Islands of Algorithmic Integrity: Imagining a Democratic Digital Public Sphere

Introduction

A class of digitally mediated online platforms play a growing role as the primary sources of Americans’ knowledge about current events and politics. Prominent examples include Facebook, Instagram, TikTok, and X (which had formerly been known as Twitter). While only eighteen percent of Americans cited social media platforms as their preferred source of news in 2024, this number had risen by a striking six points since 2023.1Christopher St. Aubin & Jacob Liedke, News Platform Fact Sheet, Pew Rsch. Ctr. (Sept. 17, 2024), https://www.pewresearch.org/journalism/fact-sheet/news-platform-fact-sheet [https://perma.cc/SJ49-28W6]. These platforms also compete in “one of the most concentrated markets in the United States,”2Caitlin Chin-Rothmann, Meta’s Threads: Effects on Competition in Social Media Markets, Ctr. for Strategic & Int’l Stud. (July 19, 2023), https://www.csis.org/analysis/metas-threads-effects-competition-social-media-markets [https://perma.cc/2MQN-YSUR]. as a consequence of network effects and high barriers to entry.3Id. Current trends suggest that social media will soon outpace traditional news websites as the main source for a plurality of Americans’ understanding of what happens in the world.4St. Aubin & Liedke, supra note 1. Such platforms, which I will call “social platforms” here, are thus in practice a central plank of the political public sphere given their growing role in supplying so many people with news.

The role that social platforms play in public life has sparked a small avalanche of worries even before the extraordinary entanglement of big tech’s corporate leadership with the partisan policy projects of the second Trump administration.5This essay was completed in late 2024 and edited in early 2025. I have not tried here to account for the synergistic entanglement of Elon Musk and the Trump White House, nor for the ways in which the X social platform has changed as a result. It is, as I write, too early to say how this exorbitant display of codependency between partisan and technological projects will alter the American public sphere. The worries are diverse. Many commentators have aired concerns about the effects of social-platform use on mental health and sexual mores,6See, e.g., Surgeon General Issues New Advisory About Effects Social Media Use Has on Youth Mental Health, U.S. Dept. of Health & Human Servs. (May 23, 2023), https://www.hhs.gov/about/news/2023/05/23/surgeon-general-issues-new-advisory-about-effects-social-media-use-has-youth-mental-health.html (noting “ample indicators that social media can also pose a risk of harm to the mental health and well-being of children and adolescents”). or the extent of economic exploitation in this platform-based gig economy.7See, e.g., Veena Dubal, On Algorithmic Wage Discrimination, 123 Colum. L. Rev. 1929, 1944 (2023). These important cultural and economic worries are somewhat distinct from worries surrounding the political functions of the digital public sphere. It is the latter’s pathologies, and only those problems, that this essay—as well as the broader symposium on listeners’ rights in which it participates—concentrates on.

Even within the narrower compass of political speech defined in strict and demotic terms, the role of social platforms raises several distinct concerns. I take up three common lines of criticism and concern here. A first line of critique focuses on these platforms’ alleged harmful effects on a broad set of user beliefs and dispositions thought to be needful for democratic life. Social platforms, it is said, pull apart the electorate by feeding them fake news, fostering filter bubbles, and foreclosing dialogue—to the point where democratic dysfunction drives the nation toward a violent precipice. This first argument concerns platforms’ effects on the public at large.

A second common line of argument, by contrast, makes no claim about the median social platform user. It instead focuses on the “radicaliz[ing]” effect of social media engagement on a small handful of users at the ideological margin.8Steven Lee Myers & Stuart A. Thompson, Racist and Violent Ideas Jump from Web’s Fringes to Mainstream Sites, N.Y. Times (June 1, 2022), https://www.nytimes.com/2022/06/01/technology/fringe-mainstream-social-media.html [https://web.archive.org/web/20250219041047/https://www.nytimes.com/2022/06/01/technology/fringe-mainstream-social-media.html]. If even these few users resort to violence to advance their views, it might be said that social media has had a deadly effect.9Id. This is an argument not about social platforms’ effects on the mass of users, but upon the behavior of a small tail of participants in the online world.

Yet a third sort of argument against social platforms does not sound in a strictly consequentialist register. It does not lean, that is, on any empirical evidence as to how users are changed by their engagement. Rather, it is a moral argument that picks out objectionable features of the relationship between platforms and their users. This plainly asymmetrical arrangement, it is said, allows invidious manipulation, exploitation, or even a species of domination. Even if users’ behaviors do not change, these characteristics of the platform-user relationship are said to be insalubrious. Especially given the role that algorithmic design plays in shaping users’ online experiences, it is argued, a morally problematic imbalance emerges between ordinary people and the companies that manage social platforms. In the limited case, in which there are few potential sources of information and in which those sources are controlled and even manipulated by their owners (usually men of a certain age who are disdainful of civility and truthfulness norms), an acute concern about domination arises.

If one accepts one of these arguments (and I will try to offer both their best versions and to explore their weaknesses in what follows), then there is some reason to think closely about the way social platforms are governed, and to look for regulatory interventions. Such governance might be supplied by platforms’ own endogenous rules, which are usually embodied in their contractual terms of service or other internal procedures (such as mechanisms to dispute a take-down or deplatforming decision). Alternatively, governance could be supplied by exogenous legislation or regulation promulgated by a state. Private governance and legal regulation, of course, are potential substitutes. They can both be used to achieve the same policy goals. But how? What should such governance efforts, whether private or public, aspire to? And which policy levers are available to achieve it?

Where a platform employs algorithmic tools to shape users’ experience by determining what they see, the range of potential interventions will be especially large. This is a result of the complexity of common computational architectures today. There are many ways to craft the algorithms on which many platforms run.10See Arvind Narayanan, Understanding Social Media Recommendation Algorithms, Knight First Amend. Inst. 9–12 (March 9, 2023), https://knightcolumbia.org/content/understanding-social-media-recommendation-algorithms [https://perma.cc/9WVD-7NJ6] (discussing common structural elements). And there are many technical choices about which instruments to use, how to calibrate them, and what parameter (engagement? a subset of engagement?) to optimize. Many of these decision points offer opportunities for unavoidably normative choices about the purpose and intended effects of social platforms. Resolving those choices in turn requires some account of what it means exactly to talk about a normatively desirable social platform: That is, what should a social platform do? And for whom?

Such questions takes on greater weight given (1) recent regulatory moves by American states to control platforms’ content moderation decisions;11Tyler Breland Valeska, Speech Balkanization, 65 B.C. L. Rev. 903, 905 (2024) (“In 2021 and 2022 alone, state legislators from thirty-four states introduced more than one hundred laws seeking to regulate how platforms moderate user content.”). (2) a recent Supreme Court decision responding to those efforts;12Moody v. NetChoice, LLC, 603 U.S. 707 (2024); see infra text accompanying notes 124–26. and (3) the European Union’s Digital Services Act, a statute that takes yet a different and more indirect tack in modulating platform design and its ensuing costs.13Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000/31/EC (Digital Services Act), 2022 O.J. (L 277) 3 [hereinafter “Digital Services Act”]. Or consider a 2025 U.S. Supreme Court decision, rendered on a tightly expedited schedule, to uphold federal legislation banning TikTok.14TikTok Inc. v. Garland, 145 S. Ct. 57, 72 (2025) (per curiam). The legislation in question is the Protecting Americans from Foreign Adversary Controlled Applications Act, Pub. L. No. 118–50, 138 Stat. 955 (2024). The decision makes the remarkable suggestion that legislative control over social platforms—exercised by reshaping (or cutting off) the ordinary market from corporate control (for example, by forcing or by restricting a sale)—raises only weak First Amendment concerns. Applied broadly, such an exception from close constitutional scrutiny might allow broad state control over social platforms.

My main aim in this essay is to offer a new and fruitful analytic lens for thinking about these problems as questions of democratic institutional design. This is a way of approaching the problem of institutional design, not a set of prescriptions for how to do such design. I do so by pointing to a model of a desirable platform, and then asking how we can move toward that aspiration, and how much movement might be impeded or even thwarted. My aspirational model is not conjured out of the ether; rather, I take inspiration from an idea found in the scholarly literatures in political science and sociology that evaluates pathways of economic development. The idea upon which I draw is that development policy should aim to seed “islands of integrity” into patrimonial or nepotistic state structures as a way of building foundations for a more robust—and hence public-regarding—state apparatus.15For examples of the term in recent studies, see Monica Prasad, Proto-Bureaucracies, 9 Socio. Sci. 374, 376 (2022); Eliška Drápalová & Fabrizio Di Mascio, Islands of Good Government: Explaining Successful Corruption Control in Two Spanish Cities, 8 Pol. & Governance 128, 128 (2020). For further discussion, see infra Part II. This literature focuses on the question of the state’s seeds and nurtures zones (or those of another interested party, such as a private foundation or an international organization) where public-regarding norms, not self-regarding or selfish motives, dominate as a means of generating public goods.

By analogy to the examples of effective public administration discussed in this literature, I will suggest here that we should think about public-regarding platforms as “islands of algorithmic integrity” that advance epistemic and deliberative public goods with due regard to the potential for either exploitation or manipulation inherent in the use of sophisticated computational tools. With that threshold understanding in mind, we should then focus on how to achieve that specific, affirmative model—and not simply on how to avoid narrowly-defined and specific platform-related

harms. An affirmative ideal, that is, provides a baseline against which potential reform proposals can be evaluated.16I am hence not concerned here with the First Amendment as a template or limit to institutional design. The constitutional jurisprudence of free speech provides a different benchmark for reform. I largely bracket that body of precedent here in favor of an analytic focus on the question of what functionally might be most desirable.

To be very clear up front, this approach has limitations. It draws on the “island of integrity” literature here as a general source for inspiration, instead of a source for models that can be directly transposed. I do not think that there is any mechanical way of taking the lessons of development studies and applying them to the quite different virtual environment of social platforms. To the extent lessons emerge, they are at a high level of abstraction. Still, studies of islands of bureaucratic integrity in the wild can nevertheless offer a useful set of analogies: they point toward the possibility of parallel formations in the online world. They also help us see that there are already significant web-based entities that exemplify certain ideals of algorithmic integrity in practice because they hew to the general lessons falling out of the islands of integrity literature. These studies can illuminate how a more democratically fruitful digital public sphere might begin to be built given our present situation, even if they cannot offer a full blueprint of its ultimate design.

It is worth noting that my analytic approach here rests on an important and controversial assumption. That is, I help myself to the premise that reform of the digital public sphere can proceed first by the cultivation of small-scale sites of healthy democratic engagement and that these can be scaled up. But this assumption may not be feasible. It may instead be necessary to start with a “big bang”: a dramatic and comprehensive sweep of extant arrangements followed by a completely new architecture of digital space. If, for example, you thought that the problem of social platforms began and ended in their concentrated ownership in the hands of a few bad-spirited people, then the creation of new, more democratic platforms would not necessarily lead to a comprehensive solution. Given disagreement about the basic diagnosis of social platforms’ malady, it is hard to know which of these approaches is more sensible. Therefore, there is some value to exploring a piecemeal reform approach of the sort illuminated here. But that does not rule out the thought that a more robust “big bang” approach is in truth needed.

Part I of this essay begins with a brief survey of the main normative (consequentialist and deontic) critiques that are commonly lodged against social platforms, focusing on the three listed above. In Part II, I introduce the “islands of integrity” lens—briefly summarizing relevant sociological and political science literature—as a means to directly think about social platform reforms. My aim in so doing is to provide a litmus test for thinking about social platform reform in the round. With that lens in hand, Part III critically considers the regulatory strategies pursued by the American states and the European Union to date. I suggest some reasons to worry that these are unlikely to advance islands of algorithmic integrity. I close by reflecting on some alternative regulatory tactics that might move us quicker toward that goal.

I. The Case(s) Against Social Platforms

What is a social platform? Do such all platforms work in the same way and raise the same kind of normative objections? Or are objections to platforms better understood as training on a subset of cases or applications? This Part sets some groundwork for answering these questions by defining the object of my inquiries and by offering some technical details about different kinds of platforms. I then taxonomize the three different objections that are commonly lodged against social platforms as they currently operate.

A. Defining Social Platforms and Their Algorithms

A “platform” is “a discrete and dynamic arrangement defined by a particular combination of socio-technical and capitalist business practices.”17Paul Langley & Andrew Leyshon, Platform Capitalism: The Intermediation and Capitalisation of Digital Economic Circulation, 3 Fin. & Soc’y 11, 13 (2017). A subset of platforms are understood by their users as distinctively “social” rather than “commercial” insofar they provide a space for interpersonal interaction, intercalated with other activities such as “reading political news, watching media events, and browsing fashion lines.”18Lisa Rhee, Joseph B. Bayer, David S. Lee & Ozan Kuru, Social by Definition: How Users Define Social Platforms and Why It Matters, Telematics & Informatics, 1, 1 (2020). The leading “social platforms,” as I shall call them here, are Facebook, X, Instagram, and TikTok.19Id. I have added TikTok to the list in the cited text. I use the term “social platforms” because “social media platforms” is overly clunky and merely “platforms” is too vague.

Not all social platforms propagate content in the same way. There are two dominant kinds of system architecture. The first is the social network, where users see posts by other users who they follow (or subscribe to) as well as posts those users chose to amplify.20Narayanan, supra note 10, at 10. When Facebook and Twitter allowed users to reshare or retweet posts, they enabled the emergence of networks of this sort.21Id. Note that before the affordances that allowed users to share content in these ways, these had limited network capacity. Here, what one sees depends on who one “knows.” Interconnected webs of users on a network can experience “information cascades” as information flows rapidly across the system.22Id. This is known colloquially as “going viral.” The possibility of virality depends not just on platform design but also on users’ behaviors. But, in practice a very small number of posts go viral on social networks.23Id. at 15. Attention is a scarce commodity. We cannot and do not absorb most of what’s posted online. Our inability to absorb much means that it is only possible for a few items to achieve virality.

The second possible architecture is centered around an algorithm (or, more accurately, algorithms). On platforms of this sort, the stream of data observed by a user is largely shaped by a suite of complex algorithms, which are computational decisional tools that proceed through a series of steps to solve a problem. These algorithms, in the aggregate, are designed with certain goals in mind, such as maximizing the time users spend on the platform.24Id. at 10. Networks require both content processing tools (e.g., face recognition, transcription, and image filters) and also content propagation tools (e.g., search, recommendation, and content moderation). Id. at 8. I am largely concerned here with content propagation tools. TikTok’s “For You Page,” Google Discover, and YouTube all rely at least in part on algorithms.25Id. at 11.

In practice, what is for the sake of simplicity called “the algorithm” can be disaggregated into several different design elements, each of which is in truth a distinct algorithm or digital artifact. These include (1) the “surfaces of exposure” (that is, the visual interface encountered by users); (2) a primary ranking model (often a two-stage recommender system that combs through and filters potential posts); (3) peripheral models, which rank content that appears around the main surface of exposure (for example, ads); and (4) auxiliary models (for example, content moderation for illegal materials or posts that violate terms of service).26Kristian Lum & Tomo Lazovich, The Myth of the Algorithm: A System-Level View of Algorithmic Amplification, Knight First Amend. Inst. (Sept. 13, 2023), https://knightcolumbia.org/content/the-myth-of-the-algorithm-a-system-level-view-of-algorithmic-amplification [https://perma.cc/4WBQ-34WN]. For the sake of simplicity, I will refer to them together only as “the algorithm,” but it is worth keeping in mind that this is a simplification, and in fact there are multiple instruments at stake.

Algorithm design implicates many choices. At the top level, for example, an algorithmic model can be braided into a network model or integrated into a subscription-service model.27Narayanan, supra note 10, at 10–11 (“[N]o platform implements a purely algorithmic model . . . .”). At a more granular level, algorithms can be designed to optimize a broad range of varied parameters. These range from “meaningful social interactions” (Facebook’s measure at one point in time) to user’s watch time (YouTube’s measure) to a combination of liking, commenting, and watching frequencies (TikTok’s measure).28Id. at 19. The choice of parameter to optimize is important. Most common parameters quantify some element of users’ engagement with the platform, but they do so in different ways. Engagement measures are relevant from the platforms’ perspectives given their economic reliance on the revenue from advertising displayed to users.29For a useful account of the behavioral advertising industry, see generally Tim Hwang, Subprime Attention Crisis (2020). In theory, more engagement means more advertising revenue. But engagement on social platforms is surprisingly sparse. Somewhere between only one percent and five percent of posts on most social platforms generate any engagement at all.30Narayanan, supra note 10, at 28. And the movement from engagement to advertising is rarer still: most targeted online advertising is simply “ignored.”31Hwang, supra note 29, at 77; accord Narayanan, supra note 10, at 29.

B. Consequentialist Critiques of Social Platforms

There are, as I read the literature, three clusters of normative concerns raised by social platforms that merit consideration as the most important and common criticisms made of those technologies.32I recognize that there are complaints beyond those that I adumbrate here. I have selected those that seem to me supported by evidence and a coherent moral theory. I have ignored those wanting in such necessary ballast. Two are consequentialist, in the sense of training on allegedly undesirable effects of social platforms. Of course, such arguments need some means of evaluating downstream effects as either desirable or undesirable. In practice, they rest on some account of democracy as an attractive—even ideal—political order. (Note that as is often the case in legal scholarship, the precise kind of “democracy” at work in these critiques is not always fully specified. This lack of specification is a gap that will prove relevant in the analysis that follows.)33For an illuminating recent discussion on the varieties of democratic theory, see generally Jason Brennan & Hélène Landemore, Debating Democracy: Do We Need More or Less? (2021). The other cluster is deontic, in the sense of picking out intrinsically unattractive qualities of social platforms. These accounts do not rely on a causal claim about the effects of social platforms; they instead assert the prima facie unacceptability of platforms in themselves.

Let’s begin with the two consequentialist arguments and then move on to the deontic critique.

A first view widely held in both the academic and non-academic public spheres is that social platforms cause political dysfunction in a democracy because of their effects on the dispositions and beliefs of the general public.34See, e.g., Helen Margetts, Rethinking Democracy with Social Media, 90 The Pol. Q., Jan. 2019, 107, at 107 (assigning blame to social media for “pollution of the democratic environment through fake news, junk science, computational propaganda and aggressive microtargeting and political advertising”; for “creating political filter bubbles”; and for “the rise of populism, . . . the end of democracy and ultimately, the death of democracy.”). Using social platforms, this argument goes, drives (1) a dynamic of “affective polarization” (negative emotional attitudes towards members of opposition parties), or (2) traps us in “echo chambers” or filter bubbles that are characterized by limited, biased information.35Jonathan Haidt, Yes, Social Media Really Is Undermining Democracy, The Atlantic (July 28, 2022), https://www.theatlantic.com/ideas/archive/2022/07/social-media-harm-facebook-meta-response/670975 [https://perma.cc/7FFV-QRPB]. Social media users are also said to be exposed to “fake news,” which are “fabricated information that mimics news media content in form but not in organizational process or intent.”36David M. J. Lazer, Matthew A. Baum, Yochai Benkler, Adam J. Berinsky, Kelly M. Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, Michael Schudson, Steven A. Sloman, Cass R. Sunstein, Emily A. Thorson, Duncan J. Watts & Jonathan L. Zittrain, The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort, 359 Sci. 1094, 1094 (2018); see also Edson C. Tandoc Jr., The Facts of Fake News: A Research Review, Soc. Compass, July 25, 2019, at 1, 2 (“[Fake news] is intended to deceive people, and it does so by trying to look like real news.”). For examples, see Aziz Z. Huq, Militant Democracy Comes to the Metaverse?, 72 Emory L.J. 1105, 1118–19 (2023). The terms “misinformation” and “disinformation” are also used to describe fake news and its variants. I leave aside questions about how to exactly define and distinguish these terms. High levels of exposure are said to be driven by algorithmic amplification.37See, e.g., Haidt, supra note 35; Zeynep Tufekci, Algorithmic Harms Beyond Facebook and Google: Emergent Challenges of Computational Agency, 13 Colo. Tech. L.J. 203, 215 (2015) (criticizing Facebook for its power to “alter the U.S. electoral turnout” through algorithmic manipulation). Recent advances in deep-fake-creation tools have further spurred worries about an “information apocalypse” that destroys “public trust in information and the media.”38Mateusz Łabuz & Christopher Nehring, On the Way to Deep Fake Democracy? Deep Fakes in Election Campaigns in 2023, 23 Eur. Pol. Sci. 454, 457 (2024). Platforms, in this view, foster a world in which citizens lack a shared reservoir of mutual tolerance and factual beliefs about the world. Such deficiencies are said to render meaningful political debate on social platforms challenging—perhaps even impossible. As a result of these changes in peoples’ dispositions, the possibility of democratic life moves out of reach.

These arguments hence assume that democratic life requires the prevalence of certain attitudes and beliefs in order to be durably sustained (an assumption that may or may not be empirically justified). Another way in which these concerns can concretely be understood is to view them in light of the rise of anti-system parties,39Giovanni Capoccia, Anti-System Parties: A Conceptual Reassessment, 14 J. Theoretical Pol. 9, 10–11 (2002) (offering several different definitions of that term). which are characterized by their limited regard for democratic norms. Platforms might facilitate the growth of such anti-system candidates who disrupt or even undermine democratic norms such as broad trust in the state and in co-citizens. Through this indirect path, platforms have a detrimental effect on democracy’s prospects.

There are surprisingly few empirical studies that support the existence of a robust causal connection between social platforms and democratically necessary trust.40There is one experiment focused on search ranking that finds political effects, but the experiment is more than a decade old and focuses on how search results are displayed, not on the central issue of platform design today. Robert Epstein & Ronald E. Robertson, The Search Engine Manipulation Effect (SEME) and Its Possible Impact on the Outcomes of Elections, 112 Proc. Nat’l Acad. Sci. E4512, E4518–20 (2015). Yet some evidence for it can be found in the behaviors and beliefs of significant political actors. President Donald Trump, for example, declared in November 2016 that Facebook and Twitter had “helped him win” the 2016 U.S. presidential election.41Rich McCormick, Donald Trump Says Facebook and Twitter ‘Helped Him Win’, The Verge (Nov. 13, 2016, 7:02 PM PST), https://www.theverge.com/2016/11/13/13619148/trump-facebook-twitter-helped-win [https://perma.cc/5MUQ-7R73]. Since 2020, conservative donors such as the Bradley Impact Fund and the Conservative Partnership Fund have contributed millions to Republican-aligned groups combating effects to “take a tougher line against misinformation online.”42Jim Rutenberg & Steven Lee Myers, How Trump’s Allies Are Winning the War Over Disinformation, N.Y. Times, https://www.nytimes.com/2024/03/17/us/politics/trump-disinformation-2024-social-media.html [https://web.archive.org/web/20250401001211/https://www.nytimes.com/2024/03/17/us/politics/trump-disinformation-2024-social-media.html]. Such significant financial investments by important political actors, beyond merely cheap talk, suggest that social platforms do have predictable partisan effects for candidates and parties that have an arguable anti-systemic orientation.43A mea culpa: in previous work, I was too credulous in respect to claims of platform-related harms. Huq, supra note 36, at 1118–19. I should have been more cautious.

On the other hand, well-designed empirical studies have cast doubt on the negative, large-“N” effects of social platforms.44For a prescient popular argument to that effect, see Gideon Lewis-Kraus, How Harmful Is Social Media?, New Yorker (June 3, 2022), https://www.newyorker.com/culture/annals-of-inquiry/we-know-less-about-social-media-than-we-think [https://perma.cc/7FFV-QRPB]. Four studies are illustrative. A first well-designed randomized experiment, which tested the effect of platform deactivation for several weeks before the 2020 election, found no statistically significant effects of platform exposure on affective polarization, issue polarization, or vote choice.45The study found a non-significant pro-Trump effect from Facebook usage but cautioned against treating this finding as generalizable. Hunt Allcott, Matthew Gentzkow, Winter Mason, Arjun Wilkins, Pablo Barberá, Taylor Brown, Juan Carlos Cisneros, Adriana Crespo-Tenorio, Drew Dimmery, Deen Freelon, Sandra González-Bailón, Andrew M. Guess, Young Mie Kim, David Lazer, Neil Malhotra, Devra Moehler, Sameer Nair-Desai, Houda Nait El Barj, Brendan Nyhan, Ana Carolina Paixao de Queiroz, Jennifer Pan, Jaime Settle, Emily Thorson, Rebekah Tromble, Carlos Velasco Rivera, Benjamin Wittenbrink, Magdalena Wojcieszak, Saam Zahedian, Annie Franco, Chad Kiewiet de Jonge, Natalie Jomini Stroud & Joshua A. Tucker, The Effects of Facebook and Instagram on the 2020 Election: A Deactivation Experiment, 121 Proc. Nat’l Acad. Sci., 1, 8–9 (2024). A second random experiment focused on the difference between Facebook’s default algorithms and a reverse-chronological feed. Again, the study found no effect on affective polarization, issue polarization, or political knowledge after switching from a network-driven feed to an algorithmically-driven feed, even though the use of a reverse chronological feed increased the amount of “untrustworthy” content seen.46Andrew M. Guess, Neil Malhotra, Jennifer Pan, Pablo Barberá, Hunt Allcott, Taylor Brown, Adriana Crespo-Tenorio, Drew Dimmery, Deen Freelon, Matthew Gentzkow, Sandra González-Bailón, Edward Kennedy, Young Mie Kim, David Lazer, Devra Moehler, Brendan Nyhan, Carlos Velasco Rivera, Jaime Settle, Daniel Robert Thomas, Emily Thorson, Rebekah Tromble, Arjun Wilkins, Magdalena Wojcieszak, Beixian Xiong, Chad Kiewiet de Jonge, Annie Franco, Winter Mason, Natalie Jomini Stroud & Joshua A. Tucker, How Do Social Media Feed Algorithms Affect Attitudes and Behavior in an Election Campaign?, 381 Sci. 398, 402 (2023). This null finding from a study of opting into algorithmic content propagation has been replicated in a separate study of YouTube.47Homa Hosseinmardi, Amir Ghasemian, Aaron Clauset, Markus Mobius, David M. Rothschild & Duncan J. Watts, Examining the Consumption of Radical Content on YouTube, 118 Proc. Nat’l Acad. Sci., 1, 1 (2021).

Finally, an empirical inquiry into exposure to fake news found only a very small positive effect on the vote share of populist candidates in European elections.48Michele Cantarella, Nicolò Fraccaroli & Roberto Volpe, Does Fake News Affect Voting Behaviour?, Rsch. Pol’y, Jan. 2023, at 1, 2. Another study of 1,500 users in each of three countries (France, the United Kingdom, and the United States) identified no correlation between social platform use and more extreme right-wing views; indeed, in the United States, they found a negative correlation.49Shelley Boulianne, Karolina Koc-Michalska & Bruce Bimber, Right-Wing Populism, Social Media and Echo Chambers in Western Democracies, 22 New Media & Soc’y 683, 695 (2020). The authors concluded that their “findings tend to exonerate the Internet generally and social media in particular, at least with respect to right-wing populism.”50Id. Finally, a 2017 study found that President Trump erred when he claimed that Twitter and X helped him in the 2016 election; again, that study found a negative correlation between more extreme right-wing views and social platform usage.51Jacob Groshek & Karolina Koc-Michalska, Helping Populism Win? Social Media Use, Filter Bubbles, and Support for Populist Presidential Candidates in the 2016 US Election Campaign, 20 Info., Commc’n & Soc’y 1389, 1397 (2017) (“American voters who used social media to actively participate in politics by posting their own thoughts and sharing or commenting on social media were actually more likely to not support Trump as a candidate.”).

Summarizing the available research (including these studies) in a June 2024 issue of Nature, a team of respected scholars concluded that “exposure to misinformation is low as a percentage of people’s information diets” and further “the existence of large algorithmic effects on people’s information diets and attitudes has not yet been established.”52Ceren Budak, Brendan Nyhan, David M. Rothschild, Emily Thorson & Duncan J. Watts, Misunderstanding the Harms of Online Misinformation, 630 Nature 45, 47–48 (2024); accord Sacha Altay, Manon Berriche & Alberto Acerbi, Misinformation on Misinformation: Conceptual and Methodological Challenges, Soc. Media + Soc’y, Jan.–Mar. 2023, at 1, 3 (“Misinformation receives little online attention compared to reliable news, and, in turn, reliable news receives little online attention compared to everything else that people do.”). The Nature team warned that the extent to which social platforms undermine political knowledge depends on the availability of other news sources. Where countries “lack reliable mainstream news outlets,” their negative knowledge-related spillovers may be greater.53Budak et al., supra note 52, at 49. I do not pursue that suggestion here, since it invites a bifurcated analysis that separately considers different national jurisdictions, depending on the robustness of their non-digital media ecosystems. What follows should be taken as parochially relevant to North American and European democracies (at least for now) but not the larger world beyond that.

A second view of social platforms’ harms identifies not its spillovers at scale, but rather its effects on certain narrow slices of the population—in particular, those at the tails of the ideological distribution. The intuition here is that engagement with social platforms may not change the dispositions or beliefs of most people, but there is a small subset of individuals who adopt dramatically divergent beliefs (and even behaviors) as consequences of their platform use. “Tail effects” of this sort may not be significant for democratic life under some circumstances, but of particular relevance, there is some evidence of increased support for political violence among Americans.54At least some surveys suggest rising levels of positive attitudes to violence. See Ashley Lopez, More Americans Say They Support Political Violence Ahead of the 2024 Election, NPR, https://www.npr.org/2023/10/25/1208373493/political-violence-democracy-2024-presidential-election-extremism [https://perma.cc/ZM4L-BRRV]. For other findings exhibiting a concentration of such support at the rightward end of the political spectrum, see Miles T. Armaly & Adam M. Enders, Who Supports Political Violence?, 22 Persp. on Pol. 427, 440 (2024). Extremism at the tails in this context and about this sentiment may have profound consequences. At a moment when President Trump has (twice) faced near-assassination during the 2024 presidential election cycle, and considering how his supporters previously precipitated a deadly confrontation at a 2021 Joint Session of Congress meant to count Electoral College votes, it seems prudent to reckon with the risk that radicalized individuals—even if few in number—may be able to inflict disproportionate harms on institutions that are necessary for core democratic political processes.

This more narrowly gauged claim stands on firmer empirical ground than the critiques of social platforms’ large-“N” effects discussed above. A 2024 study of fake news’ circulation on Twitter found that 0.3 percent of users account for four-fifths of its fake news volume.55Sahar Baribi-Bartov, Briony Swire-Thompson & Nir Grinberg, Supersharers of Fake News on Twitter, 384 Sci. 979, 980 (2024). These “supersharers,” who tended to be older, female, and Republican, in turn reached a “sizable 5.2% of registered voters on the platform.”56Id. at 979. Note that this is not necessarily the population one would expect to engage in political violence. A different study published around the same time also found “asymmetric . . . political news segregation” with “far more homogenously conservative domains and URLs circulating on Facebook” and “a far larger share” of fake news on the political right.57Sandra González-Bailón, David Lazer, Pablo Barberá, Meiqing Zhang, Hunt Allcott, Taylor Brown, Adriana Crespo-Tenorio, Deen Freelon, Matthew Gentzkow, Andrew M. Guess, Shanto Iyengar, Young Mie Kim, Neil Malhotra, Devra Moehler, Brendan Nyhan, Jennifer Pan, Carlos Velasco Rivera, Jaime Settle, Emily Thorson, Rebekah Tromble, Arjun Wilkins, Magdalena Wojcieszak, Chad Kiewiet de Jonge, Annie Franco, Winter Mason, Natalie Jomini Stroud & Joshua A. Tucker, Asymmetric Ideological Segregation in Exposure to Political News on Facebook, 381 Sci. 392, 397 (2023).

Such findings are consistent with wider-angle studies of partisan polarization, which find different microfoundations on the political left and right.58Craig M. Rawlings, Becoming an Ideologue: Social Sorting and the Microfoundations of Polarization, 9 Socio. Sci. 313, 337 (2022). The Nature team mentioned above hence concluded that exposure to misinformation is “concentrated among a small minority.”59Budak et al., supra note 52, at 48. Those who consume false or otherwise potentially harmful content are already attuned to such information and actively seek such content out.60Id. Platforms, however, do not release “tail exposure metrics” that could help quantify the risk of harm from such online interactions.61Id. at 50; see also Vivian Ferrillo, r/The_Donald Had a Forum: How Socialization in Far-Right Social Media Communities Shapes Identity and Spreads Extreme Rhetoric, 52 Am. Pol. Rsch. 432, 443 (2024) (finding that users who engage often with a far-right community also use far-right vocabulary more frequently in other spaces on their platform, contributing to the spread and normalization of far-right rhetoric). As a result, it is hard to know how serious the problem may be.

What of the concern that social platforms conduce to “filter bubbles” that constrain the range of information sources users can access in problematic ways?62For an influential treatment of the topic, see generally Eli Pariser, The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think (2012). Once again, the evidence is at best inconclusive. A 2016 study found that social homogeneity of users predicted the emergence of echo chambers characterized by asymmetrical patterns of news sharing.63Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H. Eugene Stanley & Walter Quattrociocchi, The Spreading of Misinformation Online, 113 Proc. Nat’l Acad. Sci. 554, 558 (2016). At the same time, the study offered no empirical evidence about the extent or effects of filter bubbles “in the wild,” so to speak. A 2021 review identified divergent results in studies surveying human users of social platforms or digital trace data; yet, it identified only a handful of studies substantiating the concern.64Ludovic Terren & Rosa Borge, Echo Chambers on Social Media: A Systematic Review of the Literature, 9 Rev. Commc’n Rsch. 99, 110 (2021) (reviewing fifty-five studies and finding only five yielding no evidence of echo chambers). A 2022 meta-study found that “most people have relatively diverse media diets,” and only “small minorities, often only a few percent, exclusively get news from partisan sources.”65Amy Ross Arguedas, Craig T. Robertson, Richard Fletcher & Rasmus K. Nielsen, Echo Chambers, Filter Bubbles, and Polarisation: A Literature Review 4 (2022), available at https://ora.ox.ac.uk/objects/uuid:6e357e97-7b16-450a-a827-a92c93729a08. Again, the empirical foundations of the normative worry here seem shaky.

Even if the evidence of filter bubbles existing was more robust, filter bubbles’ substantiated existence would not necessarily be cause for concern. Concern about filter bubbles focuses on the asymmetric character of the information voters consume; this then assumes that there is a counterfactual condition under which the voter might receive a “balanced” diet of information. But what does it mean to say that a person’s news inputs are balanced or symmetrical? Does it require equal shares of data that support Republican and Democratic talking points? What if one of those parties is more likely than the other to lean on false empirical claims? Should a balanced informational diet reflect or discount for such a lean? How are the problems of misinformation or distorted information to be addressed? Is it part of a balanced informational diet to receive a certain amount of “fake news”? These questions admit of no easy answers. Rather, they suggest that the concern with filter bubbles trades on a notion of balance that is hard to cash out in practice without difficult anterior ideological and political choices.

In brief, the available empirics suggest that consequentialist critiques of social platforms are better focused on tail effects instead of the way platform engagement changes the median user or the mass of users. It is also worth underscoring a point that is somewhat obscured by the bottom-line results of these studies but implicit in what I have just set out. That is, the tail effects of social platforms arise from a complex and unpredictable mesh of interactions between technical design decisions and users’ decisions. The external political environment hence shapes platforms’ spillover effects, and when that environment is more polarized and more prone to panics or even violence, it seems likely that the tail risks of social platforms would correspondingly rise. When, by contrast, there are a plethora of reliable non-digital sources which are accurate and easily accessible, the threat to democratic life from social platforms may well be far less acute.

C. Deontic Critiques of Social Platforms

Critiques of social platforms do not need to rest on evidence of their consequences. It is also possible to pick out features of the relationship between platforms and users as morally problematic even in the absence of any harm arising. Two particular strands of such “deontic” critique can be traced in existing literature.

First, social platforms (among other entities) gather data about their users and then use that data to target advertisements to those same users. For many, this circular pattern of data extraction and deployment constitutes a morally problematic exploitation. Such exploitation occurs when “one party to an ostensibly voluntary agreement intentionally takes advantage of a relevant and significant asymmetry of knowledge, power, or resources” to offer otherwise unacceptable contracting terms.66Claire Benn & Seth Lazar, What’s Wrong with Automated Influence, 52 Canadian J. Phil. 125, 135 (2022).

Shoshana Zuboff, who is perhaps the leading expositor of this view, argues that platforms have “scraped, torn, and taken for another century’s market project” the very stuff of “human nature.”67Shoshana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power 94 (2019). She condemns the “rendition” and “dispossession of human experience” through “datafication.”68Id. at 233–34. Zuboff’s critique of platform exploitation is nested in a broader set of concerns about the presently hegemonic form of “informational” or “financial” capitalism. Reviewing Zuboff’s book, Amy Kapczynski thus asserts that “informational capitalism brings a threat not merely to our individual subjectivities but to our ability to self-govern.”69Amy Kapczynski, The Law of Informational Capitalism, 129 Yale L.J. 1460, 1467 (2020). Similarly, danah boyd characterizes private firms’ use of digital power as a malign manifestation of “late-stage capitalism . . . driven by financialization.”70danah boyd, The Structuring Work of Algorithms, 152 Dædalus 236, 238 (2023). And as Katharina Pistor puts it, “[t]he real threat that emanates from Big Tech using big data is not just market dominance . . . [but] the power to transform free contracting and markets into a controlled space that gives a huge advantage to sellers over buyers.”71Katharina Pistor, Rule by Data: The End of Markets?, 83 Law & Contemp. Probs. 101, 117 (2020); accord Julie E. Cohen, Law for the Platform Economy, 51 U.C. Davis L. Rev. 133, 145–48 (2017). The structure of financial or quasi-financial transactions on social platforms, in this view, conduces systemically to users’ exploitation.

In an earlier piece, I have expressed sharp skepticism elsewhere about the empirical and normative arguments offered by Zuboff and Kapczynski.72Mariano-Florentino Cuéllar & Aziz Z. Huq, Economies of Surveillance, 133 Harv. L. Rev. 1280, 1298 (2020). Their concerns about exploitation seem to trade on imprecise and potentially misleading analogies to more familiar and normatively troubling forms of economic exploitation, despite meaningful differences in structure and immediate effect. Indeed, both analogies fail to take those differences seriously. More generally, their arguments borrow a suite of concerns associated with the larger structures of economic life labeled “neoliberalism,” which have developed since the 1970s. Such critiques of neoliberalism, however, concern aspects of economic life that have little to do with social platforms (for example, deregulation and financialization). One can have neoliberalism with or without social platforms. I see little analytic gain in combining these very different lines of argument respecting quite distinct targets, and I see no reason to invite confusion by mushing together distinct phenomena to achieve guilt-by-association more generally.

Second, concern about exploitation overlaps with a distinct worry about non-domination. Claire Benn and Seth Lazar capture this possibility in their argument that social platforms might compromise an intrinsic, non-instrumental “value of living in societies that are free and equal.”73Benn & Lazar, supra note 66, at 133. They argue that the public is necessarily ignorant about the “tech companies’ control of the means of prediction” and so have “no viable way of legitimating these new power relations.”74Id. at 137. But the empirical premise of this argument—widespread public ignorance about predictive tools—seems shaky: As the empirical studies of fake news and political distortion show, there is publicly available knowledge about many salient effects of social platforms. To the extent that the public misconstrues those effects, Benn and Lazar’s argument likely overestimates their magnitude.75See supra notes 35 and 37 for examples of such overestimation. I hardly think these critiques are secret.

Still, I think Benn and Lazar are on to something useful when they identify the fact of corporate control as a morally salient one. Social platforms stand in an asymmetrical relation to the general public because of (1) knowledge asymmetries enabled by the corporate form; (2) collective action problems implicit in the one-to-many relation of firms to consumers; and (3) ideological effects (for example, false beliefs in the necessity of unregulated digital markets for economic growth). As a consequence of these dynamics, social platforms exercise a certain kind of unilateral power over the public. Such power might be especially worrying if it is concentrated in the hands of a limited number of people—and if these people have close connections to those in high state office (with the Musk/Trump relationship offering an obvious, highly salient example). This slate of worries comes sharply into play whenever platforms comprise an important part of the democratic public sphere. Under these conditions, Benn and Lazar point out that platforms ought not to merely prevent negative consequences for democratic politics; they must also ensure “that content promotion is regulated by epistemic ideals.”76Benn and Lazar, supra note 66, at 144. This entails, in their view, a measure of “epistemic paternalism.”77Id. It rests on platforms’ unilateral, and effectively unconstrained, judgments about interface and algorithmic design.

This deontic argument can also be stated in the terms of Philip Pettit’s influential theory of republican freedom. On Pettit’s account, an individual wields dominating power over another if the former has the capacity to interfere in certain choices of the latter on an arbitrary basis.78Philip Pettit, Republicanism: A Theory of Freedom and Government 52 (1997). Pettit asserts that this arbitrariness condition is satisfied if an agent’s actions are subject only to the arbitrium—the will or judgment—of the agent, and when the interfering agent is not “forced to track the interests and ideas of the person suffering the interference.”79Id. at 55. For example, a person ranked by law as a slave is just as unfree even if their master always acts with their interests in mind. Even when an arbitrary legal relationship is exercised in a beneficent fashion with the interest of the weaker party in mind, Pettit suggests that there is a displacement of the subject’s “involvement, leaving [them] subject to relatively predictable and perhaps even beneficial forms of power that nevertheless ‘stifle’ and ‘stultify.’ ”80Patchen Markell, The Insufficiency of Non-Domination, 36 Pol. Theory 9, 12 (2008). To be clear, Markell here is criticizing and extending Pettit’s account.

Yasmin Dawood has fruitfully deployed Pettit’s framework for thinking about the abuse of public power in democratic contexts.81Yasmin Dawood, The Antidomination Model and the Judicial Oversight of Democracy, 96 Geo. L.J. 1411, 1431 (2008). Her conceptual framing, moreover, could be extended to private actors such as social platforms without too much difficulty. For instance, one might view the exercise of extensive control over the informational environment online as a species of domination, whether or not it was exercised in a malign or a paternalistic direction. That idea might be rendered more precise by drawing on work by Moritz Hardt, Meena Jagadeesan, and Celestine Mendler-Dünner that defines the “performative power” of an algorithmic instrument in terms of “how much participants change in response to actions by the platform, such as updating a predictive model” as a numerical parameter.82Moritz Hardt, Meena Jagadeesan & Celestine Mendler-Dünner, Performative Power, 2022 NIPS ’22: Proc. of the 36th Int’l Conf. on Neural Info. Processing Sys. 2. This concept of “performative power” usefully captures the way that platforms “steer” populations.83Id. at 5–6. As such, it offers a way of understanding and measuring “domination” in social platforms more precisely.

In setting out these two kinds of deontic critiques of social platforms, I thus suggest that there are plausible grounds for worry about social platforms, even absent robust empirical findings of spillovers onto users’ beliefs and dispositions. I recognize that both the exploitation and the domination critiques rest on further moral premises, which I have neither spelled out in full nor tried to substantiate. But I spell out both deontic arguments here to show readers the minimally plausible non-consequentialist grounds for concern about the structure and operation of social platforms and to allow readers to make their own judgments.

D. Making a Better Case Against Social Platforms

Social platforms have become scapegoats of sorts for many of the ills that democratic polities are now experiencing. But the available evidence suggests that many of these critiques miss the mark. For many people, platforms simply do not play a very large or dominant epistemic role (although this may well change in the near future). They also seem not to have the polarizing and epistemically distorting effects many bemoan.

That is not to say, however, that there is no reason for concern. Consequentialist worries about the behavior of users on the tails of the ideological distribution, as well as deontic worries about exploitation or domination, point toward the need for reforming measures. Of course, these arguments might not all point in the same direction in terms of practical change. But reforms that render platforms more responsive and responsible to epistemically grounded truths and the interests of all their users (as well as interests of the general public at large) are plausibly understood to respond to all the salient critiques discussed above.

II. Islands of Integrity—Real and Digital Examples

One way of thinking about how existing social platforms might be reformed is to identify an aspirational end-state, or a model, of how they might ideally work. With an understanding of the best version of a social platform in view, it may be easier to evaluate extant reform strategies and to propose new ones. This inquiry might proceed at the retail level—focusing on what an “ideal” or a “better” platform might look like—or at a general level—asking how the digital ecosystem overall should be designed. With the first of these paths in mind, I introduce in this Part a conceptual framework for thinking about “islands of integrity” developed in the sociological and political science studies of development. While that literature has not yielded any simple or single formula for reaching that aspiration, it still offers a useful lens for starting to think about well-functioning social platforms. Or so I hope to show in what follows.

A. Building Islands of Integrity in the Real World

In recent decades, concern about the legality and the quality of governance has shaped the agenda of international development bodies such as the World Bank.84Aziz Z. Huq, The Rule of Law: A Very Short Introduction 75–78 (2024). One of the strategies identified to enhance the quality of public administration centers the idea of “islands of integrity” or “pockets of effectiveness” in sociopolitical environments that are “otherwise dominated by patrimonialism, corruption, and bureaucratic dysfunction.”85Prasad, supra note 15, at 376. An island of integrity has been defined as an entity or unit (generally of government) that is “reasonably effective in carrying out [its] functions and in serving some conception of the public good, despite operating in an environment in which most agencies are ineffective and subject to serious predation . . . .”86David K. Leonard, ‘Pockets’ of Effective Agencies in Weak Governance States: Where Are They Likely and Why Does It Matter?, 30 Pub. Admin. & Dev. 91, 91 (2010); see also Michael Roll, The State That Works: A ‘Pockets of Effectiveness’ Perspective on Nigeria and Beyond, in States at Work: Dynamics of African Bureaucracies 365, 367 (Thomas Bierschenk & Jean-Pierre Olivier de Sardan eds., 2014) (“A pocket of effectiveness (PoE) is defined as a public organisation that provides public services relatively effectively despite operating in an environment, in which public service delivery is the exception rather than the norm.”). The normative intuition is that it is possible to seed islands of integrity, despite pervasive corruption, as a starting point for more large-scale reforms.

There are by now a wide variety of case studies on islands of integrity. Monica Prasad, for example, points to the recently stood-up Indian Institutes of Technology (“IITs”), an archipelago of meritocratic technology-focused colleges across the subcontinent, as an instance where an educational mission is successfully pursued against “a context of patrimonialism and corruption.”87Prasad, supra note 15, at 380. IITs’ mission is preserved and protected from distortion through the use of selection strategies of “meritocratic decoupling” that sort both students and teachers based on academic merit, alongside efforts to show how the institution benefited those who were excluded.88Id. at 382–83.

In a different case study, Eliška Drápalová and Fabrizio Di Mascio identify a pair of municipalities in Spain as “islands of integrity.”89Drápalová & Di Mascio, supra note 15, at 128. They contend that the key move in creating them was the fashioning of a “fiduciary relationship between mayors and city managers,” which allowed for the development of a bureaucratic structure shaped by professional (rather than patrimonial) norms.90Id. at 129–30, 135. City managers, they find, offer “accountability and responsiveness” to elected leaders without compromising the integrity of service-oriented institutions.91Id. at 135. Similarly, Michael Roll maps the emergence in Nigeria of well-run agencies managing food and drug regulation on the one hand, and human trafficking on the other, to demonstrate that islands of integrity can emerge even under very difficult circumstances given the right leadership.92Roll, supra note 86, at 370–73.

Most, but not all, of these case studies on islands of integrity concern real-world public administration, often at a local level.93One article applies the concept to public broadcasters in developing countries, but does not do so with enough detail to be useful. Cherian George, Islands of Integrity in an Ocean of Commercial Compromises, 45 Media Asia 1, 1–2 (2018). The generalizations drawn by the literature are concededly fragile: The heterogeneity of cultural, political, and institutional context makes inference instable, at least at a useful level of granularity.94Leonard compiles a number of general lessons, but these are pitched at a very high level of abstraction. Leonard, supra note 86, at 93. Still, a couple of regularities do tentatively emerge from a review of the available case studies in the development literature.

Crudely stated, the “islands of integrity” literature underscores the importance of institutional means and leadership motives for resisting patrimonial or corrupt political cultures. First, an island of integrity needs to internalize control over its own workings in order to “create a culture of meritocracy and commitment to the organization’s mission.”95Prasad, supra note 15, at 376. Underpinning this culture, it seems, must be a clear understanding of the public goods that the agency or body is supposed to produce. The truism that leadership is key seems to hold particularly strongly.96Leonard, supra note 86, at 94 (noting the importance of “leadership, personnel management, resource mobilisation and adaptability”). Autonomy over personnel choice is also crucial in order to maintain that culture.97Roll, supra note 86, at 379.

Second, there is a consistent institutional need for the creation of tools to resist demands from powerful external actors who try to capture a body for their immediate political or economic gains, which are unrelated to the public-regarding goals of the institution.98Id. at 377–78 (noting the role of tools for “political management”). Tools by which to mitigate such threats to institutional autonomy vary. Indian universities, Prasad found, tout the local jobs they create in cleaning and maintenance—even as they maintain the separation of student and faculty selection from local pressures—as a way of deflecting local politicos.99Prasad, supra note 15, at 385. Spanish city managers, Drápalová and Di Mascio explain, promise improvements in top-line municipal services to mayors who threaten their autonomy.100Drápalová and Di Mascio, supra note 15, at 135. In effect, reform is purchased in both cases by strategic payoffs to those who threaten its progress.

Just as it is important to work out how to build public-regarding institutional spaces in the real world, so too is it important to identify how to create such spaces in the virtual, digitally mediated world. Just as the bodies in India, Spain, and Nigeria need to have motive and means to keep the corroding forces of public sphere at bay, so too does a social platform that strives to be an island of integrity need leadership, internal culture, and means to create a non-exploitative, non-dominating structure while managing tail risk better than existing platforms. Taken as metaphor, therefore, “islands of integrity” offer a template for the desirable end goal of social platform reform as well as some modest clues about how to get there. Still, it is important not to make too much of this metaphor. The claim that the “islands of integrity” literature can be an inspiration for social platform reform is, at bottom, an argument from analogy, and one that needs to be tested carefully through the application of that analogy.

B. Digital Islands of Integrity: Two Examples

The aforementioned analogy gains force when one realizes that there are already examples of digital islands of integrity online. The two most prominent examples are Wikipedia and the British Broadcasting Company (“BBC”). To be clear, neither is a quintessential social platform as I have used that term here. Nor do they operate at the same scale as X or Instagram. But I offer a brief discussion of both by way of proof of concept.

Wikipedia emerged from the wreckage of an attempted for-profit online encyclopedia called Nupedia.101Emiel Rijshouwer, Justus Uitermark & Willem de Koster, Wikipedia: A Self-Organizing Bureaucracy, 26 Info., Commc’n & Soc’y 1285, 1291 (2023). The latter’s assets (for example, domain names, copyrights, and servers) were subsequently placed in an independent, charitable organization, the Wikimedia Foundation (“WMF”).102Id. at 1293. At first, corporate governance “emerged” organically from the efforts of those building the site, rather than being imposed from above.103Id. at 1298 (explaining that “bureaucratization emerges from interactions among constituents” of Wikipedia). A group of founders then “transformed their charismatic community into a bureaucratic structure” in which “power was diffused and distributed” across “a sprawling bureaucracy with a wide range of formal positions” in response to the perceived mission-related needs of the organization.104Id. at 1294. The organization’s trajectory has also been characterized by moments of greater centralization. For example, in the early 2010s, Wikipedia’s CEO led an effort to be “more inclusive and more open,” somewhat to the chagrin of the then-contributors.105Id. at 1296. That is, Wikipedia’s governance history centers on a choice of corporate form that insulates leadership from external profit-related pressures, a selection of strong leadership, and an exercise of leadership to broaden and empower the organization’s constituencies (potentially mitigating criticism of the organization) to generate a certain kind of “corporate culture.”106Cf. Pasquale Gagliardi, The Creation and Change of Organizational Cultures: A Conceptual Framework, 7 Organizational Stud. 117, 121–26 (1986) (exploring the meaning of the term “organizational value” and culture).

Even more directly relevant is the web presence of the BBC. The BBC produces thousands of new pieces of content each day for dissemination over a range of sites, such as BBC News, BBC Sport, BBC Sounds, BBC iPlayer, and World Service.107Alessandro Piscopo, Anna McGovern, Lianne Kerlin, North Kuras, James Fletcher, Calum Wiggins & Megan Stamper, Recommenders with Values: Developing Recommendation Engines in a Public Service Organization, Knight First Amend. Inst. (Feb. 5, 2024), https://knightcolumbia.org/content/recommenders-with-values-developing-recommendation-engines-in-a-public-service-organization [https://perma.cc/APX5-T9T2]. The corporation’s charter defines its mission as serving all audiences by providing “impartial, high-quality and distinctive output and services which inform, educate and entertain.”108Id. Like Wikipedia, the BBC is organized into a corporate form that is relatively impermeable by law to commercial pressures. To advance its charter goals, the BBC uses machine-learning recommender algorithms created by multi-disciplinary teams of data scientists, editors, and product managers.109Id. Once a recommender system has been built,110Id. Public service broadcasters such as the BBC cannot rely on “off-the-shelf” recommenders because they optimize for very different goals. Jockum Hildén, The Public Service Approach to Recommender Systems: Filtering to Cultivate, 23 Television & New Media 777, 787 (2022). editorial staff can offer “continuous feedback” on the design and operation of recommendatory systems to identify legal compliance questions and to ensure “BBC values” are advanced.111Piscopo et al., supra note 107.

Available accounts of this process—while perhaps a touch self-serving because they are written by insiders—suggest that the organization strives to cultivate a distinctive cultural identity. It then leverages that identity as a means of advancing its values via algorithmic design. Specifically, an important part of this recommender design process focuses on empowering users to make their own choices and to avoid undesirable (from the service’s perspective) behaviors. The BBC’s recommender tools are designed to permit personalization, albeit only to the extent that doing so can “coexist with the BBC’s mission and public service purposes.”112Id. An insider informant speaking anonymously reported that the BBC understands itself as “as ‘morally obliged’ to provide their users with the possibility of tweaking their recommendations.”113Hildén, supra note 110, at 786. In the same study, the employee of an unnamed European public broadcaster that managed a recommender system reported that their system proactively identified “users who consume narrow and one-sided media content and recommend[ed to] them more diverse content.”114Id. at 788. That is, the system was designed to anticipate and mitigate, to an extent, the possibility of extremism at the tails of the user distribution, while also preserving users’ influence over the content of their feeds. This is in stark contrast to systems that are designed to maximize engagement under conditions in which predictability entails driving users to more extreme (and even dangerous) content.

I do not want to strain the parallels between the “islands of integrity” literature and these digital examples too much. Both of the latter, nevertheless, point to ways in which the means and the motives to sustain an “island of integrity” can be imagined in an online world. Both services are, for example, explicitly oriented toward a public service mission in terms of leadership. They both also opted for corporate forms that allow for some protection against potentially compromising market forces. Both have systems in place to preserve and transit a valued internal culture, while buffering themselves somewhat against the risks of distorting external or internal pressure. Finally, both seem to have successfully cultivated persisting cultures of service to public-service goals by hard-wiring their cultures into bureaucratic structures or, alternatively, algorithmic designs.

III.  The Governance of Social Platforms: Aspiring to Build Islands of Algorithmic Integrity

With the general idea of “islands of integrity” in hand, along with the specific proofs of concept described in Section II.B, it is possible to ask how certain social platforms might be reformed with an ideal of islands of algorithmic integrity in mind. That is, how might we move toward alternative platform designs and operations that address the normative concerns outlined in Part II? What kind of private governance might be imagined that mitigates exploitation and domination concerns, while addressing the tail risk of extremism as best as we can? Could legal regulation play a role? Again, it would be a mistake to frame these questions as mechanical applications of the “islands of integrity” literature. It is better to think of them as falling out of the same institutional design goal.

I approach this inquiry in two stages. I first begin by critiquing leading regulatory strategies observed in the American states and the European Union from an “islands-of-algorithmic-integrity” standpoint. At bottom, these critiques draw out ways in which those regulatory strategies take social platforms as potential sources of harm, largely without an account of the positive role platforms could play. Second, I draw together a number of possible tactics for public or private actors to help build islands of algorithmic integrity. My positive accounting here is concededly incomplete. My hope, however, is that this effort serves as initial evidence of the fruitfulness of an approach oriented toward the aspiration of islands of algorithmic integrity.

A. The Limits of Existing Platform Regulation Regimes

Since 2020, social platforms have become an object of regulatory attention on both sides of the Atlantic. Three main regulatory strategies can be observed. These take the form of new state regulations purportedly targeting “censorship,”115Mary Ellen Klas, DeSantis Proposal Would Protect Candidates Like Trump from Being Banned on Social Media, Mia. Herald, https://www.miamiherald.com/news/politics-government/state-politics/article248952689.html [https://web.archive.org/web/20221017063802/https://www.miamiherald.com/news/politics-government/state-politics/article248952689.html] (quoting Florida governor Ron DeSantis). fresh efforts to extend common law tort liabilities to social platforms, and a risk-based regulatory regime that has been promulgated by the European Union. Broadly speaking, all such legal intervention is premised on concern about platforms’ society-wide effects on listeners, although deontic concerns may play a role too. The tools seized for those tasks, however, have been inadequate. Their shortfall can be traced to the way in which they focus exclusively on platform harms (missing the importance of benefits), misconstrue those harms, and then fail to incentivize the formation of platforms with the means and the motive to mitigate documented harms while resisting exploitation or domination.

  1. Regulating Ex Ante for Harms

The 2022 Digital Services Act (“DSA”) offers a first model of ex ante platform regulation. In important part, it trains on the potential for harms by recommender systems without any account of their positive effects. It contains a suite of new legal obligations: Article 25, for example, prohibits any digital platform design that “deceives or manipulates the recipients of their service or in a way that otherwise materially distorts or impairs the ability of the recipients of their service to make free and informed decisions.”116Digital Services Act, supra note 13, at art. 25 § (1). Article 38 provides a right to opt out of non-personalized algorithms.117Id. at art. 38 (mandating “at least one option for each of their recommender systems which is not based on profiling as defined in Article 4, point (4), of Regulation (EU) 2016/679 ”). Articles 14 and 26 set out some disclosure obligations on certain companies.118Id. at art. 14 § (1) and art. 26 § (1)(d). Most importantly, for present purposes, Article 34 of the DSA requires “very large online platforms and . . . online search engines” to conduct an annual assessment of any systemic risks stemming from the design or functioning of their service, including negative effects on civic discourse, electoral processes, or fundamental rights.119Id. at art. 34. For a close reading of Article 34, see Neil Netanel, Applying Militant Democracy to Defend Against Social Media Harms, 45 Cardozo L. Rev. 489, 566 (2023).

At first blush, the DSA seems oriented toward the creation of islands of algorithmic integrity. But there are reasons for being skeptical of conceptualizing the project this way. To begin with, the Article 38 opt-out is unlikely to be exercised by those “supersharers” at the tails of the ideological distribution who are most responsible for the diffusion of fake news.120Baribi-Bartov et al., supra note 55, at 979. Self-help remedies never avail those already fixated on harming themselves and others. Moreover, Article 34 risk assessments impose no clear affirmative command to build epistemically robust speech environments.121But see Netanel, supra note 119, at 566–67 (proposing that platforms be required to make “recommender system modifications to improve the prominence of authoritative information, including news media content that independent third parties have identified as trustworthy”). Netanel, however, is proposing in this passage an extension of Article 34 rather than offering a gloss on it, so far as I can tell. In effect, the act offers no clear account of how social platforms could or should enable democratic life. Even more problematic, the DSA ultimately leans on platforms themselves to accurately document and remedy their own flaws. It does not seem excessively cynical to predict that profit-oriented companies will not be falling over themselves to flag the negative externalities of their own products in publicly available documents and flagellate themselves over how to remedy them. The DSA, in short, is promising as theory. But it may fall substantially short in practice.

  1. Regulating Ex Ante for Balance

Both Florida and Texas have enacted statutes intended to limit platforms’ abilities to “deplatform” a person because of their violation of terms of service.122Florida defines “deplatform” as “the action or practice by a social media platform to permanently delete or ban a user or to temporarily delete or ban a user from the social media platform for more than 14 days.” Fla. Stat. § 501.2041(1)(c) (2021). Texas’s law has a similar provision. See H.B. 20, 87th Leg., Reg. Sess. (Tex. 2021) (prohibiting social media platforms from censoring users or a user’s expressions based on the viewpoint expressed in the content). The Florida statute, for example, prohibits platforms from “willfully deplatform[ing] a candidate for office who is known by the social media platform to be a candidate, beginning on the date of qualification and ending on the date of the election or the date the candidate ceases to be a candidate.”123Fla. Stat. § 106.072(2) (2021). In its July 2024 decision in Moody v. NetChoice, the U.S. Supreme Court cast doubt on the constitutionality of such measures.124Moody v. NetChoice, LLC, 603 U.S. 707 (2024). While litigation is ongoing as this essay goes to press, it seems likely that the deplatforming elements of both statutes will not survive.

Relying on familiar doctrinal tools from the First Amendment toolkit, a majority of the Moody Court reached two conclusions that are relevant here. First, Justice Elena Kagan’s majority opinion explained that when an entity “provide[s] a forum for someone else’s views” and is thereby “engaged in its own expressive activity, which the mandated access would alter or disrupt,” a First Amendment interest is implicated.125Id. at 728. Second, the Court held that the government has no constitutionally cognizable interest “in improving, or better balancing, the marketplace of ideas.”126Id. at 732. This anti-distortion argument is familiar from the campaign finance context.127See, e.g., Citizens United v. FEC, 558 U.S. 310, 340–41 (2010) (“By taking the right to speak from some and giving it to others, the Government deprives the disadvantaged person or class of the right to use speech to strive to establish worth, standing, and respect for the speaker’s voice.”). There, however, the argument is deployed generally by conservative justices to resist governmental efforts to advance an equality interest in political speech given its “dangerous[] and unacceptable” effects.128Id. at 351. In the Florida and Texas cases, by contrast, the argument was listed against efforts by Republican state governments to enforce their understanding of balance on the platform-based speech. Such ideological valence thus flipped from campaign finance to platform regulation.

Independent of these familiar constitutional logics, there are more empirically grounded reasons to conclude that Florida’s and Texas’s efforts to mitigate platforms’ curatorial capacity are likely to undermine, rather than promote, the emergence of islands of algorithmic integrity. These reasons run parallel to Justice Kagan’s reasoning, but are distinctive in character.

The first reason is banal and empirical. The available research suggests that conservative voices in the United States are asymmetrically responsible for the dissemination of fake news.129Baribi-Bartov et al., supra note 55, at 979 (“Supersharers had a significant overrepresentation

of women, older adults, and registered Republicans.”); González-Bailón et al., supra note 57, at 397 (“We also observe on the right a far larger share of the content labeled as false by Meta’s 3PFC.”). There is more to be said about rhetorical use of “balance” claims in law and politics, and its dynamic effects upon the tendency of people to go to extremes.
To the extent that Florida and Texas leaned on a conception of “balance” in the speech environment, they did so by culpably ignoring the platforms’ interest in a generally reliable and trustworthy news environment. Enforcement of the Florida and Texas laws, to the contrary, seems likely to lead (all else being equal) to a decline in the quality of those platforms. That is to say, by a sort of Gresham’s law for political speech, the increasing proportion of misleading speech on a platform will tend to drive out those concerned with truthfulness. Such an effect creates a vicious circle of sorts, one that is absent from the campaign finance context.

This argument might be supplemented by a further observation. As I show below, there are a number of fairly obvious affirmative measures that private and public actors can take if they are truly concerned with the creation of islands of algorithmic integrity.130See infra Part III.B. If we see a government failing to take these needful steps while affirmatively adopting counterproductive measures, there is some reason to doubt the integrity of its claim to be acting in the public interest. The islands of algorithmic integrity frame can be put to work here as a lens through which one may understand the gap between a state’s professed interests and its actual ambitions.131Cf. Geoffrey R. Stone, Free Speech in the Twenty-First Century: Ten Lessons from the Twentieth Century, 36 Pepp. L. Rev. 273, 277 (2009) (noting that “government officials will often defend their restrictions of speech on grounds quite different from their real motivations for the suppression, which will often be to silence their critics and to suppress ideas they do not like”). If, as Justice Kagan once suggested in her academic role, the First Amendment doctrine is best understood as “a series of tools to flush out illicit motives and to invalidate actions infected with them” and a “kind of motive-hunting,”132Elena Kagan, Private Speech, Public Purpose: The Role of Governmental Motive in First Amendment Doctrine, 63 U. Chi. L. Rev. 413, 414 (1996). then the failure to pick low-hanging fruit while making elaborated and far-fetched claims about one’s integrity-related aims is a telling one. To the extent that it identifies some of those low-hanging fruit, the islands of algorithmic integrity grafts on comfortably to advance those goals.

A second reason to be skeptical of measures such as Florida’s and Texas’s is conceptual in character: balance-promoting measures of their ilk help themselves to the assumption that there is a neutral baseline that has been disturbed by a platform’s algorithm. But “the most common choice of baseline fundamentally depends on the state of some components of the system,” and assumes away the effect of past bias and amplification.133Lum & Lazovich, supra note 26. Accordingly, the Florida and Texas laws’ presupposition of a neutral baseline of undistorted speech is misplaced; it is better to instead focus on the structural qualities associated with islands of integrity. Where a government asserts an interest in “neutrality” or “fairness” in the context of social platforms, its arguments should be viewed as pro tanto dubious since it is striving to return to a status quo that, for technological reasons, is imaginary. A version of this baseline difficulty arises in the campaign finance context, albeit for different reasons.134For a nuanced account of the difficulty of curbing the “bad tendencies of democracy,” see David A. Strauss, Corruption, Equality, and Campaign Finance Reform, 94 Colum. L. Rev. 1369, 1378–79 (1994). It also lacks the sociotechnical foundation that is present in the platform context.

  1. Tort Liability for Harmful Algorithmic Design

The Texas and Florida statutes impose ex ante controls on social platforms. An alternative regulatory strategy when it comes to platforms involves the ex poste use of tort liability to incentivize “better” (by some metric) behavior. Platforms benefit from a form of intermediate immunity from tort liability under Section 230 of the Communications Decency Act.13547 U.S.C. § 230; see also Zeran v. Am. Online, Inc., 129 F.3d 327, 328 (4th Cir. 1997) (holding that Section 230 immunized an online service provider from liability for content appearing on its site created by another party). Section 230 immunity is likely wider than the immunity from liability available under the First Amendment,136Cf. Note, Section 230 as First Amendment Rule, 131 Harv. L. Rev. 2027, 2030 (2018) (noting that “[j]udges and academics are nearly in consensus in assuming that the First Amendment does not require § 230”). although the scope of constitutionally permissible tort liability remains incompletely defined.137Jack M. Balkin, Free Speech Is a Triangle, 118 Colum. L. Rev. 2011, 2046 (2018).

