Constructing a Theoretical Model for the Evolution of Law Relating to Telecommunication Privacy Vis-à-Vis Law Enforcement Surveillance In America A dissertation proposal donna Bair-Mundy Structure of the presentation Research interest Impetus for study—Patriot Act Interception timeline â–ºProblem statement Research proposal—Methodology Theoretical foundation Three main areas of interest Telecommunication privacy for individuals vis-à-vis federal government Access by private citizens to information produced by and about federal govt. Information access Law formulation Communic. privacy National security Physical security Law as policy Development of law as a reflection of the process by which our society determines the boundary between public and private Constructing a theoretical model for this process A major impetus… Viet Dinh Asst. Attorney General H.R. 2975 10/12/2001 S. 1510 10/11/2001 H.R. 3004 Financial AntiTerrorism Act USA PATRIOT Act H.R. 3162 Public Law No. 107-56 Signed Oct. 26, 2001 by Pres. George W. Bush The USA PATRIOT Act H.R. 3162 The Acronym Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism The USA PATRIOT Act H.R. 3162 The Purpose To deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes. The USA PATRIOT Act The Language SEC. 218. FOREIGN INTELLIGENCE INFORMATION. Sections 104(a)(7)(B) and section 303(a)(7)(B) (50 U.S.C. 1804(a)(7)(B) and 1823(a)(7)(B)) of the Foreign Intelligence Surveillance Act of 1978 are each amended by striking `the purpose' and inserting `a significant purpose'. The U.S. Code Sections 104(a)(7)(B) and section 303(a)(7)(B) (50 U.S.C. 1804(a)(7)(B) and 1823(a)(7)(B)) of the Foreign Intelligence Surveillance Act of 1978 are each amended by striking `the purpose' and inserting `a significant purpose'. TITLE 50 > CHAPTER 36 > SUBCHAPTER I > § 1804. Applications for court orders (7) a certification … (B) that a the significant purpose of purpose the surveillance of the is to obtain foreign surveillance is intelligence to obtain foreign information; intelligence information; Federal Wiretapping Act 1968 The Omnibus Crime Control and Safe Streets Act of 1968 (“Federal Wiretapping Act”) U.S. Code 18 USC Section 2510 et seq. Federal Rules of Criminal Procedure Rule 41 Search and Seizure FISA 1978 Foreign Intelligence Surveillance Act U.S. Code 50 USC Sections 1801-1863 Investigative powers in US Code 1968 1978 Federal Wiretapping Act Foreign Intelligence Surveillance Act The USA PATRIOT Act The Complaints—Freedom of Speech Section 215—Amending FISA 501(d) No person shall disclose to any other person (other than those persons necessary to produce the tangible things under this section) that the Federal Bureau of Investigation has sought or obtained tangible things under this section. The USA PATRIOT Act The Complaints—Other Civil Liberties Freedom of association Right to due process Freedom to read Justice Louis Brandeis “Experience should teach us to be most on our guard to protect liberty when the Government's purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.” Olmstead v. United States (dissent) Identifying the Problem: the Communication interception timeline Conviction upheld W 1928 Olmstead W 1942 Goldstein W 1937/1938 Nardone D 1942 Goldman 1952 R On Lee S 1961 Silverman 1967 Katz Wiretapping evidence disallowed E Communication interception timeline Conviction upheld W 1928 Olmstead W 1942 Goldstein W 1937/1938 Nardone 1934 Radio Comm. Act D 1942 Goldman R 1952 On Lee S 1961 Silverman 1967 Katz Wiretapping evidence disallowed E Federal Communications Act 1934 Section 605 No person not being authorized by the sender shall intercept any radio communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person. Nardone “…the plain words of § 605 forbid anyone, unless authorized by the sender, to intercept a telephone message, and direct in equally clear language that “no person” shall divulge or publish the message or its substance to “any person.” To recite the contents of the message in testimony before a court is to divulge the message. The conclusion that the act forbids such testimony seems to us unshaken by the government’s arguments.” Justice Roberts Communication interception timeline Conviction upheld W 1928 Olmstead W 1942 Goldstein W 1937/1938 Nardone 1934 Radio Comm. Act D 1942 Goldman R 1952 On Lee S 1961 Silverman 1967 Katz Wiretapping evidence disallowed E Problem statement: Looking at the continuing saga of legislation and case laws dealing with telecommunication privacy, from Olmstead through Katz, from the Wiretapping Act and FISA to the Patriot Act, how can we understand the process by which society, through its laws, defines the boundary between inviolate personal space and legitimate law enforcement surveillance activities? Relevant situations for different research strategies Strategy Form of research question Requires control over behavioral events? Focuses on contemporary events? Experiment How, why yes yes Survey Who, what, where, how many yes yes History How, why no no Case study How, why no yes Yin, Robert K. 1994. Case study research: design and methods. Thousand Oaks: Sage