Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

The Real Rules of 'Search' Interpretations

The William and Mary Bill of Rights Journal, 2012
...Read more
William & Mary Bill of Rights Journal William & Mary Bill of Rights Journal Volume 21 (2012-2013) Issue 1 Article 2 October 2012 The Real Rules of "Search" Interpretations The Real Rules of "Search" Interpretations Luke M. Milligan Follow this and additional works at: https://scholarship.law.wm.edu/wmborj Part of the Fourth Amendment Commons Repository Citation Repository Citation Luke M. Milligan, The Real Rules of "Search" Interpretations, 21 Wm. & Mary Bill Rts. J. 1 (2012), https://scholarship.law.wm.edu/wmborj/vol21/iss1/2 Copyright c 2012 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmborj
THE REAL RULES OF “SEARCH” INTERPRETATIONS Luke M. Milligan * ABSTRACT The Supreme Court tells us that a Fourth Amendment “search” is a matter of “reasonable expectations of privacy.” Scholars meanwhile debate “search” on the axes of value, doctrine, institutionalism, interpretation, and judicial politics. Yet neither prevailing judicial doctrine nor normative academic discourse has had much impact on the Court’s actual “search” interpretations. This article suggests that this static between “paper” rules and “real” rules (and, more generally, normative prescriptions and judicial decisionmaking) is a function of a deep constraint on the judiciary’s capacity to form “search” doctrine in free accordance with evolving juridical and policy norms. This constraint is one that I call the “atomic code.” The atomic code has three properties. First, justices evaluate each “search” issue without regard for coherence across the spectrum of “search” issues. In effect, the “search doctrine” is simply an “aggregation of search ‘atoms.’” A second property of the atomic code is that justices attribute content to new search atoms through analogies to old search atoms. While initially every search atom is dormant, over time a justice, either informally or through adjudication, will gradually attribute content—“search” or “non-search”—to her atoms by drawing from the content of analogous search atoms. By this account, the holding in Olmstead v. United States reflects nothing grander than the endorsement by five justices of an analogy between wiretapping and visual sur- veillance from a public vantage point. The third property of the atomic code is that a justice will not reassess an atom’s content once she has made her initial attribution. One might think of this as stare decisis writ small: a justice (but not necessarily the Court) will decide like cases alike. And so the overturning of “search” precedent is not the result of a majority’s new attribution of content to their search atoms, but, more accurately, a new majority of initial attributions. I should emphasize at the outset that the atomic code is not simply the result of a vague doctrinal test, suboptimal or inaccessible empirical data on “privacy expecta- tions,” or judicial politics. Rather, the code’s roots run deeper. It is in large part attributable to two factors. One is the concreteness of the term “search.” The other is the justices’ preference for a calibrated retroactivity of criminal procedure rules. These two factors, more than any others, have caused justices to treat the “search” doctrine as atomistic, to attribute content through analogical reasoning, and to fix content upon attribution. * Associate Professor, University of Louisville School of Law. The author wishes to thank Jim Chen, John Cross, Jancy Hoeffel, Ariana Levinson, Sam Marcosson, Ellen Podgor, Stephen Singer, Sandra Thompson, and Russ Weaver for their comments. 1
William & Mary Bill of Rights Journal Volume 21 (2012-2013) Issue 1 Article 2 October 2012 The Real Rules of "Search" Interpretations Luke M. Milligan Follow this and additional works at: https://scholarship.law.wm.edu/wmborj Part of the Fourth Amendment Commons Repository Citation Luke M. Milligan, The Real Rules of "Search" Interpretations, 21 Wm. & Mary Bill Rts. J. 1 (2012), https://scholarship.law.wm.edu/wmborj/vol21/iss1/2 Copyright c 2012 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmborj THE REAL RULES OF “SEARCH” INTERPRETATIONS Luke M. Milligan* ABSTRACT The Supreme Court tells us that a Fourth Amendment “search” is a matter of “reasonable expectations of privacy.” Scholars meanwhile debate “search” on the axes of value, doctrine, institutionalism, interpretation, and judicial politics. Yet neither prevailing judicial doctrine nor normative academic discourse has had much impact on the Court’s actual “search” interpretations. This article suggests that this static between “paper” rules and “real” rules (and, more generally, normative prescriptions and judicial decisionmaking) is a function of a deep constraint on the judiciary’s capacity to form “search” doctrine in free accordance with evolving juridical and policy norms. This constraint is one that I call the “atomic code.” The atomic code has three properties. First, justices evaluate each “search” issue without regard for coherence across the spectrum of “search” issues. In effect, the “search doctrine” is simply an “aggregation of search ‘atoms.’” A second property of the atomic code is that justices attribute content to new search atoms through analogies to old search atoms. While initially every search atom is dormant, over time a justice, either informally or through adjudication, will gradually attribute content—“search” or “non-search”—to her atoms by drawing from the content of analogous search atoms. By this account, the holding in Olmstead v. United States reflects nothing grander than the endorsement by five justices of an analogy between wiretapping and visual surveillance from a public vantage point. The third property of the atomic code is that a justice will not reassess an atom’s content once she has made her initial attribution. One might think of this as stare decisis writ small: a justice (but not necessarily the Court) will decide like cases alike. And so the overturning of “search” precedent is not the result of a majority’s new attribution of content to their search atoms, but, more accurately, a new majority of initial attributions. I should emphasize at the outset that the atomic code is not simply the result of a vague doctrinal test, suboptimal or inaccessible empirical data on “privacy expectations,” or judicial politics. Rather, the code’s roots run deeper. It is in large part attributable to two factors. One is the concreteness of the term “search.” The other is the justices’ preference for a calibrated retroactivity of criminal procedure rules. These two factors, more than any others, have caused justices to treat the “search” doctrine as atomistic, to attribute content through analogical reasoning, and to fix content upon attribution. * Associate Professor, University of Louisville School of Law. The author wishes to thank Jim Chen, John Cross, Jancy Hoeffel, Ariana Levinson, Sam Marcosson, Ellen Podgor, Stephen Singer, Sandra Thompson, and Russ Weaver for their comments. 1 2 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 I. FOURTH AMENDMENT “SEARCH” PHENOMENA . . . . . . . . . . . . . . . . . . . . . . . 6 A. Arc of Olmstead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1. The Olmstead Decision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2. The Olmstead Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3. Prevailing Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 B. Failure of Katz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1. The Katz Decision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2. Katz’s Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3. Prevailing Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 II. THE ATOMIC CODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 A. Contours of a New Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 1. The Quon Decision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2. Understanding Quon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 a. Atoms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 b. Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 B. Sources of the Atomic Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 1. Concreteness of “Search” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 2. Calibrated Retroactivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3. Calibrating Rules of Retroactivity . . . . . . . . . . . . . . . . . . . . . . . . . 43 III. THE ATOMIC CODE AND “SEARCH” PHENOMENA . . . . . . . . . . . . . . . . . . . . 46 A. Describing Fourth Amendment Phenomena . . . . . . . . . . . . . . . . . . . . . 47 1. Describing the Arc of Olmstead . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 2. Describing the Failure of Katz . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 a. Informants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 b. Dog Sniffs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 c. Aerial Surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 B. Contending Descriptive Claims . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 C. Code Dynamics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 INTRODUCTION What is a Fourth Amendment “search”?1 The Supreme Court still tells us that “search” is a matter of “reasonable expectations of privacy.”2 Scholars meanwhile 1 The Fourth Amendment, in pertinent part, provides that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated . . . .” U.S. CONST. amend. IV. 2 See, e.g., City of Ontario v. Quon, 130 S. Ct. 2619 (2010); Kyllo v. United States, 533 U.S. 27 (2001); Smith v. Maryland, 442 U.S. 735 (1979). But see United States v. Jones, 132 S. Ct. 945 (2012) (supplementing the Katz test with a “physical trespass while trying to gain information” standard). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 3 debate “search” on the axes of value,3 doctrine,4 institutionalism,5 interpretation,6 and judicial politics.7 Yet neither prevailing judicial doctrine nor normative academic discourse has had much impact on the Court’s actual “search” interpretations.8 This article suggests that this static between “paper” rules and “real” rules (and, more generally, normative prescriptions and judicial decisionmaking) is a function of a deep constraint on the judiciary’s capacity to form “search” doctrine in free 3 See, e.g., Akhil Reed Amar, Fourth Amendment First Principles, 107 HARV. L. REV. 757, 759–60 (1994) (truth); Thomas K. Clancy, What Does the Fourth Amendment Protect: Property, Privacy, or Security?, 33 WAKE FOREST L. REV. 307, 308–09 (1998) (security); Morgan Cloud, The Fourth Amendment During the Lochner Era: Privacy, Property, and Liberty in Constitutional Theory, 48 STAN. L. REV. 555, 616–17 (1996) (property); Raymond Shih Ray Ku, The Founders’ Privacy: The Fourth Amendment and the Power of Technological Surveillance, 86 MINN. L. REV. 1325, 1326–27, 1331 (2002) (excessive government power); Jed Rubenfeld, The End of Privacy, 61 STAN. L. REV. 101, 104–05 (2008) (security); William J. Stuntz, The Substantive Origins of Criminal Procedure, 105 YALE L.J. 393, 447 (1995) (due process). 4 See Sherry F. Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 STAN. L. REV. 119, 122–23 (2002) (criticizing the “knowing exposure” doctrine); Christopher Slobogin, The World Without a Fourth Amendment, 39 UCLA L. REV. 1, 4–5 (1991) (advocating a sliding scale requiring proportionality between likelihood of success and intrusiveness); Daniel J. Solove, Fourth Amendment Pragmatism, 51 B.C. L. REV. 1511, 1515 (2010) (calling for a shift in emphasis from “Coverage” to “Procedural”). See generally Craig M. Bradley, Two Models of the Fourth Amendment, 83 MICH. L. REV. 1468, 1470 (1985) (describing critics who “all play the Court on its own field” and “argu[e] as tenth Justices that the doctrines should be tinkered with in different ways than the Court has done”). 5 Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 MICH. L. REV. 801, 806 (2004) (advocating for deference to legislatures); Daniel J. Solove, Fourth Amendment Codification and Professor Kerr’s Misguided Call for Judicial Deference, 74 FORDHAM L. REV. 747, 747–48 (2005) (challenging Professor Kerr’s argument). 6 Clark D. Cunningham, A Linguistic Analysis of the Meanings of “Search” in the Fourth Amendment: A Search for Common Sense, 73 IOWA L. REV. 541, 542 (1988) (advocating for a “common sense” semantics analysis); Thomas Y. Davies, Recovering the Original Fourth Amendment, 98 MICH. L. REV. 547, 552–53 (1999) (detailing an originalist interpretation). 7 Orin S. Kerr, An Equilibrium-Adjustment Theory of the Fourth Amendment, 125 HARV. L. REV. 476 (2011) (describing the justices’ policy interest in maintaining law enforcement status quo); David Sklansky, Back to the Future: Katz, Kyllo, and Common Law, 72 MISS. L.J. 143, 161 (2002) (stating that some of the justices push “an alternative vision of search . . . jurisprudence, anchored securely in eighteenth-century common law”); William Stuntz, Warrants and Fourth Amendment Remedies, 77 VA. L. REV. 881, 912–13 (1991) (explaining that courts are willing to manipulate doctrine to avoid the application of the exclusionary rule). 8 There are of course exceptions. Compare City of Ontario v. Quon, 130 S. Ct. 2619, 2629 (2010) (stating that “prudence counsels caution” before “elaborating too fully on the Fourth Amendment implications of emerging technology”) with Kerr, supra note 5 (making “the case for caution” when the Court is applying the Fourth Amendment to new technologies). 4 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 accordance with evolving juridical and policy norms.9 This constraint is one that I call the “atomic code.” The atomic code has three properties. First, justices evaluate each “search” issue without regard for coherence across the spectrum of “search” issues.10 In effect, the “search doctrine” is simply an “aggregation of search ‘atoms.’” A second property of the atomic code is that justices attribute content to new search atoms through analogies to old search atoms.11 While initially every search atom is dormant, over time a justice, either informally or through adjudication, will gradually attribute content— “search” or “non-search”—to her atoms by drawing from the content of analogous search atoms.12 By this account, the holding in Olmstead v. United States13 reflects nothing grander than the endorsement by five justices of an analogy between wiretapping and visual surveillance from a public vantage point.14 The third property of the atomic code is that a justice will not reassess an atom’s content once she has made her initial attribution.15 One might think of this as stare decisis writ small: a justice (but not necessarily the Court) will decide like cases alike. And so the overturning of “search” precedent is not the result of a majority’s new attribution of content to their search atoms, but, more accurately, a new majority of initial attributions.16 I should emphasize at the outset that the atomic code is not simply the result of a vague doctrinal test, suboptimal or inaccessible empirical data on “privacy expectations,” or judicial politics.17 Rather, the code’s roots run deeper. It is in large part 9 See Lochner v. New York, 198 U.S. 45, 76 (1905) (Holmes, J., dissenting) (“General propositions do not decide concrete cases.”); KARL LLEWELLYN, JURISPRUDENCE: REALISM IN THEORY AND PRACTICE 21–22 (1930) (distinguishing “paper rules” from “real rules”). 10 See infra Part II.A.2.a. 11 See infra Part II.A.2.b. 12 Analogical attributions will inevitably bring some degree of coherence to “search” case law. This does not, however, undermine the claim that “search” decisionmaking is atomistic. First, only a small subset of cases will be resolved through analogical reasoning. See infra Part III.C (discussing justices’ practice of reasserting previous commitments). Second, even when the justices turn to analogical reasoning, the objective of such reasoning (and thus their results) is rarely to facilitate coherence. See infra Part III.A (discussing the ways in which justices choose from a menu of analogies). As a result, any coherence in a justice’s “search” decisionmaking will be by happenstance and almost certainly confined to narrow bands of “search” case law. 13 277 U.S. 438, 469 (1928). 14 Id. See infra Part III.A.1. 15 See infra Part II.A.2.b. 16 There are two notable exceptions on this point. The first was Justice Douglas’s position regarding wiretaps between Goldman v. United States, 316 U.S. 129 (1942) and On Lee v. United States, 343 U.S. 747, 762 (1952) (Douglas, J., dissenting). The other was Justice Harlan’s position on informants between Lopez v. United States, 373 U.S. 427 (1963) and United States v. White, 401 U.S. 745, 768–77 (1971) (Harlan, J., dissenting). For further discussion see infra Part III.B. 17 For a discussion of these prevailing descriptions for “search” dysfunction, see infra Part I.B.3. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 5 attributable to two factors. One is the concreteness of the term “search.”18 The other is the justices’ preference for a calibrated retroactivity of criminal procedure rules.19 These two factors, more than any others, have caused justices to treat the “search” doctrine as atomistic, to attribute content through analogical reasoning, and to fix content upon attribution. One might infer that justices, bound by the atomic code, are never able to incorporate their juridical and policy preferences (which include, for some, “reasonable expectations of privacy”) into their “search” analyses. But this would be an overstatement. Justices, after all, regularly hold differing views about: (1) the scope of certain atoms;20 (2) the priority of atoms in a given case;21 and (3) the best analogy with which to assign content to dormant atoms.22 Through the disposition of these three issues, the justices’ juridical and policy preferences (regarding structure, doctrine, interpretation, etc.) will impact their interpretation of “search.” For instance, a justice can often prioritize a particular old atom (with favorable content) over another old atom (with unfavorable content).23 Or she might artificially cabin the scope of an old atom with unfavorable content in order to claim a new atom whose content will, with the right analogy, be more favorable.24 Despite this discretion, there remain firm limits on a justice’s ability to manipulate the atomic code. First, there will be times when a justice feels uncomfortable dissecting the “search” atoms to the degree necessary to reach a preferred outcome.25 Second, the justice’s juridical and policy preferences will not always call for the same outcome.26 And when faced with such “hard” cases a justice will often defer to a sincere analysis of the scope, priority, and analogical issues concomitant to the atomic code. Third, the constraints of the atomic code strengthen with time: the longer the justice serves, the more attributions the justice makes, and the more difficult it becomes for the justice to manipulate the atomic code to reach preferred outcomes.27 To demonstrate the role of the atomic code this article draws primarily from Supreme Court opinions. Unfortunately, any positive account of a discrete area of Supreme Court decisionmaking will be vulnerable to methodological criticisms.28 18 See infra Part II.B.1. See infra Part II.B.2. 20 See infra note 445 and accompanying text. 21 See infra note 446 and accompanying text. 22 See infra note 447 and accompanying text. 23 See infra note 448 and accompanying text. 24 See infra note 449 and accompanying text. 25 See infra notes 450–51 and accompanying text. 26 See infra notes 182–89 and accompanying text. 27 See infra note 453 and accompanying text. 28 See, e.g., Theodore W. Ruger, Pauline T. Kim, Andrew D. Martin & Kevin M. Quinn, The Supreme Court Forecasting Project: Legal and Political Science Approaches to Predicting Supreme Court Decisionmaking, 104 COLUM. L. REV. 1150, 1150 (2004) (comparing prediction rates of legal experts (59.1%) and a statistical model (75%)). See generally WALTER F. 19 6 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 Its author will be unable to produce and analyze large data sets (there are not enough cases). Nor can he, for obvious reasons, draw from surveys regarding justices’ “real” motives.29 With that said, the alternatives seem inadequate. For to simply forego positive accounts of discrete areas of Supreme Court decisionmaking, or to artificially bundle areas of decisionmaking (across doctrines or jurisdictions) in order to generate a statistically significant sample size, would hold little appeal. While this qualitative methodology will surely leave some unsatisfied, it is, under present circumstances, as good as it gets. The article proceeds in three parts. Part I introduces the two dominant historical phenomena of “search” interpretation: the arc of Olmstead 30 and the failure of Katz.31 Part II unveils a new positive account for these phenomena. Intimated in Justice Kennedy’s recent majority opinion in City of Ontario v. Quon,32 the atomic code holds that each justice treats the “search” doctrine as a collection of search “atoms,” assigns content to her atoms through analogical reasoning, and does not reassess the content of old atoms once there has been an initial attribution. Part III then demonstrates the descriptive force of the atomic code in both the pre- and postKatz eras. This part highlights how the code’s interpretive guidelines inhibit not only the justices’ application of “paper” rules (such as Katz’s objective and evolving privacy standard) but, more generally, the justices’ incorporation of contending normative theories into “search” decisionmaking.33 I. FOURTH AMENDMENT “SEARCH” PHENOMENA Fourth Amendment “search” commentary has largely centered on two interpretive phenomena. The first is the so-called “Olmstead era.”34 The second is the failure of the Katz decision to fulfill its promise to impose an evolving and objective standard of privacy.35 Any universal explanation of the Court’s “search” interpretations must, at the very least, account for these two phenomena. This part briefly tracks the arc of Olmstead and the failure of Katz. MURPHY & JOSEPH TANENHAUS, THE STUDY OF PUBLIC LAW 19 (1972) (stating that the “mood of behavioralism,” with its strong emphasis on “quantification” and “empirical theory,” has “ebbed and flowed through much of the history of American political science”). 29 See, e.g., WALTER F. MURPHY, CONGRESS AND THE COURTS 153 (1962) (discerning judicial motives through opinions and private papers). 30 Olmstead v. United States, 277 U.S. 438 (1928). 31 Katz v. United States, 389 U.S. 347 (1967). See infra Part I. 32 130 S. Ct. 2619 (2010). The atomic code was reaffirmed, to varying degrees, by the Court’s decisions in Davis v. United States, 131 S. Ct. 2419 (2011), and United States v. Jones, 132 S. Ct. 945 (2012). See infra Part II.A. 33 See infra Part III. 34 See generally United States v. White, 401 U.S. 745, 774 (Harlan, J., dissenting) (referring to the Olmstead period as an “era of Fourth Amendment jurisprudence”). 35 See infra Part I.B.2. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 7 A. Arc of Olmstead The Olmstead era spanned those years (1928–1967) when the Court held that electronic eavesdropping without a physical intrusion into a protected area was not a Fourth Amendment “search.”36 This period was further marked by judicial intimations (though not explicit holdings) that a “conversation” cannot be the subject of a constitutional “search.”37 1. The Olmstead Decision In the age of Prohibition, Roy Olmstead conspired to import, possess, and sell intoxicating liquors.38 Evidence against him included incriminating telephone conversations intercepted by wiretaps.39 The Supreme Court described the surveillance as follows: Small wires were inserted along the ordinary telephone wires from the residences of four of the petitioners and those leading from the chief office. The insertions were made without trespass upon any property of the defendants. They were made in the basement of the large office building. The taps from house lines were made in the streets near the houses.40 Upon indictment for various crimes relating to the National Prohibition Act,41 Olmstead moved to suppress the intercepted conversations as the fruits of an unconstitutional search.42 His motion was denied, he was convicted, and the Supreme Court granted certiorari on the issue of whether the warrantless use of wiretaps violated the Fourth Amendment.43 Chief Justice Taft, writing for a one-justice majority, began with a discussion of the Court’s recent expansions of the Fourth and Fifth Amendments.44 He emphasized the broadening definition of “seizure,” the “mere evidence” rule, and the exclusionary rule.45 The heart of Taft’s opinion, however, was his distinction between the government action at issue in Olmstead and that at issue in an earlier case, 36 See Lopez v. United States, 373 U.S. 427 (1963); On Lee v. United States, 343 U.S. 747 (1952); Goldman v. United States, 316 U.S. 129 (1942); Olmstead v. United States, 277 U.S. 438 (1928). 37 For a discussion of the debate over the scope of Olmstead, see infra Part I.A.2. 38 Olmstead, 277 U.S. at 455. 39 Id. at 439. 40 Id. at 456–57. 41 Id. at 455. 42 Id. at 439–40. 43 Id. at 455. 44 Id. at 458–65. 45 Id. at 455–68 (citing Gouled v. United States, 255 U.S. 298 (1921); Silverthorne Lumber Co. v. United States, 251 U.S. 385 (1920); Boyd v. United States, 116 U.S. 616 (1886)). 8 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 Gouled v. United States.46 In Gouled, a “search” occurred where “[t]here was actual entrance into the private quarters of defendant and the taking away of something tangible.”47 “Here,” wrote Taft, “we have testimony only of voluntary conversations secretly overheard.”48 The cautious reader finds that Taft distinguished Gouled on two planes.49 The first concerned the immateriality of Olmstead’s conversations.50 “The Amendment itself,” wrote Taft, “shows that the search is to be of material things—the person, the house, his papers, or his effects.”51 And “[t]he interest of liberty,” he concluded, “can not justify enlargement of the language employed . . . to apply the words search and seizure as to forbid hearing or sight.”52 The second plane of Taft’s distinction is the absence of a physical intrusion into an area protected by the Constitution.53 Relying again on the text of the Fourth Amendment, Taft wrote: The language of the Amendment can not be extended and expanded to include telephone wires reaching to the whole world from the defendant’s house or office. The intervening wires are not part of his house or office any more than are the highways along which they are stretched.54 “Neither the cases we have cited,” wrote Taft, “nor any of the many federal decisions brought to our attention hold the Fourth Amendment to have been violated as against a defendant, unless there has been . . . an actual physical invasion of his house ‘or curtilage’ for the purpose of making a seizure.”55 He then concluded that “one who installs in his house a telephone instrument with connecting wires intends to project his voice to those quite outside, and that the wires beyond his house and messages while passing over them are not within the protection of the Fourth Amendment.”56 Taft’s separation of Gouled and Olmstead—on the dual plane of immateriality and physical intrusion into a constitutionally protected area—reflected the majority’s 46 255 U.S. 298 (1921). Olmstead, 277 U.S. at 464. 48 Id. 49 See Anthony G. Amsterdam, Perspectives on the Fourth Amendment, 58 MINN. L. REV. 349, 381–82 (1974) (noting the dual reasoning of Chief Justice Taft’s majority opinion). 50 Id. at 382 (explaining that the Olmstead majority’s first line of reasoning was that “the ear cannot commit a search or seizure”). 51 Olmstead, 277 U.S. at 464. 52 Id. at 465. 