Recent lawsuits have tried to pierce Section 230 immunity from various angles. Some have tried to exploit federal statutory liability for aiding and abetting political violence.138See, e.g., Twitter, Inc. v. Taamneh, 598 U.S. 471, 503 (2023) (rejecting that reading of federal statutory tort liability). Others lean on common law tort theories, but contend that Section 230 does not extend to suits that turn on platforms’ use of algorithmic controls to sequence and filter content. For example, in an August 2024 decision, a panel of the Third Circuit reversed a district court’s dismissal of a common law tort complaint against TikTok for its promotion of content that played a role in the death of a minor.139Nylah Anderson watched a TikTok video on the “Blackout Challenge” and died imitating what she saw. Anderson v. TikTok, Inc., 116 F.4th 180, 181 (3rd Cir. 2024). The circuit court held that Section 230 did not extend to a claim that TikTok’s “algorithm was defectively designed because it ‘recommended’ and ‘promoted’ the Blackout Challenge.”140Id. at 184. The Blackout Challenge, said the panel, was “TikTok’s own expressive activity,” and as such fell outside Section 230’s scope.141Id. This construction of Section 230 has been severely criticized.142See, e.g., Ryan Calo, Courts Should Hold Social Media Accountable—But Not By Ignoring Federal Law, Harv. L. Rev. Blog (Sept. 10, 2024), https://harvardlawreview.org/blog/2024/09/courts-should-hold-social-media-accountable-but-not-by-ignoring-federal-law [https://perma.cc/CFE6-3ZDZ]. Thus, it is far from clear how this ruling can be squared with the seemingly unambiguous Section 230 command that no platform can “be treated as the publisher or speaker of any information provided by another information content provider.”14347 U.S.C. § 230(c)(1) (emphasis added).

Reflection on the prospect of tort liability that is delimited in this fashion and consistent with Section 230 (especially with the idea of “islands of algorithmic integrity” in mind) offers some further reasons for skepticism of the Third Circuit’s decision and the consequences of tort liability for algorithmic design more generally. For it is far from clear how algorithmic-design-based liability of the sort that the Third Circuit embraced can be cabined. Every algorithmic decision changes the overall mix of content on the platform. So, it is always the case that such decisions in some sense “cause” the appearance of objectionable content.144One might interpose here some notion of algorithmic proximate cause. That presents, to say the least, rather difficult questions of doctrinal design. Indeed, one could argue that any mechanism imposed to limit one sort of harmful speech necessarily increases the likelihood that other sorts of speech (including other sorts of harmful speech) will feature prominently on the platform. For example, a decision to filter out speech endorsing political violence is (all else being equal) going to increase the volume of speech that is likely conducive to adolescent mental health problems. In this way, the Third Circuit’s decision (at least as written) has the practical effect of carving out all algorithmic content-moderation activity from Section 230’s scope. It is hard to imagine this concurs with Congress’s enacting intent.

Indeed, tort liability for algorithmic decision will inevitably push platforms to rely more on networks, rather than algorithms, as drivers of content. But the empirical evidence suggests that network-based platform designs are more, not less, likely to experience higher levels of fake news, and that they are less amenable to technical fixes.145See supra text accompanying notes 44–65. Tort liability, at least as understood by the Third Circuit in the TikTok case, therefore pushes platforms away from socially desirable equilibria. Paradoxically, all else being equal, it is likely to increase, and not decrease, the volume of deeply troublesome material on platforms of the sort at issue in the Third Circuit TikTok case. More generally, it is again hard to see how liability for algorithmic design decisions, all else being equal, is socially desirable.

B. The Possible Vectors of Algorithmic Integrity

The fact that state and national governments opt for partial or unwise regulatory strategies does not mean that are no promising paths forward. To the contrary, the examples examined in Part II suggest a range of useful reforms. I outline three here briefly.

To begin with, the examples of Wikipedia and the BBC suggest that it may be possible to build at least small-scale islands of algorithmic integrity either in the private or the public sector. Those examples further suggest that whether state or private in character, such an island needs mechanisms to shield itself from the pressure to maximize profits. An entity that is exposed to the market for corporate control is unlikely to be able to resist commercial pressures for long.

Corporate form hence matters. For example, social platforms’ incentive to maximize engagement, and hence maximize advertising revenue, has been “critical” to driving the dissemination of radicalizing and hateful speech.146Daron Acemoglu & Simon Johnson, Power and Progress 362 (2023). The transformation of Twitter to X after its purchase by Elon Musk, and the subsequent degradation and coarsening of discourse on the platform, offer an abject lesson in the perils of the unfettered free market for islands of algorithmic integrity.147There is some evidence that X systematically favored right-leaning posts in late 2024, suggesting a link between corporate control and political distortion. Timothy Graham & Mark Andrejevic, A Computational Analysis of Potential Algorithmic Bias on Platform X During the 2024 US Election (Queensland Univ. of Tech., Working Paper, 2024)), https://eprints.qut.edu.au/253211. The market for corporate control, which is often glossed over in light of the efficient capital markets hypothesis, is commonly viewed as an unproblematic good.

One of the main lessons of the islands of integrity literature, however, is the need for well-motivated leadership of the sort that has been described at Wikipedia and the BBC. It is hard to see how such motivation survives under the shadow of potential corporate takeover.

Second, islands of integrity require the right means (or tools), as well as the right motive. The use of algorithmic tools to curate a platform creates means in a way that reliance on network effects does not. It is thus a mistake to assume, as the Third Circuit seems to have done in the TikTok case, that an algorithmically managed platform is worse than a network based one. As Part I illustrated, the empirical evidence suggests that algorithmically managed platforms are generally not more polluted by misinformation than ones driven by users’ networks.148Budak et al., supra note 52, at 48; accord Hosseinmardi et al., supra note 47, at 1. Quite the contrary.

Moreover, a social platform built around an algorithm may have tools to improve its epistemic environment that a network-based platform lacks. For instance, a 2023 study found that certain “algorithmic deamplification” interventions had the potential to “reduce[] engagement with misinformation by more than [fifty] percent.”149Benjamin Kaiser & Jonathan Mayer, It’s the Algorithm: A Large-Scale Comparative Field Study of Misinformation Interventions, Knight First Amend. Inst. (Oct. 23, 2023), https://knightcolumbia.org/content/its-the-algorithm-a-large-scale-comparative-field-study-of-misinformation-interventions [https://perma.cc/Y4KU-76BY]. Another example of an instrument for epistemic integrity is, somewhat surprisingly, a feature of Facebook’s algorithm, which has baked in a preference for friends-and-family content that “appears to be an explicit attempt to fight the logic of engagement optimization.”150Narayanan, supra note 10, at 31.

Third, there is a range of tailored reforms that precisely target ways in which social platforms stand in asymmetrical relations of exploitation and dominance to their users. As a very general first step, Luca Belli and Marlena Wisniak have proposed the use of “nutrition labels,” detailing key parameters of platform operation as a way of enabling better informed consumer choice between platforms.151Luca Belli & Marlena Wisniak, What’s in an Algorithm? Empowering Users Through Nutrition Labels for Social Media Recommender Systems, Knight First Amend. Inst. (Aug. 22, 2023), https://knightcolumbia.org/content/whats-in-an-algorithm-empowering-users-through-nutrition-labels-for-social-media-recommender-systems [https://perma.cc/N7MW-SEVT]. This kind of notice-based strategy, while plausible to implement, assumes a measure of user choice over which platform to use. At present, such choice is largely illusory because of the market dominance of a small number of platforms.152Lina M. Khan, The Separation of Platforms and Commerce, 119 Colum. L. Rev. 973, 976 (2019) (“A handful of digital platforms exert increasing control over key arteries of American commerce and communications.”). It is also hard to see how consumers, particularly those already at the ideological margin, could be persuaded to make the right kind of choice. Inducing more competition, and hence more consumer choices, in social platforms would give notice-oriented measures more bite. Some work has been done on potential varieties of platform design,153For a recent survey of other possible models of “decentraliz[ed]” platform governance, see Ethan Zuckerman & Chand Rajendra-Nicolucci, From Community Governance to Customer Service and Back Again: Re-Examining Pre-Web Models of Online Governance to Address Platforms’ Crisis of Legitimacy, 9 Soc. Media + Soc’y, July–Sept. 2023, at 1, 7–9. but there remains ample room for inquiry and improvement. The basic point, though, is that some combination of increased competition and better consumer-facing notices would better allow certain users to select among different social platforms based on their own preferences—although it is hard to be confident that the right users, so to speak, will be those aided.

There are also steps that can be taken by a well-motivated platform manager. Within a platform, for example, the BBC’s strategy of promoting personalization could be adopted and redeployed in a number of ways. For instance, bots, or “user-taught” agents could be supplied to help individual users curate the shape of their feeds over time.154Kevin Feng, David McDonald & Amy Zhang, Teachable Agents for End-User Empowerment in Personalized Feed Curation, Knight First Amend. Inst. (Oct. 10, 2023), https://knightcolumbia.org/content/teachable-agents-for-end-user-empowerment-in-personalized-feed-curation [https://perma.cc/RAN8-QT7S]. These bots, however, might be constrained by the understanding of the platform’s mission, which excluded normatively troublesome activity characterizing the tails of the ideological distribution.

Finally, another way of mitigating exploitation concerns focuses on advertisers rather than users. Firms advertising on platforms are often unaware their products or services are marketed next to fake news, despite having an aversion to that arrangement.155Wajeeha Ahmad, Ananya Sen, Charles Eesley & Erik Brynjolfsson, Companies Inadvertently Fund Online Misinformation Despite Consumer Backlash, 630 Nature 123, 125–28 (2024). They lack, however, information on when and how this occurs. Increased disclosure by platforms on “whether . . . advertisements appear on misinformation outlets,” as well as increased “transparency for consumers about which companies advertise” there, provides the potential to stimulate a collective shift to a more truthful equilibrium.156Id. at 129. Such disclosures help ensure that “the means of ensuring legibility [will not completely] fade into the background of the ordinary patterns of our li[ves],”157Henry Farrell & Marion Fourcade, The Moral Economy of High-Tech Modernism, 152 Dædalus 225, 228 (2023). as platform affordances become too banal to notice. Such disclosures, finally, might be mandated by law, potentially as a means of mitigating fraud concerns related to platform use.

Conclusion

In this essay, I have tried to offer an affirmative vision of social platform governance in the long run, or at least the seeds of such a vision. No doubt this vision is leagues away from the grubby, venal, and hateful reality of social platforms now. It is, indeed, a stark contrast to those extant realities. But one of the functions of scholarship is to generate plausible pathways away from a suboptimal institutional status quo. The articulation of alternatives is itself of value.

As I have suggested, drawing on sociological and political science literature on islands of integrity in public administration allows us to see some of the limits of existing regulatory strategies with respect to social platforms. Doing so opens up new opportunities for improved public and private governance. Of course, the model of islands of integrity in a public administrative context cannot be mechanically transposed over to the platform context. But by offering us a new North Star for reforming governance efforts, I hope it can advance our understanding of how to build platforms fit for our complex, yet (perhaps still) fragile democratic moment.

98 S. Cal. L. Rev. 1287

Download

*  Frank and Bernice J. Greenberg Professor of Law, University of Chicago Law School, and associate professor, Department of Sociology. Thanks to Erin Miller for extensive and illuminating comments, and to participants in the symposium—in particular Yasmin Dawood—for terrific questions and conversation. The editors of the Southern California Law Review, in particular Michelle Solarczyk and Tyler Young, did exemplary work in making this essay better. The Frank J. Cicero Foundation provided support for this work. 

In the Name of Accountability

Introduction

The Supreme Court has increasingly embraced legal doctrines that empower elected officials to hide politically inconvenient information and ideas from the American people. Two lines of precedent illuminate this phenomenon and its reach across seemingly disparate areas of the case law. The first is a development in First Amendment law known as government speech doctrine and the closely related rule that public employees receive no First Amendment protection for their work product speech—that is, for anything that they write or say while doing their jobs. This precedent puts at risk the ability of public employees or publicly subsidized experts—ranging from auditors hired to ferret out agency misconduct to scientists commissioned to study and report on changing climate patterns—to convey truthful information and competent, good faith analyses consistent with disciplinary and professional norms. The second line of precedent is the aspect of separation of powers law known as unitary executive theory (“UE theory,” “UE,” or “unity”). UE proponents argue that the president must fully control all discretionary executive activity in the United States, at minimum through an unfettered removal power. This jeopardizes the independence of federal actors who are charged with research and reporting on matters ranging from public corruption to public health.

The two doctrines not only have similar impacts on information and analysis in the United States, but also share a common rationale: political accountability. Proponents of government speech doctrine emphasize that the people can respond to government speech at the ballot box, rewarding elected officials for speech that they like or punishing them when they dislike what they hear. As for UE theory, supporters emphasize that the president is the only elected official in the federal executive branch. Indeed, they describe the president as more politically accountable than anyone else holding elected office in the United States, as the president alone is subject to nationwide election. It is crucial, they argue, that the president alone exercises discretionary executive power so that the people know whom to blame or reward electorally for the use of such power. Similarly, they brush away concerns about presidential abuses by stressing the ability of the people to punish transgressions at the ballot box.

The judiciary is far from alone in crafting and buttressing these schools of thought. To the contrary, UE theory was shaped and heavily promoted by the modern conservative legal movement well before the Roberts Court embraced it. Indeed, even as the Supreme Court rejected UE theory in the 1988 case of Morrison v. Olson, the Justice Department under Attorney General Meese relied on it internally and championed it externally along with the then-nascent Federalist Society. Today, with the support of the Supreme Court, and with Donald Trump retaking the presidency and characterizing career experts across government as parts of a rogue “deep state,” UE theory and its accountability rationale have more influence than ever.

Although, to my knowledge, no similarly probing intellectual history has been done with respect to government speech doctrine, the doctrine aligns intuitively with classic complaints about how Americans’ tax dollars are spent, including on public education, public broadcasting, and other forms of knowledge production. Such gripes are not intrinsically partisan, but they can be marshalled in a partisan fashion when framed as appeals to stop “wrongheaded” or “offensive” views from being supported by public funds. Over the past several years, we have indeed seen campaigns, in both legal and political realms, for elected officials to control the communicative output of a range of government programs. These campaigns often characterize civil servants as parts of a leftist deep state, echoing the rhetoric of unitary executive theorists. Their targets include elementary school teachers, college professors, and librarians whom they deem “woke” and indoctrinating. The major thread of argument in these political and legal attacks has been accountability—specifically, the notion that the electorate, through elected representatives, should get the final word on the content of publicly funded knowledge production. Framed in legal terms, the argument is that all such output is the government’s own speech.

Yet even as accountability serves as a rallying cry for proponents of UE theory and government speech doctrine, there is a profound tension between that call to arms and the negative impacts of both government speech doctrine and UE theory on the information ecosystem. This tension stems from two very different visions of accountability. Government speech and unitary executive arguments each focus on a thin vision of accountability, one that I have elsewhere called “formal accountability.” Formal accountability requires only that there exist some means, mainly the ballot box, by which the public can accept or reject officials.1Those officials include the president, in the case of unitary executive theory, and the officials behind any given instance of government expression in the case of government speech doctrine.

A more robust vision of accountability—one that I label “substantive accountability”—recognizes that accountability “is a ‘they,’ not an ‘it.’ ”2See Kenneth A. Shepsle, Congress Is a “They,” Not an “It”: Legislative Intent as Oxymoron, 12 Int’l Rev. L. & Econ. 239, 244 (1992). Indeed, the casting of a single vote for an official—even assuming the opportunity to vote for or against them again some number of years later—is too blunt an instrument to constitute considered approval of all manner of decision whether big or small, technical or non-technical, anticipated or unanticipated. Rather, holding officials accountable entails countless acts over time, ranging from legislative oversight to internal and external whistleblowing to fearless investigative journalism. All of these acts—including, but not limited to, voting—require the gathering and exchange of information and ideas. In the longer-term, they require a knowledge ecosystem that reliably produces such communications and supports a citizenry capable of assessing them. If one’s goal is substantive accountability, then government speech doctrine and UE theory are woefully inadequate to achieve it. To the contrary, they profoundly undermine it, especially when they are interpreted broadly.

Given the growing importance of UE theory and government speech doctrine in both legal and political realms, it is more important now than ever to understand how they undermine, rather than protect, meaningful, substantive accountability. Viewing these two schools of thought together also helps us to see how doctrines across seemingly disparate areas of the law can interact with and buttress one another and be harnessed by partisan interests.

In Part I of this Article, I summarize the respective accountability-based cases for UE theory and government speech doctrine. I explain that each rationale is premised on a simplistic, formal vision of accountability. In contrast, I argue that substantive accountability, which is antithetical to UE theory and to broad interpretations of government speech doctrine, is more faithful to constitutional principles and more desirable as a practical matter. In Part II, I elaborate on and illustrate the points made in Part I by drawing from the major Supreme Court cases on UE theory and government speech doctrine. In Part III, I present several examples of how UE theory and government speech doctrine have been wielded in the courts and the political branches to undermine substantive accountability. In Part IV, I consider where the case law leaves openings to impose limits on each doctrine to preserve substantive accountability.

I. Substantive Accountability and the Constitution

Proponents of UE theory and government speech doctrine assume a very simplistic vision of government accountability. In the case of UE theory, they suggest that because the president is the only elected member of the executive branch, he alone can be accountable to the people in executing the law.3See, e.g., Steven G. Calabresi, Some Normative Arguments for the Unitary Executive, 48 Ark. L. Rev. 23, 58 (1995); Lawrence Lessig & Cass R. Sunstein, The President and the Administration, 94 Colum. L. Rev. 1, 97–99 (1994); Saikrishna Bangalore Prakash, Hail to the Chief Administrator: The Framers and the President’s Administrative Powers, 102 Yale L.J. 991, 998–99, 1012–15 (1993). See also Heidi Kitrosser, The Accountable Executive, 93 Minn. L. Rev. 1741, 1747–48 nn.28–32 (2009) (summarizing accountability-based unity arguments and their sources) [hereinafter Kitrosser, The Accountable Executive]. Thus, UE proponents bolster their textual and historical arguments—which I and others have discussed elsewhere4See, e.g., Heidi Kitrosser, “A Government That Benefits from Expertise”: Unitary Executive Theory & the Government’s Knowledge Producers, 72 Syracuse L. Rev. 1473, 1482–83 (2022) [hereinafter, Kitrosser, “A Government That Benefits from Expertise”] (citing Christine Kexel Chabot, Interring the Unitary Executive, 98 Notre Dame L. Rev. 129, 152 (2022); David M. Driesen, The Specter of Dictatorship: Judicial Enabling of Presidential Power 28–31 (2021); Jed Handelsman Shugerman, Presidential Removal: The Marbury Problem and the Madison Solutions, 89 Fordham L. Rev. 2085, 2086–87, 2097–2102 (2021); Daniel D. Birk, Interrogating the Historical Basis for a Unitary Executive, 73 Stan. L. Rev. 175, 187–88, 228–29 (2021); Julian Davis Mortenson, The Executive Power Clause, 168 U. Pa. L. Rev. 1269, 1334 (2020); Jed Handelsman Shugerman, The Imaginary Unitary Executive, Lawfare (July 6, 2020, 8:54 AM), https://www.lawfareblog.com/imaginary-unitary-executive [https://web.archive.org/web/20230909021003/https://www.lawfaremedia.org/article/imaginary-unitary-executive]; Victoria Nourse, Reclaiming the Constitutional Text from Originalism: The Case of Executive Power, 106 Calif. L. Rev. 1, 23–24 (2018); Peter M. Shane, The Originalist Myth of the Unitary Executive, 19 U. Pa. J. Const. L. 323, 328–30, 352–60 (2016); Heidi Kitrosser, Reclaiming Accountability: Transparency, Executive Power, and the U.S. Constitution 155–57 (2015) [hereinafter Kitrosser, Reclaiming Accountability]). and which I address briefly in Part II—by suggesting that accountability is a core reason why text and history dictate a unitary executive,5See, e.g., Heidi Kitrosser, Interpretive Modesty, 104 Geo. L.J. 459, 506 (2016) [hereinafter Kitrosser, Interpretive Modesty] (citing Saikrishna Prakash, The Essential Meaning of Executive Power, 2003 U. Ill. L. Rev. 701, 783; Calabresi, supra note 3, at 42–45). See also Kitrosser, The Accountable Executive, supra note 3, at 1747 nn. 25–26 and accompanying text. and that accountability independently demands a unitary executive.6See sources cited supra note 3. Proponents elaborate further on presidential accountability by comparing the president not only to unelected bureaucrats, but also to members of Congress. Although the latter are elected, the argument goes, the president alone is subject to election by the entire nation through the Electoral College. He is also uniquely visible in culture and society.7See Kitrosser, The Accountable Executive, supra note 3, at 1747–48 nn.30–32 and accompanying text.

In the case of government speech doctrine, the Supreme Court and other proponents have treated accountability—again, in the form of elections—as a safety net that enables the people to register disapproval of unpopular government speech. They also suggest that government speech itself bolsters accountability, both in the sense that the government can give the people what they want through speech and that it can seek to persuade them through speech.

A number of scholars have critiqued the Court’s treatment of accountability in both UE theory and government speech doctrine cases. With respect to UE theory, critics observe that it massively oversimplifies how accountability is achieved as a practical matter. Indeed, it seems naïve to believe that a single vote for president held once every four years can bear the accountability load for virtually all executive branch activity. Even if we put aside the Electoral College—on account of which the popular vote winner lost the presidency twice in the last quarter of a century—and the fact that voters across the country are not a monolith, the assumption that a presidential election result constitutes a referendum on every discretionary decision of the executive branch, including the most obscure and technical ones, is heroic.8See, e.g., Peter M. Shane, Political Accountability in a System of Checks and Balances: The Case of Presidential Review of Rulemaking, 48 Ark. L. Rev. 161, 197–202 (1995). See also Kitrosser, The Accountable Executive, supra note 3, at 1748–50 (citing Shane’s argument as well as related criticisms by other scholars of the accountability-based argument for unity).

Furthermore, to the extent that constitutional accountability is about the electoral relationship between the people and elected officials, those officials include members of Congress as well as the president.9See infra note 13 and accompanying text. See also, e.g., Martin S. Flaherty, The Most Dangerous Branch, 105 Yale L.J. 1725, 1785 (1996); Cynthia R. Farina, The Consent of the Governed: Against Simple Rules for a Complex World, 72 Chi.-Kent L. Rev. 987, 992–1007, 1017–20 (1997); Jerry L. Mashaw, Structuring a “Dense Complexity”: Accountability and the Project of Administrative Law, 5 Issues in Legal Scholarship 1, 12–15, 35–38 (2005). See also Kitrosser, The Accountable Executive, supra note 3, at 1748–49 nn. 34–36 (citing Flaherty, Farina, and Mashaw, among others). As Blake Emerson writes, unity proponents “do not grapple with the competing democratic authority of Congress to structure the Executive Branch.”10Blake Emerson, Liberty and Democracy Through the Administrative State: A Critique of the Roberts Court’s Political Theory, 73 Hastings L.J. 371, 376 (2022). See also Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1484–85 (citing Emerson’s observation). To the contrary, unity is invoked to invalidate legislation passed by both houses of Congress—and, it is no small matter, signed by the president11The only exception, of course, being a rare case involving a presidential veto and a supermajority override of that veto by each house of Congress. —that seek to create some independence from unfettered presidential control in the administrative state.

Many if not most of the statutory innovations targeted by unity proponents themselves are designed to foster accountability—for instance, by shielding internal investigations from direct partisan control. This is not to say that administrative independence always enhances accountability. The point, rather, is that devising structures to maximize accountability, let alone to do so while preserving other goals and values, calls for legislative innovation and flexibility rather than categorical rules. As Justice Kagan put it, dissenting in 2020 in Seila Law v. Consumer Financial Protection Bureau, “[d]iverse problems of government demand diverse solutions. They call for varied measures and mixtures of democratic accountability and technical expertise, energy and efficiency. Sometimes, the arguments push toward

tight presidential control of agencies. . . . At other times, the arguments favor greater independence from presidential involvement.”12Seila Law LLC v. Consumer Fin. Prot. Bureau, 591 U.S. 197, 282 (2020) (Kagan, J., dissenting).

Justice Kagan’s point dovetails nicely with another major scholarly critique of UE theory’s formalistic accountability. That is, formal accountability is consistent neither with the ordinary meaning of accountability nor with the conception of it embodied in the Constitution’s structure. Elsewhere, I have summarized some of the major literature on these points as follows:

[Unity’s] vision of accountability is inconsistent with the far more complex [scheme] envisioned by the Constitution, [which] creates a web of accountability shared by multiple legislators representing multiple constituencies and by the presidency alike. Furthermore, constitutional accountability mechanisms are not directed solely toward vindicating majority policy preferences . . . but also toward guarding against abuse, incompetence, and majoritarian tyranny. In the context of the administrative state . . . constitutional accountability values demand not only multiple avenues for political accountability, but also intra-bureaucratic accountability mechanisms characterized by “complex chains of authority and expertise.”13Kitrosser, Reclaiming Accountability, supra note 4, at 163. See also id. at 258, 259 nn.66–68 (first citing Edward Rubin, The Myth of Accountability and the Anti-administrative Impulse, 103 Mich. L. Rev. 2073, 2076–83, 2119–22, 2134–35 (2005); then citing Rebecca L. Brown, Accountability, Liberty, and the Constitution, 98 Colum. L. Rev. 531, 552–59, 564–65 (1998); Flaherty, supra note 9, at 1785; Shane, supra note 8, at 197–209; Peter M. Shane, Independent Policymaking and Presidential Power: A Constitutional Analysis, 57 Geo. Wash. L. Rev. 596, 613–14 (1989)). For more recent discussions of the accountability-promoting effect of internal executive branch checking mechanisms, including restraints on political control of the administrative state, see, e.g., Jon D. Michaels, Constitutional Coup: Privatization’s Threat To The American Republic 63–65, 155–56, 170–71, 176–77 (2017); Gillian E. Metzger, Foreword: 1930s Redux: The Administrative State Under Siege, 131 Harv. L. Rev. 1, 71–72, 79–81 (2017).

I have built on these insights in my own work by focusing on the role that transparency plays in fostering meaningful, or substantive, accountability.14See generally Kitrosser, Reclaiming Accountability, supra note 4; Kitrosser, “A Government That Benefits from Expertise,” supra note 4; Kitrosser, The Accountable Executive, supra note 3. Even if our only goal were electoral responsiveness, that goal cannot be realized without popular access to information about government and an electorate capable of assessing it. Unfettered presidential control of the administrative state enables presidents to frustrate these ends by stifling or manipulating politically inconvenient information ranging from misconduct investigations to economic or scientific analyses that might cast doubt on administration priorities. The problem is yet more apparent when one considers the array of accountability mechanisms beyond the franchise, all of which require a reliable flow of information and analyses.

As for government speech doctrine, a key critique of the accountability rationale is that it assumes a level of authorship transparency that is not necessarily present in state-created or state-disseminated speech. As Helen Norton writes, “government speech is most valuable and least dangerous when members of the public can identify the government as its source. If, on the other hand, the expression’s government source is obscured . . . then political accountability provides no meaningful safeguard.”15Helen Norton, Constraining Public Employee Speech: Government’s Control of Its Workers’ Speech to Protect Its Own Expression, 59 Duke L.J. 1, 20, 27 (2009). Although the Supreme Court has said that it might weigh public perception among other factors to determine whether speech is private or public,16See Daniel J. Hemel & Lisa Larrimore Ouellette, Public Perceptions of Government Speech, 2017 Sup. Ct. Rev. 33, 35–36 (citing Pleasant Grove City v. Summum, 555 U.S. 460, 471 (2009), Walker v. Tex. Div., Sons of Confederate Veterans, Inc., 576 U.S. 200, 212–14 (2015), and Matal v. Tam, 137 S. Ct. 1744, 1760 (2017)). See also Shurtleff v. City of Boston, 142 S. Ct. 1583, 1589–90 (2022) (describing its distinction between government speech and private speech as “not mechanical,” but noting that it has, in past cases, considered factors including “the history of the expression at issue; the public’s likely perception as to who (the government or a private person) is speaking; and the extent to which the government has actively shaped or controlled the expression.”). the Court has developed no “reliable method” to gauge it.17Hemel & Larrimore, supra note 16, at 36–37. To make matters worse, the other factors that the Court considers—such as the extent of government control over speech—can themselves undermine accountability if they are not accompanied by authorship transparency.18See Shurtleff, 142 S. Ct. at 1590 (listing the factors that the Court has considered in the past). See also Hemel & Larrimore, supra note 16, at 58 (“[T]he emphasis on selectivity in several of the Court’s cases leads to the counterintuitive result that Free Speech Clause scrutiny is relaxed when government exerts greater control over the flow of ideas.”).

A closely related problem can occur, even where there is no doubt that the speech at issue is produced or disseminated by the government, if that speech is falsely presented as a product of expertise or evidence-based fact-finding rather than political pressure. As with UE theory, the problem is politicized knowledge production. Elsewhere, I have referred to this phenomenon as “distortion.”19See, e.g., Heidi Kitrosser, Distorting the Press, Knight First Amend. Inst. (July 16, 2024), https://knightcolumbia.org/content/distorting-the-press [https://perma.cc/AUZ7-CQA7].

Distortion occurs when the government—whether through employment or subsidies—sponsors the creation or dissemination of speech but imposes conditions that distort the nature of the speech or its production.20Id. In the context of government speech doctrine, the conditions would typically be imposed on the receipt of subsidies or on continued employment. In the unitary executive context, the means of enforcing conditions can vary and will depend partly on how aggressively UE theory is interpreted. At minimum, enforcement can entail actual or threatened removal from office. Recently, I illustrated the phenomenon of distortion as follows:

Take the example of a climate scientist who works for NASA and contributes to publicly issued reports and testimony that purport to detail scientific findings. Presumably, it is no secret that the scientist works for a government agency and is paid with public funds. Yet an accountability concern remains insofar as the public can be expected to assume that the scientist’s contributions to public reporting are based on professional judgment and scientific best practices. Were those contributions instead shaped by political directives, the public would effectively be duped through distortion that cloaks political messaging in the vestments of science.21Heidi Kitrosser, The Government Speech Doctrine Goes to School, Knight First Amend. Inst. (Oct. 11, 2024), https://knightcolumbia.org/content/the-government-speech-doctrine-goes-to-school [https://perma.cc/4Q85-2KKU] [hereinafter Kitrosser, The Government Speech Doctrine Goes to School].

Distortion can have both near-term and very far-reaching impacts on substantive accountability. To be sure, the line between short- and long-term consequences is a fuzzy one. For example, suppose that political appointees pressured civil servant scientists in an agency to bury or skew research findings that cast doubt on the feasibility of a presidential initiative. In the short run, such intimidation might prevent the public from hearing the unvarnished views of scientists on an electorally salient matter. In the longer run, the pressure campaign—particularly if it were not an isolated incident—might drive highly qualified scientists from the affected agency and deter others from serving in the first place. Such churn, along with the atmosphere that precipitated it, could impact public access to good-faith products of scientific expertise. Still more perniciously, it might undermine the capacity of the public to distinguish expertise from unfounded assertion.

Nonetheless, rough distinctions can be drawn between actions that undermine accountability in the near term and those that do so over time. Indeed, the preceding example suggests an intuitive place to draw a line: between acts or policies designed to keep discrete pieces of information or analysis from reaching the public, and those designed to politicize public knowledge-producing institutions from the inside. This distinction loosely parallels one made by political scientist Terry Moe between two techniques through which presidents wield control over the administrative state: centralization, whereby presidents institutionalize top-down White House control over agencies, and politicization, whereby presidents seek to shape

agencies through appointment and removal powers so that they are politically in tune with the White House in the first place.22See Terry M. Moe, The Politicized Presidency, in The New Direction in American Politics 235, 244–45 (John E. Chubb & Paul E. Peterson eds., 1985).

In pointing to both short- and long-term impacts to accountability, I mean to highlight the depth of the threat that government speech doctrine and UE theory pose to substantive accountability. From a short-term perspective, even if a knowledge institution were to remain fundamentally unchanged by political interference, the partisan manipulation of discrete pieces of data or expert analyses can distort the very picture of reality against which the electorate votes. In the longer run, the impact is yet more serious and harder to reverse, as politicization permeates state-funded enterprises purportedly devoted to disciplinary and professional expertise.

II. Major Judicial Precedent (and a Glimpse at Executive Branch Precedent)

A. Government Speech Doctrine

In this Section, I review the major Supreme Court cases on government speech doctrine, emphasizing their relationships to accountability. The Court has developed the doctrine over the past few decades. Its premise is largely uncontroversial: “[w]hen the government speaks, it is not barred by the Free Speech Clause from determining the content of what it says.”23Walker v. Tex. Div., Sons of Confederate Veterans, Inc., 576 U.S. 200, 207 (2015). For example, as Justice Rehnquist wrote in 1991’s Rust v. Sullivan, “[w]hen Congress established a National Endowment for Democracy to encourage other countries to adopt democratic principles, . . . it was not constitutionally required to fund a program to encourage competing lines of political philosophy such as communism and fascism.”24Rust v. Sullivan, 500 U.S. 173, 194 (1991). Similarly, Justice Breyer, writing for the majority in Shurtleff v. Boston in 2022, posited that “Boston could not easily congratulate the Red Sox on a victory were the city powerless to decline to simultaneously transmit the views of disappointed Yankees fans.”25Shurtleff v. City of Boston, 142 S. Ct. 1538, 1589 (2022).

Despite the commonsense idea at the doctrine’s core—and the intuitive appeal of examples like those invoked by Rehnquist and Breyer—the doctrine’s scope is heavily contested. Two categories of cases raise especially tough questions. The first entails restrictions that fall on speech that can plausibly be characterized as private, rather than governmental speech. For example, the Supreme Court held in Walker v. Texas Division, Sons of Confederate Veterans that specialty license plates in Texas, even those designed by private groups to reflect private hobbies and interests, constitute government speech.26Walker, 576 U.S. at 204–05, 214–15; id. at 221–22, 225–26 (Alito, J., dissenting). Dissenting on behalf of himself and three other justices, Justice Alito lamented the Court’s “capacious understanding of government speech” that “threatens private speech that government finds displeasing.”27Id. at 221–22 (Alito, J., dissenting). Sounding a similar alarm, Mary-Rose Papandrea wrote that Walker put “the Court’s growing deference to government institutional actors . . . on steroids, allowing the government to disfavor private speech in the name of protecting its image.”28Mary-Rose Papandrea, The Government Brand, 110 Nw. U. L. Rev. 1195, 1197 (2016).

The second category, and the one on which I focus in this essay, arises when government purports to subsidize speech that reflects evidence-based reasoning or that otherwise is governed by professional or disciplinary norms, but conditions its support on terms that would distort the nature of the undertaking. Distortion would occur, for example, if the government were to hire investigators to probe alleged wrongdoing or climate scientists to undertake research and report their findings while pressuring them to bury politically unwelcome results.

Distortion undermines free speech values in the same way that it undermines accountability: in the short term, it uses subsidized speakers to launder political messaging and present it as professional or disciplinary expertise; in the long run, it degrades the public’s capacity to consume and process information necessary to oversee their government.

The distorting potential of government speech doctrine is as old as the doctrine itself. Indeed, commentators most often trace the doctrine’s origins to Rust v. Sullivan, a case that itself raises the specter of distortion. In Rust, the Supreme Court upheld federal regulations barring family planning clinics from mentioning abortion in the course of providing federally subsidized counseling.29Rust, 500 U.S. at 191. Although the Rust Court did not invoke the concept of government speech explicitly,30Id. at 196 (characterizing the regulations as simply setting boundaries on the scope of a government-funded program). the Supreme Court described Rust in these terms just a few years later, in Rosenberger v. Rector and Visitors of the University of Virginia.31Rosenberger v. Rector & Visitors of U. of Va., 515 U.S. 819, 833 (1995). The Rosenberger Court characterized Rust as grounded in the notion that “when the government appropriates public funds to promote a particular policy of its own it is entitled to say what it wishes.”32Id. See also Legal Servs. Corp. v. Velazquez, 531 U.S. 533, 541 (2001) (explaining that “Rust did not place explicit reliance” on the government speech rationale, but that, “when interpreting the holding in later cases . . . we have explained Rust on this understanding”). Rust’s critics have argued that the challenged conditions forced medical providers to choose between funding and professional and ethical norms; in short, that the conditions distorted the funded healthcare.33See, e.g., Heidi Kitrosser, Politics, Knowledge, and Government Speech, in Elgar Companion to Free Expression (Alan Chen & Ashutosh Bhagwat eds.) (forthcoming 2025) (citing Robert C. Post, Subsidized Speech, 106 Yale L.J. 151, 174 (1996); Caroline Mala Corbin, Mixed Speech: When Speech Is Both Private and Governmental, 83 N.Y.U. L. Rev. 605, 667 (2008)).

Fifteen years after Rust, the Supreme Court decided the government speech case that is most conducive to distortion: Garcetti v. Ceballos.34See generally Garcetti v. Ceballos, 547 U.S. 410 (2006). Garcetti established that public employees receive no First Amendment protection against termination or other job-related penalties for speech that they convey while doing their jobs. Garcetti relies at least partly on a government speech rationale, characterizing public employee work product speech as speech that “the employer itself has commissioned or created.”35Id. at 422. Indeed, to support this point, the Garcetti Court cites Rosenberger’s description of Rust’s holding. Id. (citing Rosenberger, 515 U.S. at 833). See also, e.g., Norton, supra note 15, at 20 (critiquing Garcetti as an outgrowth of an overly expansive government speech doctrine). The assumption that government employees invariably convey a government-crafted message when they speak runs headlong into distortion concerns in the many cases in which employees are hired to provide professional judgment and expertise.

The Supreme Court regularly parries concerns about abuses of the doctrine by invoking political accountability. In Shurtleff v. City of Boston, for example, the Court reiterated its view that “[t]he Constitution . . . relies first and foremost on the ballot box, not on rules against viewpoint discrimination, to check the government when it speaks.”36Shurtleff v. City of Boston, 142 S. Ct. 1538, 1589 (2022). In Walker, the Court similarly argued that “the democratic electoral process . . . provides a check on government speech,” and added that such speech itself is an expression of voters’ wishes: “members of the public . . . influence the choices of a government that, through words and deeds, will reflect its electoral mandate.”37Walker v. Tex. Div., Sons of Confederate Veterans, Inc., 576 U.S. 200, 207 (2015).

The Garcetti Court also suggested that electoral accountability will yield legislation to protect public employee speech that is in the public interest. Writing for the Garcetti majority, Justice Kennedy cited the existence of a “powerful network of legislative enactments—such as whistle-blower protection laws and labor codes—available to those who seek to expose wrongdoing.”38Garcetti, 547 U.S. at 425. See also Heidi Kitrosser, On Public Employees and Judicial Buck-Passing: The Respective Roles of Statutory and Constitutional Protections for Government Whistleblowers, 94 Notre Dame L. Rev. 1699, 1708–10 (2019) [hereinafter Kitrosser, Judicial Buck-Passing] (criticizing this statement by the Garcetti Court for, among other reasons, overstating the depth and breadth of statutory whistleblower protections). This reasoning is similar to that invoked by the Court in 1983’s Bush v. Lucas.39Bush v. Lucas, 462 U.S. 367, 387 (1983). The Lucas Court held that most First Amendment damages claims brought by federal employees against their employers are precluded by federal statutory civil service protection laws,40Id. at 368. even as the Court “assumed, arguendo, that the [statutory] remedies . . . were not ‘as effective as an individual damages remedy.’ ”41Kitrosser, Judicial Buck-Passing, supra note 38, at 1706 (quoting Lucas, 462 U.S. at 372). The Court reasoned that Congress has ample incentive to protect public employee speech, particularly whistleblowing, given Congress’s “special interest in informing itself about the efficiency and morale of the Executive Branch.”42Lucas, 462 U.S. at 389.

B. Unitary Executive Theory

At first blush, UE theory has little in common with government speech doctrine; the former is an argument about government structure—specifically, the separation of powers—and pertains only to the federal government. Unity’s core assertion is that the president must control all discretionary activity in the federal executive branch, at minimum by having the power to remove anyone whose job entails such activity. The theory is grounded partly in interpretations of Article II’s text and history.

Yet UE theory shares important features with government speech doctrine. Most importantly, unity threatens substantive accountability even as its proponents justify it largely by reference to formal accountability. As with government speech doctrine, distortion is the main means by which UE theory can undermine substantive accountability.

A 1988 memorandum opinion by the Justice Department’s Office of Legal Counsel (“OLC”) illustrates how UE theory can enable political control of ostensibly non-political, even highly technical, communications.43This discussion of the OLC memo, including citations, is taken from Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1488. In that memo, the OLC took the position that Congress could not constitutionally require the Director of the Centers for Disease Control (“CDC”) to mail “AIDS information fliers” to the public “without necessary clearance” by the president.44Charles J. Cooper, Statute Limiting the President’s Authority to Supervise the Director of the Centers for Disease Control in the Distribution of an AIDS Pamphlet, in Opinions of the Office of Legal Counsel of the United States Department of Justice: Consisting of Selected Memorandum Opinions Advising the President of the United States, the Attorney General and Other Officers of the Federal Government in Relation to Their Official Duties 47, 47 (1988). “It matters not at all,” the OLC asserted, “that the information in the AIDS fliers may be highly scientific in nature. The president’s supervisory authority encompasses all of the activities of his executive branch subordinates, whether those activities be technical or non-technical in nature.”45Id. at 57. This “necessarily follows,” the opinion continues, “from the fact that the Constitution vests ‘[t]he entire executive Power,’ without subject matter limitation, in the President.” Id. The OLC further stressed the categorical nature of the president’s authority by quoting a 1982 OLC opinion to the effect that the president’s “ultimate control over subordinate officials . . . includes the right to supervise and review [their] work . . . including reports issued either to the public or to Congress.”46Id. (emphasis omitted).

As we have seen, unity’s proponents deem it essential to preserve accountability,47See, e.g., Calabresi, supra note 3, at 35–37, 45, 59, 65–66; Lessig & Sunstein, supra note 3, 97–99; Prakash, supra note 3, 998–99, 1012–15. See also Kitrosser, The Accountable Executive, supra note 3, 1747–48 nn.28–32 and accompanying text (summarizing accountability-based unity arguments and their sources). despite its negative effects on substantive accountability. Recall the major features of the accountability-based argument for unity. First, proponents observe that the president is the only elected member of the federal executive branch and contrast him with unelected bureaucrats.48See, e.g., Kitrosser, The Accountable Executive, supra note 3, at 1747 (citing Lessig & Sunstein, supra note 3, at 97–99). They also deem him more politically accountable than members of Congress, given his high visibility and the fact that he alone is subject to election by the entire nation through the Electoral College.49See, e.g., Kitrosser, The Accountable Executive, supra note 3, at 1748 (citing Calabresi, supra note 3, at 58–70; Prakash, supra note 3, at 993, 1012–15). As such, it is only when the president “controls all law execution in the United States [that] the national electorate has a clear object of blame or reward for such activity.”50Kitrosser, The Accountable Executive, supra note 3, at 1747 (citing Calabresi, supra note 3, 35–37, 59, 65–66).

The accountability rationale for unity is not extolled only by sympathetic scholars and executive branch lawyers. It has also been central to unity-friendly judicial precedent since the 1926 case of Myers v. United States.51The summary of Myers that follows, including citations, is drawn largely from a more detailed summary in Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1476–78. In Myers, the Court invalidated legislation that required the president to obtain Senate approval before removing a postmaster whom the president had appointed with the Senate’s advice and consent.52Myers v. United States, 272 U.S. 52, 176 (1926). Fittingly, the Court’s opinion was written by Chief Justice Taft, the only Justice in history to have previously served as U.S. President.53See Robert Post, Tension in the Unitary Executive: How Taft Constructed the Epochal Opinion of Myers v. United States, 45 J. Sup. Ct. Hist. 167, 167 (2020) (noting that “Taft is the only person ever to have served as both president of the United States and as chief justice of the Supreme Court,” and that this “unique confluence of roles is evident in Myers”). Much of Taft’s analysis centered on the so-called “Decision of 1789,”54See Myers, 272 U.S. at 176. a lengthy debate in the First Congress on the president’s power to remove officers.55See id. at 146. Taft characterized the Decision partly as a referendum on the accountability rationale. Quoting James Madison in the 1789 Debate, Taft wrote:

If the President should possess alone the power of removal from office, those who are employed in the execution of the law will be in their proper situation, and the chain of dependence be preserved: the lowest officers, the middle grade, and the highest will depend, as they ought, on the President, and the President on the community.56Id. at 131.

Taft also stressed the relative depth of presidential accountability: “the President, elected by all the people, is rather more representative of them all than are the members of either body of the Legislature, whose constituencies are local and not country wide.”57Id. at 123.

More than seven decades would pass before unity arguments would again be received so enthusiastically by the Supreme Court. In the interim, the Court decided a series of cases in which it upheld statutory restrictions on removal, distinguishing each from the provision reviewed in Myers and thus effectively narrowing Myers’ reach.58Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1478–79 (citing generally Humphrey’s Ex’r v. United States, 295 U.S. 602 (1935), Bowsher v. Synar, 478 U.S. 714 (1986); Morrison v. Olson, 487 U.S. 654 (1988)). In Humphrey’s Executor v. United States, decided just nine years after Myers, the Court deemed Myers’ holding limited to “purely executive officers.”59Humphrey’s Ex’r, 295 U.S. at 631–32. See also Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479 n. 34 (“More pointedly, Justice Sutherland specified that any aspects of Justice Taft’s lengthy exposition in Myers going beyond that core point are mere dicta. Sutherland also declared that ‘[i]n so far as’ any statements in Justice Taft’s opinion in Myers ‘are out of harmony’ with those expressed in Humphrey’s Executor, the former ‘are disapproved.’ ”) (citing Humphrey’s Ex’r, 295 U.S. at 626). In two 1980s cases—Bowsher v. Synar60Bowsher, 478 U.S. at 724–25. and Morrison v. Olsen61Morrison, 487 U.S. at 686–90 (1988).—the Court characterized Myers as a directive against Congress reserving the removal power for itself; Myers did not categorically bar other limits, such as for-cause requirements, on the president’s power to remove even purely executive officers.62Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479 (citing Morrison, 487 U.S. at 686, 689). Chief Justice Rehnquist, writing for the Morrison Court, explained that the validity of a removal restriction turns on a flexible, functional question: whether the restriction is “of such a nature that [it impedes] the President’s ability to perform his constitutional duty.”63Morrison, 478 U.S. at 691 (cited in Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479).

As the lone dissenter in Morrison, Justice Scalia penned an opinion that has since become a classic in the UE theory canon and that presaged the Roberts Court’s warm embrace of unity.64See Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1480 (citing Ganesh Sitaraman, The Political Economy of the Removal Power, 134 Harv. L. Rev. 352, 380 (2020); Amanda Hollis-Brusky, Helping Ideas Have Consequences: Political and Intellectual Investment in the Unitary Executive Theory, 1981–2000, 89 Denv. U. L. Rev. 197, 209–10 (2011)). Among other things, Scalia invoked accountability.65Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479–80 (citing Morrison, 487 U.S. at 729 (Scalia, J., dissenting)). The president, he observed, “is directly dependent on the people.” Indeed, the Constitution’s founders touted the relative accountability of a single president as opposed to a multi-member body: “since there is only one President . . . [t]he people know whom to blame” when something goes awry.66Morrison, 487 U.S. at 729 (Scalia, J., dissenting). In the case of prosecutors, an unfettered presidential removal power ensures that “when crimes are not investigated and prosecuted fairly . . . the President pays the cost in political damage to his administration.”67Id. at 728–29.

Beginning in 2010, the Roberts Court retreated from the functional approach that the Supreme Court had embraced for most of the twentieth century.68See Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1480 (“Since 2010, when Chief Justice Roberts wrote for the majority in Free Enterprise Fund v. Public Company Accounting Oversight Board (PCAOB), the Roberts Court has distanced itself from the deference exhibited in Humphrey’s Executor and Morrison.”) (citing Free Enter. Fund v. Pub. Co. Acct. Oversight Bd., 561 U.S. 477, 483 (2010)). As of now, the Court has not explicitly overruled Humphreys Executor, Bowsher, or Morrison. It has, however, reframed them, suggesting that they stand only for discrete “exceptions to the President’s unrestricted removal power.”69Seila Law LLC v. Consumer Fin. Prot. Bureau, 591 U.S. 197, 204–06, 228–30 (2020). See also Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1481–82 (discussing this line of reasoning in both Seila and PCAOB). Accordingly, the Roberts Court has struck down several statutes imposing limits on this power, including a law that permitted the president to remove the director of the Consumer Financial Protection Bureau only for “inefficiency, neglect of duty, or malfeasance in office.”70Seila, 591 U.S. at 206–07.

Like the Taft Court, the Roberts Court identifies accountability as a central reason why the Constitution demands a unitary executive. Indeed, in every case in which it has rejected presidential removal restrictions, the Roberts Court has followed Taft’s lead by quoting James Madison’s 1789 statement that “the lowest officers, the middle grade, and the highest,” ought to depend “on the President, and the President on the community.”711 Annals of Cong. 518 (1789) (Joseph Gales ed., 1834) (J. Madison) (quoted in Seila, 591 U.S. at 223–25; Collins v. Yellen, 594 U.S. 220, 251–52 (2021); Free Enter. Fund, 561 U.S. at 498); see also Myers v. United States, 272 U.S. 52, 171 (1926) (quoting Taft’s use of same quote in Myers); Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1482 n.66 and accompanying text.

To be sure, unity’s proponents do not rely solely on accountability; they also invoke arguments from constitutional history and text. Elsewhere, I have recounted and built on some of the major rejoinders to these text and history-based arguments.72See, e.g., Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1482–83; Kitrosser, Interpretive Modesty, supra note 5, at 507–10. Although my focus in this Essay is on accountability, it is worth noting that unity’s text and history-based arguments—and their failings—are themselves intertwined with unity’s enervated vision of accountability. This is true, for example, of unity proponents’ over-reading of founding-era arguments linking constitutional and statutory provisions to accountability. Proponents tend to leap from highly case-specific founding era arguments to a broad, acontextual constitutional unity directive, a move enabled by their fixation on formal, rather than substantive accountability.73See, e.g., Kitrosser, Interpretive Modesty, supra note 5, at 512. This phenomenon is illustrated by unity proponents’ use of the founding era decision not to append an advisory council to the president. As I explained in a previous article:

[U]nity proponents cite founding fears that the President would hide behind his council, blaming it for his own poor decisions and thus defeating accountability. From this, unity proponents leap to the conclusion that the founders wanted the President to fully control all discretionary executive decisions and executive officers. Yet this conclusion massively oversimplifies the nature of the council debate. Council opponents focused on features specific to the proposed council, including its small size and its ability to collude with the President in relative secrecy. Notably, they also feared that the President and his council would seek to appoint executive branch officers who “possess[ed] the necessary insignificance and pliancy to render them the obsequious instruments of [the President’s] pleasure.” At minimum, the council debate, centering as it did on the specific features of the proposed council, simply did not address whether the executive branch must in all respects be unitary. If anything, the accountability-related concerns articulated in the debate suggest that the founders feared full presidential control over executive branch decision making and officers. Unfettered control could, among other things, foster secretive collusions between the President and those in his thrall.74Kitrosser, Interpretive Modesty, supra note 5, at 512 (citing Kitrosser, Reclaiming Accountability, supra note 4, at 146, 152–55; The Federalist No. 76, at 458 (Alexander Hamilton) (Clinton Rossiter ed., 1961)).

III.  Contemporary Threats to Substantive Accountability

In Part III, I present three sets of examples that span the period from the post-Watergate years to the earliest days of the second Trump Administration. In Section III.A, I look at the development of UE theory in the Department of Justice (“DOJ”) during the late 1970s and 1980s and its use by the Department to resist post-Watergate ethics and oversight measures. I observe that Donald Trump has picked up this mantle in more recent years, including through his resistance to oversight by Inspectors General. In Section III.B, I look at the impact of both unity and government speech doctrine on the civil service more broadly. In Section III.B.1, I discuss the relationship between the federal civil service and UE theory. I focus especially on “Schedule F,” newly reinstated through executive order on the first day of the second Trump Administration and aimed at replacing vast swaths of the civil service with political appointees. In Section III.B.2, I summarize two key reasons, including Garcetti’s impact, for the enervated state of first amendment protections for federal civil servants. In Section III.B.3, I cite several examples—including a recent spate of state laws regulating the classroom speech of public school teachers and professors—of government speech doctrine’s effect on state and local employees.

A. Unitary Executive Theory and Federal Investigations

Investigations that could implicate the president or his allies are classic locations for dispute over the constitutionality and wisdom of restrictions on the president’s ability to fire personnel or interfere with their work. Morrison v. Olson itself involved a challenge to the independent counsel provisions of the 1978 Ethics in Government Act. Enacted in the wake of Watergate, the Act was an effort to confront public corruption, in part by creating an independent counsel (“IC”) with some degree of distance from presidential control. The Act’s IC provisions were responsive to fears that presidents would, as Richard Nixon had done, interfere with Justice Department investigations in which they could be implicated. Olson challenged these provisions partly on the basis that the IC was incompatible with a unitary executive because the IC did not serve at the president’s pleasure. Instead, the IC could be terminated only by the Attorney General (“AG”), who herself is subject to at-will dismissal by the president. The AG could fire the IC “only for good cause, physical or mental disability . . . or any other condition that substantially impairs [the IC’s] performance of . . . [their] duties.”75Ethics in Government Act, 28 U.S.C. § 596(a)(1) (1978).

The majority and dissenting opinions in Morrison reflected two very different ideas about unity and accountability. To the majority, written by Justice Rehnquist, the judicial mission was limited and functional: its role was not “to define rigid categories”76Morrison v. Olson, 487 U.S. 654, 689 (1988). but to ensure that legislation does not “interfere impermissibly with [the president’s] constitutional obligation to ensure the faithful execution of the laws.”77Id. at 693. Among the factors that Rehnquist cited to explain why the removal restriction passed this practical assessment, it “was essential, in the view of Congress, to establish the necessary independence of the office,” an office that could be tasked with investigating the president or close advisors.78Id. To Justice Scalia, the lone dissenter, the president possessed all the executive power—a conclusion that he reached by interpreting Article II’s opening words, “[t]he executive Power shall be vested in a President of the United States,” to mean “all of the executive power”—and such power necessarily entails complete and indefeasible removal authority.79Id. at 705 (Scalia, J., dissenting). As for the risk that the president might abuse this power, Justice Scalia answered that “the primary check against prosecutorial abuse is a political one. The prosecutors who exercise this awesome discretion are selected and can be removed by a President, whom the people have trusted enough to elect.”80Id. at 728. Justice Scalia’s vision of accountability was so narrow that he treated the IC provisions, enacted by elected members of Congress and subject to presidential veto, as constitutionally intolerable because they might subject the president and their advisers to popular scrutiny. The provisions, Scalia said, “weaken[] the Presidency by reducing the zeal of his staff” and “enfeeble[] him more directly in his constant confrontations with Congress, by eroding his public support.”81Id. at 713.

Although functionalism—and substantive accountability—prevailed over formalism in Morrison, Justice Scalia’s views would eventually receive a much warmer reception in the Roberts Court. Within the executive branch, unitary executive theorists did not need to wait nearly so long to see their ideas put into practice. The Justice Department in the Reagan Administration was deeply entwined with the conservative legal movement,82See Deborah Pearlstein, The Democracy Effects of Legal Polarization: Movement Lawyering at the Dawn of the Unitary Executive, 2 J. Am. Const. Hist. 357, 365–67, 378 (2024); Sitaraman, supra note 64, at 377–78; Hollis-Brusky, supra note 64, at 202–03, 214–15; Steven M. Teles, Transformative Bureaucracy: Reagan’s Lawyers and the Dynamics of Political Investment, 23 Stud. Am. Pol. Dev. 61, 62–63, 66, 69–75, 79–80 (2009). and both the Department and the broader movement made the advancement of UE theory a priority.83See Pearlstein, supra note 82, at 366–67, 378; Sitaraman, supra note 64, at 377–80; Hollis-Brusky, supra note 64, at 205–06, 212–13. Conservative legal elites viewed unity as one means of reigning in the perceived liberalism of the administrative state, and were also drawn to it because Republicans at the time had better electoral chances with the presidency than in either house of Congress.84See Pearlstein, supra note 82, at 362 (citing Jack Goldsmith, The Accountable Presidency, The New Republic, (Jan. 31, 2010), https://newrepublic.com/article/72810/the-accountable-presidency [https://perma.cc/H2SA-3SLW] (quoting Jeffrey Hart, The Presidency: Shifting Conservative Perspectives?, 26 Nat’l Rev. 1351, 1353, 1355 (1974))); see also Charlie Savage, Takeover: The Return of the Imperial Presidency and the Subversion of American Democracy 44–46 (2007); see generally Charles Fried, Order and Law: Arguing the Reagan Revolution—A Firsthand Account (1991).

Much of the pro-unity activity in the Reagan-era Justice Department was directed against post-Watergate legislation that imposed oversight measures on executive branch lawyers. Recounting these efforts, Deborah Pearlstein writes:

[T]he first sustained campaigns to apply unitary executive theory to the day-to-day workings of government began within the Department of Justice, and some of the most important battles focused on just [the] claim . . . that an appropriate understanding of the executive power required recognizing constitutional limits on the ability of Congress and the federal courts to engage in professional oversight of Justice Department lawyers. On some occasions quite visibly, on others largely in secret, movement lawyers deployed unitary executive arguments to challenge or block three of the major tools that post-Watergate reformers had pursued to ensure government attorneys would worry more about being held accountable for their misconduct: (1) strengthened rules of professional ethics; (2) an Office of Professional Responsibility inside the Department of Justice to investigate ethics complaints against government attorneys; and (3) independent inspectors general to investigate allegations that government officials were responsible for waste, fraud, or abuse.85Pearlstein, supra note 82, at 370.

Unity proponents also made their cases—for UE theory generally and against independent oversight of federal officials in particular—to the practicing bar, to legal academics, and to law students.86See id., at 365–67, 378; Hollis-Brusky, supra note 64, at 205–06, 212–13 Sitaraman, supra note 64, at 377–80; Teles, supra note 82, at 62–63, 66, 69–75, 79–80. These efforts contributed to unity’s eventual reversal of fortune in the courts. They also helped to shift the norms of acceptable conduct among government officials, both because they “weakened internal ethics checks” and created a permission structure for ethical breaches.87Id. at 359, 370. Indeed, the repeated refrain that oversight legislation weakens the president and affronts voters lends itself to arguments that even highly credible and serious misconduct allegations are mere “partisan attack[s].”88Id. at 359.

Although UE theory has a decided partisan valence historically, its allure as a means to push back against oversight has not been lost on Democrats when they occupy the oval office. Although the DOJ Inspector General—against which movement lawyers fought—was not established until 1988,89Id. at 377–78. the initial Inspectors General Act was enacted in 1978, and then-President Jimmy Carter’s OLC objected to two aspects of the law as inconsistent with unitary presidential control of subordinates.90See generally John M. Harmon, Assistant Att’y Gen., Off. Legal Couns., Memorandum Opinion for the Attorney General: Inspector General Legislation (Feb. 21, 1977). John Harmon, Carter’s Acting Assistant AG for the OLC, objected in a memorandum to the Act’s removal provision, which gave the president at-will removal power over Inspectors General (“IGs”) but required them to notify both Houses of Congress of their reasons for removal. Citing Myers, Harmon called this an “improper restriction on the President’s exclusive power to remove Presidentially appointed executive officers.”91Id. at 18. Harmon also objected to the IG’s statutory “obligation to keep Congress fully and currently informed” and the related “requirement that [the IG] provide any additional information or documents requested by Congress . . . without executive branch clearance or approval.”92Id. at 17. In Harmon’s view, these informing rules interfere with the president’s “general administrative control over those executing the laws,” which “includes the right to coordinate and supervise all replies and comments from the executive branch to Congress.”93Id.

Finally, and unsurprisingly, Donald Trump has been especially brazen in resisting accountability measures and in invoking unity to do so. Examples to this effect include his dismissals of Inspectors General during his first administration and in the first week of his second administration. During his first administration, Trump notoriously fired several Inspectors General who investigated controversies ranging from the administration’s handling of the Covid-19 pandemic to the call between Trump and the Ukrainian president that led to Trump’s first impeachment.94See, e.g., Bob Bauer & Jack Goldsmith, Inspector General Reform on the Table, Lawfare (Oct. 5, 2021, 3:23 PM), https://www.lawfareblog.com/inspector-general-reform-table [https://perma.cc/9KCR-PQ79]; Melissa Quinn, The Internal Watchdogs Trump Has Fired or Replaced, CBS News (May 19, 2020, 11:43 AM), https://www.cbsnews.com/news/trump-inspectors-general-internal-watchdogs-fired-list [https://perma.cc/4Y4U-TZ89]; Michael C. Dorf, Inspector General Firings Highlight the Danger of the Unitary Executive Theory, Dorf On L. (May 18, 2020), http://www.dorfonlaw.org/2020/05/inspector-general-firings-highlight.html [https://perma.cc/KAY3-QNBL]. Trump made clear his view that UE theory empowered him to take such actions.95Steven D. Schwinn, Trump’s Tears Against Inspectors General Tell Us It’s Time to Abandon the Unitary Executive Theory, Jurist (Apr. 13, 2020, 6:03 PM), https://www.jurist.org/commentary/2020/04/steven-schwinn-trumps-tears [https://perma.cc/6YVP-HXCD]. As of this writing, less than one week into Trump’s second administration, he has already fired more than a dozen Inspectors General in the course of a single Friday evening. The firings eschewed the applicable statutory requirement that Congress receive thirty days’ notice of any removal including a “substantive rationale” with “detailed and case-specific reasons” for removal.96See David Nakamura, Lisa Rein & Matt Viser, Trump Defends Ousting at Least 15 Independent Inspectors General in Late-Night Purge, Wash. Post (Jan. 25, 2025), https://www.washingtonpost.com/politics/2025/01/24/trump-fire-inspectors-general-federal-agencies [https://web.archive.org/web/20250225161555/https://www.washingtonpost.com/politics/2025/01/24/trump-fire-inspectors-general-federal-agencies]; Megan Messerly, Josh Gerstein, Kyle Cheney & Nahal Toosi, Trump Fires Independent Inspectors General in Friday Night Purge, Politico (Jan. 25, 2025, 9:20 PM), https://www.politico.com/news/2025/01/25/donald-trump-inspectors-general-firing-00200611 [https://web.archive.org/web/20250127090247/https://www.politico.com/news/2025/01/25/donald-trump-inspectors-general-firing-00200611].

B. Broader Attacks on the Civil Service: UE Theory and Government Speech Doctrine at Work

  1. Unitary Executive Theory

UE theory also threatens the federal civil service on the whole, including disciplinary experts such as scientists, economists, and public health researchers. Unity can undermine their ability to disseminate competent, good-faith information and analyses that an administration finds politically inconvenient. Such impacts have both short-term and long-term aspects. In the short term, presidents and their political subordinates may invoke unity to block or manipulate certain communications. In the longer run, they may nip such communications in the bud more seamlessly by thinning out the merit-based civil service in favor of a largely political workforce.

As for short-term impacts, there are two major categories of valuable civil service communications at risk. The first is whistleblowing regarding wrongdoing in federal agencies. Currently, civil service laws protect federal employees who blow the whistle on bad acts including illegality, waste, and abuse.97Jason Zuckerman & Eric Bachman, The Whistleblower Protection Act: Empowering Federal Employees to Root Out Waste, Fraud and Abuse 2–3 (2017). These protections would be compromised should an administration assert, and even more so should courts agree, that such legislation cannot constitutionally prevent the president from removing, at will, anyone who exercises discretionary executive power. As I elaborate in Part IV, it is by no means a foregone conclusion that courts would allow presidents to bypass civil service protections on unitary executive grounds. It is possible, however, that courts would indeed extend the logic of the Roberts Court removal cases so far. Courts might also draw to the same effect on the Supreme Court’s recent decision in Lucia v. Securities and Exchange Commission in which the Court expanded the definition of “officers” who constitutionally cannot be part of the civil service.98Lucia v. SEC, 585 U.S. 237, 237–38 (2018).

UE theory can also be invoked to stifle civil servants who seek to convey information or analysis in the ordinary course of doing their jobs. Recall, for example, the OLC’s 1988 opinion to the effect that Congress may not require executive branch personnel to distribute even highly technical information without a chance for presidential intervention.99See supra text accompanying notes 44–46. Although the CDC Directorship is not a civil service position, see Barry Sullivan, Lessons of the Plague Years, 54 Loyola U. Chi. L.J. 15, 59 (2022) (noting that the CDC director is a political appointee). The same rationale can be applied to civil servants whose duties include generating or disseminating information or who testify before Congress. Furthermore, to the extent that some such speech falls within the terms of federal whistleblower protection laws,100For example, a government auditor or investigator might make a report in the course of doing their job that also constitutes whistleblowing under the Act. Or scientists or public health experts may discover, in the course of doing job-related research, events that constitute “a substantial and specific danger to public health or safety.” 5 U.S.C. § 2302(b)(8) (listing statutorily protected whistleblower disclosures, including “a substantial and specific danger to public health or safety”). it is vulnerable to the same unity-based threats as that faced by federal whistleblowers more broadly.

Unity can enable much more than the blocking of isolated pieces of information and analysis. It can have a deep, long-range impact by thinning out the ranks of the civil service, enabling the president to fill and potentially fire large swaths of the federal workforce previously designated as nonpartisan merit hires. As noted, it is by no means inevitable that courts would sign off on such sweeping changes. Existing case law does, however, open the door to such a possibility, and at minimum, it can embolden presidents to test the boundaries of precedent by trying to initiate such action.

