1AC Plan The United States Supreme Court should rule that government aerial surveillance without a warrant is unconstitutional under the 4th amendment Advantage 1: Privacy First, the plan solves privacy and closes loopholes — a judges warrant allows for privacy but still allows law enforcement effectiveness Guliani 15 — Neema Singh Guliani, American Civil Liberties Union Washington Legislative Office, focusing on surveillance, privacy, and national security issues. Prior to joining the ACLU, she worked in the Chief of Staff’s Office at DHS, concentrating on national security and civil rights issues. She has also worked as an adjudicator in the Office of the Assistant Secretary for Civil Rights in the Department of Agriculture and was an investigative counsel with House Oversight and Government Reform Committee, where she conducted investigations related to the BP oil spill, contractors in Iraq and Afghanistan, and the Recovery Act. Neema is a graduate of Brown University where she earned a BA in International Relations with a focus on global security and received her JD from Harvard Law School in 2008, 2015 (“Unchecked government drones? Not over my backyard,” The Hill, March 24th, Available online at http://thehill.com/blogs/congress-blog/civil-rights/236701-uncheckedgovernment-drones-not-over-my-backyard, accessed on 7-13-15) GIE Right now, the federal government doesn’t have a clear picture of how it’s using drone technology across agencies and departments, nor does it have clear, consistent standards in place to protect Americans’ privacy. For example, at a hearing last June, then-FBI Director Robert Mueller III acknowledged that the bureau was using drones for surveillance. When asked about policy and procedures to regulate this use, he confessed that the agency was only in the initial stages of creating them. If the federal government doesn’t have clear rules in place for drone use, how can citizens be sure that their privacy is being protected? Hopefully this will begin to change with the new presidential memorandum. Mandating that agencies describe their drone use is a necessary first step, and the Obama administration deserves credit for taking it, but this is not a sufficient protection for Americans’ privacy. Given the potential invasiveness of this technology and how frequently it is used, letting government agencies set their own drone use guidelines, is a recipe for failure. Instead, Obama should require all federal agencies to meet strong minimum privacy standards, and close the following privacy loopholes in his existing guidance. First and foremost, absent an emergency, law enforcement agencies should only use drones to conduct surveillance or gather information with a warrant. This is not a rule that should be left to the discretion of individual agencies. Second, the federal government should restrict the purposes for which drones can be used by agencies. The guidelines allow drones to be used for any “authorized purpose,” which is not strictly defined. Drones should only be used in emergencies, by law enforcement with a warrant, or in situations where they are unlikely to substantially intrude on people’s privacy, such as environmental surveys. Second, privacy is central to personal liberty and individuality, it turns individuals into statistics, the courts have an obligation to solve Mills 08 — Jon L. Mills, B.A. from Stetson University in 1969. He went on to the University Of Florida College Of Law where he graduated second overall in 1972. While at the Levin College of Law he served on the Florida Law Review, and was a member of Florida Blue Key. Before Mills became the Dean (education) of the Levin College of Law he served as a Professor at the University of Florida in 1995, 2008 (Privacy: The Lost Right, ISBN: 978-0195367355, Oxford University Press, Accessed On 7-16-15, pg. 305-306) Privacy, as a central part of personal liberty and individuality, is a touchstone of American democracy and a generally accepted, yet amorphous, global right. A combination of forces from the government, an intrusive society, commercial interests, and segments of the press are, in effect, crushing the individual's right to be let alone. If they were concerned about an intrusive world in 1890, what might Warren and Brandeis think today? In 2008, the law is ill equipped to protect citizens from the private and public assault on their privacy. This onslaught is not the result of some grand conspiracy. No conspiracy could work so well. In fad-, the government, the information industry, and the press are, at least on the surface, doing what the public demands: they are providing security, needed information, and the news and gossip that the public wants. The status of our collective privacy is unpredictable, inconsistent and changing continually—a reflection of a society with changing mores and changing technology. The confluence of technology and the motivations of data brokers are causing the individual to be treated more and more as a statistic. The threshold question is, do we care? Well, we do when we are hurt. We care when the government dictates that a loved one must die painfully. We care when we are crime victims scrutinized by the press. We care when we do not get a job because of inaccurate criminal records. As part of today's culture and society, no individual is immune. As suggested in the introduction, there are very few private aspects of a “day in the life" of a modern citizen. Further, as this book has made clear, the legal solutions are piecemeal and incremental, requiring the public to demand remedies for violations of their right to privacy. The impact is so vast and comprehensive that no one ethnic, religious, or other group is singled out. We are all part of the privacy interest group. So far, most of us are underinformed as to what is happening to us and are largely unaware of any effective legal remedies. However, there are legal remedies for privacy violations. And, if the privacy right is important, the courts have an obligation to fashion effective options from the myriad remedies. There will be no single sweeping reform that will bestow privacy on each of us. The forces and policies that support intrusions on individual privacy are too substantial and in some cases, are supported by most of the public. For example, most of the public supports warrantless searches and constant camera surveillance to