53 Amsterdam, supra note 49, at 382 (stating that the Olmstead majority’s second line of reasoning was that “the tap of the telephone wire was not an intrusion into any area protected by the Constitution”). 54 Olmstead, 277 U.S. at 465. 55 Id. at 466. 56 Id. Justices Holmes, Brandeis, Stone, and Butler each wrote separate dissents. For a discussion of these dissents, see infra Part III.A.1. 47 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 9 choice between contending analogies. The Government pressed the Court to analogize the wiretapping of Olmstead to traditional visual surveillance from a lawful vantage point.57 Olmstead, for his part, analogized the government’s action to the opening of postal mail.58 A majority of justices, in the end, endorsed the government’s analogy. The majority explained that the wiretapping of Olmstead’s conversations, like visual surveillance from a lawful vantage point, (1) did not involve a physical invasion of a house, office, or curtilage; and (2) did not capture material items.59 Based on this analogical reasoning the majority concluded that Olmstead had not been “searched” pursuant to the Fourth Amendment.60 2. The Olmstead Era To discuss the Olmstead “era” one must be careful to clarify what is meant by “Olmstead.” Because the Olmstead majority distinguished Gouled on two planes,61 it was left for future courts to hash out which of Taft’s distinctions were sufficient conditions for a “non-search” in the context of electronic eavesdropping.62 Future justices uniformly read Olmstead to hold that the lack of a physical intrusion into a constitutionally protected area was a sufficient condition to render electronic eavesdropping a “non-search.”63 The real disagreement among the justices centered on the 57 Olmstead, 277 U.S. at 447–52 (citing Hester v. United States, 265 U.S. 57 (1924)) (holding that visual surveillance from open fields does not violate the Fourth Amendment). 58 Id. at 464 (“It is urged that the language of Mr. Justice Field in Ex Parte Jackson . . . offers an analogy.”); see Ex Parte Jackson, 96 U.S. 727 (1878) (holding that the Fourth Amendment is applicable to sealed letters). 59 Olmstead, 277 U.S. at 466. 60 Id. Although Olmstead held that conversations were not “persons, houses, papers, or effects,” the “basis” of the opinion was that wiretapping without a physical trespass is not a “search.” Id. Chief Justice Taft’s opinion states plainly that, in Olmstead’s case “[t]here was no searching.” Id. at 464. Moreover, there would have been no other reason for the majority to emphasize the absence of a trespass. Such emphasis would have been unnecessary, and only barely relevant, to establish the simple claim that “conversations” are not encompassed within “persons, houses, papers, or effects.” See Berger v. New York, 388 U.S. 41, 51 (1967) (distinguishing “[t]he basis of the [Olmstead] decision” from mere “[s]tatements in the opinion that a conversation passing over a telephone wire cannot be said to come within the Fourth Amendment’s enumeration of ‘persons, houses, papers, and effects’”); Lopez v. United States, 373 U.S. 427, 458 (1963) (Brennan, J., dissenting) (“[The Olmstead holding] rested on the propositions that there had been no search because no trespass had been committed against the petitioners . . . .”). 61 See supra Part I.A.1. 62 See, e.g., On Lee v. United States, 343 U.S. 747, 753 (1952) (stating that there is a “non-search” when the government uses “mechanical or electronic devices designed to overhear or intercept conversation, at least where access to the listening post was not obtained by illegal methods” (emphasis added)). Debate on this point manifested in the opinions in Berger v. New York, 388 U.S. 41 (1967). Compare id. at 64–86 (Douglas, J., concurring) with id. at 70–89 (Black, J., dissenting). 63 See Silverman v. United States, 365 U.S. 505, 510 (1961) (“The absence of a physical invasion of the petitioner’s premises was also a vital factor in the Court’s decision in Olmstead 10 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 relevance of Taft’s emphasis on “immateriality.”64 For some, “immateriality” went to the core of Olmstead.65 These justices and commentators read Olmstead as “holding” that electronic eavesdropping (even when accompanied by a physical trespass) was always a “non-search.” This interpretation is to be contrasted with the more common reading that the “immateriality” discussion was not a “holding” but simply a “statement.”66 The latter reading is the better one. Taft’s introductory sentence is instructive: “[T]he hearing should be confined to the single question of whether the use of evidence of private telephone conversations between the defendants and others, intercepted by means of wire tapping, amounted to a violation of the Fourth and Fifth Amendments.”67 Had Taft meant to hold that conversations could never be “searched” or “seized,” there would have been no reason for him to “confine” the matter to the “means of wiretapping.” It must also be remembered that Taft cabined the majority holding to the interception of messages “while passing over” telephone wires beyond the house.68 This reaffirms that the holding of “non-search” was not intended to extend to audio information captured during a physical intrusion into a constitutionally protected area.69 Perhaps due to this limiting language, none of the Court’s post-Olmstead holdings rested on the immaterial nature of conversations.70 For these reasons, this article v. United States, 277 U.S. 438.”); id. (“[I]n both Goldman and On Lee the Court took pains explicitly to point out that the eavesdropping had not been accomplished by means of an unauthorized physical encroachment within a constitutionally protected area.”). 64 Olmstead, 277 U.S. at 466. 65 See Berger, 388 U.S. at 78 (Black, J., dissenting) (“[T]he Olmstead holding that the Fourth Amendment does not apply to efforts to hear and obtain oral conversations has never been overruled by this Court.”). 66 See id. at 51 (majority opinion) (distinguishing “[t]he basis of the [Olmstead] decision” from “[s]tatements in the opinion that a conversation passing over a telephone wire cannot be said to come within the Fourth Amendment’s enumeration of ‘persons, houses, papers, and effects’”). 67 Olmstead, 277 U.S. at 455 (emphasis added). 68 Id. at 466 (“The reasonable view is that one who installs in his house a telephone instrument with connecting wires intends to project his voice to those quite outside, and that the wires beyond his house and messages while passing over them are not within the protection of the Fourth Amendment.” (emphasis added)). 69 Shifting our analysis beyond the actual language of Taft’s opinion, the role of strategy cannot be ignored. It is certainly possible (if not likely) that the ambiguity in the opinion regarding immateriality was negotiated by Taft to shore up a fragile majority bloc. See, e.g., FORREST MALTZMAN, JAMES F. SPRIGGS II & PAUL J. WAHLBECK, CRAFTING LAW ON THE SUPREME COURT 151 (2000) (discussing the importance of opinion assignments to case outcomes and strategic decisions); Michael Abramowicz & Maxwell L. Stearns, Beyond Counting Votes: The Political Economy of Bush v. Gore, 54 VAND. L. REV. 1849, 1853 (2001) (arguing that institutional norms and doctrine sharply constrain justices’ strategic behavior); Timothy R. Johnson, James F. Spriggs II & Paul J. Wahlbeck, Passing and Strategic Voting on the U.S. Supreme Court, 39 LAW & SOC’Y REV. 349, 349 (2005) (asserting that a Chief Justice’s decision to pass may be a strategic move to advance a policy preference). 70 See Lopez v. United States, 373 U.S. 427, 438–39 (1963) (“It has been insisted only that the electronic device not be planted by an unlawful physical invasion of a constitutionally 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 11 assumes that Olmstead’s holding is singular: that electronic eavesdropping unaccompanied by a physical intrusion into a constitutionally protected area is not a Fourth Amendment “search.”71 The Olmstead era lasted from 1928 until 1967. The first real challenge to Olmstead came by way of congressional legislation.72 The 1934 Communications Act prohibited persons from the use of wires to intercept communications and the divulgence of their content.73 The Act, based in Congress’s commerce authority, reached the wiretapping of telephone wires (such as that used on Olmstead), yet it left unregulated many alternate forms of electronic eavesdropping.74 And so in the ensuing decades the lawfulness of electronic eavesdropping (at least of the non-wiretap kind) hung on the mantle of Olmstead. The Court’s first review of Olmstead came in the 1942 decision of Goldman v. United States.75 Goldman involved the government’s use of a “detectaphone.”76 A detectaphone is “a telephonic apparatus with an attached microphone transmitter” that, when placed on a door or wall, can detect conversations inside of an adjoining room.77 The majority opinion, authored by Justice Owen Roberts, concluded that “no reasonable or logical distinction can be drawn between what federal agents did in the present case and state officers did in the Olmstead case.”78 The Court then explicitly reaffirmed Olmstead: That case was the subject of prolonged consideration by this court. The views of the court, and of the dissenting justices, were expressed clearly and at length. To rehearse and reappraise the arguments pro and con, and the conflicting views exhibited in protected area.”); Silverman v. United States, 365 U.S. 505, 510 (1961) (“[I]n both Goldman and On Lee, the Court took pains explicitly to point out that the eavesdropping had not been accomplished by means of an unauthorized physical encroachment within a constitutionally protected area.”). 71 See William Heffernan, Property, Privacy, and the Fourth Amendment, 60 BROOK. L. REV. 633, 639–40 (1994) (“Because Taft seems to have been unaware of the inconsistency between his two rationales, we can assume that he wished to resolve the case on the basis of the first, trespassory rationale.”). 72 Communications Act of 1934, Pub. L. No. 416, 48 Stat. 1064. 73 Id. at 1103–04. 74 See, e.g., Silverman, 365 U.S. at 505 (spike mike); On Lee v. United States, 343 U.S. 747 (1952) (radio transmission of conversations with informants); Goldman v. United States, 316 U.S. 129 (1942) (detectaphone). Moreover, the Act did not prohibit the use of wiretapping evidence in state courts (which would have been governed by Olmstead in any postMapp decisions). 75 316 U.S.129 (1942). 76 Id. 77 WEBSTER’S THIRD NEW INTERNATIONAL DICTIONARY 616 (2002). 78 Goldman, 316 U.S. at 135. The decision was 5–3 (with Justice Jackson having recused himself). Id. at 136. 12 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 the opinions, would serve no good purpose. Nothing now can be profitably added to what was there said. It suffices to say that we adhere to the opinion there expressed.79 Ten years later, the Court again revisited Olmstead. In On Lee v. United States,80 the Court contemplated whether the Fourth Amendment prohibited secret radio transmissions of conversations by undercover informants.81 Justice Jackson, writing for the majority, made clear that Olmstead remained good law.82 He cited both Olmstead and Goldman for the proposition that the government does not undertake a Fourth Amendment “search” when it uses “mechanical or electronic devices designed to overhear or intercept conversation, at least where access to the listening post was not obtained by illegal methods.”83 After discussing the Olmstead line of cases,84 Jackson explained that On Lee’s constitutional claim could be resolved through two broader doctrines: (1) On Lee had misplaced his trust in a conversant (the informant),85 and (2) the transmission of the conversation constituted a mere magnification, like “[t]he use of bifocals, field glasses or the telescope.”86 In the 1961 opinion of Silverman v. United States 87 one can identify some erosion of Olmstead.88 Silverman involved the government’s use of a “spike mike” to amplify 79 Id. at 135–36. See Morgan Cloud, Pragmatism, Positivism, and Principles in Fourth Amendment Theory, 41 UCLA L. REV. 199, 248 n.214 (1993) (stating that “the trespass doctrine had been reaffirmed” in Goldman). 80 343 U.S. 747 (1952). 81 Id. at 748–50. For an excellent discussion of the Court’s decisionmaking in government informant cases, see Catherine Hancock, Warrants For Wearing a Wire: Fourth Amendment Privacy and Justice Harlan’s Dissent in United States v. White, 79 MISS. L.J. 35 (2009). 82 On Lee, 343 U.S. at 753–54. See also United States v. White, 401 U.S. 745, 750 (1971) (plurality opinion) (stating that On Lee “first rejected claims of a Fourth Amendment violation because the informer had not trespassed when he entered the defendant’s premises and conversed with him”); Hancock, supra note 81, at 44 (“The On Lee Court relied on Goldman v. United States, which . . . in turn, extended the logic of Olmstead . . . .”). 83 On Lee, 343 U.S. at 753 (stating that Olmstead had “sharply limited” the reach of Gouled v. United States, 255 U.S. 298 (1921)). 84 Id. 85 Id. at 753–54. 86 Id. at 754. 87 365 U.S. 505 (1961). 88 See Desist v. United States, 394 U.S. 244, 275 (1969) (Fortas, J., dissenting) (“Katz is not responsible for killing Olmstead. Prior cases had left the physical-trespass requirement of Olmstead virtually lifeless and merely awaiting the death certificate that Katz gave it.”); Lopez, 373 U.S. 427, 458–59 (1963) (Brennan, J., dissenting) (stating “that its authority has been steadily sapped by subsequent decisions of the Court”); see also Cloud, supra note 79, at 248 (“At the beginning of the decade, the Court hinted that it was ready to jettison the propertyprivacy nexus.”); Tracey Maclin, Katz, Kyllo, and Technology: Virtual Fourth Amendment Protection in the Twenty-First Century, 72 MISS. L.J. 51, 80 (2002) (“Rejection of the ‘trespass’ rule ignited no real controversy among the Justices in Katz. One explanation for this consensus may be that the trespass rule specifically, and common-law property rules 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 13 incriminating conversations.89 A “spike mike” was a one foot long metal spike with an attached microphone.90 The government inserted one of these spikes into a wall until it made contact with the heating duct that ran through the house occupied by Silverman.91 At that point the spike became, in the majority’s words, “a giant microphone, running through the entire house occupied by appellants.”92 The Court explained that “the officers overheard the petitioners’ conversations only by usurping part of the petitioners’ house or office—a heating system which was an integral part of the premises occupied by the petitioners, a usurpation that was effected without their knowledge and without their consent.”93 Although the Court did not consider whether there was “technical trespass under the local property law,” the Court concluded the eavesdropping was nonetheless accompanied by an “unauthorized physical penetration into the premises occupied by the petitioners.”94 This intrusion on a “constitutionally protected area,” observed the majority, distinguished Silverman’s case from the wiretapping in Olmstead and rendered it a Fourth Amendment “search.”95 The Silverman Court’s emphasis on the “unauthorized physical penetration” reaffirmed Olmstead’s holding.96 Yet, at the same time Silverman disregarded Olmstead’s “immateriality” discussion by concluding that Silverman’s “conversations” were the subject of a “search.”97 generally, no longer exerted influence on search and seizure doctrine. Since at least the 1950s, the persuasive quality of these rules waned.”(footnote omitted)). 89 Id. at 506. 90 Id. 91 Id. at 506–07. 92 Id. at 509 (quoting Silverman v. United States, 275 F.2d 173, 179 (D.C. Cir. 1960)). 93 Id. at 511. 94 Id. at 509, 511 (“Inherent Fourth Amendment rights are not inevitably measurable in terms of ancient niceties of tort or real property law.”). 95 Id. at 510–12. 96 See supra notes 13–14 and accompanying text (discussing the single holding of Olmstead ). Silverman, 356 U.S. at 509–10 (“The absence of a physical invasion of the petitioner’s premises was also a vital factor in the Court’s decision in Olmstead v. United States.”); id. at 510 (“[I]n both Goldman and On Lee, the Court took pains explicitly to point out that the eavesdropping had not been accomplished by means of an unauthorized physical encroachment within a constitutionally protected area.”); id. at 513 (Clark, J., concurring) (“In view of the determination by the majority that the unauthorized physical penetration into petitioners’ premises constituted sufficient trespass to remove this case from the coverage of earlier decisions, we feel obliged to join in the Court’s opinion.”). See also Berger v. New York, 388 U.S. 41, 79 (1967) (Black, J., dissenting) (stating that the Silverman Court cited Olmstead “with approval”). 97 See Lopez v. United States, 373 U.S. 427, 438–39 (1963) (“It has been insisted only that the electronic device not be planted by an unlawful physical invasion of a constitutionally protected area.” (citing Silverman, 365 U.S. at 505)) (emphasis added); Hancock, supra note 81, at 45 (“[T]he Court found that the interception of conversations could violate the Fourth Amendment, thus implicitly recognizing that the human ear could commit the seizure of a conversation, and that an intangible conversation could receive the constitutional protection given to tangible ‘effects’ or ‘things.’”). But see Berger, 388 U.S. at 79 (Black, J., dissenting) (explaining his view that Silverman was resolved through the Court’s supervisory authority). 14 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 Two years after Silverman, the Court reconsidered Olmstead in Lopez v. United States.98 In Lopez, the Court assessed the constitutionality of recording a conversation on a “wire recorder” kept on an agent’s person.99 In reference to the Olmstead line of cases, the majority opinion, authored by Justice Harlan, stated that “in the past” the Court had “sustained instances of ‘electronic eavesdropping’ against constitutional challenge.”100 Here, wrote Harlan, “the device was not planted by means of an unlawful physical invasion of petitioner’s premises under circumstances which would violate the Fourth Amendment.”101 The majority made clear, however, that “[t]he validity of [the Olmstead line of cases] is not in question here” because “this case involves no ‘eavesdropping’ whatever in any proper sense of that term.”102 And so, as in On Lee, the majority reasoned through alternate doctrines to conclude that the government did not undertake a constitutional “search.”103 1967 was the year that closed the curtain on the Olmstead era. Within a course of months, both Olmstead’s “immateriality” discussion and “physical intrusions” holding were formally rejected by the Court.104 Lasting nearly forty years, the Olmstead era was marked by (1) its holdings that electronic eavesdropping unassociated with a physical intrusion into a constitutionally protected area is not a “search,” and (2) its judicial intimations that conversations could not be the subject of a “search.”105 3. Prevailing Descriptions The Olmstead era has been widely criticized. Commentators have chastised it as “unmistakably grudging,”106 “exceedingly narrow,”107 and unresponsive to changes 98 373 U.S. 427 (1963). Id. at 430. For a description of how the factual basis differed from that in On Lee, see id. at 443–46 (Warren, C.J., concurring). 100 Id. at 438 (majority opinion). 101 Id. at 439 (explaining that the recorder was “carried in and out by an agent who was there with petitioner’s assent, and it neither saw nor heard more than the agent himself”). 102 Id. 103 Id. See also United States v. White, 401 U.S. 745, 776 (1971) (Harlan, J., dissenting) (stating that the Lopez decision was “bottomed on two premises: the corroborative use that was made of the tape recordings, which increased reliability in the factfinding process, and the absence of a ‘risk’ not fairly assumed by petitioner”). 104 Katz v. United States, 389 U.S. 347 (1967); Berger v. New York, 388 U.S. 41 (1967). For a discussion of how the facts of Berger differed from those in Silverman, see Berger, 388 U.S. at 81 (Black, J., dissenting); see also Warden, Md. Penitentiary v. Hayden, 387 U.S. 294, 304 (1967) (“We have recognized that the principal object of the Fourth Amendment is the protection of privacy rather than property, and have increasingly discarded fictional and procedural barriers resting on property concepts.”). But see United States v. Jones, 132 S. Ct. 945, 950 (2012) (supplementing the Katz test with an Olmstead-style standard of “physical trespass”). 105 See, e.g., Amsterdam, supra note 49, at 381–82. 106 James J. Tomkovicz, Technology and the Threshold of the Fourth Amendment: A Tale of Two Futures, 72 MISS. L.J. 317, 333 (2002). 107 Id. 99 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 15 in technology.108 The severity of the reviews has not waned with time. As recently as 2010, in City of Ontario v. Quon, eight justices cited Olmstead as an example of the risks associated with imprudent adjudication.109 The causes of the Olmstead era are contested. One set of explanations hinges on the justices’ policy preferences (for, say, a society which entrusts law enforcement to engage in responsible warrantless wiretapping).110 Other explanations turn on the justices’ juridical preferences. Professor Cloud has linked Olmstead to the justices’ adoption of “Lochner-style” formalism.111 This type of formalism, wrote Cloud, severs “property law concepts” from “related foundational beliefs” in “natural law” and “individual rights.”112 Olmstead is alternatively linked by commentators to the justices’ proclivity for textualism. Professor Tomkovicz has written of the “majority’s fear” that “the relationship between wiretapping and the Fourth Amendment would be unfaithful to history and to the literal terms of the constitutional text.”113 In a similar manner Professor Heffernan has associated Olmstead with the “practice-based originalism” of Chief Justice Taft.114 With that said, these contending explanations should not obscure the shared consensus that Olmstead was an unfortunate chapter in the Court’s criminal procedure history. B. Failure of Katz Alongside the Olmstead era sits a second “search” phenomenon. This is the failure of Katz.115 By this I mean the Warren Court’s unrealized promise to incorporate an objective and evolving privacy standard into “search” decisionmaking. This subpart briefly recounts the opinions in Katz v. United States, summarizes the Court’s postKatz case law, and surveys the conventional explanations for Katz’s failure. 1. The Katz Decision Without a warrant, the FBI attached a listening and recording device to the top of a phone booth in Miami, Florida.116 With that device the agents were able to capture incriminating statements made by Charles Katz.117 Consequently, Katz was indicted 108 Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy, 75 S. CAL. L. REV. 1083, 1086–87 (2002); James J. Tomkovicz, Technology and the Threshold of the Fourth Amendment: A Tale of Two Futures, 72 MISS. L.J. 317, 333 (2002); see also Katz, 389 U.S. at 353 (discussing the “narrow view” of the Olmstead majority). 109 130 S. Ct. 2619, 2629 (2010). 110 See, e.g., Tomkovicz, supra note 106, at 331. 111 See Cloud, supra note 3, at 610–24. 112 See Cloud, supra note 79, at 247 n.207 (“In other words, the Court excised one constituent element from an integrated legal worldview.”). 113 Tomkovicz, supra note 106, at 331. 114 Heffernan, supra note 71, at 639. 115 Katz v. United States, 389 U.S. 347 (1967). 116 Id. at 348. 117 Id. 16 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 for various gambling-related offenses, his motion to suppress the evidence was denied, and he was convicted.118 The conviction was upheld on appeal and the Supreme Court granted certiorari.119 The Katz majority, in an opinion by Justice Stewart, began with a rejection of Olmstead’s standard of “constitutionally protected areas.”120 Justice Stewart explained that “the underpinnings of Olmstead and Goldman have been so eroded by our subsequent decisions that the ‘trespass’ doctrine there enunciated can no longer be regarded as controlling.”121 As a result, any “effort to decide whether or not a given ‘area,’ viewed in the abstract, is ‘constitutionally protected’ deflects attention from the problem presented by this case.”122 Freed from the bindings of Olmstead, the majority introduced a novel type of “search” analysis. [T]he Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.123 The new approach called on jurists to assess the objective privacy expectations of a given time and place. The application of this contextual standard to Katz’s claim turned on the architecture of the bugged phone booth, and, more generally, the role of public phones in society at large.124 One who occupies it, shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume 118 Id. at 348–49. Id. at 349–50. The government argued that the Fourth Amendment was not violated because either (1) the booth was not a constitutionally protected area, or alternatively, (2) the government did not physically encroach upon such area. Id. at 351–52. These arguments were formulated and made before the Court issued its opinion in Berger v. New York, 388 U.S. 41 (1967). 120 Katz, 389 U.S. at 350. 121 Id. at 353 (“[A]lthough a closely divided Court supposed in Olmstead that surveillance without any trespass and without the seizure of any material object fell outside the ambit of the Constitution, we have since departed from the narrow view on which that decision rested.”); id. (“Indeed, we have expressly held that the Fourth Amendment governs not only the seizure of tangible items, but extends as well to the recording of oral statements, overheard without any ‘technical trespass under . . . local property law.’”(citing Silverman v. United States, 365 U.S. 505 (1961))). 122 Id. at 351. 123 Id. at 351–52 (citations omitted). 124 For a “social” analysis of Justice Stewart’s opinion, see Jonathan Simon, Katz at Forty: A Sociological Jurisprudence Whose Time Has Come, 41 U.C. DAVIS L. REV. 935, 948–59 (2008). 119 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 17 that the words he utters into the mouthpiece will not be broadcast to the world. To read the Constitution more narrowly is to ignore the vital role that the public telephone has come to play in private communication.125 Based on its assessment of objective and evolving privacy expectations the Katz majority concluded that “[t]he Government’s activities in electronically listening to and recording the petitioner’s words violated the privacy upon which he justifiably relied while using the telephone booth.”126 In reorienting “search” doctrine along the lines of objective and evolving privacy expectations, the Katz majority provided no clear standards for future courts to apply. To supplement the majority’s “people-not-places” discussion, Justice Harlan offered a brief concurring opinion.127 My understanding of the rule that has emerged from prior decisions is that there is a twofold requirement, first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognized as “reasonable.” Thus, a man’s home is, for most purposes, a place where he expects privacy, but objects, activities, or statements that he exposes to the “plain view” of outsiders are not “protected” because no intention to keep them to himself has been exhibited. On the other hand, conversations in the open would not be protected against being overheard, for the expectation of privacy . . . would be unreasonable.128 Harlan’s “twofold requirement” has been subsequently explained as follows: The first [question] is whether the individual, by his conduct, has “exhibited an actual (subjective) expectation of privacy,”— whether, in the words of the Katz majority, the individual has 125 Katz, 389 U.S. at 352. Id. at 353. Katz’s emphasis on context has a rich heritage rooted in Justice Brandeis’s Olmstead dissent. Olmstead v. United States, 277 U.S. 438, 472 (1928) (Brandeis, J., dissenting) (“Clauses guaranteeing to the individual protection against specific abuses of power, must have a . . . capacity of adaptation to a changing world.”). See also Lopez v. United States, 373 U.S. 427 (1963) (Brennan, J., dissenting) (“The requirements of the Fourth Amendment are not inflexible, or obtusely unyielding to the legitimate needs of law enforcement. It is at least clear that ‘the procedure of antecedent justification before a magistrate that is central to the Fourth Amendment,’ could be made a precondition of lawful electronic surveillance.” (citations omitted)); Goldman v. United States, 316 U.S. 129 (1942) (Murphy, J., dissenting) (“It is our duty to see that this historic provision receives a construction sufficiently liberal and elastic to make it serve the needs and manners of each succeeding generation.”). 