Donald Trump seems determined to push the limits of a president’s power to politicize the federal workforce. On the first day of his new administration, January 20, 2025, he issued an executive order (“EO”) reinstating the so-called “Schedule F” order that he had issued in the waning days of his first administration.101The new class of political appointments is referred to as “policy / career” appointments, whereas Trump’s earlier EO called them “Schedule F” appointments. See Exec. Order No. 14,171 § 3(a), 90 Fed. Reg. 8625 (Jan. 20, 2025). See also, e.g., Nick Bednar, President Trump and the Civil Service: Day 1, Lawfare (Jan. 23, 2025, 1:32 PM), https://www.lawfaremedia.org/article/president-trump-and-the-civil-service–day-1 [https://perma.cc/U4QJ-RZWA]; Drew Friedman, Trump Revives Executive Order Aiming to Strip Some Federal Employees of Civil Service Protections, Fed. News Network (Jan. 21, 2025, 6:59 PM), https://federalnewsnetwork.com/workforce/2025/01/trump-revives-executive-order-aiming-to-strip-some-federal-employees-of-civil-service-protections [https://perma.cc/Q7VM-DDB3]. The EO authorizes the transition of potentially tens of thousands of career positions throughout the federal workforce into political appointments.102See, e.g., Friedman, supra note 101. The EO expansively defines the jobs that qualify as “policy/career” appointments that can be removed from the civil service. Exec. Order No. 14,171 § 2–3 (incorporating definition from Schedule F with some amendments); Exec. Order 13,957 85 Fed. Reg. 67631 § 5(c) (Oct. 21, 2020) (incorporated into new EO). See also, e.g., Bednar, supra note 101. In its purpose section and even its title, the EO projects confidence that it is permitted, even demanded, by unity and accountability.103See, e.g., Bednar, supra note 101 (“The executive order reinstating Schedule F begins by echoing unitary executive theory.”). The EO is entitled “Restoring Accountability to Policy-Influencing Positions Within the Federal Workforce,” and it asserts that the president has “sole and exclusive authority over the executive branch.” It adds that any power held by federal employees “is delegated by the President,” and that employees “must be accountable to the President, who is the only member of the executive branch, other than the Vice President, elected and directly accountable to the American people.”104Exec. Order No. 14,171 § 1. Fittingly, the idea behind Schedule F during Trump’s first administration originated in a memorandum suggesting that Trump “[e]xplore the ‘Constitutional Option’ for firing federal employees,”105Donald P. Moynihan, Public Management for Populists: Trump’s Schedule F Executive Order and the Future of the Civil Service, 82 Pub. Admin. Rev. 174, 175 (2021) (citing a 2017 Memorandum from James Sherk to White House Domestic Policy Council). and that civil service protections might be unconstitutional.106Id.

There is also an obvious kinship between the EO’s reliance on the notion of presidential accountability and Trump’s longstanding rhetoric about the abuses of the so-called “deep state.”107See, e.g., id. at 175; James Oliphant & Steve Holland, How Trump Plans to Cement Control of Government by Dismantling the ‘Deep State,’ Reuters (Jan. 18, 2025, 4:56 PM), https://www.reuters.com/world/us/how-trump-plans-cement-control-government-by-dismantling-deep-state-2025-01-18 [https://perma.cc/N8B5-MHKJ]; Jeannie Suk Gersen, How Much of the Government Can Donald Trump Dismantle?, New Yorker (Jan. 16, 2025), https://www.newyorker.com/news/the-lede/how-much-of-the-government-can-donald-trump-dismantle [https://perma.cc/TCX5-QP8W]. As Donald Moynihan writes, “Trump was not just antagonistic toward the career public service: this hostility was central to his political identity. He had openly campaigned against the ‘deep state.’ ”108Moynihan, supra note 105, at 175. The EO’s own language frames it as a reaction to “numerous and well-documented cases of career Federal employees resisting and undermining the policies and directives of their executive leadership,” and as a “restor[ation of] accountability to the career civil service.”109Exec. Order No. 14,171 § 1.

  1. Federal Employees and the First Amendment

Federal civil service laws are especially crucial to protect accountability-enhancing speech because federal employees lack robust First Amendment protections. On the rare occasions that an employee’s free speech lawsuit proceeds to the merits, it confronts the Garcetti hurdle. Should a court conclude that the employee’s speech either occurred outside of the course of their employment or warrants an exception from Garcetti, the employee still must overcome a balancing test that defers substantially to employers’ rationales.110Turner v. U.S. Agency for Global Media is a rare example of a First Amendment case in which a federal employee prevailed on the merits. See Turner v. U.S. Agency for Glob. Media, 502 F. Supp. 3d 333 (D.D.C. 2020). Judge Howell found that the federal civil service laws did not preclude those aspects of the complaint that challenged structural changes to the agency as opposed to individual employee disciplinary actions. Id. at 364–70. Judge Howell also found that the type of employment at issue—journalism—fit within an exception to Garcetti. Id. at 374–75. Finally, because the structural changes at issue imposed ex ante limits on a wide swath of communications rather than targeted, post hoc discipline, Judge Howell applied a standard more deferential than the balancing test ordinarily applied in employee speech cases. Id. at 377.

As noted earlier, the reason why federal employees are rarely able to invoke the First Amendment to sue their employers directly is because the Supreme Court held in 1983’s Bush v. Lucas111Bush v. Lucas, 462 U.S. 367, 389–90 (1983). that the federal civil service laws preclude such suits.112Id. at 368. The Lucas Court expressed confidence that Congress would protect whistleblowers.113See id. at 387; supra note 42 and accompanying text. It did not, apparently, anticipate a future in which whistleblower protection laws might themselves be overtaken by aggressive interpretations of UE theory. Even on their own terms, such laws have not reliably served as the “powerful network” that the Garcetti Court assured would protect whistleblowers in lieu of robust first amendment protections.114See Kitrosser, Judicial Buck-Passing, supra note 38, at 1700 and accompanying text. For example, at the time that the Court decided Garcetti, federal whistleblower protection law contained the same hole that

Garcetti created in constitutional coverage—namely, it did not encompass speech made as part of one’s job.115See id. at 1709–10.

  1. The First Amendment and State and Local Employees

Although state and local employees can invoke their First Amendment rights directly, those rights have been narrowed considerably by courts, particularly through the government speech doctrine and Garcetti. Furthermore, as we have seen, the notion underlying a broad government speech doctrine—that public employee speech is rightly, even necessarily subject to political control—also has substantial political currency. That political appeal—coupled with legislators and executive officers feeling emboldened by the state of the case law—have helped give rise to a number of restrictive policies, ranging from sweeping public employee gag rules to legislation micro-managing the classroom speech of public school teachers. In this Section, I discuss three examples of such measures: post-hoc discipline for employee speech, prior restraints on employee communications with the media, and laws targeting public school educators in particular.

First, Garcetti and some lower court interpretations of it negatively impact substantive accountability by opening the door to retaliation for two categories of speech: employee reports of wrongdoing and employee communications on matters of public interest in the course of doing their jobs. The latter requires little explanation, as Garcetti explicitly permits discipline for speech that constitutes work product, however truthfully and competently performed. The former also follows plainly from Garcetti to the extent that catching and reporting on internal wrongdoing is a part of one’s job. Furthermore, although lower court interpretations of Garcetti are not monolithic, some define job duty speech broadly enough to capture a good deal of such whistleblowing. For example, some courts treat the fact that an employee reported wrongdoing through their “chain of command,” or through some other avenue that lacks a “civilian analogue,” as evidence that the report fell within their job duties.116See Heidi Kitrosser, The Special Value of Public Employee Speech, 2015 Sup. Ct. Rev. 301, 320–23 (2016) (and cases cited therein) [hereinafter Kitrosser, Special Value of Public Employee Speech]; Frank D. LoMonte, Putting the ‘Public’ Back into Public Employment: A Roadmap for Challenging Prior Restraints that Prohibit Government Employees from Speaking to the News Media, 68 U. Kan. L. Rev. 1, 23–24 (2019) (and cases cited therein). Some courts accord the same meaning to the fact that an employee’s speech is directed toward resolving problems that interfere with their duties.117See Kitrosser, Special Value of Public Employee Speech, supra note 116, at 317–19 (and cases cited therein). Furthermore, despite contrary language in a 2014 Supreme Court case,118Lane v. Franks, 573 U.S. 228, 240 (2014) (“[T]he mere fact that a citizen’s speech concerns information acquired by virtue of his public employment does not transform that speech into employee—rather than citizen—speech. The critical question under Garcetti is whether the speech at issue itself is ordinarily within the scope of an employee’s duties, not whether it merely concerns those duties.”). some lower courts have treated the fact that an employee learned about information on the job as a factor that weighs against First Amendment coverage should they face discipline for communicating it.119See Kitrosser, Special Value of Public Employee Speech, supra note 116, at 315–17 (and cases cited therein).

Second, although there is a sound basis to conclude that Garcetti does not license agencies to impose sweeping prior restraints on employee speech,120See, e.g., LoMonte, supra note 116, at 13–19, 25–32 (explaining that prior restraints on employee speech are properly analyzed under United States v. NTEU (1995) rather than Garcetti and that most cannot survive review under NTEU); Univ. of Fla. Brechner Ctr. for Freedom of Info., Protecting Sources and Whistleblowers: The First Amendment and Public Employees’ Right to Speak to the Media 4–9 (2019). and some courts indeed have struck down such policies,121LoMonte, supra note 116, at 29–32; Brechner Ctr., supra note 120, at 5–9. there remain scores of federal, state, and local directives that bar employees across multiple agencies from speaking to reporters without authorization. A 2019 report by the Brechner Center for Freedom of Information at the University of Florida found “dozens of examples of policies that either forbid government employees from speaking to journalists at all, or require that they obtain a supervisor’s permission before doing so.”122Brechner Ctr., supra note 120, at 3. See also id. at 7–8, 10–12; LoMonte, supra note 116, at 36 (citing Brechner Center’s research). Such policies persist in part because “Garcetti fueled a mindset among government managers and their counsel that the courts would view restrictions on employee speech deferentially.”123LoMonte, supra note 116, at 26–27. The political currency of the notion underlying Garcetti and government speech doctrine more broadly—that agency employees can be made to speak in one voice, dictated by political leadership—plays an important role as well.

Third, over the past several years, public school teachers—college and university professors as well as K12 instructors—have faced a host of state laws barring them from conveying certain ideas about race or gender in the classroom.124See Kitrosser, The Government Speech Doctrine Goes to School, supra note 21 (citing and discussing these laws). State and public school board defendants have leaned heavily on the government speech doctrine to justify the laws. To defend its restrictions on the instructional speech of public college professors, for example, the state of Florida asserted that the First Amendment “categorically does not apply” because such communications constitute “heartland government speech.”125Defendants’ Response in Opposition to Plaintiffs’ Motion for a Preliminary Injunction at 10, 15, Pernell v. Fla. Bd. of Governors, No. 22-cv-00304 (N.D. Fla. Sept. 22, 2022), 2023 WL 18357418. Defendants have also invoked accountability to bolster their government speech arguments. In the Florida litigation, for example, the state argued that anyone displeased with the restrictions on professorial speech could seek recourse “[at] the ballot box.”126Id. at 10. The laws’ proponents similarly invoke political accountability in their appeals to the public. For example, Nate Hochman, writing in the Manhattan Institute’s City Journal, characterized critics as “suggest[ing] that public educators should be insulated from accountability and democratic oversight.”127Nate Hochman, Critical Race Theory and Academic Freedom, City J. (June 17, 2021), https://www.city-journal.org/article/critical-race-theory-and-academic-freedom [https://perma.cc/TRV9-B6DG]. Judicial responses to lawsuits challenging such restrictions have been mixed thus far. In cases involving college and university professors, courts have sided with plaintiffs, identifying an academic freedom exception to Garcetti that I discuss further in Part IV.128See, e.g., Kitrosser, The Government Speech Doctrine Goes to School, supra note 21, at IV.A.2. Courts have been less favorable to plaintiffs in the K–12 educational setting, concluding that primary and secondary school teachers are subject to Garcetti’s rule.129See, e.g., id. at IV.B.2. In the latter cases, however, plaintiffs have had some success in arguing that the laws are too vague to pass constitutional muster.130See, e.g., id. at IV.D.

IV. Some Kernels of Hope

       Although both UE theory and government speech doctrine have made substantial strides in the courts and the political branches, they are not invulnerable to limiting principles. Indeed, courts already have imposed or laid the groundwork for some boundaries on each doctrine’s reach. These aspects of precedent can, and should, be built on with substantive accountability among the lodestars in the process. I have explored these points in more detail elsewhere,131With respect to unitary executive theory, see Kitrosser, “A Government That Benefits From Expertise,” supra note 4, at Part III. With respect to government speech doctrine, see, e.g., Kitrosser, Distorting the Press, supra note 19, and Kitrosser, The Government Speech Doctrine Goes to School, supra note 21. and highlight a few aspects here.

       Turning first to UE theory, there are a few respects in which the current case law leaves the door open for some substantive accountability-based limits. For example, the Supreme Court has not, as of yet, weighed in on the constitutionality of civil service protections. Indeed, Chief Justice John Roberts, writing for the Court in a 2010 case, noted that “[n]othing in [its] opinion . . . should be read to cast doubt on the use of what is colloquially known as the civil service system within independent agencies.”132Free Enter. Fund v. Pub. Co. Acct. Oversight Bd., 561 U.S. 477, 507 (2010). Presumably, the PCAOB Court singled out independent agencies, rather than executive agencies, because the for-cause protections enjoyed by independent agency heads ensure that civil servants in such agencies will be separated from presidential control by at least two for-cause layers. This matters because the PCAOB Court invalidated a scheme that separated the heads of the Public Company Accountability Oversight Board from unfettered presidential removal through two layers of “for cause” removal—one between the President and the commissioners of the Securities and Exchange Commission (“SEC”), and one between the SEC commissioners and the PCAOB board members. Id. at 484, 486–87. Roberts observed that many civil servants “would not qualify as ‘Officers of the United States’ who ‘exercise significant authority pursuant to the laws of the United States;’ ” accordingly, they may not “be subject to the same sort of [presidential] control.”133Id. at 506 (quoting Buckley v. Valeo, 424 U.S. 1, 126 (1976)). In a future case, the Court could decide the question that it has left open and affirm the constitutionality validity of civil service tenure protections. To its reasoning about the limited scope of civil servants’ roles, the Court might add one about the work that they do perform. Namely, much of it entails the production of knowledge that reflects expertise and evidence-based analysis—for example, generating scientific reports or undertaking audits or inspections. Such work creates much of the factual backdrop against which the public and other branches can judge elected officials. By guarding against political interference with knowledge production, civil service protections support substantive accountability.

       Similar substantive-accountability based arguments can be made regarding other questions that the Supreme Court has not, to date, decided. This includes the constitutionality of the limited removal restrictions that currently apply to IGs and of the still more ambitious proposals to provide IGs with for-cause protection from removal.134See Kitrosser, “A Government That Benefits From Expertise,” supra note 4, at 1493–94 (explaining that there remains some opening in judicial precedent to justify such protections).

       As for government speech doctrine, the case law contains the seeds of an important limiting principle that I call the anti-distortion doctrine. It amounts to a wariness of conditions on state-sponsored knowledge production that would distort the nature of the sponsored programs or their communicative outputs. Perhaps the most overt use of the principle occurs in the 2001 case of Legal Services v. Velazquez.135See generally Legal Servs. Corp. v. Velazquez, 531 U.S. 533 (2001). The Velazquez Court invalidated a law restricting the types of arguments that congressionally funded legal services attorneys could make in litigation.136Id. at 537–39. The Court observed that Congress had funded the attorneys not to transmit government speech but rather to represent private clients.137Id. at 541–43, 547–48. Having done so, Congress could not limit the stock of arguments from which the attorneys could draw to advise and to advocate for their clients. Such a limit, said the Court, “distorts the legal system by altering the traditional role of the attorneys” as zealous advocates for their clients.138Id. at 544. Among the problems with such distortion is that it “prohibits speech and expression upon which courts must depend for the proper exercise of the judicial power.”139Id. at 545.

           

Garcetti itself contains some anti-distortion reasoning. The Garcetti Court left open the possibility of an exception for the expressive work of public school academics to the general rule that work product speech is unprotected. The Garcetti Court acknowledged that “[t]here is some argument that expression related to academic scholarship or classroom instruction implicates additional constitutional interests that are not fully accounted for by this Court’s customary employee-speech jurisprudence.”140Garcetti v. Ceballos, 547 U.S. 410, 425 (2006). An academic freedom exception is necessarily grounded in an anti-distortion principle, specifically in the notion that the state may not create or fund an institution of a type ordinarily characterized by academic freedom but then curtail that freedom.

CONCLUSION

       The doctrines explored here undermine substantive accountability in the name of accountability. Those attempting to limit the reach of UE theory and government speech doctrine, whether in the courts, the political branches, or the realm of public debate, must understand that their appeal lies partly in their proponents’ insistence that the doctrines do not undercut accountability but in fact protect accountability. Highlighting the errors of that claim and the danger that the doctrines pose is one small but necessary step in any efforts to staunch their forward march.

98 S. Cal. L. Rev. 1321

Download

*  William W. Gurley Professor, Northwestern University – Pritzker School of Law. I am very grateful to Erin Miller for inviting me to participate in the symposium for which I wrote this article, to Christina Koningisor for her wonderful turn as discussant for this piece, and to the student editors of the Southern California Law Review for their terrific work in organizing the symposium and editing this piece. I owe many thanks as well to Ronnell Anderson Jones and her colloquium students at the University of Utah Law School and to the faculty at the University of North Carolina Law School for inviting me to present this paper and for their thoughtful questions and comments.

Fear and Free Speech

INTRODUCTION

Fear changes lives. And for this reason, fear sometimes changes the law.

Because of fear’s debilitating effects, the law often forbids behavior that causes its targets to fear for their physical safety. Think of the laws that prohibit threats in order to free their targets “to go about their own lives.”1Kenneth L. Karst, Threats and Meanings: How the Facts Govern First Amendment Doctrine, 58 Stan. L. Rev. 1337, 1345 (2006). Think too of stalking laws that restrict fear-engendering behavior that “violates basic social norms of privacy and consent by persisting even in the face of a lack of consent.”2Genevieve Lakier & Evelyn Douek, The First Amendment Problem of Stalking: Counterman, Stevens, and the Limits of History and Tradition, 113 Calif. L. Rev. 143, 190 (2025).

A different type of fear—speakers’ fear of the government’s punishment—shapes pivotal First Amendment doctrine. The U.S. Supreme Court focused on this fear in Counterman v. Colorado when it held that the First Amendment requires the prosecutor in a “true threats” case to establish the speaker’s recklessness—that is, that the speaker “consciously disregarded a substantial risk” that his statements would make his target fear for her physical safety.3Counterman v. Colorado, 143 S. Ct. 2106, 2111–12 (2023). In the interest of full disclosure, I note that I served on the team representing the state of Colorado in Counterman before the U.S. Supreme Court. In so holding, the majority underscored that requiring such proof “reduc[es] an honest speaker’s fear that he may accidentally [or erroneously] incur liability,” thus “provid[ing] ‘breathing room’ for more valuable speech.”4Id. at 2115 (quoting United States v. Alvarez, 567 U.S. 709, 733 (2012) (Breyer, J., concurring)).

But this doctrinal choice is not without its costs, costs borne by the many targets of threats who lack access to evidence of the speaker’s interior mental state. This is the case, for example, of “[a] delusional speaker [who] may lack awareness of the threatening nature of her speech; a devious speaker [who] may strategically disclaim such awareness; and a lucky speaker [who] may leave behind no evidence of mental state for the government to use against her.”5Counterman, 143 S. Ct. at 2141 (Barrett, J., dissenting); see also Farmer v. Brennan, 511 U.S. 825, 836–37 (1994) (explaining that criminal recklessness requires a subjective showing that the defendant disregarded a risk of harm of which they were aware).

Free speech, of course, is not always free for everyone. A great deal of First Amendment law requires the targets of harmful speech to pay the price for the speaker’s freedom to speak and for the public’s freedom to receive that expression. To illustrate, the Supreme Court’s defamation jurisprudence sometimes requires innocent targets to bear the costs of reputation-damaging falsehoods when those targets cannot prove the speaker’s recklessness.6Gertz v. Robert Welch, Inc., 418 U.S. 323, 342–43 (1974). So too did a grieving father pay, with his pain, for the protected expression of speakers who exploited his loss to amplify their religious and political views.7Snyder v. Phelps, 562 U.S. 443, 460–61 (2011). Doctrinal choices are sometimes difficult because they require courts to pick between important, but incommensurable, values. When push comes to shove, First Amendment law generally chooses to protect speech on matters of public concern—the speech that lies at the core of the First Amendment—at the expense of its targets’ reputation and at the expense of its targets’ freedom from emotional cruelty.8E.g., N.Y. Times Co. v. Sullivan, 376 U.S. 254, 270 (1964) (emphasizing “the principle that debate on public issues should be uninhibited, robust, and wide-open, and that it may well include vehement, caustic, and sometimes unpleasantly sharp attacks on government and public officials”).

But different, and difficult, doctrinal choices arise when we recognize that speech interests sometimes lie on both sides of a First Amendment dispute, thus requiring courts to choose between important and commensurate values. As we will see, the fear induced by threats and by stalking can silence targets’ expression at least as directly and frequently as the fear induced by the prospect of the government’s punishment silences speakers’ expression. Consider the many targets who stop going out in public, stop using the phone, stop engaging online, stop making music and other forms of art, and stop participating in public life.9See infra notes 62–71 and accompanying text. Identifying free speech as a “preferred” constitutional value should thus require attention to the free speech costs of law’s failure to adequately protect the targets of threats and stalking.10See Frederick Schauer, Fear, Risk and the First Amendment: Unraveling the “Chilling Effect”, 58 B.U. L. Rev. 685, 732 (1978) (describing the First Amendment as a “preferred value”).

Yet an ostensibly speech-protective Supreme Court failed to acknowledge those costs in Counterman v. Colorado, a case that required it to define the contours of the category of threats unprotected by the First Amendment. “True threats” cause their targets to fear for their physical safety—and this fear, in turn, disrupts those targets’ lives.11See R.A.V. v. City of St. Paul, 505 U.S. 377, 388 (1992) (explaining that the law punishes threats to protect their targets “from the fear of violence, from the disruption that fear engenders, and from the possibility that the threatened violence will occur”). For these reasons, the Supreme Court has long treated true threats as among the handful of speech categories entirely unprotected by the First Amendment.12Id. Until Counterman, however, the Supreme Court had never directly engaged the question of how to determine when speech constitutes an unprotected threat. In the meantime, lower courts disagreed over whether the universe of unprotected threats should be determined through a subjective, or instead, an objective inquiry. Some took a subjective approach, requiring the prosecution (or, in a civil case, the plaintiff) to prove that the speaker intended to make his target fear for her physical safety, thus privileging defendants’ speech interests.13See, e.g., United States v. Bachmeier, 8 F.4th 1059, 1064 (9th Cir. 2021); United States v. Heineman, 767 F.3d 970, 975 (10th Cir. 2014). A majority of lower courts instead approached the problem from the target’s perspective, adopting an objective approach that asked whether the speaker’s statement would cause a reasonable person in the target’s position to fear for their physical safety, thus privileging targets’ interests—including, but not limited to, their speech interests.14See, e.g., United States v. Nishnianidze, 342 F.3d 6, 15 (1st Cir. 2003); Heller v. Bedford Cent. Sch. Dist., 665 F. App’x 49, 51 n.1 (2d Cir. 2016); United States v. White, 670 F.3d 498, 509 (4th Cir. 2012); Porter v. Ascension Par. Sch. Bd., 393 F.3d 608, 616 (5th Cir. 2004); United States v. Stewart, 411 F.3d 825, 828 (7th Cir. 2005); United States v. Ivers, 967 F.3d 709, 718 (8th Cir. 2020).

The Supreme Court resolved this question in Counterman by requiring a subjective standard, holding that speech communicating a serious intent to commit unlawful violence constitutes an unprotected “true threat” only when the prosecution can prove the defendant’s recklessness—in other words, the defendant’s conscious disregard of the risk that his statements could make his target fear for her physical safety.15Counterman v. Colorado, 143 S. Ct. 2106, 2111 (2023). The Counterman Court justified this choice as speech-protective, emphasizing that speakers’ expression might be chilled if they fear punishment under a legal standard too quick to view their speech as threatening.16Id. at 2113 (“Counterman contends . . . that the absence of such a mens rea requirement will chill protected, non-threatening speech. . . . To combat the kind of chill he references, our decisions have often insisted on protecting even some historically unprotected speech through the adoption of a subjective mental-state element. We follow the same path today, holding that the State must prove in true-threats cases that the defendant had some understanding of his statements’ threatening character.”).

But this was not the only speech-protective choice available to the Court. In choosing to privilege the defendant’s speech over the target’s reasonable fear for their physical safety, the majority also effectively chose to privilege the defendant’s speech over the target’s expression. And just as the public loses valuable speech when the prospect of governmental punishment deters speakers from speaking, so too does the public lose valuable speech when the law permits the silencing of targets’ speech.17See infra notes 30–31, 62–71 and accompanying text.

To be sure, we should worry about doctrinal choices that deter valuable speech by making a potential speaker fear that the government will punish them for what they intended as a joke or as political rhetoric. Recall, for example, eighteen-year-old Robert Watts, who was convicted of threatening President Lyndon B. Johnson during the Vietnam War for saying to laughing listeners at a political rally on the Washington, D.C. Mall that “I have already received my draft classification as 1–A and I have got to report for my physical this Monday coming. I am not going. If they ever make me carry a rifle the first man I want to get in my sights is L. B. J.”18Watts v. United States, 394 U.S. 705, 706 (1969) (per curiam). The Supreme Court overturned Watts’s conviction, holding that his speech constituted “political hyperbole” rather than a “true threat” against the president.19Id. at 708 (internal quotation marks omitted).

At the same time, however, we should also worry about doctrinal choices that enable the silencing of targets’ expression by insufficiently protecting those targets from reasonable fear for their physical safety. Think now of musician C.W., the victim in Counterman, who received hundreds of disturbing messages from a complete stranger who repeatedly resisted her efforts to block him. As a result, C.W. stopped walking alone, stopped attending public events, and canceled her own public musical performances.20See Counterman, 143 S. Ct. at 2112. Think too of the many threats to journalists and election officials that silence and suppress their work foundational to a free and fair democracy.21See infra notes 65–71 and accompanying text. The speech-silencing effects of fear-inducing speech are by no means limited to artists and journalists: they extend to all targets, because all are potential speakers.

Courts often resolve difficult First Amendment disputes—including that in Counterman, which called upon the Court to define the contours of a category of unprotected speech—by concluding that the defendant’s speech interests outweigh the target’s substantial but incommensurate interests in reputation or peace, among other values. But threats and stalking cases present even greater challenges for those who consider speech to be a preferred value because commensurate speech interests lie on both sides of these disputes.

The First Amendment issues triggered by the regulation of fear-inducing speech thus require hard choices between speakers’ and targets’ free speech interests, choices that also affect the public’s access to valuable speech. This Article both criticizes the Court’s approach in Counterman and offers a guide to addressing targets’ expressive interests in threats and stalking cases after Counterman. More specifically, it seeks to foster a mindset for considering the First Amendment problems involving fear-inducing speech that attends to targets’ expression as much as defendants’ expression. To this end, it examines the ways in which threats and stalking can silence targets’ speech and deter their participation in public life, and then considers available choices that attend to targets’—not just defendants’—expressive interests.

I. Fear on Both Sides, Speech on Both Sides

This Part starts by describing concerns that fear of government punishment will cause speakers to censor themselves, thus “chilling” their speech. It then explains how the fear induced by threats and stalking can cause their targets to engage in self-censorship of their own.

A. Speakers’ Fear of the Government

 “A chilling effect,” Frederick Schauer explained, occurs “when individuals seeking to engage in activity protected by the first amendment are deterred from so doing by governmental regulation not specifically directed at that protected activity.”22See Schauer, supra note 10, at 693 (emphasis omitted). In other words, concerns about chilling effects anticipate that government’s efforts to modify some unprotected behavior will inadvertently chill protected behavior. As Leslie Kendrick observed, “intuition suggests that some legal rules will chill speech. The further a law encroaches on protected speech, the greater the risk that such speech will be penalized. The more likely speakers are to be penalized, the less they will speak.”23Leslie Kendrick, Speech, Intent, and the Chilling Effect, 54 Wm. & Mary L. Rev. 1633, 1638 (2013).

Because chilling effects harm speakers—and the rest of us, too—by stifling the delivery of opinions, facts, and ideas, the Court’s instrumental concerns about chilling effects not infrequently drive its doctrinal choices.24See Monica Youn, The Chilling Effect and the Problem of Private Action, 66 Vand. L. Rev. 1473, 1483 (2013) (“[T]he chilling effect concept does not delineate a discrete, freestanding doctrinal category. . . . [Instead, it informs] a number of procedural, categorical, and substantive doctrines in First Amendment case law.”). Under its defamation jurisprudence, for example, the more valuable the speech potentially chilled by the prospect of defamation liability, the higher the bar for proving the mental state required to establish such liability.25See N.Y.  Times Co. v. Sullivan, 376 U.S. 254, 271–72, 279–80 (1964). This doctrine thus requires defamation plaintiffs who are public officials or public figures to show that a speaker made a defamatory statement with “ ‘actual malice’—that is, with knowledge that it was false or with reckless disregard of whether it was false or not”—before they can establish the speaker’s liability for reputation-damaging falsehoods.26Id. at 279–80. The Court has explained this doctrinal innovation as necessary to ensure breathing space for speech critical of those in the public eye or otherwise on matters of public concern—the speech at the core of the First Amendment.27Id. at 271–72.

In the same vein, the Counterman Court explained its doctrinal choice as “based on fear of ‘self-censorship’—the worry that without such a subjective mental-state requirement, the uncertainties and expense of litigation will deter speakers from making even truthful statements.”28Counterman v. Colorado, 143 S. Ct 2106, 2115 (2023) (quoting N.Y. Times, 376 U.S. at 279). In explaining its decision to require the prosecution in a “true threats” case to show the defendant’s reckless mental state, the Court catalogued the ways in which the prospect of the government’s punishment can chill a speaker’s expression by instilling fear of various consequences: “The speaker’s fear of mistaking whether a statement is a threat; his fear of the legal system getting that judgment wrong; his fear, in any event, of incurring legal costs—all those may lead him to swallow words that are in fact not true threats.”29Counterman, 143 S. Ct at 2116; see also id. at 2115 (“The result is ‘self-censorship’ of speech that could not be proscribed—a ‘cautious and restrictive exercise’ of First Amendment freedoms.”) (quoting Gertz v. Welch, 418 U.S. 323, 340 (1974)).

True, so far as it goes. But nowhere did the Counterman majority similarly detail targets’ fear for their physical safety and the resulting costs of such fear—costs that include the silencing of their speech along with many other life disruptions. The silencing of targets’ speech harms the general public, too, by denying it the expression that targets would otherwise deliver.30See infra notes 64–71 and accompanying text. The majority instead simply noted the “profound harms” imposed by threats without specifying those harms.31Counterman, 143 S. Ct at 2117 (noting “the profound harms, to both individuals and society, that attend true threats of violence—as evidenced in this case”). Justice Sotomayor’s concurring opinion was more direct, though brief, in acknowledging the harms to targets: “Stalking can be devastating and dangerous. Lives can be ruined, and in the most tragic instances, lives are lost. . . . Even isolated threatening speech can do real harm. Such speech not only disrupts lives, it can silence the speech of others who become afraid to speak out.” Id. at 2123 (Sotomayor, J., concurring in part and concurring in the judgment) (citation omitted).

Judges (like other human beings) sometimes mask the difficulty of hard trade-offs—making those trade-offs feel considerably easier than they actually are—by failing to identify and weigh the costs of their choices. As Mary Anne Franks observed, courts’ “concern about chilling effects tends to be highly selective.”32Mary Anne Franks, Fearless Speech, 17 First Amend. L. Rev. 294, 306 (2019). Others have also observed this dynamic. See Danielle Keats Citron, From Bad to Worse: Stalking, Threats, and Chilling Effects, 2023 Sup. Ct. Rev. 175, 180 (2023); R. George Wright, Counterman v. Colorado: True Threats, Speech Harms, and Missed Opportunities, 99 Ind. L.J. 27, 30 (2023). Indeed, even as the Counterman majority described

itself as balancing competing interests, it particularized only speakers’ interests.33See Counterman, 143 S. Ct at 2119.

The majority’s choice may have been motivated not only by its instrumental concerns about chilling defendants’ expression but also by deontic commitments to punish only morally blameworthy speakers. In this vein, the majority described “reckless defendants” as “morally culpable” because they “have done more than make a bad mistake. They have consciously accepted a substantial risk of inflicting serious harm.”34Id. at 2118; see also Kendrick, supra note 23, at 1633 (suggesting that courts’ intuitions about moral culpability contribute to their doctrinal choices in this area because “the difficulties of measuring and remedying chilling effects cast doubt on whether they could ever provide the sole justification for the choice of one intent requirement over another”). But moral principles cut both ways here, too, as the targets of threats themselves are often entirely innocent victims who experience life-changing harm regardless of the speaker’s mental state. Think again of C.W., the victim in Counterman whose daily existence and musical career were “upended” by hundreds of disturbing messages from a man she had never met.35Counterman, 143 S. Ct at 2112. Think too of journalists and election officials targeted by threats who live in fear for their, and their families’, safety for simply doing their jobs—jobs foundational to a functioning democracy.36See infra notes 65–71 and accompanying text. That we can identify deontic as well as instrumental concerns on both sides of these disputes adds to the difficulties in deciding them, difficulties that judges should not obscure.37See Seana Valentine Shiffrin, The Moral Neglect of Negligence, in 3 Oxford Studies in Political Philosophy 213 (David Sobel, Peter Vallentyne & Steven Wall eds., 2017) (describing the moral failures of negligence as involving “a failure to take and exercise appropriate responsibility for one’s agency; and, when that failure involves other people, negligence involves a failure properly to recognize and acknowledge their moral significance”).

B. Targets’ Fear for Their Physical Safety

Threats and stalking are related but distinct in important ways. I use the term “threat” to mean speech that causes its target to fear for their physical safety.38See R.A.V. v. City of St. Paul, 505 U.S. 377, 388 (1992) (explaining that law punishes threats to protect their targets “from the fear of violence, from the disruption that fear engenders, and from the possibility that the threatened violence will occur”). And by “stalking,” I mean repeated and unwelcome conduct, contact, or communication that causes its target fear or other severe emotional distress.39See, e.g., Colo. Rev. Stat. § 18-3-602(1)(c) (2023) (making it unlawful “[r]epeatedly [to] follow[], approach[], contact[], place[] under surveillance, or make[] any form of communication with another person . . . in a manner that would cause a reasonable person to suffer serious emotional distress and does cause that person . . . to suffer serious emotional distress”). Both threats and stalking can inflict life-disrupting fear. But they often do so in different ways: all threats, by definition, involve speech, while stalking sometimes involves only conduct, sometimes only speech, and sometimes a mix of the two.40See infra notes 116–18 and accompanying text; see also Lakier & Douek, supra note 2 (“It is this violation of social norms and its disregard for the autonomy of the listener—her right to withdraw from the relationship and to not have to hear what the speaker has to tell her—that makes stalking speech so frightening. It also threatens the target’s sense of agency and freedom because of its (seemingly unstoppable) intrusion into the victim’s private life.”) And although a speaker may be held liable for a single threatening statement or for many, stalking laws impose liability only for “repeated” unwelcome conduct, contact, or communication.41See infra notes 114–15 and accompanying text.

Fear for one’s physical safety literally changes lives—and not for the better, as fear is among the most debilitating of human experiences. Consider psychologist Abraham Maslow’s hierarchy of human needs.42A. H. Maslow, A Theory of Human Motivation, 50 Psych. Rev. 370, 394–95 (1943) (identifying physical safety as among the most important of human goals and thus among those that “monopolize” our time, energy, and attention). Foundational to this hierarchy is our need for physical survival in the form of food, water, shelter, and physical security: only when this need is satisfied can we pursue higher-level social and emotional needs like intimacy, belonging, self-esteem, confidence, and more.43Id. For these reasons, requiring a target to pay for a defendant’s free speech with fear for their physical safety exacts a significantly higher price than requiring them to pay for a defendant’s free speech with their reputation or with their freedom from emotional cruelty.

Fear-inducing speech inflicts harm both physical and mental. One study, for example, reported “high levels of psychopathology among stalking victims,” whose overall psychological distress was about three times higher than that of the general population.44Eric Blaauw, Frans W. Winkel, Ella Arensman, Lorraine Sheridan & Adriënne Freeve, The Toll of Stalking: The Relationship Between Features of Stalking and Psychopathology of Victims, 17 J. Interpersonal Violence 50, 57–58 (2002). Medical evidence demonstrates the life-changing effects of chronic fear that include insomnia and sleep disruptions,45Id.; Jaime Rosenberg, The Effects of Chronic Fear on a Person’s Health, Neuroscience Educ. Inst. Cong. (Nov. 11, 2017), https://www.ajmc.com/view/the-effects-of-chronic-fear-on-a-persons-health [https://perma.cc/M9RM-7JSV]. immune system dysfunction,46Rosenberg, supra note 45. gastrointestinal issues like ulcers and irritable bowel syndrome,47Joe Pierre, How Does Fear Influence Risk Assessment and Decision-Making?, Psych. Today (July 15, 2020), https://www.psychologytoday.com/us/blog/psych-unseen/202007/how-does-fear-influence-risk-assessment-and-decision-making. sexual dysfunction and decreased fertility,48Id. and accelerated aging.49Mai Stafford, Tarani Chandola & Michael Marmot, Association Between Fear of Crime and Mental Health and Physical Functioning, 97 Am. J. Pub. Health 2076, 2078 (2007) (finding that some study participants had “limitations in physical functioning . . . that were commensurate with that of people 9 years” older). Medical evidence also establishes that chronic fear is associated with generally poor mental health,50See Jessica Miles, Straight Outta SCOTUS: Domestic Violence, True Threats, and Free Speech, 74 U. Mia. L. Rev. 711, 735 (2020) (“In addition to an increased risk of physical violence, intimate partner stalking victims suffer from high rates of anxiety and depression.”). with mental health injuries that include anxiety,51Blaauw et al., supra note 44, at 57. depression,52Id. post-traumatic stress disorders,53Sean Wake, Jolie Wormwood & Ajay B. Satpute, The Influence of Fear on Risk Taking: A Meta-Analysis, 34 Cognition & Emotion 1143, 1148 (2020). panic and obsessive compulsive disorders,54Id. impaired formation of long-term memories,55Rosenberg, supra note 45. and suicidal ideation.56Blaauw et al., supra note 44, at 57 (approximately one third of stalking victims reported repeated thoughts about committing suicide). One study found that those who reported higher levels of fear were 50% more likely to show signs of a mental health disorder and 90% more likely to have symptoms of depression than those who reported lower levels of fear.57Stafford et al., supra note 49.

Moreover, the targets of threats and stalking often fear for their physical safety for very good reason. Criminal justice scholar Mary Brewster, for instance, canvassed the experiences of victims of intimate partner violence to conclude that threats served as “a strong and statistically significant predictor of violence.”58Mary P. Brewster, Stalking by Former Intimates: Verbal Threats and Other Predictors of Physical Violence, 15 Violence & Victims 41, 50 (2000); see also Miles, supra note 50, at 734–35 (“Research on stalking demonstrates that a strong correlation exists between intimate partner stalking and physical violence, as eighty-one percent of women who were stalked by a current or former intimate partner were also physically assaulted by that partner.”). By causing targets to fear for their physical safety, threats and stalking not only inflict physical and mental health injuries, but also change the ways in which those targets live their lives.59See Paul E. Mullen & Michele Pathé, Stalking, 29 Crime & Just. 273, 296 (2002) (“All but six of the one hundred victims [surveyed] reported major lifestyle changes and modified their daily activities in direct response to being stalked.”). Stalking, for instance, often forces its targets to miss work,60See Patricia Tjaden & Nancy Thoennes, Nat’l Inst. of Just. & Ctrs. for Disease Control & Prevention, Stalking in America: Findings from the National Violence Against Women Survey 11 (1998), https://www.ojp.gov/pdffiles/169592.pdf [https://perma.cc/BLY2-25T5]; Mullen & Pathé, supra note 59, at 297. to leave their jobs, or their homes.61See Katrina Baum, Shannan Catalano, Michael Rand & Kristina Rose, Bureau of Just. Stat. Special Rep., Stalking Victimization in the United States 6 (2009) (“One in 7 victims reported they moved as a result of the stalking.”); Mullen & Pathé, supra note 59, at 296–97.

Most relevant to this Article, threats and stalking also change their targets’ lives by causing them to speak less, to speak differently, and to participate less in public life. Indeed, the targets of threats and stalking commonly, and reasonably, respond to threats to their physical survival by making themselves silent and invisible.62See Jonathon W. Penney, Understanding Chilling Effects, 106 Minn. L. Rev. 1451, 1510–12 (2022) (“[T]hreats of violence and physical harm are a powerful force for self-censorship, which trigger deeper psychological states of fear, anxiety, and severe emotional distress that then in turn amplify social conformity.” (footnote omitted)). To illustrate, recall the musician’s experience in Counterman: C.W. stopped walking alone, stopped attending other musicians’ events, and canceled her own performances.63See Counterman v. Colorado, 143 S. Ct. 2106, 2112 (2023). Danielle Keats Citron explains how stalking silences protected expression more generally:

[Cyber stalking victims] stop using their phones. Victims change how they express themselves; they are less controversial, more muted, and connect with fewer people. Their withdrawal from online engagement isolates them from friends and family. When victims change their phone numbers to prevent stalkers from calling them, they become unreachable.64Citron, supra note 32, at 198–99.

Consider too the many journalists targeted by threats of death or rape. One recent study found that one in ten journalists surveyed had been threatened with death in the preceding year because of their work;65Erin C. Carroll, Obstruction of Journalism, 99 Denv. L. Rev. 407, 415 (2022). another found that three quarters of female journalists surveyed reported that “they had experienced online abuse, harassment, threats, and attacks.”66Id. at 409. These threats interfere with journalists’ watchdog and educator functions,67See Vincent Blasi, The Checking Value in First Amendment Theory, 2 Am. Bar Found. Rsch. J. 521, 538–39 (1977) (explaining the press’s role as a watchdog for government misconduct); RonNell Andersen Jones, Press Speakers and the First Amendment Rights of Listeners, 90 U. Colo. L. Rev. 499, 537–43 (2019) (explaining the press’s functions as educating the public on a wide range of matters and serving as the public’s proxy by observing what the public does not have the time or resources or other ability to observe for itself). inflicting injury not only to their individual targets, but also to a public’s hopes for a healthy democracy. Free press scholar Erin Carroll has detailed more specifically how threats inhibit and distort the reporting that journalists produce and that the public thus receives:

Obstruction operates on at least three levels: the story, the beat, and the pipeline. At the story level, threats and abuse prevent journalists from covering particular events or incidents. At the beat level, perpetual abuse around broad topics like politics, economics, and immigration dissuades reporters from aggressively covering these beats or even covering them at all. At the pipeline level, violence leads reporters to leave or consider leaving the profession entirely.68Carroll, supra note 65, at 411.

Illustrating these dynamics more specifically, one study found that 37% of female journalists who reported that they had been threatened, harassed, or attacked indicated they avoided certain stories; 8% changed the content or perspectives of the news that they write about; 16% considered requesting a transfer or different beat and 6% requested a transfer or different beat; and 29% indicated the threats and attacks they received made them think about getting out of the profession.69Michelle Ferrier, TrollBusters & Int’l Women’s Media Found., Attacks and Harassment: The Impact on Female Journalists and Their Reporting 39, 44 (Elisa Lees Munoz ed., 2018), https://www.iwmf.org/wp-content/uploads/2018/09/Attacks-and-Harassment.pdf [https://perma.cc/L4ZU-BCE9].

As additional examples, threats against election officials deter those officials from doing work necessary to the democratic self-governance at the core of the First Amendment. A nationwide study of local election officials found that more than one in three of those surveyed reported that they have experienced threats, harassment, or abuse because of their work; more than half reported that they worry about their colleagues’ safety; more than a quarter worried about their own physical safety; and more than a third reported that they knew of local election officials who had left their jobs at least in part because of fear for their safety.70The Brennan Ctr. for Justice, Local Election Officials Survey 9, 15, 19 (2024), https://www.brennancenter.org/our-work/research-reports/local-election-officials-survey-may-2024 [https://perma.cc/C3EN-WUDH]. Not surprisingly, many local jurisdictions now report high levels of turnover among their election officials.71Miles Park, In Some States, More than Half of the Local Election Officials Have Left Since 2020, NPR (Sept. 26, 2023, 5:12 PM), https://www.npr.org/2023/09/26/1200616113/election-official-threats-harassment-turnover [https://perma.cc/7T97-FKL2]; Michael Beckel, Amelia Minkin, Amisa Ratliff, Ariana Rojas, Kathryn Thomas & Adrien Van Voorhis, Issue One, The High Cost of High Turnover 1 (2023), https://issueone.org/wp-content/uploads/2023/09/The-High-Cost-of-High-Turnover-Report.pdf [https://perma.cc/M53Z-NKD3].

II. Attending to Targets’ Free Speech Interests in Threats and Stalking Cases

As Frederick Schauer observed, courts often choose to err on the side of overprotecting defendants’ speech when crafting First Amendment doctrine:

The chilling effect doctrine reflects the view that the harm caused by the chilling of free speech (or other protected activity) is comparatively greater than the harm resulting from the chilling of the other activities involved. And, the logical and necessary mandate of the chilling effect doctrine is that legal rules be formulated so as to allocate the risk of error away from the preferred value, thereby minimizing the occurrence of those errors which we deem the most harmful.72Schauer, supra note 10, at 705.

The Counterman majority made precisely this choice when it required proof of a speaker’s recklessness as predicate to identifying a “true threat” unprotected by the First Amendment.73See supra notes 15–17, 28–31 and accompanying text.

Again, that is a choice—but by no means the only justifiable, and speech-protective, choice. Because speech interests lie on both sides of threats and stalking cases, those cases require courts to choose not only whether to prefer speakers’ expression over incommensurate harms experienced by targets (like harms to their mental and physical health and their quality of life) but also whether to protect the speaker’s expression at the expense of the target’s expression. This Part considers possibilities for treating targets’ and speakers’ expressive interests in threats and stalking cases with at least the same regard.

A. The First Amendment Argument for Symmetrical Concern for Speakers’ and Targets’ Expressive Interests in Threats Cases

Neither the Counterman majority nor Billy Counterman’s own briefing offered any evidence that anyone’s speech—much less Counterman’s—had been chilled by an objective listener-centered approach (like Colorado’s) for identifying unprotected true threats.74See Brief on the Merits for Respondent at 38–39, 45, Counterman v. Colorado, 143 S. Ct. 2106 (2023) (No. 22-138) (pointing out that Counterman’s anecdotal discussion of fact patterns offered to suggest an objective standard’s potential for chilling did not involve speech prosecuted under a threats theory or involved speech prosecuted under Counterman’s proposed specific intent standard). As dissenting Justice Barrett observed, “objective tests are effectively the status quo today, yet Counterman still struggles to identify past prosecutions that came close to infringing on protected speech.”75Counterman v. Colorado, 143 S. Ct. 2106, 2138 (2023) (Barrett, J., dissenting) (“Before we took this case, the vast majority of Courts of Appeals and state high courts had upheld [statutes that required only an objective showing] as constitutional.”). A number of scholars have noted the limited empirical support for chilling effects concerns. See Suneal Bedi, The Myth of the Chilling Effect, 35 Harv. J.L. & Tech. 267, 307 (2021) (questioning courts’ reliance on chilling effect concerns when crafting doctrine); Jennifer M. Kinsley, Chill, 48 Loy. U. Chi. L.J. 253, 253 (2016) (criticizing chilling effects concerns as making “too may false assumptions about the speakers’ knowledge of the law, their ability to correctly apply the law, and their willingness to conform to the law”); Kendrick, supra note 23, at 1675; Penney, supra note 62, at 1454–55, 1470 (challenging conventional understandings of the chilling effect as “empirically weak” and asserting that most people “are often not sufficiently aware of the law or state activities such that any possible legal harm or sanction could impact their decision about speaking or acting.”); Schauer, supra note 10, at 730 (“While the chilling effect concept appears to be premised upon predictions or assumptions about human behavior, no evidence has been proffered to justify those predictions. It has not been clearly established that individuals are mistakenly deterred or become overly cautious as a result of the existence of particular statutes, rules, or regulations.”). Nevertheless, concern about the law’s chilling effect—that is, the “overdeterrence of benign conduct that occurs incidentally to a law’s legitimate purpose or scope”76Kendrick, supra note 23, at 1649 (emphasis omitted).—is legitimate, indeed intuitively powerful, as a background assumption about how the world works.77See Joseph Blocher & Reva B. Siegel, When Guns Threaten the Public Sphere: A New Account of Public Safety Regulation Under Heller, 116 Nw. U. L. Rev. 139, 186–89 (2021) (discussing the background assumptions that inform the Court’s constitutional doctrine in various areas despite the lack of empirical evidence for such assumptions). For this reason, the Counterman majority was not wrong to worry about chilling effects even absent anecdotal or empirical evidence of chilling.

But courts committed to robust free speech protections should also credit the equally valid premise that a legal standard that fails adequately to protect the targets of threats and stalking will enable the silencing of targets’ speech. Indeed, the First Amendment case for attending to targets’ free speech interests is at least as strong as that for attending to chilling concerns given that targets’ fear for their physical safety demonstrably deters their expression.78See supra notes 62–71 and accompanying text. Just as a speaker’s First Amendment defense need not include evidence that their—or anyone’s—speech was chilled by the prospect that they could be held liable for objectively terrifying statements, a prosecutor or plaintiff need not prove that the target’s—or anyone’s—speech was silenced by their reasonable fear for their physical safety. In short, when developing and applying First Amendment doctrine, courts should weigh the free speech costs borne by the targets of threats and stalking as heavily as the free speech costs borne by speakers chilled by the prospect of the government’s legal action.

The First Amendment argument for this approach gathers additional force when we recognize that targets of threats and stalking cannot meaningfully rely on the traditional self-help remedies of counterspeech and avoidance.79See Whitney v. California, 274 U.S. 357, 377 (1927) (Brandeis, J., concurring) (“If there be time to expose through discussion the falsehood and fallacies, to avert the evil by the processes of education, the remedy to be applied is more speech, not enforced silence.”). For example, only 9% of stalking victims surveyed who tried to discourage their stalkers reported that their engagement improved the situation.80Mary P. Brewster, An Exploration of the Experiences and Needs of Former Intimate Stalking Victims 47 (1998), https://www.ojp.gov/pdffiles1/nij/grants/175475.pdf [https://perma.cc/7VZM-94AX]; see also James Geistman, Brad Smith, Eric G. Lambert & Terry Cluse-Tolar, What to Do About Stalking: A Preliminary Study of How Stalking Victims Responded to Stalking and Their Perceptions of the Effectiveness of These Actions, 26 Crim. Just. Stud. 43, 60 (2013) (“Our findings suggest that stalking victims who confronted stalkers on their own, regardless of whether they were victims of violent or nonviolent stalking, were likely to perceive that their efforts were ineffective. In some cases, their responses had the opposite effect and the victims reported that the stalking behavior worsened.”). A target’s engagement with a stalker through counterspeech can aggravate and escalate the stalker’s behavior81See Mullen & Pathé, supra note 59, at 294 (reporting that some “stalkers will react with extreme violence to their victim’s repeated rebuffs”). and can fuel a stalker’s delusions of an actual relationship with the target by “gratify[ing] the stalker’s wishes to have, and to hold onto, a relationship and reinforc[ing] the pursuit.”82Id.; see also id. at 310 (reporting that “any contact with the perpetrator, however intermittent, will reinforce the unwanted behavior”); Mary Anne Franks, How Stalking Became Free Speech: Counterman v. Colorado and the Supreme Court’s Continuing War on Women, Geo. Wash. L. Rev. On Docket (2022), https://www.gwlr.org/how-stalking-became-free-speech-counterman-v-colorado-and-the-supreme-courts-continuing-war-on-women [https://perma.cc/E2BZ-MYZK] (“[S]talkers often sincerely believe that their behavior is welcome. These delusional beliefs make them more, not less, dangerous to their victims.” (footnote omitted)). For these reasons, targets are often counseled not to engage with stalkers.83See Stalking Prevention, Awareness & Res. Ctr., Stalking Safety Strategies 2 (2022), https://www.stalkingawareness.org/wp-content/uploads/2022/05/Safety-Strategies.pdf [https://perma.cc/FP8G-KMH2] (“Consider cutting off any and all communication with the stalker. Many stalkers misinterpret any contact (even negative contact) as encouragement.”). Nor, due to limited resources, can many targets protect themselves through avoidance. “[M]oving to a new home or changing jobs or schools to avoid threatened violence are less likely to be options for domestic violence victims than for other threat victims,” legal scholar Jessica Miles explains.84Miles, supra note 50, at 736; see also id. at 736–37 (“The relationship between poverty and the increased likelihood of violence is further supported by research that shows that domestic violence victims with the fewest resources experience the highest rates of repeat abuse.”).

A target-centered approach is not without precedent, as the Supreme Court sometimes chooses to shape categories of less-protected speech in ways that privilege listeners’ interests when those listeners cannot protect themselves from harmful speech through rebuttal or escape: this is often the case when speakers enjoy advantages of information or power (or both) over their listeners.85Elsewhere, I have examined settings involving these asymmetries in more detail. See generally Helen Norton, What Twenty-First-Century Free Speech Law Means for Securities Regulation, 99 Notre Dame L. Rev. 97 (2023) (discussing corporations’ speech to investors and shareholders); Helen Norton, Manipulation and the First Amendment, 30 Wm. & Mary Bill Rts. J. 221 (2021) (discussing online platforms’ interactions with their users); Helen Norton, Discrimination, the Speech That Enables It, and the First Amendment, 2020 U. Chi. Legal F. 209 (2020) (discussing employers’ speech to workers); Helen Norton, Powerful Speakers and Their Listeners, 90 U. Colo. L. Rev. 441 (2019) [hereinafter Norton, Powerful Speakers and Their Listeners] (describing asymmetries of information and power between speakers and listeners in several contexts); Helen Norton, Pregnancy and the First Amendment, 87 Fordham L. Rev. 2417 (2019) (discussing the speech of those providing reproductive health care services to pregnant women); Helen Norton, Robotic Speakers and Human Listeners, 41 Seattle U. L. Rev. 1145 (2018) (discussing communications produced by artificial intelligence); Helen Norton, Truth and Lies in the Workplace: Employer Speech and the First Amendment, 101 Minn. L. Rev. 31 (2016) (discussing employers’ speech to workers); Helen Norton, Secrets, Lies, and Disclosures, 27 J.L. & Pol. 641 (2012) (discussing campaign speakers’ and donors’ speech to voters). Recall the Court’s defamation jurisprudence, which requires public officials and public figures to show a speaker’s recklessness (in other words, “actual malice”) before imposing liability for that speaker’s reputation-damaging falsehoods, while relaxing the showing required of private-figure plaintiffs with less ability to remedy reputational harm themselves through counterspeech. More specifically, the Court enables private figures to recover presumed and punitive damages for defamatory falsehoods on matters of private concern without any showing of the speaker’s recklessness.86Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749, 761 (1985) (plurality opinion). The Supreme Court also understands the First Amendment to permit defamation plaintiffs who are private figures to recover actual damages for defamatory falsehoods on matters of public concern upon a showing of the speaker’s negligence (but requires proof of the speaker’s actual malice to recover presumed or punitive damages in such cases). Gertz v. Robert Welch, Inc., 418 U.S. 323, 347–50 (1974). While this more target-friendly choice rests in great part on the lower First Amendment value of reputation-damaging falsehoods that do not address matters of public concern, it also turns on private figures’ more limited ability (compared to public officials) to protect their reputational interests through rebuttal:

Public officials and public figures usually enjoy significantly greater access to the channels of effective communication and hence have a more realistic opportunity to counteract false statements than private individuals normally enjoy. Private individuals are therefore more vulnerable to injury, and the state interest in protecting them is correspondingly greater.87Gertz, 418 U.S. at 344 (footnote omitted).

When balancing speakers’ expressive interests against private figures’ non-speech (that is, reputational) interests for defamation purposes, the Court thus requires targets to prove no more than a speaker’s recklessness—and sometimes only their negligence. More powerful still is the First Amendment argument for privileging targets’ free speech interests over those of speakers’, especially when those targets cannot meaningfully protect themselves through the traditional self-help remedies of exit and voice. In other words, although recklessness might be an appropriate First Amendment compromise in threats cases if courts were simply balancing defendants’ speech interests against targets’ incommensurate non-speech interests in health and quality of life, recklessness is a much less obvious First Amendment choice if we attend to both parties’ speech interests.

As an illustration, consider the Court’s listener-centered understanding of the First Amendment that treats “false or misleading” commercial speech as entirely unprotected by the First Amendment because of the harm it inflicts on targets’ (consumers’) First Amendment interests in making informed and autonomous decisions regardless of the commercial speaker’s mental state.88Cent. Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n of New York, 447 U.S. 557, 563–64 (1980) (“The First Amendment’s concern for commercial speech is based on the informational function of advertising. Consequently, there can be no constitutional objection to the suppression of commercial messages that do not accurately inform the public about lawful activity.” (citation omitted)); see also Zauderer v. Off. of Disciplinary Couns., 471 U.S. 626, 638 (1985) (“The States and the Federal Government are free to prevent the dissemination of commercial speech that is false, deceptive, or misleading . . . .”). This listener-centered approach also recognizes that consumers cannot meaningfully protect themselves from these informational harms, because commercial actors have considerably greater access to accurate information about their own goods and services than do consumers.89See Norton, Powerful Speakers and Their Listeners, supra note 85, at 446–48 (explaining commercial actors’ informational advantages over consumers). For these reasons, many false advertising laws have long prohibited false or misleading commercial speech—regardless of the commercial speaker’s mental state—because of the harm posed to consumers as the targets of such speech.90E.g., Aaron v. SEC, 446 U.S. 680, 696–702 (1980) (Section 17(a)(3) of the Securities Act of 1933 “quite plainly focuses upon the effect of particular conduct on members of the investing public, rather than upon the culpability of the person responsible”); FTC v. Algoma Lumber Co., 291 U.S. 67, 81 (1934) (explaining that advertisers’ lack of culpable mental state does not insulate them from liability under the Federal Trade Commission Act’s bar on deceptive trade practices). 

Because fear—and speech—are on both sides of threats and stalking cases, a robust understanding of the Free Speech Clause supports a standard similarly attentive to targets’ expressive interests. To be clear, my point is not that the First Amendment necessarily requires a listener-centered standard when the free speech interests of speakers and their targets collide. But neither does the First Amendment require a speaker-centered standard when we must choose between speakers’ and targets’ expression. I suggest instead that the First Amendment permits—indeed, supports—governmental choices to privilege targets’ free speech interests in certain settings. To this end, I urge that the First Amendment doctrine of threats and stalking cases treat the free speech costs borne by speakers and targets with at least equal concern. This symmetrical concern for speakers’ and targets’ expression in threats cases recognizes that objective listener-centered standards advance free speech as least as much as subjective speaker-centered standards. This approach thus understands the First Amendment to permit legislatures or courts to choose from a range of speech-protective standards such that the Counterman Court was wrong to deny Colorado’s Supreme Court that choice.

What might this symmetrical concern look like in practice? The rest of this Article identifies some possibilities.

B. The Counterman Court’s Missed Opportunity: Defining Unprotected True Threats Through an Objective Target-Centered Standard

Start with the road not taken by the Counterman majority: the Colorado Supreme Court’s objective target-centered approach for identifying unprotected true threats. Developed in a case involving high school students’ heated late-night Twitter (now known as “X”) argument shortly after a local school shooting, that context-driven standard required courts to consider the surrounding circumstances to determine whether “an intended or foreseeable recipient would reasonably perceive [the statement(s)] as a serious expression of intent to commit an act of unlawful violence.”91In re R.D., 464 P.3d 717, 721, 731 (Colo. 2020), abrogated by Counterman v. Colorado, 600 U.S. 66 (2023). In my view, this test treated speakers’ and targets’ free speech interests with equal concern by requiring courts to consider multiple factors that attend to both sets of interests.92This Article focuses on the appropriate First Amendment analysis for threats and stalking cases that involve demonstrably direct collisions between speakers’ and targets’ speech interests—and to be sure, this includes attention to the speech-silencing harm of hate speech that takes the form of threats or stalking. See Virginia v. Black, 538 U.S. 343, 363 (2003) (considering cross-burning’s potential as a “particularly virulent” type of threat given its “long and pernicious history as a signal of impending violence”). This Article does not, however, address the First Amendment analysis to be applied to hate speech or harassment that does not cause the target to fear for their physical safety. See Snyder v. Phelps, 562 U.S. 443, 458–59 (2011) (holding that the First Amendment protected hate speech on a matter of public concern in a context that did not cause a target’s potentially speech-silencing fear for their physical safety). Note, however, that objective standards like Colorado’s approach also protect the equality interests of members of marginalized communities who both disproportionately experience enforcement action as speakers and disproportionately experience threats and stalking as targets. See Counterman, 143 S. Ct. at 2122–23 (Sotomayor, J., concurring in part and concurring in the judgment) (“The burdens of overcriminalization will fall hardest on certain groups . . . . Members of certain groups, including religious and cultural minorities, can also use language that is more susceptible to being misinterpreted by outsiders. And unfortunately, yet predictably, racial and cultural stereotypes can also influence whether speech is perceived as dangerous.”); Danielle Keats Citron, Cyber Civil Rights, 89 B.U. L. Rev. 61, 69–81 (2009) (describing how cyberharassment disproportionately targets women and people of color). These factors included:

  • The statement’s role in any broader exchange or events—for example, whether the statement “was spontaneous or [instead] responsive to some other communication,” where statements that matched the “overall tone” of a conversation in which it joined were less likely to be experienced as objectively terrifying.93In re R.D., 464 P.3d at 732.
  • The medium or platform through which the statement was communicated (including any “distinctive conventions or architectural features”)—where, for example, “prevailing norms in a particular genre” or forum might “recast violent language in a less threatening light.”94Id. at 731–32; see also Lyrissa Barnett Lidsky & Linda Riedemann Norbut, #I🔫U: Considering the Context of Online Threats, 106 Calif. L. Rev. 1885, 1910–28 (2018) (discussing how platforms’ architectural features affect the meaning of posts on those platforms and the value of expert witnesses in explaining the meaning of speech in these settings).
  • The manner in which the statement was conveyed (“e.g., anonymously or not, privately or publicly”95In re R.D., 464 P.3d at 722.)—in which, depending on the context, the speaker’s anonymity and the choice to personally target the statements rather than direct them to a large public audience might cause a reasonable target to experience the statements as threatening.
  • Any relationship between the speaker and target—including any history of violence, the speaker’s awareness of the target’s particular vulnerabilities, or the target’s awareness of the speaker’s patterns of speech or emotional state.96Id. at 733.
  • The audience’s subjective reaction: Contrast Watts v. United States, in which the Court relied in part on the audience’s laughter to identify a statement as protected political hyperbole rather than an unprotected threat97Watts v. United States, 394 U.S. 705, 707 (1969) (per curiam).with statements that prompt their audience to report their concerns about potential violence with law enforcement or trusted adults.98In re R.D., 464 P.3d at 733.

C. Target-Attentive Approaches to Threats Cases After Counterman

Unless and until the Court chooses to revisit its decision in Counterman, however, an objective context-driven standard is precluded in threats cases, which now require prosecutors and plaintiffs to establish a speaker’s recklessness before imposing criminal or civil punishment.99See supra note 3 and accompanying text. That the same First Amendment standard applies to both criminal and civil law settings (like civil protection orders) only raises the expressive stakes of this requirement.100See Counterman v. Colorado, 143 S. Ct. 2106, 2140 (2023) (Barrett, J., dissenting) (“[T]his case is about the scope of the First Amendment, not the interpretation of a criminal statute. Accordingly, the Court’s holding affects the civil consequences for true threats just as much as it restricts criminal liability.”); see also id. at 2140–41 (canvassing the consequences of a recklessness requirement for targets’ ability to secure civil protections from threats through restraining orders, civil enforcement statutes, and school discipline). Counterman and its limitations now present new choices among available approaches, some more attentive to targets’ free speech interests than others.

First, because Counterman establishes recklessness as a First Amendment floor and not a ceiling,101See id. at 2139 (“The optimal balance strikes me as a question best left to the legislature, which could calibrate the mens rea to the circumstance—for example, higher for the criminal context and lower for the civil.”). legislatures remain free to impose even higher levels of mens rea (like intent or knowledge) as a condition of criminal or civil liability. And some do.102E.g., Cal. Penal Code § 76 (prohibiting threats of “any elected public official” made with the speaker’s “specific intent that the statement is to be taken as a threat”); Mass. Gen. Laws ch. 258E, § 1 (2025) (defining harassment (in other words, actionable threats) as “3 or more acts of willful and malicious conduct aimed at a specific person committed with the intent to cause fear, intimidation, abuse or damage to property”). But Counterman does not require legislatures to so choose. Attention to targets’ free speech interests thus supports the legislative choice, consistent with free speech values, not to require any subjective mental state greater than recklessness, which already leaves targets unprotected in the many threats cases in which targets lack access to evidence of the defendant’s interior mental state.103See supra notes 4–5 and accompanying text.

Second, courts’ recklessness determinations in threats cases can sometimes be informed by targets’ experiences. The Counterman majority articulated its recklessness standard as focused on the defendant’s “insufficient concern with risk, rather than awareness of impending harm.”104Counterman, 143 S. Ct. at 2117. A law requiring the defendant’s “awareness of impending harm,” in contrast, requires the prosecution to prove a defendant’s awareness “that [a] result is practically certain to follow.” Id. (quoting United States v. Bailey, 444 U.S. 394, 404 (1980)). As the Court explained in an earlier decision, “[t]hat risk need not come anywhere close to a likelihood. Speeding through a crowded area may count as reckless even though the motorist’s ‘chances of hitting anyone are far less [than] 50%.’ ”105Borden v. United States, 141 S. Ct. 1817, 1824 (2021) (quoting Wayne R. LaFave, Substantive Criminal Law § 5.4(f) (3d ed. 2018)). To demonstrate a defendant’s conscious disregard “of a substantial risk” that his statements would cause his target to fear for her physical safety, prosecutors and plaintiffs may present circumstantial evidence of recklessness—that is, evidence that the defendant ignored “obvious” risks or knew of facts that would have made the danger obvious to someone in the defendant’s situation.106See Farmer v. Brennan, 511 U.S. 825, 842 (1994) (Whether the defendant “had the requisite knowledge of a substantial risk is a question of fact subject to demonstration in the usual ways, including inference from circumstantial evidence, and a factfinder may conclude that [the defendant] knew of a substantial risk from the very fact that the risk was obvious.” (citation omitted)). To be sure, the defendant remains free to introduce evidence that they were unaware of risks that others would find obvious.107See id. at 844 (“[I]t remains open to the [defendants] to prove that they were unaware even of an obvious risk to inmate health or safety. That a trier of fact may infer knowledge from the obvious, in other words, does not mean that it must do so.”). Whether these risks are obvious to the defendant can sometimes be informed by the target’s experience and behavior. For instance, a defendant’s awareness that his target had repeatedly blocked his calls, texts, or other messages—an awareness perhaps demonstrated by his creation of new accounts from which to message his target—can show that he was aware of “obvious” risks that his target experienced his communications as threatening. So, too, could his awareness that his target had changed her expressive (or other) behavior in response to his statements.108See Lyrissa Barnett Lidsky & RonNell Andersen Jones, Of Reasonable Readers and Unreasonable Speakers: Libel Law in a Networked World, 23 Va. J. Soc. Pol’y & L. 155, 177 (2016) (predicting that skeptical juries “will rarely accept a defendant’s argument that she truly believed her delusional and defamatory statements”).