counter violence and terrorism. Likewise, most of the public shows a voyeuristic interest in tabloids and disaster journalism, at least until someone in their own family becomes an unwilling subject. This most individual of rights requires our personal commitment to protect ourselves through our personal choices and actions and our advocacy. The central lessons of a study of privacy today are as follows: • No universal agreement exists on the scope of privacy because of inherent moral, political, and perceptual differences. • Privacy is a broad concept affecting multiple facets of human existence that individuals and governments value as a general principle. • A single policy is not probable or practical to protect privacy across the globe or even across the county. • A broader understanding of the scope of privacy (i.e., recognizing which issues are important to individual liberty) is a prerequisite for protecting individual privacy. Third, privacy is a prerequisite to democracy Michael McFarland, [a computer scientist with extensive liberal arts teaching experience and a special interest in the intersection of technology and ethics, served as the 31st president of the College of the Holy Cross.], June 2012 “Why We Care about Privacy”, Online: http://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/why-care-aboutprivacy.html Privacy is even more necessary as a safeguard of freedom in the relationships between individuals and groups. As Alan Westin has pointed out, surveillance and publicity are powerful instruments of social control. 8 If individuals know that their actions and dispositions are constantly being observed, commented on and criticized, they find it much harder to do anything that deviates from accepted social behavior. There does not even have to be an explicit threat of retaliation. "Visibility itself provides a powerful method of enforcing norms." 9 Most people are afraid to stand apart, to be different, if it means being subject to piercing scrutiny. The "deliberate penetration of the individual's protective shell, his psychological armor, would leave him naked to ridicule and shame and would put him under the control of those who know his secrets." 10 Under these circumstances they find it better simply to conform. This is the situation characterized in George Orwell's 1984 where the pervasive surveillance of "Big Brother" was enough to keep most citizens under rigid control. 11 Therefore privacy, as protection from excessive scrutiny, is necessary if individuals are to be free to be themselves. Everyone needs some room to break social norms, to engage in small "permissible deviations" that help define a person's individuality. People need to be able to think outrageous thoughts, make scandalous statements and pick their noses once in a while. They need to be able to behave in ways that are not dictated to them by the surrounding society. If every appearance, action, word and thought of theirs is captured and posted on a social network visible to the rest of the world, they lose that freedom to be themselves. As Brian Stelter wrote in the New York Times on the loss of anonymity in today's online world, "The collective intelligence of the Internet's two billion users, and the digital fingerprints that so many users leave on Web sites, combine to make it more and more likely that every embarrassing video, every intimate photo, and every indelicate e-mail is attributed to its source, whether that source wants it to be or not. This intelligence makes the public sphere more public than ever before and sometimes forces personal lives into public view." 12 This ability to develop one's unique individuality is especially important in a democracy, which values and depends on creativity, nonconformism and the free interchange of diverse ideas. That is where a democracy gets its vitality. Thus, as Westin has observed, "Just as a social balance favoring disclosure and surveillance over privacy is a functional necessity for totalitarian systems, so a balance that ensures strong citadels of individual and group privacy and limits both disclosure and surveillance is a prerequisite for liberal democratic societies. The democratic society relies on publicity as a control over government, and on privacy as a shield for group and individual life." 13 When Brandeis and Warren wrote their seminal article on privacy over one hundred years ago, their primary concern was with the social pressure caused by excessive exposure to public scrutiny of the private affairs of individuals. The problem for them was the popular press, which represented the "monolithic, impersonal and value-free forces of modern society," 14 undermining the traditional values of rural society, which had been nurtured and protected by local institutions such as family, church and other associations. The exposure of the affairs of the well-bred to the curiosity of the masses, Brandeis and Warren feared, had a leveling effect which undermined what was noble and virtuous in society, replacing it with the base and the trivial. Even apparently harmless gossip, when widely and persistently circulated, is potent for evil. It both belittles and perverts. It belittles by inverting the relative importance of things, thus dwarfing the thoughts and aspirations of a people. When personal gossip attains the dignity of print, and crowds the space available for matters of real interest to the community, what wonder that the ignorant and thoughtless mistake its relative importance.... Triviality destroys at once robustness of thought and delicacy of feeling. No enthusiasm can flourish, no generous impulse can survive under its blighting influence. 