127 Katz, 389 U.S. at 360–62 (Harlan, J., concurring). 128 Id. at 361. 126 18 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 shown that “he seeks to preserve [something] as private.” The second question is whether the individual’s subjective expectation of privacy is “one that society is prepared to recognize as ‘reasonable,’”—whether, in the words of the Katz majority, the individual’s expectation, viewed objectively, is “justifiable” under the circumstances.129 Almost immediately, the Harlan two-part test emerged as the doctrinal standard for “search” issues.130 It has remained the rule for more than forty years.131 2. Katz’s Failure Most commentators thought Katz was transformative at the time it came down.132 This was not simply because it repealed a property-based regulation of electronic eavesdropping.133 It was because Katz called for interpretive reformation on a far larger scale: it explicitly linked the Fourth Amendment term “search” to objective and evolving standards of privacy.134 While many have attacked Katz collaterally (for, say, focusing on the wrong value or causing the fracture of doctrine),135 Katz is frequently 129 See Smith v. Maryland, 442 U.S. 735, 740 (1979) (citations omitted). See Terry v. Ohio, 392 U.S. 1, 9 (1968) (“[W]herever an individual [has] a reasonable ‘expectation of privacy,’ he is entitled to be free from unreasonable governmental intrusion.”(citations omitted)). See also Mancusi v. DeForte, 392 U.S. 364, 368 (1968) (questioning “whether the area was one in which there was a reasonable expectation of freedom from governmental intrusion”). 131 See, e.g., City of Ontario v. Quon, 130 S. Ct. 2619, 2629–30 (2010); Minnesota v. Carter, 525 U.S. 83, 97 (1998) (Scalia, J., concurring) (commenting on “the Katz test (which has come to mean the test enunciated by Justice Harlan’s separate concurrence in Katz)”). 132 See Kerr, supra note 7, at 538 (“[I]t was expected that the new test would have a major impact on how the Fourth Amendment applied.”); Note, From Private Places to Personal Privacy: A Post-Katz Study of Fourth Amendment Protection, 43 N.Y.U. L. REV. 968, 968 (1968) (describing Katz as a “landmark” case); id. at 981 (“[T]he Katz decision has pointed the way towards a complete re-orientation in the analysis of problems relating to governmental intrusion into individuals’ private affairs.”). 133 But see United States v. Jones, 132 S. Ct. 945, 950 (2012). 134 Albert W. Alschuler, Interpersonal Privacy and the Fourth Amendment, 4 N. ILL. U. L. REV. 1, 6 n.12 (1983) (stating that Katz links the right to privacy to “changing cultural expectations of privacy”); see Cloud, supra note 79, at 247 (stating that the Court was “employing a test that rests upon pragmatist theories and methods”); Maclin, supra note 88, at 62 (“After Katz . . . the substantive content of the Amendment would derive from thoroughly modern and realistic understandings of the privilege against unreasonable searches and seizures.”); Solove, supra note 4, at 1519 (“The reasonable expectations of privacy test also promises flexibility— it can evolve with society and remain connected to current social values.”). See generally Amy Piekoff, Pragmatism and Privacy, 5 N.Y.U. J. LAW & LIB. 638 (2010) (discussing the pragmatism of Katz). For an argument about the more humble objectives of the Katz majority, see Maclin, supra note 88, at 58 (“[T]he Justices who decided Katz were unable to agree on the meaning of their ruling . . . .”). 135 Much of the search-and-seizure literature argues that the Fourth Amendment rests on the wrong value. See supra note 3; Kerr, supra note 7, at 529 (“Many articles argue that the 130 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 19 skewered on its own terms.136 This “internal” criticism emphasizes Katz’s failure to live up to its promise of objective and evolving decisionmaking.137 The evidence of Katz’s failed promise is substantial. One might start by pointing to post-Katz ratifications of pre-Katz rules. If Katz had actually reoriented “search” doctrine, it would be curious, goes the argument, to have so many rules remain fixed across the pre- and post-Katz eras. “What is remarkable,” observed Professor Junker, “is how little was changed by Katz’s abandonment of the ‘trespass’ standard of Olmstead v. United States and Goldman v. United States.”138 Professor Kerr has recently described this phenomenon in more detail: [T]ime and again, the interpretation of the new test just happened to match prior law. For example, [United States v.] White reaffirmed On Lee [v. United States], which had held that the police did not need a warrant to go undercover and wear a “wire” Supreme Court should replace the ‘reasonable expectation of privacy’ test with a new test that better captures what the Fourth Amendment is really about.”). An incoherence critique also pervades the literature. See, e.g., Ronald Dworkin, Fact Style Adjudication and the Fourth Amendment: The Limits of Lawyering, 48 IND. L.J. 329, 364–68 (1973) (arguing that the Court’s case-by-case fact-oriented approach is a failure); Richard Posner, Rethinking the Fourth Amendment, 1981 SUP. CT. REV. 49, 76–80 (finding that the Court’s Fourth Amendment rulings are inconsistent as a matter of economic analysis); Solove, supra note 4, at 1511 (“The reasonable expectation of privacy test has led to a contentious jurisprudence that is riddled with inconsistency and incoherence.”); Silas J. Wasserstrom & Louis Michael Seidman, The Fourth Amendment as Constitutional Theory, 77 GEO. L.J. 19, 20 (1988) (“[There is] virtual unanimity . . . that the Court simply ha[d] made a mess of search and seizure law.”). But see Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 STAN. L. REV. 503, 507 (2007) (“The result is a body of law that seems chaotic and confused and in need of major reworking. But appearances can be deceiving.”). 136 See, e.g., Minnesota v. Carter, 525 U.S. 83, 110–11 (1998) (Ginsburg, J., dissenting) (“The Court’s decision in this case veers sharply from the path marked in Katz.”); Florida v. Riley, 488 U.S. 445, 456 (1989) (Brennan, J., dissenting) (“The opinion for a plurality of the Court reads almost as if [Katz] had never been decided.”); California v. Ciraolo, 476 U.S. 207, 216 (1985) (Powell, J., dissenting) (asserting that the Court “departs significantly from the standard developed in Katz”). 137 WAYNE R. LAFAVE ET AL., CRIMINAL PROCEDURE 128 (2004) (“The full potential of the Katz approach (which certainly in all respects has not been realized) . . . .”); Simon, supra note 124, at 959 (“Commentators have long appreciated that something potentially revolutionary to at least Fourth Amendment jurisprudence was embedded in Katz but had failed to develop.”); Sklansky, supra note 7, at 143 (“The decision in Katz seemed to promise a Fourth Amendment that was less tied to specific locations, and therefore somehow more modern. The Justices keep renewing that promise, but they have never figured out how to make good on it.”); Peter P. Swire, Katz Is Dead. Long Live Katz, 102 MICH. L. REV. 904, 931 (2004) (“Katz has already had two lives. The first was as the protector of privacy envisioned by Justice Brennan and celebrated in the ‘reasonable expectation of privacy’ test. The second has been as an invader of privacy.”). 138 John M. Junker, The Structure of the Fourth Amendment: The Scope of the Protection, 79 J. CRIM. L. & CRIMINOLOGY 1105, 1125 (1989). 20 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 that transmitted the defendant’s conversations to a police observation post. Rakas v. Illinois reaffirmed Wong Sun v. United States, which had held that Fourth Amendment rights are personal and cannot be asserted vicariously. Oliver v. United States reaffirmed Hester v. United States, retaining the “open fields” doctrine.139 Moreover, Katz’s failed promise is reflected in the regularity with which postKatz “search” holdings cut against public expectations of privacy.140 Justice Harlan, in Katz, emphasized that the “search” inquiry turns on expectations “that society is prepared to recognize as ‘reasonable.’”141 Yet thirty years later, Justice Scalia observed that reasonable expectations of privacy have turned out to be nothing more than “those expectations of privacy that this Court considers reasonable.”142 Similarly, the Court’s “conception of privacy,” wrote Professor Solove, is one “that countless commentators have found to be . . . totally out of touch with society.”143 To illustrate, Professors Wasserstrom and Seidman, in the wake of Arizona v. Hicks,144 wrote: [O]n the very day that the Court identified Officer Nelson’s examination of the bottom of a turntable as a full-blown search, it announced that no search had occurred when officers on three 139 Kerr, supra note 7, at 538 (footnotes omitted). See Wayne R. LaFave, Fourth Amendment Vagaries (of Improbable Cause, Imperceptible Plain View, Notorious Privacy, and Balancing Askew), 74 J. CRIM. L. & CRIMINOLOGY, 1171, 1177 n.37 (1983) (“[A] Smith-Knotts type of analysis could well have produced the result that Katz lacked an expectation of privacy because what he said could have been determined by a lip reader some distance away or by a hypothetical bystander immediately adjacent to the booth.”); see Cloud, supra note 79, at 253 (stating that the open fields doctrine, “first announced during the [F]ourth [A]mendment’s formalist era, seemed an unlikely candidate to withstand scrutiny when expectations analysis was applied”); Tracey Maclin, Informants and the Fourth Amendment, 74 WASH. U. L. Q. 573, 620–21 (1996) (“Although Katz announced that the Court would no longer be controlled by rigid and antiquated concepts when formulating the scope of the Fourth Amendment, the White plurality read Katz as having no impact on the secret spy cases.” (footnote omitted)). 140 See infra notes 152–59 and accompanying text. 141 See Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring). 142 Minnesota v. Carter, 525 U.S. 83, 97 (1998) (Scalia, J., concurring). 143 Solove, supra note 4, at 1519, 1526 (providing as illustration that “under current Fourth Amendment law, a little squeeze of a bag on a bus is fully regulated whereas systematic surveillance is not.”). See Morgan Cloud, Rube Goldberg Meets the Constitution: The Supreme Court, Technology, and the Fourth Amendment, 72 MISS. L.J. 5, 28 (2002) (“Ultimately, the outcomes of these cases have turned on the subjective views of a majority of the Justices about what privacy expectations are objectively ‘reasonable.’”); Kerr, supra note 135, at 505 (stating that some “[t]reatises and casebooks” suggest that “the only way to identify when an expectation of privacy is reasonable is when five Justices say so”); see also JEFFREY ROSEN, THE UNWANTED GAZE: THE DESTRUCTION OF PRIVACY IN AMERICA 63 (2000) (writing that in “many cases, people have an objectively valid expectation of privacy that the Court, by judicial fiat, has deemed unjustifiable”). 144 480 U.S. 321 (1987). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 21 occasions entered a suspect’s fenced property without permission, walked across one-half mile of the property, crossed several interior barbed wire fences, and shined a flashlight into the suspect’s barn. Similarly, the Court has told us that we have a reasonable expectation that strangers, such as landlords and hotel clerks, will not authorize searches, but no such expectation regarding spouses or close friends. And although a suspect can reasonably expect that a public telephone booth will not be bugged, she has no such expectation regarding a person she admits to her home.145 By way of further example, Professor Slobogin has written of the counter-intuitive implications of the “third party doctrine”: [V]arious federal and state statutes guarantee the confidentiality of records maintained by hospitals, banks, schools, and other institutions, and penalize breach of this confidentiality with civil and even criminal penalties. Yet the Court’s Fourth Amendment jurisprudence declares that the American public can expect no privacy vis-à-vis government voyeurism or perusal of our transactions.146 As it turns out, the Court’s drift away from societal expectations has been confirmed by empirical data.147 Drawing from public surveys, Professor Slobogin has concluded that “the Supreme Court’s conclusions about the scope of the Fourth Amendment are often not in tune with commonly held attitudes about police investigative techniques.”148 145 Wasserstrom & Seidman, supra note 135, at 29–30 (footnotes omitted) (discussing the Court’s “seemingly perverse outcomes” in “search” issues). See also Stephen A. Saltzburg, Another Victim of Illegal Narcotics: The Fourth Amendment (As Illustrated by the Open Fields Doctrine), 48 U. PITT. L. REV. 1, 20 (1986) (identifying the absurdity of people receiving “more protection in a taxi than on land they own, care for, and seek to keep private for themselves”). 146 Christopher Slobogin, Proportionality, Privacy, and Public Opinion: A Reply to Kerr and Swire, 94 MINN. L. REV. 1588, 1592 (2010) (footnote omitted). 147 See, e.g., CHRISTOPHER SLOBOGIN, PRIVACY AT RISK 112 (2007) (“My findings with respect to the various surveillance scenarios can be summarized as follows: virtually all forms of transaction surveillance as well as overt public camera surveillance are viewed, on average, as more intrusive than a roadblock, and government efforts to access records from websites, ISPs, pharmacies, and banks are perceived to be as intrusive as a search of a car.”); see also Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. CHI. L. REV. 317, 335–36 (2008); Christopher Slobogin, Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity, 72 MISS. L.J. 213, 277–78 (2002); Christopher Slobogin & Joseph E. Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at “Understandings Recognized and Permitted by Society,” 42 DUKE L.J. 727, 737–39 (1993). 148 Slobogin & Schumacher, supra note 147, at 774. Professors Slobogin and Schumacher argue that some Supreme Court cases “do not reflect societal understandings” of when an expectation of privacy is reasonable. Id. at 732. 22 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 Further evidence of Katz’s failure is to be found in the Court’s continued reliance on property concepts. As Professor Kerr has stated, “in most (though not all) cases, an expectation of privacy becomes ‘reasonable’ only when it is backed by a right to exclude borrowed from real property law.”149 Property law was officially incorporated into the Katz test in the 1978 decision of Rakas v. Illinois150: “expectations of privacy,” wrote the majority, “must have a source outside of the Fourth Amendment, either by reference to concepts of real or personal property law or to understandings that are recognized and permitted by society.”151 Following Rakas’s lead, Chief Justice Burger, in California v. Ciraola,152 asserted that no search had occurred because the police’s aerial observations “took place within public navigable airspace, in a physically nonintrusive manner.”153 Justice Brennan chastised Burger’s reasoning for its “willingness to end its inquiry when it finds that the officer was in a position he had a right to be.”154 Professor Maclin echoed Justice Brennan’s point in his criticism of the Court’s holding that “dog sniffs” are not “searches”155: The analytical tension between Place and Katz is manifest. Why does it matter that the dog sniff does not require opening of luggage? . . . The absence of a physical intrusion does not diminish a person’s privacy interest in his luggage, just as the absence of a physical intrusion into a telephone booth did not diminish Katz’s interest in the privacy of his telephone conversations. . . . Thus, the “manner” of the police intrusion in Place should be irrelevant.156 149 Kerr, supra note 5, at 809–10. See also Orin S. Kerr, Technology, Privacy, and the Courts: A Reply to Colb and Swire, 102 MICH. L. REV. 933, 934 (2004) (“Even when purporting to protect privacy, judges have proven reluctant to deviate from rules based on principles of property law.”); Kerr, supra note 135, at 506 (explaining that the Court’s doctrine does not rely directly on societal standards of expectations of privacy but “considers whether the government conduct interferes with property rights or other legal standards outside the Fourth Amendment”). But see Cloud, supra note 143, at 15, 46 (advocating that the Court use Fourth Amendment property concepts to define property); Slobogin, supra note 146, at 1603–04 (explaining that the “positive law” model is “an occasionally good proxy for assessing societal expectations” in that it “is, of course, the result of a survey, albeit one mediated through the democratic process”). 150 439 U.S. 128 (1978). 151 Id. at 144 n.12. 152 476 U.S. 207 (1986). 153 Id. at 213. See also Florida v. Riley, 488 U.S. 445, 445–46, 449–50 (1988) (plurality opinion) (reasoning that helicopter surveillance from 400 feet did not constitute a “search” because “the FAA permits helicopters to fly below that limit, the helicopter here was not violating the law, and any member of the public or the police could legally have observed respondent’s greenhouse from that altitude”). 154 Riley, 488 U.S. at 459 (Brennan, J., dissenting). 155 United States v. Place, 462 U.S. 696, 719–20 (1983); see also Illinois v. Caballes, 543 U.S. 405, 410–11 (2005) (Souter, J., dissenting). 156 Maclin, supra note 88, at 82. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 23 Just recently, property law was given a more prominent role in “search” interpretations. This past year, in United States v. Jones,157 a majority held that a physical trespass constitutes a “search” even if there is no encroachment upon a reasonable expectation of privacy. In effect, the Jones Court expanded on Rakas by making property concepts not simply a factor of the privacy analysis, but rather a sufficient condition for “search.”158 This reliance on property law, along with the Court’s ratification of old rules and its drift away from public expectations of privacy, make clear that Katz failed in its promise to reorient “search” doctrine along the lines of an objective and evolving privacy standard. 3. Prevailing Descriptions There is little doubt that Katz has failed to accomplish its objective to institute an objective and evolving privacy standard to govern the interpretation of a Fourth Amendment “search.”159 Search-and-seizure commentators attribute this failure to one of three (oftentimes overlapping) causes: (1) the vagueness of the Katz decision; (2) the inaccessibility of empirical data on “privacy expectations”; and (3) the justices’ individual juridical or policy preferences.160 157 132 S. Ct. 945 (2012). Id. at 950. 159 Some scholars, such as Professor Cloud, have argued that Katz actually succeeded in making the doctrine contextual (if not objective). See Cloud, supra note 79, at 251 (“It is not surprising . . . to find a body of case law in which the Court focuses upon social context, uses the law instrumentally to achieve social goals, and emphasizes substantive, nor formal, reasoning.”); Cloud, supra note 3, at 613 n.275 (“Katz is one of the theoretical bulwarks of the Court’s contemporary Fourth Amendment pragmatism.”). Other scholars have argued that Katz has been successful in ways unrelated to its promise regarding objectivity and privacy evolution. See, e.g., Orin S. Kerr, The Case for the Third-Party Doctrine, 107 MICH. L. REV. 561, 566 (2009) (arguing that the current doctrine is sufficiently vague to allow the Court to undertake a pragmatic assessment of the costs and benefits of regulating certain types of government behavior). 160 The first two explanations (vagueness and inaccessible data) assume that the justices attempt to apply Katz before falling back on preferences. The third explanation argues that the justices have not even made good-faith efforts to sincerely apply Katz. There is, however, some overlap between these explanations. The first and second explanations hold that, once the justices became disenchanted with Katz they fall back on old rules, subjective views of privacy, or property concepts. They do this either out of some sense of judicial duty or to maximize their juridical or policy objectives. Thus, each explanation can be viewed as resting, at least in part, on the justices’ juridical or policy goals. And, of course, each of these three explanations for Katz’s failure can be folded into other “deeper” explanations. For instance, one could (theoretically) claim that judges are biased in favor of law enforcement because of the media’s portrayal of crime. As a result, when one seeks to isolate sources of positive accounts one is oftentimes limited to patterns and themes. 158 24 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 Perhaps the most common explanation for Katz’s failure is the vagueness of Katz.161 Professor Katz, for instance, has complained that Justice Stewart’s majority opinion “provided modest guidance for determining the justifiability of an expectation of privacy in other contexts.”162 Professor Maclin has written that proclaiming “‘the Fourth Amendment protects people, not places’ tells us nothing.”163 Scholars have also focused their vagueness critique on Justice Harlan’s two-part test. The meaning of “reasonable expectations,” and the content of “privacy,” is left to the wide discretion of the interpreter.164 As one commentator put it: “Justice Harlan’s formula raised but did not fully answer the question of what kind of knowledge would be useful in discerning just what grants of privacy society is prepared to recognize as reasonable.”165 If this were not frustrating enough, there is the additional interpretive task of assimilating Katz’s concurring and majority opinions.166 Remember that Justice Harlan’s concurrence stated that Fourth Amendment protection “generally” attaches to only particular locations: “The question . . . is what protection [privacy] affords to those people,” and “[g]enerally . . . the answer to that question requires reference to a ‘place.’”167 Harlan moreover reasoned that the Fourth Amendment applied to Katz because “an enclosed telephone booth is an area . . . like a home” where “occupants’ expectations of freedom 161 See Amsterdam, supra note 49, at 385 (stating that Katz fails to offer a comprehensive test for applying the amendment); Cloud, supra note 143, at 27 (“[E]ven this new standard did little to constrain judicial discretion.”); Lewis R. Katz, In Search of a Fourth Amendment for the Twenty-First Century, 65 IND. L.J. 549, 562 (1990) (“A seminal case should provide a framework for its later application. However, the seminal quality of Katz lies in its understanding of what the [F]ourth [A]mendment is about rather than in the clarity of its rule.”); Kerr, supra note 135, at 505 (“Supreme Court opinions cannot even agree on what kind of test it is. Is it descriptive? Is it normative? Just what does it measure?”). 162 Katz, supra note 161, at 559–60. See also THOMAS K. CLANCY, THE FOURTH AMENDMENT 59 (2008) (“[T]he [Katz] Court’s embrace of privacy was not without reservation and [Justice] Stewart did little to explain what he meant by the term.”); Edmund W. Kitch, Katz v. United States: The Limits of the Fourth Amendment, 1968 SUP. CT. REV. 133, 137–38 (identifying ambiguities in the Katz opinion, and noting that because of the Harlan concurrence, “it seems clear that the [majority] opinion is intentionally ambiguous”). 163 Maclin, supra note 88, at 74. 164 See Kyllo v. United States, 533 U.S. 27, 34 (2001) (noting that Katz’s expectations test “has often been criticized as circular, and hence subjective and unpredictable”); Kerr, supra note 135, at 504–05 (“But no one seems to know what makes an expectation of privacy constitutionally reasonable. . . . [T]he meaning of the phrase ‘reasonable expectation of privacy’ remains remarkably opaque.” (internal quotation marks omitted)); id. at 505–06 (arguing that Katz is sufficiently vague to allow the Court to draw from one of four programs, some of which are without privacy content). 165 Simon, supra note 124, at 954. 166 Ric Simmons, From Katz to Kyllo: A Blueprint for Adapting the Fourth Amendment to Twenty-First Century Technologies, 53 HASTINGS L.J. 1303, 1312 (2002) (noting that Justice Harlan’s reformation of the rule of Katz “sits somewhat awkwardly alongside the majority opinion and makes it more difficult to give meaning to the vague ‘reasonable expectations of privacy’ test”). 167 Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 25 from intrusion are recognized as reasonable.”168 Professor Sklansky has claimed this part of Harlan’s analysis creates ambiguity when juxtaposed with Katz’s “grand proclamation[s] . . . [to protect] people, not places.”169 This vagueness of Katz, the argument goes, has caused confusion.170 And from this confusion has come ratification of preKatz rules, deviation from public expectations of privacy, and incorporation of nonprivacy value schemes into the Katz test.171 In addition to the vagueness of Katz, some scholars place the blame for Katz’s failure on the inaccessibility of good empirical data. Professor Faigman has written about the importance of empirical findings to combat the judiciary’s factual assumptions in many areas of constitutional adjudication.172 Dean Post has written that “there can ultimately be no other measure of privacy than the social norms that actually exist in our civilization.”173 As a result, Professor Slobogin concludes that “we must measure [social norms] if we care about privacy.”174 More particularly, the Katz test, turning on “reasonable expectations” of privacy, “purports to be an empirical metric of societal views on privacy.”175 Scholars attribute Katz’s failure to the lack of accessible empirical data on privacy expectations.176 They point out, for one, that such data were unavailable for the first twenty-five years after Katz.177 And while empirical studies have become more commonplace over the past two decades,178 it is often claimed that 168 Id. at 360–61. Sklansky, supra note 7, at 158–60 (“[W]hile repeatedly reaffirming that the Fourth Amendment protects people not places, the Court has simultaneously made clear that—just as Harlan opined—the extent of the protection generally requires reference to a place.” (internal quotation marks omitted)). The “vagueness” explanation differs from the “concreteness” explanation offered infra in Part II.B.1. See discussion infra Part III.C. 170 See, e.g., Maclin, supra note 88, at 95 (“The problem with Katz is that it was so lacking in substance and subject to judicial manipulation that it could mean anything to anyone.”). The ineffectuality of an ambiguous “redefinition” (like “reasonable expectations of privacy”) is heightened when imposed upon a concrete term like “search.” See infra notes 258–60 and accompanying text. As a result, any positive account of Katz’s failure which does not address the concreteness of “search” is incomplete. 171 The justices reliance on old rules, subjective views of privacy, and property concepts is a result of either a sense of judicial duty or pure juridical objectives. 