Of course, a target could ensure that a speaker was aware of this risk by telling him that she experienced his statements as threatening—but, as discussed above, such engagement can itself be existentially dangerous.109See supra notes 82–83 and accompanying text. This remains among Counterman’s major deficits in choosing a recklessness inquiry focused on the defendant’s interior mental state rather than threats’ speech-silencing effects on their targets.

D. Target-Attentive Approaches to the Many Stalking Cases That Do Not Involve Threats and Where Counterman Thus Does Not Apply

As explained above, stalking laws protect targets from speech-silencing and life-disrupting fear in ways related to, but distinct from, the protections offered by threats laws.110See supra notes 38–41 and accompanying text. While threats laws address speech that causes its target to fear for their physical safety, stalking laws address fear induced by repeated and unwelcome conduct, contact, or communication. Many stalking cases thus do not, and need not, turn on any allegedly threatening content of the speaker’s communications. In those cases, the default First Amendment rules applynot Counterman’s recklessness requirement.111E.g., State v. Labbe, 314 A.3d 162, 179 (Me. 2024) (“Some stalking prosecutions, like Counterman’s, may rely in whole or in part on words used by a defendant to establish the ‘course of conduct’ and consequent effect upon the victim. It does not follow, however, that the Counterman standard applies to every stalking prosecution in which words are spoken or electronic communication devices are used. Rather, Counterman’s holding is clear: where the State relies on the content of a defendant’s expression as the basis for a stalking charge and to establish harm to the victim, the additional requirement to prove subjective mens rea of recklessness applies.”). Nevertheless, because Counterman addressed threats in the context of a stalking case, the danger remains that courts will inappropriately apply its recklessness standard to stalking cases that do not involve threats.112Indeed, for a time this was the case in Colorado, until the state supreme court overruled a trial court’s holding that a prosecutor had to prove recklessness in a stalking case even though the prosecutor made clear that he would not be proceeding under a true threats theory. People v. Crawford, No. 24SA226, slip op. at *P2 (Colo. May 12, 2025) (holding that “the charges the prosecution brought here, carefully based on repeated actions—including contacts (i.e., texts, phone calls, and emails) but not their contents— do not require proof that the defendant communicated or otherwise acted with a reckless state of mind.”). In the interest of full disclosure, I note that I served on the team representing Colorado’s Attorney General in an amicus filing before the state supreme court in Crawford.

So the first step in attending to stalking targets’ free speech interests is to make sure that courts understand that Counterman’s recklessness requirement does not apply to stalking cases that do not allege unprotected true threats.113See Citron, supra note 32, at 204 (“Counterman did not rule that unprotected true threats are necessary for cyber stalking convictions to comport with the First Amendment. But law enforcers could get the [mistaken] impression that now there must be proof of recklessly made threats in any cyber stalking case.”). The second step is to engage targets’ free speech interests when applying the appropriate First Amendment analysis in the many stalking cases that do not involve threats—and where the free speech costs to the target remain substantial while the defendant’s expressive interests are low (since the repeated and unwelcome nature of stalking, rather than its content, often induces fear).114See Lakier & Douek, supra note 2, at 192 (discussing how an endless of barrage of messages can cause fear regardless of their content: “Their mere presence in her inbox, the fact of their constant arrival, that they just did not stop, made [the defendant’s messages] distressing regardless of what they said”).

To illustrate how courts’ assessment of First Amendment challenges to the enforcement of anti-stalking laws can attend to targets’ free speech interests, consider the following fact patterns:

  • Defendant (D) repeatedly follows and watches Target (T) as they walk to and from their car to their office, gym, grocery store, and home;
  • D calls T every morning and hangs up as soon as they answer;
  • D calls T every morning and says, “Hello, beautiful” when T answers; and
  • D calls T every morning and says, “Die” when T answers.

Each of these fact patterns involves repeated and unwelcome behaviors that, depending on the circumstances, could cause a reasonable person to experience fear and thus violate a state’s stalking statute.115E.g., Colo. Rev. Stat. § 18-3-602(1)(c) (2022) (making it unlawful “[r]epeatedly [to] follow[], approach[], contact[], place[] under surveillance, or make[] any form of communication with another person” in “a manner that would cause a reasonable person to suffer serious emotional distress and does cause that person . . . to suffer serious emotional distress”). But some of the fact patterns do so in ways that involve no communication—or if they do involve communication, they do so regardless of the communication’s content.

In short, as this Section explains, the government’s prosecution of conduct normally triggers no First Amendment review. If a defendant nevertheless seeks to challenge the prosecution of conduct on First Amendment grounds, the defendant would have to establish that their conduct was sufficiently expressive to warrant First Amendment protection. If a court determines the conduct to be expressive, then intermediate scrutiny applies. If a defendant challenges the content-neutral prosecution of speech (for example, repeated and unwelcome communications regardless of any threatening content), then again intermediate scrutiny applies. These analyses can, and should, foreground targets’, as well as speakers’, free speech interests.

  1. Stalking That Takes the Form of Conduct Only

Fact patterns A (repeatedly following and watching the target) and B (repeatedly dialing the target’s phone number and hanging up without speaking) involve stalking that takes the form of repeated unwelcome conduct, not speech, since the speaker makes no oral or written communication. Consider these additional illustrations of such courses of conduct: a speaker that “send[s] envelopes of unknown white powder to the victim in the mail;” “repeatedly infect[s] the victim’s computers with viruses;” “open[s] unwanted on-line dating profiles under the victim’s identity;” or “arrange[s] every day for deliveries to be made at the victim’s home at all hours of the night.”116United States v. Ackell, 907 F.3d 67, 73 (1st Cir. 2018) (discussing how stalking often takes the form of conduct rather than speech).

Here, the government seeks to regulate what the defendant did, not what they said.117See Rumsfeld v. F. for Acad. & Institutional Rts., Inc., 547 U.S. 47, 60 (2006) (explaining that federal law regulates “conduct, not speech” when “[i]t affects what law schools must do—afford equal access to military recruiters—not what they may or may not say”). (As Genevieve Lakier and Evelyn Douek explain, “the term stalking was borrowed from the hunting context to emphasize the similarities between the way a hunter stalks their prey and the practices of surveillance and following that characterized the first well-publicized stalking cases.”118Lakier & Douek, supra note 2, at 147.) Stalking laws thus frequently address conduct with only incidental burdens on expression—triggering (and generally satisfying) no more than intermediate scrutiny.

More specifically, the First Amendment analysis of the government’s regulation of such repeated and unwelcome conduct should either be rational basis review (if the court determines the conduct to be nonexpressive) or intermediate scrutiny (if the court determines the conduct to be expressive).119Rumsfeld, 547 U.S. at 65–66 (considering whether regulated conduct is sufficiently expressive to trigger First Amendment review). Determining whether regulated conduct is sufficiently expressive to trigger intermediate scrutiny generally turns on whether the actor intends to communicate a message through their conduct and whether onlookers reasonably understand the actor to be delivering a message through their conduct.120Texas v. Johnson, 491 U.S. 397, 404 (1989); Spence v. Washington, 418 U.S. 405, 410–11 (1974) (per curiam).

When a speaker repeatedly follows and watches their target, do they intend to communicate a message, and does their target understand them to be communicating a message? If, depending on the facts, the answer is “no,” deferential rational basis review will apply to the government’s enforcement.121E.g., Corrigan v. State, No. A23-1942, 2024 Minn. App. Unpub. LEXIS 604 at *10 (Minn. Ct. App. July 22, 2024) (“[The challenger’s] conviction here was based on his conduct in following, monitoring, or pursuing the other driver and not on the content of his expressions or speech. Thus, the holding in Counterman does not apply to [his] case.”). Perhaps some will take the view, however, that this conduct is expressive. For example, a speaker who repeatedly calls and hangs up on their target without saying anything (maybe only breathing heavily) might seek to send, and might be understood as communicating, a message of possessiveness, hostility, or even love toward the target such that application of the stalking law regulates repeated and unwelcome conduct that incidentally burdens expression.122See United States v. O’Brien, 391 U.S. 367 (1968) (applying intermediate scrutiny to the government’s restriction of expressive conduct and holding that the law satisfied such scrutiny because it was narrowly tailored to the government’s significant regulatory interest). Here, too, the First Amendment analysis should remain attentive to the target’s expressive interests. For example, the application of stalking law to this conduct satisfies intermediate scrutiny when the government’s regulatory interests are unrelated to the suppression of ideas and when the enforcement action instead seeks to address the life-disrupting—including speech-silencing—effects of conduct that has little if any First Amendment value of its own.123See R.A.V. v. City of St. Paul, 505 U.S. 377, 390 (1992) (“Where the government does not target conduct on the basis of its expressive content, acts are not shielded from regulation merely because they express a discriminatory idea or philosophy.”); Wisconsin v. Mitchell, 508 U.S. 476, 487 (1993) (explaining that state hate crimes statute targets violent conduct unprotected by First Amendment).

The Supreme Court’s analysis of First Amendment challenges to the enforcement of hate crimes laws to punish certain acts of violence illustrates these dynamics. Even when a defendant’s violence might seek to communicate, and be understood as communicating, a message of hatred based on the target’s protected class status, the Court has described hate crimes laws as the government’s constitutionally permissible regulation of conduct.124Mitchell, 508 U.S. at 487. Along the same lines, the Court has stated that the First Amendment poses no bar to the government’s regulation of verbal harassment in the workplace that “produce[s] a violation of Title VII’s general prohibition against sexual discrimination in employment practices.”125R.A.V., 505 U.S. at 389–90. In these cases, the Court did not state whether the regulated conduct—violent hate crimes and workplace harassment—was sufficiently expressive to trigger intermediate scrutiny, suggesting instead that the conduct did not merit First Amendment protection regardless of the review applied.126See id.; see also Mitchell, 508 U.S. at 487. Lower courts have taken similar approaches, for example, when holding that laws prohibiting the physical obstruction of reproductive health care facilities to ensure access to lawful health care services satisfy intermediate scrutiny even though the regulated obstruction may seek to communicate a message and be understood as communicating a message.127Terry v. Reno, 101 F.3d 1412, 1419 (D.C. Cir. 1996).

  1. Stalking That Takes the Form of Communications That Instill Fear Regardless of Their Content

Turn next to stalking prosecutions of communications that cause fear because of their repeated and unwelcome nature—in other words, because of those communications’ frequency, volume, or persistence rather than their content.128See Counterman v. Colorado, 143 S. Ct. 2106, 86 (Sotomayor, J., concurring in part and concurring in the judgment) (“The content of the repeated communications can sometimes be irrelevant, such as persistently calling someone and hanging up, or a stream of ‘utterly prosaic’ communications.” (quoting Id. at 2111–12)); State v. Labbe, 314 A.3d 162, 179–80 (Me. 2024) (“The ‘course of conduct’ for which [the defendant] was indicted and convicted involved a series of electronic communications—phone calls and texts—to the victim during a period of several weeks. Viewed in the context of the record as a whole, the stalking charge here was not predicated on the content of those communications but rather on the act of communicating itself—the repeated, unwelcome contact carried out through electronic devices—even after he was asked to stop; even after his possessions were returned; and even after he had been served with a protection order prohibiting him from having any direct or indirect contact with the victim. . . . This is plainly evident from the record. The content of the calls and messages was not threatening (‘utterly prosaic’); some were devoid of meaningful content; some were unanswered or were merely hang-ups; one consisted of dead air and just breathing.”). This can be the case, for example, of fact pattern C, where the defendant called the target every day with prosaic messages like “Hello beautiful.” Or by leaving a daily message on the target’s answering machine playing the target’s favorite song. Along the same lines, consider a speaker who made:

“multiple [phone calls] throughout the evening, often ‘back-to-back,’ ” and “into the early morning hours,” despite being told that he “needed to stop calling” and “I don’t want you calling this house anymore.” When the complainant unplugged her phone, the defendant then called each of her parents and he was again told not to call. A few days later, he showed up at the complainant’s apartment building and “stood outside for a couple of minutes,” until he was directed to leave by security. Then he returned the following day again, and “security informed him that he was not permitted in the building.” Several months later, he again placed “nonstop calls” to the complainant from 1:30 a.m. to 3:00 a.m., and during that time he again showed up to the complainant’s apartment and tried calling her from the apartment’s call box. He then tried sneaking into the apartment building to get to the complainant, but was again thwarted. Notice that we have not said one word about the content of the defendant’s speech . . . because it was immaterial to his stalking conviction. He could have been trying to sell his victim a vacuum cleaner and the above actions would still have amounted to stalking.129Mashaud v. Boone, 295 A.3d 1139, 1161 (D.C. 2023) (citations omitted) (describing the facts in Atkinson v. United States, 121 A.3d 780 (D.C. 2015)).

The content-neutral regulation of such repeated and unwelcome communications again triggers intermediate scrutiny, in which courts again assess whether the restriction is narrowly tailored to serve a significant government interest. Courts undertaking this intermediate scrutiny consider, among other things, whether the government’s content-neutral regulation leaves open ample alternative means of expression.130See Frisby v. Schultz, 487 U.S. 474, 484–88 (1988) (upholding a town’s content-neutral ban on picketing targeted at specific homes as narrowly tailored to achieve the government’s significant interest in protecting residential privacy, especially because it left untouched ample alternative means of communication like distributing literature door-to-door). Moreover, the Supreme Court has made clear that the government’s content-neutral speech regulation “need not be the least restrictive or least intrusive means of” achieving its interests; instead, the government’s content-neutral regulation of speech satisfies intermediate scrutiny when it advances a substantial government interest that would otherwise be achieved less effectively.131Ward v. Rock Against Racism, 491 U.S. 781, 798–99 (1989).

Here, too, this analysis can and should foreground targets’—not just speakers’—free speech interests. The content-neutral application of stalking law to repeated and unwelcome communications regardless of their content satisfies intermediate scrutiny when the government’s regulatory interests are unrelated to the suppression of ideas and when the enforcement action instead seeks to address the life-disrupting—including speech-silencing—effects of repeated and unwelcome communications. That the traditional self-help remedies of exit and voice are so often ineffective—and indeed, frequently dangerous—for their targets further support the enforcement of stalking law as a narrowly tailored response.

  1. Stalking That Takes the Form of Threatening Speech

Depending on the circumstances, fact pattern D (daily messages telling the target to “die”) might support a content-neutral stalking prosecution based on the communications’ repeated and unwelcome time, place, and manner, regardless of their content. And depending on the circumstances, fact pattern D may also support prosecution as true threats, which now requires proof of the defendant’s conscious disregard of the risk that his statements were causing his target to fear for her physical safety in addition to proof of each of the statutory elements. Note that these two possibilities require prosecutors and plaintiffs, as a strategic matter, to choose between distinct theories that trigger different First Amendment analyses.132See Lakier & Douek, supra note 2, at 203 (“[L]ike most stalking laws, the Colorado law under which Counterman was convicted not only requires that the emotionally distressing communications be made on multiple occasions but also requires proof that those speech acts have a significant emotionally distressing effect on their recipient, and reasonably so. All of these requirements cabin the reach of the law and ensure that what it punishes is sustained and abusive communication, not an isolated, and therefore potentially misconstrued, speech act.”).

  1. Stalking That Involves Both Conduct and Speech

The foregoing examples illustrate how the variety of repeated and unwelcome behaviors that constitute stalking can invite enforcement under different theories that trigger distinct First Amendment analyses. Some fact patterns involve repeated and unwelcome fear-inducing conduct—and, depending on the facts, that conduct may or may not be expressive. Some involve repeated and unwelcome speech that induces fear not because of its content but because of its repeated and unwelcome time, place, or manner. Some involve repeated and unwelcome speech that induces fear at least in part because of its threatening content.133See, e.g., State v. Lindell, 828 N.W.2d 1, 2–3 (Iowa 2013) (upholding stalking conviction based on repeated contact that included both speech and conduct like a “handwritten note and flowers,” “hang-up calls,” physical surveillance, and damage to personal property). And some fact patterns may involve combinations that invite prosecutors and plaintiffs to make strategic choices among multiple theories.134Again, theories that do not rely on evidence of speech of a threatening nature as an element of the case do not trigger Counterman’s recklessness requirement. But see Lakier & Douek, supra note 2, at 169 (expressing skepticism that stalking laws can be applied to communications in content-neutral ways, and canvassing the relevant regulatory tradition to suggest the possibility of a category of less-protected “unwanted, persistent and fear-producing speech” in which some showing of mens rea like recklessness might still be required). Whatever the First Amendment analysis, however, it should include attention to targets’, as well as defendants’, expressive interests.

Conclusion

Speakers who fear the prospect of the government’s punishment often express themselves less—or express themselves differently—than they would if they were not fearful. This, in turn, harms the speaker’s and the public’s First Amendment interests by stifling the delivery of opinions, facts, and ideas.

At the same time, targets fearful for their physical safety at the hands of a speaker often speak less, and speak differently, than they would if they were not fearful. And this, too, harms both the target’s and the public’s First Amendment interests.

Fear, and speech, are thus on both sides of threats cases and also many stalking cases. Courts’ doctrinal choices in threats and stalking cases sometimes chill speakers’ expression. And sometimes they instead permit the silencing of targets’ speech. A robust commitment to free speech, in my view, requires attention not only to the speech deterred by legal standards that are too quick to punish speakers but also to the speech silenced when the law fails adequately to protect the targets of threats and stalking from reasonable fear for their safety.

When courts ignore targets’ free speech interests to privilege defendants’ free speech interests, they pretend to make hard First Amendment problems easy. But principled problem-solving requires that we take care to recognize and explain what makes difficult problems difficult, as is the case here, where we must choose between speakers’ and targets’ important free speech interests.

Courts must, and do, make choices all the time when calibrating the categories of unprotected speech (for example, in true threats cases), and when otherwise applying First Amendment doctrine (for instance, in stalking cases that do not allege true threats). The Court’s choice in Counterman to privilege speakers’ free speech interests over targets’ was a choice—but that choice was neither inevitable nor necessarily speech-protective. When we illuminate, rather than obscure, the free speech injuries experienced by the targets of threats and stalking, we can identify doctrinal choices that attend to targets’ expressive interests as well as defendants’.

 

98 S. Cal. L. Rev. 1351

Download

*  University Distinguished Professor and Rothgerber Chair in Constitutional Law, University of Colorado School of Law. Thanks to RonNell Andersen Jones, Nelson Tebbe, Alan Chen, Danielle Keats Citron, Yasmin Dawood, Margot Kaminski, Christina Koningisor, Margaret Kwoka, Genevieve Lakier, Lyrissa Lidsky, Toni Massaro, Joe Michaels, Francesca Procaccini, Blake Reid, Scott Skinner-Thompson, Phil Weiser, and the participants at Yale Law School’s Free Expression Scholars Conference and the University of Southern California Gould School of Law’s symposium on “The First Amendment and Listener Interests” for their insightful comments and questions. Thanks, too, to Kenzie Larrenaga, Devin Schultze, Olivia Sharp, and Claire Power Tate for outstanding research assistance.

Fintech and Techno-Solutionism

Silicon Valley–style technological innovation is ill-suited to address complex problems like financial inclusion and concentrated market power, yet promises abound that “fintech” can fix them. This oversimplified reduction of complex structural problems into technological puzzles has been critiqued as “techno-solutionism,” and it poses real dangers for public policy. When we start with the tech industry’s favored tools and then ask how to solve complex problems using those tools—rather than starting by defining the problem to be solved—it can distract policymakers from supporting real, structural solutions. Techno-solutionism can also deter policymakers from interrogating the limitations, and regulating the harms, of the proffered technological solutions.

This Article argues that not only are many fintech products themselves extremely techno-solutionist, but techno-solutionism is also impeding financial regulation’s ability to protect the public from fintech’s harms. It makes several contributions: First, this Article introduces into the financial regulation literature theories of how the law can perpetuate, and then be stymied by, techno-solutionism. Second, it comprehensively calls out the techno-solutionism inherent in many fintech offerings (particularly crypto), laying bare their harms and demonstrating where they are unable to solve the problems they claim to address. Such harmful nonsolutions do not warrant accommodative regulatory treatment—and yet, some policymakers have sought to give fintech products just that. This Article’s third contribution is a detailed exploration of techno-solutionism’s impact on U.S. financial regulatory policy as it pertains to fintech. This Article also uses this lens to consider how techno-solutionism might impact the regulation of AI in financial services.

 

Introduction

Technology has been an integral part of finance for a long time, but the rise of “fintech” has placed Silicon Valley–style technological innovation front and center in financial services. New technologies and technology-based business models have been developed as putative solutions to the limitations of the financial system, but fintech often fails to address the problems it claims to solve. Instead, fintech tends to create new problems that remain unaddressed because of misguided assumptions that technology can fix any problem—including the ones it causes. This “mistaken belief that we can make great progress on alleviating complex dilemmas, if not remedy them entirely, by reducing their core issues to simpler engineering problems” has been dubbed “techno-solutionism.”1Evan Selinger, The Delusion at the Center of the A.I. Boom, Slate (Mar. 29, 2023, 10:00 AM), https://slate.com/technology/2023/03/chatgpt-artificial-intelligence-solutionism-hype.html [https://perma.cc/4DPC-NF2W]. For more on the history of the term techno-solutionism, see Henrik Skaug Sætra & Evan Selinger, Technological Remedies for Social Problems: Defining and Demarcating Techno-Fixes and Techno-Solutionism, 60 Sci. & Eng’g Ethics 1, 7–13 (2024). It is predicated on a reductionist worldview that sees complex problems flattened into engineering puzzles and neglects their multifaceted history and context.

This Article argues that not only are many fintech products themselves extremely techno-solutionist, but techno-solutionism is also impeding financial regulation’s ability to protect the public from fintech’s harms. Techno-solutionism is often evident in conversations about the financial applications of technologies like artificial intelligence (“AI”), blockchain, cloud computing, and application programming interfaces (“APIs”), which have been promoted as having the power to make the delivery of financial services more inclusive, more efficient, more competitive, and more secure. While there may be promise in some fintech business models, this Article explains why fintech’s ability to solve long-standing, complex problems is often oversold. This Article also explores how techno-solutionist fintech hype can distract from more meaningful solutions to long-standing problems and obscure fintech’s harms.

Fintech marketing has correctly identified many of the pain points in traditional finance, but these pain points are largely structural problems that cannot be addressed by tech-centric business models that disregard economic and political realities. In this regard, fintech solutions are emblematic of a broader techno-solutionist Silicon Valley worldview that disregards context—as Silicon Valley historian Margaret O’Mara describes it, “Why care about history when you were building the future?”2Margaret O’Mara, The Code: Silicon Valley and the Remaking of America 7 (2020). Unfortunately, despite the flimsiness of many fintech promises—and despite the harms that many fintech business models have inflicted on the public—techno-solutionist rhetoric about fintech’s potential has been stubbornly resilient. This rhetoric sets the scene for a “wait-and-see” legal environment designed to allow these technological solutions to flourish without regulatory intervention. This Article argues that such accommodative inaction is unacceptable, given how damaging financial harms (to individuals, and to the broader economy) can be, but unfortunately lawmakers and financial regulators have been encouraged to internalize a techno-solutionist perspective by the fintech businesses and venture capitalists who will profit from such accommodative legal treatment.

Techno-solutionism is not a purely private sector creation, however. Sometimes—whether through the expressive value of their words or the more concrete impacts of their action or inaction—lawmakers and financial regulators perpetuate the very techno-solutionism that will ultimately undermine their ability to protect the public from harm. If financial regulators are convinced or forced to get out of the way so that technological innovation can go ahead and fix things, then that will create a conducive environment for the fintech industry and its funders to arbitrage regulatory requirements and perhaps even harden that arbitrage into durable legal permissions (a strategy known as “regulatory entrepreneurship”).3Elizabeth Pollman & Jordan M. Barry, Regulatory Entrepreneurship, 90 S. Cal. L. Rev. 383, 385, 392–98 (2017). To illustrate these dynamics, this Article will examine examples of legislative proposals and administrative actions that highlight where techno-solutionism seems to be driving policy around fintech, as well as examples of pushback against techno-solutionism. This Article also examines nascent regulatory approaches to AI’s financial applications through this lens.

The primary aim of this Article is to identify and describe the problems that techno-solutionism creates for financial regulatory policy but that of course invites questions about what can be done to remedy the situation. Recognizing that techno-solutionism is a heuristic that probably will not be eliminated without an alternative, this Article argues that financial regulators and lawmakers should instead adopt a posture of contextually informed skepticism that draws on domain knowledge about what can go wrong in finance and is sensitive to the harms that fintech may cause. Of course, there are many structural impediments to such a shift in perspective and it will not be easily accomplished. Right now, the best that we can do may be to simply call out the phenomenon of techno-solutionism where we see it and, in doing so, rob it of some of its power.

The rest of this Article will proceed as follows: Part I will explore the concept of techno-solutionism, emphasizing its dangers for public policy as a general matter. Part I will also provide some insight into techno-solutionism’s relationship with the venture capital industry and with the law. Part II will look more specifically at fintech technologies and business models and expose the techno-solutionism inherent in fintech’s claims to improve financial inclusion, efficiency, competition, and security. Part III will explore the relationship between financial regulation and techno-solutionism, looking at legislative proposals and administrative actions relating to crypto and other fintech. Part III will also consider prospectively how techno-solutionism may impact regulation of the use of AI in financial services. Part IV suggests a posture of contextually informed skepticism as an alternative to techno-solutionism, before the final Part concludes.

I.  Techno-Solutionism

A.  What Is Techno-Solutionism?

In his 2023 Techno-Optimist Manifesto, leading venture capitalist Marc Andreessen stated his belief that “there is no material problem—whether created by nature or by technology—that cannot be solved with more technology.”4Marc Andreessen, The Techno-Optimist Manifesto, Andreessen Horowitz (Oct. 16, 2023), https://a16z.com/the-techno-optimist-manifesto [https://perma.cc/42BC-7JUN]. This techno-optimist sentiment has a long heritage: in his book American Technological Sublime, David Nye recounts that technological achievements, ranging from “the first railroads, suspension bridges, skyscrapers, city skylines” to “atomic explosions, and the rockets of the space program” have been central to the American national identity for centuries.5David E. Nye, American Technological Sublime 282 (1996). While it does not always get as much oxygen, criticism of techno-optimism is not a new phenomenon, either. Critiques of “techno-fixes” date back to the 1960s,6Sætra & Selinger, supra note 1, at 1. and interrogations of “innovation worship” and the “cult of innovation” can be found at least as far back as the 2000s.7See, e.g., Dan Saffer, The Cult of Innovation, Bloomberg (Mar. 5, 2007), https://www.bloomberg.com/news/articles/2007-03-04/the-cult-of-innovation [https://perma.cc/8HT5-LPXK].

In his 2013 book, To Save Everything, Click Here: The Folly of Technological Solutionism, Evgeny Morozov popularized the related critical term “technological solutionism.”8Evgeny Morozov, To Save Everything, Click Here: The Folly of Technological Solutionism 5 (2013). Morozov intends techno-solutionism as a pejorative, one that describes the tendency to “[r]ecast[] all complex social situations either as neatly defined problems with definite, computable solutions or as transparent and self-evident processes that can be easily optimized—if only the right algorithms are in place!”9Id. at 5. In their critique of fintech, Jones and Maynard, Jr. use the related term “technotopian.” Lindsay Sain Jones & Goldburn P. Maynard, Jr., Unfulfilled Promises of the FinTech Revolution, 111 Calif. L. Rev. 801, 804 (2023). Furthermore, Morozov considered techno-solutionist solutions to be “likely to have unexpected consequences that could eventually cause more damage than the problems they seek to address.”10Morozov, supra note 8, at 5.

While solutionism itself is nothing new—people have always sought easy solutions to complex problems—Morozov was particularly interested in the solutionism associated with that nebulous thing we call “the Internet.”11Id. at 17. Morozov argued that the internet allows solutionism to be scaled in a way that was never before possible—as he describes it: “the latest technologies make the fixes easier, cheaper, and harder to resist.”12Id. at xv. In recent years, internet technologies have been coupled with increased computing power, mass data storage capabilities, and automation to make technological solutions even more powerful, cheaper, and harder to resist than in 2013. Morozov’s concern—that the way we conceptualize social problems is skewed by our desire to solve them with increasingly fancy technological silver bullets—is only becoming more relevant.

Techno-solutionism is in many ways de-contextual: it fails to investigate the context of the problem at hand and starts instead with the technological tools available to fix things.13Malcolm Campbell-Verduyn & Marc Lenglet, Imaginary Failure: RegTech in Finance, 28 New Pol. Econ. 468, 471 (2023). This has also been described as an “isolationist approach to technology and technological change.” Henrik Skaug Sætra, Introduction: The Promise and Pitfalls of Techno-Solutionism, in Technology and Sustainable Development: The Promise and Pitfalls of Techno-Solutionism 1, 4 (Henrik Skaug Sætra ed., 2023). Much as too much reliance on mathematical models can cause us to focus on the risk that can be measured rather than the risk that matters,14For a discussion of the dangers of focusing financial models on the risks that can be measured rather than the risks that matter, see James Hackney, Regulating Through Financial Engineering: The Office of Financial Research and Pull of Models, 50 Loy. U. Chi. L.J. 695, 698–700, 703 (2019). techno-solutionism can flatten complex problems into just the elements that lend themselves to easy technological fixes, and ignore the rest.15“[T]he very availability of cheap and diverse digital fixes tells us what needs fixing.” Morozov, supra note 8, at xv. Reducing problems to their technological elements can be very seductive, particularly during times of political dysfunction when solving structural problems through democratic means seems nigh on impossible. But the resulting technological solutions are typically inadequate at best, harmful at worst, because they fail to reckon with both the complexity of the issues they purport to solve and their impacts

on people excluded from the technological development process.16Regarding the “fundamental mismatch between complex social issues and tech solutionism,” see Greta Byrum & Ruha Benjamin, Disrupting the Gospel of Tech Solutionism to Build Tech Justice, Stan. Soc. Innovation Rev. (June 16, 2022), https://ssir.org/articles/entry/disrupting_the_gospel_of_tech_solutionism_to_build_tech_justice [https://perma.cc/M7V8-WJ8S]. Sometimes, we will be better off without the proposed technological solution; at other times, the technological solution may have merit but will be effective only as part of a package of other structural reforms, and may require strong regulation.

As an ideology, techno-solutionism also tends to cast technological development as an inevitability,17Hearing on Oversight of A.I.: Legislating on Artificial Intelligence Before the Subcomm. on Priv., Tech., and the L. of the S. Comm. on the Judiciary, 118th Cong. 11–13 (2023) [hereinafter Hartzog Testimony] (Statement of Woodrow Hartzog, Professor of Law, Boston University). Cohen (disparagingly) describes this orientation as “[i]f innovation is autonomous, then what is produced is what should be produced. Regulators can only get in the way, and when they do we are all worse off, so they should not meddle.” Julie E. Cohen, Between Truth and Power: The Legal Constructions of Informational Capitalism 91 (2019). and those who seek a more textured understanding of problems and technologies as Luddites or cranks standing in the way of progress.18Cohen, supra note 17, at 105, 195. See also Morozov, supra note 8, at xiii, on techno-solutionism’s blunting of our ability to ask questions. As Section I.C will explore in more detail, a techno-solutionist orientation can be weaponized to inhibit regulation of a technology’s associated harms (in particular, the complexity of the underlying technology can be weaponized to deflect oversight and restraint). More subtly, technologies that overpromise but are incomplete solutions to complex structural problems can also be distractions, alleviating political pressure for solutions to the non-technological dimensions of problems.19Techno-solutionism does not envision “fundamental change to the long-existing regulatory perspectives,” and so distracts attention from other approaches to financial regulation. Campbell-Verduyn & Lenglet, supra note 13, at 473. As tech ethicist Elizabeth Renieris has put it, “Our imaginations and resources are once again diverted from fixing or rehabilitating what exists”20Elizabeth M. Renieris, Amid the Hype Over Web3, Informed Skepticism Is Critical, CIGI (Jan. 14, 2022), https://www.cigionline.org/articles/amid-the-hype-over-web3-informed-skepticism-is-critical [https://perma.cc/N94L-C99F].: when the technological solution is pitched as so exceptional, the slow plodding changes of structural reform seem less worthy by comparison.21“The use of technology to transform the lives of these individuals has particular allure when all other policy prescriptions have seemingly failed,” Christopher K. Odinet, Predatory Fintech and the Politics of Banking, 106 Iowa L. Rev. 1739, 1746 (2021); techno-solutionism “promises an affordable, if not cheap, silver bullet in a world with limited resources for tackling many pressing problems,” Selinger, supra note 1. This dynamic is sometimes evident, for example, in policy debates about climate change, where the promise of new technologies has sometimes undercut support for policies to reduce emissions.22Sætra, supra note 13, at 2.

While techno-solutionist solutions will rarely benefit society writ large, fighting techno-solutionism is an uphill battle. Not only is techno-solutionism highly profitable for Silicon Valley and not only does the law help entrench techno-solutionism (as the next Sections will explore), but our brains are also hardwired toward techno-solutionism to some extent. Humans have long sought easy solutions to complex problems,23Scholars have been engaging critically with different kinds of “solutionism” since at least the 1950s. Sætra & Selinger, supra note 1, at 7. “It feels good to believe that in a complicated world, tough challenges can be met easily and straightforwardly.” Selinger, supra note 1. and we are also susceptible to what are known as “automation biases”: tendencies to defer to technologically-generated outputs as more correct and legitimate than human judgments.24For a discussion of automation bias, see Linda J. Skitka, Kathleen Mosier & Mark D. Burdick, Accountability and Automation Bias, 52 Int. J. Hum.-Comput. Stud. 701, 701–05 (2000). If we perceive the output of technology to be inherently accurate and superior to anything a human could produce, we will be dissuaded from asking whether technology offers a true solution to the problem at hand.25“[T]echnological solutionism reinforces optimism about innovation—particularly the technocratic idea that engineering approaches problems to problem-solving are more effective than alternatives that have social and political dimensions.” Selinger, supra note 1.

Even critics of new technologies can fall into the trap of techno-solutionism. By critiquing the hype spun by the technology’s developers rather than critiquing the technology’s reality and limitations, they can unintentionally validate and amplify that hype in the process.26For a discussion of the phenomenon of “criti-hype,” see Lee Vinsel, You’re Doing It Wrong: Notes on Criticism and Technology Hype, Medium (Feb. 1, 2021), https://sts-news.medium.com/youre-doing-it-wrong-notes-on-criticism-and-technology-hype-18b08b4307e5 [https://perma.cc/4XW3-YY4W]. Critics can also entrench techno-solutionism by demanding that these developers fix the technology’s problems with more of their own technology, rather than demanding regulatory or other non-technological solutions.27For a discussion of this issue in the context of children’s online safety, see María P. Angel & danah boyd, Techno-Legal Solutionism: Regulating Children’s Online Safety in the United States, 2024 CS&Law 86, 91, https://dl.acm.org/doi/10.1145/3614407.3643705 [https://perma.cc/G8VU-K64N] (“Policymakers not only argue that social media platforms are the site of the problem; they also frame technology as the site of the fix. As KOSA’s Section 3 makes evident, their rationale appears to go as follows: if design features are the problem, requiring good design can make the harms go away.”).

Take, for example, new developments in AI. There will likely be a variety of harms associated with these developments—for example, some kinds of jobs may be eliminated, and the proliferation of phishing scams, misinformation, and discrimination are all likely to increase.28On AI discrimination, see generally Ziad Obermeyer, Brian Powers, Christine Vogeli & Sendhil Mullainathan, Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations, 366 Sci. 447 (2019). However, many leading figures in the AI industry (including OpenAI founder Sam Altman) have claimed potential harms on a much greater scale, co-signing a statement that reads, “Mitigating the risk of extinction from A.I. should be a global priority alongside other societal-scale risks such as pandemics and nuclear war.”29Kevin Roose, A.I. Poses ‘Risk of Extinction,’ Industry Leaders Warn, N.Y. Times (May 30, 2023) https://www.nytimes.com/2023/05/30/technology/ai-threat-warning.html [https://perma.cc/M6F3-LLZ9]. This invocation of AI-doomerism may be self-serving, however, if it is intended to distract lawmakers and regulators from AI’s near-term harms and to encourage them to put their faith in private sector technological solutions for heading off more cataclysmic potential harms.30As OpenAI CEO Sam Altman said in a Senate Committee hearing, “I think if this technology goes wrong, it can go quite wrong . . . We want to work with the government to prevent that from happening.” Id. It is critical, as the debate about regulating AI (and other technologies) progresses, that critics engage with technology’s present realities and not just its hype—even if that hype is apocalyptic in nature.31Selinger, supra note 1.

B.  Techno-Solutionism and Venture Capital

Techno-solutionism does not just flatten complex problems; it often flattens the concept of technology itself. If we believe that the only solution we need lies in the components of a machine or lines of software code, we miss the “relationship[] between them and people.”32Norman Balabanian, On the Presumed Neutrality of Technology, IEEE Tech. & Soc’y Mag., Winter 2006, at 15, 16. When conceptions of technology are stripped of the human agency involved in developing and using the technology, that gives technology an undeserved veneer of neutrality. It also leads to naïve assumptions that the same technology will have the same results regardless of the time and place in which it is deployed.33Morozov, supra note 8, at 260; Campbell-Verduyn & Lenglet, supra note 13, at 474; see also Meg Leta Jones, Does Technology Drive Law? The Dilemma of Technological Exceptionalism in Cyberlaw, 2018 U. Ill. J.L. Tech. & Pol’y 249, 251 (2018) (“[A] great deal of variation and messiness is found when looking at the same technology in different times and places.”). Such purported neutrality and universality are common talking points: we regularly hear statements like, “Technology is technology. It isn’t criminal. It has no motive. It’s not looking to make more money. It just balances accounts,”34Serj Korj (@SerjKorj), X (Mar. 11, 2023, 11:48 AM), https://twitter.com/SerjKorj/status/1634642595237208067 [https://perma.cc/RLY2-6RXZ] (quoting former U.S. Acting Comptroller of the Currency, Brian Brooks). and “technology is universalist. Technology doesn’t care about your ethnicity, race, religion, national origin, gender, sexuality, political views, height, weight, hair or lack thereof.”35Andreessen, supra note 4. But the reality is that technology is never neutral; it cannot exist or function separate and apart from the human beings who create and deploy it.36“Scholarship in science and technology studies has shown that new technologies do not have predetermined, neutral trajectories, but rather evolve in ways that reflect the particular, situated values and priorities of both their developers and their users.” Cohen, supra note 17, at 3; see also Paul Ohm & Jonathan Frankle, Desirable Inefficiency, 70 Fla. L. Rev. 777, 800 (2018).

Because the development of technology is not a neutral process, it is important to consider the incentives of those who develop and sell it. When technologies are developed by for-profit businesses, those businesses have strong incentives to develop those technologies in the way that will most benefit them financially (even if doing so could inflict harm on society).37For a discussion of misconduct by tech “unicorns” like Theranos, Uber, and Juul that detrimentally impacted non-investor third parties, see Matthew Wansley, Taming Unicorns, 97 Ind. L.J. 1203, 1215–24 (2022). Regarding the political and economic power that may be bound up in a technology, see Jones, supra note 33, at 257. See also Hartzog, supra note 17, at 8 (“[D]angerous, disruptive systems are being released on the world by for-profit companies with scant regard to the potential larger societal effects produced by these systems.”). Some have gone further to argue that the technological solutions produced by Silicon Valley are designed to thwart real solutions to structural problems: “After all, how could those occupying powerful positions in the tech industry—having directly benefited from the racist, sexist, and classist status quo—ever develop tools that would undo those very sources of power?” Byrum & Benjamin, supra note 16. Financial incentives will also impact how startup founders and their tech employees describe their technologies to others, including the venture capital (“VC”) firms they approach for funding.38“[C]omputer scientists and engineers are critical participants in propagating ideas about the nature, purposes, and social significance of their work.” Silvia Semenzin, ‘Blockchain for Good’: Exploring the Notion of Social Good Inside the Blockchain Scene, Big Data & Soc’y, July-December 2023, at 1, 2. VCs display significant herd behavior in choosing which “hot” technologies to fund,39Peter Lee, Enhancing the Innovative Capacity of Venture Capital, 24 Yale J.L. & Tech. 611, 616 (2022). with the result that founders trying to attract capital are likely to start by asking “how can we use [currently favored technology] to solve X?,” rather than “how can we best solve X?”40Molly White, Blockchain Solutionism (Lecture Transcript), Molly White (Sept. 21, 2022), https://blog.mollywhite.net/blockchain-solutionism-lecture [https://perma.cc/W2NG-2CGF].

Compensation for the VCs themselves will depend on the dollar amounts invested in their funds, and on the profits their funds generate by deploying those dollars to fund and then sell startups.41“The [limited partners] compensate the VCs in two ways: an annual management fee of 2% of the fund’s assets and ‘carried interest’ equal to 20% of the fund’s profits.” Matthew T. Wansley & Samuel N. Weinstein, Venture Predation, 48 J. Corp. L. 813, 832 (2023). In order to maximize their own compensation, VCs must therefore find (and develop a reputation for finding) startups that will grow exponentially in the five or six years before they must be sold in order to return profits to the fund’s investors.42Lee, supra note 39, at 668–69. Although venture capital (“VC”) funds typically have a term of ten or twelve years, “[v]etting and selling startups takes time, so VCs only have about five to six years between investment and exit for their startups to grow in value.” Wansley & Weinstein, supra note 41, at 832. For more on the pressures VC faces to exit investments, see Elizabeth Pollman, Startup Governance, 168 U. Penn. L. Rev. 155, 209–16 (2019). Venture capital is not a passive investment strategy: as Wansley and Weinstein put it, “[t]he most successful VCs . . . do not just try to find home runs—they try to build home runs.”43Wansley & Weinstein, supra note 41, at 833. VCs’ compensation therefore tends to depend on their ability to engineer exponential growth for their ventures—through managerial advice, certainly,44Elizabeth Pollman, Adventure Capital, 96 S. Cal. L. Rev. 1341, 1354 (2024). but also by manufacturing hype for industries,45See, e.g., Daren Matsuoka, Eddy Lazzarin, Robert Hackett & Stephanie Zinn, 2023 State of Crypto Report: Introducing the State of Crypto Index, a16zcrypto (Apr. 11, 2023), https://a16zcrypto.com/posts/article/state-of-crypto-report-2023 [https://perma.cc/CZ6E-C2UW]. For further discussion of Andreessen Horowitz’s efforts to hype the crypto industry, see Hilary J. Allen, Interest Rates, Venture Capital, and Financial Stability, U. Ill. L. Rev. (forthcoming 2025) (manuscript at 23–28), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4513037. lobbying,46See, e.g., Eric Lipton, Daisuke Wakabayashi & Ephrat Livni, Big Hires, Big Money and a D.C. Blitz: A Bold Plan to Dominate Crypto, N.Y. Times (Oct. 29, 2021) https://www.nytimes.com/2021/10/29/us/politics/andreessen-horowitz-lobbying-cryptocurrency.html [https://web.archive.org/web/20221226052114/https://www.nytimes.com/2021/10/29/us/politics/andreessen-horowitz-lobbying-cryptocurrency.html]. and engaging in predatory pricing.47Wansley & Weinstein, supra note 41, at 817.

In short, the technological solutions that receive VC funding will not necessarily be the best solutions. Often, society would benefit from more nuanced solutions that would involve non-technological elements and take a lot longer to develop than VCs and their investors would tolerate.48Mariana Mazzucato, The Entrepreneurial State: Debunking Public vs. Private Sector Myths 12 (2011). Furthermore, the VC industry is notoriously white and male, and notoriously funds founders with whom VCs have social connections49Lee, supra note 39, at 650–51.: this limits the perspectives brought to bear on how technology should solve problems, often excluding the possibility of public sector solutions as well as the voices of those who actually experience the problem in question.50Techno-solutionism can “shape our societies in ways unrooted in democratic processes and democratic will.” Sætra, supra note 13, at 6–7. Semenzin discusses “the prevailing cultural values of Silicon Valley, portraying society as classless and devoid of socioeconomic struggles, advocating the idea that technological markets, rather than government intervention, act as the catalyst for improving people’s lives.” Semenzin, supra note 38, at 12. Notwithstanding persistent claims that technological innovation exists to “make the world a better place,”51“Technological innovation in a market system is inherently philanthropic, by a 50:1 ratio.” Andreessen, supra note 4. Silicon Valley historian Margaret O’Mara has observed that “[t]he Valley’s engineering-dominated culture rewarded singular, near-maniacal focus on building great products and growing markets, and as a consequence often paid little attention to the rest of the world.”52O’Mara, supra note 2, at 7. And yet, a techno-solutionist perspective tends to assume that the solutions emerging from Silicon Valley, even if uninformed by domain expertise, are the superior ones.53“The techno-capital machine makes natural selection work for us in the realm of ideas. The best and most productive ideas win and are combined and generate even better ideas.” Andreessen, supra note 4.

This disregard for history and outside perspectives can lead to a disregard for non-technological dimensions of problems, as well as a disregard for technology’s harms. In the absence of any legal requirements to minimize those harms, there is no reason to think that they will be addressed by technologists or their VC funders.54Prominent AI ethicist Dr. Timnit Gebru, for example, has said, “Our recommendations basically say that before you put anything out, you have to understand what’s in your data set and document it thoroughly . . . . But at the end of the day this means taking more time, spending more resources and making less money. Who’s going to do that without legislation?” Emily Bobrow, Timnit Gebru Is Calling Attention to the Pitfalls of AI, Wall St. J. (Feb. 24, 2023) https://www.wsj.com/articles/timnit-gebru-is-calling-attention-to-the-pitfalls-of-ai-8e658a58 [https://web.archive.org/web/20230329183721/https://www.wsj.com/articles/timnit-gebru-is-calling-attention-to-the-pitfalls-of-ai-8e658a58?cx_testId=3&cx_testVariant=cx_170&cx_artPos=7&mod=WTRN]. And yet a techno-solutionist perspective tends to assume that subsequent technological interventions will inevitably fix any problems technology creates, without the need for any government interference.55Jodi L. Short, Reuel Schiller, Susan S. Silbey, Noah Jones, Babak Hemmatian & Leeanna Bowman-Carpio, The Dog That Didn’t Bark: Looking for Techno-Libertarian Ideology in a Decade of Public Discourse About Big Tech Regulation, 19 Ohio St. Tech. L.J. 1, 10 (2022); Andreessen, supra note 4. Indeed, techno-solutionism is often weaponized to discourage government oversight, as the next Section will explore.

C.  Techno-Solutionism and the Law

Technological advances may challenge laws but they do not in and of themselves drive changes in the law—people do.56Jones, supra note 33, at 253. The ways in which people like legislators, regulators, and judges respond to technological advances change how law is applied and developed, and the phenomenon of techno-solutionism can drive law if it impacts these individuals and their responses. Laws and legal institutions that are influenced by techno-solutionism can also nurture and entrench techno-solutionism in a vicious cycle. While a comprehensive discussion of the relationship between techno-solutionism and the law is beyond the scope of this Article, this Section will provide an overview of some of the ways in which the law helps perpetuate the very techno-solutionism that can ultimately co-opt and stymie the law’s harm protection functions.

  1. How Law Perpetuates Techno-Solutionism

The starting point here is to recognize that no technology business is built in a vacuum. Any business is built in an environment constructed by laws, and the laws themselves have been impacted by currents of economic and political power.57Cohen, supra note 17, at 1. Laws and legal institutions engage with technology-based business models from the beginning,58“Not only does law not linearly follow technology, a great deal of legal work shapes technology and the way in which it will be understood in the future.” Jones, supra note 33, at 278; see also Hilary J. Allen, Regulatory Sandboxes, 87 Geo. Wash. L. Rev. 579, 587–88 (2019). and those laws and legal institutions have been “enlisted to help produce the profound economic and sociotechnical transformations that we see all around us.”59Cohen, supra note 17, at 2. If citizens concerned about public harms cede the legal sphere to businesses with vested interests in structures that insulate them from the consequences of perpetrating harms, then the ability of the law to protect the public from harm will be further eroded.60Id. at 9. This is a pervasive political economy problem, but it will be exacerbated by techno-solutionism if public-minded citizens cede their ground because those who stand to profit also have intimidating technological bona fides.

The influence of techno-solutionism can shape laws in ways that can maximize industry profitability at the expense of the public interest. We often hear that technologies can “solve all of our most pressing problems—if only the law, which cannot move at the speed of human thought, will stop undermining technology’s potential and either get with the program or get out of the way.”61Id. at 1. As Jodi Short and her colleagues have observed, “no industry has been more zealous in crafting and championing a regulatory ideology than the tech sector,”62Short et al., supra note 55, at 4. but this regulatory ideology is not a purely private sector creation. Lawmakers and the law have helped perpetuate it.

Many lawmakers helped perpetuate this kind of regulatory ideology in the early years of the internet; for example, Anupam Chander describes Congress, courts, and the Presidential Administration all eagerly checking one another “when they proved less than friendly to Internet innovation.”63Anupam Chander, How Law Made Silicon Valley, 63 Emory L.J. 639, 649 (2014). In many ways, this trend continues today, with lawmakers often responding to technological innovations (if they respond at all) with “half-measures” that are designed to allow the underlying technology to flourish without fully addressing the attendant harms.64Hartzog Testimony, supra note 17, at 1. Support for such half-measures stems in part from understandings of technological innovation as so exceptional that the law should not interfere in the same way it would in other spheres—but technological exceptionalism is ultimately in the eye of the beholder. As Meg Jones puts it, “[n]ew technologies’ distinctions from legacy technologies are as political as they are technical. Novelty is constructed and as construction is performed, the method and politics of this interpretation should not be overlooked.”65Jones, supra note 33, at 256. When lawmakers craft bespoke legal and regulatory regimes for technological solutions, they are communicating their view that those technological solutions are indeed exceptional—superior to other types of solutions that receive no such special legal treatment.

An important point to note here is that law can have a messaging or expressive valence: it “creates a public set of meanings and shared understandings between the state and the public. It clarifies, and draws attention to, the behavior it prohibits. Law’s expressed meaning serves mutually reinforcing purposes. Law educates the public about what is socially harmful.”66Danielle Keats Citron, Law’s Expressive Value in Combating Cyber Gender Harassment, 108 Mich. L. Rev. 373, 407 (2009). While the expressive function of the law is most often discussed in terms of what it prohibits, permissive laws may also change public attitudes about what should not be considered socially harmful—and change behavior accordingly.67“[R]egulators may help generate norms around which market practices may coalesce.” Onnig H. Dombalagian, The Expressive Synergies of the Volcker Rule, 54 B.C. L. Rev. 469, 500 (2013). The literature on expressive laws focuses on the law’s ability to standardize norms,68Id. at 493. and the law can perform a particularly potent standardizing function at a time when a technologically-enabled practice is new and the public is looking for guidance as to what to think about that practice.69Citron, supra note 66, at 410. As a result, laws and rules that emphasize the benefits of a technology and related business models and deprioritize their harms can have a normative consequence in addition to their direct impact, lending legitimacy and encouraging adoption. Once public adoption has been encouraged, it will be all the harder for lawmakers to take protective steps that have the practical impact of limiting public access to, or increasing the cost of, a technology-based business model.70See Arthur E. Wilmarth Jr., Citigroup: A Case Study in Managerial and Regulatory Failures, 47 Ind. L. Rev. 69, 73–74 (2014).

Regulators are often the lawmakers who are on the frontlines of dealing with new technologies.71The judiciary is also often on the front lines, but that is beyond the scope of this Article. While some regulators proactively seek to address problems or harms associated with new technologies, others propose new regulatory structures or dispense waivers that effectively get law out of the way—or simply accommodate the new technologies through their inaction.72Chander describes this dynamic in a more positive fashion, noting that Silicon Valley’s success can be attributed in part to “U.S. authorities (but not those in other technologically advanced states) act[ing] with deliberation to encourage new Internet enterprises by both reducing the legal risks they faced and largely refraining from regulating the new risks they introduced.” Chander, supra note 63, at 645. In a way, these latter approaches are institutionalized versions of Jonathan Zittrain’s procrastination principle: “a propensity to ‘set it and forget it’ without attempting to predict and avert every imaginable problem,” on the assumption that technological advances will be able to fix any problems that do ultimately arise.73Jonathan Zittrain, Fixing the Internet, 362 Sci. Mag. 871, 871 (2018). On the presumed ability of technology to fix its own problems, see Short et al., supra note 55, at 10. When regulators take these accommodative approaches, though, they reinforce the perception that law cannot keep up with technological progress (sometimes referred to as the “pacing problem”),74Jones, supra note 33, at 256. and therefore should yield to technological solutions.

Once something does go wrong and Congress and the public demand a response, regulators will find that their own delays with regard to regulating new technologies have made it harder for them to take action. For example, if technological fixes are needed (for example, to “hardwire principles and values . . . such that violating them is impossible or nearly impossible”),75Raúl Carillo, Seeing Through Money: Democracy, Data Governance, and the Digital Dollar, 57 Ga. L. Rev. 1207, 1238 (2023). regulators will already have forfeited their opportunity to impact the design process. If technological changes are insufficient and regulatory interventions need to take the form of stronger regulation (for example, a preapproval regime),76In a discussion of social media regulation, danah boyd criticizes as overly simplistic the rationale that “if design features are the problem, requiring good design can make the harms go away.” Angel & boyd, supra note 27, at 91. Regarding preapproval regimes in the financial regulatory context, see generally Saule T. Omarova, License to Deal: Mandatory Approval of Complex Financial Products, 90 Wash. U. L. Rev. 63 (2012). implementation also becomes far more challenging once an ecosystem of vested interests has evolved that is resistant to any change. In short, accommodative regulatory approaches can entrench the mistaken notion that regulators have no option other than to wait and see—that the tech genie cannot be put back in the bottle—which can then thwart subsequent regulatory efforts.

Laws can also put a techno-solutionist thumb on the scale in allocating responsibilities among private parties.77Cohen, supra note 17, at 90. In an article titled How Law Made Silicon Valley, Chander argues that:

Silicon Valley’s success in the Internet era has been due to key substantive reforms to American copyright and tort law that dramatically reduced the risks faced by Silicon Valley’s new breed of global traders. Specifically, legal innovations in the 1990s that reduced liability concerns for Internet intermediaries, coupled with low privacy protections, created a legal ecosystem that proved fertile for the new enterprises of what came to be known as Web 2.0.78Chander, supra note 63.

More recently, technology-based businesses have also proactively wielded trade secrecy laws to avoid public scrutiny.79Carillo, supra note 75, at 1230. The result has already been “a constellation of powerful de jure and de facto legal immunities that insulate their architects and operators from accountability for a wide and growing variety of harms.”80Cohen, supra note 17, at 10. Certainly, such a faciliatory approach has helped technological innovation flourish, but context matters (notwithstanding that techno-solutionism encourages us to ignore that context). If the attendant harms of technological innovation are seemingly minor, then an accommodative or faciliatory approach may make sense; such an approach is less justifiable when the associated harms are significant. But by insulating technology’s harms from legal scrutiny, such legal structures shift public attention away from the harms, entrenching techno-solutionist perspectives that focus only on technology’s positives.

Public actions have also perpetuated techno-solutionism by helping to fund Silicon Valley. While the mythology of Silicon Valley tells of innovation born of self-made visionaries, governmental bodies have in fact created significant subsidies for the VC industry, which (together with the liability shields and intellectual property protections already discussed) have allowed Silicon Valley and its techno-solutionism to flourish.81On the mythology and reality of Silicon Valley, see O’Mara, supra note 2, at 5–7. As Peter Lee points out, “[t]he federal government played a critical role in catalyzing the VC industry by funding technologies that attracted private investment.”82Lee, supra note 39, at 627. State legislatures also created the type of business entity known as the limited partnership, allowing limited liability protection for investors while still preserving favorable capital gains taxation associated with traditional unlimited liability partnerships—the VC industry has embraced this type of business entity, and its industry associations have aggressively lobbied over the years to lower capital gains taxation rates.83Id. at 629. The VC industry has also benefitted from other types of favorable tax treatment, outright subsidies, and pension fund regulation that permits such funds to invest in VC84Id. at 629–31. (institutional investment was a particular boon to the VC industry during the prolonged period of low interest rates that ran from the Global Financial Crisis until 2022—interest rate setting can also function as a type of VC subsidy).85Richard Waters, Venture Capital’s Silent Crash: When the Tech Boom Met Reality, Fin. Times (July 31, 2022) https://www.ft.com/content/6395df7e-1bab-4ea1-a7ea-afaa71354fa0 [https://perma.cc/3SFE-TAEW]. See generally Allen, supra note 45.

To be clear, providing incentives and subsidies for private sector innovation will often be good public policy. If public authorities remain mindful of potential harms and deploy incentives and subsidies as part of a portfolio strategy that also considers where direct public investment might be more effective, such an approach is likely to broadly benefit society. Unfortunately, the political landscape in the United States has evolved in such a way that the deck is often stacked against pursuing public sector solutions: Mazzucato attributes this in part to “the emergence of ‘new public management’ theory, which grew out of ‘public choice’ theory in the 1980s,” and “led civil servants to believe that they should take up as little space as possible, fearing that government failures may be even worse than market failures.”86Mazzucato, supra note 48, at xxiii. How to encourage public innovation is an important topic, but it is beyond the scope of this Article. What is relevant to this Article is that the flip side of timidity with regard to public innovation can manifest as credulousness with respect to private sector technological solutions and undeserved acceptance of their harms. While such credulousness is often unwarranted—particularly when the problem that needs solving would never truly be attempted by the private sector because solving it will take too long and primarily generate public goods that venture capitalists cannot profit from87Id. at 12.—the law has helped build this credulousness with its subsidies and waivers for private sector technological innovation.

  1. How Law Can Be Stymied by Techno-Solutionism

Law can therefore help perpetuate techno-solutionism—and then find its harm protection functions stymied by it. We regularly hear that existing law is becoming outdated, that the legislative process is too slow to keep up with the pace of technological change, and that the administrative state is becoming obsolete as regulators of specific industries (for example, banks) can no longer comprehend how those industries carry out their functions in a technologically advanced world. These are sometimes real concerns, but they are sometimes overstated and weaponized by those who would rather not have the existing rules applied to them—even when those rules continue to be fit for purpose. As Julie Cohen puts it, the relationship between technology and law is often framed as “what happens when an irresistible force meets an immovable object.”88Cohen, supra note 17, at 1. If lawmakers accept this framing, they will internalize the position that innovation and legal protections are in tension89Id. at 91. and might undermine legal protections so as to not be the immovable object which impedes technological development. The previous Section helped explain how the law can bolster the narrative that technology is an irresistible force; this Section will give an overview of cognitive capture, regulatory arbitrage, and regulatory entrepreneurship—three interrelated dynamics that techno-solutionists can weaponize to undermine existing applicable laws.

There is a classic techno-solutionist narrative that the industry often deploys when confronted with regulation: “[L]auding tech’s benefits, suggesting that government regulation will kill innovation, and advocating for technology-enabled self-regulation instead.”90Short et al., supra note 55, at 18. This kind of narrative suggests that real and present harms should be disregarded in the face of (often unsubstantiated) excitement about potential benefits.91“[E]xploring a technology’s potential should go beyond its upsides, since there are both existing risks and drawbacks as well as future ones if the sector continues to grow.” Tonantzin Carmona, Debunking the Narratives About Crypto and Financial Inclusion, Brookings (Oct. 26, 2022), https://www.brookings.edu/research/debunking-the-narratives-about-cryptocurrency-and-financial-inclusion [https://perma.cc/5W2Y-9AQK]. Repetition of this narrative can help generate “cognitive capture” that discourages regulators from standing in the way of technological innovation.92“Powerful information-economy actors have worked to craft narratives that make unaccountability for certain types of information harms seem logical, inevitable, and right.” Cohen, supra note 17, at 89. The concept of “cognitive capture” is often distinguished from the more venal forms of regulatory capture prevalent in public choice literature; in both instances, regulators come to prioritize the interests of industry over the public, but cognitive capture arises not because of bribes or other hopes of aggrandizement, but because regulators genuinely come to see the world the way industry does.93Willem H. Buiter, Central Banks and Financial Crises, in Federal Reserve Bank of Kansas City Symposium 495, 601–02 (2008). If that happens, then public and industry interest may appear synonymous to regulators.

Movements to portray government as ineffective have already helped convince many regulators that they have limited capacity to restrain harms, and that they should be afraid of impeding important progress by the private sector.94Jodi L. Short, Regulatory Managerialism as Gaslighting Government, 86 L. & Contemp. Probs. 1, 5 (2023) (“Civil servants have internalized attacks on them in ways that are at best demoralizing and at worst debilitating.”). When it comes to technology, regulators are aware that their actions can impact how technology develops, and they may come to feel that actions which could deprive the public of a particular technological innovation are a public disservice (even if there are harms associated with that technological innovation, and even as the general public evinces growing concerns about the power of Big Tech).95“The utopian narratives that big tech companies (and their lobbyists) tell about themselves do not seem to have captured the public’s imagination.” Short et al., supra note 55, at 5. Technology philosopher Evan Selinger has described how “[s]olutionism is a crucial component of how Big Tech sells its visions of innovation to the public and investors,”96Selinger, supra note 1. but solutionism is also a crucial component of how technological innovation is “sold” to regulators.

Cognitive capture is built in part through relationships,97James Kwak, Cultural Capital and the Financial Crisis, in Preventing Regulatory Capture: Special Interest Influence and How to Limit It 71, 80 (Daniel Carpenter & David A. Moss eds., 2014). and the subsidies and regulatory waivers discussed in the previous Section have helped VC firms to prosper sufficiently to ensure their access to regulators, enabling them to reinforce the techno-solutionist tendencies that benefit them. Cognitive capture can be particularly insidious when regulators are dependent on industry for information about how a technology works, because then regulators’ understanding will have been filtered through and permeated by industry’s perspectives on its creations.98“[I]nputs [from powerful actors] function as information subsidies, supplying policymakers who have limited resources of their own with ready access to a trove of facts, anecdotes, theories, and narrative frameworks from which to draw.” Cohen, supra note 17, at 104. There is also a status aspect to cognitive capture, where “[r]egulators are more likely to adopt positions advanced by people whom they perceive to be of higher status in social, economic, intellectual, or other terms.”99Kwak, supra note 97, at 80. With Silicon Valley’s successes has come an “an almost mythic reputation for meritocracy, innovation, and long-term value creation,” the “political valence” of which can sometimes be hard for regulators to resist.100Lee, supra note 39, at 620.

Such status concerns can be particularly pernicious if they result in regulators (particularly regulators of industries that were not traditionally technologized) undervaluing their own expertise—notwithstanding that their domain knowledge typically far exceeds that of the technologists developing solutions for that domain.101See supra notes 50–53 and accompanying text. In an “Emperor’s New Clothes” type scenario, regulators may feel too intimidated to ask preliminary questions about whether their industry’s problems can, in fact, be solved with the technological tools at hand (or indeed, by technological tools at all). Or regulators might be discouraged from asking questions about the domain-specific harms that technology could inflict. As Jones puts it, “[s]ometimes, a technology is so innovative, we are told that it cannot be proactively regulated, for how are policymakers to understand its technical complexities or know its potential.”102Jones, supra note 33, at 250. If regulators buy into this techno-solutionism, they are likely to adopt a posture of accommodative inaction: viewing even technological solutions that are at best band-aids as plausible solutions that they don’t want to stifle—even if those solutions pose significant social harms.

This environment of techno-solutionist cognitive capture is a highly fertile one in which to deploy strategies of regulatory arbitrage and entrepreneurship. “Regulatory arbitrage” describes industry strategies for exploiting gaps and differences in legal treatment—perhaps by performing activities that are prohibited in one jurisdiction in a more friendly jurisdiction, or by achieving the same outcome as a regulated activity but doing so in a way that was not clearly contemplated by existing regulatory regimes.103For a discussion of regulatory arbitrage, see Elizabeth Pollman, Tech, Regulatory Arbitrage, and Limits, 20. Eur. Bus. Org. L. Rev. 567, 571 (2019). Techno-solutionist narratives can facilitate arbitrage in the latter context, by suggesting that the technology is so novel and so free that it simply cannot be regulated in the same way as existing modes of performing the relevant activities.104Short et al., supra note 55, at 8. If regulators wish to respond to such regulatory arbitrage with new regulations, technological exceptionalism may tempt them to create rules that are very specifically tied to the technology in question—but when regulation is made too specific to a particular technology, it can be very easy for industry to evade that regulation by making small technological tweaks.

Businesses built on regulatory arbitrage may seek to “harden” that arbitrage into a durable legal permission through strategies of regulatory entrepreneurship. As used by legal scholars Elizabeth Pollman and Jordan Barry, the term “regulatory entrepreneurship” is most notably associated with the ride-hailing platform Uber, and refers to a growth strategy utilized particularly by VC-funded enterprises that involves “pursuing a line of business in which changing the law is a significant part of the business plan” even when it can “lead to negative consequences when companies’ interests diverge from the public interest.”105Pollman & Barry, supra note 3, at 383–84. Pollman and Barry have identified

three creative techniques that modern regulatory entrepreneurs have adopted in various combinations: They break the law and take advantage of legal gray areas, real or imagined, asking forgiveness instead of permission. They seek to grow ‘too big to ban’ before regulators can act, sometimes referred to as ‘guerilla growth.’ Perhaps most dramatic, they mobilize their users and stakeholders as a political force.106Id. at 390.