15 For Brandeis and Warren, privacy was a means of protecting the freedom of the virtuous to maintain their values against the corrupting influence of the mass media that catered to people's basest instincts. Although the degrading effect of the mass media is still a problem, today a more serious threat to freedom comes from governments and other large institutions. Over the last century, governments have developed sophisticated methods of surveillance as a means of controlling their subjects. This is especially true of totalitarian states, as the passage from Westin quoted above indicates. The Soviet Union, Communist China, Nazi Germany, Fascist Italy and white-run South Africa all used covert and overt observation, interrogation, eavesdropping, reporting by neighbors and other means of data collection to convince their subjects that independent, "antisocial" thought, speech and behavior was unacceptable. In many cases the mere presence of the surveillance was enough to keep people in line. Where it was not, the data collected was used to identify, round up and punish elements of the population that were deemed dangerous. For example, Ignazio Silone, in his book Bread and Wine, described the use of surveillance in Fascist Italy in this way: It is well-known [says Minorca] that the police have their informers in every section of every big factory, in every bank, in every big office. In every block of flats the porter is, by law, a stool pigeon for the police.... This state of affairs spreads suspicion and distrust throughout all classes of the population. On this degradation of man into a frightened animal, who quivers with fear and hates his neighbor in his fear, and watches him, betrays him, sells him, and then lives in fear of discovery, the dictatorship is based. The real organization on which the system in this country is based is the secret manipulation of fear. 16 While totalitarian regimes may not seem as powerful or as sinister as they did 50 years ago, surveillance is still used in many places as an instrument of oppression. For example Philip Zimmerman, the author of the PGP (Pretty Good Privacy) data encryption program, reports receiving a letter from a human rights activist in the former Yugoslavia that contained the following testimonial: We are part of a network of not-for-profit agencies, working among other things for human rights in the Balkans. Our various offices have been raided by various police forces looking for evidence of spying or subversive activities. Our mail has been regularly tampered with and our office in Romania has a constant wiretap. Last year in Zagreb, the security police raided our office and confiscated our computers in the hope of retrieving information about the identity of people who had complained about their activities. Without PGP we would not be able to function and protect our client group. Thanks to PGP I can sleep at night knowing that no amount of prying will compromise our clients. 17 More recently social media and the Internet played major roles in the "Arab Spring" uprisings in the Middle East, causing Egypt and Libya to shut down the Internet in their countries in an attempt to stifle dissent. 18 In China there has been an ongoing battle between the government and activist groups over government monitoring and censorship of the Internet. 19 Even in a democracy, there is always the danger that surveillance can be used as a means of control. In the United States, for example, where freedom is such an important part of the national ethos, the FBI, the CIA, the National Security Agency (NSA) and the armed forces have frequently kept dossiers on dissidents. The NSA from 1952 to 1974 kept files on about 75,000 Americans, including civil rights and antiwar activists, and even members of Congress. During the Vietnam war, the CIA's Operation Chaos collected data on over 300,000 Americans. 20 Since then the NSA has had an ongoing program to monitor electronic communications, both in the U.S. and abroad, which has led to constant battles with individuals and groups who have sought to protect the privacy of those communications through encryption and other technologies. 21 Some of the most famous incidents of surveillance of dissidents, of course, occurred during the Nixon administration in the early 1970s. For example, when Daniel Ellsberg was suspected of leaking the Pentagon Papers, an internal critique of government conduct of the Vietnam war, Nixon's agents broke into the office of Ellsberg's psychiatrist and stole his records. 22 And it was a bungled attempt at surveillance of Nixon's political opposition, as well as illegal use of tax returns from the IRS, that ultimately brought down the Nixon administration. 23 More recently, during the 1996 presidential campaign, it was revealed that the Clinton White House had access to the FBI investigative records of over 300 Republicans who had served in the Reagan and Bush administrations. The Clinton administration claimed it was all a mistake caused by using an out-of-date list of White House staff, while the challenger Bob Dole accused them of compiling an "enemies list." >sup>24 Whatever the motivation, the head of the FBI termed the use of the files "egregious violations of privacy." 25 Since the 9/11 terrorist attacks in 2001, there has been even greater urgency in the government's efforts to monitor the activities and communications of people, both foreigners and its own citizens, in order to identify and prevent terrorist threats. The Patriot Act, passed less than two months after 9/11, greatly expanded the government's authority to intercept electronic communications, such as emails and phone calls, including those of U.S. citizens. As a result government agencies have been building the technological and organizational capabilities to monitor the activities and communications of their own citizens. For example, Wired magazine revealed in a recent report how the National Security Agency has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created. In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it's all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever. 26 The FBI, the Drug Enforcement Agency and the Department of Homeland Security also have many programs to monitor citizens in general, not just those who are under suspicion. These efforts include sifting through media references, 27 tracking chatter on social networks, 28 and monitoring peoples' movements through license plate scanners 29 and video cameras. 30 The mere knowledge that American citizens could be the subjects of surveillance can in itself have a chilling effect on political freedom. "Now it is much more difficult than it once was to dismiss the possibility that one's phone is being tapped, or that one's tax returns may be used for unfriendly political purposes, or that one's life has become the subject of a CIA file. The realization that these activities might take place, whether they really do or not in any particular instance, has potentially destructive effects on the openness of social systems to innovation and dissent." 