172 DAVID L. FAIGMAN, CONSTITUTIONAL FICTIONS: A UNIFIED THEORY OF CONSTITUTIONAL FACTS 162–63 (2008). 173 Robert C. Post, Three Concepts of Privacy, 89 GEO. L.J. 2087, 2094 (2001). 174 Slobogin, supra note 146, at 1602. 175 Solove, supra note 4, at 1521. See also Wasserstrom & Seidman, supra note 135, at 28 n.39 (“As Justice Harlan recognized in the beginning, an inquiry into ‘reasonable expectations of privacy’ necessarily has both a normative and empirical dimension.”). 176 Solove, supra note 4, at 1521 (explaining that the Court “has never cited to empirical evidence” to analyze whether an expectation of privacy is reasonable). 177 The first important empirical survey of privacy expectations was the Slobogin & Schumacher study published in 1993. See generally Slobogin & Schumacher, supra note 147. 178 See supra note 147 and accompanying text. 169 26 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 (1) the studies are inadequate;179 or (2) the Court is not adequately trained to incorporate the studies into its decisionmaking.180 The inaccessibility of reliable empirical data on privacy expectations is thought by some to have caused justices (subconsciously or otherwise) to rely on pre-Katz rules, their subjective privacy views, or common-law property principles.181 Scholars alternatively attribute Katz’s failed promise to the justices’ efforts to maximize their juridical or policy preferences.182 It is common, after all, for commentators to attribute Fourth Amendment holdings to “judicial fiat,”183 “dishonest judging,”184 and “shifting Court majorities” which can “manipulate” the law “at will.”185 Various types of judicial preferences have been discussed in the literature. One category focuses on preferred interpretive methodologies such as stare decisis or originalism. Professor Sklansky, for instance, has argued that some justices hold “an alternative vision of 179 Orin S. Kerr, Do We Need a New Fourth Amendment?, 107 MICH. L. REV. 913, 959–60 (2009) (arguing that Professor Slobogin’s “intrusiveness” standard “does not actually measure how much a technique infringes on civil liberties” and that the public cannot accurately evaluate the invasiveness of physical and transactional surveillance because the media associates these techniques with “Big Brother”); Solove, supra note 4, at 1522 (critiquing parts of Slobogin’s surveys). 180 See Kerr, supra note 179, at 964–65 (identifying representation problems (e.g., state, region, race, or age), problems if public opinion changes, problems with determining how they’ve changed, and problems with reconciling dueling surveys); Joelle Anne Moreno, Beyond the Polemic Against Junk Science: Navigating the Oceans that Divide Science and Law with Justice Breyer at the Helm, 81 B.U. L. REV. 1033, 1081 (2001) (“Legal scholars and practitioners . . . are often confounded by the principles of statistical analysis, risk assessment, probabilistic attribution, and attendant mathematical jargon.”) Slobogin, supra note 146, at 1607 (“In fairness to the courts . . . [empirical] facts are not easy to come by.”). 181 The justices’ turn to old rules, subjective views of privacy, and property concepts is a result of either a sense of judicial duty or pure juridical objectives. 182 LEE EPSTEIN & JACK KNIGHT, THE CHOICES JUSTICES MAKE 23 n.a (1998) (“[M]ost justices, in most cases, pursue policy; that is, they want to move the substantive content of law as close as possible to their preferred position.”); RICHARD A. POSNER, HOW JUDGES THINK 286 (2008) (stating that there are few issues that “a really skillful legal analyst cannot cover with a professional varnish”). Unlike the first two prevailing explanations (vagueness and inaccessible empirics), this argument holds that justices have not been making a good-faith effort to sincerely apply the Katz standard. 183 ROSEN, supra note 143, at 63. 184 Professor Slobogin has written that “honest judging” would have indeed recognized that empirically derived privacy expectations are crucial. See Slobogin, supra note 146, at 1607 n.102 (“An institution that surrenders its authority to define the empirical world loses a considerable amount of its power.” (quoting Faigman, supra note 172, at 16)); Solove, supra note 4, at 1522 (“The Court rarely takes any steps to determine what society deems reasonable.”). 185 CLANCY, supra note 162, at 68; Colb, supra note 4, at 122 (explaining that deviation from Katz’s foundation is attributed to “knowing exposure” moves made consciously though never expressed); Kathryn R. Urbonya, A Fourth Amendment “Search” in the Age of Technology: Postmodern Perspectives, 72 MISS. L.J. 447, 477 (2002) (“With these diverse and contrasting rhetorical arguments, the Court gets to choose how to frame and resolve a decision.”). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 27 search-and-seizure jurisprudence” which is “anchored securely in eighteenth-century common law.”186 A second subset of the preferences literature attributes “search” holdings to the justices’ interests in particular law enforcement policies. Professor Cloud has explained how the justices have used Katz to advance their societal goal of efficient law enforcement.187 And Professor Kerr has recently argued that Fourth Amendment decisions flow not from sincere applications of Katz but from the judiciary’s interest in maintaining equilibrium between law enforcement and the ability of criminals to evade detection.188 A third set of scholars have attributed “search” decisions to the justices’ interest in the just punishment of guilty persons.189 The threat of an exclusionary sanction, goes the argument, triggers a sort of “hydraulics” effect,190 which in turn causes the justices (subconsciously or otherwise) to interpret the term “search” in ways to avoid outcomes where the “criminal goes free.”191 Professor Bradley, for one, has written that Courts “strive[ ] to justify” challenged police behavior “by stretching existing doctrine to accommodate it.”192 Professor Amar has made the point in more 186 Sklansky, supra note 7, at 161. See also Frederick Schauer, Rules and Rule of Law, 14 HARV. J.L. & PUB. POL’Y 645, 682–83 (1991) (explaining that the rule with local priority will typically prevail over the more general one in a system which preserves rule-based decisionmaking). 187 See Cloud, supra note 3, at 590–91 (discussing the open fields doctrine). 188 See Kerr, supra note 7, at 480 (“It is] a judicial response to changing technology and social practice. When new tools and new practices threaten to expand or contract police power in a significant way, courts adjust the level of Fourth Amendment protection to try to restore the prior equilibrium.”). 189 See Stuntz, supra note 7, at 913. 190 Luke M. Milligan, Congressional End-Run: The Ignored Constraint on Judicial Review, 45 GA. L. REV. 211, 250–51 (2010). For analyses of hydraulics in different contexts, see generally Samuel Issacharoff & Pamela S. Karlan, The Hydraulics of Campaign Finance Reform, 77 TEX. L. REV. 1705 (1999); Michael S. Kang, The Hydraulics and Politics of Party Regulation, 91 IOWA L. REV. 131, 149 n.60 (2005). 191 See, e.g., Coolidge v. New Hampshire, 403 U.S. 443, 490 (1971) (Harlan, J., concurring) (application of exclusionary rule to state courts is responsible for “serious distortions and incongruities” in search-and-seizure law); Sherry F. Colb, Innocence, Privacy, and Targeting in Fourth Amendment Jurisprudence, 96 COLUM. L. REV. 1456, 1512 (1996) (“Scholars have often argued that the reason the Supreme Court sometimes makes the doctrinal mistake of taking a defendant’s guilt into account in determining whether there has been a search is that the exclusionary rule distorts the meaning of the Fourth Amendment by making the viability of a criminal conviction turn on a narrow interpretation of the Fourth Amendment right, an interpretation which will then apply to guilty and innocent alike”); Donald Dripps, The Case for the Contingent Exclusionary Rule, 38 AM. CRIM. L. REV. 1 (2001) (urging adoption of a discretionary exclusionary rule that would permit judges to charge the state money damages, if the state agrees, in lieu of suppressing evidence, following a successful suppression motion); Monrad G. Paulsen, The Exclusionary Rule and Misconduct by the Police, 52 J. CRIM. L., CRIMINOLOGY & POLICE SCI. 255 (1961); Stuntz, supra note 7, at 912–13. For a discussion of how these biases interact with the atomic code, see infra Part III.C. 192 Bradley, supra note 4, at 1470. 28 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 concrete terms: “Judges do not like excluding bloody knives, so they distort doctrine, claiming that the Fourth Amendment was not really violated.”193 These identified causes of Katz’s failure—vagueness of standard, inaccessible empirical data, and policy maximization—seem impervious to any form of treatment short of overturning Katz. As a result most commentators who subscribe to Katz’s concept of an objective and evolving privacy standard have, for practical reasons, called for Katz’s repeal.194 But what if there existed an alternative, heretofore unrealized, cause of Katz’s failure? And what if this “new” cause, upon discovery, turned out to be more responsive to treatment than the causes previously identified? The identification of a new and treatable cause of Katz’s failure would almost certainly breathe new life into Katz’s aspirations regarding an objective and evolving privacy standard.195 And so with the objective of salvaging Katz (or, at the very least, providing a more complete explanation of Katz’s failure) the next part of this article sets forth a new positive account of the Supreme Court’s “search” interpretations. 193 Amar, supra note 3, at 799. A variation on this theory is that the justices’ exposure over time to guilty persons’ cases makes them less sensitive to violations of “good” citizens’ rights and thereby results in stricter “search” interpretations. For more general arguments about judicial biases rooted in the “establishment-oriented” judicial system, see Anthony Amsterdam, The Supreme Court and the Rights of Suspects in Criminal Cases, 45 N.Y.U. L. REV. 785 (1970). For a discussion of how these biases interact with the atomic code, see infra Part III.C. 194 Christian M. Halliburton, How Privacy Killed Katz: A Tale of Cognitive Freedom and the Property of Personhood as Fourth Amendment Norm, 42 AKRON L. REV. 803, 812 (2009) (arguing that Katz should turn on Margaret Radin’s notion of property); Slobogin, supra note 146, at 1588 (calling for incorporation of empirics and stating that “justification for a government search or seizure ought to be roughly proportionate to the invasiveness of the search or seizure”); Solove, supra note 4, at 1512 (“For a long time, I believed that with the appropriate understanding of privacy—one that is well-adapted to modern technology, nimble and nuanced, forward-looking and sophisticated—Fourth Amendment jurisprudence could be rehabilitated. I now realize I was wrong.”); James J. Tomkovicz, Beyond Secrecy for Secrecy’s Sake: Toward an Expanded Vision of the Fourth Amendment Privacy Province, 36 HASTINGS L.J. 645, 737 (1985) (proposing an “instrumental approach to resolving fourth amendment threshold questions [that] will further [the] realization of the full potential of the Katz revolution”). 195 Katz, supra note 161, at 554–55 (“[W]e should return to the privacy test intended by [Justices] Stewart and Harlan and to the underlying values that motivated it.”); Scott E. Sundby, “Everyman’s” Fourth Amendment: Privacy or Mutual Trust Between Government and Citizen?, 94 COLUM. L. REV. 1751, 1755–56 (1994) (arguing that Katz could be the framework for the future of trust in the government); Wasserstrom & Seidman, supra note 135, at 22 (“Most commentators want to amputate the limb to save the patient. We prefer to treat the wound with the hope that a cure also will eliminate the low-level infection coursing throughout the body.”); Swire, supra note 137, at 905 (arguing that with the development of new technology, Katz may be “dead for [its] core facts,” but that “Fourth Amendment doctrine should continue to play a role in governing . . . high-tech searches”); Daniel B. Yeager, Search, Seizure and the Positive Law: Expectations of Privacy Outside the Fourth Amendment, 84 J. CRIM. L. & CRIMINOLOGY 249, 308 (1993) (arguing that though the test is flawed, “[w]hen the government is behaving lawfully, Katz acts as a backstop, as a second look at whether the positive law fairly reflects a given defendant’s expectations”). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 29 II. THE ATOMIC CODE Over the decades commentators have offered various explanations for the arc of Olmstead and the failure of Katz. Yet the search-and-seizure literature has overlooked one particularly attractive account of these phenomena. The overlooked description is a set of interpretive rules that I have termed the “atomic code.” This atomic code of “search” interpretations has been roughly identified by a string of recent decisions beginning with City of Ontario v. Quon.196 This part summarizes the Quon case, introduces the atomic code, and identifies its root causes. A. Contours of a New Description 1. The Quon Decision Jeff Quon, a police officer employed by the City of Ontario, California, was issued a pager to receive and send work-related messages.197 The city’s contract with the service provider set a monthly limit on the number of characters each pager could send or receive.198 After Quon and others in the department exceeded the character limit, the police chief contacted the service provider to verify that the overages were attributable to work-related messaging.199 In the chief’s review of the text-message transcripts he discovered that some of Quon’s messages were sexually explicit.200 Upon being disciplined for violating police department policy, Quon filed suit, alleging that the department violated, among other things, his Fourth Amendment rights.201 The district court granted summary judgment on the grounds that the search of Quon was “reasonable,”202 the Ninth Circuit reversed,203 and the Supreme Court granted certiorari. Two issues were before the Court: was the acquisition and review of the text message transcripts a “search” under the Fourth Amendment; and, if so, was such search “reasonable” pursuant to the rules relating to government employees?204 In addressing the first issue (whether there was a “search”), the eight-justice majority, in an opinion authored by Justice Kennedy, began by explaining the factors that should be considered 196 130 S. Ct. 2619 (2010). The central principles of the atomic code have been further affirmed, to varying degrees, by Davis v. United States, 131 S. Ct. 2419 (2011) and United States v. Jones, 132 S. Ct. 945 (2012). See infra Part II.A.2. 197 Quon, 130 S. Ct. at 2625. 198 Id. Usage exceeding this limit would result in an additional fee. Id. 199 Id. at 2625–26. 200 Id. at 2626. 201 Id. 202 Id. at 2626–27. 203 Id. at 2627. The panel agreed that he had an expectation of privacy but believed the search was “unreasonable.” Id. 204 Id. at 2630. 30 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 in a proper analysis of “search.”205 But after framing the analysis, the majority pulled up short. It announced that it would be inappropriate to undertake a “search” analysis in Quon’s case. Justice Kennedy wrote: The Court must proceed with care when considering the whole concept of privacy expectations and communications made on electronic equipment owned by a government employer. The judiciary risks error by elaborating too fully on the Fourth Amendment implications of emerging technology before its role in society has become clear. . . . Prudence counsels caution before the facts in the instant case are used to establish far-reaching premises that define the existence, and extent, of privacy expectations enjoyed by employees when using employer-provided communication devices.206 Such “elaboration” is particularly dangerous, observed the majority, when it concerns evolving technologies. “Rapid changes in the dynamics of communication and information transmission,” wrote Justice Kennedy, “are evident not just in the technology itself but in what society accepts as proper behavior.”207 And “[a]t present, it is uncertain how workplace norms, and the law’s treatment of them, will evolve.”208 The majority concluded that “a broad holding concerning employees’ privacy expectations vis-à-vis employer-provided technological equipment might have implications for future cases that cannot be predicted. It is preferable to dispose of this case on narrower grounds.”209 And so the Court assumed “for present purposes” that the “review of the 205 Id. (“Cell phone and text message communications are so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identification. That might strengthen the case for an expectation of privacy. On the other hand, the ubiquity of those devices has made them generally affordable, so one could counter that employees who need cell phones or similar devices for personal matters can purchase and pay for their own. And employer policies concerning communications will of course shape the reasonable expectations of their employees, especially to the extent that such policies are clearly communicated.”). 206 Id. at 2629 (citations omitted). Here the justices expressed concern about “the judiciary” as a whole weighing in before the public’s views have formed. Note how this differs from a judicial policy to facilitate consensus at the circuit-court level. Cf. ROBERT L. STERN ET AL., SUPREME COURT PRACTICE 228 n.18 (8th ed. 2002) (“In some cases the Justices may feel that the time is not ripe for the Court to resolve a conflict, preferring to await further litigation that might produce a consensus or a satisfactory majority view among the lower courts.”); id. at 230 (addressing “those of my Colleagues who agree with me [on the merits of the issue] but believe that this Court should postpone consideration of the issue until more state supreme courts and federal circuits have experimented with substantive and procedural solutions to the problem” (internal quotation marks omitted) (quoting Gilliard v. Mississippi, 464 U.S. 867 (1983) (Marshall, J., dissenting from denial of certiorari))). 207 City of Ontario v. Quon, 130 S. Ct. at 2629. 208 Id. at 2630. 209 Id. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 31 transcript constituted a search within the meaning of the Fourth Amendment.”210 The Court then went on to find that under the workplace doctrine the “search” of Quon was a “reasonable” one.211 2. Understanding Quon From the concerns expressed by the Quon Court one can infer a set of implicit rules that regulate the judiciary’s interpretation of “search.” First, the Quon majority stated its concern that, because the members of the Court lacked “knowledge and experience” about workplace-issued electronic devices, any “search” decision would require the Court to “use” the “facts” of the Quon case to “establish far-reaching premises.”212 This seemed to imply that, had the “search” issue been resolved, it would have inevitably turned on analogical reasoning.213 Second, the majority was worried that even though future courts will likely be on “surer ground” regarding the related privacy expectations, they will have to abide by any “search” ruling in Quon. This reveals the Court’s view that future majorities would be bound by any “search” holding in Quon, and, moreover, that subsequent decisions in other areas of the Fourth Amendment would have little impact, if any, on future cases whose facts are similar to those in Quon. The concerns of the Quon Court, while only roughly articulated, raise the specter of a new positive account of Fourth Amendment “search” decisionmaking. The interpretive rules inferred from the Quon majority opinion seem to incorporate past decisions by Court “majorities” (rather than the votes of individual justices).214 But at casual glance one realizes that a “majority-centric” model would lack suitable descriptive power. The “majority-centric” approach would fail to explain, among other things, the entrenched dissenting views of the Olmstead era.215 As a result this article elaborates on a variation of the Quon code: it shifts the analysis away from “Court majorities” and to the “individual justice.”216 This “justice-centric” code provides that 210 Id. Id. at 2630–31. 212 Id. at 2629. 213 See Kerr, supra note 5, at 875–76 (“Judges struggle to understand even the basic facts of such technologies, and often must rely on the crutch of questionable metaphors to aid their comprehension.”); Brief for Respondents at 61, City of Ontario v. Quon, 130 S. Ct. 2619 (2010) (No. 08-1332) (analogizing Quon’s texting to Katz’s use of a public phone booth). 214 Readers may even acknowledge ambiguity on this point. Quon, 130 S. Ct. at 2630 (discussion of the “implications for future cases” leaves open the possibility that this is because such cases will be disposed of by members of the Quon Court—all of whom will have committed content to a new atom). 215 See, e.g., Lopez v. United States, 373 U.S. 427 (1963) (Brennan, J., dissenting); On Lee v. United States, 343 U.S. 747 (1952) (Frankfurter, J., dissenting); Goldman v. United States, 316 U.S. 129 (1942) (Frankfurter, J., dissenting). 216 Setting aside whether Quon was focused on “individuals” or “majorities,” the “individual” take seems to have more explanatory power. Raising the possibility of a new explanation for Katz’s failure has the added benefit of presenting an opportunity for a new treatment. 211 32 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 (1) justices view “search” doctrine as an aggregation of “search” parts (or atoms); (2) content for each justice’s atom is attributed through analogical reasoning; and (3) justices do not reassess the content of their atoms after initial attributions. Taking this positive account, one sees that a Court holding is, in effect, simply a majority of justices who share a conclusion about content in a given case.217 The following subsections explain this in greater detail. a. Atoms The interpretive “atomism” implied by Quon deserves a more thorough explanation. By “atomic” I mean that the continuum of possible government activities are broken into parts, that these parts become labeled either a “search” or “non-search,” and that each part of “search” case law remains relatively insulated from the other.218 Each part, or “atom,” covers a discrete field of potential government behavior. In a simple model a justice might conceive of an “aerial surveillance” atom, a “home entry” atom, a “car entry” atom, an “electronic eavesdropping” atom, and an “informant” atom. Each individual atom, upon reflection, becomes catalogued by the justice as either a “search” or a “non-search.”219 Importantly, the justice does not feel much compulsion to cohere these five atoms into something that is meaningful or sound in the whole.220 Quon suggests that the “search” doctrine is atomistic. This can be inferred from the majority’s strident concerns about any merits-holding binding future courts. If the “search” doctrine were not atomistic but coherent, a future Court would not be as concerned about its decision “binding” future courts. Justices of future courts would be able to avoid applying an unfavored “search” holding (to even similar factual circumstances) by simply citing to (1) an updated application of the “expectations of privacy” 217 See, e.g., Katz v. United States, 389 U.S. 427 (1967) (eight justices attributing “search” to their “wiretap” atoms); Olmstead v. United States, 277 U.S. 438 (1928) (five justices attributing “non-search” to their “wiretap” atoms). 218 For a classic debate between atomism and coherence, compare United States v. White, 401 U.S. 745, 750 (1971) (“We see no indication in Katz that the Court meant to disturb that understanding of the Fourth Amendment or to disturb the result reached in the On Lee case, nor are we now inclined to overturn this view of the Fourth Amendment.”(footnote omitted)) with id. at 783 (Harlan, J., dissenting) (“To complete the tapestry, the strands of doctrine reflected in the search cases must be interwoven with the Court’s other contemporary holdings.”). 219 A justice’s attribution of content can be made through official adjudication or less formal means. 220 Justice Scalia recently stated in an interview that: “I just hate Fourth Amendment cases. . . . [Every case is so fact-specific that any particular opinion merely answers] variation 3,542.” Antonin Scalia, Interview with Susan Swain 13–14 (June 19, 2009) (transcript available at http://supremecourt.c-span.org/assets/pdf/AScalia.pdf). See Urbonya, supra note 185, at 493 (“The progeny of Katz fails to provide a coherent framework for predicting when an activity is a ‘search . . . .’”); Wasserstrom & Seidman, supra note 135, at 29 (stating that Fourth Amendment doctrine is cobbled together from “a series of inconsistent and bizarre results that [the Court] has left entirely undefended”). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 33 standard or (2) other “search” cases (even non-analogous ones) that supported a preferred outcome. To put it inversely: in an atomistic paradigm general “search themes” (be they principles or doctrinal charges) do very little to moderate the authority of past “search holdings.” And so the justices’ concern in Quon that general “search themes” would be unable, in the future, to moderate an unfavored “search holding” in Quon reflects the justices’ view that the “search” doctrine is atomistic.221 This atomistic view was again revealed in 2011 in Davis v. United States.222 In expanding the “good faith exception” of the exclusionary rule to officers’ reasonable reliance on binding appellate precedent, the Davis majority engaged in an extensive discussion of how Fourth Amendment holdings are insulated from one another.223 b. Code The two concerns raised by the Quon Court (that decisions will rest on analogical reasoning and bind future courts) also hint at a set of particular rules, or “code,” to govern the atomistic framework just identified.224 The first phase of the “search” code is “dormancy.” A given “search” atom exists for a justice for some period before that justice provides it with content.225 During these points in time the atom is dormant. In Quon the issue before the Court (i.e., whether reading personal communications made on government-employer–issued devices is a “search”)226 was clearly dormant for many of the justices. And the next term, in Davis, a majority of justices emphasized the concept of dormant atoms through a discussion of the dichotomy of “open” and “closed” issues.227 It is important to keep in mind that, because the atomic 221 It is possible that in a coherent model a merits decision could lead to unpredictable implications from the perspective of the present-day Court. Yet, the implications would not be (as found in atomism) beyond the control of future majorities. 222 Davis v. United States, 131 S. Ct. 2419 (2011). 223 Id. at 2431–33 (citing Arizona v. Gant, 129 S. Ct. 1710 (2009)). The Court stated that once a Fourth Amendment issue is decided there is very little chance that later decisions will be able to undermine its authority. Id. This view was further reiterated in United States v. Jones, 132 S. Ct. 945 (2012), last term when the majority, in lieu of evaluating expectations of privacy in terms of GPS devices, restructured the “search” standard by adding an alternative “trespass” test. Id. The addition of a “trespass” test potentially suggests that the Court has become frustrated with the constraints of the atomic code. See infra Part II.B.1 (discussing relative impacts of concrete and abstract standards); infra notes 459–60 (discussing the Jones Court’s reformation of the “search” test to avoid the constraints of the atomic code). 224 Quon, 130 S. Ct. at 2629–30. 