In other words, regulatory entrepreneurs engage in regulatory arbitrage or outright non-compliance until their businesses have become so large and established that they can paint legal changes permanently authorizing their activities as an inevitable necessity—notwithstanding that the business’s public harms will go unchecked as a result.

While the strategy of regulatory entrepreneurship is not exclusive to technology-based businesses,107For example, one could characterize Citigroup’s 1998 acquisition of Traveler’s Insurance—in an (ultimately successful) attempt to end Glass-Steagall’s prohibitions on certain kinds of financial institution affiliations—as regulatory entrepreneurship. For background on this event, see Wilmarth Jr., supra note 70, at 73–74. it is most commonly associated with VC-funded startups.108Pollman & Barry, supra note 3, at 424. Part of the explanation for this lies in the asymmetric incentive structures of VC funders, who face little legal liability for encouraging their portfolio companies to break the law but stand to capture a significant part of any upside from regulatory entrepreneurship strategies.109Allen, supra note 45, at 26. But it is also true that regulatory entrepreneurship is enabled by techno-solutionist narratives that make it particularly difficult for lawmakers and regulators to proactively rein in tech-related legal breaches. Regulatory entrepreneurship capitalizes on the pacing problem, seeking to grow “too big to ban” before the law catches up. But it is not inevitable that the law will fall hopelessly behind technological development. Ultimately, refusing to apply the law to a technology until after it is fully developed and entrenched—and then crafting accommodative laws that treat the extant incarnation of technology-based business models as inevitable—is a choice. That choice, which can stymie the harm-reduction functions of law, is often encouraged by cognitive capture, donations, and lobbying, all of which are part of the regulatory entrepreneurship playbook.110As Pollman and Barry observe,

The regulatory entrepreneur may push social policy away from the optimal outcome. The most direct way this can happen is when the regulatory entrepreneur’s business is built on reversing an efficient regulatory regime. When regulatory entrepreneurs change the law through quiet lobbying, without popular support, their behavior is consistent with a story of regulatory capture or rent-seeking and can produce all of the same negative consequences.

Pollman & Barry, supra note 3, at 443.

II.  Fintech and Techno-Solutionism

The previous Part spoke about techno-solutionism generally; the rest of this Article will focus more specifically on techno-solutionism as it relates to fintech. Because “finance is at the heart of the economy; is social and political; and is composed of non-stationary relationships that exhibit secular change,”111John C. Coates IV, Cost-Benefit Analysis of Financial Regulation: Case Studies and Implications, 124 Yale L.J. 882, 1003 (2015). it should be obvious (but sadly often is not) that solutions that neglect the social and political dimensions of financial problems will be inadequate. When technology is presented as the whole solution to a financial problem, then the best-case scenario will be that it fails to live up to its promises. Worst-case scenarios will arise if the shiny promises of the technology distract us from interrogating the downsides of business models that use that technology or distract us from addressing the root causes of the problem that is purportedly being solved.

In order to critique fintech’s techno-solutionism, we need a framework for thinking about what might need “solving” in finance in the first place. In many ways, the list of potential improvements to financial services and the financial system is infinite, but it is conceptually helpful to start by identifying what finance is supposed to do—at a high level—in order to consider how it could do it better. In the book Principles of Financial Regulation, John Armour and his colleagues identify the following as the key socially beneficial functions of the financial system: facilitating payments; mobilizing capital; selecting projects and monitoring their performance; and managing risk.112John Armour, Dan Awrey, Paul Davies, Luca Enriques, Jeffrey N. Gordon, Colin Mayer & Jennifer Payne, Principles of Financial Regulation 22–23 (2016). These can be collapsed further into three broad categories of functions: transaction processing, capital intermediation, and risk management.113Hilary J. Allen, Driverless Finance: Fintech’s Impact on Financial Stability 14 (2022). If the financial system is not performing these functions inclusively, efficiently, competitively, or securely, there may be a problem that needs to be fixed.

Of course, going back to first principles, we sometimes rely on the private sector financial industry to perform functions that it is ill-equipped to perform; public sector alternatives will often be needed to ensure reasonably-priced and widely-available transaction processing, capital intermediation, and risk management services.114As Adam Levitin notes,

The problem is that the market, left to its own devices, will not produce the desired policy outcome of fair and widely available services absent some form of subsidization. To the extent there is a failure here, then, it is a failure of government to intervene when the market fails to produce the desired policy outcome.

Adam J. Levitin, The Financial Inclusion Trilemma, 41 Yale J. on Regul. 109, 113 (2024). For proposals, see id. at 158–63; Mehrsa Baradaran, Banking on Democracy, 98 Wash. U. L. Rev. 353, 358–59 (2020).
Still, these three goals reflect general understandings of what the private sector financial system is supposed to achieve, and fintech technologies and business models are typically marketed as improving the delivery of these goals. Transaction processing (particularly payments processing) lends itself most obviously to technological improvement, but fintech entrepreneurs have also sought to improve capital intermediation (for example, with fintech lending and algorithmic trading business models) and risk management (for example, with AI-driven robo-advisory services).115Allen, supra note 113, at 83–86 (regarding fintech lending), 86–89 (regarding algorithmic trading), 66–69 (regarding robo-advisory services).

These disparate services all count as fintech. “Fintech” is not really a unified term, and it can be used to describe an assortment of different kinds of firms, technologies, and business models.116Id. at 8. This Article will focus less on fintech as firms and more on the underlying fintech technologies and business models that rely on them. Morozov focused his critique of techno-solutionism on “the Internet,”117Morosov, supra note 8, at 14. but when it comes to fintech, techno-solutionism also extends to other digital technologies like cloud computing, AI, blockchain, and APIs.118Allen, supra note 113, at 11. These technologies are diverse in many ways, but because they are accessed through the Internet, they can all reach significant scale.119Capacity for scaling is not unlimited, though, see infra note 210 and accompanying text. They also tend to rely on Big Data and often share the capacity for automation.120Yesha Yadav, Fintech and International Financial Regulation, 53 Vand. J. Transnat’l L. 1109, 1112 (2020).

Notably, fintech technologies and business models are not the exclusive province of new fintech firms, but have found their way into traditional financial institutions as well.121Chris Brummer & Yesha Yadav, Fintech and the Innovation Trilemma, 107 Geo. L.J. 235, 277 (2019). There are many different drivers of the adoption of these technologies and business models, but it is likely that some of the adoption is being driven by supply-side incentives to profit from the “next new thing,”122Dan Awrey, Complexity, Innovation, and the Regulation of Modern Financial Markets, 2 Harv. Bus. L. Rev. 235, 263–67 (2012). and it is also possible that some adoption is being driven by FOMO (“fear of missing out” on new tech trends).123Ina Bansal, Are Banks Facing FinTech ‘FOMO’?, LinkedIn (Mar. 18, 2016), https://www.linkedin.com/pulse/banks-facing-fin-tech-fomo-ina-bansal [https://perma.cc/429Q-JG5W]. The more commonly articulated narratives around fintech adoption, though, are desires to improve financial inclusion, efficiency, competition, and security.124See infra Sections II.A, B, C, and D. Regarding inclusion specifically, see Baradaran, supra note 114, at 356 (“The language of fintech as financial inclusion is so widespread that one could be forgiven for assuming that increasing access to credit were the sole aim of these companies.”). This Part will evaluate these narratives with a skeptical eye and conclude that while fintech may sometimes form part of the solutions we need, technology cannot provide the entire solution.

A.  Financial Inclusion

As noted above, the financial system provides critical payments and other transaction processing services. Everyday people benefit from these services, and they also benefit from the mobilization of capital: both as savers and investors who profit from returns, and as recipients of credit. Building wealth and diversifying investments can also help people manage the financial risks they may face in their lives. People who are excluded from traditional financial services can be charged significant premiums for transacting, locked out of full participation in the economy, and denied opportunities to manage their financial risks and build wealth.125Levitin, supra note 114, at 117–18, 120–21. Improving access (which is often referred to as “financial inclusion”) is therefore viewed as a critically important social goal.126Id. at 119. See also Baradaran, supra note 114, at 364–82, 399, which advocates for pushing back against the current conceptualization of financial inclusion. However, improving financial inclusion requires an understanding of the reasons why people are currently excluded, and the consequences of that exclusion. These are textured and context-specific, and once we start looking at the relevant context, it soon becomes clear that technology alone cannot solve financial inclusion problems. Unfortunately, though, fintech’s hype can undermine support for the kinds of public-driven solutions (including “hard service mandates, public provision, or taxpayer subsidies”) that could actually improve financial inclusion.127Levitin, supra note 114, at 114, 145.

Whether adults have a bank account or not is often used as a proxy for gauging the level of financial inclusion in a particular country. Research by the World Bank indicates that account ownership often varies by age, by level of education, and by gender (among other things), suggesting that there are structural explanations for financial exclusion.128Asli Demirgüç-Kunt, Leora Klapper, Dorothe Singer & Saniya Ansar, The Global Findex Database 2021: Financial Inclusion, Digital Payments, and Resilience in the Age of COVID-19, World Bank Grp. (2022), https://www.worldbank.org/en/publication/globalfindex/Report [https://perma.cc/8NHC-T3EX]. These structural explanations will vary significantly from place to place,129Jones, supra note 33, at 251. and so visions of universally applicable solutions to global financial inclusion will inevitably prove overly simplistic. This Article will focus more narrowly on fintech’s aspirations to improve financial inclusion within the United States (although we should not ignore the rest of the world: Silicon Valley-funded firms often try out their new tech solutions on populations in developing countries who lack the regulatory protections available in the United States).130For more background, see Olivier Jutel, Blockchain Financialization, Neo-Colonialism, and Binance, 6 Frontiers in Blockchain 2023, at 03 (July 27, 2023); Eileen Guo & Adi Renaldi, Deception, Exploited Workers, and Cash Handouts: How Worldcoin Recruited Its First Half a Million Test Users, MIT Tech. Rev. (Apr. 6, 2022), https://www.technologyreview.com/2022/04/06/1048981/worldcoin-cryptocurrency-biometrics-web3 [https://perma.cc/9JCW-NMQN]; Peter Howson, The Crypto Colonists, in Let Them Eat Crypto: The Blockchain Scam That’s Ruining the World (2023).

There is a striking racial dimension to financial inclusion problems in America.131For examples of scholarly work articulating the persistent structural discrimination that has driven disparate financial situations along racial lines, see Jones & Maynard, Jr., supra note 9; Darrick Hamilton & William Darity, Jr., The Political Economy of Education, Financial Literacy, and the Racial Wealth Gap, 99 Fed. Rsrv. Bank St. Louis Rev. 59, 60 (2017). See generally Mehrsa Baradaran, Jim Crow Credit, 9 U.C. Irvine L. Rev. 887 (2019). A 2021 survey found that while 4.5% of U.S. households overall were “unbanked” (in the sense that “no one in the household had a checking or savings account at a bank or credit union”),132Federal Deposit Insurance Corporation, 2021 FDIC National Survey of Unbanked and Underbanked Households Executive Summary 1 (2022) [hereinafter FDIC Survey], https://www.fdic.gov/analysis/household-survey/2021execsum.pdf [https://perma.cc/57Y3-NMTB]. “[d]ifferences in unbanked rates between Black and White households and between Hispanic and White households in 2021 were present at every income level.”133Id. at 2. As Adam Levitin puts it, “[n]early one in nine Black households and one in eleven Hispanic households lacks a bank account, and nearly one in four Black and Hispanic households are underbanked” (meaning they have bank accounts but still rely on alternative providers like check cashers or payday lenders).134Levitin, supra note 114, at 111. Many who are unbanked or underbanked identify the primary reason as either insufficient wealth to meet minimum balance requirements or lack of trust in banks.135FDIC Survey, supra note 132, at 2.

Fintech services are regularly depicted as a solution to both this lack of trust and underserved populations’ need for reasonably priced financial services: claims to “democratize finance” and “[b]ank the [u]nbanked” abound.136See, e.g., Circle, Serving the Unbanked with USDC, https://www.circle.com/en/stories/serving-the-unbanked-with-usdc [https://perma.cc/BTR2-XTC5] (“How USDC Can Help Bank the Unbanked”); Robinhood, About Us, https://robinhood.com/us/en/about-us [https://perma.cc/6NKK-9NQ9] (“We’re on a mission to democratize finance for all”). “A commonly held belief in the world of finance is that what stands between the current landscape of financial exclusion to full financial inclusion is the right technology or innovation.” Baradaran, supra note 114, at 356. Ultimately, though, technology is not a response to the lack of wealth and trust that creates racial disparities in financial inclusion in the United States. Black Americans in particular tend to distrust traditional financial institutions, often with good historical reason.137Jones & Maynard, Jr., supra note 9, at 822–24. Instead of doing the hard work of repairing that relationship, a techno-solutionist approach to financial inclusion allows new entrants to exploit that lack of distrust, often with even more exploitative results.138See supra notes 156–59 and accompanying text.

While traditional financial institutions have a very mixed track record with regard to underserved populations,139For a discussion of this history, see Mehrsa Baradaran, How the Other Half Banks: Exclusion, Exploitation, and the Threat to Democracy 138–62 (2015). they are at least subject to regulations designed to protect consumers and investors. Fintech business models, however, are often designed to skirt these regulations, often leaving their users (once again) with second-best, more exploitative financial services. Fintech proponents may hope that it will help “close the racial wealth gap,” but the reality is often a markedly less rosy form of predatory inclusion (similar to prior innovations like payday loans and subprime mortgages).140Predatory inclusion “refers to marginalized communities gaining access to goods, services, or opportunities that they were historically excluded from—but this access comes with conditions that undermine its long-term benefits and may reproduce insecurity for these same communities.” Carmona, supra note 91.

Christopher K. Odinet, for example, argues that while some fintech credit providers claim that their online interfaces and machine learning-based credit scoring procedures differentiate them from predatory payday lending models, they often charge rates of interest that are similar to those charged by payday lenders.141Odinet, supra note 21, at 1761–63. In a similar vein, Nakita Cuttino has examined the earned-wage access fintech business model,142These are “internet- and mobile-based platforms that have emerged in recent years to serve as safer alternatives to much-maligned payday loans . . . by facilitating transfers of earned-but-unpaid wages to workers in advance of their standard periodic paydays.” Nakita Q. Cuttino, The Rise of “FringeTech”: Regulatory Risks in Earned-Wage Access, 115 Nw. U. L. Rev. 1505, 1507–08 (2021). which has been described by one proponent as a “revolutionary employee benefit program that offers employees almost instant access to their pay.”143Is Earned Wage Access the Way of the Future? 5 Tips for Employers Seeking to Attract and Retain Talent Through On-Demand Pay, Fisher Phillips (Mar. 30, 2022), https://www.fisherphillips.com/news-insights/earned-wage-access-tips-for-employers-seeking-to-attract-retain-talent.html [https://perma.cc/2T25-JA4Y]. She finds that while this business model does offer some improvements over the prevailing payday lending model, it still has “varying effects that sometimes perpetuate, and in some instances exacerbate, the very risks providers claim to eliminate when displacing short-term creditors like payday lenders.”144Cuttino, supra note 142, at 1516–17.

Notwithstanding their deficiencies, there is consumer demand for these kinds of products, and so the problems associated with fintech lending and earned wage access products should be addressed by robust consumer protection regulation. Fintech lending models have, however, been constructed to avoid certain consumer protections like usury limits and state licensing requirements by engaging in “rent-a-bank” partnerships with banks;145Odinet, supra note 21, at 1776, 1779. earned-wage access programs also currently escape most meaningful consumer protection regulation.146Cuttino, supra note 142, at 1568–69. Odinet notes that the mystique of technology has been strategically weaponized to avoid regulation, observing that “the politics of tech . . . is giving political cover to predatory fintech lenders and clouding what should otherwise be a clear headed and aggressive approach by financial regulators in stamping out these harmful practices.”147Odinet, supra note 21, at 1745.

These fintech lending business models have been billed as “unlock[ing] more credit opportunities” for those who otherwise have bad credit scores or thin credit files,148Jones & Maynard, Jr., supra note 9, at 837–38; see also Carillo, supra note 75, at 1211, 1213. but unfortunately, the kinds of machine learning models used to process non-traditional data sources have often been shown to perpetuate discrimination and bias. Machine learning algorithms are guided by patterns and correlations evident in the data they have been exposed to,149Alicia Solow-Niederman, Information Privacy and the Inference Economy, 117 Nw. U. L. Rev. 1, 5–6 (2022). and so credit scoring algorithms that learn from biased data will perpetuate those biases in their credit-scoring decisions.150Jones & Maynard, Jr., supra note 9, at 837–40; Baradaran, supra note 114, at 371. This biased algorithmic decision-making can be particularly insidious, though, because it is often hidden: “[m]arkers for protected class membership can be inferred with relative ease and near-impunity from other, seemingly neutral data.”151Cohen, supra note 17, at 179. Once again, it is very techno-solutionist to assume that technology alone could winnow out centuries of entrenched biases, but automation biases and narratives of technological neutrality can lend undeserved credibility to such assumptions, impacting access to credit.

The bigger picture problem, of course, is the demand for credit: many Americans are so strapped for cash that they cannot survive from month-to-month without interim payments or loans.152“[F]or many households, borrowing is the only way to survive.” Odinet, supra note 21, at 1800; see also Baradaran, supra note 114, at 398–99. A 2023 survey by the Board of Governors of the Federal Reserve found that

[w]hen faced with a hypothetical expense of $400, 63 percent of all adults in 2023 said they would have covered it exclusively using cash, savings, or a credit card paid off at the next statement (referred to, altogether, as “cash or its equivalent”). The remainder said they would have paid by borrowing or selling something or said they would not have been able to cover the expense.

Bd. Governors Fed. Rsrv. Sys., Economic Well-Being of U.S. Households in 2023, at 31–32 (2024), https://www.federalreserve.gov/publications/files/2023-report-economic-well-being-us-households-202405.pdf [https://perma.cc/38AW-BTS8].
The predatory fintech loans and earned wage access products discussed here can obfuscate and draw attention away from the need to address this deeper, underlying structural problem.153“[T]he increased ability to borrow money, cast as a mechanism of positive social change, may function in some ways as a Trojan horse, wheeling in the unique dangers of indebtedness to the front gates of marginalized communities and threatening their already tenuous socioeconomic existence.” Abbye Atkinson, Borrowing Equality, 120 Colum. L. Rev. 1403, 1405–06 (2020). In their work on fintech, Lindsay Sain Jones and Goldburn Maynard explore one part of this underlying problem—the racial wealth gap. They consider a variety of fintech business models (including “e-trading, robo-advising, alternative credit platforms, neobanks, and decentralized payments”)154Jones & Maynard, Jr., supra note 9, at 808. and demonstrate that many of fintech’s claims about building wealth for traditionally excluded groups do not bear out, and in fact often disguise predatory practices that disproportionately harm vulnerable members of society.155Id.

Consumers may struggle to detect predatory practices because of fintech’s technological complexity: financial literacy is already extremely challenging for most people,156See Lauren E. Willis, Against Financial-Literacy Education, 94 Iowa L. Rev. 197, 201–02, 205 (2008). and fintech often overlays a requirement to be technologically literate too, which puts an even more unrealistic burden on users.157“Computer scientists often adopt a worldview where anyone can become a hacker and access the power of computer networks through coding knowledge gained from a DIY perspective. This perspective often downplays social inequalities related to Internet access and technological knowledge.” Semenzin, supra note 38, at 7. Baradaran has noted that the rhetoric of financial literacy “pathologize[s] the poor—and assume[s] that their poverty was created by individual choices—or treat[s] their state of poverty or financial exclusion as a trait inherent in the excluded borrower.”158Baradaran, supra note 114, at 381. As Darrick Hamilton has observed, if the poor internalize this critique, it fuels their desire not to look foolish for missing out on financial opportunities presented to them, which can make them more vulnerable to predatory practices.159Darrick Hamilton describes the problem as follows:

The characterization of Black people and their position in the United States is often one of ‘they are fools,’ ‘they make bad choices,’ . . . The narrative in America is that you should seize opportunity, make something of yourself, so if you have limited pathways towards traditional ways of wealth building and access to finance, you are particularly vulnerable to not wanting to be left behind.

Americans for Financial Reform, A Conversation with Ben McKenzie hosted by Americans for Financial Reform, YouTube (Sept. 25, 2023), https://www.youtube.com/watch?v=U8d_jws-KfA (starting at 16:50) [https://perma.cc/BXV4-MUP3]. See generally Hamilton & Darity Jr., supra note 131.
If debunking a too-good-to-be-true financial opportunity requires not just financial knowledge, but also understanding how a new technology works, it is not surprising that vulnerable people are sucked in.

This dynamic is particularly evident in the context of the crypto industry. Often described by its critics as “a solution in search of a problem,”160See, e.g., Arvind Narayanan & Sayash Kapoor, AI Snake Oil: What Artificial Intelligence Can Do, What It Can’t, and How to Tell the Difference 235 (2024) (“it has gradually become clear that crypto is a solution looking for a problem”); Adam Lashinsky, Crypto Is a Solution in Search of a Problem, Wash. Post (May 20, 2022), https://www.washingtonpost.com/opinions/2022/05/20/crypto-bitcoin-dogecoin-ethereum-crashing [https://perma.cc/88J4-DJ7U]; White, supra note 40. crypto represents in many ways the apotheosis of fintech and techno-solutionism. Promises have been made that crypto’s underlying blockchain technology can democratize financial services by making them cheaper, more efficient, and more secure—but none of these promises withstand scrutiny. Ultimately, a blockchain is simply a type of database to which entries can only be added, not removed, and which is controlled by multiple nodes instead of relying on centralized intermediaries.161Primavera De Filippi & Aaron Wright, Blockchain and the Law: The Rule of Code 2 (2018). While this technology might be interesting from an academic perspective, according to more than 1,500 independent computer scientists, software engineers, and other technologists who signed a letter to U.S. Congressional leaders in 2022, “[b]y its very design, blockchain technology is poorly suited for just about every purpose currently touted as a present or potential source of public benefit.”162Letter in Support of Responsible Fintech Policy (June 1, 2022), https://concerned.tech [https://perma.cc/467C-ULJK].

It is not the blockchain itself that is offered as an investment opportunity, but the crypto tokens (like Bitcoin) whose ownership is recorded on blockchains. The crypto industry regularly invokes claims of financial inclusion, focusing in particular on reported high uptake of crypto tokens in Black communities in the United States.163See, e.g., Coinbase Presents: Black Americans & Crypto, Coinbase, https://www.coinbase.com/learn/community/black-americans-and-crypto [https://perma.cc/9959-NNC9]. But most of these crypto tokens are not backed by any real-world productive capacity, and are Ponzi-like in their need for significant amounts of new demand and liquidity to support their value.164Allen, supra note 45, at 21–23. A Ponzi scheme exists where “early investors are paid returns from funds provided by new investors, as opposed to being paid from actual returns of a purported investment.” Catherine Carey & John K. Webb, Ponzi Schemes and the Roles of Trust Creation and Maintenance, 24 J. Fin. Crime 589, 589 (2017). Not all Ponzi processes are coordinated manipulative schemes, however: Shiller notes the existence of Ponzi processes where asset prices rise as a result of purchases made by those who have heard positive stories from those who will benefit from further price increases. Robert J. Shiller, Irrational Exuberance 93–94 (Rev. & Expanded 3d ed. 2015). Data analysis by economists at the Bank for International Settlements in 2023 concluded that “a majority of investors have probably lost money on their bitcoin investment,” and that large holders (commonly referred to as “whales”) likely profited at their expense.165Giulio Cornelli, Sebastian Doerr, Jon Frost & Leonardo Gambacorta, Bank for Int’l Settlements Bulletin No. 69: Crypto Shocks and Retail Losses 3–4 (Hyun Song Shin ed., 2023). Some data does indicate that members of Black communities are disproportionately likely to own crypto,166Ariel Invs. & Charles Schwab, 2022 Black Investor Survey: Report of Findings 7 (2022), https://content.schwab.com/web/retail/public/about-schwab/Ariel-Schwab_Black_Investor_Survey_2022_findings.pdf [https://perma.cc/E72H-35HT]. but this will be predatory inclusion if “whales” are using Black communities to provide the liquidity they need to cash out. There is some indication that this is, in fact, the case. Results from a Pew survey conducted in 2023 suggested that Black, Hispanic, and lower-income investors were disproportionately likely to have entered the crypto markets in March 2022 or later, after the market peak at the end of 2021.167Describing the survey’s results, Pew researchers found that

[i]n 2023, Black users (27%) were more likely than White users (12%) to say they first invested in, traded or used cryptocurrency within the previous year. Roughly two-in-ten Hispanic users (21%) said the same. (There were not enough Asian American cryptocurrency users to look at their responses separately.) . . . About three-in-ten users from lower-income households reported first investing in cryptocurrency within the past year, compared with about one-in-ten adults from middle- or upper-income households.

Michelle Faverio, Wyatt Dawson & Olivia Sidoti, Majority of Americans Aren’t Confident in the Safety and Reliability of Cryptocurrency, Pew Rsch. Ctr. (Apr. 10, 2023), https://www.pewresearch.org/short-reads/2023/04/10/majority-of-americans-arent-confident-in-the-safety-and-reliability-of-cryptocurrency [https://perma.cc/SQM3-5TWR].

When assets have no fundamentals and trade entirely on sentiment, traditional checks on fraud (like independent valuations and audits) break down, leaving crypto investors particularly vulnerable to fraudsters.168Regarding the ease with which crypto valuations can be manipulated, see Matt Levine, FTX’s Balance Sheet Was Bad, Bloomberg (Nov. 14, 2022, 10:09 AM), https://www.bloomberg.com/opinion/articles/2022-11-14/ftx-s-balance-sheet-was-bad [https://perma.cc/658Y-3TDB]. Financial disclosures from crypto issuers can reflect these manipulated values and often take the form of “attestations” or “proof of reserves” that have not undergone the scrutiny of an audit. Jonathan Weil, Binance Is Trying to Calm Investors, but Its Finances Remain a Mystery, Wall St. J. (Dec. 10, 2022), https://www.wsj.com/articles/binance-is-trying-to-calm-investors-but-its-finances-remain-a-mystery-11670679351 [https://perma.cc/H544-MH2T]. Crypto is also highly attractive to scammers and hackers because transactions on a blockchain cannot be undone (at least, not without taking drastic steps).169“Undoing a transaction requires either a change in the ledger’s underlying software, or what is known as a “hard fork,” where the ledger is split in two with one version of the ledger not recognizing the problematic transaction.” Allen, supra note 113, at 100. Unsurprisingly, the crypto markets are rife with fraud, hackings, and scams—and crypto users are expected to be able to protect themselves from these.170For a running tally of crypto hacks, scams, and frauds impacting consumers, see Molly White’s website, Web3 is Going Just Great, https://web3isgoinggreat.com [https://perma.cc/S62J-98G2]. As discussed previously, however, self-protection in these circumstances requires unrealistically high levels of both technological and financial literacy.171Jutel, supra note 130, at 07; see also supra notes 156–59 and accompanying text. Even in the absence of frauds, scams, and hackings, blockchain technology struggles to scale,172See infra note 210 and accompanying text. with the result that transactions processed on a blockchain can be subject to unexpected delays and high fluctuating fees at peak times (in addition to the fees users incur converting their crypto into and out of fiat currency on crypto exchanges).173For a discussion of fees, see Levitin, supra note 114, at 144. It is also important to note that these crypto exchanges typically require users to have a bank account in order to open an exchange account, meaning that unbanked customer will not be able to use an exchange to acquire crypto or to cash out of it in order to transact in the real economy.174Baradaran, supra note 114, at 384–85. Bitcoin ATMs, which tend to cluster in the same locations as payday lenders and check cashers, do provide a bank-free alternative for obtaining Bitcoin, but these usually charge extremely high fees, and while they “will accept cash to buy crypto . . . most aren’t equipped to sell crypto and dispense cash.” Dan Mika, High-Fee Crypto ATMs Center Around Low-Income Parts of Kansas City, Kan. City Beacon (Aug. 15, 2023), https://thebeaconnews.org/stories/2023/08/15/high-fee-crypto-atms-center-around-low-income-parts-of-kansas-city/#:~:text=Engagement%20Data%20Economics-,High%2Dfee%20crypto%20ATMs%20center%20around%20low%2Dincome%20parts%20of,targeting%20residents%20with%20extraordinary%20fees [https://perma.cc/PH9Z-PKDA].

This practical need for a bank account to access crypto also undermines industry claims that a type of crypto asset known as a “stablecoin” will bank the unbanked.175For an example of such industry claims, see Circle, supra note 136. Unlike most other crypto assets, stablecoins typically have some reserve of assets backing them and are therefore not as volatile as other kinds of crypto assets. Still, stablecoins remain vulnerable to runs where first movers are made whole while the remaining holders suffer losses.176Gary B. Gorton & Jeffery Y. Zhang, Taming Wildcat Stablecoins, 90 U. Chi. L. Rev. 909, 936–39 (2023). Indeed, some stablecoins have collapsed in recent years, causing their users to lose everything.177Leo Schwartz & Abubakar Idris, From Argentina to Nigeria, People Saw Terra as More Stable Than Local Currency. They Lost Everything, Rest of World (May 26, 2022), https://restofworld.org/2022/argentina-nigeria-terra-crash [https://perma.cc/WXH9-Z53S]. This article references Terra, a particularly risky form of stablecoin known as an algorithmic stablecoin, but as the article observes, “Lots of people lost money they couldn’t lose . . . They don’t care if it’s an algorithmic stablecoin, a collateralized stablecoin, decentralized, or what—their attitude will be, crypto f***ed me, I lost all my money. I won’t come back.” Id. Also, Bank for International Settlements (“BIS”) research on collateralized stablecoins has found that none of them are as stable as they claim, with depegging from the USD$1 price being a reasonably regular occurrence. Anneke Kosse, Marc Glowka, Ilaria Mattei & Tara Rice, Will the Real Stablecoin Please Stand Up? 11 (Bank for Int’l Settlements Papers, No. 141, 2023). As for those that have not collapsed, the World Economic Forum has concluded that stablecoins do not provide any novel payments functionality, noting that “stablecoins as currently deployed would not provide compelling new benefits for financial inclusion beyond those offered by pre-existing options.”178World Econ. F., What Is the Value Proposition of Stablecoins for Financial Inclusion 8 (2021), https://www3.weforum.org/docs/WEF_Value_Proposition_of_Stablecoins_for_Financial_Inclusion_2021.pdf [https://perma.cc/K8AG-6XMC]. Ultimately, stablecoins have little to recommend them as a financial inclusion solution.

Despite these realities, techno-solutionist narratives about crypto’s ability to improve financial inclusion are stubbornly resilient. Brookings’s Tonantzin Carmona has broken down crypto’s financial inclusion narrative into two halves: (1) easy access to transactional services for those previously locked out of the financial system, and (2) a wealth building avenue with low barriers to entry.179Carmona, supra note 91. She thoroughly debunks both halves, demonstrating that cryptocurrencies are poorly suited to perform transactional services, and that the volatility of most crypto assets’ value makes them unsuited to wealth building.180Id. As already mentioned, most crypto exchanges require users to have a bank account to acquire any crypto asset in the first place, so crypto solves little for the unbanked.181Id. This is also true of many other non-crypto fintech products: “[E]lectronic payment systems like PayPal and Venmo allow funds to be transferred among users without requiring a bank account, but the initial loading of funds must either be from a bank account or a credit card or a payment from another user.” Levitin, supra note 114, at 117. Crypto loans typically require overcollateralization before they are extended, so those without wealth (in the form of collateral) will not be able to receive loans.182Sirio Aramonte, Wenqian Huang & Andreas Schrimpf, DeFi Risks and the Decentralisation Illusion, BIS Q. Rev., Dec. 2021, at 21, 27. Rejecting techno-solutionism, Carmona admonishes policymakers to “first clarify the problems they are trying to solve, and more importantly, why they are trying to solve them.”183Carmona, supra note 91.

Unbanked and underbanked individuals in the U.S. would benefit enormously from access to simple, quick, low-cost transactional services.184“[C]ommunities do not need better blockchain design or mobile apps—they need simple access to a checking account and a debit card.” Baradaran, supra note 114, at 410. We already have the technology needed to provide these, though, and it seems to be more a lack of political will that prevents such transactional services from being provided more widely.185Aaron Klein identifies a simple amendment to existing law that would significantly help the underbanked:

The single most impactful thing the federal government could do is to give people access to their own money immediately. This can be done by simply amending the Expedited Funds Availability Act to require immediate access for the first several thousand dollars of a deposit, instead of permitting the lengthy, costly delays that harm people living paycheck to paycheck.

Aaron Klein, Opening Statement of Aaron Klein at Roundtable on America’s Unbanked and Underbanked, Brookings (Dec. 15, 2021), https://www.brookings.edu/opinions/opening-statement-of-aaron-klein-at-roundtable-on-americas-unbanked-and-underbanked [https://perma.cc/4AS7-WHT9]; see also Edmund Schuster, Cloud Crypto Land, 84 Mod. L. Rev. 974, 981 (2020).
Reliance on predatorily priced credit is a thornier problem186For a discussion of why access to credit is a very different problem from access to transaction processing services, see Levitin, supra note 114, at 116.—here, solving the problem of financial inclusion will ultimately require that people have some wealth to begin with, and building that wealth is a complex political and social problem that will require public sector involvement.187“Ultimately, household solvency problems can only be addressed by secular changes in the economy that will result in greater income and lower expenses for households and greater savings rates that can provide cushion against unexpected expenses.” Id. at 162–63. Mehrsa Baradaran, for example, has argued for compensatory policies designed to build home-ownership in geographical areas that have typically been marginalized.188Baradaran, supra note 131, at 946–48. Sain Jones and Maynard have called for infrastructure improvements, tax policy changes, and government wealth transfers—in addition to improvements to financial services and technology oversight.189Jones & Maynard, Jr., supra note 9, at 848–61. Darrick Hamilton and William Darity, Jr., have proposed “baby bonds,” which would allow children in need to build wealth by the time they become adults.190Darrick Hamilton & William Darity, Jr., Can ‘Baby Bonds’ Eliminate the Racial Wealth Gap in Putative Post-Racial America?, 37 Rev. Black Pol. Econ. 207, 215 (2010). While technology might play a minor role in creating the infrastructure for delivering this kind of wealth-building, it will not come close to providing the whole solution. The undeservedly shiny promise of fintech can be weaponized, though, to argue that such meaningful structural solutions are unnecessary.

B.  Efficiency

Another big claim of fintech is that it can make financial services more efficient.191Saule T. Omarova, Technology v. Technocracy: Fintech as a Regulatory Challenge, 6 J. Fin. Regul. 75, 89 (2020). It is particularly common to hear that fintech is more efficient because it eliminates the need for human customer service or brick-and-mortar bank branches.192Levitin, supra note 114, at 142. In many ways, though, this rhetoric is overblown: most fintech payment services and lenders, for example, ultimately depend on traditional bank infrastructure and therefore do not fully eliminate their costs. Still, that promise of increased efficiency remains the front of many financial inclusion claims: the hope is that transaction processing services that are quicker and cheaper can serve more people (including traditionally excluded populations) more effectively.193Odinet, supra note 21, at 1755; Levitin, supra note 114, at 141–42. We have already discussed how these financial inclusion claims are often hollow; many fintech services have, in fact, become profitable by appealing to higher income customers. Still, promises of increased efficiency are also key to how fintech is marketed to these higher income consumers.194Baradaran, supra note 114, at 371–72; Levitin, supra note 114, at 143. But solving for “efficiency” in the abstract is an impossible task. It is critical that we define the precise problem to be solved, instead of simply assuming that some version of increased efficiency will get us where we need to go.

Techno-solutionism is tied to commonly accepted notions that “more efficient” is always an improvement: efficiency has been our mantra for so long, in so many business contexts, that it has come to be perceived as an obvious and neutral goal. But there are many different ways of conceptualizing efficiency that are relevant to fintech policy195Luke Herrine, What Do You Mean by Efficiency? An Opinionated Guide, LPE Project (Oct. 11, 2023), https://lpeproject.org/blog/who-cares-about-efficiency [https://perma.cc/4XDE-6G6A].: There is the colloquial sense of efficiency as avoiding wastefulness.196Id. We must also contend with economic definitions of allocative efficiency (which often hide distributional inequities),197Graham S. Steele, The Tailors of Wall Street, 93 U. Colo. L. Rev. 993, 1035 (2022). “Efficiency, in the Kaldor-Hicksian optimal allocative efficiency sense, is insensitive to distributional inequalities, and so regulation will be acceptably ‘efficient’ as long as someone’s gains offset someone’s harms.” Hilary J. Allen, Regulatory Managerialism and Inaction: A Case Study of Bank Regulation and Climate Change, 86 L. & Contemp. Probs. 71, 77 (2023). and informational efficiency (which relates to how well prices of financial assets reflect available information).198Yesha Yadav, How Algorithmic Trading Undermines Efficiency in Capital Markets, 68 Vand. L. Rev. 1607, 1610 (2015). Or we might take a computer science approach and try to “minimize the consumption of time, energy, space, or cost in satisfying a specification of correctness for a given problem”—although Ohm and Frankle note that there are still many axes of efficiency to be traded off even within this technology-centric definition.199Ohm & Frankle, supra note 36, at 804. There has also been increased recognition within the computer science discipline that computational efficiency is not always the right parameter to maximize, with computer scientists and engineers sometimes “turn[ing] away from efficient solutions when faced with the need to inject complex human values into systems.”200Id. at 838. As the previous Section explored, one of the most challenging human values to inject into financial services is distributional equity.

And so there is no single universal definition of efficiency, but it is true that payments often take too long to clear in the United States, which is a real and persistent problem for the underbanked.201Regarding the desire for faster funds availability among the underbanked, see Levitin, supra note 114, at 121. For more affluent people, such delays are merely an annoyance; for those who live paycheck to paycheck, waiting three days for a payment to clear can result in costly defaults or the need for expensive services like check cashing and payday lending.202Klein, supra note 185. The earned-wage access fintech products discussed in the previous Section aim to make delivery of funds more rapid, but they too can prove costly.203Financial regulators in California found that tip-based earned-wage access companies succeeded in pushing customers to tip their provider 73% of the time: the average APR (representing the total cost of using the service) for these tip-based companies was 334%. Cal. Dep’t Fin. Prot. & Innovation, 2021 Earned Wage Access Data Findings (2023), https://dfpi.ca.gov/wp-content/uploads/sites/337/2023/03/2021-Earned-Wage-Access-Data-Findings-Cited-in-ISOR.pdf [https://perma.cc/55SJ-N7SN].

While slow payments processing may seem at first blush like a technology problem, technologies for faster payments processing by banks already exist, and have been widely used (particularly outside of the United States) for some time.204Real-time transaction processing is common in many other countries. For example:

India had 89.5 billion real-time transactions in 2022 and an annual growth rate of 76%. Brazil was in second place with 30 billion transactions and a 230% annual growth rate in 2022. . . . By comparison, real-time transactions in North America are expected to expand from 3.9 billion in 2022 to 13 billion by 2027.

John Adams, Can FedNow Give U.S. Processors an Edge Over Global Rivals?, Am. Banker (July 31, 2023), https://www.americanbanker.com/payments/news/can-fednow-give-u-s-processors-an-edge-over-global-rivals [https://perma.cc/J2AR-DSE4].
The fact that these kinds of technologies are not widely used in the United States is in large part a political problem, requiring political solutions. Banks, for example, could be required to use readily available technologies to clear and settle payments more speedily by amending the Expedited Funds Availability Act.205Aaron Klein recommends “amending the Expedited Funds Availability Act to require immediate access for the first several thousand dollars of a deposit, instead of permitting the lengthy, costly delays that harm people living paycheck to paycheck.” Klein, supra note 185. The Federal Reserve launched its real-time payments service, FedNow, on July 20, 2023, but uptake by banks has been slow.206Felix Salmon, FedNow Is Live with 35 Banks, Axios (July 20, 2023), https://www.axios.com/2023/07/20/federal-reserve-fednow-payment [https://web.archive.org/web/20240303021335/https://www.axios.com/2023/07/20/federal-reserve-fednow-payment]. Congress could consider mandating that banks join FedNow to ensure that these faster payment rails are available to their customers.

To be clear, these political problems can be very intractable. If fintech providers could provide an end run around these political problems by providing quick and affordable payments processing, then that would be very appealing. Unfortunately, though, fintech payments providers sometimes overclaim regarding the increased efficiencies of their technologies. For example, despite repeated crypto industry assertions of improved efficiency,207Semenzin, supra note 38, at 8. the underlying blockchain technology is inefficient by design.208Ohm & Frankle, supra note 36, at 797. Processing transactions on any decentralized permissionless ledger will always be slower and more cumbersome than available centralized alternatives, because in the absence of costly computations, it would be too easy for a bad actor to take over a technologically decentralized system.209Schuster, supra note 185, at 981. As a result, transaction processing on blockchains is slow and expensive (and the cost and timing of such processing is often unpredictable), and blockchains struggle to scale to process large volumes of transactions.210White, supra note 40.

Since inefficiency is a feature and not a bug of technologically decentralized systems, if blockchain-based businesses are able to increase efficiencies, they are likely to derive from regulatory arbitrage strategies that reduce regulatory compliance costs. Most parties involved in financial transactions are required to engage in “know-your-client” due diligence and other compliance checks to help prevent the financial system from being used for money laundering and sanctions evasion.211These obligations derive from the Bank Secrecy Act, codified at 31 U.S.C. §§ 5311–36 and 12 U.S.C. §§ 1951–60. These checks necessarily add time and expense to transaction processing—time and expense that unregulated members of the crypto industry can avoid by engaging in regulatory arbitrage212“In many ways, the current modus operandi of cryptocurrencies is similar to an old Swiss model of banking where people could set up anonymous accounts and no questions were asked.” Igor Makarov & Antoinette Schoar, Crytpocurrencies and Decentralized Finance (DeFi), Brookings Papers on Econ. Activity, Spring 2022, at 141, 175. (the crypto industry has pushed back on legislative attempts to extend anti-money laundering obligations to entities involved in processing crypto transactions, citing the decentralized nature of the crypto ecosystem and the costs of impeding innovation).213See, e.g., Chamber Digit. Com., Statement on Digital Asset Anti-Money Laundering Act (July 28, 2023), https://digitalchamber.org/statement-on-digital-asset-aml-act [https://perma.cc/K4P4-A2LM].

There are, of course, many technological alternatives to blockchains. Some fintech alternatives may indeed have the potential to improve the speed or cost of payments processing and other financial services. But focusing on these kinds of efficiency to the exclusion of all else can cause problems, too. Faster payments, for example, often enable faster fraud,214“Faster transactions are susceptible to the same social engineering techniques fraudsters have employed to target legacy systems—but with the added twist that funds intercepted via faster payments are often irrecoverable due to their speed.” FIs Look to Advanced Technologies to Protect Faster Payments, PYMNTS (Apr. 12, 2024), https://www.pymnts.com/money-mobility/2024/fis-look-to-advanced-technologies-to-protect-faster-payments [https://perma.cc/X5BH-C4SS]. and are therefore opening up new consumer protection problems that need to be addressed. As we will discuss shortly, increased efficiencies can also increase the susceptibility of the financial system to financial crises, with all the human misery those crises entail.215Allen, supra note 113, at 23–24. Concerns about efficiency-induced fragility have been percolating since highly efficient but brittle supply chains stalled and crumbled during the Covid-19 pandemic. People are now asking whether we have gone too far in maximizing supply chain efficiency, at the expense of overall resilience and robustness.216See generally Rana Foroohar, Homecoming: The Path to Prosperity in a Post-Global World (2022); Kathryn Judge, Direct: The Rise of the Middleman Economy and the Power of Going to the Source (2022). We should ask the same question of technological innovations that are promising to make finance more efficient: What are they doing to the resilience of our financial system? To put the question a little differently, are increases in efficiency delivering diminishing marginal returns that are not commensurate with the increased fragilities they create?217In the context of algorithmic trading, Adair Turner commented that

the benefits of market liquidity must, like the benefits of any market completion, be of declining marginal utility as more market liquidity is attained. The additional benefits deliverable, for instance, by the extra liquidity which derives from flash or algorithmic training, exploiting price divergences present for a fraction of a second, must be of minimal value compared to the benefits from having an equity market which is reasonably liquid on a day-by-day basis.

Adair Turner, Chairman of the Financial Services Authority, Lecture at CASS Business School: What Do Banks Do, What Should They Do and What Public Policies Are Needed to Ensure Best Results for the Real Economy? 27 (Mar. 17, 2010), https://www.bayes.city.ac.uk/__data/assets/pdf_file/0006/77136/Adair-Turner-March-2011.pdf [https://perma.cc/RR4T-764U].

For example, fintech business models designed to make capital intermediation and risk management more efficient (ranging from robo-advisors to high frequency trading) may end up making our financial system more fragile—as well as undermining other kinds of efficiency, like informational efficiency.218Yadav, supra note 198, at 1610. Take the high frequency trading business model. It is facilitated entirely by algorithms designed to trade at speeds and in volumes that humans would not be capable of.219Id.; see also Allen, supra note 113, at 86–87. Proponents of high frequency trading argue that it improves the efficiency of capital intermediation because it increases the volume of trading and by providing more opportunities to transact, increases liquidity and lowers trading costs.220Senior Supervisors Group, Algorithmic Trading Briefing Note 1 (2015), https://www.newyorkfed.org/medialibrary/media/newsevents/news/banking/2015/SSG-algorithmic-trading-2015.pdf [https://perma.cc/Z88L-LZ9C]. But that is only true in normal times. When things are obviously wrong in the market (at least, obvious to a human), the algorithm may continue to trade in a way that generates “flash crashes” of asset prices, which could spark fire sale externalities that threaten the stability of the financial system.221Id. at 1, 3. If the algorithm does recognize that something is really wrong, more often than not its preprogrammed instruction is to simply stop trading, draining liquidity from the system when it is most needed.222“[I]n periods of heightened volatility . . . passive HFT market players, ie those that provide liquidity, typically keep a low profile by deleting trading orders, thereby reducing the supply of liquidity.” High-Frequency Trading Can Amplify Financial Market Volatility, Deutsche Bundesbank (Oct. 25, 2016), https://www.bundesbank.de/Redaktion/EN/Topics/2016/2016_10_25_monthly_report_october_high_frequency_trading.html [https://perma.cc/E4RG-9MGG].

“Tokenization” of real-world assets is another efficiency-driven form of fintech that could make the financial system more vulnerable during unanticipated circumstances.223Bank for Int’l Settlements, Blueprint for the Future Monetary System: Improving the Old, Enabling the New, in BIS Ann. Econ. Rep. 2023, at 85, 85 (2023) [hereinafter BIS Blueprint], https://www.bis.org/publ/arpdf/ar2023e3.pdf [https://perma.cc/UX8E-YXG4]. For further discussion of this issue, see generally Next Generation Infrastructure: How Tokenization of Real-World Assets Will Facilitate Efficient Markets Before the Subcomm. on Digit. Assets, Fin. Tech., & Inclusion of the H. Comm. on Fin. Servs., 118th Cong. (2024) (statement of Hilary J. Allen, Professor of Law, American University Washington College of Law). These tokens are digital representations of real-world assets that can be preprogrammed such that financial transactions will self-execute without human intervention.224BIS Blueprint, supra note 223, at 85. Automating transactions can certainly increase speed and reduce costs225“The projects . . . reportedly seek to improve efficiency . . . [by] embedding features like programmability, and automaticity.” Fin. Stability Oversight Council, Annual Report 2023, at 45 (2023). (tokenization is typically associated with blockchain technologies, but programmable tokens can also be hosted on other kinds of ledgers and so avoid blockchain’s inefficiencies).226BIS Blueprint, supra note 223, at 94. However, the speed of self-execution can cause problems when the world has changed in ways that were not contemplated by the token’s programmers.227Just like legal contracts, computer programs cannot anticipate all future states of the world. For an overview of the literature on incomplete contracts, see Cathy Hwang, Collaborative Intent, 108 Va. L. Rev. 657, 665–67 (2022). During periods of systemic stress (when flexibility is critical to avoiding a crisis),228Katharina Pistor, A Legal Theory of Finance, 41 J. Compar. Econ. 315, 321 (2013). automated transactions will still execute rapidly—even if the parties would otherwise have agreed to negotiate or extend some grace to their counterparties to prevent temporary liquidity problems from metastasizing into something worse.

If we want our financial system to be more robust and resilient overall, we will sometimes need to focus on preserving or adding back inefficiencies, to allow the system to reconfigure when the unexpected happens in order to prevent failure.229J.B. Ruhl, Governing Cascade Failures in Complex Social-Ecological-Technological Systems: Framing Context, Strategies, and Challenges, 22 Vand. J. Ent. & Tech. L. 407, 422 (2020). This may require certain aspects of the financial system to have frictions (like circuit breakers), or to be slower, or to have more redundancies. Obviously, a system that is entirely inefficient would be of no use at all, so the key is to achieve the right balance of efficiency against other system attributes.230Id. We are more likely to achieve the right balance if we reject techno-solutionist exhortations for efficiency qua efficiency. Then we can start interrogating on a case-by-case basis where a type of efficiency will deliver only diminishing marginal returns and is not worth the attendant fragilities, as well as where financial regulation might help compensate for those fragilities.

C.  Competition

Where there is a perceived lack of efficiency in the provision of financial services, innovation-driven competition is often seen as the answer.231Brummer & Yadav, supra note 121, at 275. Fintech proponents often trumpet the disruption and competition fintech creates for the financial industry’s more highly-regulated institutions when it comes to providing capital intermediation (particularly credit), risk management, and transaction processing services.232Id. at 275–77. However, as with efficiency, if the competition benefits associated with fintech are a product of regulatory arbitrage rather than technological superiority, then they may not be worthwhile or desirable from a public policy perspective.

It is true that disrupting incumbents can be challenging in highly regulated industries, like finance, because regulatory compliance can serve as a barrier to entry—arguments have been made for repealing or waiving financial regulations as a result.233Allen, supra note 58, at 587–88. This Article will take up the topic of deregulation in Part III: here, it suffices to say that we’ve already seen that businesses like fintech lenders and crypto intermediaries often find their competitive advantage not by fundamentally changing how financial services are delivered, but by using the veneer of techno-solutionism to justify their regulatory arbitrage.234See supra notes 145–47, 211–13 and accompanying text. This kind of regulatory arbitrage may in some circumstances result in reduced costs for consumers (although predatory pricing exists in some fintech markets, so this is by no means guaranteed).235On the high cost of fintech loans, see Odinet, supra note 21, at 1743. However, where the law being skirted serves an important social purpose—particularly if it exists to protect the public from harm—then this kind of competition may be socially undesirable even if it lowers prices. In a recent article, Saule Omarova and Graham Steele argued that prudential banking regulation, which seeks to ensure that banks are managed in a safe and sound manner, does not in fact inhibit competition but actually restrains incumbents from abusing their existing market power.236Saule T. Omarova & Graham S. Steele, Banking and Antitrust, 133 Yale L.J. 1162, 1171 (2024). They argue that without this regulation, new firms would have to contend with even more firmly entrenched incumbent banks.237Id. They also argue that firms who skirt this regulation can develop market power in an antisocial way where gains are privatized and losses socialized.238Omarova and Steele identify a number of risks of regulatory arbitrage:

Shadow banking in general, and fintech and crypto specifically, are often motivated by a desire to arbitrage around the existing banking rules and regulations, thereby capturing the benefits of banks’ ‘specialness’ while evading the constraints of banking law. As the pre-2008 experience shows, unchecked growth of such alternative markets impairs regulators’ ability to prevent excessive accumulations of risk and leverage in the financial system. More fundamentally, permitting the rampant growth of private forms of money and money substitutes threatens the sovereign public’s ability to control the supply and flow of money and credit in the economy.

Id. at 1245.

Ultimately, whether rent-a-bank partnerships and other business models that use new technologies to arbitrage existing laws are seen as a “solution” to imperfectly competitive markets will depend on how the problem of “competition” is construed. For nearly fifty years, competition law in the United States has focused very narrowly on addressing inefficiencies arising from market power that impact the prices paid by consumers.239Id. at 1177–78. If, however, we embrace a more expansive and nuanced notion of the public harms that can result from excessive economic concentration, and appreciate that “[m]arket power also harms society as a whole by lessening economic growth and productivity and by contributing to our Gilded Age levels of inequality,”240Jonathan B. Baker, Finding Common Ground Among Antitrust Reformers, 84 Antitrust L.J. 705, 707 (2022). then it will become clear that technology cannot resolve these kinds of concerns on its own.

Technology may, in fact, be the source of some of these concerns about market power (or at least, their accelerant). For example, the power of dominant technology platforms to use algorithms to manipulate their users and their competitive environment has been a dominant concern of Lina Khan and other “neo-Brandeisian” antitrust scholars.241Id. at 706.

These scholars have proposed antitrust law reforms to the economic concentration and market power of the giant tech platforms,242Id. but the tech industry prefers its own tech solution in the form of Web3.243Chris Dixon, Read, Write, Own: Building the Next Era of the Internet xix (2024); see also Semenzin, supra note 38, at 1. “Web3” is not so much a reality as it is a marketing term for a more utopian vision of an internet where the use of blockchain technology helps wrest control and ownership away from the existing tech platforms. (By way of background, Web1 describes the read-only internet of the 1990s; Web2 is our current era in which we can read and also create content, but it is all intermediated through large platforms; and Web3 is supposed to let us “read, write, and own” the Internet.)244White, supra note 40. Although this may sound superficially appealing, there are many reasons to be cynical about this techno-solutionist vision (which many consider to be no more than a cynical crypto rebrand).245Id.

First of all, we can look at who is investing in Web3. Andreessen Horowitz, the preeminent VC firm investing in Web3 companies, also has important relationships with Web2 platform companies (like Meta) that Web3 purports to disrupt.246Ephrat Livni, Tales from Crypto: A Billionaire Meme Feud Threatens Industry Unity, N.Y. Times (Jan. 18, 2022), https://www.nytimes.com/2022/01/18/business/dealbook/web3-venture-capital-andreessen.html [https://web.archive.org/web/20220923102005/https://www.nytimes.com/2022/01/18/business/dealbook/web3-venture-capital-andreessen.html]. Meta (née Facebook) itself invested heavily in a Web3-aligned Metaverse that incorporated blockchain technology—although Meta has now largely pivoted away from the Metaverse to AI.247Selinger, supra note 1. For a discussion of the relationship between Web3, the Metaverse, and blockchain technology, see generally Thien Huynh-The, Thippa Reddy Gadekallu, Weizheng Wang, Gokul Yenduri, Pasika Ranaweera, Quoc-Viet Pham, Daniel Benevides da Costa & Madhusanka Liyanage, Blockchain for the Metaverse: A Review, 143 Future Generation Comput. Sys. 401 (2023). Obviously, none of this investment would have happened if the players involved did not see opportunities to profit in Web3—some have surmised that the real vision was for a Web3 where institutional players could use blockchain technology to make a small profit from every interaction that happens online.248“[I]n blockchain discourses, almost every human transaction is conceived in terms of value . . . and every human relationship can be conceptualized in terms of economics.” Semenzin, supra note 38, at 6.

Even if we put aside cynicism about the bona fides of Web3 proponents and take it at face value, though, it is clear that the technology alone will not solve the Internet’s economic concentration problem. Visions of Web3 rely on the same blockchain technology as crypto.249Web3 is the “internet of the metaverse,” and blockchain is considered a critical technology for that metaverse. Huynh-The et al., supra note 247, at 409. Blockchain technology is designed to ensure that no one single node in the system has centralized control over which transactions are added to the blockchain;250De Filippi & Wright, supra note 161, at 2. the tokens and other protocols built on blockchains like Ethereum are designed to decentralize control by distributing ownership among token holders and automating transactions so that no humans are required to execute those transactions. As already discussed, many inefficiencies are incurred in order to achieve this kind of technological decentralization,251See supra notes 207–210 and accompanying text. but even after all that, technological decentralization does not guarantee economic decentralization.252See generally Aramonte et al., supra note 182. A system can have lots of nodes, but if someone controls a lot of those nodes, then they can control the system.

Aspirations notwithstanding, economic power in crypto is often highly concentrated and can be exploited in many ways. When projects are built on blockchains, for example, they often take the form of nominally “decentralized autonomous organizations,” in which participants are given governance tokens that allow them to vote on the direction of the project, which are then preprogrammed using software called a smart contract. However, as economists Makarov and Schoar have documented, “in the majority of crypto projects, developers and early investors choose to keep control of the platform by allocating significant stakes to themselves. In addition, even if developers do not have a large stake, in many cases they managed to maintain de facto significant control over the platform.”253Makarov & Schoar, supra note 212, at 184; see also Tom Barbereau, Reilly Smethurst, Orestis Papageorgiou, Johannes Sedlmeir & Gilbert Fridgen, Decentralised Finance’s Timocratic Governance: The Distribution and Exercise of Tokenised Voting Rights, Tech. Soc’y, May 2023, at 1, 11 (“[M]inority rule is the probable consequence of tradable voting rights . . . and no applicable anti-monopoly or anti-concentration laws.”).

When it comes to the process of validating transactions on the blockchains themselves, again, there are strong economic incentives that have resulted in the concentration of validation power in the hands of just a few groups.254“[T]here are strong implicit incentives for validators to pool their capacity and coinsure their risk of winning a block reward.” Makarov & Schoar, supra note 212, at 147. There is evidence that some concentrated groups of validators process transactions in the order that reflects the wishes of the highest bidder and potentially harms the interests of those whose transactions are processed later (a practice known as maximal (formerly miner) extractable value (“MEV”)).255“[A]s a pending transaction sits in a mempool, miners and validators have found ways to profit from them by including, excluding or reordering transactions in a block. This strategy involves maximal (formerly miner) extractable value, or MEV.” Ekin Genç, What is MEV, aka Maximal Extractable Value?, CoinDesk (Sept. 2, 2022, 7:00 PM), https://www.coindesk.com/learn/what-is-mev-aka-maximal-extractable-value [https://web.archive.org/web/20250112130542/https://www.coindesk.com/learn/what-is-mev-aka-maximal-extractable-value]. We therefore need a solution other than blockchain if we wish to ensure that powerful technology platforms do not inhibit inclusive economic growth. That solution will likely be found in antitrust law, not in technology.

D.  Security

The concentration of validation power in the hands of just a few groups will also create security vulnerabilities for blockchains. In 2022, cybersecurity researchers found that just four pools of Bitcoin validators working in concert could subvert the Bitcoin blockchain.256Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir & Sonya Schriner, Trail of Bits, Are Blockchains Decentralized?: Unintended Centralities in Distributed Ledgers 4 (2022), https://apps.dtic.mil/sti/pdfs/AD1172417.pdf [https://perma.cc/7ZED-3CZW]. There are also security vulnerabilities associated with the fact that no person or entity is designated accountable for ensuring that a blockchain’s software is maintained and kept secure from cyberattacks.257Angela Walch, The Bitcoin Blockchain as Financial Market Infrastructure: A Consideration of Operational Risk, 18 N.Y.U. J. Legis. & Pub. Pol’y 837, 870 (2015). In 2024, for example, the Department of Justice indicted two MIT graduate brothers for attacking the protocols of the Ethereum blockchain and stealing approximately $25 million of Ethereum cryptocurrency in 12 seconds.258Press Release, U.S. Dep’t of Just. Off. of Pub. Affs., Two Brothers Arrested for Attacking Ethereum Blockchain and Stealing $25M in Cryptocurrency (May 15, 2024), https://www.justice.gov/opa/pr/two-brothers-arrested-attacking-ethereum-blockchain-and-stealing-25m-cryptocurrency [https://perma.cc/6YWX-EZ9S]. It is not realistic to think all of a blockchain’s users will protect and maintain the blockchain’s software by way of a collective effort,259“Everyone involved in a blockchain ecosystem benefits from the existence of a rock-solid protocol and high-quality software, but everyone is also better off free riding on someone else’s work to develop them.” James Grimmelmann & A. Jason Windawi, Blockchains as Infrastructure and Semicommons, 64 Wm. & Mary L. Rev. 1097, 1120 (2023). and so blockchain security tends to depend on informal groups of core software developers with no legal responsibilities.260Walch, supra note 257, at 870. This is in stark contrast with regulated financial infrastructure providers like the Depositary Trust & Clearing Corporation, who must comply with the internationally accepted Principles for Financial Market Infrastructure. These Principles require, among other things, that financial infrastructure providers have a clear legal basis and governance structure, and policy and procedures around the management of risks (including security risks).261See generally Comm. on Payment & Settlement Sys., Bank for Int’l Settlements, & Tech. Comm. of the Int’l Org. of Sec. Comm’ns, Principles for Financial Market Infrastructures (2012), https://www.bis.org/cpmi/publ/d101a.pdf [https://perma.cc/F9MG-VRRF]. No such requirements are currently applied to blockchains.

Blockchains are not the only new fintech infrastructure that has generated new security vulnerabilities. Consider, for example, the push for open banking, which has been described as “the sharing and leveraging of customer-permissioned data by banks with third party developers and firms to build applications and services, such as those that provide real-time payments, greater financial transparency options for account holders, and marketing and cross-selling opportunities.”262Basel Comm. on Banking Supervision, Bank for Int’l Settlements, Report on Open Banking and Application Programming Interfaces 19 (2019), https://www.bis.org/bcbs/publ/d486.pdf [https://perma.cc/8K9Y-VSSN]. Application programming interfaces (“APIs”) are computer programs that allow different technology systems to speak directly to one another, and they form the backbone of many open banking initiatives.263Dan Awrey & Joshua Macey, The Promise & Perils of Open Finance, 40 Yale J. on Regul. 1, 3–4 (2023). However, API development is often outsourced to third-party software developers,264Id. at 42. and there can be quality control issues with regard to the maintenance and security of API software: it has been documented in the healthcare context, for example, that APIs are often the “weakest link” in cybersecurity protections.265Steve Alder, 100% of Tested mHealth Apps Vulnerable to API Attacks, HIPAA J. (Feb. 16, 2021), https://www.hipaajournal.com/100-of-tested-mhealth-apps-vulnerable-to-api-attacks [https://web.archive.org/web/20240629000000*/https://www.hipaajournal.com/100-of-tested-mhealth-apps-vulnerable-to-api-attacks/].

Even when APIs work well, their efficiencies may cause new security vulnerabilities, in the vein of the efficiency-induced fragilities discussed in Section II.B. One use case for APIs is to increase the speed of payments processing by making it easier for different systems to share payments data.266Basel Comm. on Banking Supervision, supra note 262, at 16. However, APIs are not just more efficient at passing desired data between systems—they may potentially be very efficient at passing along problems as well. It is underappreciated that APIs may work as channels that transmit operational problems from one institution to another.267Hilary J. Allen, Reinventing Operational Risk Regulation for a World of Climate Change, Cyberattacks, and Tech Glitches, 49 J. Corp. L. 727, 759 (2024). If, by linking all the players in a financial system, we improve efficiencies in normal times but increase the chance that the players will all fail together if something goes wrong, then that will undermine financial stability. The same could be said of a financial system where just a few cloud computing providers efficiently store critical data for all of the world’s financial institutions.268Id. at 757–58; U.S. Dep’t of Treasury, The Financial Services Sector’s Adoption of Cloud Services 57 (2023), https://home.treasury.gov/system/files/136/Treasury-Cloud-Report.pdf [https://perma.cc/6VMQ-XD2Q].

The broader idea behind open banking is to use APIs to make it easier for bank customers to share their data with, and thus obtain services from, other fintech providers. While pitched as a solution to some of the barriers to competition discussed in Section II.C, the rise of open banking implicates important questions about information security that we need to grapple with. Most obviously, using insecure APIs to transmit data creates opportunities for data breaches, fraud, and identity theft (fintech lending business models that assemble extensive non-traditional data profiles to address the creditworthiness of their users will also be attractive targets for such practices).269The information economy has given rise to a “seemingly continuous stream of major data breaches and epidemic levels of fraud and identity theft” where “vulnerability is a given, and eventual loss seems only a matter of time.” Cohen, supra note 17, at 101. But the sharing of data contemplated by open banking will also generate more subtle threats to our informational security, in the form of increased surveillance by an increased number of parties who can then use that data to manipulate us and others like us.

Raul Carillo has noted that fintech firms, like other technology companies, “reconstitute people into ‘data doubles,’ which can then be sorted, stored, scored, shared, and sold.”270Carillo, supra note 75, at 1210. The increased sophistication of machine learning technology is only making this kind of data more valuable.271Solow-Niederman, supra note 149, at 6. Data about consumers’ payments are particularly valuable, because those data yield rich, detailed, and unvarnished insights into how individuals behave and what they value.272Carillo, supra note 75, at 1211. On the value of unmediated data, see Cohen, supra note 17, at 84. Individuals will often fail to understand how their payments data might be used or what it communicates about them,273Solow-Niederman, supra note 149, at 1. but this kind of data can be used to surveil and then manipulate them.274Carillo, supra note 75, at 1222. For example, Consumer Finance Protection Bureau (“CFPB”) Director Rohit Chopra raised concerns that “Big Tech firms can use detailed payments data to develop personalized pricing algorithms for e-commerce or increase engagement with behavioral advertising.”275Rohit Chopra, CFPB Director, Remarks at the Global Financial Innovation Network’s Annual General Meeting (Nov. 8, 2023), https://www.consumerfinance.gov/about-us/newsroom/prepared-remarks-of-cfpb-director-rohit-chopra-at-the-global-financial-innovation-networks-annual-general-meeting [https://perma.cc/6CFW-UGXU]. Alicia Solow-Niederman has emphasized that machine learning technology can now be deployed to “use available data collected from individuals to generate further information about both those individuals and about other people,” and these inferences can then be used to predict people’s behavior, manipulate them, and color reputations.276Solow-Niederman, supra note 149, at 5; see also Cohen, supra note 17, at 76. Payments platforms may even use the data they collect about their users to deplatform them, censoring people’s ability to engage in financial transactions.277“PayPal updated its regulations to give itself the power to levy fines and take other punitive actions, including deplatforming, against users engaged in conduct that would not otherwise violate federal law. (PayPal withdrew the regulation.)” Rohit Chopra, CFPB Director, Remarks at the Brookings Institution Event on Payments in a Digital Century (Oct. 6, 2023), https://www.consumerfinance.gov/about-us/newsroom/prepared-remarks-of-cfpb-director-rohit-chopra-at-the-brookings-institution-event-on-payments-in-a-digital-century [https://perma.cc/VC3C-VTPS]. These kinds of harms are not distributed equally, and often the most vulnerable groups will be surveilled the most as well as suffer the most from this surveillance: “[M]any lower-income users rely exclusively on mobile platforms that are less versatile, less amenable to user customization and control, and designed to maximize data sensing and harvesting.”278Cohen, supra note 17, at 177.