31 At times the government in the United States has gone beyond surveillance and intimidation and has used the data gathered as a basis for overt oppression. One of the most blatant examples is the internment of over 100,000 Japanese Americans, most of them American citizens, during World War II. The Justice Department used data from the Census Bureau to identify residential areas where there were large concentrations of Japanese Americans, and the army was sent in to round them up. They were taken away from their homes and held in concentration camps for the duration of the war. 32 Governments do need information, including personal information, to govern effectively and to protect the security of their citizens. But citizens also need protection from the overzealous or malicious use of that information, especially by governments that, in this age, have enormous bureaucratic and technological power to gather and use the information. Fourth, unlimited Drone surveillance is ethically wrong — marginalizes populations and harms cultures Finn and Wright 12 — Rachel L. Finn, Senior Research Analyst at Trilateral Research, former research associate at the University of Hull, Rachel was also a research associate at the University of Manchester and an associate lecturer at Manchester Metropolitan University. She has a Ph.D. in Sociology from the University of Manchester, David Wright, founder of Trilateral Research, He is currently a member of the European Commission’s trust at risk foresight expert group, 2012 (“Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications,” Science Direct, March 23rd, Available online at http://www.sciencedirect.com/science/article/pii/S0267364912000234, Accessed on 7-14-15) In addition to safety concerns, there are significant ethical considerations surrounding the use of UASs for surveillance in civil applications. There has been an on-going debate on the ethics of using remotely piloted vehicles in combat operations. They have been blamed for significant losses of life on the ground in combat zones, the removal of soldiers “from the human consequences of their actions”.100 In relation to civil applications, Hayes, of Big Brother Watch, states that “drones and other robotic tools will add to the risks of a Playstation mentality developing along Europe’s borders”,101 where bodies are objectified into “things to track, monitor, apprehend, and kill”.102 Hayes further argues that the European Union’s security-industrial complex has placed law enforcement demands ahead of civil liberties concerns.103 Nevins agrees, stating that “the normalization of previously unacceptable levels of policing and… official abuse” has “disturbing implications for civil and human rights”. Whitehead concurs, stating that “the logical aim of technologically equipped police who operate as technicians must be control, containment and eventually restriction of freedom”.104 Nevins also reports fears of “mission creep” in police use of UASs.105 However, there is some debate about how UASs affect the targets of this distantiated surveillance. Whitehead argues that drones raise civil liberties concerns because “[e]veryone gets monitored, photographed, tracked and targeted”.106 Similarly, Nevins notes that while UASs are seen by law enforcement as “just another tool in the toolbox” and technologically neutral, “[t]here is every reason to be concerned about how the law enforcement and ‘homeland security’ establishments will take advantage of their new tools”.107 Wall and Monahan argue that in combat situations this distantiation is racialised, where the use of UASs has: harm[ed] ethnic and cultural others with great prejudice…[and] lump[ed] together innocent civilians with enemy combatants, women and children with wanted terrorist leaders. From the sky, differences among people may be less detectable, or—perhaps more accurately—the motivations to make such fine-grained distinctions may be attenuated in the drive to engage the enemy. 108 We have already seen evidence that similar racialised marginalisation as well as class, gender and political marginalisation is occurring in relation to UAS surveillance in civil applications. Furthermore, the potential for UASs to carry weapons raises more immediate safety and ethical concerns about the right to life. According to PrisonPlanet.com, the death toll from non-lethal Tasers in the US is more than 350 people,109 which Wall and Monahan predict could “further the violent dehumanization and nondifferentiation” of UAS devices.110 Thus, despite apparent technological neutrality, the negative ethical impacts of UAS devices are likely to fall disproportionately on marginalised populations. Finally, Action on drones spills over to other privacy concerns Crump and Stanley 13 – (Jay Stanley – Senior Policy Analyst with the ACLU’s Speech, Privacy and Technology Project, former analyst at the technology research firm Forrester. Catherine Crump – staff attorney with the ACLU's Speech, Privacy, and Technology Project and a nonresident fellow with the Stanford Center for Internet and Society) [Why Americans Are Saying No to Domestic Drones] (http://www.slate.com/articles/technology/future_tense/2013/02/domestic_surveillance_drone_bans_are_sweeping_the_nation.html) //MC *fait accompli – a thing that has already happened or been decided before those affected hear about With drones, on the other hand, because of the safety and regulatory issues they raise, we have a chance to do it right. The American public and our elected representatives can, for once, get ahead of the deployment curve—we can raise awareness, propose protections, and build support for them before the problems hit us in the face. If done right, this moment of hyperawareness about privacy could become a more permanent state of affairs: Ryan Calo of Stanford’s Center for Internet and Society suggested in a December 2011 paper that because of their “disquieting” nature, drones “could be just the visceral jolt society needs” to spark broader changes in how Americans conceptualize privacy problems. Ultimately, the best solution on drones would be for Congress to pass strong, uniform rules protecting everyone across the nation and putting privacy concerns to rest. For example, law enforcement agents should not make drones general tools of surveillance but should instead utilize them only where they have a specific reason to believe that use of one will turn up evidence of criminal activity. Ideally, those