225 One can think of search “atoms” as dormant during that period, however short, when the justice is aware of the possibility of such government action but has not yet fully deliberated upon the “search” implications. 226 130 S. Ct. at 2624. 227 In the context of the good faith exception to the exclusionary rule, criminal defendants, after Davis, are unable to benefit from an officer’s reasonable reliance on “closed” issues. Davis, 131 S. Ct. 2419. 34 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 code is “justice-centric,” the period of dormancy of a given atom will vary from justice to justice.228 The second phase of the code is “attribution.” Over time, a justice will reflect on whether certain dormant atoms should be classified as a “search” or “non-search.” During this process a justice will survey her “old” atoms (i.e., those to which she has previously attributed content). Only through analogy to one of these old atoms will the justice attribute content to a dormant atom.229 This analogical-based form of attribution was emphasized by the Quon Court. The majority explained that because it lacked “knowledge and experience” about the expectations of privacy at issue, any ruling on the merits would “establish far-reaching premises” through the “use” of the “facts” in Quon’s case.230 It should be noted that attribution to a dormant atom requires only reflection (not judicial office).231 Attribution can therefore take place outside the context of adjudication (and even before the justice joins the Court).232 The code’s third phase, after dormancy and attribution, is “maintenance.” After assignment of content, a justice will not reassess the content of that particular atom again.233 The Quon Court expressed its concern that any merits decision would bind future justices (including the current justices who, in a future case, might be on “surer ground” about the privacy expectations at stake).234 And the Davis Court, the next year, explained that the justices only rarely change their minds regarding Fourth Amendment 228 This is because justices reflect on the content of the atom at different times. For example, a justice may not have been on the Court at the time when many of his colleagues attributed content to a particular atom. See also discussion infra notes 331–40 and accompanying text (explaining how some of the justices avoided attributing content to their “wiretap” atoms by relying on new atoms, see Silverman v. United States, 365 U.S. 505 (1961), and through prioritizing other old atoms, see Lopez v. United States, 373 U.S. 427 (1963)). 229 Cass R. Sunstein, Commentary, On Analogical Reasoning, 106 HARV. L. REV. 741, 755–57 (1993) (discussing the role of “classification” in “analogical reasoning”). Analogical attributions will inevitably bring some degree of coherence to “search” case law. This does not, however, undermine the claim that “search” decisionmaking is atomistic. See supra note 221. 230 130 S. Ct. at 2629; see Kerr, supra note 5, at 875–76 (explaining that the justices rely on “questionable metaphors” in “search” cases involving new technologies); see also Brief for the Respondent, City of Ontario v. Quon, 130 S. Ct. 2619 (2010) (No. 08-1332) at 61 (analogizing Quon’s texting to Katz’s use of a public phone booth). Although the majority passed on the “search” issue, and suggested that it would wait until it did not have to rely on analogical reasoning, see Quon, 130 S. Ct. at 2829, this does not change the fact that, for the past century, the Court has turned to such reasoning to give content to dormant atoms. 231 See supra note 225 and accompanying text. 232 See United States v. White, 401 U.S. 745, 795–96 (1967) (Marshall, J., dissenting) (drawing from views on “informants” from before he joined the Supreme Court); United States v. Pineda-Moreno, 617 F.3d 1120, 1126 (9th Cir. 2010) (Kozinski, J., dissenting) (explaining his position that GPS surveillance is a “search” through allusions to his experiences growing up in a Communist state). For further discussion, see infra Part III.C. 233 For discussion of two exceptions to this claim, see supra note 16. 234 Quon, 130 S. Ct. 2619, 2629 (2010). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 35 issues.235 One can think of this as stare decisis writ small: a justice (but not necessarily the Court) will decide like cases alike.236 And so the overturning of “search” precedent is not the result of a majority’s new attribution of content but, more accurately, a new majority of initial attributions. Maintenance, along with attribution and dormancy, constitute the code of the “search” atomic framework. Revealed in its rough contours in Quon (and, to a lesser extent, Davis), the atomic code seems a plausible candidate for a new positive account of “search” interpretations. But before testing the code’s descriptive force, it is important to first discern how the atomic code came to be. B. Sources of the Atomic Code The atomic code is not simply a function of vague doctrinal tests, inaccessible empirical data, or the types of judicial bias highlighted in the prevailing literature. Instead it is in large part attributable to two factors that have been overlooked by search-and-seizure commentators.237 One is the concreteness of the term “search.” The other is the justices’ preference for a calibrated retroactivity of criminal procedure rules.238 235 Davis v. United States, 131 S. Ct. 2416, 2424 (2011) (citing Chimel v. California, 395 U.S. 752 (1967)); see also Arizona v. Gant, 129 S. Ct. at 1717–18 (overruling the “interior compartment” rule from New York v. Belton, 453 U.S. 454 (1980)). Earlier reversals in the Fourth Amendment context include Katz v. United States, 389 U.S. 347 (1967) (overruling Olmstead v. United States, 277 U.S. 438 (1928)); Warden, Md. Penitentiary v. Hayden, 387 U.S. 294, 301–04 (1967) (overruling the mere evidence rule from Gouled v. United States, 255 U.S. 298 (1921)); and Hale v. Henkel, 201 U.S. 43, 76–77 (1906) (overruling the business papers aspect of Boyd v. United States, 116 U.S. 616 (1886)). The “maintenance” assertions in Quon and Davis seem to reflect a consensus in the prevailing search-and-seizure literature. See Kerr, supra note 179, at 934; Slobogin, supra note 146, at 1606 (acknowledging that Professor Kerr is “correct” that “the Supreme Court has never formally applied societal expectation of privacy analysis to police conduct that has already been designated a search”); see also Maclin, supra note 88, at 100 (stating that if the Court were “forced to revisit the constitutionality of pen registers, it is highly likely that the current Court would reaffirm Smith’s holding notwithstanding the result in Kyllo”); id. at 105 (“Sooner or later, the Court will have the opportunity to address the conflict between Kyllo and Place. When that occasion arises, my prediction is the Court will give Kyllo a narrow reading and extend Place’s holding to authorize dog sniffs of private residences.”). 236 It is plausible (if not likely) that the Court in Quon and Davis was referencing a “Courtcentric” atomic code. For a discussion of why a “justice-centric” approach is more accurate, see supra note 228 and accompanying text. 237 The “atomic code” would be a unique positive account even if its sources were not unique from the prevailing explanations for “search” interpretations. See supra discussion Part I.B.3. 238 There are of course other forces contributing to the atomic code. The vagueness of “expectations of privacy,” for example, certainly compounds the impact caused by the “concreteness” of the term “search.” See infra Part II.B.1. 36 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 1. Concreteness of “Search” Psycholinguistics is the “[s]tudy of the mental processes involved in the comprehension, production and acquisition of language.”239 One focus of the psycholinguistics literature is the difference between “concrete” and “abstract” words.240 The difference turns on the existence of “perceptual referents.”241 Professor Paivio has explained that “terms like horse and wagon” are “concrete” because they have “direct, observable referents.”242 These are to be distinguished from “terms like truth and beauty that have no direct referents.”243 Concreteness has many effects. All things being equal, concrete words are (1) more rapidly learned,244 (2) better recalled,245 and (3) defined with more precision.246 By “precision” I mean that humans are more disciplined in their assessment 239 Encyclopedia Britannica (2009), http://www.credoreference.com/entry/ebconcise /psycholinguistics. 240 See, e.g., Allan Paivio, Dual Coding Theory: Retrospect and Current Status, 45 CAN. J. PSY. 255, 256 (1991); Shi Feng et al., Simulating Human Ratings on Word Concreteness, ASS’N FOR THE ADVANCEMENT OF ARTIFICIAL INTELLIGENCE 245, 246 (2011) (explaining that words can have different levels of concreteness). 241 ALLAN PAIVIO, MENTAL REPRESENTATIONS: A DUAL-CODING APPROACH 123 (1986) (“[C]oncrete and abstract words are semantically differentiated by the degree of availability of referential interconnections.”). Concrete words have both referential and verbal-associative meaning; abstract words, on the other hand, depend more on verbal-associative interconnections for their meanings. Id.; see also Feng et al., supra note 240, at 245 (“Concrete words such as house, poodle, and tiger evoke mental images quickly and easily in contrast to less concrete words such as causality, evolution and mortal.”). 242 PAIVIO, supra note 241, at 11. 243 Id. 244 JOHN LUTZ, AN INTRODUCTION TO LEARNING AND MEMORY, 233 (1994) (citing Allan Paivio et al., Noun Imagery and Meaningfulness in Free and Serial Recall, 79 J. EXPERIMENTAL PSYCHOL. 509 (1969)). Professor Paivio observed that “images represent a separate component of meaning, at least somewhat independent of the verbal associations given to a word” and that “high imagery words are more rapidly learned and better recalled than low imagery words, even when the two sets of words are equated for meaningfulness and familiarity.” Id. (citing ALLAN PAIVIO, IMAGERY AND VERBAL PROCESS (1971); see also THOMAS H. LEAHEY & RICHARD J. HARRIS, HUMAN LEARNING 143–44 (1985) (discussing the benefits of imagery in learning and comprehending language, in encoding information for transfer to long-term memory, and in performing different types of mental rotation operations); Feng et al., supra note 240, at 248 (“Words with higher concreteness are easier to imagine, comprehend, and memorize.”). 245 See LUTZ, supra note 244, at 233. 246 PAIVIO, supra note 241, at 170–71 (“[I]t is known that semantic or associative overlap is generally higher among abstract than among concrete words . . . .”); id. at 233 (“Analysis of the definitions showed that the concrete words, relative to the abstract ones, elicited longer definitions . . . . [C]oncrete words were generally easier to define . . . .”). Professor Paivio summarized studies finding that abstract words are more liable to different interpretations by the speaker and listener. Id. (discussing how concrete words are subject to “fewer nonfluencies of other types”). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 37 of whether a “particular” is subsumed within a word’s definition. Discipline manifests in two ways. First, there is an increased “maintenance” of established-particulars.247 Once a person has evaluated whether a certain particular is subsumed within a definition of a given word, and made a commitment one way or the other, she will resist reevaluating that established commitment. Second, the evaluation of candidate-particulars is more mechanical.248 When a person is faced with the issue of whether a candidateparticular is subsumed within the definition of a given word, she will not feel comfortable imposing her preferences freely. Rather, she will be compelled to analogize the candidate-particular to either established-particulars (i.e., those already deemed to be subsumed within the word) or established non-particulars (i.e., those already deemed to be not subsumed within the word).249 Assume a person is charged to interpret whether the candidate-particular “Dachshund” is subsumed by the word “dog.” The interpreter will likely conclude that a “Dachshund” is in fact a “dog” through an analogy to the established-particulars of “dog.” To illustrate: Although “smaller” and “darker” than a “Samoyed,” the “Dachshund” shares with the “Samoyed” the characteristics of “being a mammal,” “walking on its toes,” “having non-tractile claws,” and “possessing a body adapted for chasing prey.” The degree of discipline in the interpretive program for concrete words is greater than that for abstract words. When it comes to abstract terms, persons feel far less discomfort using their preferences freely to reassess establishedparticulars and assess candidate-particulars. In both life and adjudication, justices are called upon to interpret words.250 Many such words (e.g., “excessive,” “process,” “liberty,” “establishment,” “unreasonable,” and “equality”) are relatively abstract. Others (e.g., “days,” “bail,” “war,” and “houses”) are more concrete. Along this continuum the word “search” registers as relatively concrete. The MRC Psycholinguistics Database rates the word “search” 371 for concreteness and 402 for imagability.251 “Search” is therefore easier to learn, harder to 247 See id. at 12. See id. at 13. 249 David E. Rumelhart, Toward a Microstructural Account of Human Reasoning, in SIMILARITY AND ANALOGICAL REASONING 298, 301 (1992) (“Most everyday reasoning does not involve much in the way of manipulating mental models. It probably involves even less in the way of formal reasoning. Rather, it probably involves assimilating the novel situation to other situations that are in some way similar—that is, reasoning by similarity.”); see Sunstein, supra note 229, at 743 (discussing analogical reasoning). 250 See, e.g., Cunningham, supra note 6, at 543–44 (discussing four interpretations of the word “search” that pervade Fourth Amendment jurisprudence). 251 See MRC Psycholinguistics Database. The MRC Psycholinguistic database is a leading source for “concreteness” ratings. Feng et al., supra note 240, at 245. The database aggregated survey data of participants who were asked to score the concreteness and imagery of words based on a numerical scale from 1 to 7. Id. at 246. The database contains 150,837 words and provides concreteness ratings for 8228 words. Id. Words referring to objects, materials, or persons tend to receive higher scores for concreteness. M.P. TOGLIA & W.F. BATTIG, HANDBOOK OF SEMANTIC WORD NORMS (1978). 248 38 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 forget, and defined with more discipline than its more abstract constitutional counterparts.252 As a result, the justices’ interpretation of “search” is marked by tendencies to (1) not reconsider established commitments (i.e., old “search” issues) and (2) evaluate candidate-particulars (i.e., new “search” issues) by resort to analogical reasoning.253 A good illustration of how concreteness constrains “search” interpretations is found in Justice Brennan’s dissenting opinion in Lopez v. United States: In every-day talk, as of 1789 or now, a man “searches” when he looks or listens. Thus we find references in the Bible to “searching” the Scriptures (John V, 39); in literature to a man “searching” his heart or conscience; in the law books to “searching” a public record. None of these acts requires a manual rummaging for concealed objects. . . . [J]ust as looking around a room is searching, listening to the sounds in a room is searching. Seeing and hearing are both reactions of a human being to the physical environment around him—to light waves in one instance, to sound waves in the other. And, accordingly, using a mechanical aid to either seeing or hearing is also a form of searching. The camera and the dictaphone both do the work of the end-organs of an individual human searcher—more accurately.254 The concreteness constraint is further reflected in Justice Black’s observation, in Berger v. New York, that “[i]t simply requires an imaginative transformation of the English language to say that conversations can be searched and words seized.”255 252 The concreteness of “search” does not necessarily mean that the justices turn to common sense interpretations of the term “search.” Cf. Cunningham, supra note 6, at 541–42 (advocating a “common sense” approach to interpretation of “search”). 253 It is not that the meanings (judicial or otherwise) of terms do not evolve over time, but rather that a particular interpreter will tend not to redefine a term during her life. See Rumelhart, supra note 249. 254 373 U.S. 427, 459 (1963) (Brennan, J., dissenting) (quoting United States v. On Lee, 193 F.2d 306, 313 (2d Cir. 1951) (Frank, J., dissenting)); see also Arizona v. Hicks, 480 U.S. 321, 325 (1987) (“A search is a search, even if it happens to disclose nothing but the bottom of a turntable.”); Jim Chen, Law as a Species of Language Acquisition, 73 WASH. U. L. Q. 1263, 1295 (1995) (“Every native speaker of American English knows these simple words and is prepared to debate their meaning, even in this legal context.”); Richard A. Epstein, A Common Lawyer Looks at Constitutional Interpretation, 72 B.U. L. REV. 699, 703 (1992) (“No one would need, for example, an elaborate theory of interpretation to explain why ‘commerce’ does not include manufacture and agriculture . . . .”). 255 Berger v. New York , 388 U.S. 41, 78 (1967) (Black, J., dissenting) (“This literal language imports tangible things, and it would require an expansion of the language used by the framers, in the interest of ‘privacy’ or some equally vague judge-made goal, to hold that it applies to the spoken word.”). For an analysis of how the arc of Olmstead and the failure of 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 39 But it cannot be forgotten that today’s interpretations of “search” are not straightforward. The justices are no longer formally charged with simply interpreting the word “search.” Instead they have been instructed that “search” is linked to the definition of a different term (i.e., “reasonable expectations of privacy”).256 The effect of “linked” definitions on the interpretation of a concrete term (like “search”) is highly contextual.257 When the linked definition is concrete, the linked term will impact the interpretative exercise. But when the linked term is abstract, it will have little to no impact. Under such circumstances the interpreter will experience discomfort evaluating candidate-particulars of the linked definition without reference to her preexisting understandings of the underlying concrete term. For instance, assume that some entity (i.e., teacher, court) links to the concrete word “car” the abstract concept of “a thing that pleases people.” And assume that an interpreter is tasked to evaluate whether an “Olympic medal” is subsumed by this new abstract definition of “car.” Overwhelmed by the wide discretion of the new abstract definition, the interpreter will feel some need to cling to her old definition of “car.” This will lead her to artificially cabin the new abstract definition of “car” along the lines of, say, “the elements of cars that please people.” Because this will include “safety” and “mobility,” but not “prizes” or “recognition,” it is far from certain whether the interpreter would hold an “Olympic medal” to be a “car.” Now compare this to a situation in which an entity links to “car” a concrete definition like “anything made of metal.” Here the same interpreter, this time afforded much less discretion, will find it much easier to isolate her analysis of “Olympic Medal” from her pre-existing definition of “car.” The upshot here is that the imposition of an abstract redefinition will not significantly reorient the interpretation of a concrete term. The Katz redefinition of “search” includes abstract terms like “reasonable,” “expectations,” and “privacy.”258 As a result, it would be surprising if the standard Katz are explained by the atomic code (which is in turn explained, in part, by concreteness), see Part III.A. 256 See, e.g., Smith v. Maryland, 442 U.S. 735 (1979); Katz v. United States, 389 U.S. 347 (1967). It is arguable whether “search” was “redefined” in the pre-Katz era. See also United States v. Jones, 132 S. Ct. 945 (2012) (supplementing the Katz test with a property test). Of course, it is too early to speculate how the atomic code will interact with the standard from Jones. 257 See PAIVIO, supra note 241, at 170 (explaining that abstract paired nouns are at a disadvantage relative to concrete paired nouns because abstract nouns lack referential interconnections in imagery). This simply changes the direction of interpretations—not the process of interpretation. When a concrete term is redefined with another concrete term there is a short-term benefit (as analogical reasoning can be bypassed and preferred outcomes reached). But in the future interpretation of the concrete redefinition the interpreter will find herself bound by a new analogical pressures (pegged to the concrete redefinition). In this sense one atomic constraint is traded for another. 258 “Reasonable” has an MRC imagery rating of 305. MRC Psycholinguistics Database. The terms “expectations” and “privacy” were not tested for “concreteness” or “imagability.” Id. It is important to note that there is a compounding effect when a definition contains multiple 40 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 “reasonable expectations of privacy” had a significant impact on the justices’ interpretation of the concrete term “search.” The same goes for most of the redefinition proposals found in the search-and-seizure literature (which invariably turn on abstract concepts like “trust,” “security” or “reliability”).259 Like with “reasonable expectations of privacy,” these redefinitions are insufficiently concrete to inhibit the interpreter from deferring to her interpretive program for “search.” Unaffected by the linked abstract redefinition (“reasonable expectations of privacy”), the justices resort to their interpretive rules for the concrete term “search”: (1) maintaining their commitments to old issues and (2) using analogical reasoning to evaluate new issues.260 2. Calibrated Retroactivity A second root cause of the atomic code is the justices’ demand for a “calibrated retroactivity” of criminal procedural rules.261 Because under the retroactivity rules at least a handful (and as many as thousands) of cases will be impacted by a given change in constitutional criminal procedure rules, the Court has, over the decades, abstract words. PAIVIO, supra note 241, at 123 (stating that abstract terms depend on contextual cues to develop meaning). For instance, the definition “anything made of metal” would be less abstract than “anything reasonably made of metal” which would be less abstract than “anything expected to be reasonably made of metal.” 259 See supra note 170 and accompanying text. The atomic code would apply, it seems, no matter how the concrete term “search” was redefined—be it by an abstract or concrete term. Concrete redefinitions constrain justices just like concrete original terms. For example, in the Olmstead era a majority of the justices during that period analyzed “search” based on the standard of a “physical intrusion into a constitutionally protected area.” See Olmstead v. United States, 277 U.S. 438 (1928); see also On Lee v. United States, 343 U.S. 747 (1952); Goldman v. United States, 316 U.S. 129 (1942). This standard is relatively “concrete” (“physical” and “intrusion” are concrete terms). It is disputable whether this standard constituted an actual “redefinition” of “search” (similar in function to Katz’s redefinition). One might instead frame this standard as simply explanatory of past holdings (for, unlike Katz’s redefinition, the preKatz standard was adopted by only a majority of the justices). See On Lee, 343 U.S. at 565 (Douglas, J., dissenting); Goldman, 316 U.S. at 136 (Stone, J., dissenting); Olmstead, 277 U.S. at 449 (Brandeis, J., dissenting). Nonetheless the essential point is that, assuming arguendo there was a redefinition of “search” in the Court’s pre-Katz decisions, it was a concrete redefinition (“physical intrusion” is relatively concrete), and concrete redefinitions subject justices to atomic constraints similar to those created by concrete original terms. In both situations the justices are called upon to interpret words that are defined with high degrees of precision. See supra notes 250–53 and accompanying text. 260 The “concreteness” explanation is different and more complex than explanations hinging on only the vagueness of Katz. See supra Part I.B.3. The ineffectiveness of an abstract redefinition is, after all, substantially enhanced by its imposition upon a concrete term. As a result, any description of Katz’s failure which overlooks the concreteness of “search” is incomplete. 261 See, e.g., Schiro v. Summerlin, 542 U.S. 348, 352 (2002) (“[W]e give retroactive effect to only a small set of ‘watershed rules of criminal procedure implicating the fundamental fairness and accuracy of the criminal proceeding.’” (quoting Saffle v. Parks, 494 U.S. 484, 495 (1990) (internal quotations omitted))). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 41 incorporated law enforcement expectations into its “search” decisionmaking.262 While law enforcement expectations rarely isolate a single acceptable holding, they do nonetheless identify, in all cases, a band of unacceptable holdings.263 The following paragraphs document the justices’ concern for misallocations of rewards and punishments, describe the rules of retroactivity, and explain how the historical tension between misallocations and retroactivity has contributed to the formation of the atomic code. Justices believe that government officials (be they jurists or police officers) should adhere to the reasonably clear terms of their official position.264 As a result the justices have some level of discomfort (1) imposing punishments on officials who abide by the terms of their office;265 and (2) granting rewards to officials who flout such terms.266 In the context of criminal procedure these types of “misallocations,” if left unmitigated, can be particularly expensive.267 First, the Court’s criminal procedure decisions can affect dozens, if not thousands, of non-final cases.268 Second, these decisions impact both civil suits and the exclusion of inculpating evidence (which affect, among other things, payment of damages, career trajectories, and the conviction of criminals).269 The Court’s sensitivity to the misallocation of rewards and punishments has been apparent in several areas of constitutional criminal procedure. “Law enforcement reliance” was explicitly incorporated into the Court’s standard for retroactivity.270 262 The Davis Court’s expansion of the good-faith exception to the exclusionary rule seems to partially correct the retroactivity concerns of the justices over the past century. Davis v. United States, 131 S. Ct. 2419. 2430 (2011) (“Our retroactivity jurisprudence is concerned with whether . . . a new rule is available on direct review as a potential ground for relief.”). See infra notes 265–69 and accompanying text. 263 See infra Part II.B.3. 264 See generally THOMAS HOBBES, THE LEVIATHAN (1651); JOHN LOCKE, TWO TREATISES OF GOVERNMENT (1689); JOHN RAWLS, A THEORY OF JUSTICE (1971). 265 See, e.g., Davis, 131 S. Ct. at 2427–28 (explaining that the deterrence rational of the exclusionary rule is not supported when police act with an “objectively reasonable good faith belief that their conduct is lawful”(internal quotations omitted)). 266 Id. at 2431–32 (“It is true that, under the old retroactivity regime of Linkletter, the Court’s decisions on the ‘retroactivity problem in the context of the exclusionary rule’ did take into account whether ‘law enforcement officers reasonably believed in good faith’ that their conduct was in compliance with governing law.”(quoting United States v. Peltier, 422 U.S. 531, 535–37 (1975))). 