The subtle and not-so-subtle harms associated with payments data collection prompt a need to minimize the collection of payments data in the first place.279Carillo, supra note 75, at 1227–28. Fintech once again proposes a techno-solutionist solution to this problem, in the form of the pseudonymous blockchain. However, the blockchain does not minimize the production of data—it still records every transaction on the blockchain, although it cloaks them in pseudonymity.280Id. at 1240. Blockchains make all transactions associated with a public key visible to everyone—meaning that once someone (law enforcement, an intimate partner, a stalker) knows someone’s public key, they can easily identify all of their transactions.281Anna P. Kambhampaty, Alisha Haridasani Gupta & Valeriya Safronova, Crypto Joins the Abortion Conversation, N.Y. Times (May 14, 2022), https://www.nytimes.com/2022/05/14/style/abortion-crypto-donations.html [https://web.archive.org/web/20241201161402/https://www.nytimes.com/2022/05/14/style/abortion-crypto-donations.html]. This reality exposes the folly of techno-solutionist proposals to use crypto to assist women seeking abortions in the United States, for example.282Id. As one New York Times article put it, “though many crypto enthusiasts dangle the lure of anonymity . . . because of the precision with which the blockchain traces transactions, paying for abortions using crypto could potentially have the opposite effect: exposing both the women getting abortions and the people paying for them.”283Id. And not only is the blockchain itself highly legible, but those who use blockchain-based financial services typically also rely on a number of intermediaries who can also collect user data.284Carillo, supra note 75, at 1245. For a discussion of the different kinds of crypto intermediaries who may collect data, see Hilary J. Allen, DeFi: Shadow Banking 2.0?, 64 Wm. & Mary L. Rev. 919, 924 (2023).

If we truly wish to minimize the production of payments data, the most simple solution does not require any technology—lawmakers could take steps to preserve physical cash infrastructure, as cash transactions do not generate any data (there are also financial inclusion and resilience justifications for ensuring that cash continues to be accepted).285Brett Scott, Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets 191–92, 200 (2022); Hilary J. Allen, Payments Failure, 62 B.C. L. Rev. 453, 513 (2021). As a supplement to physical cash, Carillo proposes a “Postal Cash Card” that can store value and facilitate transactions in a way that emulates debit cards but does not generate any data about the holder.286Carillo, supra note 75, at 1295–99. Carillo’s proposal is an illustration of the principle that rejecting techno-solutionism does not necessarily mean rejecting technology: he has proposed a technological innovation (the card), but also provided a detailed proposal about the institutional context in which it will be offered (non-profit, at the post office), in a way that is responsive to expressed privacy concerns and pushes back against the tide of “data-vacuuming” in for-profit technological development. Carillo’s proposal also supplies another illustration of the point that when it comes to technological innovation, incentives matter, and so a technology developed by a public entity for a non-profit purpose is more likely to avoid the siren song of mass data collection than a private sector payments technology.

III.  Financial Regulation and Techno-Solutionism

The previous Parts have described what techno-solutionism is and how it manifests in the context of fintech. As part of that discussion, Part II identified a panoply of fintech harms in need of regulation, but the law’s ability to rein in such harms is often stymied by techno-solutionism that it helps perpetuate. We certainly should not assume that the law is the only thing at work here—techno-solutionism is itself a complex phenomenon with many causes.287See supra notes 24–26 and accompanying text. However, illuminating financial regulation’s relationship with techno-solutionism is an important precondition to addressing the negative impacts of fintech.

A.  Quick Primer on Financial Regulation

This Article has already observed that technology businesses are constructed in part by law; as Katharina Pistor has explained, the same is true for finance.288Pistor, supra note 228, at 321. Financial regulation is a constitutive part of fintech’s evolution, but the law as applied to fintech has sometimes had an unhealthy relationship with techno-solutionism. One problem with techno-solutionism is that it downplays the value of non-technological domain area expertise,289See supra notes 50–53 and accompanying text. but the history and context for why we regulate finance are critical parts of any discussion of how the law should address fintech. This Section therefore provides some background on financial regulation more generally, before the next Section demonstrates how financial regulation can both facilitate and be inhibited by techno-solutionism.

We have already explored techno-solutionism’s false neutrality.290See supra notes 32–36 and accompanying text. More specifically to fintech, Omarova observes that “even the most advanced technology is merely a tool. How to use it—for what purposes, and to what effect—is a choice.” Omarova, supra note 191, at 76. Along with this false neutrality often comes a false equivalence where different applications of technologies are painted as equally transformative and equally worthy of pursuit, notwithstanding that the benefits and costs of different applications will inevitably vary. We often hear fintech services analogized to other internet services—“send money around the world as easily as you can send an email”291See, e.g., Decentralized Finance (DeFi), Ethereum, https://ethereum.org/en/defi [https://perma.cc/J8H6-SVB9] (“Ethereum makes sending money around the world as easy as sending an email.”).—but losing money is much more consequential than losing an email (certainly for the person involved, and potentially also for confidence in financial institutions and the broader financial system). Because the stakes are so high, and because we have so many historical examples of things going badly wrong in the financial system, finance has long been heavily regulated—in a way that couriered letters never were. Techno-solutionists ignore that history at their (or rather, our) peril.

Financial regulatory agencies are typically given mandates to pursue one or more of the following “menu” of financial regulatory goals: financial stability, consumer protection, investor protection, market efficiency, competition, and preventing financial crime.292Armour et al., supra note 112, at 61–69. It should be noted that the Commodity Futures Trading Commission’s (“CFTC”) mandate to pursue market integrity does not fit easily into this menu but relates most closely to missions to promote market efficiency. Notably, no U.S. financial regulatory agency has an express statutory mandate to promote innovation. Instead, the banking agencies (the Federal Deposit Insurance Corporation (“FDIC”), Office of the Comptroller of Currency (“OCC”), and the Federal Reserve) were all formed in response to episodes of financial instability, and all have some form of “safety and soundness” mandate oriented toward ensuring the stability of the financial system293Hilary J. Allen, Regulating Fintech: A Harm Focused Approach, 52 Comput. L. & Sec. Rev. 1, 2–3 (2024). (a council of these and other regulatory agencies known as the Financial Stability Oversight Council has an explicit mandate to promote financial stability).294Dodd-Frank Wall Street Reform and Consumer Protection Act, Pub. L. No 111-203, § 112(a), 124 Stat. 1394–96 (2010) (codified at 15 U.S.C. § 5322). Financial stability regulation can have microprudential and macroprudential orientations: a microprudential approach seeks to ensure the solvency of individual financial institutions, whereas a more macroprudential approach seeks to protect the financial system as a whole by understanding and responding to how those financial institutions are interconnected, and to other market dynamics.295Jeremy C. Kress & Jeffery Y. Zhang, The Macroprudential Myth, 112 Geo. L.J. 569, 578 (2024). Regardless of orientation, the ultimate goal of financial stability regulation is to ensure that the financial system can continue to supply the credit and transactional services on which the broader economy depends for growth.296When a financial system is stable, it is “able to withstand shocks without giving way to cumulative processes which impair the allocation of savings to investment opportunities and the processing of payments in the economy.” Tommaso Padoa-Schioppa, Central Banks and Financial Stability: Exploring a Land in Between 20 (Second ECB Cent. Banking Conf., Policy Panel Introductory Paper, 2002), http://www.ecb.de/events/pdf/conferences/tps.pdf [https://perma.cc/8ZJH-3EQC].

Market regulators like the Securities and Exchange Commission (“SEC”), Commodity Futures Trading Commission (“CFTC”), and CFPB were also formed in response to specific episodes of public harm. The SEC was created as an investor protection body in the wake of the stock market crash of 1929 and ensuing Great Depression (later, in 1996, the SEC was given additional mandates to promote efficiency and capital formation).297National Securities Markets Improvement Act of 1996, Pub. L. No. 104-290, § 106, 110 Stat. 3424–25 (1996). The CFTC was created in 1974 in response to concerns about excessive speculation and manipulation in agricultural futures markets.298In 1973, “[g]rain and soybean futures prices reach record highs. This is blamed in part on excessive speculation and there are allegations of manipulation. Congress begins to consider revising the Federal regulatory scheme for commodities.” History of the CFTC: US Futures Trading and Regulation Before the Creation of the CFTC, CFTC, https://www.cftc.gov/About/HistoryoftheCFTC/history_precftc.html [https://web.archive.org/web/20241225012428/https://www.cftc.gov/About/HistoryoftheCFTC/history_precftc.html]. The CFPB was formed in 2010 as a response to the consumer protection failures that contributed to the 2008 financial crisis,299Leonard J. Kennedy, Patricia A. McCoy & Ethan Bernstein, The Consumer Financial Protection Bureau: Financial Regulation for the Twenty-First Century, 97 Cornell L. Rev. 1141, 1144–45 (2012). and has mandates to protect consumers and promote competition.300“The Bureau shall seek to implement and, where applicable, enforce Federal consumer financial law consistently for the purpose of ensuring that all consumers have access to markets for consumer financial products and services and that markets for consumer financial products and services are fair, transparent, and competitive.” 12 U.S.C. § 5511. In 2023, some Republican lawmakers sought to give the SEC an additional mandate to promote innovation, but the provision was eventually struck from the proposed legislation (had such a provision been enacted, it would no doubt have served as a weapon for those seeking to invalidate the SEC’s investor protection rules on the grounds that they stifled innovation).301Hilary J. Allen, The SEC Should Not Sacrifice Citizens on the Altar of Private Sector Innovation, The Hill (July 18, 2023, 9:00 AM), https://thehill.com/opinion/finance/4101392-the-sec-cannot-sacrifice-citizens-on-the-altar-of-private-sector-innovation [https://web.archive.org/web/20231106022916/https://thehill.com/opinion/finance/4101392-the-sec-cannot-sacrifice-citizens-on-the-altar-of-private-sector-innovation]. In the absence of any express innovation mandates, efficiency and competition mandates are the ones typically invoked to justify innovation-friendly regulatory policies.

While it is possible to interpret efficiency and competition mandates as complementary to the goals of investor and consumer protection and financial stability,302For example,

[i]f the genesis of financial regulation was the desire to force the financial industry to internalize the costs of the harm it creates for others, then it would be more consistent with that harm reduction function to interpret the efficiency criterion in a distributionally sensitive way and consider what would be more efficient from the perspective of society more broadly.

Allen, supra note 293, at 5 (emphasis omitted).
efficiency and competition mandates are often framed in ways that conflict with those other goals (for example, as Part II explored, fintech that has been touted as promoting efficiency and competition can come at the price of exposing consumers and investors to predatory inclusion). If it is assumed that technology is the best, easiest, or only way to improve efficiency and competition, this techno-solutionist framing will lend itself to accommodative regulatory strategies that sacrifice investor, consumer, and financial stability protection goals. This is not just an issue for regulators: lawmakers in Congress have also sometimes been swayed by techno-solutionism. The next Section will consider whether fintech-specific legislative and regulatory proposals have helped perpetuate techno-solutionism in a way that undermines financial regulation’s ability to protect the public from harm.

B.  Financial Regulation and Techno-Solutionism

Fintech poses many challenges for the enterprise of financial regulation: as Saule Omarova has observed, fintech disrupts financial regulation’s “basic normative thrust, its hierarchy of goals, its procedural mechanisms and tools, and its practical efficacy.”303Omarova, supra note 191, at 77. For further discussion of the challenges that fintech poses for financial regulation, see Allen, supra note 113, at 135–62. Furthermore, there are some truly novel privacy-type harms arising from the movement toward an economy “oriented principally toward the production, accumulation, and processing of information,” and existing financial regulation is not up to protecting against these kinds of harms.304Cohen, supra note 17, at 6. For example, existing financial privacy statutes (like the Gramm-Leach-Bliley Act) are simply not up to the task of responding to the types of privacy concerns explored in Section II.D,305Carillo, supra note 75, at 1224. and existing financial regulation would similarly struggle to address the harms that would arise from the integration of large tech platforms and finance.306Section 4 of the Bank Holding Company Act (“BHC Act”) enforces a separation between deposit-taking banks and other commercial enterprises but does nothing to separate commercial enterprises from lending or payments activities. 12 U.S.C. 1843. There are also loopholes in the BHC Act’s definition of “bank” for things like industrial loan companies that tech platforms may seek to exploit. See infra note 332. With all that said, though, existing financial regulation can still force a reckoning with many of the negative consequences of fintech innovation and require them to be remedied. We have decades of experience with many of the kinds of harms that fintech is inflicting, and many of the problems raised in Part II have solutions based in existing legal remedies. The fact that new technologies have come to play an increasingly important role in delivering financial services has sometimes been weaponized (through cognitive capture and related strategies) to obscure the applicability of existing law, but we should not unquestioningly accept the premise that all previous grants of regulatory authority (and the rules implementing them) are hopelessly outmoded and obsolete as a result of technological change.

This Section will look at fintech-specific legislative proposals and administrative actions that illustrate how techno-solutionism is impacting the creation of new financial regulation, and the implementation of existing financial regulation (this is not a comprehensive survey of all fintech-related financial regulation to date, but instead a series of illustrative examples). The Section will finish by looking at a developing area of financial regulatory practice: regulation of the financial industry’s use of AI.

  1. Legislative Proposals

As of the date of writing, the United States Congress has not enacted any fintech-specific legislation. However, a number of fintech-related bills have been introduced, and in a context where norms about how to respond to fintech and its harms are still developing, these bills can have an expressive valence. Some of these bills express the standard techno-solutionist message that

government regulation will stifle innovation in the dynamic tech sector, that it is unnecessary because market forces and the tech companies’ own benevolence will prevent social harms, and that, where regulation is called for, self-regulation is the only effective way to order the behavior of companies in this complex industry.307Short et al., supra note 55, at 4.

Other proposed bills have sought to address the harms associated with fintech business models and serve as something of a counterbalance to the formation of techno-solutionist norms.

In particular, a number of crypto-related bills have been introduced into Congress. Some of these bills are targeted narrowly at the harms associated with using crypto for money laundering and sanctions evasion, consistent with the regulatory goal of preventing financial crime.308See, e.g., Digital Asset Anti-Money Laundering Act, S. 2669, 118th Cong. (2023). The more far-reaching bills, however, (like the Lummis-Gillibrand Responsible Financial Innovation Act,309S. 4356, 117th Cong. (2022). the Digital Commodities Consumer Protection Act,310S. 4760, 117th Cong. (2022). and the Financial Innovation and Technology for the 21st Century Act311H.R. 4763, 118th Cong. (2023). passed by the House of Representatives in May 2024) are widely regarded to have been driven by the crypto industry and their VC funders.312“Crypto lobbyists pushed heavily for [the Financial Innovation and Technology for the 21st Century Act] on Capitol Hill, and the bill was publicly supported by leading voices in the industry including Coinbase, The Block, and Digital Currency Group.” Sophia Kielar & Samidh Guha, The Future of Crypto Regulation: What is FIT 21?, Thomson Reuters (Sept. 20, 2024), https://www.thomsonreuters.com/en-us/posts/government/crypto-regulation-fit-21 [https://perma.cc/A95J-KMEE]; see also Cheyenne Ligon, The ‘SBF Bill’: What’s in the Crypto Legislation Backed by FTX’s Founder, CoinDesk (Nov. 15, 2022, 3:05 PM), https://www.coindesk.com/policy/2022/11/15/the-sbf-bill-whats-in-the-crypto-legislation-backed-by-ftx-founder [https://perma.cc/8LUN-ULC4]. The same dynamic is playing out at the state level. See Eric Lipton & David Yaffe-Bellany, Crypto Industry Helps Write, and Pass, Its Own Agenda in State Capitols, N.Y. Times (Apr. 10, 2022), https://www.nytimes.com/2022/04/10/us/politics/crypto-industry-states-legislation.html [https://web.archive.org/web/20240907152718/https://www.nytimes.com/2022/04/10/us/politics/crypto-industry-states-legislation.html]. Given their genesis, these bills are unsurprisingly deeply techno-solutionist in orientation, ignoring the history and context that led to the development of existing financial regulatory structures in their bid to allow the crypto industry to innovate outside of these structures: House Financial Services Committee leadership described its bill as “facilitating a regulatory environment that allows this technology to flourish in the United States.”313Press Release, Patrick McHenry, Chairman, House Fin. Servs. Comm., McHenry Delivers Opening Remarks at Historic Markup of Comprehensive Digital Asset Market Structure Legislation (July 26, 2023), https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=408928 [https://perma.cc/FBQ9-QCW4].

Among other problems, these bills seek to remove the vast majority of crypto assets from the investor protection oversight of the SEC and give jurisdiction to the CFTC—a regulatory body that has significantly fewer resources than the SEC, lacks a statutory investor protection mandate or culture of protecting retail investors, and also allows exchanges to self-certify the assets they list.314For elaboration on these types of concerns, see Letter from Dennis M. Kelleher to House Agricultural and Financial Services Committee Leadership Regarding Concerns About Provisions in the Digital Asset Market Structure Discussion Draft (July 11, 2023) [hereinafter Kelleher Letter], https://bettermarkets.org/wp-content/uploads/2023/07/Final-Ltr-to-FSCAG-re-cryptocurrency-.pdf [https://perma.cc/TRN5-T7WE]. For more on the CFTC and self-certification, see Lee Reiners, Bitcoin Futures: From Self-Certification to Systemic Risk, 23 N.C. Banking Inst. 61, 90–92 (2019). Doing so would deprive investors of the protections afforded by the SEC’s registration and disclosure regime for public offers and sales of securities, as well as the protections of securities broker/dealer and exchange registration requirements that would help mitigate the conflicts of interest inherent in the crypto exchange business model.315Kelleher Letter, supra note 314, at 2–5. As I testified in 2022, these kinds of bills “are designed to offer fewer investor protections than the existing securities laws, and they were intentionally designed in this way in order to facilitate crypto innovation.”316Hearing on Crypto Crash: Why the FTX Bubble Burst and the Harm to Consumers Before the S. Comm. on Banking, Hous., & Urb. Affs., 117th Cong. (2022) [hereinafter Allen Testimony] (statement of Hilary J. Allen, Professor of Law, American University Washington College of Law), https://www.banking.senate.gov/imo/media/doc/Allen%20Testimony%2012-14-22.pdf [https://perma.cc/EV9C-NR2K]. They would also lend legitimacy and credibility to crypto assets in the eyes of both retail and institutional investors, expanding a market for such assets that the industry has struggled to sustain in the absence of government endorsement.317Faverio, Dawson & Sidoti, supra note 167. Furthermore, these bills would create regulatory arbitrage opportunities outside of the crypto industry: while crypto advocates have described these bills as bespoke regimes for crypto, issuers of other types of securities would also have incentives to migrate into the new, lighter-touch regime (which would seemingly be accessible to them if they simply recorded ownership of their securities on a blockchain). Finally, these bills often suffer from trying to tie law too specifically to crypto technology and business models at a particular moment in time, ensuring that technological innovation could be used to arbitrage any such law that is enacted, quickly rendering the investor protections that are included in the bill obsolete.

There have also been crypto bills introduced that would undermine the financial stability regulation implemented by the federal banking agencies by creating new lighter-touch regulatory regimes for stablecoins.318In commenting on the Lummis-Gillibrand bill, Wilmarth notes that it includes

excessively lenient chartering criteria and dangerously weak capital standards for stablecoin issuers, woefully inadequate supervisory powers over stablecoin issuers and entities controlling those issuers, nonexistent stabilizing measures (like federal deposit insurance) to reduce the risks of contagion from failures of stablecoin issuers, misguided opportunities for stablecoin issuers to engage in risky derivatives activities, and a disturbing lack of regulatory controls over stablecoin transactions occurring on crypto exchanges and other crypto trading venues.

Arthur E. Wilmarth, Jr., Policy Brief: Congress Should Reject the Lummis-Gillibrand Stablecoin Bill Because It Would Endanger Consumers, Investors, and Our Financial System 1 (Apr. 30, 2024) (unpublished manuscript), https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2989&context=faculty_publications [https://perma.cc/76SB-YGUS].
The stated aim of these bills is to support stablecoins as “an exciting technological development that could transform money and payments,”319Toomey Introduces Legislation to Guide Future Stablecoin Regulation, U.S. S. Comm. on Banking, Hous. & Urb. Affs. (Dec. 21, 2022), https://www.banking.senate.gov/newsroom/minority/toomey-introduces-legislation-to-guide-future-stablecoin-regulation [https://perma.cc/ZJU8-GALP]. notwithstanding that from a technological perspective, stablecoins are extremely ill-suited to large-scale payments processing.320Regarding the costs and delays associated with processing transactions on a blockchain, see White, supra note 40; Levitin, supra note 114, at 144. As I previously testified regarding the Stablecoin TRUST Act introduced by then-Senator Toomey, the Lummis-Gillibrand Responsible Financial Innovation Act, and a draft House Financial Services Committee stablecoin bill:

If any of these bills were enacted, they would authorize banks to issue stablecoins, making it highly probable that the Federal Reserve would feel compelled to bail out a failing stablecoin (which would operate as an indirect bailout of the crypto speculation the stablecoins are used for). Even more problematic, those bills would also authorize non-banks to issue stablecoins, yet be subject to lighter-touch regulation ex ante than traditional banks.321Allen Testimony, supra note 316.

This critique applies equally to a later iteration of the House Financial Services Committee stablecoin bill that was voted out of committee in July 2023.322Clarity for Payment Stablecoins Act, H.R. 4766, 118th Cong. (2023).

The techno-solutionism inherent in these crypto bills is all the more striking because crypto inverts the typical dynamic where the benefits of innovation are immediately obvious, but the harms take longer to manifest. As Federal Reserve Vice Chair for Supervision Michael Barr has observed, people often “assume too quickly that they know how the new products work, and novel products can appear both safe and lucrative, particularly if they have not been tested through bouts of market stress.”323Michael S. Barr, Vice Chair for Supervision, Bd. of Governors of the Fed. Rsrv. Sys., Remarks at the Peterson Institute for International Economics, Supporting Innovation with Guardrails: The Federal Reserve’s Approach to Supervision and Regulation of Banks’ Crypto-Related Activities (Mar. 9, 2023), https://www.federalreserve.gov/newsevents/speech/barr20230309a.htm [https://perma.cc/Q2TN-ZSVE]. This kind of dynamic can unsurprisingly make lawmakers loath to crack down on new technologies with evident benefits, but with crypto, harms have been evident for some time, while the industry still struggles to articulate concrete use cases after fifteen years.324Regarding use cases (and lack thereof), see White, supra note 40. Regarding harms, for a running tally of crypto hacks, scams, and frauds impacting consumers, see Web3 is Going Just Great, supra note 170. For a discussion of the environmental toll of crypto that relies on proof-of-work blockchains, see Sanaz Chamanara, S. Arman Ghaffarizadeh & Kaveh Madani, The Environmental Footprint of Bitcoin Mining Across the Globe: Call for Urgent Action, 11 Earth’s Future 1, 2 (2023). For a discussion of the use of crypto for money laundering, ransomware attacks, and sanctions evasion, see generally Hearing on Understanding the Role of Digital Assets in Illicit Finance Before the S. Comm. on Banking, Hous., & Urb. Affs., 117th Cong. (2022) [hereinafter Stansbury Testimony] (statement of Shane T. Stansbury, Professor of Law, Duke University School of Law), https://www.banking.senate.gov/imo/media/doc/Stansbury%20Corrected%20Statement%203-17-22.pdf [https://perma.cc/RV92-3R58]. As explored in Part II, there are strong impediments to crypto-related innovation ever delivering on its promises of financial inclusion, efficiency, competition, and privacy: it is a testament to the rhetorical power of techno-solutionism that facilitating this “solution in search of a problem” remains a defensible goal for many Members of Congress.

Of course, techno-solutionism is not the only force at work here. When it came time to vote on the Financial Innovation and Technology for the 21st Century Act, Members of Congress facing tough reelection campaigns were loath to draw the ire of the crypto industry (the pro-crypto Fairshake Political Action Committee amassed an unprecedented $114 million war chest from the crypto industry and prominent venture capitalists to spend in the 2024 election cycle).325Rick Claypool, Big Crypto, Big Spending: Crypto Corporations Spend an Unprecedented $119 Million Influencing Elections, Pub. Citizen (Aug. 21, 2024), https://www.citizen.org/article/big-crypto-big-spending-2024 [https://perma.cc/LEJ5-6DKL]. But still, techno-solutionism was used as window dressing. When that bill was passed by the House of Representatives with bipartisan support, House Financial Services Committee Chair Patrick McHenry made the following statement:

FIT21 provides the regulatory clarity and robust consumer protections necessary for the digital asset ecosystem to thrive in the United States. The bill also ensures America leads the financial system of the future and remains a hub for technological innovation.326Press Release, Financial Services Committee, House Passes Financial Innovation and Technology for the 21st Century Act with Overwhelming Bipartisan Support (May 22, 2024), https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=409277 [https://perma.cc/8477-6U7E].

Some other non-crypto fintech bills have evinced a less techno-solutionist approach to fintech business models, though. For example, Congressman Jesus García introduced a “Close the ILC Loophole Act,”327H.R. 5912, 117th Cong. (2022). designed to prevent technology platform companies from exploiting a loophole in the Bank Holding Company Act that could allow those companies to acquire banks without being regulated by the Federal Reserve (which would essentially allow them to avoid financial stability regulation).328Senator Sherrod Brown introduced similar legislation in 2023 titled Close the Shadow Banking Loophole Act, S. 3538, 118th Cong. (2023). Congressman Lynch also introduced an “ECASH Act”329Electronic Currency and Secure Hardware (ECASH) Act, H.R. 7231, 117th Cong. (2022). that proposed to direct the Treasury Department to develop and issue “an electronic version of the U.S. Dollar for use by the American public.”330Press Release, Stephen F. Lynch, U.S. Representative (MA-08), Rep. Lynch Introduces Legislation to Develop Electronic Version of U.S. Dollar (Mar. 28, 2022), https://lynch.house.gov/2022/3/rep-lynch-introduces-legislation-to-develop-electronic-version-of-u-s-dollar [https://perma.cc/48X5-M5GE]. This bill is an example of technology-focused public policy that is not techno-solutionist: it is focused on developing technology to solve financial inclusion concerns, but is sensitive to non-technological context. In particular, in response to the kinds of consumer protection and privacy concerns raised in Section II.D, the proposal for ECASH is intended to “preserve a role in our financial system for smaller anonymous cash-like transactions which are currently transacted in physical dollars, and which have seen a rapid decline in use.”331Id.

  1. Administrative Action

While this discussion has focused so far on Congress, the federal financial regulatory agencies are on the front lines of dealing with fintech in the United States (state regulation is also relevant but largely beyond the scope of this Article).332For a discussion of states’ regulatory treatment of crypto, see Arthur E. Wilmarth, Jr., We Must Protect Investors and Our Banking System from the Crypto Industry, 101 Wash. U. L. Rev. 235, 269–71 (2023); Lipton & Yaffe-Bellamy, supra note 312. For a discussion of state regulation of fintech lending, see generally Odinet, supra note 21. Unlike unpassed legislation, the actions taken by regulatory agencies can have more than just normative valence. We will now examine a sample of the fintech-related rulemaking, monitoring, and enforcement activities of financial regulators and consider whether they are perpetuating, or being stymied by, techno-solutionism.

Acting Comptroller of the Currency Michael Hsu identified a dichotomy between regulators “taming” and “accommodating” financial innovation. Taming forces the technology to “conform to regulatory standards,” whereas an accommodative stance that dictates that “regulation should adjust to . . . and accept the new technology and possibilities for what they are” is much more techno-solutionist.333Michael J. Hsu, Acting Comptroller of the Currency, Remarks to the Harvard Law School and Program on International Financial Systems Roundtable on Institutional Investors and Crypto Assets: “Don’t Chase,” 3 (Oct. 11, 2022), https://www.occ.gov/news-issuances/speeches/2022/pub-speech-2022-126.pdf [https://perma.cc/XUR3-8DNS]. Accommodative regulators may take steps to actively loosen regulatory requirements, but often, accommodation takes the form of inaction with regulators simply refraining from exercising their jurisdiction when new technologies are involved. Either way, an overly accommodative stance will subordinate regulatory goals to the claimed promise of the technology, neglecting the reality that sometimes the negative consequences of a technology are such that accommodating that technology is bad policy (particularly if the technology itself is considered by independent experts to have limited utility).334See, e.g., note 162 and accompanying text.

Another framing that financial regulators often use when discussing fintech regulation is “tech neutrality,”335Janet L. Yellen, Secretary of the Treasury, Remarks from Secretary of the Treasury Janet L. Yellen on Digital Assets (Apr. 7, 2022), https://home.treasury.gov/news/press-releases/jy0706 [https://perma.cc/5F9L-SGJ8]. or “same activity, same risk, same rules.”336Wilmarth, Jr., supra note 332, at 314. This is often a good starting point for taming fintech, because it recognizes that regulatory arbitrage should not be allowed simply because a new kind of technology is involved: techno-solutionism may otherwise lull us into believing that new technologies are doing the disrupting, when in reality the only disruption may be lawyers devising new regulatory arbitrage strategies that can be “sold” to lawmakers using techno-solutionist rhetoric. However, a posture of technological neutrality can turn out to be accommodative in practice if regulators are too amenable to the fintech industry’s own techno-solutionist descriptions of activities and risks as novel, or if regulators assume that the technology is just another way of discharging an existing economic function and won’t pose any sui generis risks of its own.

Regulators should dig beneath the techno-solutionism to ask fundamental preliminary questions about whether a technology actually performs the activity its purveyors say it performs—otherwise regulators may mistakenly apply the wrong regulatory regime. They also need to ask whether changes in technological delivery mechanisms are creating new kinds of risks (for example, new technology-related operational risks). Although existing regulatory approaches will often be useful, sometimes new methods will need to be devised in order to discharge existing mandates in a financial system populated by new technologies. Regulators should not be deterred from developing these new methods by a desire to be perceived as technology neutral.

Unfortunately, reality does not always meet these ideals. This is no doubt due, in part, to cognitive capture. The financial industry has long weaponized complexity to deflect regulatory scrutiny,337Awrey, supra note 122, at 275–76. but with the rise of fintech, that financial complexity is being overlaid with technological complexity. Many financial regulatory agencies are primarily staffed with lawyers, economists, and accountants who may need to rely on the fintech industry to help them understand how a particular technology works,338Omarova, supra note 191, at 101. and this can be a fertile environment for cognitive capture to develop. Of course, individual agency personnel are just that—individuals. It is often remarked that “personnel is policy,”339See, e.g., Jeff Hauser & David Segal, Personnel Is Policy, Democracy J. (Feb. 6, 2020, 3:43 PM), https://democracyjournal.org/magazine/personnel-is-policy [https://perma.cc/DB7D-VK8E]. and those with some technological expertise may feel more empowered to push back against techno-solutionism.

An individual regulator’s susceptibility to techno-solutionism may also be impacted by their political ideology. Techno-solutionism is often aligned with libertarianism,340See Short et al., supra note 55, at 4. and those dispositionally opposed to government involvement will, all things being equal, probably be more supportive of agency policies that accommodate private sector innovation. The following discussion of fintech-related administrative actions sometimes demonstrates whipsaws in an agency’s fintech policy that can be partially explained by changes in the political orientation of agency leadership. This dynamic has been most obvious with the CFPB; at the other end of the spectrum, the SEC has been quite consistent in its fintech policy across administrations.341Gary Gensler, Chairman of the SEC, Speech: Kennedy and Crypto (Sept. 8, 2022), https://www.sec.gov/news/speech/gensler-sec-speaks-090822 [https://perma.cc/WT8J-5NMP].

i.  Rulemaking and Guidance

There have been some proposals for formal fintech-specific administrative rulemakings, but federal financial regulatory agencies have often preferred to issue informal guidance when it comes to fintech. The formal rulemaking process has sometimes struggled to address rapid technological change in a timely manner,342See Tim Wu, Agency Threats, 60 Duke L.J. 1841, 1841–43 (2011). and the Supreme Court’s embrace of the major questions doctrine has created greater uncertainty about courts’ willingness to invalidate rulemakings pertaining to new technologies.343Daniel T. Deacon & Leah M. Litman, The New Major Questions Doctrine, 109 Va. L. Rev. 109, 1087–88 (2023). Regarding the application of the major questions doctrine to crypto, see Chris Brummer, Yesha Yadav & David Zaring, Regulation by Enforcement, 96 S. Cal. L. Rev. 1297, 1328–29 (2024). In June of 2024, the Supreme Court also overruled the longstanding Chevron precedent that had previously directed courts to defer to reasonable agency interpretations of statutory provisions.344Loper Bright Enters. v. Raimondo, 144 S. Ct. 2244, 2273 (2024). Given these challenges, it is unsurprising that regulators of all stripes have often preferred to rely on more nimble informal guidance when it comes to fintech.

Like the legislative proposals discussed above, fintech-related informal guidance and proposed rulemakings have been a mixed bag with some embracing, and some rejecting, techno-solutionist approaches. Notably accommodative administrative actions include the OCC’s 2018 announcement of a nonbank fintech charter and the CFPB’s 2019 proposal for a fintech regulatory sandbox. Both of these had a techno-solutionist orientation, although neither were ultimately successful in their accommodations. The OCC’s proposed fintech charter was a response to concerns that nonbank fintech firms had to comply with consumer protection regulations in every state where they did business.345Recent Policy Statement, Office of the Comptroller of the Currency, Policy Statement on Financial Technology Companies’ Eligibility to Apply for National Bank Charters, 132 Harv. L. Rev. 1361, 1361 (2019) (citing Office of the Comptroller of the Currency, Policy Statement on Financial Technology Companies’ Eligibility to Apply for National Bank Charters 1 (2018), https://www.occ.gov/publications/publications-by-type/other-publications-reports/pub-other-occ-policy-statement-fintech.pdf [https://perma.cc/KS3S-JTQC]). A national special purpose charter from the OCC would have preempted many of these state consumer protection regulations—and the OCC justified the proposal on the assumption that it would facilitate technological innovation that would further financial inclusion.346Id. at 1363. Ultimately, however, this proposal was mired in legal challenges and industry largely eschewed the fintech charter.347Id. at 1366–68.

The CFPB’s proposed “Compliance Assistance Sandbox” also sought to preempt the enforcement of state consumer protection laws but was ultimately abandoned for failing to advance its “stated objective of facilitating consumer-beneficial innovation.”348CFPB, Statement on Competition and Innovation (Sept. 30, 2022), https://public-inspection.federalregister.gov/2022-20896.pdf [https://perma.cc/5GN3-2MFG]. Before it was abandoned, though, this sandbox had a very techno-solutionist orientation. For example, in a policy document that was incorporated by reference into the Compliance Assistance Sandbox policy, the CFPB expressly rejected a consumer group’s contention that a sandbox was unnecessary because fintech products rarely raised “novel questions of law and policy.”349CFPB, Policy on No Action Letters 5–6 (Sept. 10, 2019), https://files.consumerfinance.gov/f/documents/cfpb_final-policy-on-no-action-letters.pdf [https://perma.cc/C44L-YMDF]. The policy document also stated the techno-solutionist position that “the Bureau’s statutory mission of protecting consumers is not limited to vigorously enforcing the law. It includes facilitating innovation in markets for consumer financial products and services, as innovation drives competition, which in turn lowers prices and promotes access to more and better products and services.”350Id. at 2.

Regulatory sandboxes have been adopted elsewhere (both internationally and at the state level in the United States) and are generally techno-solutionist in orientation: they loosen financial regulations and use scarce regulatory resources for the primary purpose of promoting private-sector fintech innovation.351Allen, supra note 58, at 580. This implicitly positions “regulation” as the problem that needs to be solved, and if regulators fixate on the private-sector innovation they hope their sandboxes will generate, that may be a distraction from the public goods that regulation was adopted to create and the social harms that regulation was adopted to protect against. Regulatory sandboxes also put regulators in the unusual position of championing participating private sector firms to help them succeed in the marketplace—likely a recipe for cognitive capture.352Id. at 635–36.

Following the appointment of Rohit Chopra as Director of the CFPB in 2021, the CFPB evinced a far less techno-solutionist stance in its informal guidance and proposed rules. In September 2023, the CFPB responded to concerns about algorithmic discrimination by issuing guidance that made clear “that lenders must be able to accurately inform consumers as to why an adverse credit decision was made and explain specifically what factors led to the decision,” emphasizing that the use of AI is not a get-out-of-jail-free card when it comes to compliance with laws like the Equal Credit Opportunity Act.353Chopra, supra note 277. In October 2024, the CFPB finalized a Personal Financial Data Rights rule to implement the previously dormant Section 1033 of the Dodd-Frank Act.354Required Rulemaking on Personal Financial Data Rights, CFPB (Oct. 22, 2024), https://www.consumerfinance.gov/personal-financial-data-rights [https://perma.cc/LB7G-KTLN]. This was an attempt to address a true lacuna in financial regulation and speaks to new kinds of privacy harms and the market power associated with financial data.355Id. In November 2023, the CFPB proposed a rule designed to crack down on regulatory arbitrage by nonbank payments providers, which will be discussed in more detail below.356CFPB Proposes New Federal Oversight of Big Tech Companies and Other Providers of Digital Wallets and Payment App, CFPB (Nov. 7, 2023), https://www.consumerfinance.gov/about-us/newsroom/cfpb-proposes-new-federal-oversight-of-big-tech-companies-and-other-providers-of-digital-wallets-and-payment-apps [https://perma.cc/Z9RA-YH4N]. For further discussion, see text accompanying notes 378–80, infra. It is worth noting that the CFPB is itself a creation of the digital era: launched in 2011 with an intentional technological bent, the agency has been praised for its technological savvy, and that savvy may have equipped the agency to push back against techno-solutionist claims.357Rory Van Loo, Technology Regulation by Default: Platforms, Privacy, and the CFPB, 2 Geo. L. Tech. Rev. 531, 531 (2018).

Turning to crypto, regulators have not promulgated any formal rules, but they have issued a significant amount of informal guidance. In June 2018, then-SEC Corporate Finance Director Bill Hinman delivered what has come to be known as the “Hinman speech” in which he expressed his excitement about blockchain’s potential for decentralization, and he suggested that tokens might not be considered securities “[i]f the network on which the token or coin is to function is sufficiently decentralized.”358William Hinman, Director, Division of Corp. Fin., SEC, Digital Asset Transactions: When Howey Met Gary (Plastic) (June 14, 2018), https://www.sec.gov/news/speech/speech-hinman-061418 [https://perma.cc/9N6R-RAUU]. This speech uncritically accepted the crypto industry’s decentralization rhetoric, neglecting the fact that blockchain’s technological decentralization does nothing to prevent the economic centralization that the SEC is concerned with.359See supra notes 251–55 and accompanying text. Overall, however, the SEC has generally looked beyond that rhetoric and concluded that crypto tokens are subject to the securities laws—as SEC Chair Gary Gensler stated in 2022:

Of the nearly 10,000 tokens in the crypto market, I believe the vast majority are securities. Offers and sales of these thousands of crypto security tokens are covered under the securities laws. . . . For the past five years . . . the Commission has spoken with a pretty clear voice here: through the DAO Report, the Munchee Order, and dozens of Enforcement actions, all voted on by the Commission. Chairman Clayton often spoke to the applicability of the securities laws in the crypto space.360Gensler, supra note 341 (internal citations omitted).

As for the banking regulators, the OCC initially took a somewhat accommodative position on crypto, issuing a number of documents authorizing banks to hold crypto assets in custody for their customers and to hold reserves for stablecoins.361Wilmarth, Jr., supra note 332, at 268. These documents sometimes evince an unquestioning acceptance of crypto’s claims to be a wealth-building and payments technology; for example, the letter authorizing banks to hold stablecoin reserves starts from the premise that “[r]eports suggest stablecoins have various applications, including the potential to enhance payments on a broad scale, and are increasingly in demand.”362Off. of the Comptroller of the Currency, OCC Chief Counsel’s Interpretation on National Bank and Federal Savings Association Authority to Hold Stablecoin Reserves, OCC Interpretive Letter No. 1172, at 1 (Sept. 21, 2020), https://www.occ.gov/topics/charters-and-licensing/interpretations-and-actions/2020/int1172.pdf [https://perma.cc/5DTF-NBQB]. This premise lacks a strong foundation, however, given blockchain technology’s inability to scale to the level needed to compete with traditional payments providers.363White, supra note 40.

More recently, guidance from banking regulators has paid less heed to unsubstantiated promises of crypto’s technological innovation. Most notably, in January 2023, the Federal Reserve, FDIC, and OCC jointly issued strong guidance indicating their expectations that banks would remain separated from crypto, in order to ensure the continuing stability of the banking system.364See generally Bd. of Governors of the Fed. Rsrv. Sys., Fed. Deposit Ins. Corp. & Off. of the Comptroller of the Currency, Joint Statement on Crypto-Asset Risks to Business Organizations (2023), https://www.federalreserve.gov/newsevents/pressreleases/files/bcreg20230103a1.pdf [https://perma.cc/QK4N-QXPS]. In that statement, the agencies articulated the following non-techno-solutionist position:

Given the significant risks highlighted by recent failures of several large crypto-asset companies, the agencies continue to take a careful and cautious approach related to current or proposed crypto-asset-related activities and exposures at each banking organization.365Id. at 2.

ii.  Monitoring

Once regulatory bodies have promulgated rules or informal guidance, they must then engage in supervision, examination, or other monitoring to ensure compliance. It can be difficult to interrogate how these processes are being discharged, as they are often confidential, performed away from the public eye.366Peter Conti-Brown & Sean Vanatta, Focus on Bank Supervision, Not Just Bank Regulation, Brookings (Nov. 2, 2021), https://www.brookings.edu/research/we-must-focus-on-bank-supervision [https://perma.cc/CT8H-LR25]. Sometimes information about these processes is made public, however, and Art Wilmarth has used publicly available sources to document many of the entanglements between banking and crypto that banking supervisors have permitted.367Wilmarth, Jr., supra note 332, at 271–78. Although it seems unlikely that these entanglements could presently threaten the stability of the overall financial system—particularly because regulators have not authorized any U.S. bank to invest directly in crypto assets or accept them as collateral—such entanglements did help bring down Signature Bank and Silvergate Bank, which relied heavily on the crypto industry for deposits and fee income.368Id. at 278–88. The failure of these banks exacerbated a broader regional banking crisis in 2023, and in its report on that crisis, the FDIC conceded that “in retrospect, the FDIC could have acted sooner and more forcefully to compel the bank’s management and its board to address these [AML and risk management] deficiencies more quickly and more thoroughly.”369FDIC, FDIC’s Supervision of Signature Bank 16 (Apr. 28, 2023), https://www.fdic.gov/news/press-releases/2023/pr23033a.pdf [https://perma.cc/T3UR-BPZ4]. Nothing was said in the report, though, about whether regulators had accommodative attitudes toward crypto business models and technologies that helped induce their inaction.

Of course, there is a preliminary question when it comes to fintech supervision, which is whether financial regulators even believe they have supervisory jurisdiction over fintech business models in the first place.370“With any novel financial product, the threshold question is always that of its legal and regulatory status as a security, banking product, commodity, insurance contract, and so on.” Omarova, supra note 191, at 82. If industry actors can successfully convince regulators that their technology is too new to fit into existing regulatory structures, then they will avoid supervision, examination, or other monitoring. James Kwak observed that in the lead-up to the 2008 crisis, “[t]he financial sector . . . seems to have gained the cooperation of the federal regulatory agencies . . . [in part] by convincing them that financial deregulation was in the public interest.”371Kwak, supra note 97, at 77–78. Techno-solutionist narratives make these same claims about advancing the public interest by getting law out of the way so that technological solutions can flourish.

With regard to fintech lending, for example, Chris Odinet has spelled out the arbitrage strategies that have allowed these businesses to operate largely outside of the supervisory powers of the CFPB and federal banking agencies.372Odinet, supra note 21, at 1774 (noting that state regulators often have jurisdiction here, but “occupy an interesting position because they are in theory very powerful but can often be very weak in practice”). Odinet argues that this regulatory arbitrage is the main point of the fintech lending business model: to seek an end-run around both state usury laws and bank capital regulations by having fintech providers partner with or “rent” a bank in a way that avoids both types of rules.373Banks have preferential treatment that allows them to export favorable usury laws in their home jurisdiction so that they can make high-cost loans throughout the country, even in states with more restrictive usury rules—nonbank fintech firms cannot do this. Odinet, supra note 21, at 1775–76, 1778. Fintech lenders (and their associated banks), however, describe these business models as driven by superior technological interfaces and credit scoring systems—this allows them to tap into the positive political valence of technological innovation to facilitate cognitive capture.374“The partnership is, in essence, a regulatory arbitrage scheme meant to allow high-cost predatory lending to proliferate online, all while enjoying the political cover accorded by being labeled a ‘fintech.’ ” Odinet, supra note 21, at 1765. When regulators are persuaded into inaction by such rhetoric, then consumer harm can be perpetuated without oversight.

Many fintech payments providers also engage in regulatory arbitrage. To use Venmo as an example, federal banking regulation would apply to balances in Venmo accounts if they were construed as deposits, but Venmo has entered into carefully crafted relationships with regulated banks to avoid such characterization.375John L. Douglas, New Wine into Old Bottles: Fintech Meets the Bank Regulatory World, 20 N.C. Banking Inst. 17, 25–36 (2016). However, nonbank payments providers can pose consumer protection and financial stability concerns. Awrey and Zwieten have explained that some Venmo customers store funds in Venmo accounts and assume that those funds will remain available for transactions, notwithstanding that Venmo may have used the funds elsewhere or that the funds may be commingled in a Venmo bankruptcy.376Dan Awrey & Kristin van Zwieten, The Shadow Payment System, 43 J. Corp. L. 775, 806 (2018). Venmo customers may not appreciate these vulnerabilities now, but if concerns develop about Venmo and the way it holds customer funds, customers may pull their funds out in something that closely resembles a bank run.377Id.

Different nonbank payments providers pose different permutations of these prudential and consumer protection concerns, but have generally escaped the types of stringent regulation that apply to banks and other insured deposit–taking institutions.378CFPB, supra note 356. The CFPB expressed a willingness to help level this playing field, however, by exercising existing authorities over firms that serve as service providers for banks,379Chopra, supra note 277. and by proposing a rule that would establish an examination program for larger nonbank digital consumer payment companies.380CFPB, supra note 356. In so doing, the CFPB rejected the contention that technology companies should be treated differently from legacy financial institutions when they provide equivalent services.

iii.  Enforcement

When regulatory agencies bring enforcement actions against firms deploying fintech business models and technologies, those enforcement actions tend to signal a rejection of techno-solutionism. The mere fact that an enforcement action was brought tends to suggest a willingness on the part of a regulatory body to look behind the techno-solutionist rhetoric and conclude that new technologies are being used to perpetuate familiar harms for which there are legal consequences.

To be clear, enforcement may be made more challenging by increasing technological sophistication. For example, when it comes to the CFPB seeking to address discrimination in the provision of credit, enforcement is “increasingly difficult when decisions . . . are made via criteria deeply embedded in complex algorithms used to detect patterns in masses of data.”381Cohen, supra note 17, at 179. As the Financial Stability Oversight Council (“FSOC”) has noted, “[m]any AI approaches present ‘explainability’ challenges that make it difficult to assess the suitability and reliability of AI models and to assess the accuracy and potential bias of AI output.”382Fin. Stability Oversight Council, supra note 225, at 9. But the harm identified here (discrimination in the provision of credit) is familiar, and the CFPB’s necessary legal authority (pursuant to the Equal Credit Opportunity Act) holds up, despite the technological innovation. The CFPB confirmed that it will enforce the law “regardless of the technology being used” and that arguing that “the technology used to make a credit decision is too complex, opaque, or new is not a defense for violating these laws.”383Rohit Chopra, CFPB, Kristen Clarke, U.S. Just. Dep’t, C.R. Div., Charlotte A. Burrows, EEOC & Lina M. Khan, FTC, Joint Statement on Enforcement Efforts Against Discrimination and Bias in Automated Systems 2 (2023), https://files.consumerfinance.gov/f/documents/cfpb_joint-statement-enforcement-against-discrimination-bias-automated-systems_2023-04.pdf [https://perma.cc/Y5VD-CQ74].

A techno-solutionist approach to enforcement, on the other hand, is likely to manifest in accommodative inaction. Financial regulators who are cognitively captured by techno-solutionist rhetoric may come to believe that technological solutions are exceptional and therefore both need and deserve special treatment under the law—and so they refrain from enforcing existing laws. Ryan Calo has argued that technology is exceptional “when its introduction into the mainstream requires a systematic change to the law or legal institutions in order to reproduce, or if necessary displace, an existing balance of values.”384Ryan Calo, Robotics and the Lessons of Cyberlaw, 103 Calif. L. Rev. 513, 552 (2015). This is the kind of argument the crypto industry makes as to why blockchain-hosted assets should not be subject to the long-standing, technology-neutral “Howey test” for determining whether something is an investment contract regulated by the SEC.385The seminal Supreme Court case interpreting the term “investment contract” does so in a way that “embodies a flexible rather than a static principle, one that is capable of adaptation to meet the countless and variable schemes devised by those who seek the use of the money of others on the promise of profits.” SEC v. W.J. Howey Co., 328 U.S. 293, 299 (1946). Another well-worn trope of techno-solutionism is the belief that technology can solve its own problems: this trope, coupled with exceptionalist arguments that technological change is too rapid and complex for the law to effectively address, is often invoked in support of calls for self-regulation.386Short et al., supra note 55, at 17–18. The crypto industry has made repeated arguments that it should regulate itself.387See, e.g., Joe Light, The Crypto Industry’s Solution for Regulation: We’ll Handle It, Bloomberg (Nov. 19, 2021), https://www.bloomberg.com/news/articles/2021-11-19/crypto-industry-s-solution-to-regulation-is-self-regulation [https://perma.cc/QDT4-6WRT].

Fortunately, many regulatory personnel have not been swayed by these kinds of techno-solutionist arguments. In particular, the SEC has been quite aggressive about enforcing the securities laws against the crypto industry;388For a comprehensive listing of the SEC’s crypto enforcement actions, see Crypto Assets and Cyber Enforcement Actions, U.S. SEC, https://www.sec.gov/spotlight/cybersecurity-enforcement-actions [https://web.archive.org/web/20241227170034/https://www.sec.gov/securities-topics/crypto-assets]. in so doing, it is challenging techno-solutionist claims that the use of decentralized technology changes the economic realities of securities investments.389See supra notes 358–359 and accompanying text. These claims are the latest in a long line of tech industry arguments that decentralization defies regulation,390Short et al., supra note 55, at 8–10. but as of the time of writing, courts have largely agreed with the SEC’s anti-techno-solutionist approach (with one notable partial exception).391See, e.g., SEC v. Telegram Grp. Inc., 448 F.Supp. 3d 352, 352 (S.D.N.Y. 2020); SEC v. Kik Interactive Inc., 492 F.Supp. 3d 169, 169 (S.D.N.Y. 2020); SEC v. LBRY, Inc., 639 F.Supp. 3d 211, 220–21 (D.N.H. 2022); SEC v. Terraform Labs. Pte. Ltd., 708 F.Supp. 3d 450, 471–74 (S.D.N.Y. 2023). The notable partial exception was SEC v. Ripple Labs, Inc., 682 F.Supp. 3d 308, 328–30 (S.D.N.Y. 2023), in which Judge Torres concurred with the SEC’s allegations that a security had been sold to institutional investors, but found against the SEC with respect to “programmatic” sales of the XRP token to retail investors. Judge Torres’s reasoning has been expressly rejected by other SDNY judges, including in SEC v. Terraform Labs. Pte. Ltd., 684 F.Supp. 3d 170, 197 (S.D.N.Y. 2023), and in SDNY Judge Failla’s denial of Coinbase’s motion to dismiss the SEC’s enforcement action. SEC v. Coinbase, Inc., 726 F.Supp. 3d 260, 268, 288–89 (S.D.N.Y. 2024). A district court also upheld the CFTC’s determination that the Ooki DAO, a blockchain-hosted decentralized autonomous organization, was a “person” within the meaning of the Commodity Exchange Act and could therefore be held liable for violations of that law.392Press Release, CFTC, Statement of CFTC Division of Enforcement Director Ian McGinley on the Ooki DAO Litigation Victory (June 9, 2023), https://www.cftc.gov/PressRoom/PressReleases/8715-23 [https://web.archive.org/web/20241214222114/https://www.cftc.gov/PressRoom/PressReleases/8715-23].

Cryptocurrencies have also come to play an important role in funding criminal activities and in sanctions evasion.393Stansbury Testimony, supra note 324, at 2. While Section II.D emphasized the legibility of transactions recorded on a blockchain, sophisticated criminals use tools like mixers and tumblers to make it much harder for authorities to trace funds394“One well-known technique is the use of “mixing” or “tumbling” services, which allow for the commingling of legitimate cryptocurrency transmissions with those involving illicit payments, thereby making the criminal activity harder to trace.” Id. at 3.—in response, the Office of Foreign Assets Control (“OFAC”) has sanctioned virtual currency mixers like Tornado Cash, Blender, and Sinbad.395Press Release, U.S. Treasury Dept., Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency (Nov. 29, 2023), https://home.treasury.gov/news/press-releases/jy1933 [https://perma.cc/DCL8-N5XW]. Another high profile enforcement action in this area was brought by the Department of Justice (working in conjunction with OFAC, Financial Crimes Enforcement Network (“FinCEN”), and the CFTC) against the Binance cryptocurrency exchange for failing to comply with anti-money laundering and other laws. Using decidedly non-techno-solutionist rhetoric, Attorney General Merrick Garland announced the charges by saying “using new technology to break the law does not make you a disruptor, it makes you a criminal.”396Press Release, U.S. Dept. of Justice Off. of Pub. Affs., Binance and CEO Plead Guilty to Federal Charges in $4B Resolution (Nov. 21, 2023), https://www.justice.gov/opa/pr/binance-and-ceo-plead-guilty-federal-charges-4b-resolution [https://perma.cc/X4CY-3J7Q].

Many of these enforcement actions have been criticized by the crypto industry (and sometimes by crypto industry–supportive Members of Congress) for impeding fintech innovation.397See, e.g., Marisa T. Coppel, How OFAC’s Tornado Cash Sanctions Violate U.S. Citizens’ Constitutional Rights, CoinDesk (Apr. 18, 2023, 3:06 PM), https://www.coindesk.com/opinion/2023/04/18/how-ofacs-tornado-cash-sanctions-violate-us-citizens-constitutional-rights [https://perma.cc/EN8S-L3S6]; Paul Kiernan, Republicans Pummel SEC’s Gary Gensler Over Crypto Crackdown, Wall St. J. (Apr. 18, 2023), https://www.wsj.com/articles/sec-chair-gensler-to-defend-climate-crypto-plans-before-gop-led-panel-2e3a6ade [https://web.archive.org/web/20231204050108/https://www.wsj.com/articles/sec-chair-gensler-to-defend-climate-crypto-plans-before-gop-led-panel-2e3a6ade]; David Dayen, Congressmembers Tried to Stop the SEC’s Inquiry into FTX, Am. Prospect (Nov. 23, 2022), https://prospect.org/power/congressmembers-tried-to-stop-secs-inquiry-into-ftx [https://perma.cc/43EX-R8YB]. The crypto industry has in particular decried the “regulatory uncertainty” created by such enforcement actions and court decisions, arguing that such uncertainty has undermined the crypto industry’s ability to thrive.398See, e.g., Chris Prentice & Hannah Lang, Coinbase Rejects U.S. Regulator’s Claim It Broke Rules on Crypto, Reuters (Apr. 27, 2023, 1:00 PM), https://www.reuters.com/markets/currencies/coinbase-does-not-list-securities-company-tells-us-regulator-2023-04-27 [https://web.archive.org/web/20230503124643/https://www.reuters.com/markets/currencies/coinbase-does-not-list-securities-company-tells-us-regulator-2023-04-27/]. However, the SEC has been largely unequivocal in its communications that the vast majority of crypto tokens are securities: as Chair Gensler has said, “not liking the message is not the same thing as not receiving it.”399Gensler, supra note 341. In any event, few areas of the law provide perfect certainty, and as the Supreme Court implicitly recognized in formulating the Howey test, preserving a degree of flexibility often proves quite useful in “future-proofing” the law.400The Supreme Court noted that Congress had chosen to include “investment contracts” within the definition of “security” as it “embodies a flexible rather than a static principle, one that is capable of adaptation to meet the countless and variable schemes devised by those who seek the use of the money of others on the promise of profits.” SEC v. W.J. Howey Co., 328 U.S. 293, 299 (1946). Experience with the legal innovation of the limited liability company also makes it clear that perfect certainty under the securities laws is not necessary for something to thrive: courts have refused to lay down bright-line rules for when interests in limited liability companies will be considered investment contracts under the Howey test,401See, e.g., United States v. Leonard, 529 F.3d 83, 89 (2d Cir. 2008) (“[A]n interest in an LLC is the sort of instrument that requires ‘case-by-case analysis’ into the ‘economic realities’ of the underlying transaction.”). but limited liability companies have nonetheless experienced exponential growth in popularity since they were first created.402“LLCs are far and away the most popular legal entity form for new businesses.” Eric H. Franklin, A Rational Approach to Business Entity Choice, 64 Kan. L. Rev. 573, 586 (2016). Given all of this, crypto industry complaints about the uncertain application of existing laws often seem like a pretext for an unwillingness to comply.

It may be that running a legally compliant business is not economically viable for some crypto industry participants, but without techno-solutionism to cloud our vision, we may be glad to see the end of businesses that have little to recommend them other than regulatory arbitrage. While Brummer, Yadav, and Zaring have argued that regulatory agencies “risk being viewed as less technocratic and expert and driven more by selfish, rather than public interests” when they bring crypto enforcement actions,403Brummer, Yadav & Zaring, supra note 343, at 1302. this assumes a techno-solutionist public interest in seeing the crypto industry and its innovation flourish. While enforcement actions may indeed lessen the legitimacy of regulators in the eyes of the crypto industry and some crypto users, those same enforcement actions may very well bolster the legitimacy of regulators in the eyes of other members of the public (the vast majority of whom are distrustful of crypto).404Faverio, Dawson & Sidoti, supra note 167. And of course, once something goes wrong, the public will always ask, “[w]here were the regulators?” Techno-solutionist accommodative inaction can be very damaging to the legitimacy of a regulatory agency in retrospect.

  1. Looking Forward: Financial Regulation and AI

AI is currently the “buzziest” technology both within and outside of the financial industry. In the wake of OpenAI’s launch of ChatGPT, much of the hype, fervor, and VC funding pertaining to crypto shifted to AI-related technologies.405Hannah Miller, Tech Investors Bet on AI, Leaving Crypto Behind, Bloomberg (July 11, 2023, 11:01 AM), https://www.bloomberg.com/news/articles/2023-07-11/startup-investors-are-betting-on-ai-and-leaving-crypto-behind [https://perma.cc/FFB8-UR7X]. These AI technologies can be applied in any number of different fields,406For an indication of the many policy areas affected by AI, see FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence, White House (Oct. 30, 2023), https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/?utm_source=substack&utm_medium=email [https://perma.cc/782F-CNBZ]. but this Section’s discussion will focus primarily on whether financial regulation will be stymied by techno-solutionism associated with the application of AI-related technologies to financial services.

As a starting point, it’s worth noting that AI-related technologies are particularly likely to invite techno-solutionism because they are especially effective in obscuring the reality of human agency and incentives: the very name “artificial intelligence” connotes autonomy and superiority to human flaws and imperfections. The technologies we call “artificial intelligence” do not currently display characteristics of real human intelligence, though—they lack the ability to reflect on or engage with their existence in a world where others exist too.407For an overview of the debate on what is meant by “intelligence” in the context of AI, see generally Christopher Newfield, How to Make “AI” Intelligent; or, The Question of Epistemic Equality, Critical AI , October 2023, at 1. Some have suggested that the term “applied statistics” is therefore a more accurate description of these technologies, but the “AI” label has stuck.408Madhumita Murgia, Sci-fi Writer Ted Chiang: “The Machines We Have Now Are Not Conscious,” Fin. Times (June 2, 2023), https://www.ft.com/content/c1f6d948-3dde-405f-924c-09cc0dcf8c84 [https://perma.cc/CCE7-RVR8]. This label can serve to distract people from the important role that human computer scientists play in programming the software that will “learn” from the data presented to it, and the role that data scientists can play in selecting and curating that data.409While we may hear that “there are no bad AI systems, only bad AI system users” and “there is nothing value-neutral about any information technology, including AI systems.” Hartzog Testimony, supra note 17, at 8–9. The term “learn” is in quotation marks because AI does not learn in the same way a human does. AI does not seek to establish causality or engage in formal reasoning but instead looks for correlations (even weak correlations) in data and uses these to formulate decision-making rules that will guide it in performing an assigned task410Solow-Niederman, supra note 149, at 25. (hence the moniker “applied statistics”).

This explanation of AI encompasses “generative AI” like ChatGPT, as well as earlier generations of machine learning technology that were used in financial services prior to the development of generative AI. The primary difference is that unlike previous iterations of AI, generative AI can generate uniquely constructed content of its own in the form of things like text, images, and code.411Linklaters, AI in Financial Services 3.0: Managing Machines in an Evolving Legal Landscape 5 (2023), https://www.linklaters.com/insights/thought-leadership/fintech/artificial-intelligence-in-financial-services [https://perma.cc/Z2FP-XZWW]. Despite the developments in Generative AI, most AI-driven financial services applications currently rely on machine learning technologies that were available before the advent of ChatGPT, particularly in risk management and portfolio construction contexts.412Id. at 4–5. There is, however, interest in using Generative AI to improve consumer-facing chatbots and for report summarization; some financial services firms have also expressed interest in using generative AI in regtech tools (for example, fraud detection and AML compliance tools, as well as automated reporting).413Id.

There is a particular interest in the efficiency gains that generative AI can make414Fin. Stability Oversight Council, supra note 225, at 91. “The purpose of AI, the source of its value, is its capacity to increase productivity, which is to say, it should allow workers to do more, which will allow their bosses to fire some of them, or get each one to do more work in the same time, or both.” Cory Doctorow, Cory Doctorow: What Kind of Bubble Is AI?, Locus (Dec. 18, 2023), https://locusmag.com/2023/12/commentary-cory-doctorow-what-kind-of-bubble-is-ai [https://perma.cc/AJ56-H5JE].—but those claims to efficiency are quite techno-solutionist. The large language models (“LLMs”) used for generative AI are extremely expensive to create, and after those sunk costs have been incurred, they will continue to be extremely expensive to maintain and run—at the most basic level, they require significant amounts of electricity and water415Doctorow, supra note 414. See generally Shaolei Ren, Pangfei Li, Jianyi Yang & Mohammad A. Islam, Making AI Less “Thirsty”: Uncovering and Addressing the Secret Water Footprint of AI Models (Mar. 26, 2025) (unpublished manuscript), https://arxiv.org/pdf/2304.03271.pdf [https://perma.cc/B8NE-QAJE]. (as with blockchains, we should not forget the environmental costs of these technologies). Efficiency gains therefore depend on LLMs eliminating the cost of human oversight, but LLMs can “hallucinate” incorrect answers, often informed by specious correlations drawn from lackluster data.416What Are AI Hallucinations?, IBM (Sept. 1, 2023), https://www.ibm.com/topics/ai-hallucinations [https://perma.cc/6WB9-H8XK]. More generally, AI is poorly suited to predicting low-probability but high-stakes events, and widespread reliance on such AI tools could result in more homogenous behavior that ends up undermining assumptions in the data that the tools were trained on.417Allen, supra note 113, at 55–56, 64–65; see also Juan Luis Perez, How AI Will Change Investment and Research, Fin. Times (Nov. 29, 2023), https://ft.com/content/2390e8f3-88ba-40a0-b684-7fb6fada9bde. Because of these limitations, humans who are highly skilled in domain expertise should be kept in the loop to check the output of AI tools if that output is to be used in a high stakes risk management or portfolio construction situations (individuals without this domain expertise are more likely to fall prey to automation biases and defer to the model’s output unquestioningly).418On the importance of domain knowledge experts scrutinizing AI output, see Perez, supra note 417; Doctorow, supra note 414. A combination of AI and human intelligence will often produce the most accurate answers, but that increased accuracy will be very expensive.419Doctorow, supra note 414.

To reduce costs, some in the financial industry may seek to automate their risk management and portfolio construction practices while limiting or dispensing with the use of domain experts—this could ultimately threaten the stability of our financial system.420Allen, supra note 113, at 55–58. AI may also be used to arbitrage regulation. For example, banks could potentially arbitrage an important kind of microprudential regulation known as capital requirements by using “machine learning-capable risk management models” and “selectively exposing those models to data sets that neglect tail risks.”421Id. at 157–58. If tacitly permitted, this kind of arbitrage could result in lower bank capital levels (undermining a cornerstone of financial stability regulation), and could even harden into a regulatory entrepreneurship strategy if industry participants “pressure regulators to certify that the output of a particular . . . tool constitutes sufficient compliance.”422Id.

This arbitrage is a problem of degree, not an entirely new problem. Financial institutions were attempting complex regulatory arbitrage and entrepreneurship strategies with regard to capital requirements long before machine learning came along.423The complexity of regulatory capital requirements “provides near-limitless scope for arbitrage.” Andrew G. Haldane, Executive Director, & Vasileios Madouros, Economist, Bank of England, Speech at the Federal Reserve Bank of Kansas City’s 366th Economic Policy Symposium, “The Changing Policy Landscape”: The Dog and the Frisbee 8 (Aug. 31, 2012), https://www.bis.org/review/r120905a.pdf [https://perma.cc/JN45-MH6L]. In many ways, these old problems have simply been amped up by the inscrutability of AI. Long-standing calls for capital regulation to be simplified would also be quite effective in making capital regulation more robust to AI-facilitated arbitrage.424See id. at 14–19 for one of the most prominent such proposals. Unless and until such reforms are adopted, though, it is true that banking regulators will need increased technological sophistication to scrutinize algorithms and data sets in order to detect AI-enabled arbitrage of regulatory capital requirements.

The use of AI could also amplify consumer protection problems, like those associated with discrimination in the provision of credit.425See supra notes 148–151 and accompanying text. Once again, we have existing regulatory frameworks within which to respond to many of these issues so long as regulators are not too dazzled or cowed by the technology, and the CFPB has indicated its willingness to continue enforcing its anti-discrimination laws when AI tools have been used.426See supra notes 381–83 and accompanying text. In one speech, CFPB Director Chopra noted that

AI certainly poses new risks, or at least exacerbates old ones. While many new approaches may be necessary, it is clear we must all make use of existing laws and regulations on the books. In the United States . . . there is no ‘fancy new technology’ carveout to existing laws. Even if firms are using a complex new algorithm or AI model, they must follow the law.427Chopra, supra note 275.