protections would become a model for other, perhaps less vivid but equally intrusive technologies such as cellphone location tracking. But unless and until Congress acts, state and local resolutions and rules are the best thing Americans can do to protect our privacy from the enormously invasive potential of domestic surveillance drones. The upsurge in local activism around the country is just what’s needed to make this happen. Solvency Court rulings on drones is necessary to ensure 4th amendment protections Celso 14 – [Joel – JD Candidate @ Univesrity of Baltimore Law] [DRONING ON ABOUT THE FOURTH AMENDMENT: ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE SEARCHES BY UNMANNED AIRCRAFT SYSTEMS] V. CONCLUSION Under the Supreme Court's current jurisprudence, it is only a matter of time before the Fourth Amendment will no longer be able to provide protection from warrantless UAS surveillance, even in the home. n295 The answer to the question posed by Justice Scalia in Kyllo should not be that technology has the power to "shrink the realm of guaranteed privacy" to the point of elimination. n296 This is especially true given the Court's articulated concern that it "assures preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted." n297 Although the original degree of privacy is difficult to ascertain, allowing the government to use a UAS outfitted with facial recognition software or high-powered cameras to silently track individuals for extended periods of time without a warrant hardly seems to qualify. n298 Equally unlikely is the idea that Congress, rather than the Constitution, was expected to be the guarantor of privacy protections at the time the Fourth Amendment was adopted. n299 It is clear that the courts need a new approach to their Fourth Amendment jurisprudence to protect privacy from a technological onslaught. Requiring a warrant for all UAS surveillance will ensure that even the widespread use of UAS will not erode society's legitimate privacy expectations. Fourth amendment protection is the lynchpin to protect privacy Ahsanuddin 14 – (Sadia Ahsanuddin – Muslim Public Affairs Council Research Fellow; Harvard Grad, worked at three think tanks, Berkman Center for Internet and Society, Brennan Center for Justice and interned at the United Nations) [Domestic Drones: Implications for Privacy and Due Process in the United States] (accessed 3-25-15) //MC The reasonable expectation of privacy standard has been vital and several decisions have been handed down that indicate what to expect as drones get integrated into the national airspace. The privacy of the home, for instance, is still likely to be protected by the Fourth Amendment.100 In Kyllo v. United States,101 the Supreme Court considered a case where law enforcement used thermal-imaging devices to map the heat patterns emitting from a home. The Court ruled that the evidence obtained via the thermal-imaging device was inadmissible because the device allowed law enforcement “to explore details of the home that would previously have been unknowable without physical intrusion,” and therefore, “the surveillance is a “search” and is presumptively unreasonable without a warrant.”102 Barring certain exceptions, then, if a drone were operated to conduct warrantless surveillance of the inner quarters of a home, the surveillance would violate the Fourth Amendment. Kyllo is also an important case to consider because the Court recognized that thermal-imaging devices, as with drones today, were not widely-available to the public, and as such the average person could not reasonably foresee its use in investigating a private dwelling.103 However, not everything at home would be protected by the Fourth Amendment. Under the “plain view” doctrine, objects, statements, or activities that an individual exposes to the public are not currently considered to be protected by the Fourth Amendment.104 In the age of mass surveillance, however, the reasonable expectation of privacy standard will have to be reassessed. Courts will have to address whether individuals have any reasonable expectation of privacy, even when at home. Today, it is commonly expected that the government routinely surveils large numbers of people.105This capability to conduct surveillance will only strengthen with the increased use and prevalence of drones.106 In such an age, what will the average individual’s reasonable expectation of privacy be? As Professor Woodrow Hartzog stated, “Once you’ve been put on notice that you can have no expectation of privacy, then it’s not reasonable to expect any privacy in any area in particular.”107 2. Public vs. Private Places The demarcation between the public and private spheres is crucial when considering an individual’s right to privacy. The U.S. Supreme Court has traditionally held that an individual’s privacy rights are limited while in public; an individual does not have a reasonable expectation of privacy where they are privy to the public eye.108 They do, however, have a reasonable expectation of privacy in the intimate areas of their homes, as well as in the immediate areas around their homes.109 Existing case law presents an instructive vantage point from which to glean future law relating to drone surveillance. In United States v. Karo, for instance, the Drug Enforcement Agency (DEA) tracked a beeper device attached to a can of ether on public streets and in private residences.110 Because the DEA was not authorized to conduct any surveillance inside homes, the Court held that a trespass under the Fourth Amendment had occurred: “Indiscriminate monitoring of property that has been withdrawn from public view would present far too serious a threat to privacy interests in the home to escape entirely some sort of Fourth Amendment oversight.”111 As drones become increasingly used by law enforcement agencies, it is likely that there will be legal challenges and a reviewing court will have to determine the location of the individual and whether they had a reasonable expectation of privacy to determine whether an unreasonable search took place. Alternatively, courts may decide to determine whether the surveillance itself is reasonable, regardless of where it took place. According to a Congressional Research Service report, it can be deduced that surveilling an individual at home without a warrant, using technology not generally available, would constitute a search. If