Publications. Two parts of the dissertation Develop a model Case study: USA Patriot Act Sources – Model development Legislation Law review articles U.S. Supreme Court decisions Congressional Record Correspondence Writings on Constitut. law Sources – Patriot Act Congressional Record Law review articles Editorials Organizat. Web sites Opinion polls Interviews Theoretical foundation Law Surveillance Privacy Theoretical foundation Legal H.L.A. Hart – Penumbral case William Banks and M.E. Bowman – privacy v. national security Laurence Tribe – Constitutional models Hart's penumbral case Law: No vehicles may be driven in the park. Park ? Is an airplane a vehicle? Hart, H.L.A. 1977. “Positivism and the separation of law and morals.” In The philosophy of law, edited by R.M. Dworkin, 17-37. London: Oxford University Press. Is an airplane a vehicle? Methods of determination Determine everyday meaning of "vehicle" Meaning of "vehicle" in consensus of cases Take a standard case and arbitrarily select certain features (1) normally driven on land (2) capable of carrying a person (3) capable of being self-propelled Hart's penumbral case Law: No vehicles may be driven in the park. Vehicle: (1) normally driven on land (2) capable of carrying a person (3) capable of being self-propelled Park X Error of "formalism" or "literalism" Hart's penumbral case Law: No vehicles may be driven in the park. What are the social purposes of the law? Park X Onset of wiretapping 1830s Telegraph invented 1860s Wiretapping during Civil War 1870s Telephone invented 1880s First reports of wiretaps in press 1960s Packet switching Packet sniffers Olmstead v. United States (1928) AMENDMENT XVIII Passed by Congress December 18, 1917. Ratified January 16, 1919. Repealed by amendment 21. Section 1. After one year from the ratification of this article the manufacture, sale, or transportation of intoxicating liquors within, the importation thereof into, or the exportation thereof from the United States and all territory subject to the jurisdiction thereof for beverage purposes is hereby prohibited. Olmstead v. United States (1928) Bootleggers >$176,000 per month Evidence against them was obtained by wiretapping Convicted of a conspiracy to violate the National Prohibition Act Olmstead v. United States Question before the Court: Is warrantless wiretapping an illegal search and seizure and thus banned under the Fourth Amendment? Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Olmstead v. United States (1928) The reasonable view is that one who installs in his house a telephone instrument with connecting wires intends to project his voice to those quite outside, and that the wires beyond his house and messages while passing over them are not within the protection of the Fourth Amendment. Here those who intercepted the projected voices were not in the house of either party to the conversation. We think, therefore, that the wire tapping here disclosed did not amount to a search or seizure within the meaning of the Fourth Amendment. Mr. Chief Justice Taft Olmstead v. United States (1928) Purpose of Fourth Amendment (Justice Taft) The well known historical purpose of the Fourth Amendment, directed against general warrants and writs of assistance, was to prevent the use of governmental force to search a man’s house, his papers and effects; and to prevent their seizure against his will. … The Amendment itself shows that the search is to be of material things…. Mr. Chief Justice Taft Olmstead v. United States (1928) Purpose of Fourth Amendment (Justice Brandeis in dissent) The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. … They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. Olmstead v. United States (1928) Purpose of Fourth Amendment (Justice Brandeis in dissent) They conferred, as against the Government, the right to be let alone -- the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. Justice Brandeis Banks and Bowman theoretical model Associate General Counsel for FBI Crisis Privacy National security Rights of the individual Survival of the group Banks, William C., and M.E. Bowman. 2000. Executive authority for national security surveillance. American University law review 50(1). Oft-cited cases involving technology used to intercept communication Conviction upheld W 1928 Olmstead W 1942 Goldstein D 1942 Goldman 1952 R On Lee W S 1937/1938 Nardone ? 1961 Silverman 1967 Katz Wiretapping evidence “Red”disallowed WWII scare E Laurence Tribe Models: the major alternatives for constitutional argument and decision Model I Separated & Divided Powers Model II Implied Limitations on Government Model V Preferred Rights Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model I Separated & Divided Powers Legislative Federal State Local Executive Judicial Primary protection for individual rights provided by the states. Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model II Implied Limitations on Gov’t Emphasis on preserving the “natural order” of society. Major role of the court was to restore natural order upset by state legislation. Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model II (Decline) Concern for the underprivileged No natural order to be restored Need for positive governmental intervention to alleviate suffering Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model V Preferred Rights Exclude governmental powers from certain spheres Identification of “preferred freedoms” Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model V Preferred Rights Emphasis on rights of: • Communication and expression • Political participation • Religious autonomy • Privacy and personhood Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Oft-cited cases involving technology used to intercept communication Conviction upheld Model V W W 1928 Olmstead 1942 Goldstein W 1937/1938 Nardone Model II D 1942 Goldman 1952 R On Lee S 1961 Silverman 1967 Katz Wiretapping evidence disallowed E Theoretical foundation Surveillance Rule (1973) Foucault (1979) Giddens (1987) Dandeker (1990) Lyon (1994) Role of surveillance • Provision of services • Allows participation • Protection against threat • Means of social control • Discover and rout out deviance • Threat of surveillance used to promote compliance with the law Privacy theories Alan F. Westin Irwin Altman Sandra Petronio Desire to avoid being manipulated or dominated wholly by others Release from tensions of life in society requires release from pressure of playing social roles Westin's privacy theory: 4 functions of privacy Personal autonomy Emotional release Self-evaluation Limited & protected communication Need to integrate experiences into Share confidences and meaningful Westin, Alanpattern; F. 1970. Privacy and freedom. London: intimacies only with those one essential for creativity trusts Bodley Head. Altman's privacy dialectic High Too little contact— social isolation Desired level of contact with others at a point in time Too much contact— crowding Low Low High Achieved or actual contact with others at a point in time Communication Privacy Management Theory Sandra Petronio Privacy Rule Foundations Rule Management Processes Boundary Coordination Operations Boundary Turbulence Petronio, Sandra. 2002. Boundaries of privacy: dialectics of disclosure. Albany, New York: State University of New York Press. Communication Privacy Management Theory Sandra Petronio Cultural criteria Gendered Criteria Privacy Rule Development Motivational Criteria Contextual Criteria Risk-Benefit Ratio Criteria Petronio, Sandra. 2002. Boundaries of privacy: dialectics of disclosure. Albany, New York: State University of New York Press. Boundary coordination Close friends A B Co-owned information formed by disclosures Boundary turbulence Addition of Person C C A B Change in situation may require adjustment of boundaries Boundary turbulence New telecommunication interception technology Govt. A B Introduction of new interception technology requires re-definition of boundary between private and accessible information Boundary turbulence High perceived threat level Govt. Threat A B High perceived threat level thrusts society into a period of boundary turbulence Modification of Communication Privacy Management Theory Natural rights philosophy Legal precedent Need for social control Telecommunication privacy laws Changes in technology Perceived threat level Questions ? Mahalo Additional terms of interest discourse (lower case “d”) Language-in-use or stretches of languages (like conversations or stories) Discourse (upper case “D”) Language and non-language elements (symbols, tools, objects) used to enact and recognize different identities and activities. Societal or community-level. Represented and enacted by individuals in a variety of settings over time. E.g. physics as a scientific Discourse. Congressional debate through the eyes of a religion major Ritual that includes stylized discourse (lower case “d”) that often makes reference to Discourses (upper case “D”) HR 3162 House Discussion (Oct. 23, 2001) Some of us, who have a different history in America, with delegation of authority to the Government and the abuse of that authority, proceed a lot differently than others when we talk about giving authority to the Government that can be abused. And I think that is why we are having so much trouble in this debate. We cannot just come in the middle of a terrorism episode and forget all of the history that has occurred in our country. HR 3162 House Discussion (Oct. 23, 2001) Some groups in our country have had their rights violated, trampled on by the law enforcement authorities in this country; and so we do not have the luxury of being able to just sit back and give more authority than is warranted, the authority possibly to abuse due process through law enforcement, even in the context of what we are going through now. This is a very difficult time. I acknowledge that it is. But I think we are giving the Government and lawReference to Rights enforcement too much authorityCivil in this Discourse bill. Societal good Privacy isn't just for the good of the individual. Necessary component of a functioning society. Need privacy to form and maintain intimate relationships. These relationships in turn provide the ties that bind society together. Also liberal notion that in populist government need creativity, fostered by privacy. See John Stuart Mill. Periods of boundary turbulence Introduction of new interception technology Periods of high perceived threat R.M. Dworkin Rule Applicable in an all-or-nothing fashion. If the facts a rule stipulates are given, then either the rule is valid, in which case the answer it supplies must be accepted, or it is not, in which case it contributes nothing to the discussion. Principle States a reason that argues in one direction, but does not necessitate a particular decision. Dworkin, R.M. (ed.). 