267 See, e.g., id. at 2427 (discussing how exclusion exacts a heavy toll on the judicial system and on society). 268 See id. (discussing Arizona v. Gant, 129 S. Ct. 1710 (2009), and the Eleventh Circuit’s decision below to apply that rule to Davis, though it was decided while his appeal was pending); Williams v. United States, 401 U.S. 646, 663 (1971) (Brennan, J., concurring) (discussing the “substantial number of searches” that had been carried out in reliance on the Court’s preChimel rules regarding searches incident to arrest). 269 See, e.g., United States v. Leon, 468 U.S. 897, 907 (1984) (“The substantial society costs exacted by the exclusionary rule for the vindication of Fourth Amendment rights have long been a source of concern.”). 270 Griffith v. Kentucky, 479 U.S. 314, 320 (1986); United States v. Johnson, 457 U.S. 42 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 And, as applied, “reliance” by law enforcement officials has lead to findings of nonretroactivity of a handful of rules.271 In expanding the exclusionary rule’s good-faith exception to reliance on binding appellate precedent, the Davis Court explained that, “It is one thing for the criminal ‘to go free because the constable has blundered.’ It is quite another to set the criminal free because the constable has scrupulously adhered to governing law.”272 The Davis majority further explained that: Responsible law-enforcement officers will take care to learn “what is required of them” under Fourth Amendment precedent and will conform their conduct to these rules. But by the same token, when binding appellate precedent specifically authorizes a particular police practice, well-trained officers will and should use that tool to fulfill their crime-detection and public-safety responsibilities. An officer who conducts a search in reliance on binding appellate precedent does no more than “ac[t] as a reasonable officer would and should act” under the circumstances.273 Another doctrine influenced by a concern for misallocations is qualified immunity.274 The current rules for qualified immunity provide that only when an official violates a “clearly established” right may a plaintiff proceed with a damages action.275 This standard generally requires the plaintiff to point to case law which predates the official’s alleged improper conduct, involves materially similar facts, and truly compels the conclusion that the plaintiff had a right under federal law.276 As a result, qualified immunity applies whenever an official can establish that he relied upon a court decision that was in effect at the time of his action (even if the decision was overturned after such action).277 The rules of qualified immunity, along with the case law on retroactivity 537, 544 (1982); Stovall v. Denno, 388 U.S. 293, 297 (1967); Linkletter v. Walker, 381 U.S. 618 (1965). 271 See, e.g., Williams v. United States, 401 U.S. 656 (1971); Desist v. United States, 394 U.S. 244 (1969); Johnson v. New Jersey, 384 U.S. 719 (1966). 272 Davis v. United States, 131 S. Ct. 2419, 2434 (2011) (quoting People v. Defore, 150 N.E. 585, 587 (N.Y. 1926)). 273 Id. at 2424 (citations omitted) (internal quotation marks omitted). 274 See Harlow v. Fitzgerald, 457 U.S. 800, 807 (1982) (discussing the balance qualified immunity strikes between the need to protect officials who must use their discretion and the need to provide a remedy to citizens whose rights have been infringed). 275 See, e.g., Pearson v. Callahan, 129 S. Ct. 808 (2009); Saucier v. Katz, 533 U.S. 194 (2001); Harlow v. Fitzgerald, 457 U.S. 800 (1982). 276 See, e.g., Ensley v. Soper, 142 F.3d 1402, 1406 (11th Cir. 1998). 277 See, e.g., Jenkins v. Talladega City Bd. of Educ., 115 F.3d 821, 827 (11th Cir. 1997) (en banc) (“Public officials are not obligated to be creative or imaginative in drawing analogies from previously decided cases.” (internal quotation marks omitted)). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 43 and the exclusionary rule, demonstrate that the justices are highly concerned with misallocating rewards and punishments within the law enforcement community. 3. Calibrating Rules of Retroactivity These expressed concerns aside, the Court’s longstanding rules on retroactivity have mandated that nearly every instance of criminal procedure adjudication has presented a significant risk of collateral misallocations of punishments and rewards. The traditional rule was that decisions were to be applied retroactively to all cases not yet final. While the likelihood of retroactive application has fluctuated over the decades, and it is not uncommon for a rule to be ultimately deemed non-retroactive,278 there has been no point where a justice could have any confidence that a “search” rule at the time of its identification would not be applied retroactively. To reduce or eliminate these risks the Court has instituted various structural reforms. In the context of damage suits, for example, the Court has, on one hand, recognized a “clear break” rule for civil retroactivity, and, on the other, immunized officials from such suits but for the violation of a “clearly established” right.279 Yet when it has come to misallocations concerning the application of the exclusionary rule to inculpating evidence, the Court’s efforts at structural reform have been more meager (at least as a historical matter).280 As a result any proposed change in criminal procedure rules has, as a practical matter, promised to cause in non-final cases a misallocation: either the suppression of evidence acquired by rule-abiding officials or the admission of evidence obtained by rule-flouting officials.281 In the absence of structural reform regarding the exclusionary sanction, the justices have sought to manage the risk of misallocated exclusion through more informal means.282 They have sought to accomplish this through a type of judicial reasoning that incorporates law enforcement expectations.283 To reduce the chances of exclusionaryrule misallocations the justices have tended to interpret criminal procedure rules in 278 See, e.g., Williams v. United States, 401 U.S. 656 (1971); Desist v. United States, 394 U.S. 244 (1969); Johnson v. New Jersey, 384 U.S. 719 (1966). 279 See, e.g., Pearson v. Callahan, 555 U.S. 223 (2009) (qualified immunity); Chevron Oil Co. v. Huson, 404 U.S. 97 (1971) (civil retroactivity). 280 Sometimes retroactivity was not automatic but merely likely. Moreover, there had been (particularly before 1966 and after 1982) no effort to restrict the application of the exclusionary sanction to such cases. But see Davis v. United States, 131 S. Ct. 2419 (2011) (ruling that the good-faith exception to the exclusionary rule extends to an officer’s reasonable reliance on binding appellate law). Davis will have some effect in reducing the risk that a new “search” interpretation will lead to a misallocation of rewards and punishments. 281 See infra Part III. 282 See supra Part II.B.2. 283 The rulings on retroactivity not only illustrate the Court’s concerns regarding the misallocations of rewards and punishments, but they also compound them. For the costs of misallocations emphasized in those cases were often overridden by the benefits of retroactivity. And so, to compensate for these costs the justices opted to interpret the Fourth Amendment, and, more particularly, the “search” term in a way to mitigate expensive misallocations. 44 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 a manner that is at least not deemed unreliable from the perspective of law enforcement.284 This means, first, that each justice feels compelled to interpret the “search” term consistently with her own past commitments. Second, it calls for the use of analogical reasoning to resolve new issues.285 If a justice is confronted by what is for her a “new” issue, then she will evaluate the issue by the most reliable means, which, more often than not, turns on analogical reasoning.286 As Professor Kerr has written: From his internal perspective, the officer is likely to conclude that the Fourth Amendment places the same restriction on government access to e-mail that it places on government access to ordinary postal mail. He will then look in a Fourth Amendment treatise for the black letter rule on accessing postal mail. That treatise will tell him that accessing a suspect’s mail ordinarily violates the suspect’s “reasonable expectation of privacy,” and that therefore the officer must first obtain a warrant.287 A consequence of this form of reasoning is that justices are reluctant to resolve cases based on their pure juridical or policy preferences (including “reasonable expectations of privacy”).288 This is because such preferences, oftentimes unreliable from the perspective of law enforcement, enhance the likelihood of a misallocation of rewards and punishments. Some questions undoubtedly arise. First, if the justices value “avoiding misallocations” then why do they defer to their individual commitments rather than past majority holdings? The answer is twofold. First, the justices actually believe in their individual assessments (and, by extension, they believe that some of the opposing interpretations are incorrect).289 Second, and more importantly, the justices’ concerns 284 Decisions of the Court can be incoherent across the continuum of “search” atoms without being unreliable within particular “search” atoms. 285 See Rumelhart, supra note 249, at 301 (“Most everyday reasoning does not involve much in the way of manipulating mental models. It probably involves even less in the way of formal reasoning. Rather, it probably involves assimilating the novel situation to other situations that are in some way similar—that is, reasoning by similarity.”); Sunstein, supra note 229, at 748 (“Some analogies, or perceptions of likeness, do not depend on arguments, but rest instead on the widely shared way that human beings order their world. We do not need an argument in order to say that one car is relevantly ‘like’ other cars; we take the point for granted; it is part of our language.”); id. at 741 (“Reasoning by analogy is the most familiar form of legal reasoning.”). See also Chen, supra note 254, at 1295 (explaining that laypeople debate the meaning of “search and seizure”). 286 Wasserstrom & Seidman, supra note 135, at 41 n.94 (“But there is no suggestion in Griffith that prior Supreme Court decisions should not be applied retroactively because police officers cannot be trusted to extrapolate accurately from them.”). 287 Orin S. Kerr, The Problem of Perspective in Internet Law, 91 GEO. L.J. 357, 365 (2003). 288 See infra Part II.B.2. 289 See supra notes 264–66. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 45 over expensive misallocations can be satisfied without binding the justices to a rigid brand of stare decisis.290 Most of the time expensive misallocations can be prevented by simply limiting decisionmaking to a band of plausible rulings.291 So while a justice’s concern for misallocations will constrain him from choosing any one outcome, it will almost never constrain him to choose one particular outcome. The result is that any option falling within the band of plausible rulings is thought to be sufficiently respectful of law enforcement expectations and, therefore, preventative of an expensive misallocation of rewards and punishments. A second lingering question is that if the justices feared misallocations of rewards and punishments, then why did they create stringent retroactivity standards? The best answer is that the costs of misallocations, while undoubtedly real for the justices, were simply outweighed by the benefits of retroactivity.292 This understanding is reflected by the Court’s insertion of a “reliability” analysis into its retroactivity standard.293 It is moreover reflected in the fact that “law enforcement reliability” proved dispositive in many Fourth Amendment retroactivity cases (particularly in the sixteen years between Linkletter v. Walker294 and United States v. Johnson).295 Along these lines it is likely that “behavioral” forces were also in play. While nearly all of the justices might have been sensitive to misallocations, it is important to keep in mind that it is the “winners” who write retroactivity policy. The justices who crafted the components of the modern rule of automatic retroactivity to non-final cases (in Linkletter, Johnson, and Griffith) were, after all, the winners in each of the respective underlying constitutional cases.296 Winning justices might very well be biased in their analyses of misallocations. They might, for one, think that the law enforcement community should have anticipated the change in constitutional rules.297 A winning justice might also look for special opportunities to extend the reach of “good” decisions (i.e., the ones he helped make).298 290 See supra notes 267–69 and accompanying text. See supra notes 270–77 and accompanying text. 292 United States v. Johnson, 457 U.S. 537, 561 (1982) (“Failure to accord any retroactive effect to Fourth Amendment rulings would ‘encourage police or other courts to disregard the plain purport of our decisions and to adopt a let’s-wait-until-it’s-decided approach.’” (quoting Desist v. United States, 394 U.S. 244, 277 (1969) (Fortas, J., dissenting))). 293 Stovall v. Denno, 388 U.S. 293, 297 (1967); Johnson v. New Jersey, 384 U.S. 719, 728–29 (1966). 294 Linkletter v. Walker, 381 U.S. 618 (1965). 295 See, e.g., United States v. Peltier, 422 U.S. 531, 535–39 (1975); Williams v. United States, 401 U.S. 646, 651–55 (1971). 296 The Mapp majority extended its reasoning to all cases not yet final. Mapp v. Ohio, 367 U.S. 643 (1961). Every justice in the Johnson majority was in the Payton majority. See Johnson, 457 U.S. 537; Payton v. New York, 445 U.S. 573 (1980). And every justice in the Griffith majority was in the Batson majority (except Justice Scalia). See Griffith v. Kentucky, 479 U.S. 314 (1986); Batson v. Kentucky, 476 U.S. 79 (1986). 297 See Desist v. United States, 394 U.S. 244, 257–67 (1969) (Harlan, J., dissenting). 298 The reform of Linkletter was required for the Payton majority to extend their new rule to protect the petitioner in Johnson, 457 U.S. 537. And the closing of the “clear break” exception 291 46 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 It seems at least plausible that some of the justices in the majorities of the Court’s retroactivity decisions were influenced by their preference to see “good” decisions applied retroactively.299 In sum, the justices’ demand for a calibrated retroactivity of criminal procedure rules has caused justices to incorporate law enforcement expectations into their “search” decisionmaking. This incorporation of law enforcement expectations, coupled with the concreteness of the term “search,” have been the primary causes of the atomic code of “search” interpretations. But I do not mean to suggest that these are the only two causes of the code. As it turns out, some of the “prevailing explanations” in the searchand-seizure literature have surely contributed to the formation of the atomic code. For example, a more concrete (i.e., less vague) Katz standard would have mitigated the interpretive impact of “search” concreteness, and, by extension, brought coherence (i.e., less atomism) to the “search” doctrine.300 The atomic code has also been facilitated by judicial preferences for a strict brand of stare decisis. Any justice’s preference that “like cases be treated alike”—no matter the existence of themes or doctrinal charges— would undoubtedly help facilitate atomism. While it is right to recognize the variety of sources facilitating the formation of the atomic code, it is important to understand that none has been as influential as the concreteness of “search” or the judiciary’s demand for a calibrated retroactivity of criminal procedure rules.301 With the atomic code’s sources established, the next part turns to examine its descriptive force. III. THE ATOMIC CODE AND “SEARCH” PHENOMENA The atomic code gives us a compelling positive account of the Court’s “search” interpretations over the past century. This part demonstrates the code’s descriptive force, distinguishes the code from the prevailing positive accounts in the search-andseizure literature, and describes how the code constrains the justices’ ability to interpret “search” in free accordance with their juridical and policy preferences. of Johnson was required in order for the Batson majority to extend its new rule to the petitioners in Kentucky, 479 U.S. 314. 299 See United States v. Williams, 401 U.S. 646, 660 (1971) (Black, J., concurring) (voting to refuse to retroactively apply Chimel v. California, 395 U.S. 752 (1969), on the ground that Chimel had been wrongly decided). Compare Desist, 394 U.S. at 244 (Harlan, J., dissenting) (stating that “[r]etroactivity must be rethought”), with Katz v. United States, 389 U.S. 347, 6362 (1967) (Harlan, J., concurring) (supporting the majority in overruling Goldman v. United States because “its limitation on Fourth Amendment protection is, in present day, bad physics as well as bad law”). 300 See supra notes 256–60 and accompanying text. In other words, the doctrine would have affected even those cases falling outside of the factual circumstances of the doctrine’s originating case. 301 For a discussion of how the uniqueness of the code’s sources is not a necessary condition to establish the uniqueness of the code’s positive account of “search” interpretations, see supra Part II.B.1. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 47 A. Describing Fourth Amendment Phenomena The atomic code states that justices view the “search” doctrine as atomistic, attribute content to new atoms based on analogical reasoning, and will not reassess atomic content after an initial attribution. To demonstrate the descriptive force of this positive account of “search” interpretations, the following paragraphs examine the two leading phenomena of “search” interpretations through the lens of the atomic code. 1. Describing the Arc of Olmstead Any analysis of the Olmstead era might as well begin with the Olmstead opinions themselves.302 The votes of all nine justices in Olmstead can be explained by the atomic code. There was a consensus among the justices that (1) “wiretapping” was a dormant atom;303 and (2) that content should be attributed to this atom through analogical reasoning.304 The justices split, however, on the proper analogy from which to draw.305 The five justices in the majority believed that the “wiretap” atom was best analogized to visual surveillance from a public vantage point.306 Drawing from their established “public vantage point” atoms these five justices attributed “non-search” content to their “wiretap” atoms.307 Justices Brandeis, Butler, and Stone preferred a different set of analogies.308 Justices Brandeis and Stone compared wiretapping to their established “sealed letter” atoms, and, alternatively, to their “home entry” atoms.309 Based on these 302 Olmstead v. United States, 277 U.S. 438 (1928). Id. at 464–66. 304 Id. at 464 (finding that the analogy to other “search” atoms “fails”). 305 Compare id. at 465, with id. at 474–75 (Brandeis, J., dissenting). 306 Id. at 465 (majority opinion). 307 Chief Justice Taft’s opinion analogized to the visual surveillance “non-searches” in Lee and Hester. Id. (comparing Hester v. United States, 265 U.S. 57 (1924), which held that visual surveillance from open fields does not violate the Fourth Amendment and United States v. Lee, 274 U.S. 559 (1927), which held that visual surveillance with use of searchlight from the high seas does not violate the Fourth Amendment). For further discussion of this point, see David P. Currie, The Constitution in the Supreme Court: 1921–1930, 1986 DUKE L.J. 65. 308 Olmstead, 277 U.S. at 474–75 (Brandeis, J., dissenting). 309 As to the “letter” atom, Justice Brandeis wrote that “[t]here is, in essence, no difference between the sealed letter and the private telephone message . . . . ‘True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed; but these are distinctions without a difference.’” Olmstead, 277 U.S. at 475 (Brandeis, J., dissenting) (quoting Olmstead v. United States, 19 F.2d 842 (9th Cir. 1927)). As to the “home entry” analogy, Brandeis wrote that “[the Boyd opinion reaches] farther than the concrete form of the case there before the court, with its adventitious circumstances; they apply to all invasions on the part of the Government and its employes [sic] of the sanctities of a man’s home and the privacies of life.” Id. at 474. See also id. at 474–75 (“It is not the breaking of his doors, and the rummaging of his drawers, that constitutes the essence of the offence; but it is the invasion 303 48 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 analogies they attributed “search” content to their “wiretap” atoms. Justice Butler, for his part, attributed the content of “search” to his “wiretap” atom through an analogy to a “trespass on rented property” atom.310 Justice Holmes did not commit to one analogy or another and so, for him, the “wiretap” atom remained dormant.311 Olmstead’s progeny can be similarly explained by the atomic code. In Goldman v. United States,312 all eight voting justices felt that the government’s use of a detectaphone was not a dormant atom but rather governed by their “wiretap” atoms.313 Justice Stone, the only carryover from Olmstead, maintained his previously stated position that the “wiretap” atom was attributed with “search” content.314 Among fellow dissenters was Justice Murphy, who attributed “search” to his “wiretap” atom by adopting Brandeis’s analogies in Olmstead.315 The five justices in the majority (Roberts, Black, Reed, Douglas, and Byrnes) endorsed the Olmstead majority’s analogies for “wiretap” atoms,316 and, as a result, concluded that there had been no Fourth Amendment “search.”317 In On Lee v. United States, the justices disagreed about which of their atoms governed. The five majority justices (Vinson, Reed, Jackson, Clark, and Minton) saw this case as, first and foremost, falling within their “informant” atoms.318 As a result these five justices held that there was no search of On Lee.319 Justice Frankfurter of his indefeasible right of personal security, personal liberty and private property, where that right has never been forfeited by his conviction of some public offence—it is the invasion of this sacred right which underlies and constitutes the essence of Lord Camden’s judgment.”). 310 See id. at 487 (Butler, J., dissenting) (“The contracts between telephone companies and users contemplate the private use of the facilities employed in the service. The communications belong to the parties between whom they pass. During their transmission, the exclusive use of the wire belongs to the persons served by it. Wire tapping involves interference with the wire while being used. Tapping the wires and listening in by the officers literally constituted a search for evidence. As the communications passed, they were heard and taken down.”). 311 Justice Holmes, in his dissenting opinion, observed that “[w]hile I do not deny it, I am not prepared to say that the penumbra of the Fourth and Fifth Amendments covers the defendant . . . .” Id. at 469 (Holmes, J., dissenting). 312 316 U.S. 129 (1942). 313 See id. at 135. 314 See id. at 136 (Stone, J., dissenting). Justice Frankfurter joined in the dissent. Id. 315 See id. (Murphy, J., dissenting). 316 See id. at 135 (“[N]o reasonable or logical distinction can be drawn between what federal agents did in the present case and state officers did in the Olmstead case.”). 317 See id. at 135. Justice Jackson abstained. Id. at 136. 318 On Lee v. United States, 343 U.S. 747, 754 (1952). The majority explained that On Lee misplaced his trust in a conversant (the informant), and that the transmission of this conversation constituted a mere magnification, like “[t]he use of bifocals, field glasses or the telescope . . . .” Id. at 754. 319 Id. at 751. Justice Black concurred there was no search (presumably for the reasons stated by the majority), but argued nonetheless that the evidence should have been suppressed on supervisory grounds. Id. at 758 (Black, J., concurring). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 49 dissented on the ground that the act was, as in Goldman,320 governed by his “wiretap” atom and thus a “non-search.”321 Justice Burton similarly felt that the act was controlled by the “wiretap” atom to which he attributed the content of “search” through an analogy to his “home entry” atom.322 Curiously, Justice Douglas also dissented in On Lee.323 This is particularly notable in that Douglas had voted with the majority in Goldman.324 In On Lee, Justice Douglas wrote, “I now more fully appreciate the vice of the practices spawned by Olmstead and Goldman. Reflection on them has brought new insight to me. I now feel that I was wrong in the Goldman case.”325 Justice Douglas catalogued the facts of On Lee as part of his “wiretap” atom and then replaced the “nonsearch” content of such atom with “search” content.326 Douglas’s reassessment of his “no search” attribution from Goldman constituted one of the few instances where a justice has broken the atomic code of “search” interpretations.327 In Silverman v. United States eight justices (Warren, Black, Frankfurter, Clark, Harlan, Brennan, Whitaker, and Stewart) claimed that the government’s electronic surveillance through non-trespassory, but nonetheless unauthorized, physical penetration into the premises occupied by Silverman was governed by their “home entry” atoms (to which they attributed the content of “search”).328 For those in the majority who might have had previously attributed “non-search” to their “wiretap” atoms,329 320 Goldman, 316 U.S. at 136 (Frankfurter, J., concurring). See On Lee, 343 U.S. at 761–62 (Frankfurter, J., dissenting). 322 See id. at 766–67 (Burton, J., dissenting) (“Chin Poy, without warrant and without petitioner’s consent, took with him the concealed radio transmitter to which agent Lee’s receiving set was tuned. For these purposes, that amounted to Chin Poy’s surreptitiously bringing Lee with him. The presence of the transmitter [in the house], for this purpose, was the presence of Lee’s ear.”). This is reminiscent of Justice Brandeis’s analogy to his “home entry” atom. See Olmstead v. United States, 277 U.S. 438, 474–75 (1928) (Brandeis, J., dissenting). 323 On Lee, 343 U.S. at 762 (Douglas, J., dissenting). 324 Goldman, 316 U.S. at 129. 325 On Lee, 343 U.S. at 762 (Douglas, J., dissenting). 326 See id. While it is unclear, it seems that Justice Douglas was drawing on Justice Brandeis’s “physical invasion” analogy. Id. at 765 (“The nature of the instrument that science or engineering develops is not important. The controlling, the decisive factor is the invasion of privacy against the command of the Fourth and Fifth Amendments.”). 327 The other documented instance was Justice Harlan’s dissent in White, where he changed the content of his “informant” atom to “search.” See United States v. White, 401 U.S. 745, 768–95 (1971) (Harlan, J., dissenting). 328 Silverman v. United States, 365 U.S. 505, 511–12 (1961). The Silverman majority emphasized that the Goldman and On Lee Courts “took pains explicitly to point out that the eavesdropping had not been accomplished by means of an unauthorized physical encroachment within a constitutionally protected area.” Id. at 510. The use of the spike mike did not constitute a trespass under local property law. Id. at 511. 