law enforcement were to use a normal camera or camcorder in order to record an individual in plain view of the public, albeit at home, law enforcement officers may be in their right to record data. It would also seem that brief drone surveillance of public areas may be permitted. And yet, courts may choose to distinguish between an unmanned [unstaffed] aircraft and a manned [staffed] aircraft conducting surveillance. Courts may decide that the technology used is a decisive factor in determining whether an unwarranted search has occurred, partly because law enforcement use of rare technological equipment may set apart what is “in plain view” of the public and what is not.112 Case law also offers insight on warrantless aerial surveillance as well: anything that cannot be viewed by the public while traveling through the United States’ navigable airspace is protected by the law. On the other hand, if an individual passing over a property can view some incriminating evidence with their bare eye, law enforcement does not need to obtain a warrant to submit that evidence in a court of law.113 In California v. Ciraolo, law enforcement conducted manned [staffed] aerial surveillance of the backyard of a suburban home based on a tip that the suspect was growing marijuana. Police flew an aircraft 1,000 feet above the suspect’s backyard and were able to identify the marijuana plants with their bare eyes. California argued that the respondent had “knowingly exposed” his backyard to aerial observation, because any member of the public flying through the navigable airspace over the respondent’s home could see the marijuana plants. The Supreme Court concluded that because “[a]ny member of the public” flying over the backyard could have observed the plants with their naked eye, the “respondent’s expectation that his garden was protected from such observation is unreasonable, and is not an expectation that society is prepared to honor.”115 Thus, the warrantless gathering of evidence from areas that are visible to the public was permitted by the Supreme Court.116 That the evidence was gathered using a manned [staffed] aircraft is applicable to the usage of drones to collect evidence. However, drones allow the possibility of extended surveillance to an extent that manned [staffed] aircraft does not. As the ACLU suggested, drone surveillance presents the possibility of “a single, distributed, wide-area surveillance system” via multiple mutually-coordinating drones deployed over a neighborhood.117 The U.S. Supreme Court has recognized that mass or extended surveillance may infringe upon the rights protected by the Fourth Amendment. Although the Supreme Court has held that warrantless location tracking on public roads is permissible, as in United States v. Knotts, a majority of justices in two concurrences in United States v. Jones indicated an awareness that prolonged surveillance of an individual encroaches upon Fourth Amendment rights. In United States v. Jones, the Supreme Court unanimously decided that the attachment of a GPS device to a car and the month-long tracking of the vehicle without a valid warrant constituted an unreasonable search, and that the evidence obtained therewith was inadmissible in court. The two concurrences, however, indicated that in the future, the Court might uphold an individual’s reasonable expectation of privacy in the face of lengthy, pervasive, and warrantless location tracking.119 Although the majority of the Court ultimately decided United States v. Jones based on the trespass on private property that law enforcement perpetrated when placing the tracking device on the suspects’ car,120 Justice Alito and Justice Sotomayor’s individual concurrences took issue with the warrantless cataloguing of the suspect’s actions for one month. In Justice Sotomayor’s words, the information collected about the suspect “reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”121 Concurrences represent a shadow majority willing to decide the issue on the grounds of the length of the search. As such, these opinions are instructive in considering the potential directions American jurisprudence may take when considering drone surveillance, especially since drones are better adept at cataloguing an individual’s associations than most formerly introduced technologies. A ruling now is necessary to stop any worse privacy invasions Stanley and Crump 11 – (Jay Stanley – Senior Policy Analyst with the ACLU’s Speech, Privacy and Technology Project, former analyst at the technology research firm Forrester. Catherine Crump – staff attorney with the ACLU's Speech, Privacy, and Technology Project and a nonresident fellow with the Stanford Center for Internet and Society) [Protecting Privacy From Aerial Surveillance:] (https://www.aclu.org/files/assets/protectingprivacyfromaerialsurveillance.pdf) (accessed 3-25-15) //MC UAVs and privacy With the federal government likely to permit more widespread use of drones, and the technology likely to become ever more powerful, the question becomes: what role will drones play in American life? Based on current trends— technology development, law enforcement interest, political and industry pressure, and the lack of legal safeguards—it is clear that drones pose a looming threat to Americans’ privacy. The reasons for concern reach across a number of different dimensions: Mission creep. Even where UAVs are being envisioned for search and rescue, fighting wildfires, and in dangerous tactical police operations, they are likely to be quickly embraced by law enforcement around the nation for other, more controversial purposes. The police in Ogden, Utah think that floating a surveillance blimp above their city “will be a deterrent to crime when it is out and about.”58 In Houston, police suggested that drones could possibly be used for writing traffic tickets.59 The potential result is that they become commonplace in American life.60 Tracking. The Justice Department currently claims the authority to monitor Americans’ comings and goings using GPS tracking devices—without a warrant. Fleets of UAVs, interconnected and augmented with analytics software, could enable the mass tracking of vehicles and pedestrians around a wide area. New uses. The use of drones could also be expanded from surveillance to actual intervention in law technologies could be developed that could, for example, be used to control or dispel protesters (perhaps by deploying tear gas or other technologies), stop a fleeing vehicle, or even deploy weapons.61 enforcement situations on the ground. Airborne In addition, drones raise many of the same issues that pervasive video surveillance brings in any context. For example: Chilling effects. What would be the effect on our public spaces, and our society as a whole, if everyone felt the keen eye of the government on their backs whenever they ventured outdoors? Psychologists have repeatedly found that people who are being observed tend to behave differently, and make different decisions, than when they are not being watched. This effect is so great that a recent study found that “merely hanging up posters of staring human eyes is enough to significantly change people’s behavior.”62 Voyeurism. Video surveillance is susceptible to individual abuse, including voyeurism. In 2004, a couple making love on a dark nighttime rooftop balcony, where they had every reason to expect they enjoyed privacy, were filmed for nearly four minutes by a New York police helicopter using night vision. This is the kind of abuse that could become commonplace if drone technology enters widespread use. (Rather than apologize, NYPD officials flatly denied that this filming constituted an abuse, telling a television reporter, “this is what police in helicopters are supposed to do, check out people to make sure no one is … doing anything illegal”).63 Discriminatory targeting. The individuals operating surveillance systems bring to the job all their existing prejudices and biases. In Great Britain, camera operators have been found to focus disproportionately on people of color. According to a sociological study of how the systems were operated, “Black people were between oneand-a-half and two-and-a-half times more likely to be surveilled than one would expect from their presence in the population.”64 Institutional abuse. In addition to abuse by the inevitable “bad apples” within law enforcement, there is also the danger of institutional abuse. Sometimes, bad policies are set at the top, and an entire law enforcement agency is turned toward abusive ends. That is especially prone to happen in periods of social turmoil and intense political conflict. During the labor, civil rights, and anti-Vietnam war movements of the 20th century, the FBI and other security agencies engaged in systematic illegal behavior against those challenging the status quo. And once again today we are seeing an upsurge in spying against peaceful political protesters across America.65 Automated enforcement. Drones are part of a trend toward automated law enforcement, in which cameras and other technologies are used to mete out justice with little or no human intervention. This trend raises a variety of concerns, such as the fact that computers lack the judgment to fairly evaluate the circumstances surrounding a supposed violation, and may be susceptible to bugs and other software errors, or simply are not programmed to fairly and properly encapsulate the state of the law as passed by legislatures.66 One point that is often made with regards to new surveillance technologies is that, while they may increase government surveillance of individuals, they can also increase individuals’ ability to record the activities of officials, which can serve as a check on their power.67 Too often, however, the authorities seek to increase their surveillance over individuals (for example, by installing surveillance cameras throughout public spaces) while restricting individuals’ ability to use that same technology as a check against their power (for example, by attempting to prevent individuals from videotaping police68). Already, security experts have started expressing concern that unmanned aircraft could be used for terrorism69—which naturally raises the question: will individuals be able to make use of the new technology for their own purposes, or will government seek a monopoly over the new technology by citing fears of its use for terrorism? The Fourth Amendment restricts the use of drones With drone technology holding so much potential to increase routine surveillance in American life, one key question is the extent to which our laws will protect us. The courts should impose limits on the use of drones for surveillance, prohibiting them from becoming pervasive. The Supreme Court has never taken a position on whether the Fourth Amendment places limits on government use of UAV surveillance. However, it allowed some warrantless aerial surveillance from manned [staffed] aircraft. In the 1986 decision California v. Ciraolo, the Supreme Court focused on whether an individual has a privacy interest in being free from aerial surveillance of his backyard. The police had received a tip that Dante Ciraolo was growing marijuana in his backyard, but high fences prevented them from viewing his backyard from the street. The police borrowed a plane, flew it over the backyard and easily spotted marijuana plants growing there. Ciraolo argued that his Fourth Amendment rights were violated because the government did not get a warrant. The Court rejected this argument, explaining that there was no intrusion into his privacy because “[a]ny member of the public flying in this airspace who glanced down could have seen everything that these officers observed.”70 In Dow Chemical Co. v. United States, also decided in 1986, the Supreme Court addressed whether the Environmental Protection Agency violated Dow’s Fourth Amendment rights when it employed a commercial aerial photographer to use a precision aerial mapping camera to take photographs of a chemical plant. The Court found no violation, in part because the camera the EPA used was a “conventional, albeit precise, commercial camera commonly used in mapmaking,” and “the photographs here are not so revealing of intimate details as to raise constitutional concerns.” However, the Court suggested that the use of more sophisticated, intrusive surveillance might justify a different result. It wrote, “surveillance of private property by using highly sophisticated surveillance equipment not generally available to the public, such as satellite technology, might be constitutionally proscribed absent a warrant.”71 In Florida v. Riley, decided in 1989, the police had received a tip that Michael Riley was growing marijuana in a greenhouse on the property surrounding his home. The interior of