This is a promising start. Chopra recognizes that many of the problems likely to be caused by the use of AI in finance are familiar ones that should not be accommodated but instead should be addressed with existing regulatory tools. He also remains humble about truly new problems that could emerge from the use of AI and new regulatory tools that may be needed to address them.428Hartzog has recommended the continued application of time-tested legal doctrines like fiduciary duties and consumer protection laws to activities carried out using AI, and—where harms are significant—licensing regimes or even bans. Hartzog Testimony, supra note 17, at 4–6, 11. The question is—given that “personnel is policy”—will other financial regulators and lawmakers follow suit?

The VC industry has invested heavily in AI and has strong incentives to deploy cognitive capture, regulatory arbitrage, and regulatory entrepreneurship strategies in order to make those investments more profitable.429See supra note 405. Andreessen Horowitz has been particularly aggressive in deploying techno-solutionist rhetoric in lobbying for favorable legal and regulatory treatment for crypto430Lipton, Wakabayashi & Livni, supra note 46. and has made it clear that it plans to deploy a similar strategy for AI. In a December 2023 blog post, Andreessen Horowitz’s co-founder Ben Horowitz announced:

We are non-partisan, one issue voters: If a candidate supports an optimistic technology-enabled future, we are for them. If they want to choke off important technologies, we are against them. Specifically, we believe . . . Artificial Intelligence has the potential to uplift all of humanity to an unprecedented quality of living and must not be choked off in its infancy . . . Every penny we donate will go to support like-minded candidates and oppose candidates who aim to kill America’s advanced technological future.431Ben Horowitz, Politics and the Future, Andreessen Horowitz (Dec. 14, 2023), https://a16z.com/politics-and-the-future [https://perma.cc/6NU2-ZMTE].

To give you an example of the kind of “optimistic technology-enabled future” that Horowitz will lobby fiercely to protect from regulation, Andreessen Horowitz has funded a startup at the intersection of AI and crypto known as Worldcoin.432Guo & Renaldi, supra note 130. Co-founded by Open AI-CEO Sam Altman, Worldcoin is using a device known as “The Orb” to collect millions of retinal scans in the developing world in exchange for a crypto asset that has no real value at present, “but someday, Worldcoin says, it’ll form the basis of a new economic system and maybe will also provide a universal basic income stream for the world’s poor.”433Max Chafkin, Don’t Scan Your Eyeballs for Worldcoin’s Magic Beans, Bloomberg (Aug. 7, 2023, 9:30 AM), https://www.bloomberg.com/news/newsletters/2023-08-07/what-s-the-purpose-of-worldcoin-orb-eye-scanning-crypto-token-project [https://perma.cc/5R9K-4DE4]. This is an exquisite example of techno-solutionism: Worldcoin has been designed to respond to problems that do not yet exist, but that Worldcoin’s founder expects his other technology to cause (i.e., the lack of income opportunities that will be available if AI renders many jobs obsolete). If AI does indeed end up eliminating lots of jobs, we will need policy solutions that take into account the dignity of work as well as people’s need for income.434Daron Acemoglu & Simon Johnson, Power and Progress: Our 1000-Year Struggle Over Technology & Prosperity 416–17 (2023). Worldcoin, however, offers (at best) an oversimplified solution to such a complex problem—a potential method for paying people to watch their screens once they no longer have jobs. And Worldcoin downplays the privacy concerns associated with training its models on the biometric data of vulnerable people and the predatory aspects of paying those people for their biometric data with a potentially worthless crypto asset.435Guo & Renaldi, supra note 130.

It remains to be seen how lawmakers and regulators will respond to Silicon Valley’s techno-solutionist appeals to allow this and other kinds of AI-related innovation to flourish.

IV.  A Possible Antidote to Techno-Solutionism

The primary goal of this Article has been to identify the techno-solutionism rife in the fintech industry and to explore how this techno-solutionism has both stymied and been facilitated by financial regulation. Techno-solutionist narratives gain some of their power through unchallenged repetition,436Cohen, supra note 17, at 104. and so this very act of calling out fintech’s techno-solutionist narratives will hopefully go some small way toward inoculating lawmakers, regulators, and the public against fintech’s most outlandish claims.437Campbell-Verduyn & Lenglet, supra note 13, at 469 (stressing “the value added for political economy of scrutinising how the visions and materialisation of technology fail”). As Morozov notes in the postscript to his book, we cannot eliminate solutionism, but we can “ridicule” it,438Morozov, supra note 8, at 355. hopefully depriving it of some of its power.

Right now, there may not be much more that can be done to diminish techno-solutionism and its detrimental impacts on regulatory regimes designed to protect the public from harm. Techno-solutionism is entrenched in our society in many ways: by corporate political expenditures (including expenditures by venture capitalists, as already discussed);439See supra notes 325, 430–31, and accompanying text. by the lack of political access for the very communities impacted by the problems to be solved;440Byrum & Benjamin, supra note 16. by challenges in inducing skilled technologists to work for government agencies;441Hilary J. Allen, Resurrecting the OFR, 47 J. Corp. L. 1, 31 (2021). by tech industry funding of academic research on technology and its impacts;442Joseph Menn & Naomi Nix, Big Tech Funds the Very People Who Are Supposed to Hold It Accountable, Wash. Post (Dec. 7, 2023), https://www.washingtonpost.com/technology/2023/12/06/academic-research-meta-google-university-influence [https://perma.cc/TR6V-33PK]. by limited public support for public sector innovation (which could stand as a counterfactual techno-solutionist narrative);443Mazzucato, supra note 48, at 12–15. by computer science pedagogy that fails to teach students how to conceptualize or contextualize the problem to be solved;444Ohm & Frankle, supra note 36, at 779. and surely much more. This Article has consistently rejected techno-solutionism’s silver bullet solutions, and there are also no silver bullet solutions for addressing techno-solutionism itself.

Still, as this Article has emphasized, personnel is policy, and we have already seen examples of policymakers who are predisposed toward pushing back against fintech’s harms—these kinds of policymakers can be empowered by the articulation of an alternative to techno-solutionism. As a heuristic, techno-solutionism will default to permitting technological innovation, regardless of potential harms: it becomes easy to “simply assume the rightful existence of [technologies] and go straight to building guardrails so they can flourish.”445Hartzog Testimony, supra note 17, at 12. When it comes to assessing fintech’s claims to improve financial inclusion, efficiency, competition, and security, what is needed is a fundamental shift in rhetoric and perspective away from techno-solutionism and toward contextually-informed skepticism regarding technological solutions.

Adopting a posture of contextually informed skepticism is precautionary to a degree but does not require the embrace of an overly strong “precautionary principle” where activities have to be proven riskless before they can proceed. Contextually informed skepticism is therefore not incompatible with innovation; instead, it sets up incentives for the kind of innovation that is mindful of harms and consequences.446Cohen, supra note 17, at 90, 92. It is, however, likely that contextually informed skepticism from regulators will impede some innovation in the name of protecting the public from harm—which will inevitably invite intense criticism from the tech industry.447In his manifesto, Andreessen decries precautionary approaches as preventing “virtually all progress since man first harnessed fire,” as well as calling them “our enemy,” “evil,” and “deeply immoral.” Andreessen, supra note 4. However, a posture of contextually informed skepticism can embolden policymakers to take this industry criticism with a grain of salt, because contextually informed skepticism recognizes that not all innovation is socially beneficial and that the tech industry’s appreciation of potential public harm will often be skewed by financial incentives and lack of domain expertise.448Ford has also stressed that “[r]egulatory staffers . . . need sufficient confidence in their own judgment and a healthy degree of skepticism about industry.” Cristie Ford, New Governance in the Teeth of Human Frailty: Lessons from Financial Regulation, 2010 Wis. L. Rev. 441, 474 (2010). This kind of perspective shift is desperately needed with regard to crypto, for example, where the harms are many, the benefits few, and yet a bipartisan group of lawmakers has shown itself willing to support industry-favored deregulation designed to encourage more crypto innovation.449See supra notes 325–26 and accompanying text.

This is by no means a call for fintech innovators to stand down—society often benefits from techno-optimists’ efforts to push frontiers.450For a discussion of the socially valuable residue of the dot.com bubble, see Doctorow, supra note 414. But when the stakes are high, this yin of techno-optimism needs to be balanced by the yang of contextually-informed skepticism from regulators or else history and domain expertise will be ignored and harms will proliferate unchecked. This Article has already explored why finance is an arena in which the potential harms are too significant for unfettered technological experimentation.451See supra notes 291–300; see also Allen, supra note 113, at 23–24. Finance might also be different in another respect: the potential benefits of technological innovation may prove to be structurally limited in finance. Often, with technology, it is the users who unlock truly unexpected innovative use cases through their experimentation.452“[T]he public has a huge range of intentions and desires and often brings far more imagination to new technologies than those who first market [or design] them.” David E. Nye, Technological Prediction: A Promethean Problem, in Technological Visions: The Hopes and Fears That Shape New Technologies 159, 170 (Marita Sturken et al. eds., 2004). In the financial industry, though, much of the innovation that has occurred has been driven by the supply-side, rather than consumer demand.453Awrey, supra note 122, at 263–67. It may be that where money is at stake, industry (including the crypto industry, which tends towards economic centralization)454Aramonte et al., supra note 182, at 27–29; Allen, supra note 284, at 924. will afford users limited ability to actively construct how they receive their financial services. If this is the case, then unexpected uses of technology will have limited opportunities to emerge—and if technological experimentation is primarily benefitting the supplier rather than the users, then there is far less reason for policymakers to accommodate it.

Conclusion

Further research on how to disrupt techno-solutionism is welcome, because if fintech is to serve as a force for good in society, it needs to be severed from techno-solutionism. We need to recognize that if new technology is adopted without addressing the broader context in which it operates, then discrimination, distributional inequalities, concentrations of power, privacy incursions, and other harms will continue to proliferate. When it comes to fixing finance, technological innovation will not obviate the need for the hard slog of structural reform. Furthermore, where technological tools do have a role to play in addressing complex structural problems, they may be tarnished by “techlash” unless we can find a way to address techno-solutionism.455One meta analysis of public discourse between 2010–2020 found that discussion of big tech is dominated not by solutionist appeals for self-regulation but instead by “calls to regulate big tech, growing critiques of technology’s influence in society, and declining discussion of the tech sector as a driver of economic growth.” Short et al., supra note 55, at 6; see also Shira Ovide, Big Tech’s Backlash Is Just Starting, N.Y. Times (July 30, 2020), https://www.nytimes.com/2020/07/30/technology/big-tech-backlash.html [https://web.archive.org/web/20231029031307/https://www.nytimes.com/2020/07/30/technology/big-tech-backlash.html]; Edward Ongweso Jr., The Incredible Temper Tantrum Venture Capitalists Threw Over Silicon Valley Bank, Slate (Mar. 13, 2023, 11:24 AM), https://slate.com/technology/2023/03/silicon-valley-bank-rescue-venture-capital-calacanis-sacks-ackman-tantrum.html [https://perma.cc/3DC4-WPU3].

Financial regulators need to adopt a posture of contextually informed skepticism instead of techno-solutionism, keeping firmly in mind that they have express statutory mandates to protect the American public from harm—and no express mandates to facilitate technological innovation. If financial regulators can resist cognitive capture and enforce existing laws such that regulatory arbitrage and regulatory entrepreneurship are not profitable strategies, then technology is more likely to deliver benefits without serious social harms. Where technologies pose genuinely new problems, then Congressional action will be needed, and that action should also proceed from a position of contextually informed skepticism. To slightly adapt testimony from AI and privacy expert Woody Hartzog, “[l]awmakers will make little progress until they accept that the toothpaste is never out of the tube when it comes to questioning and curtailing the design and deployment of [technology] for the betterment of society.”456Hartzog Testimony, supra note 17, at 11.

 

98 S. Cal. L. Rev. 761

Download

* Professor of Law, American University Washington College of Law. Many thanks to Tonantzin Carmona, Julie Cohen, Jeremy Kress, Pat McCoy, Chris Odinet, Art Wilmarth, and Jeff Zhang for reading and providing feedback on earlier drafts. This paper also benefitted enormously from comments and conversations during workshops at the University of Florida, the Reserve Bank of New Zealand, the IMF’s Internal Fintech Forum, and the meeting of the Technology Section at the Academy of Legal Studies in Business Conference. Information regarding the status of technologies, regulation, and legislation is current as of October 2024, but these are used to illustrate broader themes that will remain relevant as new technologies and regulatory and legislative approaches evolve.

Fair Use and Fair Price

In this Article, we present and develop a new justification for the fair use doctrine. The accepted lore among copyright law scholars is that fair use is a means for overcoming a market failure in the form of high transaction costs. According to this view, the doctrine sanctions unauthorized use of copyrighted works in cases where transaction costs hinder voluntary, mutually beneficial exchanges.

Departing from conventional wisdom, we argue that the fair use doctrine serves as an important empowerment even in fully functional markets. Fair use enables users to secure more favorable licensing terms from copyright owners by endowing users with a threat point in their negotiations. Without fair use, users would have to pay the price demanded by copyright owners or not use the work. With fair use, many users can credibly assert that their intended use of copyrighted content is privileged by the fair use doctrine and thus they can use the desired content without authorization. The fair use doctrine, therefore, gives users leverage in their negotiations with copyright owners.

We illustrate our thesis by applying it to the landmark fair use decisions of the Supreme Court, including the recent ruling in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith, that determined the bargaining standpoint of users for decades to come. We demonstrate the distributive effects of the Supreme Court’s fair use jurisprudence and explain how the Court must act to preserve and augment the empowering effect of fair use. The theory presented in this Article proves that the reach of fair use goes well beyond market failures and that the impact of the doctrine is much more significant than previously thought.

INTRODUCTION

Considered by many as the most important doctrine in our copyright law system,1See, e.g., Eldred v. Ashcroft, 537 U.S. 186, 219–20 (2003) (ascribing the fair use doctrine a Constitutional role); Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 555–60 (1985) (same); Neil Weinstock Netanel, First Amendment Constraints on Copyright After Golan v. Holder, 60 UCLA L. Rev. 1082, 1128 (2013) (contending that significant restrictions on fair use are forbidden under the First Amendment). fair use sanctions certain unauthorized uses of copyrighted works that would otherwise constitute a copyright infringement. Under the fair use doctrine, when a use is considered fair, the user is relieved of liability and need not pay compensation to the copyright owner whose content they used. Therefore, fair use may be conceptualized as a doctrine that confers upon deserving users a private taking power over copyrighted content that can be exercised at a zero price.2See Abraham Bell & Gideon Parchomovsky, Pliability Rules, 101 Mich. L. Rev. 1, 51 (2002) (“Essentially, the fair use privilege entitles third parties to take the intellectual property of others without paying any compensation to the property owners.”).

 Since its inception in the English common law and equity courts, the fair use doctrine has never ceased to fascinate theorists and students.3Abraham Bell & Gideon Parchomovsky, The Dual-Grant Theory of Fair Use, 83 U. Chi. L. Rev. 1051, 1053 (2016) (“Fair use is one of modern law’s most fascinating . . . doctrines.”). The existence of the doctrine raised two critical challenges for scholars. First, under what circumstances should a use be considered fair? Second, why should fair users be fully relieved of the duty to compensate copyright owners?

The answer to both these questions has been provided by Professor Wendy Gordon. In a pathbreaking article authored almost forty years ago, Gordon conceptualized fair use as a means for overcoming a market failure in the form of high transaction costs.4See generally Wendy J. Gordon, Fair Use as Market Failure: A Structural and Economic Analysis of the Betamax Case and Its Predecessors, 82 Colum. L. Rev. 1600 (1982) (demonstrating that fair use enhances social welfare when transaction costs prevent users from acquiring authorization). Gordon persuasively argued that courts should recognize fair use when three cumulative conditions obtain: first, high transaction costs prevent voluntary market exchange between copyright owners and users; second, the allegedly fair use is socially beneficial; and, third, a fair use finding would not unduly undermine incentives to create.5Id. at 1614–22. Gordon’s key insight was that when transaction costs are prohibitive, there will be no voluntary trade between copyright owners and users. In this scenario, allowing users to use copyright content for free benefits the user without harming copyright owners, for the latter would not be able to collect payments from users as transaction costs bar voluntary exchanges. Gordon correctly submitted that under these circumstances, allowing users to use copyright content for free, by classifying their use as fair, is welfare enhancing.

By tying fair use to the level of transaction costs, Gordon, at once, provided a cogent defense of the fair use doctrine and exposed its vulnerability. Professor Tom Bell and other scholars pointed out that in an interconnected world, where technological advancements constantly lower transaction costs, there may no longer be a need for fair use, and at a minimum, courts’ willingness to recognize fair uses should diminish.6See, e.g., Tom W. Bell, Fair Use vs. Fared Use: The Impact of Automated Rights Management on Copyright’s Fair Use Doctrine, 76 N.C. L. Rev. 557, 579–600 (1998) (advocating the abrogation of the fair use doctrine in the presence of advanced technology that facilitates effective licensing negotiations); Paul Goldstein, Copyright’s Highway: From Gutenberg to the Celestial Jukebox 165–96 (1994) (same); see also Jay Dratler, Jr., Distilling the Witches’ Brew of Fair Use in Copyright Law, 43 U. Mia. L. Rev. 233, 294 (1988) (“It makes no sense to provide a fair use subsidy to a user when a license could be efficiently negotiated.”). Importantly, this skeptical view of fair use has not been universally endorsed by other scholars, who advanced other utilitarian and non-utilitarian justifications for fair use.7See infra Section I.B.

In this Article, we develop a new justification for fair use that is radically different from prior theorizing. Our theory seeks to complement and reinvigorate the theories of scholars who view fair use as an essential component of our copyright system. Yet, our outlook places fair use on a very different ground from past scholarship. We contend that fair use’s most significant yet overlooked role is to facilitate bargaining between copyright owners and users, even when transaction costs are low. We argue that fair use helps users not only in those unrepresentative and rare cases where transaction costs prevent consensual transactions between copyright owners and users, but also in the more common case where transaction costs are low or nonexistent. Fair use does this by improving the bargaining power of users and giving them leverage or a threat point vis-à-vis copyright owners.

Although fair use has been traditionally considered an open-ended and unpredictable doctrine,8Infra Section III.D. two recent developments have infused a certain level of predictability into this area of the law. First, a close reading of fair use cases uncovers, what we call, two fair use clusters: transformative uses and uses that yield a substantive public benefit.9Infra Section I.A; see Justin Hughes, The Sub Rosa Rules of Copyright Fair Use, 64 Ariz. L. Rev. 1, 35–48 (2022). Second, an empirical study by Professor Barton Beebe established a meaningful positive correlation between two of the statutory factors that courts are instructed to weigh in making fair use determinations—the purpose of the use and the effect of the use on the market for the copyrighted work.10See generally Barton Beebe, An Empirical Study of U.S. Copyright Fair Use Opinions, 1978–2005, 156 U. Pa. L. Rev. 549 (2008). This emergence of clusters of uses or activities that have a legitimate claim for fair use is a welcome development for users, as it manifests in increased licensing leverage.

Consider transformativeness. Transformativeness covers a wide range of uses. While the level of transformativeness varies among uses, all users who engage in transformative uses of copyrighted works have a colorable fair use claim. Obviously, not all of them would win a fair use ruling in court, but each can credibly argue in negotiations with copyright owners that their use would be found fair with a certain probability. Since transformativeness, as recently established by the Supreme Court, “is a matter of degree,”11Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 598 U.S. 508, 529 (2023). the level of transformativeness can be represented on a unit interval, essentially reflecting its probability of enjoying a fair use defense. This probability, in turn, immediately translates into licensing leverage when negotiating with a monopolistic rightsholder.

To illustrate, imagine that Anne plans to make a transformative use of a photograph in which Bob owns a copyright. Assume that there is 0.5 probability that Anne’s use would be found fair if she uses Bob’s photograph without his permission and a lawsuit ensues. Assume further that Bob typically demands $100 per license from users who wish to use his photograph. Anne, however, owing to her potential fair use claim, should be able to secure a license for $50—a price that reflects the strength of her fair use claim.

Now consider a different user, Carol, whose planned use of Bob’s work is slightly less transformative than Anne’s. The probability of Carol’s use being fair is only 0.3. Yet, all things being equal, she, too, should be able to receive a license from Bob for a lower price than his original asking price—$70, instead of $100. As we shall demonstrate throughout this Article, these examples are representative.

The same is true for a host of other transformative users—users who can claim that their derivative works bestow a significant benefit on the public, and users who appropriate only a small portion from copyrighted works. All of them have a certain individual probability of succeeding on a fair use claim when sued by the copyright owner. The license price each would be able to negotiate depends on the strength of their fair use claim, as well as on their bargaining power. But critically, each should be able to negotiate a license for a price lower than the asking price of the copyright owner. We use a formal model to demonstrate this result and identify its robustness over a wide range of scenarios. As we will show, even a small probability of obtaining a fair use ruling may well change the bargaining outcome between users and copyright owners.

The Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith decision that was recently issued by the Supreme Court provides a powerful example of our theory.12See generally id. (addressing the role of transformativeness in fair use determination). In this case, the Supreme Court had to determine whether fourteen unauthorized silkscreens and two unauthorized pencil drawings that were produced based on a Lynn Goldsmith photograph qualify as fair uses of the photograph.13Id.at 514–25. At the heart of the matter lies the definition of the term “transformativeness.” In rejecting the foundation’s fair use claim, the Court held that a transformative work must have a fundamentally different and new artistic purpose and character.14Id. at 550. This definition is clearly narrower than that endorsed by the Supreme Court in Campbell v. Acuff-Rose Music, Inc., according to which a transformative work is one that has a different purpose or conveys new message or meaning.15See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994). The Supreme Court’s adherence to a rather narrow interpretation of transformativeness will carry far-reaching implications not only for the parties to the case, but also for a multitude of users who negotiate with copyright owners.

It bears emphasis that negotiation is often a prelude to litigation. In fact, many of the celebrated fair use cases, including Google LLC v. Oracle America, Inc.,16Google LLC v. Oracle Am., Inc., 593 U.S. 1 (2021). Authors Guild, Inc. v. Google Inc.,17Authors Guild, Inc. v. Google Inc., 954 F. Supp. 2d 282 (S.D.N.Y. 2013). and Campbell,18Campbell, 510 U.S. 569. were filed only after the parties tried, and failed, to negotiate a consensual agreement. Furthermore, even after a case is brought to court, the litigating parties attempt to negotiate a settlement while the case is pending. Indeed, such was the case in Oracle and Authors Guild. Naturally, not all negotiations result in a successful outcome, and some copyright disputes will inevitably end up in court. But it should be underscored that in any regular case, in which the existence of transaction costs does not hinder trade, the rightsholder-user negotiation becomes the primary apparatus for allocating use of copyrighted content; litigation is nothing but a complementary mechanism. This understanding implies that fair use theory must account for the doctrine’s impact on the negotiation process.

Our analysis shows that irrespective of its actual invocation in court, the fair use doctrine provides considerable benefits to users by improving their bargaining position. In economic parlance, the theory advanced by this Article views fair use as empowering significant categories of users by improving what negotiation theorists call the “best alternative to a negotiated agreement” (“BATNA”).19See, e.g., Jenny Roberts & Ronald F. Wright, Training for Bargaining, 57 Wm. & Mary L. Rev. 1445, 1479 (2016) (“To determine whether a deal is worth taking, a negotiator must figure out what would happen if the parties do not reach agreement. [BATNA] is a concept that gives a negotiator a reference point for knowing when to walk away from the negotiating table.”); see also infra Section II.A. By diminishing the BATNA of copyright holders and bolstering that of users, the fair use doctrine redesigns the licensor-licensee relationship to promote the use and distribution of copyrighted content.

The present Article thus conceptualizes fair use not as a mechanism that overcomes transaction-costs-related market failures, but rather, as a doctrine that rests the foundations for just and efficient bargaining framework. In this regard, we analyze the behavior of relevant economic actors that operate “in the shadow” of the fair use doctrine.20For the general “shadow” outlook, see generally Robert H. Mnookin & Lewis Kornhauser, Bargaining in the Shadow of the Law: The Case of Divorce, 88 Yale L.J. 950 (1979).

We develop our argument in accordance with the following structure. In Part I, we explain the fair use doctrine and discuss the theories that have been developed to justify it. In Part II, we introduce a new theory of fair use and explicate how it differs from the extant literature. In Part III, we present the normative attractiveness of our theory by highlighting its positive welfare and distributive implications. A short Conclusion ensues.

I.  Fair Use: Law and Theory

A.  The Fair Use Doctrine

The fair use doctrine made its first appearance in the U.S. in the 1841 case of Folsom v. Marsh.21Folsom v. Marsh, 9 F. Cas. 342 (C.C.D. Mass., 1841). According to scholars, however, its origins are far more ancient. Professor Matthew Sag, for example, suggests that the fair use doctrine “predate[d] Folsom v. Marsh by at least 100 years.”22Matthew Sag, The Prehistory of Fair Use, 76 Brook. L. Rev. 1371, 1387–93 (2011). Professor William Patry went even further and dated the doctrine back to the year 1710 when the Statute of Anne was enacted.23See William Patry, How to Fix Copyright 215 (2011). Other researchers trace the roots of the fair use doctrine to the common law and natural rights conceptions.24See generally Benjamin G. Damstedt, Limiting Locke: A Natural Law Justification for the Fair Use Doctrine, 112 Yale L.J. 1179 (2003); L. Ray Patterson, Understanding Fair Use, 55 L. & Contemp. Probs. 249 (1992).

In 1976, the fair use doctrine was codified and became part of the Copyright Act. 17 U.S.C. § 107 (“section 107”), in which the fair use doctrine is enshrined, opens with a preamble that offers a non-exhaustive list of presumptively fair uses, including, “criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research.”2517 U.S.C. § 107. Then, it proceeds to enumerate four factors that courts ought to consider when making fair use determinations: “(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; [and] (4) the effect of the use upon the potential market for or value of the copyrighted work.”26Id.

It is important to note that the codification of the fair use doctrine did not purport to change its nature as an equitable doctrine. In the accompanying House Report, Congress referred to the fair use doctrine as “an equitable rule of reason.”27H.R. Rep. No. 94-1476, at 65 (1976). The statutory formulation of the doctrine, therefore, preserved the flexibility and open-endedness that have become the hallmark of the fair use doctrine. As Judge Pierre Leval wrote in his 1990 classic article on fair use:

What is most curious about this doctrine is that neither the decisions that have applied it for nearly 300 years, nor its eventual statutory formulation, undertook to define or explain its contours or objectives. . . . [They] furnish little guidance on how to recognize fair use. The statute, for example, directs us to examine the “purpose and character” of the secondary use as well as “the nature of the copyrighted work.”28Pierre N. Leval, Toward a Fair Use Standard, 103 Harv. L. Rev. 1105, 1105–06 (1990); see also David Nimmer, “Fairest of Them All” and Other Fairy Tales of Fair Use, 66 L. & Contemp. Probs. 263, 287 (2003) (“[R]eliance on the four statutory factors to reach fair use decisions often seems naught but a fairy tale.”).

Even more remarkable was Judge Leval’s admission that although “courts have treated the definition of the doctrine as assumed common ground[, t]he assumption of common ground is mistaken. Judges do not dineshare a consensus on the meaning of fair use.”29Leval, supra note 28, at 1106. Indeed, the courts’ inability to converge on a common understanding of fair use has frustrated copyright scholars, leading Professor Larry Lessig to conclude that the fair use doctrine amounts to nothing other than “the right to hire a lawyer to defend your right to create.”30Lawrence Lessig, Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity 187 (2004).

While scholars have bemoaned the uncertainty that shrouds the fair use doctrine31See, e.g., Michael J. Madison, A Pattern-Oriented Approach to Fair Use, 45 Wm. & Mary L. Rev. 1525, 1666 (2004) (criticizing the unpredictability of fair use and referring to it as “a lottery argument”); Thomas F. Cotter, Fair Use and Copyright Overenforcement, 93 Iowa L. Rev. 1271, 1273–74 (2008) (highlighting the “often complex, fact-specific, and hence relatively unpredictable nature” of the standards that govern fair use); James Gibson, Once and Future Copyright, 81 Notre Dame L. Rev. 167, 192 (2005) (“[C]lear precedent on fair use is a rare thing in the fast-changing world of digital technology, and thus in many cases the uncertainty of the outcome would undoubtedly have a chilling effect on socially beneficial behavior.”); Peter S. Menell & Ben Depoorter, Using Fee Shifting to Promote Fair Use and Fair Licensing, 102 Cal. L. Rev. 53, 57 (2014) (“[I]t is exceedingly difficult for many cumulative creators to predict whether a use will qualify as fair use.”). and, over the years, have advanced various proposals in order to cabin the unpredictability of fair use,32See generally Gideon Parchomovsky & Kevin A. Goldman, Fair Use Harbors, 93 Va. L. Rev. 1483 (2007) (calling for the formalization of clear fair use harbors); Jason Mazzone, Administering Fair Use, 51 Wm. & Mary L. Rev. 395 (2009) (proposing the establishment of fair use tribunals); Michael W. Carroll, Fixing Fair Use, 85 N.C. L. Rev. 1087 (2007) (advocating the establishment of a regulatory agency that issues administrative rulings on fair use as a conceptual analogue to SEC and IRS decisions). in this Article, we take a different tack. We argue, contrary to conventional wisdom, that the inherent uncertainty of the fair use doctrine might actually help, rather than harm, users. The possibly virtuous effect of uncertainty has been overlooked by theorists as they have focused exclusively on the litigation arena. We, by contrast, are interested in the effect of fair use outside of the courtroom, in negotiations between copyright owners and users. We develop this argument fully in Part II of this Article, as part of our transactional model of fair use. But before elaborating on the potential virtues of uncertainty, it behooves us to complete our discussion of the development of the fair use doctrine and highlight some critical recent developments.

Four years after Judge Leval’s 1990 portrayal of fair use as a helplessly underminable doctrine, the fair use landscape was reshaped. The turning point was the Supreme Court’s 1994 decision in Campbell v. Acuff-Rose Music, Inc.. In finding 2 Live Crew’s version of Roy Orbison’s and Bill Dees’s copyrighted song “Oh Pretty Woman” a fair use, the Court stated that “the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use.”33Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994). As we will show, lower courts were quick to follow the language and spirit of the Campbell opinion. Since Campbell, transformativeness has become the currency of the fair use realm.34See, e.g., Bell & Parchomovsky, supra note 3, at 1067 (“Following Campbell, recent fair use decisions appear to focus on the transformativeness of the defendants’ works . . . as the key factor in fair use cases.”); Neil Weinstock Netanel, Making Sense of Fair Use, 15 Lewis & Clark L. Rev. 715, 736 (2011) (attesting that transformativeness “overwhelmingly dominate[s]” contemporary fair use doctrine); Rebecca Tushnet, Copy This Essay: How Fair Use Doctrine Harms Free Speech and How Copying Serves It, 114 Yale L.J. 535, 550 (2004) (“[F]air use increasingly requires transformation, that is, the addition of new material or a new, critical perspective.”).

The importance of transformativeness to fair use determinations was highlighted by Judge Leval in his classic article.35See generally Leval, supra note 28. Yet, it was the Supreme Court’s endorsement of transformativeness in Campbell that officially conferred upon it an elevated status.36Campbell, 510 U.S. at 579. Subsequent cases have substantially increased the weight granted to transformativeness in fair use determinations. Among others, courts held that a challenged work is worthy of protection whenever it “contains significant transformative elements,”37Comedy III Prods., Inc. v. Gary Saderup, Inc., 21 P.3d 797, 808 (Cal. 2001). is “sufficiently transformative,”38Mattel Inc. v. Walking Mountain Prods., 353 F.3d 792, 800 (9th Cir. 2003). or is endowed with a “patently transformative character.”39Mattel, Inc. v. Pitt, 229 F. Supp. 2d 315, 322 (S.D.N.Y. 2002). It has been further emphasized that a central purpose of fair use investigations is to establish “whether and to what extent the new work is ‘transformative.’ ”40On Davis v. Gap, Inc., 246 F.3d 152, 174 (2d Cir. 2001) (citing Campbell, 510 U.S. at 579). In other instances, courts submitted that copyright infringement, notwithstanding the commercial character of the work in question, may not be determined given that the original work is “used for a transformative purpose.”41Bill Graham Archives v. Dorling Kindersley Ltd., 448 F.3d 605, 612 (2d Cir. 2006).

The effect of the rise of transformativeness can be best seen in the context of fair use cases involving appropriation art. Appropriation art is an art form predicated on the use of existing objects with subtle modifications.42See, e.g., William M. Landes, Copyright, Borrowed Images, and Appropriation Art: An Economic Approach, 9 Geo. Mason L. Rev. 1, 1 (2000) (describing appropriation art as an area wherein an “artist’s technical skills are less important than his conceptual ability to place images in different settings and, thereby, change their meaning”). Cases on appropriation art include the Second Circuit’s famous Blanch v. Koons43Blanch v. Koons, 467 F.3d 244 (2d Cir. 2006). and Cariou v. Prince.44Cariou v. Prince, 714 F.3d 694 (2d Cir. 2013). In both cases, the court was persuaded of the sufficient transformation that the process of appropriation can embed. In Blanch, the court explained that Jeff Koons’s appropriation of Blanch’s photograph “was intended to be—and appears to be—‘transformative.’ ”45Blanch, 467 F.3d at 256. In Cariou, the court was more hesitant but nonetheless concluded that Richard Prince’s appropriating work “could be transformative even without commenting on Cariou’s work or on culture, and even without Prince’s stated intention to do so.”46Cariou, 714 F.3d at 707.

A closely related development in fair use jurisprudence that can also be traced back to Campbell involves parodies. A parody is defined as a derivative work whose purpose is to criticize or comment on a preexisting copyrighted work.47Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 580–81 (1994) (“Parody needs to mimic an original to make its point, and so has some claim to use the creation of its victim’s (or collective victims’) imagination, whereas satire can stand on its own two feet and so requires justification for the very act of borrowing.”). After classifying 2 Live Crew’s unauthorized rendition of “Oh Pretty Woman” as a parody, the Court likewise ruled that parodic uses are especially transformative and therefore have an especially strong claim for fair use.48Id. at 579 (“[A] parody has an obvious claim to transformative value . . . .”). The Court added that copyright owners are unlikely to authorize parodies that are of unflattering commentary or mockery to their works,49Id. at 592 (“[T]he unlikelihood that creators of imaginative works will license critical reviews or lampoons of their own productions removes such uses from the very notion of a potential licensing market.”). But see Jeanne C. Fromer, Market Effects Bearing on Fair Use, 90 Wash. L. Rev. 615, 645 (2015) (“Campbell’s specific conclusion about the unlikelihood of licensing markets in criticism is empirically dubious.”). and thus, the production of parodies critically depends on fair use.

The Supreme Court’s ruling in Campbell has been understood by lower courts and commentators to create something of a safe harbor for parodies.50See, e.g., Pamela Samuelson, Possible Futures of Fair Use, 90 Wash L. Rev. 815, 821 (2015) (“Although the Court in Campbell expressly declined to adopt a presumption that parodies of copyrighted works were fair uses, the parody case law after Campbell has resulted in many fair use rulings. . . . [This trend suggests] that parodies are de facto presumptively fair.”) (citations omitted); Bell & Parchomvsky, supra note 3, at 1101 (“[T]he Court effectively created a ‘safe harbor’ for parodies within fair use . . . .”). As Professor Pamela Samuelson observed, “[n]otwithstanding the Court’s unwillingness in Campbell to presume that parodies are fair, every subsequent parody case has been adjudged a fair use.”51Pamela Samuelson, Unbundling Fair Uses, 77 Fordham L. Rev. 2537, 2550 (2009). For example, in Suntrust Bank v. Houghton Mifflin Co., the Eleventh Circuit ruled that Alice Randall’s “The Wind Done Gone,” a critical literary account of Margaret Mitchell’s “Gone With the Wind,” was a parody of the original and was therefore a fair use of it.52Suntrust Bank v. Houghton Mifflin Co., 268 F.3d 1257, 1279–80 (11th Cir. 2001). Likewise, in Burnett v. Twentieth Century Fox Film Corp., the Court ruled that an audiovisual work produced by the creators of Family Guy, which poked fun at the figure of Carol Burnett, constituted a fair use on account of its parodic nature.53Burnett v. Twentieth Century Fox Film Corp., 491 F. Supp. 2d 962, 969 (C.D. Cal. 2007). Similarly, in Brownmark Films, LLC v. Comedy Partners, the Seventh Circuit held that a music video by the creators of South Park which parodied the plaintiff’s music video has “obvious transformative value.”54Brownmark Films, LLC v. Comedy Partners, 682 F.3d 687, 693 (7th Cir. 2012). Recently, the Second Circuit openly acknowledged that in the aftermath of Campbell, “parody, which ‘needs to mimic an original to make its point,’ . . . is routinely held transformative.”55Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 992 F.3d 99, 110 (2d Cir. 2021) (quoting Campbell v. Acuff-Rose Music, Inc., 518 U.S. 569, 580–81 (1994)).

Another line of cases, beginning with Kelly v. Arriba Soft Corp.,56Kelly v. Arriba Soft Corp., 336 F.3d. 811 (9th Cir. 2003). highlighted another key determinant of fair use: social benefit. Importantly, this category, too, grew out of the Supreme Court’s Campbell decision, with its emphasis on transformativeness. In Campbell, the Court suggested that a “parody has an obvious claim to transformative value” because “it can provide social benefit, by shedding light on an earlier work, and, in the process, creating a new one.”57Campbell, 518 U.S. at 579. The fair use cases that thrust public benefit to the forefront of the fair use analysis predominantly involved users from the technology sector. In Kelly, the Ninth Circuit ruled that the public display of photographs in the form of thumbnails as part of the operation of a visual search engine constituted fair use.58See generally Kelly, 336 F.3d. In reaching this conclusion, the court mentioned the benefit conferred on the public by the appellee’s search engine.59Id. at 820. Approximately four years later, in 2007, in Perfect 10, Inc. v. Amazon.com, Inc., the Ninth Circuit was asked to revisit the issue, when an adult content company sued Google, alleging that its authorized display of its copyrighted photos as thumbnails in response to users’ searches constituted copyright infringement.60See generally, Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146 (9th Cir. 2007). Finding that Google’s use was fair, the Ninth Circuit emphasized the “significant public benefit” of Google’s search system, explaining:

[A] search engine provides social benefit by incorporating an original work into a new work, namely, an electronic reference tool. Indeed, a search engine may be more transformative than a parody because a search engine provides an entirely new use for the original work, while a parody typically has the same entertainment purpose as the original work.61Id. at 1165.

The social benefit factor quickly found its way to the decisions of other circuits.62See, e.g., A.V. v. iParadigms, LLC, 562 F.3d 630 (4th Cir. 2009) (holding that the use of plaintiffs’ papers in defendant’s “Turnitin Plagiarism Detection Service” was fair). It played an important role in the Second Circuit’s ruling in Authors Guild v. Google, Inc..63See generally Authors Guild v. Google, Inc., 804 F.3d 202 (2d Cir. 2015). The case was brought after Google decided to establish a large, searchable digital repository of literary works by scanning the books in several libraries around the world, including the libraries of Harvard University, The University of California, Stanford University, The University of Michigan, Columbia University, Princeton University and the New York Public Library.64Id. at 208 n.3. The goal was to allow users to search the content of the books, yet the content of books could not be copied and only snippets from books were displayed to users in response to their searches.65Id. at 207. Nonetheless, after prolonged negotiations between the parties failed to yield a settlement, the Authors Guild sued Google for copious copyright infringements.66Id. at 211. In reaching the conclusion that Google’s use was fair, the district court dedicated a full section of its decision to a discussion of the myriad public benefits arising from Google’s use.67Authors Guild, Inc. v. Google Inc., 954 F. Supp. 2d 282, 291 (S.D.N.Y. 2013). On appeal, the Second Circuit affirmed the district court’s decision, awarding Google an important legal victory, but toned down the importance of the public benefits provided by Google.68See generally Authors Guild, 804 F.3d 202.

The final imprimatur of public benefit as a key determinant of fair use was given by the Supreme Court in its 2021 decision in Google LLC v. Oracle America, Inc.69Google LLC v. Oracle Am., Inc., 593 U.S. 1 (2021). In a 6-2 decision, the Supreme Court ruled that Google’s unauthorized appropriation of 11,500 lines of Oracle’s Java Application Programming Interface (“API”) for the Android operating system constitutes fair use.70See generally id. Writing for the majority, Justice Breyer noted the added value created by Google’s use for third parties:

Here Google’s use of the Sun Java API seeks to create new products. It seeks to expand the use and usefulness of Android-based smartphones. Its new product offers programmers a highly creative and innovative tool for a smartphone environment. To the extent that Google used parts of the Sun Java API to create a new platform that could be readily used by programmers, its use was consistent with that creative “progress” that is the basic constitutional objective of copyright itself.71Id. at 30. For criticism, see Terry Hart, Breyer’s Flawed Fourth Fair Use Factor in Google v. Oracle, Copyhype (June 1, 2021) https://www.copyhype.com/2021/06/breyers-flawed-fourth-fair-use-factor-in-google-v-oracle [https://perma.cc/6H78-PMKK] (“From a legal standpoint, I think Breyer is wrong to suggest that courts should consider the public benefits of copying as part of the fourth factor analysis.”).

Importantly, it was not only the courts that helped dispel some of the doctrinal mist that enveloped the fair use doctrine for centuries. Academics, too, have managed to point to overarching principles that affect fair use determinations. Two such efforts are worthy of special note.

In two separate projects, the first published in 200872See generally Beebe, supra note 10. and the second in 2020,73See generally Barton Beebe, An Empirical Study of U.S. Copyright Fair Use Opinions Updated, 1978–2019, 10 N.Y.U. J. Intell. Prop. & Ent. L. 1 (2020). Professor Barton Beebe empirically examined fair use case law to find correlations between various fair use factors and case results. His method allowed him to pierce the judicial rhetoric and examine which statutory factors are outcome determinative in fair use cases. In his 2008 article, which surveyed the opinions from all fair use cases issued between 1978 and 2005, Beebe noted that “[i]t appears . . . that courts and commentators have exaggerated the influence of transformativeness doctrine on our fair use case law.”74Beebe, supra note 10, at 604. However, in his 2020 article that analyzed the opinions from all fair use cases issued between 2005 and 2019, Beebe reports that “while the transformativeness test appeared to be waning in influence by 2005, it has since recovered its previous level of influence, even in the lower-profile, workaday fair use opinions that make up the majority of the data.”75Beebe, supra note 73, at 5. Along similar lines, Clark Asay, Arielle Sloan and Dean Sobczak have empirically established that if courts perceive a certain use as transformative, it would almost invariably qualify for fair use protection, which implies that transformativeness is essentially a sufficient condition for enjoying the fair use defense.76Clark D. Asay, Arielle Sloan & Dean Sobczak, Is Transformative Use Eating the World?, 61 B.C. L. Rev. 905, 941–42 (2020). These recent findings suggest an important confluence between judicial rhetoric and reality.

The Supreme Court’s recent decision in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith77Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 598 U.S. 508, 529 (2023). unfolded the most recent development in fair use jurisprudence. Issued in May 2023, the ruling is the first application of fair use in the arts and entertainment industry since the 1994 Campbell ruling. The Warhol case involves a series of Prince’s photos taken by photographer Lynn Goldsmith in 1981 to accompany a Vanity Fair article concerning Prince.78Id. at 515–16. Unbeknownst to Goldsmith, the magazine solicited Andy Warhol to create a stylized painted version of the photograph that became known as the “Orange Prince” silkscreen.79Id. at 516–17. Vanity Fair published the Orange Prince portrait in its November 1984 edition, and Goldsmith was co-credited for this work.80Id. at 517. Orange Prince, however, was only one of sixteen painted versions created by Warhol, collectively known as Warhol’s “Prince Series.”81Id. at 518–19. Pursuant to its completion, the Prince Series has been routinely displayed in museums and galleries.82Id. at 519 n.2. After Prince’s passing in 2016, Condé Nast, the official publisher of Vanity Fair, published a commemorative magazine entitled “The Genius of Prince,” with the Orange Prince portrait embellishing its cover.83Id. at 519–20. Alleging copyright infringement, Goldsmith argued that notwithstanding her initial 1984 licensing agreement with Condé Nast to use her photo one time as an “artistic reference,” she was unaware of the Orange Prince silkscreen—as well as of the Prince Series at large—until its reintroduction as part of the commemorative 2016 edition.84Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 992 F.3d 99, 106–08 (2d Cir. 2021).

Once Goldsmith learned of the aforementioned facts, she brought an infringement suit against the foundation. The Southern District of New York granted the foundation’s motion for a preliminary ruling that Warhol’s work, though it incorporated Goldsmith’s photograph, was sufficiently transformative to qualify as a fair use.85See Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 382 F. Supp. 3d 312, 326 (S.D.N.Y. 2019) (“[Warhol’s] alterations result in an aesthetic and character different from the original. The Prince Series works can reasonably be perceived to have transformed Prince from a vulnerable, uncomfortable person to an iconic, larger-than-life figure. The humanity Prince embodies in Goldsmith’s photograph is gone. Moreover, each Prince Series work is immediately recognizable as a ‘Warhol’ rather than as a photograph of Prince—in the same way that Warhol’s famous representations of Marilyn Monroe and Mao are recognizable as ‘Warhols,’ not as realistic photographs of those persons.”). The ruling was then overturned by the Second Circuit.86See generally Warhol, 992 F.3d 99. Finding that Warhol’s portrait incorporated no significant addition or alteration upon Goldsmith’s original photograph, the court concluded that the portrait was infringing.87Id. at 114–15 (“[T]he district judge should not assume the role of art critic and seek to ascertain the intent behind or meaning of the works at issue. . . . Warhol created the series chiefly by removing certain elements from the Goldsmith Photograph, such as depth and contrast, and embellishing the flattened images with ‘loud, unnatural colors.’ . . . Crucially, the Prince Series retains the essential elements of the Goldsmith Photograph without significantly adding to or altering those elements.”) (quoting Warhol, 382 F. Supp. 3d at 326). In a 7-2 decision, the Supreme Court elected to affirm the Second Circuit’s conservative interpretation of transformativeness, thus rejecting the appeal and siding with Goldsmith.88See generally Warhol, 992 F.3d 99. The Warhol case thus marks a potential deviation from status quo interpretation of the fair use doctrine. We analyze the implications of the rulings to our theory in Part II, below.

The preceding discussion teaches that the Supreme Court’s approach to fair use has interjected a certain degree of certainty and predictability into the doctrine. This is not to say that fair use has become a clear doctrine—far from it—but it can be generally stated that in the aftermath of Campbell, parodic uses, sufficiently transformative uses, and uses that produce significant public benefits are likely to be found fair. As we will explain in Part II, the creation of these fair use clusters, or silos, is of vital importance to our theory of fair use. But before introducing our own theory of fair use, we must give credit to prior theorists and discuss their contributions. It is to this task that we next turn.

B.  Theoretical Justifications of the Fair Use Doctrine

As befits a doctrine of its significance, scholars have advanced several theories to justify fair use. In this Section, we review the leading theoretical justifications of fair use. It should be emphasized at the outset that our goal is not to discredit other theories or even criticize them. As we will show, our theory of fair use complements existing theories by elucidating a central function of fair use that has hitherto evaded other scholars. The goal of the proceeding discussion is twofold: first, we wish to map the theoretical landscape of fair use, so we can precisely locate our own theory within it. Second, we seek to show how our justification of fair use interacts with the extant theoretic literature.

The most dominant theory has been put forth by Wendy Gordon.89Gordon, supra note 4. In an immensely influential article, Gordon argued that the fair use doctrine is a mechanism for allowing the use of copyrighted content when voluntary transactions between copyright owners and users are barred by high transaction costs.90See generally id. Specifically, Gordon postulated that fair use should be recognized when three cumulative conditions are met: (1) high transaction costs prevent consensual bargaining between copyright owners and users; (2) the unauthorized use is socially desirable; and (3) legitimizing the disputed use would not undermine incentives to create.91Id. at 1601.

To illustrate the operation of Gordon’s theory, imagine a student who wishes to quote a copyrighted manuscript. Assume that the author of the manuscript charges $20 for the requested use and that is also the maximum price that the student is willing to pay. However, transaction costs—defined as the cost of identifying the counterparty to the transaction, negotiating and formalizing an agreement with them, and enforcing the agreement—would bar the exchange from taking place. Under these circumstances, allowing the student to quote the manuscript without permission would make them (and society at large) better off without harming the author. The author, in our example, could not receive payment from the student, not because they refused to pay, but rather owing to the fact that the level of transaction costs made payment impossible. Hence, the author stands to lose nothing if the student’s use is considered fair and the student receives a benefit of $20. Society, too, is benefitted by the award of fair use to the student since the realm of creativity is enriched, while incentives to create future works are not harmed.

Gordon’s approach grounded fair use in economic theory, proving that the doctrine can be welfare enhancing when applied properly. However, the tie Gordon created between fair use and high transaction costs has proven to be a double-edged sword. As the title of her article, Fair Use as a Market Failure suggests, Gordon justified fair use as a means of overcoming a market failure in the form of high transaction costs. This was a great strength of Gordon’s theory, but also a potential weakness. Critically, Gordon’s theory established a direct correlation between the level of transaction costs and the cases in which fair use should be recognized. The problem is that improvements in telecommunications and computer technologies have dramatically lowered transaction costs since Gordon published her article in 1982, putting a lot of strain on Gordon’s theory. Critics of Gordon’s theory suggested that in an interconnected world, fair use has outlived its “raison d’être” and all uses must be secured via payment.92See, e.g., Bell, supra note 6, at 579–600. It bears emphasis that Gordon responded to her critics by broadening and sharpening the role of market failure in her account. Yet, Gordon’s account remains inextricably related to the concept of market failure, and it conceives fair use as a mechanism that operates in non-transactional settings, i.e., settings in which voluntary transactions are vitiated.93It should be noted that in a later article with Daniel Bahls, Gordon clarified that the presence of high transaction costs constitutes only a prima facie reason to recognize fair use and that fair use should also be recognized in the following cases: patterns of creative production that are not consistent with bureaucratic behaviors; anticommons, hold-out and bilateral monopoly problems; distributional inequities; positive externalities; use of another’s work not as expression but as a fact; use of another’s expression as a means to access the public domain; and critical, nonmonetizable or “priceless” uses of copyrighted works. See Wendy J. Gordon & Daniel Bahls, The Public’s Right to Fair Use: Amending Section 107 to Avoid the ‘Fared Use’ Fallacy, 2007 Utah L. Rev. 619, 623–24.

A slightly different justification of fair use that complements Gordon’s original justification has been offered by Ben Depoorter and Francesco Parisi. Depoorter and Parisi correctly pointed out that technological advancements do not lower all transaction costs.94Ben Depoorter & Francesco Parisi, Fair Use and Copyright Protection: A Price Theory Explanation, 21 Int’l Rev. L. & Econ. 453, 453 (2002). The problem of strategic holdouts remains, even in the face of technological advancements. The holdout problem is especially acute for users, such as creators of documentary works, who need to secure permission from multiple copyright owners. In such cases, each copyright owner possesses veto power over the planned use and may strategically exercise it to the detriment of users. The fair use doctrine allows users to carry out their creative projects despite strategic attempts by copyright owners to hamper the enterprise.95Id. at 459 (“In the absence of a fair-use defense, a third party who wishes to utilize [copyrighted content] needs to obtain the consent of all copyright holders.”) (emphasis added). Depoorter’s and Parisi’s account is both persuasive and elegant, but “it potentially limits the usefulness of the market-failure theory to only cases in which a user must clear multiple rights and has no other alternatives.”96Bell & Parchomovsky, supra note 3, at 1064.

Two additional justifications of fair use focus on allocative efficiency. The first, associated with William Fisher, calls on courts to use fair use to promote the goals of copyright protections.97See generally William W. Fisher III, Reconstructing the Fair Use Doctrine, 101 Harv. L. Rev. 1659 (1988). To this end, Fisher asks courts to think of all possible uses of copyrighted works. Then, for each use, he calls on courts to design what can be called an “efficiency ratio,” with the numerator representing the profit an author could realize if fair use is denied and the denominator representing the loss to society if the copyright owner refuses to license the work.98Id. at 1707. A high efficiency ratio suggests, per Fisher, that the use is probably unfair, while a low one indicates that the use is fair.99Id. Fisher sets the cutoff at the use with the highest marginal aggregate social gain (gain to society from creation minus loss to society from monopoly control over uses).100Id. at 1717. As Fisher himself admits, his approach to analyzing fair use, at least with respect to some sorts of works, “is nearly coterminus [sic] with economic analysis of the copyright system as a whole.”101Id. at 1704–05. Fisher likewise acknowledges that his approach is probably impractical in light of the informational burden it imposes on judges.102Id. at 1739.

A different allocative justification, termed the “dual-grant theory” of fair use, was constructed by Professor Abraham Bell together with one of this article’s authors.103See generally Bell & Parchomovsky, supra note 3. The dual-grant theory maintains that in designing our copyright system, Congress created two blocs of uses, allocating one to authors and the other to the public. Each group was given the uses which it values most. Accordingly, authors received “standard commercial uses,” while the public received “uses of highly dispersed social value,”104Id. at 1058. such as political speech, and uses that promote the pursuit of science, knowledge and truth.105Id. By contrast to Fisher’s theory of fair use, which requires courts to make individual case-by-case determinations of fair use, the dual-grant theory calls on courts to make fair use determinations based on the category of uses to which the challenged use belongs. This, in turn, renders the approach a lot more practical but less precise compared to Fisher’s framework of analysis.

II.  Fair Use as Licensing Leverage

As our discussion in Part I demonstrates, extant theories of fair use perceive it as a mechanism for bypassing the market and a substitute to owner-user bargaining. Importantly for the purpose of our analysis, all existing justifications of fair use focus exclusively on the courts. The underlying assumption in all four accounts is that fair use serves users exclusively in litigation or as a tool for overcoming negotiation breakdowns or high transaction costs that prevent negotiations from occurring ab initio.

The justification we develop in this Part focuses on the effect of fair use on enabling voluntary transactions between copyright owners and users. By contrast to prior justifications of fair use, we show that the main function of fair use is to facilitate bargaining, rather than replace it. We call this effect “the hidden function of fair use.” As we demonstrate, the fair use doctrine allows users to secure more favorable licensing terms from copyright owners. Importantly, our theory does not compete with any of the prior theories. Rather, it complements all four of them. This complementarity suggests that the effect of fair use is broader and deeper than previously believed.

A.  The Theory

In their acclaimed bestseller on negotiation theory, Getting to Yes, Professors Roger Fisher and William Ury famously stress that “the relative negotiating power of two parties depends primarily upon how attractive to each is the option of not reaching agreement.”106Roger Fisher & William Ury, Getting to Yes: Negotiating Agreement Without Giving In 102 (Bruce Patton, ed., 2d ed. 1991) (emphasis added). They therefore submit that a sine qua non107There are, of course, other factors of relevance, most prominently the information structure that the bargaining environment features. Information asymmetry with respect to private valuations may inhibit welfare-enhancing trade. See, e.g., Jennifer Gerarda Brown & Ian Ayres, Economic Rationales for Mediation, 80 Va. L. Rev. 323, 333 (1994) (“When the parties have private knowledge of their own [BATNAs], sellers will have an incentive to overstate their valuations in order to negotiate a higher price and buyers will have an incentive to understate their valuations in order to negotiate a lower price.”). for A’s bargaining advantage is that their benefit from a state of disagreement exceeds B’s, since, in such case, B would be willing to sacrifice more in order to reach an agreement, which diverts the terms of agreement formation in A’s favor. Normally, the party with the upper hand in a bargaining setting is the one who possesses a stronger BATNA.108Fisher & Ury, supra note 106, at 102 (“The better your BATNA, the greater your power.”); Leigh L. Thompson, Jiunwen Wang & Brian C. Gunia, Negotiation, 61 Ann. Rev. Psych. 491, 494 (2010) (“A negotiator’s BATNA has become the primary indicator of a negotiator’s relative power in negotiation.”). To exemplify, suppose that A is interested in selling B a used car, which B values at $10,000. Realizing this, A can require up to $10,000 to secure an agreement between the two. Assume now that C offers a similar car for sale, in exchange for only $5,000. C’s entry affects the negotiations between A and B: the maximum price that B would be willing to pay for A’s car now drops to $5,000. C’s entry, by providing B with an alternative to negotiating with A, enhances B’s BATNA.

The fair use doctrine has a similar effect to that of C’s entry in the previous example: it elevates users’ BATNA and thereby confers upon them significant leverage in negotiations with copyright owners. A helpful way to see this effect of fair use is to think of it as a call option the law gives to users over copyrighted content with a strike price of zero if their use is found fair. Recall that a fair use finding means that a user is not only free to use copyrighted content without permission, but also that they are allowed to do so free of charge.

To illustrate, suppose that Ella, an artist, is interested in using Francine’s copyrighted work for a transformative purpose and contacts her to acquire authorization. Assume that Ella values Francine’s work at $8,000 and is willing to pay Francine up to this sum in order to secure authorization. If Ella were to use Francine’s work without permission, she would be sued for copyright infringement and a court would order her to pay Francine $10,000 in damages.109For the sake of simplicity, assume that litigation costs for both parties are embedded in this amount.

To see the effect of fair use on negotiation dynamics, consider first a world without fair use. In this world, users can only use copyrighted content permissively. Any attempt at bypassing the market would be remedied by damages, an injunction, or both. Under a legal regime that does not recognize fair uses, Ella has no feasible alternative to negotiating with Francine. Using the work without authorization is not a viable option from Ella’s perspective, as it represents a negative net value (-$2,000): while Ella would receive a benefit of $8,000 from her use, she ought to pay $10,000 in damages. Therefore, in economic parlance, Ella has no credible threat of using without authorization: both parties know that if negotiations fail, Ella will just have to forgo her planned use. Consequently, Ella is willing to pay any price up to $8,000 (her valuation of Francine’s work), eliciting a positive benefit, instead of zero. Francine, in turn, would take advantage of her monopolistic status as an exclusive rightsholder and accord by setting up an asking price of $8,000—the maximum Ella is willing to pay.110The maximum price that users are willing to pay is also termed by the relevant literature as their reservation price—a quantitative representation of their BATNA, such that lower reservation price implies an increased BATNA. See, e.g., Ian Ayres, Further Evidence of Discrimination in New Car Negotiations and Estimates of Its Cause, 94 Mich. L. Rev. 109, 111 n.8 (1995) (“Dispute resolution theorists alternatively refer to a reservation price as a person’s ‘BATNA’ . . . .”); Ian Ayres & Barry J. Nalebuff, Common Knowledge as a Barrier to Negotiation, 44 UCLA L. Rev. 1631, 1642 (1997) (“[E]conomists tend to use the term ‘reservation price’ [to represent BATNA].”); Howard Raiffa, The Art & Science of Negotiation 45 (1982) (“The buyer has some reservation price . . . that represents the very maximum she will settle for . . . .”); Thompson et al., supra note 108, at 495 (“[Reservation points] are the quantification of a negotiator’s BATNA . . . .”). In such a world, therefore, Ella confronts an asking price of $8,000, which means that Francine gets to pocket the entire bargaining surplus.

Now consider a world with fair use. Assume that, given the high transformativeness of Ella’s intended use, there is a 0.5 probability that a court will find the use fair. This means that if negotiations fail, Ella is better off using Francine’s work without authorization than with forgoing the use: using the work without permission provides her with a benefit of $8,000 while the expected costs are only $5,000 (0.5 × $10,000 = $5,000). Critically, the introduction of fair use changes the expected value of unauthorized use from -$2,000 to $3,000 ($8,000 – $5,000). The existence of the fair use doctrine, thus, dramatically empowers users vis-à-vis copyright owners. This implies that Ella’s threat of using Francine’s work without permission becomes credible: if Francine’s asking price would exceed $5,000, Ella would walk off the negotiation table and use the work without authorization. This is because any asking price that crosses this threshold makes her benefit from authorization less than $3,000, which should lead her to refuse to pay this amount and, instead, use the work without authorization. In such a world, therefore, Ella confronts an asking price of $5,000.111For simplicity, we likewise assume that both Ella and Francine are risk neutral. We summarize the results of our examples in Table 1, below.

 

Table 1.  The Effect of Fair Use on Users’ Licensing Leverage

World

Ella’s Benefit from Using

Expected Cost of Unauthorized Use

Expected Value of Unauthorized Use

Ella’s Value of Not Using

Ella’s BATNA

Francine’s Asking Price

Without Fair Use

$8,000

$10,000

-$2,000

0

Non-existent

$8,000

With Fair Use

$8,000

$5,000

$3,000

0

Increased

$5,000

 

Assume next that Ella’s desired use is not only highly transformative, but a clear parody, thus representing a 0.8 probability of a fair use finding by a court. In that case, there is only a 0.2 probability that a court will find Ella liable for copyright infringement and award Francine damages. This, in turn, renders the expected value of unauthorized use for Ella even higher: $8,000 – 0.2 × $10,000 = $6,000. In light of this fact, Ella will never accept any asking price that surpasses $2,000. Realizing this, Francine would agree to license the work to Ella for $2,000. The results are summarized in Table 2.

 

Table 2.  The Effect of Increased Fair Use on Users’ Licensing Leverage

World

Ella’s Benefit from Using

Expected Cost of Unauthorized Use

Expected Value of Unauthorized Use

Ella’s Value of Not Using

Ella’s BATNA

Francine’s Asking Price

With Increased Fair Use Probability

$8,000

$2,000

$6,000

0

Further increased

$2,000

 

The logic that underlies this finding is as follows. When facing a copyrighted work, any user entertains a trichotomous choice: (1) they may pay a licensing fee and use the work unhinderedly; (2) they may avoid using it altogether; or (3) they may refrain from licensing, use the work without acquiring authorization, and face the expected costs of a copyright infringement lawsuit. Users’ BATNA essentially depends on the feasibility of the third alternative. Herein lies the significance of fair use. Fair use bestows upon users the power to credibly threat to use copyrighted content without authorization and thereby leads rightsholders to adjust their asking price downwards. A world without fair use, by contrast, would allow any rightsholder to prevail in an infringement suit against any unauthorized user, which obviates the user’s third alternative. In such a world, users are left with options (1) and (2): they can either pay copyright owners the licensing fees they post or refrain from using the work altogether.

The fair use doctrine not only engenders alternative (3) but also makes it viable. As in the example discussed above, knowing that Ella reaps a positive expected value of $3,000 from unauthorized use, Francine realizes that for any asking price that exceeds $5,000 (leaving Ella with a benefit of less than $3,000), Ella has a credible threat of not taking the deal and using the work without permission.

B.  The Model

Our theory can be generalized in a simple formal fashion. Let v denote a given user’s valuation of a given copyrighted work. Let A denote the owner’s asking price. A is the maximum licensing fee that the user finds attractive, i.e., the maximum price under which the user does not have a credible threat to engage in unauthorized use as a substitute for acquiring authorization. Denote by p the probability that a court will find that the user’s unauthorized use is protected by the fair use doctrine, and denote by D the damages the court is expected to award the rightsholder if fair use protection is not granted.

The owner’s asking price is given either by the user’s valuation of the work, v, or, if the user obtains a positive expected value from an unauthorized use (namely, if v – (1 –p)D > 0), by deducting this sum from v:

Note that in a world without fair use, p = 0. This means that if v < D, namely, as long as the court is expected to award damages that exceed the user’s valuation of the copyrighted work, unauthorized use is never a worthwhile alternative to licensing. The user thus possesses no leverage vis-à-vis the owner, and the latter will therefore require payment of v, the user’s valuation of the work, in order to grant authorization.

The fair use doctrine invariably increases the expected value of unauthorized use: raising the value of p from p = 0 to p > 0, which results in a higher p – (1 –p)D. Furthermore, for some threshold values of  and , it increases v – (1 –p)Dto satisfy v – (1 –p)D > 0, and in such case, the existence of the fair use doctrine results in positive expected value from unauthorized use. From the user’s perspective, this means that v > (v – (1 –p)D), and thus A, their negotiated authorization price, decreases. Figure 1 exemplifies the relationship between A, the asking price, and p, the probability of fair use, for given values of v and D that uphold D > v.

Figure 1.  The Effect of Fair Use on Copyright Pricing

This stylized model unfolds the technical bargaining mechanism that underlies our theory. Thus far, the accepted lore perceived fair use as offering users an effective bypass from licensing negotiations—but this statement can be confidently made only when fair use is granted with certainty (p = 1), which is hardly the regular case. The model emphasizes that even under the conventional setting where a fair use ruling is uncertain, the doctrine plays a critical role in the market for copyrighted content—the uncertainty translates into decreased asking price by monopolistic rightsholders, hence advantaging users’ bargaining standpoint.

We now turn to introduce evidence from licensing practices that supports our theory, and then we discuss the normative implications.

C.  Illustrations

Our theoretical exposition of the hidden function of fair use finds support in real world cases. In this Section, we provide various examples that substantiate our theoretical predictions. These cases show that users are aware of the bargaining leverage they can get from the fair use doctrine and take advantage of its more favorable licensing terms.

  1. Oracle and the Future of Licensing in Technologies

As noted, our theory likewise applies to providers of technological applications that generate a benefit to the public. A case in point can be found in Justice Thomas’s dissenting opinion in Google LLC v. Oracle America, Inc..112Google LLC v. Oracle Am., Inc., 593 U.S. 1, 42–60 (2021) (Thomas, J., dissenting). In support of his view that Google’s use of Oracle’s code was not fair, he noted that Google’s use created a reality where “device manufacturers no longer saw much reason to pay to embed the Java platform.”113Id. at 53. Justice Thomas proceeded to emphasize that:

[B]efore Google released Android, Amazon paid for a license to embed the Java platform in Kindle devices. But after Google released Android, Amazon used the cost-free availability of Android to negotiate a 97.5% discount on its license fee with Oracle. Evidence at trial similarly showed that right after Google released Android, Samsung’s contract with Oracle dropped from $40 million to about $1 million.114Id. (emphasis added).