329 See id. at 513 (Clark, J., and Whitaker, J., concurring) (“In view of the determination by the majority that the unauthorized physical penetration into petitioners’ premises constituted sufficient trespass to remove this case from the coverage of earlier decisions, we feel obliged to join in the Court’s opinion.”). It seems likely that this opinion, for Justice Clark, clarified 321 50 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 their Silverman vote implicitly cabined the scope of their “wiretap” atoms with the condition that there be “no physical encroachment into a constitutionally protected area.”330 The ninth justice, Justice Douglas, concurred, explaining that the case fell within his “wiretap” atom and, for that reason alone, should be deemed a “search.”331 In Lopez v. United States, six justices (Warren, Black, Clark, Harlan, Stewart, and White) concluded that the facts of the case fell first within their “informant” atoms.332 As a result they concluded that Lopez had not been searched.333 This conclusion allowed the six justices to avoid revisiting (or, for some, committing content to) their “wiretap” atoms.334 Three dissenting justices (Douglas, Brennan, and Goldberg) felt that the government’s acts fell within their “wiretap” atoms and thus constituted a “search.”335 The atomic code can also explain the opinion formally overruling Olmstead. In Katz, all eight voting justices agreed that the bugging of Katz’s public phone booth fell within their respective “wiretap” atoms.336 Three of the justices had already committed content to their “wiretap” atoms: Justice Douglas (“search”),337 Justice Brennan (“search”),338 and Justice Black (“non-search”).339 None of these justices reassessed their previous attributions. The other five justices (Warren, Harlan, Stewart, White, and Fortas) had yet to attribute content to their “wiretap” atoms.340 Writing for all five, that his “wiretap” atom remained dormant. See, e.g., Berger v. New York, 388 U.S. 41 (1967) (authored by Justice Clark). With that said, it is plausible that this opinion reflected Justice Whitaker’s attribution of “non-search” to his “wiretap” atom. 330 Some, though not all, of the justices in the eight-justice majority (1) narrowed their “wiretap” atom to those circumstances where there was no physical encroachment on a constitutionally protected area and then (2) attributed content to the resulting new atom through an analogy to a traditional entry into a home. Silverman, 365 U.S. at 511 (“At the very core stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion”(citing Entick v. Carrington, 19 Howell’s State Trials 1029, 1066 (1765))). 331 Id. at 513 (Douglas, J., concurring). 332 See Lopez v. United States, 373 U.S. 427, 440 (1963). 333 Id. For some, the holding of “non-search” was simply a reassertion of an earlier formal attribution to their “informant” atom. See Rathbun v. United States, 355 U.S. 107, 110 (1957) (stating, with Justices Harlan, Clark, Warren, and Black, in the majority, “that either party may record the conversation and publish it.”). For the other justices, like Justices Stewart and White, the earlier attribution was likely informal. 334 See Lopez, 373 U.S. at 439. But see id. at 441 (Warren, C.J., concurring) (“Although the dissent assumes that this case and On Lee are in all respects the same, to me they are quite dissimilar constitutionally and from the viewpoint of what this Court should permit under its supervisory powers over the administration of criminal justice in the federal courts.”). 335 Id. at 447, 471 (Brennan, J., dissenting). 336 Katz v. United States, 389 U.S. 347, 353–54 (1967). Justice Marshall abstained. Id. at 359. 337 See id. 338 See id. 339 See id. at 364–65. 340 Cf. Lopez v. United States, 373 U.S. 427, 440 (1963) (resolving the case by resorting to their “informant” atoms). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 51 Justice Stewart analogized the bugging of the phone booth to the “home entry” atom. Like Justice Brandeis some forty years earlier,341 he linked the challenged eavesdropping to an intrusion of a physical place.342 During the Olmstead era, the justices evinced a deep commitment to (1) using analogical reasoning to attribute content to new atoms, and (2) not revisiting atomic content after an attribution.343 Once the justices gave content to the new factual circumstance of wiretapping through analogical reasoning, they spent the rest of their careers maintaining this position.344 The only exception to the code over the course of this thirtynine-year period was Justice Douglas’s reattribution between Goldman 345 and On Lee.346 All other evolutions in the Court’s view on electronic surveillance came exclusively through the replacement of justices. Through new confirmations, the Court became comprised of a majority of justices who had initially attributed “no search” to their “wiretap” atom. Viewed through the lens of the atomic code, the demise of Olmstead is not due to some judicial awakening regarding the perils of electronic surveillance, but rather the gradual replacement of analogies through the confirmation process. 2. Describing the Failure of Katz The atomic code also provides a sufficient positive account of “search” interpretations in the post-Katz era. Through the lens of the atomic code, this subpart examines the case law exemplifying the failure of Katz to achieve its promise of an objective and evolving privacy standard. In particular, it reexamines the justices’ post-Katz “search” votes that were criticized as ratifying old doctrine (informants), deviating from public expectations of privacy (dog sniffs), and deferring to property concepts (aerial surveillance). a. Informants The ratification of pre-Katz rules, often cited as evidence of Katz’s failure, can be explained by the atomic code. Perhaps the leading example of ratification regarded the use of informants. Over the decades preceding Katz, the Court had regularly held that there was no warrant requirement to obtain statements voluntarily made to undercover 341 Olmstead v. United States, 277 U.S. 438, 471 (1927) (Brandeis, J., dissenting). See Katz, 389 U.S. at 352 (1967) (“But what he sought to exclude when he entered the booth was not the intruding eye—it was the uninvited ear. He did not shed his right to do so simply because he made his calls from a place where he might be seen. No less than an individual in a business office, in a friend’s apartment, or in a taxicab, a person in a telephone booth may rely upon the protection of the Fourth Amendment.”(footnotes omitted)). 343 See supra Part I.A.2. 344 See infra note 453 and accompanying text. 345 316 U.S. 129 (1941). 346 343 U.S. 747 (1951). 342 52 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 agents or government informants.347 The first post-Katz case on this point was United States v. White,348 which involved a government informant who transmitted to law enforcement by means of radio various incriminating conversations between himself and White.349 In White, five justices held that the transmission of conversations by a government informant did not constitute a “search.”350 All five were seemingly influenced by the atomic code. Justice Black stated that Katz was wrongly decided and did not impact the pre-Katz decision of On Lee.351 In effect, Black’s old “informants” atom (to which he attributed the content of “non-search” in On Lee) governed his decisionmaking in White. The other four justices in the majority (Burger, Stewart, White, Blackmun) seemed to split on whether the case was governed by a dormant atom. Their plurality opinion emphasized two lines of reasoning.352 First, it stated that “[w]e see no indication in Katz that the Court meant to disturb that understanding of the Fourth Amendment or to disturb the result reached in the On Lee case, nor are we now inclined to overturn this view of the Fourth Amendment.”353 Second, the opinion alternatively explained that “[i]f the law gives no protection to the wrongdoer whose trusted accomplice is or becomes a police agent, neither should it protect him when that same agent has recorded or transmitted the conversations which are later offered in evidence to prove the State’s case.”354 It is likely that at least one of these four justices viewed the White case as governed by his old “informants” atom. This is the best explanation for the plurality opinion’s statement that On Lee remained good law. Of the justices in the plurality, 347 See generally Hoffa v. United States, 385 U.S. 293 (1966); Lopez v. United States, 373 U.S. 427 (1963); On Lee v. United States, 343 U.S. 747 (1952). 348 401 U.S. 745 (1971). 349 White, 401 U.S. at 747. 350 Id. at 753. 351 Id. at 754 (Black, J., concurring). For Justice Black, On Lee had been resolved on supervisory grounds (which, of course, would have been unnecessary had he believed the government had engaged in a “search.”). See On Lee, 343 U.S. at 758. Justice Black, who dissented in Katz, refused to join the White plurality decision which stated, among other things, “Katz . . . finally swept away doctrines that electronic eavesdropping is permissible under the Fourth Amendment unless physical invasion of a constitutionally protected area produced the challenged evidence.” White, 401 U.S. at 748 (plurality). 352 See id. at 750, 752; id. at 760 (Douglas, J. dissenting) (explaining alternative grounds for the majority’s reasoning). 353 Id. at 750 (majority opinion). 354 Id. at 752. See also id. at 749 (“Hoffa v. United States . . . which was left undisturbed by Katz, held that, however strongly a defendant may trust an apparent colleague, his expectations in this respect are not protected by the Fourth Amendment when it turns out that the colleague is a government agent regularly communicating with the authorities. In these circumstances, ‘no interest legitimately protected by the Fourth Amendment is involved,’ for that amendment affords no protection to ‘a wrongdoer’s misplaced belief that a person to whom he voluntarily confides his wrongdoing will not reveal it.’”(quoting Hoffa v. United States, 385 U.S. 293, 302 (1966) (internal citations omitted))). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 53 Justices White and Stewart are perhaps the most likely candidates (as each had been in the majority of the earlier “informants” case of Lopez).355 Yet the plurality’s analogy to the “misplaced trust” cases almost certainly means that some in the majority viewed the facts of White as falling within a “dormant” atom. For these justices the specific atom encompassing an informant’s transmission of conversations without permission was one to which they had not yet attributed content. To assign content to this new atom these justices utilized an analogy to their old atoms regarding “misplaced trust.”356 The likely candidates for this second group were the Court’s newest members—Chief Justice Burger and Justice Blackmun. The interpretations of the dissenting justices in White were also regulated by the atomic code. The facts of White fell firmly within the old “informant” atom to which Justice Douglas had previously attributed “search” content.357 Justice Douglas, after all, had dissented in On Lee,358 and Justice Brennan, dissenting in Lopez,359 explained in explicit terms his belief that On Lee had been wrongly decided.360 Justice Marshall, though new to the Court, had likely assigned content to this particular atom through informal reflection.361 This brings us to the dissenting opinion of Justice Harlan.362 Harlan wrote that “third-party bugging” is a “search” as “it goes beyond the impact on privacy occasioned by the ordinary type of ‘informer’ investigation upheld in Lewis and Hoffa.”363 Yet, eight years earlier, Harlan had authored the majority opinion in Lopez, which held that an agent’s secret use of a wire recorder constituted a “non-search.”364 “Nonsearch” content for his “informants” atom was replaced by “search” content in his 355 Id. at 752. See White, 401 U.S. at 752 (“If the law gives no protection to the wrongdoer whose trusted accomplice is or becomes a police agent, neither should it protect him when that same agent has recorded or transmitted the conversations which are later offered in evidence to prove the State’s case.”). Unfortunately, it is impossible to say with any conviction which of these two applications of the atomic code each of the four plurality justices took. 357 Id. at 756. Justice Brennan concurred with the plurality, but separately argued that “current Fourth Amendment jurisprudence interposes a warrant requirement not only in cases of third-party electronic monitoring . . . but also in cases of electronic recording by a government agent of a face-to-face conversation with a criminal suspect.” Id. at 755 (Brennan, J., concurring). 358 On Lee, 343 U.S. at 762 (Douglas, J., dissenting). 359 Lopez v. U.S., 373 U.S. 427, 446–47(Brennan, J., dissenting). 360 Id. at 447 (Brennan, J., dissenting) (“I believe that that decision was error, in reason and authority, at the time it was decided; that subsequent decisions and subsequent experience have sapped whatever vitality it may once have had; that it should now be regarded as overruled; that the instant case is rationally indistinguishable; and that, therefore, we should reverse the judgment below.”). 361 See White, 401 U.S. at 795. It would have been surprising if Justice Marshall had not considered the Olmstead line of cases before joining the Court. 362 Id. at 768 (Harlan, J., dissenting). 363 Id. at 787. 364 Lopez, 373 U.S. 427. 356 54 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 White dissent.365 By refusing to maintain atomic content for his “informants” atom, he seems to be the only one of the nine justices in White who broke from the dictates of the atomic code.366 Harlan’s change aside, the Court’s ratification of its pre-Katz “informants” rules seems to be a function of the atomic code. b. Dog Sniffs Judicial deviation from societal expectations of privacy is also cited as proof of Katz’s failed promise.367 As it turns out, this drift can be explained by the atomic code. In United States v. Place,368 six justices (Burger, White, Powell, Rehnquist, Stevens, and O’Connor) held that “the particular course of investigation that the agents intended to pursue here—exposure of respondent’s luggage which was located in a public place, to a trained canine—did not constitute a ‘search’ within the meaning of the Fourth Amendment.”369 The majority’s analysis was almost certainly governed by the atomic code. Finding the factual circumstances of Place to be new, the majority justices analogized to their “public vantage point” atoms.370 The dog sniff could be contrasted from the “public vantage point” atom because it provided some information about hidden items (the presence of contraband). But it was similar to the “public vantage point” atom in that it did not require the opening of a physical effect, did not look to expose noncontraband items, and did not cause any collateral exposure.371 Based on these similarities, the six majority justices attributed “non-search” content to their new “dog sniff” atoms. Three concurring justices—Brennan, Marshall, and Blackmun—believed that the issue was not yet ripe.372 For these three justices their “dog sniff” atoms remained dormant.373 365 See White, 401 U.S. at 768 (Harlan, J., dissenting); see also Maclin, supra note 88, at 92 (“Justice Harlan now believed that risk analysis and expectations theory was neither consistent with the holding of Katz nor compatible with the central purpose of the Amendment.” (footnote omitted)). 366 This is one of only two expressed deviations from the atomic code found in this study. The other was Justice Douglas’s reattribution between Goldman v. United States, 316 U.S. 129 (1942), and On Lee v. United States, 343 U.S. 747 (1952). 367 See supra Part I.B.2. 368 462 U.S. 696 (1983). 369 Id. at 707. 370 Id. The respondent proposed an analogy to the luggage search in United States v. Chadwick, 433 U.S. 1 (1977). 371 Place, 462 U.S. at 707 (“A ‘canine sniff’ by a well-trained narcotics detection dog . . . does not require opening the luggage. It does not expose noncontraband items that otherwise would remain hidden from public view, as does, for example, an officer’s rummaging through the contents of the luggage . . . . Thus, despite the fact that the sniff tells the authorities something about the contents of the luggage, the information obtained is limited.”). 372 Id. at 710 (Brennan, J., concurring); id. at 720 (Blackmun, J., concurring). Justice Marshall joined in both concurring opinions. 373 See id. at 720 (Brennan, J., concurring) (analogizing to Katz v. United States, 389 U.S. 347 (1967)). Id. at 720 (Blackmun, J., concurring) (“[T]he detention of Place’s luggage amounted to, and was functionally identical with, a seizure of his person.”). During the term 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 55 Nearly two decades after Place, the Court handed down Kyllo v. United States.374 In Kyllo the Court faced the question of whether the use of a thermal-imaging camera on a home constituted a “search.”375 All nine considered their “thermal imaging” atoms dormant.376 Of the justices on the Place Court, three remained.377 All three— Rehnquist, Stevens, and O’Connor—attributed “non-search” content to their dormant “thermal imaging” atoms through analogy to their “dog sniff” atoms.378 Stevens, in dissent, wrote that in United States v. Place, we held that a dog sniff that “discloses only the presence or absence of narcotics” does “not constitute a ‘search’ within the meaning of the Fourth Amendment,” and it must follow that sense-enhancing equipment that identifies nothing but illegal activity is not a search either.379 Although Justice Kennedy was not on the Place Court, he joined the three carry-over justices in their dissenting view that Kyllo was not searched.380 It seems clear that Justice Kennedy attributed this “non-search” content through analogical reasoning to his “dog sniff” atom.381 after Place, the Court resolved United States v. Jacobson, 466 U.S. 109 (1984). The Jacobson majority concluded that the (1) manipulation of a package and (2) drug testing of a substance found in such package did not constitute a “search.” Id. As to the first point the majority emphasized that the manipulation was a “non-search” because it did not go beyond what a private actor (the shipping company) had already done. Id. at 112. This conclusion was based on the majority justices’ recognition of dormant “private manipulation” atoms and analogies to their established “public vantage point” atoms. As to the second point, the majority explained that the testing was a “non-search” because it would be unable to reveal any “private facts.” Id. at 114. The justices in the majority identified a dormant “testing of exposed substances” atom and analogized it to their “dog sniff” atom. See id. at 109, 114 (stating that its “conclusion is dictated by United States v. Place”). 374 533 U.S. 27 (2001). 375 Id. at 29–30. 376 See id. at 33. 377 See id. at 29. 378 See id. at 42–44 (Stevens, J., dissenting). For these three justices, the Kyllo facts were either an old atom governed by Place or a new atom analogous to Place. Justice Kennedy, who was not on the Place Court, joined them. Id. 379 Id. at 47–48. An additional justification for these justices was based on an analogy to their “informants” atoms. See id. at 43 (Stevens, J., dissenting) (writing that “any member of the public might notice that one part of a house is warmer than another part or a nearby building if, for example, rainwater evaporates or snow melts at different rates across its surfaces”); see also Maclin, supra note 88, at 98 (“Indeed, the court of appeals, the Solicitor General’s office, and Justice Stevens all endorsed the notion that Kyllo assumed the risk that someone located outside might detect the heat emanating from his home.”). 380 Id. at 43–44. 381 See Illinois v. Caballes, 543 U.S. 405, 405 (2005) (joining with the majority that a dog sniff is a “non-search”). 56 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 The majority of justices, however, concluded that the use of thermal imaging on Kyllo’s home constituted a “search.”382 Justice Scalia, writing for the majority, observed that: “[w]here, as here, the Government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a ‘search’ and is presumptively unreasonable without a warrant.”383 The atomic code channeled the reasoning of the five majority justices (albeit likely in two different ways).384 The first faction of the majority included Justices Scalia, Thomas, and Breyer.385 These three concluded their “dog sniff” atoms (which they attributed with “non-search” content) offered a less compelling analogy than did their “home entry” atoms.386 Justice Scalia wrote that in the case of the search of the interior of homes—the prototypical and hence most commonly litigated area of protected privacy— there is a ready criterion, with roots deep in the common law, of the minimal expectation of privacy that exists, and that is acknowledged to be reasonable.387 The second faction of the Kyllo majority was comprised of Justices Souter and Ginsburg.388 Although the atomic code likely governed the votes of these two justices, it is not exactly clear whether they based their “search” votes on an analogy to their “home entry” atoms or to their “dog sniff” atoms (to which they had seemed to have attributed, albeit informally, the content of “search”).389 In the wake of Kyllo, the Court in Illinois v. Caballes revisited the Place rule regarding dog sniffs.390 Six justices reaffirmed Place.391 Two of these justices—Stevens and O’Connor—simply applied the “non-search” content of their “dog sniff” atoms as attributed in Place.392 None of the other four justices in the majority—Scalia, Kennedy, 382 Kyllo, 533 U.S. at 33–35. Id. at 40. 384 From the Caballes decision four years later we can discern the justices’ respective positions on dog sniffs (even for those who were not on the Court at the time of Place). Caballes, 543 U.S. at 405. 385 Kyllo, 533 U.S. at 29. 386 See Maclin, supra note 88, at 72 (“In answering this inquiry, Justice Scalia saw a direct link between thermal imaging and the intrusions that writs of assistances and general warrants authorized, which prompted the Framers to adopt the Fourth Amendment.” (citing Kyllo, 533 U.S. at 40)). 387 Kyllo, 533 U.S. at 34. Justice Scalia seemed to have left open the possibility that his majority opinion was not relying on United States v. Karo, 468 U.S. 705 (1984). Id. at 36. 388 Id. at 29. 389 See Caballes, 543 U.S. at 410 (Souter, J., dissenting); id. at 417 (Ginsburg, J., dissenting). 390 Caballes, 543 U.S. 405. 391 Id. at 409–10. 392 Justice Rehnquist did not participate in this case. Id. at 410. 383 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 57 Thomas, and Breyer—had been on the Court at the time of Place.393 Their decisionmaking in Caballes nonetheless seems to have been bound by the atomic code. They either applied their previous informal attribution of “non-search” content to “dog sniffs,” or they identified their “dog sniff” atoms as “dormant” and assigned it content through either the “thermal imaging” atom (Justice Kennedy) or the “public vantage point” atom (Justices Scalia, Thomas, and Breyer).394 Dissenting in Caballes, Justices Souter and Ginsburg appear to have been equally bound by the atomic code.395 Either they reasserted their previous informal attribution of “search” to their “dog sniff” atom, or they identified the “dog sniff” atom as “dormant,” then assigned it “search” content through analogies to either their “home entry” or “thermal imaging” atoms.396 In sum, the atomic code offers a compelling alternative account for the justices’ tendency to deviate from public expectations of privacy.397 c. Aerial Surveillance The justices’ deference to property concepts, often cited as evidence of Katz’s failure, can also be explained by the atomic code.398 In California v. Ciraolo,399 five justices—Burger, White, Rehnquist, Stevens, and O’Connor—concluded that “nakedeye aerial observation from an altitude of 1,000 feet of a backyard within the curtilage of a home does not constitute a search under the Fourth Amendment.”400 The reasoning of all five justices was governed by the atomic code. Four justices attributed “nonsearch” content to their dormant “aerial surveillance” atoms through analogy to their old atoms regarding traditional visual surveillance from a “public vantage point.”401 393 United States v. Place, 426 U.S. 696, 697 (1983). See Maclin, supra note 88, at 106 (stating that by upholding dog sniffs as non-searches “the ‘right’ announced in Kyllo will most likely be confined to a privilege against the use of a thermal imager directed at one’s home”). 395 See supra note 389. 396 Caballes, 543 U.S. at 411 (Souter, J., dissenting); id. at 417 (Ginsburg, J., dissenting). Justice Souter wrote that “an uncritical adherence to Place would render the Fourth Amendment indifferent to suspicionless and indiscriminate sweeps of cars in parking garages and pedestrians on sidewalks.” Id. at 411 (Souter, J., dissenting) (“The infallible dog . . . is a creature of legal fiction.”); id. at 421–22 (Ginsburg, J., dissenting) (stating that Caballes was searched). 397 The criticized “deviations” of the justices include those votes that thermal imaging on the home and the use of fallible narcotics dogs are not “searches.” Illinois v. Caballes, 543 U.S. 405 (2005); Kyllo v. United States, 533 U.S. 27, 41 (2001) (Stevens, J., dissenting). 398 See, e.g., Florida v. Riley, 488 U.S. 445 (1988); Dow Chemical Co. v. United States, 476 U.S. 227 (1986); California v. Ciraolo , 476 U.S. 207 (1986). 399 476 U.S. 207 (1986). 400 Dow, 476 U.S. at 234–35 (describing the majority holding in Ciraolo). 401 Ciraolo, 476 U.S. at 213–14. See also Florida v. Riley, 488 U.S. 445, 459 (1988) (Brennan, J., dissenting) (“Finding determinative the fact that the officer was where he had a right to be is, at bottom, an attempt to analogize surveillance from a helicopter to surveillance by a police officer standing on a public road and viewing evidence of crime through an open window or a gap in a fence.”); Maclin, supra note 88, at 82–83 (“Rather than address the 394 58 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 The Fourth Amendment, they observed, does not “preclude an officer’s observations from a public vantage point where he has a right to be and which renders the activities clearly visible.”402 For these justices there was no “search” in the investigation of Ciraolo because the observations “took place within public navigable airspace . . . in a physically nonintrusive manner; from this point, they were able to observe plants readily discernible to the naked eye as marijuana.”403 Justice O’Connor, providing the fifth vote for the majority, analogized the case not to her “public vantage point” atom but rather to her “informant” atom.404 The dissenting justices were also beholden to atomic code. In dissent, Justices Powell, Marshall, Brennan, and Blackmun assigned “search” content to their dormant “aerial surveillance” atoms through analogy to their “curtilage” atoms.405 On the same day as Ciraolo, the Court handed down Dow Chemical Co. v. United States.406 Dow involved the EPA’s use of a mapping camera to surveil a manufacturing facility at between 12,000 and 1,200 feet.407 The facts of Dow differed from those in Ciraolo in that Dow (1) involved business surveillance408 and (2) enhancement of naked vision by an aerial mapping camera.409 Yet, despite these differences all nine justices maintained their Ciraolo vote.410 The five justices in the majority—Burger, White, Rehnquist, Stevens, and O’Connor—found that the government’s use of the mapping camera did not disturb their analogies in Ciraolo to their “public vantage point” or “informant” atoms.411 The EPA, observed the majority: was not employing some unique sensory device that, for example, could penetrate the walls of buildings and record conversations in obvious tension between his reasoning and Katz, the Chief Justice [in Ciraolo] essentially confined the reach of Katz to a privilege against warrantless wiretapping.”). 402 See Ciraolo, 476 U.S. at 213 (“The Fourth Amendment protection of the home has never been extended to require law enforcement officers to shield their eyes when passing by a home on public thoroughfares.”). The “public vantage point” atom has also been analogized to the use of artificial light to illuminate a darkened area. See, e.g., Texas v. Brown, 460 U.S. 730 (1983) (flashlight); United States v. Lee, 274 U.S. 559 (1927) (searchlight). 