the greenhouse was not visible from the ground outside the property, and the greenhouse had a ceiling, though two panels in the ceiling were missing. A police officer flew over the greenhouse and spotted marijuana through the openings in the roof. While no reasoning commanded a majority of the Court, four justices concluded that its decision in Ciraolo applied because Riley had left part of the greenhouse open to public view, and so the search was constitutional.72 Because of their potential for pervasive use in ordinary law enforcement operations and capacity for revealing far more than the naked eye, drones pose a more serious threat to privacy than do manned [staffed] flights. There are good reasons to believe that they may implicate Fourth Amendment rights in ways that manned flights do not. Government use of UAVs equipped with technology that dramatically improves on human vision or captures something humans cannot see (such thermal or x-ray images) should be scrutinized especially closely by the courts. This follows from the Supreme Court’s statement in Dow Chemical that using sophisticated technology not generally available to the public may be considered a search under the Fourth Amendment. It is also suggested by the 2001 case Kyllo v. United States, in which the court rejected the use of thermal imaging devices to peer into a suspect’s home without a warrant.73 Further, the Supreme Court has suggested that the pervasive or continuous use of a surveillance technology may heighten Fourth Amendment concerns. In United States v. Knotts, the Supreme Court addressed whether attaching primitive “beeper” tracking technology to a car violated the driver’s Fourth Amendment rights.74 Although it concluded that the use of the beeper in that case did not violate the Fourth Amendment, it held that if “such dragnet type law enforcement practices” as “twentyfour hour surveillance of any citizen of this country” ever arose, it would determine if different constitutional principles would be applicable. Citing to this language in Knotts, the federal appeals court in Washington D.C. recently ruled that attaching a GPS device to a person’s car and tracking his movements for 28 days fell into this category of dragnet-type surveillance and held that the government’s warrantless tracking violated the Fourth Amendment. 75 That case is now up on review before the Supreme Court. Because drones allow for surveillance at least as pervasive and continuous as GPS tracking, the courts should recognize that the Fourth Amendment places restrictions on their use. With drones as in so many areas, the technology is moving far more rapidly than our jurisprudence, and it is important that the courts keep the Constitution relevant in the world of high technology in which we are increasingly going to be living. Recommendations UAVs are potentially extremely powerful surveillance tools, and that power, like all government power, needs to be subject to checks and balances. Like any tool, UAVs have the potential to be used for good or ill. If we can set some good privacy ground rules, our society can enjoy the benefits of this technology without having to worry about its darker potentials. We impose regulations on what law enforcement can do all the time, for example allowing law enforcement to take a thermal image of someone’s home only when they get a warrant. We need to impose rules, limits and regulations on UAVs as well in order to preserve the privacy Americans have always expected and enjoyed. The ACLU recommends at a minimum the following core measures be enacted to ensure that this happens: Usage restrictions. UAVs should be subject to strict regulation to ensure that their use does not eviscerate the privacy that Americans have traditionally enjoyed and rightly expect. Innocent Americans should not have to worry that their activities will be scrutinized by drones. To this end, the use of drones should be prohibited for indiscriminate mass surveillance, for example, or for spying based on First Amendment-protected activities. In general, drones should not be deployed except: where there are specific and articulable grounds to believe that the drone will collect evidence relating to a specific instance of criminal wrongdoing or, if the drone will intrude upon reasonable expectations of privacy, where the government has obtained a warrant based on probable cause; or where there is a geographically confined, time-limited emergency situation in which particular individuals’ lives are at risk, such as a fire, hostage crisis, or person lost in the wilderness; or for reasonable non-law enforcement purposes by non-law enforcement agencies, where privacy will not be substantially affected, such as geological inspections or environmental surveys, and where the surveillance will not be used for secondary law enforcement purposes. • Image retention restrictions. Images of identifiable individuals captured by aerial surveillance technologies should not be retained or shared unless there is reasonable suspicion that the images contain evidence of criminal activity or are relevant to an ongoing investigation or pending criminal trial. • Public notice. The policies and procedures for the use of aerial surveillance technologies should be explicit and written, and should made public. While it is legitimate for the police to keep the details of particular investigations confidential, policy decisions regarding overall deployment policies—including the privacy tradeoffs they may entail—are a public matter that should be openly discussed. • Democratic control. Deployment and policy decisions surrounding UAVs should be democratically decided based on open information—not made on the fly by police departments simply by virtue of federal grants or other autonomous purchasing decisions or departmental policy fiats. • Auditing and effectiveness tracking. Investments in UAVs should not be made without a clear, systematic examination of the costs and benefits involved. And if aerial surveillance technology is deployed, independent audits should be put in place to track the use of UAVs by government, so that citizens and other watchdogs can tell generally how and how often they are being used, whether the original rationale for their deployment is holding up, whether they represent a worthwhile public expenditure, and whether they are being used for improper or expanded purposes.