government never used the invention and (ii) the Plaintiff had not submitted any evidence of damages resulting from the secrecy order.

In January 1976 the Plaintiff sued the United States under 35 U.S.C. § 183 for damages resulting from the imposition of the secrecy order and from the Government’s appropriation of the invention. 3 The Government has steadfastly denied any use of Clift’s invention.

In November 1977 the Plaintiff filed a request for production of documents under Fed.R.Civ.P. 34. The information requested concerned the origins and design of several types of cryptographic devices used by national security and military agencies of the Government. 4 Plaintiff contended that since these devices incorporated, in exact or similar form, his patented cryptographic system, he would need this information to prove his claim. Following the Defendant’s refusal to produce the requested documents, the Plaintiff filed a motion to compel discovery under Fed.R.Civ.P. 37. In response, the Defendant, after pointing to the sensitive nature of the information, claimed that the information requested was both privileged on the basis of national security and prohibited from disclosure by statute. See 18 U.S.C. § 798. 5 In support of its claims, the Government submitted an affidavit from Vice Admiral Inman, the then Director of the National Security Agency, which averred that the disclosure of any information about the manufacture or design of its cryptographic devices would endanger the national security of the United States.

On September 15,1977, this Court denied Plaintiff’s motion to compel discovery based upon the Government’s assertion of jeopardy to the national security, which was not outweighed by the Plaintiff’s showing of need. See Clift v. United States, No. N-76-37 (EBB) (D.Conn. Sept. 15, 1978) (Mem.Decision Mot.Compel Disc, at 6-7). This Court also dismissed the action because of the Plaintiff’s inability to maintain his case without access to the requested documents. Id. at 9-10.

The Second Circuit Court of Appeals affirmed the order denying the motion to compel discovery without prejudice and vacated the order dismissing the complaint. Clift v. United States, 597 F.2d 826, 830 (2d Cir.1979). In vacating the order of dismissal, the Second Circuit stated that Clift could perhaps proceed with his case without the requested documents or that, at some unforeseen point in time, the disclosure of the requested documents would no longer imperil the national security. Id. Moreover, the circuit court encouraged the Government to “be as forthcoming as it can be without risk to the national interest.” Id.

On December 20, 1979, this Court made certain findings for the record and stayed discovery “until the earliest time at which the [Government is able, consistent with 18 U.S.C. § 798, to furnish documents properly requested in this case.” Clift v. United States, No. N-76-37 (D.Conn. Dec. 20, 1979) (Finding & Order at 2).

Since that time, over eleven years ago, this Court has waited for a deus ex machina to resolve the conflicting objectives of the Invention Secrecy Act and the state secrets privilege, which are “on the one *104 hand, to preserve secrecy and, on the other, ‘a strong concern that inventors be encouraged to discover inventions having military value and to submit them to the United States.’ ” Clift v. United States, 597 F.2d 826, 829 (2d Cir.1979) (quoting Halpern v. United States, 258 F.2d 36, 39 (2d Cir.1958)). However, the issues at stake in this case, namely the Defendant's invocation of the state secrets privilege and the Plaintiff’s inability to marshal additional nonprivileged evidence of infringement, remain essentially unchanged. The Government has, however, filed a motion to dismiss along with two supporting declarations.

On August 13, 1990, the Defendant filed the unclassified declaration of Secretary of Defense Richard B. Cheney, which, unlike the previous affidavit of Vice Admiral In-man, formally invoked the state secrets privilege. (Cheney Deck ¶ 7). In his declaration, the Secretary averred that “information disclosing the technical characteristics of the manufactured or researched cryptographic systems constitutes military and state secrets[,] the disclosure of which could reasonably be expected to cause serious damage, potentially exceptionally grave damage, to the national security and foreign relations of the United States.” (Cheney Deck ¶ 3); see also id. at II4 (“The unauthorized disclosure of this U.S. cryptographic logic would seriously impair the communications security of the United States.”); id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Hepting v. AT & T Corp.
439 F. Supp. 2d 974 (N.D. California, 2006)
Pack v. Beyer
157 F.R.D. 219 (D. New Jersey, 1993)

Cite This Page — Counsel Stack

Bluebook (online)
808 F. Supp. 101, 1991 U.S. Dist. LEXIS 20852, 1991 WL 438452, Counsel Stack Legal Research, https://law.counselstack.com/opinion/clift-v-united-states-ctd-1991.