403 Ciraolo, 476 U.S. at 213 (citations omitted). 404 This was made clear two years later in Florida v. Riley, 488 U.S. 445, 453 (O’Connor, J., concurring) (“Ciraolo’s expectation of privacy was unreasonable not because the airplane was operating where it had a ‘right to be,’ but because public air travel at 1,000 feet is a sufficiently routine part of modern life that it is unreasonable for persons on the ground to expect that their curtilage will not be observed from the air at that altitude.”). 405 Ciraolo, 476 U.S. at 216–17 (Powell, J., dissenting) (analogizing “aerial surveillance” to “trespass of curtilage”). As further support, Justice Powell observed that “the actual risk to privacy from commercial or pleasure aircraft is virtually nonexistent.” Id. at 223. 406 476 U.S. 227 (1986). 407 Id. at 229. 408 Id. at 240, 245. 409 Id. at 229. 410 Compare id. at 228, with Ciraolo, 476 U.S. at 208. 411 See Dow, 476 U.S. at 238. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 59 Dow’s plants, offices, or laboratories, but rather a conventional, albeit precise, commercial camera commonly used in mapmaking. . . . Although they undoubtedly give EPA more detailed information than naked-eye views, they remain limited to an outline of the facility’s buildings and equipment.412 The dissenting justices in Dow also engaged in atomic code reasoning. Despite the business nature of the surveilled area, the justices (Brennan, Marshall, Blackmun, and Powell), as in Ciraolo, analogized the case to their old “curtilage” atoms.413 Three years after Ciraolo and Dow, the Court decided Florida v. Riley.414 Riley involved an officer who circled twice over respondent’s property in a helicopter at the height of 400 feet. With his naked eye, he was able to see through the openings in the roof and one or more of the open sides of the greenhouse and to identify what he thought was marijuana growing in the structure.415 Five justices concluded that this was a “non-search.”416 For three justices in the majority—Rehnquist, White, and O’Connor—this was a straightforward reassertion of the content of their “aerial surveillance” atoms.417 For the other two majority justices— Scalia and Kennedy—the atomic code could have governed their reasoning in various ways.418 The Justices might have simply reasserted their previous informal attribution 412 Id. (“The Government asserts it has not yet enlarged the photographs to any significant degree, but Dow points out that simple magnification permits identification of objects such as wires as small as 1/2-inch in diameter.”). 413 Id. at 250 (Powell, J., dissenting). The dissenters emphasized the existence of trade secret laws and Dow’s efforts to enforce such laws. Id. at 249. As a result, “EPA’s aerial photography penetrated into a private commercial enclave, an area in which society has recognized that privacy interests legitimately may be claimed.” Id. at 252. 414 488 U.S. 445 (1988). 415 Id. at 448. 416 Id. at 446, 452. There was nothing about the helicopter or its altitude or the closed nature of Riley’s greenhouse which took it out of the “aerial surveillance” atom. Id. at 451–52 (“But it is of obvious importance that the helicopter in this case was not violating the law, and there is nothing in the record or before us to suggest that helicopters flying at 400 feet are sufficiently rare in this country to lend substance to respondent’s claim that he reasonably anticipated that his greenhouse would not be subject to observation from that altitude.”). 417 Justice O’Connor in Riley analogized from her “informant” atom. See generally id. at 452–55 (O’Connor, J., concurring). The other four justices in the Riley majority based the content of their “aerial surveillance” atoms on their “public vantage point” atoms. See id. at 450–52. 418 Justice Scalia and Kennedy were the two non carry-over justices from the Ciraolo-Dow Court. It is of course not clear whether they had informally attributed “non-search” content to “aerial surveillance” before Riley, or whether in Riley they attributed “non-search” content 60 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 of “non-search” content to their “aerial surveillance” atoms. Or they might have attributed “non-search” content to their “aerial surveillance” atoms during deliberation in Riley through analogy to their “lawful vantage point” atoms. The dissenting justices in Riley were also governed by the atomic code.419 The decision for three of these justices—Justices Brennan, Marshall, and Blackmun—required nothing more than a reapplication of the “search” content they had attributed to their “aerial surveillance” atoms in Ciraolo-Dow.420 Justice Stevens was the only justice to change votes between Ciraolo-Dow and Riley.421 This suggests that, for Justice Stevens, the unique facts of Riley brought the case outside of his “aerial surveillance” atom (with content of “nonsearch”). Once freed from his “aerial surveillance” atom, this new “dormant” atom was assigned “search” content through analogy to his “wiretap” atom.422 The “unique facts” of Riley were explained in Justice Brennan’s dissent: While, as we held in Ciraolo, air traffic at elevations of 1,000 feet or more may be so common that whatever could be seen with the naked eye from that elevation is unprotected by the Fourth Amendment, it is a large step from there to say that the Amendment offers no protection against low-level helicopter surveillance of enclosed curtilage areas. To take this step is error enough.423 The justices’ reliance on property concepts, like their drift from societal expectations and their ratification of pre-Katz rules, can be explained by the atomic code.424 Blaming the atomic code makes sense. After all, the code insulates each part of “search” doctrine from the other; and it calls for particular behavior within each atom (i.e., old atoms are permanent in their content; new atoms are given content through analogous atoms). These commands regarding personal commitments and mechanical extrapolations in effect trump Katz’s charge to resolve cases based on an objective and evolving standard of privacy.425 to a dormant “aerial surveillance” atom through analogy to their “public vantage” or “informant” atoms. 419 See, e.g., id. at 459 (Brennan, J., dissenting). 420 See id. at 456, 457. 421 Compare id. at 446, with Dow Chemical Co. v. United States, 476 U.S. 227, 228 (1986) and California v. Ciraolo, 476 U.S. 207, 208 (1986). 422 Riley, 488 U.S. at 460 (Brennan, J., dissenting). 423 Id. at 460–61. 424 The only evidence of a justice breaking from the atomic code in the post-Katz era is Justice Harlan’s dissent in White. See generally United States v. White, 401 U.S. 745, 768–95 (1971) (Harlan, J., dissenting). 425 While the justices continue to reiterate the language of Katz’s two-part test, these “paper rules” have had little impact on decisionmaking. See generally Maclin, supra note 88, at 72–96. “By 1979, Katz’s famous words were a meaningless slogan, often cited but lacking principle and influence. Expectations theory and risk analysis replaced Katz as the defining methodology for measuring the Fourth Amendment’s protection.” Id. at 79. 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 61 B. Contending Descriptive Claims The atomic code offers a compelling positive account of the Court’s “search” interpretations of the past century. Furthermore, this account cannot be subsumed by the prevailing explanations found in the search-and-seizure literature.426 Each of these explanations, as discussed in Part I, rests on “judicial preferences” of some kind.427 But the code is different: for it inhibits the justices from incorporating their preferences (which, for some, would likely include “expectations of privacy”) into “search” decisionmaking. This alone renders it unique from the prevailing positive accounts. Even if one assumes that the atomic code is not a constraint but a preference, many differences would still exist between it and the standard accounts of the Court’s “search” interpretations.428 For example, the atomic code can be distinguished from stare decisis (a common explanation for the length of the Olmstead era and the failure of Katz) in at least three significant ways. First, the atomic code hinges on the commitments of individual justices rather than those of Court majorities.429 Second, the atomic code reflects not a preference for “legitimacy” through the “appearance of constraint” but rather “reliability” for the sake of “fairness.”430 In other words, the atomic code will not constrain the justices from rulings that simply “appear unconstrained” so long as the decision is sufficiently “reliable” for law enforcement.431 Third, the atomic code precedes the justice’s contemplation of doctrinal charges.432 With “search” stare decisis, the Court uses past rulings to interpret prevailing doctrinal rules. The atomic code, on the other hand, altogether constrains contemplation of doctrinal changes.433 426 The code is unique from descriptions concerning the vagueness of Katz, the inaccessibility of empirical data, and the claims of unfaithful adjudication addressed by commentators. 427 See supra note 160. The vagueness and empirical explanations, as discussed in Part II, hold that the justices have become disenchanted with Katz and have, as a result, resolved cases based on old rules, subjective privacy views, or property concepts (either out of a sense of duty or to maximize juridical or policy preferences). The “preferences” explanation, on the other hand, holds that the justices never attempt a sincere application of Katz but pass straight to the maximization of juridical or policy preferences. See supra Part I.B.3. 428 See Schauer, supra note 186, at 672 n.57 (explaining that the rule with local priority will typically prevail over the more general one in a system of rule-based decisionmaking). 429 See supra notes 214–17 and accompanying text. 430 By “fairness” I mean the calibrated allocation of rewards and punishments to law enforcement. See supra Part II.B.2. This assumes, of course, that the code is motivated by any judicial preferences. For the “concreteness” source of the code does not operate on the level of consciousness. See supra discussion Part II.B.1. 431 For example, while the Katz ruling might have suggested to some that the Court was “unconstrained” it was less likely to have suggested that the Court was “unreliable.” See Berger v. New York, 388 U.S. 41, 63–64 (1967) (holding that a New York statute authorizing eavesdropping without probable cause of a specific crime is unconstitutional); Silverman v. United States, 365 U.S. 505, 509 (1961) (finding that eavesdropping was unconstitutional because it was done by unauthorized penetration onto the premises). 432 See supra notes 284–86 and accompanying text. 433 Respect for stare decisis will cause the justice to consciously weigh “legitimacy” concerns 62 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 Neither can the atomic code be subsumed by the explanation that there is a “hydraulics” effect resulting from the exclusionary rule.434 One variant of this hydraulics argument is that the justices modify their interpretation of “search” to avoid exclusion (i.e., the injustice of the “criminal going free.”).435 A second variant is that, due to exclusion’s role as the Fourth Amendment’s primary enforcement mechanism, the justices see fewer cases involving “non-criminals,” become less mindful of “sympathetic” search victims, and thus, over time, constrict their “search” rulings accordingly.436 The atomic code, even if viewed as a preference rather than a constraint, differs from both variants. First, the implications of the atomic code are neutral. The code can influence decisions in either pro-defendant or pro-government ways (whereas the exclusionary “drift” is uniformly pro-government). Second, the code reflects the justices’ deep concerns over fair allocations of rewards and punishments to law enforcement rather than fair punishments for criminals.437 As a result the atomic code forces the judiciary to consider a potentially far broader set of implications (i.e., not simply the case before the Court but rather all potentially impacted non-final cases). Third, the effects of the atomic code have not been remedied by the exclusionary rule’s “categorical exceptions.”438 While exclusionary rule exceptions can negate the influence of the “exclusionary” drift (at least its first variant), the recognition of an exception in one case does nothing, by itself, to prevent the risk of a misallocation of rewards and punishments to law enforcement in a host of other non-final cases.439 The code is also distinct from the brands of judicial pragmatism percolating within the search-and-seizure literature.440 Professor Kerr’s theory of “equilibrium adjustment” suggests that judicial interpretations of the Fourth Amendment are driven by the justices’ interests in maintaining the balance of power in the criminal justice system.441 against sincere applications of the doctrinal charge. With the atomic code the justices are simply led to their decision without engaging with the doctrinal charge. 434 See supra note 190 and accompanying text. 435 See supra notes 189–93 and accompanying text. 436 Id. 437 See supra Part II.B.2. 438 See, e.g., Nix v. Williams, 467 U.S. 431, 446–47 (1984) (identifying an “inevitablediscovery” exception to the exclusionary rule). But see Davis v. United States, 131 S. Ct. 2419, 2429 (2011) (expanding the good-faith exception to include officers’ reasonable reliance on binding appellate precedent which will likely provide a structural remedy for the misallocation that is currently managed through maintenance and rigid extrapolations). 439 For instance, if the Court found that a new rule on “search” applied to non-final cases, but the case before the Court was unaffected due to a traditional exclusionary rule exception, this would not eliminate the justices’ fears that a misallocation of rewards and punishments will result in similar non-final cases (the vast majority of which would not be eligible for the exclusionary rule exception). 440 See Kerr, supra note 7, at 480. 441 Id. (“When new tools and new practices threaten to expand or contract police power in a significant way, courts adjust the level of Fourth Amendment protection to try to restore the prior equilibrium.”). 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 63 Both equilibrium adjustment and the atomic code have a neutral impact. Yet one difference (beyond the code’s “constraining” orientation)442 is that “equilibrium adjustment” views “search” interpretations as coherent (rather than atomistic) across the continuum of “search” cases. A second difference is that the atomic code is less forward-looking. The atomic code focuses on avoiding misallocations of rewards and punishments for past police behavior while “equilibrium adjustment” seeks to establish a set of rules to govern future interactions between citizens and law enforcement.443 C. Code Dynamics The atomic code constrains the justices’ ability to resolve “search” issues in accordance with their juridical and policy preferences.444 Yet it would be an overstatement to say that the code renders judicial preferences wholly irrelevant to “search” decisionmaking. Justices, after all, regularly hold differing views about (1) the scope of certain atoms;445 (2) the priority of atoms in a given case;446 and (3) the best analogy with which to assign content to dormant atoms.447 Through the disposition of these three issues, the justices’ juridical and policy preferences (regarding structure, doctrine, interpretation, etc.) can wield some influence over their interpretation of “search.” For instance, a justice might be able to prioritize a particular old atom (with favorable 442 See infra Part III.C. It should be noted that the explanation relating to the “vagueness” of Katz is slightly related to the “concreteness” source of the atomic code. But the “concreteness” source is based not only on the vagueness (i.e., abstractness) of Katz but, more importantly, the concreteness of “search.” Any explanation of “search” jurisprudence which neglects the “concreteness” of “search” is incomplete. See discussion supra Part II.B.1. Moreover the vagueness explanation holds that, once disenchanted with Katz, the justices are liberated, in a sense, to defer to old rules, subjective views of privacy, or property concepts. The atomic code (of which “concreteness” of “search” is a source) does not liberate but rather constrains preferences. See discussion infra Part III.C. 444 By normative preferences I mean interpretive methodologies, doctrinal charges, constitutional structure, and policy preferences. See supra notes 182–93 and accompanying text. 445 See, e.g., Florida v. Riley, 488 U.S. 445, 456–57 (1988) (reflecting Justice Stevens’s decision that, unlike his colleagues, his “aerial surveillance” atom—with content of “nonsearch”—did not extend to the government’s surveillance in Riley); Lopez v. United States, 373 U.S. 427, 441 (1963) (Warren, C.J., concurring) (stating that his “informant” atom—with content of “non-search”—did not extend, like the “informant” atom of some of his colleagues, to include the government’s actions in On Lee v. United States, 343 U.S. 747 (1952)). 446 See Silverman v. United States, 365 U.S. 505, 512–13 (1961) (Douglas, J., concurring) (explaining that the majority was wrong to not resolve the case based on their “wiretap” atom); On Lee, 343 U.S. at 759–60 (Frankfurter, J., dissenting) (criticizing the majority for not disposing of the matter through their “wiretap” atom). 447 Compare California v. Ciraolo, 476 U.S. 207, 213–14 (1986) (analogizing “aerial surveillance” atom to “surveillance from public vantage point”), with id. at 220–23 (Powell, J., dissenting) (analogizing “aerial surveillance” to “trespass of curtilage”). Compare Olmstead v. United States, 277 U.S. 438, 466 (1928) (analogizing wiretapping to visual surveillance from a public vantage point), with id. at 474–76 (Brandeis, J., dissenting) (analogizing wiretapping to the entry of a home or the opening of a sealed letter). 443 64 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 content) over another old atom (with unfavorable content).448 Or she might artificially cabin the scope of an old atom with unfavorable content in order to claim a new “dormant” atom whose content will, with the right analogy, be more favorable.449 Nonetheless there are real limitations on the justices’ ability to manipulate the atomic code. First, there will be times when a justice feels uncomfortable dissecting his “search” atoms to the degree necessary to reach a preferred outcome. Obvious examples are those where an old atom unavoidably applies (e.g., dog sniffs),450 or where there is no credible analogy available for the justice to reach her desired content (e.g., the use of a beeper tracking device).451 Second, the justices’ juridical and policy preferences will not always be aligned with a particular outcome.452 And when faced with a “hard” case, a justice will be likely to defer to a sincere analysis of the scope, priority, and analogical issues concomitant to the atomic code. For instance, a justice might value “contextual privacy” but disfavor the “exclusionary rule.” In these cases, the justice—instead of making a tough choice between competing preferences—may resort to a straightforward application of the code. Third, the constraints of the atomic code strengthen with time: the longer the justice serves, the more attributions she makes, and the more difficult it becomes for her to navigate the atomic code to reach preferred outcomes. In a justice’s early years on the Court, she will have made fewer attributions and thus it will be easier to (1) claim a new “dormant” atom; and then (2) assign favorable content through analogical reasoning to an atom with preferred content. Yet, later in her career, manipulation becomes harder. Over time the atomic code boxes individual justices into “search” analyses that inhibit the incorporation of evolving juridical or policy preferences.453 448 See Lopez, 373 U.S. at 437–39 (prioritizing the “informant” atom in order to avoid forcing a vote on the “wiretap” atom); On Lee, 343 U.S. at 753–54 (same). 449 See Justice Stevens’s vote in Florida v. Riley, 448 U.S. 445 (1988). Justice Stevens concluded that the helicopter surveillance of Riley fell outside of his “aerial surveillance” atom. He then attributed “search” content to this dormant atom through analogy to his “curtilage” atom. See id. at 460. 450 See, e.g., Illinois v. Caballes, 543 U.S. 405, 408–10 (2005). See also United States v. White, 401 U.S. 745, 751–54 (1971) (revisiting whether obtaining inculpating information through the use of a government informant is a “search”). 451 United States v. Knotts, 460 U.S. 276, 285 (1983) (holding, without dissent, that the use of a beeper to track public movements did not constitute a “search”). As it turns out, the “sequencing” of cases is very important to outcomes. In United States v. Miller, 425 U.S. 435 (1976), Justice Stewart concluded that the acquisition of records subpoenaed from a bank was a “non-search.” Id. at 444. Three years later, in Smith v. Maryland, 442 U.S. 735 (1979), Justice Stewart held that acquisition of pen register device on phone company property was a “search.” Id. at 747 (Stewart, J., dissenting). In Smith, Justice Stewart analogized pen registers to the conversations in Katz. Id. at 747–48. Had Smith been decided before Miller then Justice Stewart would have very likely analogized the bank records in Miller to the phone records in Smith (and thus concluded that Miller was “searched”). 452 See supra notes 182–93 and accompanying text. 453 The Court’s recent decision in United States v. Jones, 132 S. Ct. 945 (2012), illustrates a way for the justices to avoid the implications of the code. In Jones, a majority of the Court, 2012] THE REAL RULES OF “SEARCH” INTERPRETATIONS 65 To illustrate this constraining impact of the atomic code, assume: (1) Justice A seeks to sincerely apply the objective and evolving privacy standard from Katz. (2) Every government act falls within one or more atoms (each of which has an “intrusiveness factor” ranging from 0 to 100). (3) Justice A holds that an act with an “intrusiveness factor” of 50 in a “wiretap” atom violates a “reasonable privacy expectation.” (4) The societal context of wiretap usage evolves,454 and, as a result, Justice A decides that only those acts with an intrusiveness factor above 75 in a “wiretap” atom violate a “reasonable expectation of privacy.” At this point the Court grants certiorari in a case with a government act in a “wiretap” atom with an intrusiveness factor of 66. The atomic code inhibits Justice A from revisiting his initial attribution (of “search” to his “wiretap” atom at intrusiveness factor 50). As a result, the Justice cannot claim that the government act with an intrusiveness factor of 66 is a “non-search” in his “wiretap” atom. To support a holding of “non-search” the only alternative is to claim that the case is governed by a different atom altogether. Yet, it is possible that the case cannot be credibly covered by an old atom with the preferred “no search” content. And although the Justice might alternatively claim that the case is governed by a new “dormant” atom, it is possible that there will be no old atoms with the preferred “non-search” content from which to analogize. All things being equal, these constraints strengthen over the Justice’s tenure on the bench.455 This simple model illustrates how the atomic code constrains justices from interpreting “search” cases in accordance with their juridical and policy preferences (which includes, at least for Justice A, “reasonable expectations of privacy”). As a final note, one should be cautious before extrapolating the atomic code across the spectrum of “constitutional interpretation.” Certainly the concreteness of terms and the demand for calibrated retroactivity will have some influence on other areas frustrated with the constraints of the code, simply redefined “search.” It supplemented the “reasonable expectations of privacy” standard with a trespass standard. See id. This offered the justices freedom from the code, thereby allowing them to reach a preferred outcome. But this new test will, with time, be constrained by its to its own atomic code (pegged not to the concrete term “search” but to the concrete term “trespass”). Paradoxically, the only way to faithfully apply the abstract “reasonable expectations of privacy” standard is for the justices to create new concrete definitions of “search” to justify outcomes that fit with “reasonable expectations of privacy.” Of course, this is not realistic. The motive to maintain abstraction will inevitably be forgotten as the Court cycles through concrete redefinitions. 454 Imagine, for instance, that the nation felt under imminent threat of terrorist attacks, and that one leading terrorism suspect was recently detected and eventually apprehended through the use of warrantless wiretapping. 455 See supra Part II.A.2.b. This assumes a certain degree of ideological consistency in the Justice’s rulings during the early phases of her tenure. 66 WILLIAM & MARY BILL OF RIGHTS JOURNAL [Vol. 21:1 of constitutional law.456 But any shift from the particular to the general would require far greater analysis than that which is offered here. The objective of this article is simply to describe one particularly active subset of constitutional interpretation. If this positive account of “search” interpretations happens to offer insights into other contexts of constitutional interpretation, then all the better.457 CONCLUSION The arc of Olmstead and the failure of Katz continue to hold the focus of many who teach, analyze, and interpret the Fourth Amendment. This article unveils a new positive account for these phenomena. Intimated in Justice Kennedy’s recent majority opinion of City of Ontario v. Quon, the atomic code holds that each justice treats the “search” doctrine as a collection of search “atoms,” assigns content to her atoms through analogical reasoning, and does not reassess the content of old atoms once there has been an initial attribution.458 The atomic code’s interpretive guidelines (i.e., “personal commitments” and “mechanical extrapolations”) inhibit not only the justices’ application of paper rules (i.e., Katz’s objective and evolving privacy standard)459 but, more generally, the justices’ incorporation of their juridical and policy preferences into “search” decisionmaking.460 456 It does seem, however, that the Court will avoid the atomic code when it interprets abstract text (either directly or pursuant to an abstract redefinition). See, e.g., Atkins v. Virginia, 536 U.S. 304, 311–12 (2002) (redefining the abstract concept of “Cruel and Unusual Punishment” with abstract “evolving standards of decency.”). 457 Although this article does not develop a prescription for the costs incurred by the atomic code, a potential remedy worth exploring is the complete severance of “reasonable expectations of privacy” from “search.” See Miranda v. Arizona, 384 U.S. 436 (1966) (creating a prophylactic rule that is unhinged from the constitutional text). Mitigating the force of the atomic code will allow justices who strive for sincere applications of the Katz test to reach results that are more aligned with societal expectations of privacy. See supra Part I.B.2. 458 See supra Part II.A.2.b. 459 Katz v. United States, 389 U.S. 347, 360 (1967) (Harlan, J., concurring). 460 See supra notes 182–93 and accompanying text. The Court avoids the code when it interprets abstract constitutional text either directly or pursuant to an abstract redefinition.
Keep reading this paper — and 50 million others — with a free Academia account
Used by leading Academics
Rafael Domingo Osle
University of Navarra
Dierle Nunes
PUC Minas
francesco clementi
Università degli Studi "La Sapienza" di Roma
Marcelo Andrade Cattoni de Oliveira
UFMG - The Federal University of Minas Gerais