1977. The philosophy of law. London: Oxford University Press. R.M. Dworkin’s definition of a principle “I call a ‘principle’ a standard that is to be observed, not because it will advance or secure an economic, political, or social situation deemed desirable, but because it is a requirement of justice or fairness or some other dimension of morality.” Dworkin, R.M. (ed.). 1977. The philosophy of law. London: Oxford University Press. R.M. Dworkin’s theory of fundamental principles Man murdered his grandfather Murderer tried to collect inheritance Judge ruled that murderer could not receive his inheritance despite being named in the will—ruling based on fundamental principle of law that person shouldn’t benefit from crime Dworkin, R.M. (ed.). 1977. The philosophy of law. London: Oxford University Press. Case: Riggs v. Palmer 115 N.Y. 506 (1889) Question of interest Was there any indication that a fundamental principle was at stake in the majority decision in Olmstead? Olmstead v. United States (1928) The evidence in the records discloses a conspiracy of amazing magnitude… . It involved the employment of not less than fifty persons, of two seagoing vessels for the transportation of liquor to British Columbia, of smaller vessels for coastwise transportation to the State of Washington. … In a bad month sales amounted to $176,000; the aggregate for a year must have exceeded two millions of dollars. Mr. Chief Justice Taft Individual privacy versus individual secrecy Privacy Allowed and in some cases required for socially-sanctioned acts. Stress reducing. Secrecy Often involves socially proscribed acts. Stress inducing. Margulis, Stephen T. 1977. Conceptions of privacy: current status and next steps. Journal of social issues 33(3):5-21, p. 10. Margulis, Stephen T. 2003. Privacy as a social issue and behavioral concept. Journal of social issues 59(2):243-261. Model I Separated & Divided Powers All lawful power derives from the people and must be held in check to preserve their freedom. Centralized accumulation of power in any person or single group of persons results in tyranny Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model I Separated & Divided Powers Legislative Executive Judicial Federal State Horizontal and vertical separation of powers. Local Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Model II Implied Limitations on Government Governmental regulations must promote the general welfare, not promote private interests Tribe, Laurence. 2000. American constitutional law, vol. one. Third ed. New York: Foundation Press. Question of interest Can we utilize Communications Privacy Management Theory in general and the concept of "boundary turbulence" in particular to model the development of laws regulating the use of telecommunication interception technology? Terms of interest Constitution—fundamental law of the nation Statutory law (also termed legislative law) Case law—Collection of reported cases that form the body of law within a given jurisdiction Agency-made law—administrative rules and regulations Informational privacy - Westin's definition - part 1 Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. Westin, Alan F. 1970. Privacy and freedom. London: Bodley Head. Informational privacy - Westin's definition - part 2 Viewed in terms of the relation of the individual to social participation, privacy is the voluntary and temporary withdrawal of a person from the general society through physical or psychological means, either in a state of solitude or, when among larger groups, in a condition of anonymity or reserve. Informational privacy - Westin's definition - part 3 The individual's desire for privacy is never absolute, since participation in society is an equally powerful desire. Informational privacy - Westin's definition - part 4 Thus each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives. Informational privacy - Westin's definition - part 5 The individual does so in the face of pressures from the curiosity of others and from the processes of surveillance that every society sets in order to enforce its social norms. Types of privacy in law Informational privacy Control of access to information about a person or group of persons Privacy Act of 1974 Decisional privacy Freedom to make personal decisions without interference from government Roe v. Wade 1973 Gormley, Ken. 1992. One hundred years of privacy. Wisconsin law review Sept/Oct 1992:1335-1441. Jeremy Bentham’s Panopticon cells entry walkway inspector’s lodge