The sharp decline in Oracle’s revenues from licensing its Java code provides a powerful illustration of the impact of fair use on market transactions. As the figures show, the bargaining leverage of Oracle in all of its licensing transactions critically depended on the licensees’ assessment of the strength of Google’s actual fair use claim and their own hypothetical fair use claims. For although Google was at the forefront of this legal battle, many other technology companies were similarly situated to Google insofar as their status as fair users.115See Gideon Parchomovsky & Alex Stein, Intellectual Property Defenses, 113 Colum. L. Rev. 1483, 1486 (2013) (characterizing fair use as a “class defense,” in that “it sets up a categorical bar against certain infringement claims, thereby protecting a specified class of defendants”). As the sentiment that Google would prevail gained purchase among technology companies, the revenues of Oracle sharply decreased, precisely as our theory predicts.

In analyzing the Supreme Court’s decision, commentators have noted that “[i]n the future, this decision may prompt more disrupters to use fair use as a shield in releasing new products or services that build off of older functional technologies, or otherwise influence negotiations as some potential licensees may find the value of certain functional code to be devalued by the Oracle.”116Sandra A. Crawshaw-Sparks, David A. Munkittrick, Jeffrey D. Neuburger & Anisha Shenai-Khatkhate, Landmark Fair Use Victory at the Supreme Court in Software Case, Nat’l L. Rev. (Apr. 9, 2021), https://www.natlawreview.com/article/landmark-fair-use-victory-supreme-court-software-case [https://perma.cc/HV93-6NEY].

  1. Documentary Filmmakers

Copyright scholars tend to refer to the documentary filmmakers’ population as a primary beneficiary of fair use. Documentary filmmakers must incorporate prior works, many of which are subject to copyright protection. Hence, the fair use doctrine is critical to the operation of the industry. It may come as no surprise, therefore, that documentary filmmakers are cognizant of their ability to leverage on fair use in negotiations with copyright owners. A 2020 study by the Center for Media and Social Impact (“CMSI”) concerning the state of the documentary field117See generally Caty Borum Chattoo & William Harder, 2020 Study of Documentary Professionals: Complete Data for Global and U.S. Respondents (2021), https://cmsimpact.org/report/the-state-of-the-documentary-field-2020-study-of-u-s-documentary-professionals [https://perma.cc/7SX9-DG64]. indicates that 76% of all participating U.S. documentary directors and producers have utilized or leveraged the fair use doctrine in the making of their most recent film.118Id. at 135. This corresponds to other surveys, wherein 70% of the filmmakers have rated their understanding of fair use as “good or excellent,”119See Patricia Aufderheide & Aram Sinnreich, Documentarians, Fair Use, and Free Expression: Changes in Copyright Attitudes and Actions with Access to Best Practices, 19 Info. Commc’n. & Soc’y 178, 182 (2016). while 73% of those with more than a decade of experience found fair use a “very useful” doctrine.120Id. at 184. Likewise, an elaborate manual published by the Archive Valley company, which provides archival services for documentarists, introduces the underlying strands of fair use by explaining to authors that “if you meet the fair use guidelines . . . you can use footage for free,” but complements this straightforward statement by informing authors that “[e]ven if you know that you do want to license footage, knowing your rights about fair use can put you in a stronger negotiating position.”121Fair Use Explained: Our Expert Guide for Documentary Filmmakers, Archive Valley, https://web.archive.org/web/20230204193557/https://archivevalley.com/blog/fair-use-explained-our-expert-guide-for-documentary-filmmakers [https://perma.cc/3G8S-YFP7].

Finally, it seems that the leverage fair use bestows upon filmmakers changes the boundaries of the bilateral owner-user bargaining. Crucially, a strong fair use claim appears to pave authors’ way to efficiently negotiate with relevant third parties, too. In this regard, 95% of filmmakers have reported to persuade broadcasters regarding the applicability of fair use to their case when equipped with a lawyer’s letter.122Aufderheide & Sinnreich, supra note 119, at 182. 99% responded identically when asked about negotiations with insurers.123Id. This means that fair use not only leverages users when bargaining with rightsholders, but, as importantly, alleviates the entire chain of negotiations necessary for pursuing one’s artistic vision.

  1. Parodies and Satires

The story of the musician “Weird Al” Yankovic, who is known for his humoristic commercial adaptations of popular music, provides yet another real-world example of the effect of ambiguity on broadening the population of users that can enjoy increased licensing leverage in light of fair use. Whether Yankovic’s spoof songs are in fact parodies124See, e.g., Carroll, supra note 32, at 1108 (describing Yankovic’s practice as “record[ing] parodies of popular songs along with some original compositions”); Rebecca Tushnet, Payment in Credit: Copyright Law and Subcultural Creativity, 70 L. & Contemp. Probs. 135, 161 (2007) (describing Yankovic’s “This Song Is Just Six Words Long” as a parody for mocking the original “I Got My Mind Set on You”). or satires125See, e.g., Charles J. Sanders & Steven R. Gordon, Stranger in Parodies: Weird Al and the Law of Musical Satire, 1 Fordham Ent. Media & Intell. Prop. L.F. 11, 35 (1990) (“Mr. Yankovic’s ability to rely on the fair use doctrine to excuse the unlicensed uses of the songs and music videos he parodies is extremely doubtful.”). is a controversy that has never been, and probably never will be, settled, as Yankovic always acquires authorization from the owners of the rights to the original songs126Frequently Asked Questions, “Weird Al” Yankovic, https://www.weirdal.com/archives/faq [https://perma.cc/6KU7-CUWA] (“Al does get permission from the original writers of the songs that he parodies. While the law supports his ability to parody without permission, he feels it’s important to maintain the relationships that he’s built with artists and writers over the years. Plus, Al wants to make sure that he gets his songwriter credit (as writer of new lyrics) as well as his rightful share of the royalties.”).—be it because of industry norms127See Mark A. Lemley, Should a Licensing Market Require Licensing?, 70 L. & Contemp. Probs. 185, 191 n.35 (2007) (noting that Yankovic may acquire licensing “for reasons related to social norms in Hollywood rather than legal compulsion.”). or in order to be on the “safe side” of copyright law. Interestingly, however, Yankovic’s practice has been described as “[l]icensing [w]ith [l]everage.”128Sanders & Gordon, supra note 125, at 34.

Yankovic, whose parodic use adjoins satire, bargains for authorization under a fairly reasonable possibility of fair use protection. And Yankovic is not alone. Other artists who produce adaptations of copyrighted works have the same leverage that he does: they possess a colorable fair use claim.

It should be underscored that this broadening effect is not limited to musical adaptations. Rather, it applies to copyrighted subject matter categories, from videoclips to literary works. As importantly, the effect is not confined to adaptations that straddle the line separating parodies and satires. In the case of transformative uses, the effect is much broader. Consider, for example, the case of Gregg Gillis, better known as the popular D.J. Girl Talk, whose foremost artistic contribution has been described as “mak[ing] danceable musical collages out of short clips from other people’s songs.”129Robert Levine, Steal This Hook? D.J. Skirts Copyright Law, N.Y. Times (Aug. 6, 2008), https://www.nytimes.com/2008/08/07/arts/music/07girl.html [https://web.archive.org/web/20250000000000*/https://www.nytimes.com/2008/08/07/arts/music/07girl.html]. Gillis insists that his sampling work is protected by the fair use doctrine, and therefore, as opposed to Yankovic, he consistently refuses to solicit authorization from rightsholders to the original works.130Id. Markedly, while many have accused Gillis of infringing upon their exclusive rights, a lawsuit has yet to be filed.131Id. In short, thus, it appears that both Gillis and his accusers believe that the musician enjoys a solid case, garnering a sufficiently high fair use probability that in turn nullifies the credibility of threats to sue. This translates into a reservation price of zero.

  1. Warhol and the Future of Transformativeness

Another exemplification of the utilization of the transformativeness threshold into licensing leverage can be driven from Cariou v. Prince, in which the Second Circuit defined transformativeness as any alteration of the original’s “expression, meaning, or message,” finding that even appropriation art can be considered fair use.132Cariou v. Prince, 714 F.3d 694, 706 (2d. Cir. 2013) (citing Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994)). Under this expansive definition of fair use, any user who adapts a work can raise a fair use defense. Obviously, not every adaptation would be ruled fair. Similarly, not every appropriation artist will meet the same faith as Richard Prince. But every transformative user has bargaining leverage thanks to this broad definition.

 As noted, however, the Supreme Court’s recent decision in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith diverges from preceding rulings on transformativeness that advantaged users, and it seems to reallocate bargaining power between users and rightsholders.133Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 598 U.S. 508, 540–41 (2023). Owing to Warhol, we might confront a shift toward a new era that introduces a new equilibrium in the market for copyrighted content.

Notwithstanding their absence from both popular discourse and academic scholarship on fair use, the Justices—both members of the majority and dissenters—were far from oblivious to this outcome. First, this understanding manifests in Justice Sotomayor’s articulation of the majority opinion. Justice Sotomayor first warns us that the broad interpretation of transformativeness would favor users with utterly disproportionate leverage over the original rightsholder. Upon recognizing that transformativeness “is a matter of degree,”134Id. at 510. Justice Sotomayor maintains that:

[Holding for the Plaintiff] would potentially authorize a range of commercial copying of photographs, to be used for purposes that are substantially the same as those of the originals. As long as the user somehow portrays the subject of the photograph differently, he could make modest alterations to the original . . . and claim transformative use.135Id. at 546.

Justice Sotomayor’s words implicitly capture our theory, acknowledging the simple fact that the degree of transformativeness that suffices for the Court to bestow a fair use defense would shape market interactions between owners and users. Determining that changes reminiscent to those made by Andy Warhol are not significant enough to meet this threshold, particularly when the use is of commercial nature, Justice Sotomayor precludes users from leveraging a fair use claim and consequently—when viewed via an economic lens—submitting that their intended use does not deserve a reduced licensing fee.

More explicit are the statements made in Justice Kagan’s dissenting opinion. Justice Kagan distinctly highlights the pivotal role of the Supreme Court in allocating bargaining surplus between owners and users, noting that by refusing to side with Warhol’s deeds, the Court would frustrate users’ ability to license under favorable terms:

Still more troubling are the consequences of today’s ruling for other artists. If Warhol does not get credit for transformative copying, who will? And when artists less famous than Warhol cannot benefit from fair use, it will matter even more. . . . [A]s our precedents show, licensors sometimes place stringent limits on follow-on uses, especially to prevent kinds of expression they disapprove. And licensors may charge fees that prevent many or most artists from gaining access to original works.136Id. at 593 (Kagan, J., dissenting).

The transactional role of the fair use doctrine and its effect on licensing negotiations has been properly identified and adequately considered. Despite that, the Court has upset the longstanding understanding of market actors, potentially requiring the market to form a new equilibrium that is less favorable to users. This leads us to conclude that the reallocation of bargaining power that we expect to witness in the near future—together with the inevitable increase of copyright pricing—is the Court’s fully conscious decision, rather than an unforeseen economic side effect.

III.  Normative Implications

In this Part, we explain how the licensing leverage created by fair use ameliorates the efficiency losses and inequities associated with copyright protection. In particular, we demonstrate the doctrine’s ability to increase the number of voluntary transactions between copyright owners and users and to redistribute wealth from rightsholders to users.

A.  Countervailing Allocative Inefficiencies

Being quintessential public goods, intellectual works cannot be supplied efficiently by the free market.137See, e.g., Bell & Parchomovsky, supra note 3, at 1057 (“[E]xpressive works are nonrivalrous in their consumption. . . . [T]he use of an expressive work by any particular consumer does not diminish in any way the ability of another user to consume it.”); Mark A. Lemley, Ex Ante Versus Ex Post Justifications for Intellectual Property, 71 U. Chi. L. Rev. 129, 129 (2004) (“Ideas are public goods: they can be copied freely and used by anyone who is aware of them without depriving others of their use.”). But see Christopher S. Yoo, Copyright and Public Good Economics: A Misunderstood Relation, 155 U. Penn. L. Rev. 635, 671–75 (2007) (disputing the customary perception of copyrighted contents as pure public goods). In the absence of a legal prohibition on copying, users would be able to copy expressive works with impunity. In such a world, the market price of copyrighted works would rapidly drop to zero, and so would the incentives to create and supply intellectual goods. Unable to recoup their initial investment in the creation of original content, authors may well decide to put their creative skills to rest. The need to maintain authors’ incentives to create warrants legal intervention that would grant them exclusive control over the distribution of their works.138See, e.g., Abraham Bell & Gideon Parchomovsky, Reinventing Copyright and Patent, 113 Mich. L. Rev. 231, 240–41 (2014) (“Copyright protection confers upon authors a bundle of exclusive rights in order to motivate them to produce original expressive content.”); Sara K. Stadler, Incentive and Expectation in Copyright, 58 Hastings L.J. 433, 433 (2007) (“Nothing is more fundamental to copyright law than the concept of incentives.”). But see Diane Leenheer Zimmerman, Copyrights as Incentives: Did We Just Imagine That?, 12 Theoretical Inquiries L. 29, 29 (2011) (suggesting that creation is driven by intrinsic and expressive motives, rather than by monetary rewards).

 Yet, the legal exclusivity copyright law bestows upon authors creates several costs. Chief among them is monopolistic pricing.139See Bell & Parchomovsky, supra note 138, at 239 (“Inventors and authors sell rights to their inventions and works at prices reflecting a monopolistic rather than a competitive market.”); Adi Libson & Gideon Parchomovsky, Toward the Personalization of Copyright Law, 86 U. Chi. L. Rev. 527, 528 (2019) (“The grant of legal exclusivity to authors introduces the problem of supracompetitive (or monopolistic) pricing.”). Two major effects are customarily attributed to monopolistic pricing: allocative inefficiency and distributional inequity.

The allocative inefficiency arising from exclusivity is well established.140See, e.g., Michael Abramowicz, A Theory of Copyright’s Derivative Right and Related Doctrines, 90 Minn. L. Rev. 317, 325–32 (2005); Shyamkrishna Balganesh, Foreseeability and Copyright Incentives, 122 Harv. L. Rev. 1569, 1578 (2009); Bell & Parchomovsly, supra note 138, at 239–43; Yochai Benkler, The Wealth of Networks: How Social Production Transforms Markets and Freedom 35–37 (2006); Niva Elkin-Koren, Copyright Policy and the Limits of Freedom of Contract, 12 Berkeley Tech. L.J. 93, 99–100 (1997); Fisher, supra note 97, at 1702; Libson & Parchomovsy, supra note 139, at 542–43; Gideon Parchomovsky & Alex Stein, Originality, 95 Va. L. Rev. 1505, 1518–19 (2009); Giovanni B. Ramello, Copyright and Antitrust Issues, in The Economics of Copyright 118, 124 (Wendy J. Gordon & Richard Watt eds., 2003); Christopher Sprigman, Reform(aliz)ing Copyright, 57 Stan. L. Rev. 485, 524 (2004). Others, however, have perceived copyright law’s grant of exclusivity as establishing monopolistic competition—a market wherein each manufacturer supplies a unique product, yet all products are close substitutes. See Michael Abramowicz, An Industrial Organization Approach to Copyright Law, 46 Wm. & Mary L. Rev. 33, 35–39 (2004); Christopher S. Yoo, Copyright and Product Differentiation, 79 N.Y.U. L. Rev. 212, 241 (2004). Even in such cases, the exclusivity conferred upon authors by copyright law erodes the efficient allocation of resources. See Bell & Parchomovsky, supra note 138, at 241. Monopolistic pricing invariably creates a deadweight loss.141Bell & Parchomovsky, supra note 138, at 240. This loss emanates from the fact that some consumers who were willing to pay the competitive price for the good or service would not be able to pay the higher, monopolistic price, and would simply forgo the good or service. As a result, certain welfare-enhancing transactions that would have occurred in a competitive market would not take place under monopolistic pricing.142Id.; see also Libson & Parchomovsky, supra note 139, at 542 (“Copyright protection . . . invariably gives rise to a deadweight loss, represented by the loss of those users who would have purchased the content at the competitive price but not at the supracompetitive price.”). To illustrate, suppose that a good is offered by a monopolistic manufacturer for $20. Assume, however, that had the production process been perfectly competitive, the same good would have been offered for a price of $12. In this example, the deadweight loss is represented by the foregone transactions of the buyers who value the good at more than $12 but less than $20. As economist William McEachern points out, this phenomenon “is called the deadweight loss of monopoly because it is a loss to consumers but a gain to nobody.”143William A. McEachern, Economics: A Contemporary Introduction 209 (11th ed. 2017) (emphasis omitted).

Perhaps even more worrisome than its adverse effect on allocative efficiency is the distributional inequities imposed by monopolistic pricing. Since the monopolistic price is higher than the competitive price, it works to transfer wealth from consumers to the monopolist. Monopolistic pricing, in other words, allows monopolists to capture consumer surplus.144Id. (“[T]he monopolist’s economic profit comes entirely from what was consumer surplus under perfect competition.”); Bell & Parchomovsky, supra note 138, at 240 (“[T]he monopolist becomes richer than she would be in a competitive market and the [consumer] becomes poorer.”). To see this, let’s return to the above example, and consider a consumer who values the good at $22. Recall that the monopolist sets the price at $20, whereas in a competitive market, the price of the good would be $12. Under perfect competition the consumer would have paid $12 for the good, thus deriving a surplus of $10 ($22 – $12) from the transaction. Under monopolistic pricing the surplus of the consumer shrinks to $2 ($22 – $20), with the $8 lost to the consumer being transferred to the monopolist—all relative to a competitive market.

To understand how fair use remedies the allocative inefficiencies resulting from the exclusivity granted by copyright protection, consider a copyright owner who offers their work for a fixed license fee, which represents the profit-maximizing amount for them. As opposed to the general analysis unfolded in Part II, we now assume that, for whatever reason, price differentiation is impracticable from the rightsholder’s perspective.145If price differentiation were possible, the rightsholders would have been considered a discriminating monopolist, who accords each user an asking price equal to the maximum amount they are willing to pay for authorization. Under such price differentiation, each user manages to acquire authorization, hence no allocative inefficiencies are imposed on account of copyright monopoly. Nevertheless, price differentiation imposes severe distributional inequities, as the copyright owner captures the user’s entire bargaining surplus. See, e.g., Yoo, supra note 140, at 230 (“Perfect price discrimination (i.e., if authors were able to charge each consumer the maximum amount she would be willing to pay) would eliminate deadweight loss . . . . The problem is that perfect price discrimination is never possible . . . .”). Our theory submits that under such circumstances, the mere existence of fair use for certain users creates a positive externality for other users who have no fair use claim.146For the analysis of externalities by copyrighted content, see generally Brett M. Frischmann & Mark A. Lemley, Spillovers, 107 Colum. L. Rev. 257 (2007). In this respect, the number of voluntary transactions may increase, decline, or remain unchanged, but what bears emphasis is that fair use avails the entire universe of users, including those users who would never persuade the court that their use is considered fair.

To see this counterintuitive outcome, suppose that the relevant users are five parodists and two satirists. For this example, assume that the parodists’ valuation of using the work is $10,000, while the satirists’ valuation is, say, $6,000.147We consider it reasonable to posit that, typically, the valuation satirists ascribe to a given work is lower than the one that parodists do. This hinges on the distinction set forth in Campbell. Since parodic use targets the particular work in question, parodists have no feasible alternative to using the work for actualizing their artistic vision. Satirists, on the other hand, use the work as a means to the end of tackling a certain social phenomenon, and may therefore convey their message by using other works as well. The existence of feasible alternatives to using the particular work or lack thereof, affects the valuation of a given user. For simplicity’s sake, assume that the damages in case of infringement are likewise $10,000. It is easy to see that if the monopolist has to determine a fixed, undifferentiated asking price, this price will be either $10,000 (thus authorizing only parodists) or $6,000 (thus authorizing all users, satirists included). The profit-maximizing price in that case is $10,000, since 5 × $10,000 > 7 × $6,000. Therefore, only parodists manage to obtain authorization from the owner, while satirists are precluded from using the work in light of their unwillingness to pay $10,000, neither as licensing fees nor as damage awards.

Things change dramatically, however, in a world with fair use. To begin, suppose any parodist holds 0.5 probability of obtaining a fair use ruling in their favor, whereas satirists have no chance of convincing the court that they are entitled to a fair use ruling. But note, while satirists will rarely enjoy a fair use ruling in their favor, they in fact manage to obtain user authorization in a world in which the fair use doctrine exists. In this world, the owner can never sell at $10,000: if they were to stick to this asking price, all parodists are incentivized to use the work without permission, as the expected value of using without authorization is $5,000 (0.5 probability multiplied by $10,000 in damages). Therefore, the two relevant pricing schemes are either $6,000 (authorizing only satirists) or $5,000 (authorizing all users). The

rightsholder is expected to set an asking price of $5,000 since 7 × $5,000 > 2 × $6,000.148A caveat is in order here. It should be noted that the rightsholder may nonetheless prefer to set the asking price at $6,000, and, in parallel, pursue a copyright infringement lawsuit against the five parodists. This allows them to secure $25,000 (five lawsuits, each representing $5,000 in expected damages) and an additional $12,000 in revenue from licensing satirists. Yet, in such case, litigation essentially serves as a means of monopolistic price discrimination. Since this Section studies the effect of fair use on copyright pricing in a market without the rightsholder’s ability to engage in price discrimination, we assume that the asking price is $5,000. Either way, what this example aims to demonstrate is that satirists enjoy an increased licensing leverage on account of fair use, despite having no chance of enjoying this defense in court.

If, on the other hand, any parodist holds 0.9 probability of obtaining fair use, this increased probability simply results in the rightsholder focusing exclusively on negotiations with satirists, setting an asking price of $6,000 as 7 × $1,000 < 2 × $6,000.

Interestingly enough, this example illustrates not our primary argument that fair use bolsters users’ bargaining power, but rather, that if rightsholders are subject to a fixed licensing fee, the doctrine may avail even users with zero probability of obtaining fair use protection. The hitherto undiscussed impact of fair use on copyright pricing allows them to enjoy copyrighted content they would not have in a world without fair use.

It should be noted that while parodists in the latter example will not be willing to pay the fixed price required by the rightsholder for authorization, they will manage to reach a favorable settlement if the copyright owner decides to sue them for infringement. Due to their enhanced probability of enjoying a fair use ruling, a settlement agreement is expected to feature extremely low payment on their behalf.149See, e.g., Angel Siegfried Diaz, Fair Use & Mass Digitization: The Future of Copy-Dependent Technologies After Authors Guild v. HathiTrust, 28 Berkeley Tech. L.J. 683, 685 (2013) (discussing the impact of the fair use ruling in Authors Guild v. HathiTrust on other actors’ willingness to settle with Google).

B.  Redistributing Bargaining Surplus

In addition to improving allocative efficiency by increasing the number of users who enjoy owner authorization, fair use also has the effect of ameliorating the distributive distortions arising from copyright protection. As already noted, without fair use, rightsholders are positioned to capture the lion’s share of the users’ bargaining surplus by setting up prices that approximate users’ maximal valuations. In our previous example, even the five parodists who are willing to pay $10,000 for the right to use a work would have to fork over to the copyright owner—who sets an asking price of $10,000—all of their bargaining surplus.

This unfortunate outcome exemplifies monopolistic holdout. More specifically, monopolistic rightsholders manage to extract increased payments particularly from those users who consider the work extremely valuable. Pertinent examples include young technological entrepreneurs who are in need of particular copyrighted software in order to advance their startup initiative, or documentary filmmakers at the dawn of their career who are required to negotiate with a myriad of rightsholders in order to actualize their cinematic vision.

These users, and others, confront a significant barrier erected by copyright owners, who strategically hold out to extract exorbitant licensing fees. On our theory, the fair use doctrine counterbalances such strategic behavior. In addition to improving licensing terms for all users who possess a fair use claim (and, as exemplified earlier, even for those who do not), the doctrine helps reduce monopolistic holdouts in negotiations. This insight is not merely theoretical. It can be seen at work in the aftermath of the Supreme Court’s recent decision in Google LLC v. Oracle America, Inc..150Google LLC v. Oracle Am., Inc., 593 U.S. 1 (2021). The ruling has won commentators’ accolades for lowering entry barriers for smaller startup initiatives: consistent with our analysis, the ruling eroded the strategic incentive of powerful software owners to prevent smaller competitors, seeking interoperability with industry standards, from entering the market.151See, e.g., Daniel Howley, Google’s Supreme Court Victory over Oracle Hailed as ‘Fantastic’ for Small Companies, Yahoo Finance (Apr. 5, 2021), https://finance.yahoo.com/news/google-victory-over-oracle-fantastic-for-small-companies-190748155.html [https://perma.cc/VTP8-G7SE]; Shira Ovide, Google Won. So Did Tech., N.Y. Times (Apr. 6, 2021), https://www.nytimes.com/2021/04/06/technology/google-oracle-supreme-court.html [https://perma.cc/Q9TB-KKTV]. Smaller developers can currently draw on the Google decision to acquire what is needed from a preexisting application programing interface, to provide consumers an innovative, transformative technological program.152Google, 593 U.S. at 34–35.

The Warhol decision withheld the user-advantaging trend that bestows fair use protection even on mildly transformative users. Ample criticism has been directed against the Court since the decision was handed, primarily spotlighting the confinement of artistic freedom inevitably imposed by their ruling.153See, e.g., Amy Adler, The Supreme Court’s Warhol Decision Just Changed the Future of Art, Art in Am. (May 26, 2023), https://www.artnews.com/art-in-america/columns/supreme-court-andy-warhol-decision-appropriation-artists-impact-1234669718 [https://perma.cc/BW93-XXSW] (“[T]he Court’s Warhol decision will significantly limit the amount of borrowing from and building on previous works that artists can engage in.”); Blake Gopnik, Ruling Against Warhol Shouldn’t Hurt Artists. But It Might., N.Y. Times (May 19, 2023) https://www.nytimes.com/2023/05/19/arts/design/warhol-prince-supreme-court-copyright.html [https://perma.cc/2SHM-EUQ9] (“All of a sudden Goldsmith would have close to a veto over someone else’s artistic expression, or at the very least its media reproduction.”). But one crucial aspect keeps eluding the commentators. As our analysis shows, the Court’s decision not only restricts artistic expression, but also diminishes the bargaining power of users in negotiations with rightsholders and thereby increases the price of copyrighted content. A narrow view of fair use makes one miss this aspect.

C.  The Role of Damage Awards

To equip users with the full force of fair use, it is imperative to ensure that other copyright law doctrines may chill the effect this Article identifies. In particular, exaggerated damage awards may undesirably offset the economic virtues of the fair use doctrine. This is an especially grave concern in the copyright domain, as copyright owners typically sue for statutory damages. As Ben Depoorter noted, “[o]nce infringement has been established, a plaintiff may elect a statutory damage award. In doing so, 17 U.S.C. § 504(c) of the 1976 Copyright Act relieves the copyright holder from the burden of providing any evidence whatsoever of actual harm. Among developed Western democracies, the U.S. copyright statutory framework is exceptional.”154Ben Depoorter, Copyright Enforcement in the Digital Age: When the Remedy Is the Wrong, 66 UCLA L. Rev. 400, 409 (2019). Indeed, under the current regime, statutory damages for watching an illegal livestream may amount to $150,000.15517 U.S.C. § 504(c)(2) (“In a case where the copyright owner sustains the burden of proving, and the court finds, that infringement was committed willfully, the court in its discretion may increase the award of statutory damages to a sum of not more than $150,000.”). Oren Bracha and Talha Syed have similarly pointed out that “[t]he most troubling [aspects of statutory damages] are those cases in which massive supracompensatory damages are inflicted on ordinary individuals who are unable to spread the impact of such awards through limited liability or dispersed ownership.”156Oren Bracha & Talha Syed, The Wrongs of Copyright’s Statutory Damages, 98 Tex. L. Rev. 1219, 1220 (2020); see also Pamela Samuelson & Tara Wheatland, Statutory Damages in Copyright Law: A Remedy in Need of Reform, 51 Wm. & Mary L. Rev. 439, 443 (2009) (“In the modern world in which the average person in her day-to-day life interacts with many copyrighted works in a way that may implicate copyright law, the dangers posed by the lack of meaningful constraints on statutory damage awards are acute. Even a defendant who presents a plausible fair use defense at trial may find itself subject to large statutory damage awards.”). As an alternative to statutory damages, rightsholders may choose the path of receiving actual damages based on their lost profits, potentially coupling them with disgorgement of infringers’ profits and thus securing supra-compensatory payment. See generally Roy Baharad, The Uneasy Case for Copyright Disgorgement, 77 Fla. L. Rev. (forthcoming 2025) (criticizing the use of disgorgement as a remedy for copyright infringement), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5088325.

Apart from the usual pitfalls scholars associate with excessive copyright damages—namely, overdeterrence and suboptimal use of copyrighted works—we wish to emphasize its adverse impact on the licensing leverage that fair use provides to users. To see this, return to the main example on which we draw to convey our conception of fair use. Assume that rather than $10,000, Francine is expected to enjoy $50,000 in damages if she prevails in court. In this scenario, as in the case in a world without fair use, Ella is devoid of any feasible alternative to negotiations: the value of unauthorized use to her is 0.5 × (-$50,000) + $8,000 = -$17,000, which means that even in a world with fair use, she has no credible threat of using Francine’s work without authorization. Under these circumstances, the fair use doctrine does not bestow upon Ella a credible threat (and licensing leverage thereof) as long as her probability of prevailing in court falls short of 0.84.

By the same token, courts’ commitment to relatively modest awards is expected to significantly enhance the impact of fair use on users’ bargaining standpoint. Modest awards imply that even a user with a low probability of persuading the court of their entitlement to fair use will enjoy licensing leverage in negotiations with copyright owners. Taking this idea to the extreme, suppose that Francine is expected to be awarded $5,000 if she prevails in court. Recall that Ella values the use of Francine’s work at $8,000. In this case, Francine’s a-priori asking price is reduced irrespective of fair use: even without the doctrine, Ella will not be willing to pay any licensing fee that surpasses $5,000, since this would make unauthorized use more beneficial. Under the fair use doctrine, this price will drop even further.

Excessive damage awards imply that even users with a strong fair use claim might rationally refrain from an unauthorized use to avoid the insurmountable expected loss in future copyright litigation. We, therefore, call upon judges and legislators to determine damages in copyright cases when accounting for the possible erosion of users’ negotiation standpoint. In other words, we submit that by exhibiting restraint in the determination of damages, decisionmakers can bolster the hidden function of fair use; yet, by superfluously awarding damages to rightsholders, they might nullify this function in its entirety.

D.  The Latent Virtue of Ambiguity

Our theory of fair use also puts ambiguity in a different light. A recurring criticism of the fair use jurisprudence concerns its uncertainty. The ambiguity of the fair use doctrine has been accused of overdeterring individuals from using copyrighted content. As James Gibson argued, even users with a strong fair use claim may rationally elect to license copyrighted content or refrain from using it altogether in order to avoid the inherent uncertainty that attends the fair use doctrine.157See generally James Gibson, Risk Aversion and Rights Accretion in Intellectual Property Law, 116 Yale L.J. 882 (2007). Losing on a fair use claim comes at a high price: a court may order the unlucky defendant to pay high statutory damages. Anticipating this, users may rationally choose not to assert their fair use claim in court, and instead, buy a license from the copyright owner. Gibson termed this dynamic “rights accretion.”158Id. at 886. Furthermore, he described it as an ongoing process by which copyright holders broaden the scope of their protection.159Id. at 884 (“[T]he practice of licensing within gray areas eventually makes those areas less gray, as the licensing itself becomes the proof that the entitlement covers the use. Over time, public privilege recedes, and the reach of copyright expands . . . .”).

Our theory points to a potentially countervailing effect. The uncertainty that characterizes the fair use doctrine may actually help users in negotiations with copyright owners. This is because the inherent ambiguity embedded in the fair use doctrine enhances the licensing leverage of users, relative to a bright-line-rule fair use doctrine. To demonstrate the argument, we first provide a brief description of the ambiguity inherent in extant fair use jurisprudence, and then we point out its advantages compared to a world in which the fair use ambiguity does not exist.

In its current form, the fair use doctrine is an open-ended standard, rather than a rule.160See generally Louis Kaplow, Rules Versus Standards: An Economic Analysis, 42 Duke L.J. 557 (1992); Duncan Kennedy, Form and Substance in Private Law Adjudication, 89 Harv. L. Rev. 1685 (1976); Pierre Schlag, Rules and Standards, 33 UCLA L. Rev. 379 (1985). But see Hughes, supra note 9 (demonstrating that fair use jurisprudence sets up certain rule-like legal norms that facilitate stability and predictability). As the time-honored distinction suggests, rules are well-defined legal commands that offer a precise definition of a proscribed action or conduct. Conversely, standards are legal provisions that employ a more general, obscure description, thus subjecting the lawfulness of a particular behavior to judicial discretion ex post. While standards allow the legal system to function with greater flexibility, rules provide actors with a greater degree of clarity and certainty. As has been noted before:

[T]he ex post guidance provided by courts is often confined to the specifics of the case at hand and does little to clarify the realm of legitimate behavior for other actors. The unpredictability associated with standards affects not only wrongdoers, but also law-abiding citizens who wish to act in accordance with the law but cannot readily discern what acts are permissible.161Gideon Parchomovsky & Alex Stein, Catalogs, 115 Colum. L. Rev. 165, 167 (2015).

As noted above, fair use is a prototypical standard.162See, e.g., Dan L. Burk, Algorithmic Fair Use, 86 U. Chi. L. Rev. 283, 287 (2019) (“Copyright’s multifactor fair use balancing test . . . presents a classic example of what has been dubbed a legal standard.”); Niva Elkin-Koren & Orit Fischman-Afori, Rulifying Fair Use, 59 Ariz, L. Rev. 161, 165–66 (2017) (“Congress designed the fair-use standard to ensure that courts could adjust the law to accommodate future developments that may be unpredictable to the legislature.”); Parchomovsky & Goldman, supra note 32, at 1486 (referring to fair use as a standard). Fair use jurisprudence is ridden with terms that may purport to be synonymous to fair use, but in fact provide little or no ex ante clarity with respect to their applicability to a given case. Parodic use, for example, was tautologically defined by the Supreme Court as anything that may be reasonably perceived as a parody.163Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 582 (1994) (“The threshold question when fair use is raised in defense of parody is whether a parodic character may reasonably be perceived.”). The concept of transformative use has likewise eluded any consistent definition,164See, e.g., Gideon Parchomovsky & Philip J. Weiser, Beyond Fair Use, 96 Cornell L. Rev. 91, 100 (2010) (noting that despite the attempt to confine the open-ended definition of fair use and structure it on grounds of transformativeness, the doctrine has remained ambiguous and unpredictable). and the “public benefit” test, to which courts increasingly reference, is inherently uninformative.165See Google LLC v. Oracle Am., Inc, 593 U.S. 1, 35–36 (2021). All of this implies that even when the user possesses a strong claim, fair use protection is hardly guaranteed. Nor can it be completely ruled out even in the presence of users with relatively weak claims. In its current conception as a quintessential standard, therefore, the user and the owner confront a given probability that fair use will be recognized. But as noted earlier, this probability—created by the malleable, open-ended environment in which fair use determinations are being made—may render a user’s threat of resorting to unauthorized use credible, which in turn creates a favorable bargaining framework that allows them to secure authorization with reduced licensing fees.

To see this, compare the current fair use regime with an alternative hypothetical regime in which fair use is governed by rules, namely, all permitted uses are well-defined on an ex ante basis. This alternative design leaves no room for uncertainty as to the defense’s applicability: the probability that fair use will be recognized in a given case is either zero or one. While allowing clarity and complete reliance, we wish to stress the adverse effect that such dichotomy carries on parties’ bargaining. Begin with cases wherein fair use will be conferred upon users with complete certainty. It is evident that whenever a fair use ruling is guaranteed, users are unwilling to pay for licensing, and negotiations will never take place. On the other hand, if there is no chance for a user to enjoy a fair use judgment, they are essentially confronting a world without fair use, hence the doctrine fails to bestow licensing leverage upon them.

This comparison of a standard-based versus rule-based fair use illuminates the surprising virtue of the current design of the fair use doctrine. To be sure, each user individually, if asked, would say they prefer to obtain fair use with certainty, but the actual comparison that needs to be considered here is whether, behind a veil of ignorance, the right to use copyrighted content without permission should be allocated with certainty to a distinct, small class of users, or with uncertainty to a class of a broader scope. Users may reasonably subscribe to the latter. As noted earlier, a well-defined fair use doctrine not only allows fewer users to invoke the right in court, but more importantly, it also deprives all the rest from the licensing leverage they would have enjoyed under uncertain fair use, thereby subjecting them to the choice of paying the monopolistic asking price or avoid using.

Indeed, the current design of fair use facilitates a bargaining framework in which users enjoy discounts in asking prices on account of the possibility of a future fair use judgment in their favor. Conversely, a clearly and fully specified fair use doctrine will have no effect on owner-user bargaining: it advances fair use as a mere substitute to negotiations, rather than a complement. If parties foresee a fair use ruling with probability 1, bargaining will not take place; if a fair use judgment is not feasible, then parties essentially reside in a world without fair use, and the doctrine does not therefore impact their negotiated licensing terms. Either way, predicating the fair use doctrine as a system of well-defined bright line rules precludes its function in assisting users.

This insight corresponds to a handful of scholarly works that have stressed the merit of standards, compared to rules, at facilitating trade. The 1995 works of Jason Scott Johnston,166See generally Jason Scott Johnston, Bargaining Under Rules Versus Standards, 11 J.L. Econ. & Org. 256 (1995). and Ian Ayres and Eric Talley,167See generally Ian Ayres & Eric Talley, Solomonic Bargaining: Dividing a Legal Entitlement to Facilitate Coasean Trade, 104 Yale L.J. 1027 (1995). have independently demonstrated that when it comes to bargaining over an entitlement, uncertainty is bliss. Both articles showed that standards have the effect of splitting entitlements between parties, which thereby enhance bargaining and negotiations. When entitlements are split, each party can buy or sell their share of the entitlement to the other.168Id. at 1034 (“Legal uncertainty or ambiguity about who owns property can constitute a probabilistic division in that more than one person has a contingent claim to the enjoyment of the underlying right or privilege.”). For further economic analysis of split entitlements in an asset, see generally Peter Cramton, Robert Gibbons & Paul Klemperer, Dissolving a Partnership Efficiently, 55 Econometrica 615 (1987). The same is true of fair use. Fair use has the effect of splitting rights in expressive content between rightsholders and potential fair users.169See, e.g., Bell & Parchomovsky, supra note 2, at 51–52; cf. Dan L. Burk, Muddy Rules for Cyberspace, 21 Cardozo L. Rev. 121, 140 (1999) (“[F]air use allows courts to reallocate what the market cannot.”). Accordingly, in negotiations between them, the copyright owner sells to the potential fair user the right to use the work while the potential fair user sells away their privilege to assert fair use.

Interestingly, fair use’s ambiguity not only aids users with a strong fair use claim, but it also broadens the scope of user population that enjoys licensing leverage. To see this, consider the widely accepted distinction between parodies and satires, which prevails since Campbell.170Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994). Traditionally, it has been argued that this distinction favors parodists by exempting them from any authorization requirements, while disadvantaging satirists who enjoy no similar privilege.171See generally Roger L. Zissu, Expanding Fair Use: The Trouble with Parody, the Case for Satire, 64 J. Copyright Soc’y U.S.A. 165 (2017). But this argument, too, overlooks the hidden benefit that users at large—parodists and satirists alike—can reap from fair use. To see this, it is necessary to take a step back and picture a world without fair use protection granted to parodies. In such a world, the author of the original work holds the upper hand by exercising complete control over the licensing process and can exclusively decide which subsequent works to authorize. The vestment of fair use privileges on parodies spills over to hybrid works that combine critical commentary on the original work as well as more general statements that amount to satire.172See Dr. Seuss Enters., L.P. v. Penguin Books USA, Inc., 109 F.3d. 1394, 1400 (9th Cir. 1997). This, in turn, means that satirists, too, reap some benefit from fair use. The effect of fair use on satirists is never zero. Because there is no clear distinction between parodies and satires, the fair use doctrine—on account of this very ambiguity—bestows bargaining leverage not only on parodists, but also on satirists.

Conclusion

In this Article, we uncovered a crucial, yet overlooked, function of the fair use doctrine: the empowerment of users in negotiations with copyright owners. The fair use doctrine endows users with a credible threat to leave the negotiation table and use the work without permission. This credible threat allows users to force copyright owners to lower their licensing fees, thus enhancing the total number of uses and increasing the share of the bargaining surplus kept by users. Our theory maintains that the principal effect of fair use is to facilitate market transactions involving copyrighted content, and not to bypass them as other theorists have suggested. Our analysis thus shows that the impact of fair use in the copyright domain is far greater than previously thought. Importantly, our theory of fair use is fully consistent with preexisting scholarly contributions; it complements them, not competes them. The addition of our theory to the existing literature on fair use demonstrates the full prowess of fair use in protecting users interests and needs in the copyright world.

98 S. Cal. L. Rev. 761

Download

* Doctoral Candidate, University of Chicago Law School.

Robert G. Fuller, Jr. Professor of Law, University of Pennsylvania Law School; Edward Silver Professor, Faculty of Law, The Hebrew University of Jerusalem. We thank Shiri Alon, Clark Asay, Ian Ayres, Shyamkrishna Balganesh, Oren Bar-Gill, Stefan Bechtold, Abraham Bell, Bari Britvan, Mala Chatterjee, Melissa Eckhause, Shira Ephron, Kristelia Garcia, Yehonatan Givati, Ehud Guttel, Thomas Haley, Lital Helman, Laura Heymann, Justin Hughes, Adi Libson, Peter Menell, David Nimmer, Shmuel Nitzan, Sarah Polcz, Matthew Sag, Peter Siegelman, Christopher Sprigman, Alex Stein, Alfred Yen, Eyal Zamir, and participants at the American Law and Economics Association Annual Conference and at the Seventh Copyright Scholarship Roundtable at Columbia Law School, for valuable comments and suggestions. We are especially indebted to Joseph Fishman for his enlightening remarks. For excellent research assistance, we thank Ron Bechar, Guy Cohen, Rachel Hujsa, Ruoyu Ji, Noam Kozlov, Ariel Melitz, Jeremy Rapaport-Stein, Ido Schlesinger, Yoav Stoler, Jude Taragin, Amir Tzur and Miriam Weinstock. Parchomovsky thanks the Israel Science Foundation for research support.

Mind the Gap(s): Mitigating Harassment in a Post-#METOO Workplace

In a post-#MeToo workplace, harassment remains pervasive, and harassment law still fails to provide protection for the harms experienced by many workers—particularly those in the most vulnerable jobs. Even when reform efforts are introduced through legislation, courts, and agency guidance, it often does not provide greater power, autonomy, and dignity to women in ways that would more meaningfully protect them from workplace abuse. We are the first to create a database of state legislation, including over three thousand bills, that allows us to empirically analyze the extent to which lawmakers comprehensively address harassment following the rise of the #MeToo movement. We assess comprehensiveness by examining how responsive legislation is to existing gaps in legal protection during the five years following the 2017 tweet that took #MeToo activism global, relative to the 2016 baseline period. We found that states introduced a wide breadth of reforms to combat harassment and gender inequality, including some changes that address longstanding gaps in legal protection. Gaps persist, however, and in some cases worsened post #MeToo. Going forward, reform efforts by state legislaturesand all legal stakeholderswill prove most effective if they move away from narrow conceptions of sexual harassment and follow the voice of workers, pursuing a broad, multi-layered agenda around gender equity that is responsive to the realities of our evolving workplace and society. This is especially true in 2025 as the Trump administration redirects the EEOC’s resources towards attacking diversity, equity and inclusion measures.

Introduction

Tarana Burke coined the phrase “Me Too” in 2006 in support of Black women and girls of color who had survived sexual violence, encouraging them to share their stories despite the many pressures they faced to remain silent.1Jamillah Bowman Williams, Lisa Singh & Naomi Mezey, #MeToo as Catalyst: A Glimpse into 21st Century Activism, 2019 U. Chi. Legal F. 371, 374 (2019). Social media galvanized the movement in 2017 after Alyssa Milano took to Twitter, posting: “If you’ve been sexually harassed or assaulted write ‘me too’ as a reply to this tweet . . . ‘we might give people a sense of the magnitude of the problem.’ ”2Alyssa Milano (@Alyssa_Milano), X (Oct. 15, 2017, 1:21 PM), https://x.com/Alyssa_Milano/status/919659438700670976 [http://web.archive.org/web/20180403154601/https://twitter.com/Alyssa_Milano/status/919659438700670976]. The #MeToo3Williams et al., supra note 1. hashtag was used 19 million times between 2017 and 2018.4Id. at 375. Sustained digital participation increased the movement’s visibility and maintained its momentum beyond the boom and bust trend typically observed on social media.5Id. at 380. Online engagement surrounding the #MeToo movement also served as a catalyst for offline action, evolving into highly publicized protests, employee walkouts, and historic strikes.6Id. at 383. For example, in 2018, McDonald’s employees organized a historic multi-state strike against the company’s sexual harassment policies.7Jamillah Bowman Williams, Maximizing #MeToo: Intersectionality & the Movement, 62 B.C. L. Rev. 1797, 1849 (2021). Protesting workers wrote “#MeToo” on signs and covered their mouths with tape, bridging the gap between social media activism and traditional means of protest.8Id. After union-led campaigns and employee-staged walkouts, prominent companies in industries from technology to hospitality changed existing workplace policies such as mandatory arbitration.9Id. at 1847, 1850.

Subsequently, the hashtag #TimesUp, referencing the TIME’S UP Legal Defense Fund (“TULDF”), was created to solve the issues #MeToo revealed.10Williams et al., supra note 1, at 380, 384. TULDF sought to support women of color and low-wage women in the workplace, raising over $24 million to connect these women to attorneys and media specialists.11Id. at 384. The movement also brought an increase in enforcement activity at the Equal Employment Opportunity Commission (“EEOC”), the government agency responsible for enforcing workplace discrimination law. In 2018, the EEOC reported that sexual harassment charges were up nationwide—the first increase observed in a decade.12Id. at 385. In 2018, the EEOC received 7,609 sexual harassment charges compared with the 6,696 charges received in 2017.13U.S. Equal Emp. Opportunity Comm’n, EEOC Data Highlight: Sexual Harassment in Our Nation’s Workplaces 2 (2022), https://www.eeoc.gov/sites/default/files/2022-04/Sexual%20Harassment%20Awareness%20Month%202022%20Data%20Highlight.pdf [https://perma.cc/RZ29-WP66]. The EEOC recovered almost $104 million more for those with sexual harassment claims between 2018 and 2021 than between 2014 and 2017.14Id. at 4. The agency capitalized on #MeToo momentum by increasing lawsuits to enforce sexual harassment law and holding more employers accountable.15Id. at 3; Williams et al., supra note 1, at 385.

This widespread activism also influenced legislatures. In the five years after #MeToo went viral, thousands of bills were introduced—mainly at the state level. These bills covered a wide range of topics related to gender equity in the workplace, including harassment training, nondisclosure agreements, forced arbitration for harassment claims, pay equity, and leave law. This surge of legislative activity was aimed at eliminating harassment and addressing gender equity in the workplace.16Williams et al., supra note 1, at 386.

While it was clear that legislatures were becoming more attentive to gender equity following the increased activism, it remained unclear whether the new reforms were getting to the root of the issues that cause harassment and addressing the legal gaps that allow harassment to persist. #MeToo media coverage tended to focus on certain victims—namely, the white women in the entertainment industry and the nondisclosure agreements (“NDAs”) that kept them silent.17Merve Hannah O’Keefe, The Impact of the Me Too Movement’s Journalism, Yale J. Int’l Affs. (2021), https://www.yalejournal.org/publications/the-impact-of-the-me-too-movements-journalism [https://perma.cc/3P2W-US58]. We argue that a more holistic approach is required both for progress over time and for reaching a broader range of working women. This is not unlike the “Swiss Cheese Model” adapted for use to control the spread of infection during the COVID-19 pandemic.18Jamillah Bowman Williams & Elizabeth Tippett, Five Years On, Here’s What #MeToo Has Changed, Politico (Oct. 14, 2022, 11:16 AM), https://www.politico.com/newsletters/women-rule/2022/10/14/five-years-on-heres-what-metoo-has-changed-00061853 [https://web.archive.org/web/20241212022142/https://www.politico.com/newsletters/women-rule/2022/10/14/five-years-on-heres-what-metoo-has-changed-00061853]; see also Preventing COVID-19 Using the Swiss Cheese Model, CoxHealth (Feb. 22, 2022), https://www.coxhealth.com/blog/preventing-covid-19-using-swiss-cheese-model [https://perma.cc/LL6F-AKKJ]. The Swiss Cheese Model of risk reduction, developed by James Reason in the 1990s, visually demonstrates how a variety of strategies and actors can work together to reduce risk of harm.19James Reason, Erik Hollnagel & Jean Paries, Eurocontrol Experimental Centre, Revisiting the «Swiss Cheese» Model of Accidents 4–10 (2006). In the context of harassment, no single intervention such as restricting NDAs or increasing training can prevent all harassment, but multiple interventions can make a lasting difference. This is particularly true when the approach aims to reduce gendered power dynamics that make harassment more likely.20See infra Figure 1.

To empirically analyze the extent to which lawmakers were comprehensively addressing harassment and gender equity following #MeToo, our team of researchers and lawyers at Georgetown University collected and coded over 3,000 federal and state bills introduced from 2016 to 2022, some of which passed into law. We also analyzed how timing, geography, and political factors shaped the legal activity following #MeToo, relative to the 2016 baseline period. Our dataset is defined broadly and includes all harassment-specific legislation, as well as legislation addressing other gender equity issues including: pay equity, expanded coverage under Title VII of the Civil Rights Act of 1964 (“Title VII”), leave and accommodation, and occupational protections that address intersectional subordination. We found that the variety of legislation introduced by state legislators was consistent with the Swiss Cheese Model of risk reduction; however, there was wide variation across states.

 

Figure 1.  Swiss Cheese Model for Reducing Harassment

This Article focuses primarily on state legislation because virtually all reform activity during the sample period occurred at the state level. Harassment law and gender-based reforms more broadly tend to follow a similar pattern of state-led rights protection and enhancement due to the gradual trend of federal courts contracting civil rights in the workplace among other venues. Federal lower courts, in particular, have increasingly issued employer-friendly Title VII and Americans with Disabilities Act (“ADA”) decisions that have been both formally and informally codified into law.21Ann C. McGinley, Laboratories of Democracy: State Law as a Partial Solution to Workplace Harassment, 30 Am. U. J. Gender Soc. Pol’y & L. 245, 246–47 (2022) [hereinafter McGinley, Laboratories of Democracy]; Ann C. McGinley, Introduction: A Symposium on Enhancing Civil and Constitutional Rights Through State and Local Action, 22 Nev. L.J. 895, 897 (2022); Ann C. McGinley, Credulous Courts and the Tortured Trilogy: The Improper Use of Summary Judgment in Title VII and ADEA Cases, 34 B.C. L. Rev. 203, 206–07 (1993). Congressional gridlock has also led to a standstill with respect to anti-harassment legislation.22McGinley, Laboratories of Democracy, supra note 21, at 251. Moreover, extreme partisanship in both Congress and the judiciary diminishes the likelihood of relying on Congress to act as a check when courts roll back rights, as they have in the past.23Id. Only six federal reforms related to harassment and workplace gender equity passed during the five years following #MeToo; of those, only two had system-wide effects: the Ending Forced Arbitration of Sexual Assault and Sexual Harassment Act of 2021 and the Speak Out Act of 2022. By contrast, states have been a hotbed of legislative activity.24See infra Part III.B.

State legislation continues to play a central role in law reform, particularly under a second Trump administration that has signaled its hostility to transgender rights and diversity and inclusion programs. For example, Trump’s Executive Order 14168 declared that “ ‘sex’ is not a synonym for and does not include the concept of ‘gender identity.’ ”25Exec. Order No. 14,168, 90 Fed. Reg. 8615 (Jan. 20, 2025). Although the Order does not supersede the Supreme Court’s 2022 Bostock v. Clayton County decision recognizing sexual orientation and gender identity as sex discrimination under Title VII,26Bostock v. Clayton County, 590 U.S. 644, 682–83 (2020). the Executive Order attempts to rescind the EEOC’s 2024 harassment guidance regarding gender identity.27Exec. Order No. 14,168, 90 Fed. Reg. 8615 (Jan. 20, 2025); U.S. Equal Emp. Opportunity Comm’n, Enforcement Guidance on Harassment in the Workplace, (Apr. 29, 2024), https://www.eeoc.gov/laws/guidance/enforcement-guidance-harassment-workplace [https://perma.cc/2685-QVM5]. The EEOC has taken the position that the 2024 guidance remains in effect and that the acting Chair lacks the power to unilaterally rescind guidance that was issued pursuant to a majority vote of the Commissioners. In this context, the Trump administration seems more likely to roll back available civil rights coverage and enforcement than engage in meaningful reform.

Thus, states now, more than ever, remain important “laboratories of democracy,” a term Justice Brandeis coined in 1932, for achieving nationwide rights’ protection.28Id. at 255. A close look at state legislative activity reveals the state-specific innovation and experimentation apparent in the variety of bills introduced. Nevertheless, the path from state-specific legislative innovation to systemic federal reform is not linear. Rather, broader effects depend on state-specific efforts influencing a combination of players from different arenas, including state courts, state agencies, federal courts, executive action, and even voluntary action by private entities.

We hypothesized that post #MeToo, the most significant activity at the state level would focus on harassment training and NDAs, which were scrutinized in the extensive media coverage. While high-profile support for these kinds of reforms did catch the attention of state legislators, with many bills introduced and passed, state legislators also introduced and passed many bills addressing systemic issues such as pay equity, leave law, and reforms to fill gaps in protection left in the legal landscape prior to #MeToo.

Although media coverage of the #MeToo movement may have overlooked many of the biggest and more systemic obstacles to workplace gender equity—such as lack of coverage under anti-discrimination law, employer retaliation, Title VII interpretation, and underenforcement—many states began to tackle these issues. We argue that states must continue this momentum not only to mitigate harassment more broadly, but also to address intersectional issues of economic precarity and racism that make harassment more frequent and particularly harmful to low-wage workers, who are disproportionately women of color.29Williams & Tippett, supra note 18. For example, while women of color face higher rates of harassment due to compounding systems of subordination, most of the legislation proposed only strengthens protection for claims of sexual harassment or assault, and not intersectional subordination based on sex and race that is a common experience for women of color.30Andrea Johnson, Samone Ijoma & Da Hae Kim, Nat’l Women’s L. Ctr., #MeToo Five Years Later: Progress & Pitfalls in State Workplace Anti-Harassment Laws 9 (2022), https://nwlc.org/wp-content/uploads/2022/10/final_2022_nwlcMeToo_Report.pdf [https://perma.cc/LN39-Z2XG]. As a result, those experiencing intersectional harassment or discrimination based on multiple protected characteristics, including race, ethnicity, or national origin, are left vulnerable.31Id. Legal remedies that fail to consider experiences unique to women of color or other groups with multiple marginalized identities will ultimately fail to root out discrimination and harassment for those individuals, leading to underenforcement.

Nonetheless, our data reveals a broad array of state bills over a sustained period of time, which is a promising development. Complex social problems like harassment have numerous causes, and no single reform will prevent all instances of harassment, encourage employers to respond appropriately, or ensure a just legal remedy for the harm. We expect the net effect of the legislation, along with the social and attitudinal changes resulting from the #MeToo movement, to be positive and lasting. Not all legislation, however, had an equal chance of success to reduce broader trends of harassment. A close examination of the proposed and enacted legislation presents a mixed picture, which we discuss in depth in the empirical analysis that follows.

This Article is organized as follows: Part I explains how and why harassment persists today by looking at its historical origins, the current landscape, and how harassment relates to a growing trend of workplace violence. In Part II, we will discuss the specific gaps in legal protection that allow harassment and gender disparities to persist. In Part III, we offer original empirical analysis that illustrates trends in the anti-harassment and gender equity legislation that emerged during the five years post #MeToo. Finally in Part IV, we discuss the implications of our data for courts, lawmakers, and agencies, including what is still needed to mitigate workplace harassment post #MeToo.

I.  The Persistent Nature of Workplace Harassment

This Part provides an overview of the underlying social determinants that yield high rates of workplace harassment over time.

A.  The Historical Origins of Harassment

As various scholars have argued, harassment is not principally about sexual desire, but rather a reflection of the distribution of power within the particular workplace and society more broadly.32See Catharine A. MacKinnon, Sexual Harassment of Working Women: A Case of Sex Discrimination 18 (1979) (characterizing harassment as an outgrowth of women’s limited opportunities and confinement to certain sex-segregated occupations, arguing that, “if part of the reason the woman is hired is to be pleasing to a male boss, whose notion of a qualified worker merges with a sexist notion of the proper role of women, it is hardly surprising that sexual intimacy, forced when necessary, would be considered part of her duties and his privileges”); see also Vicki Schultz, Understanding Sexual Harassment Law in Action: What Has Gone Wrong and What We Can Do About It, 29 T. Jefferson L. Rev. 1, 5 (2006) (criticizing that “the prevailing conception of harassment defines it first and foremost as an abuse of women’s sexuality”); Elizabeth Tippett, Harassment Trainings: A Content Analysis, 39 Berkeley J. Emp. & Lab. L. 481, 485 (2018) (critiquing overemphasis on sexual conduct in harassment training). It is a form of social behavior that reflects the dominant group’s—in this case men’s—ability to exclude, marginalize, or dominate less powerful individuals within the workplace.33Schultz, supra note 32, at 24. It can often function to undermine the competence and confidence of marginalized groups and interfere with work performance, while also setting the norm of what is accepted or acceptable behavior.34Id. at 20. Even harassment that is motivated in whole or in part by sexual desire reflects the perpetrator’s power to impose his demands and desires on others who are poorly positioned to rebuff those demands without consequence.35MacKinnon, supra note 32, at 18, 25.

Harassment therefore serves as a mirror for systemic hierarchy, within the microcosm of the workplace and within the culture and larger historical context of a nation. The subordination of women was a central feature of nineteenth and twentieth century law and work arrangements. Women lost their legal personhood upon marriage through a principle known as coverture, wherein they could only acquire property or sign contracts through the legal personhood of their husbands.36Amy Dru Stanley, From Bondage to Contract: Wage Labor, Marriage, and the Market in the Age of Slave Emancipation 9 (1998). Women did not secure the constitutional right to vote until 1920.37U.S. Const. amend. XIX. Many factories in the early decades of the twentieth century were explicitly segregated by gender, with women and men working in separate departments at separate pay rates, eating in separate cafeterias, and even entering and exiting from different entrances or on separate schedules.38See, e.g., Gerald Zahavi, Workers, Managers, and Welfare Capitalism: The Shoeworkers and Tanners of Endicott Johnson, 1890–1950 82–84 (1988) (describing a female-only stitching room); Samuel Crowther, John H. Patterson: Pioneer in Industrial Welfare 210–11 (1924) (referencing separate women’s and men’s cafeterias); William Howe Tolman, Industrial Betterment 6 (Herbert B. Adams & Richard Waterman Jr. eds., 1900) (referencing staggered shifts). Until 1974, banks could deny loans and credit cards to married women unless their husbands co-signed the application.39Equal Credit Opportunity Act, 15 U.S.C. §§ 1691–91f. The legal and social foundation of the United States is one where men have power over women, are superior in status, and are free to control them.

America’s history of slavery, segregation, and white supremacy is also inextricably intertwined with the history of work, which shapes the experiences of Black and other racialized women.40Nell Irvin Painter, Southern History Across the Color Line 21 (2002) (“Historians already realize that including enslaved workers as part of the American working classes recasts the labor history of the United States . . . .”). Slavery was in part a workplace hierarchy predicated on violence and white supremacy.41Id. at 6 (“[S]lavery rested on the threat and the abundant use of physical violence.”); Edward E. Baptist, The Half Has Never Been Told: Slavery and the Making of American Capitalism 130 (2016) (describing the role of “calibrate[d] torture” in control of work on plantations); Caitlin Rosenthal, Accounting for Slavery: Masters and Management 101 (2018). Black women were chattel assets, whose purpose in the economy and social order was to labor and serve white slave masters and their families.42            Nell Irvin Painter, Creating Black Americans: African-American History and its Meanings, 1619 to the Present 85–86 (2006); Caitlin Rosenthal, Slavery’s Scientific Management: Masters and Managers, in Slavery’s Capitalism: A New History of American Economic Development 62, 75–76 (Sven Beckert & Seth Rockman eds., 2016) (“A ‘prime field hand’ was an enslaved man or woman whose productivity was among the maximum that could be expected from a single individual. All other slaves were measured against this ideal, their value denominated in fractions of a hand . . . . . Planters’ calculations rendered slaves not as individuals but as abstract, commoditized units of labor. . . .”). White slave masters frequently raped them, bred them to produce more workers, and subjected them to physical and psychological terror to maintain control.43         Nell Irvin Painter, Southern History Across the Color Line 94 (2002); Rosenthal, Slavery’s Scientific Management, supra note 42, at 76 (quoting a journal kept by an enslaver referring to “his” enslaved women as “uncommonly good breeders”); Edward E. Baptist, Toward a Political Economy of Slave Labor: Hands, Whipping-Machines, and Modern Power, in Slavery’s Capitalism: A New History of American Economic Development 31, 48 (Sven Beckert & Seth Rockman eds., 2016) (“A system of measurement, accounting, and torture was used to coerce enslaved people to pick large amounts of cotton. People who were enslaved reported it again and again.”). After slaves were emancipated, segregation became a workplace reality, with Black women being relegated to the most menial and low-wage jobs.44See, e.g., Griggs v. Duke Power Co., 401 U.S. 424, 430 (1971) (case involving a formerly segregated power plant); Kevin Stainback & Donald Tomaskovic-Devey, Documenting Desegregation: Racial and Gender Segregation in Private Sector Employment Since the Civil Rights Act 60 (2012) (quantifying rates of racial work segregation over several decades). See generally Harry Hudson, Working for Equality: The Narrative of Harry Hudson (Randall L. Patton ed., 2015) (describing his experience working at a previously segregated Lockheed Martin plant); Randall L. Patton, Lockheed, Atlanta, and the Struggle for Racial Integration (2019) (describing the history of employment practices at Lockheed Martin). Title VII offered reform, but it did not fully dismantle job segregation and workplace hierarchies predicated on white privilege.45Stainback & Tomaskovic-Devey, supra note 44, at 147, 168.

Immigrant workers in the United States have also faced shifting, yet persistent, forms of discrimination. Although immigrants in the nineteenth and early twentieth century received privileged treatment compared with Black workers,46For example, European immigrants at the start of the 19th century could be bound to indentured labor—a contract-based, term-limited form of service—but were not enslaved. Robert J. Steinfeld, The Invention of Free Labor: The Employment Relation in English & American Law and Culture, 1350–1870 139 (Thomas A. Green ed., 1991) (describing indentured servitude); see also Lea VanderVelde, The Last Legally Beaten Servant in America: From Compulsion to Coercion in the American Workplace, 39 Seattle Univ. L. Rev. 727, 758 (2016) (describing the racial hierarchy of workplace violence). there is a long history of discrimination and subordination of immigrant populations, particularly Latino and Asian Americans. These include, for example, the Chinese Exclusion Act47Chinese Exclusion Act, ch. 126, 22 Stat. 58 (1882) (repealed 1943). and the internment of Japanese Americans during World War II, which kept Asian women workers excluded, marginalized, and exploited.48Exec. Order No. 9066, 28 C.F.R. § 74.3 (Feb. 19, 1942); Korematsu v. United States, 323 U.S. 214 (1944). Continued subordination of both Black and immigrant women is also evidenced by the exclusion of domestic and agricultural workers from the 1938 Fair Labor Standards Act and the 1935 National Labor Relations Act.49Juan F. Perea, The Echoes of Slavery: Recognizing the Racist Origins of the Agricultural and Domestic Worker Exclusion from the National Labor Relations Act, 72 Ohio St. L.J. 95, 96 (2011); Kate Andrias, An American Approach to Social Democracy: The Forgotten Promise of the Fair Labor Standards Act, 128 Yale L.J. 616, 637 (2019); Marc Linder, Farm Workers and the Fair Labor Standards Act: Racial Discrimination in the New Deal, 65 Tex. L. Rev. 1335, 1336 (1987); Ellen Mutari, Brothers and Breadwinners: Legislating Living Wages in the Fair Labor Standards Act of 1938, 62 Rev. Soc. Econ. 129, 133 (2004); Suzanne B. Mettler, Federalism, Gender, & the Fair Labor Standards Act of 1938, 26 Polity 635, 643 (1994). These positions are overwhelmingly occupied by immigrant women and Black women, and many are still excluded from these legal protections today, making them more vulnerable to discrimination and abuse. Further, while Title VII prohibits discrimination on the basis of national origin, employers are permitted to discriminate against workers on the basis of immigration status.508 U.S.C. § 1324a; Hoffman Plastic Compounds v. Nat’l Lab. Rels. Bd., 535 U.S. 137, 147–48 (2002).

Workers who belong to more than one subordinated group—such as Black women, immigrant women of color, or Black immigrant women—face compounded marginalization, as Kimberlé Crenshaw originally argued in her landmark article on intersectionality.51See generally Kimberlé Crenshaw, Mapping the Margins: Intersectionality, Identity Politics, and Violence Against Women of Color, 43 Stan. L. Rev. 1241 (1991) (introducing the concept of intersectionality, which examines how various social identities like race, gender, and class combine and create unique experiences of discrimination). Such discrimination is also replete within the historical record, in which a combination of race and sex-based discrimination operated in tandem. For example, the legislative history of Title VII suggests “sex” was included as a protected category based in part on arguments that protecting race, but not sex, would give Black women an advantage over White women.52Robert C. Bird, More Than a Congressional Joke: A Fresh Look at the Legislative History of Sex Discrimination of the 1964 Civil Rights Act, 3 Wm. & Mary J. Women & L. 137, 156 (1997). Likewise, during debates in the 1970s over whether to finally include domestic workers in the federal minimum wage law, opponents painted the work itself—performed primarily by women of color—as undeserving of minimum wage, while the White housewives who employed them were depicted as unqualified to calculate wages and hours.53Premilla Nadasen, Citizenship Rights, Domestic Work, and the Fair Labor Standards Act, 24 J. Pol’y Hist. 74, 81–82 (2012).

Throughout United States history, women and people of color have also been vastly underrepresented in Congress, as well as within state legislatures.54Government officials are the ultimate form of leadership in our country, and the sexual harassment allegations that came out in 2017 against a multitude of public officials did not occur overnight. Rather, they were the result of years of government leaders setting a workplace status quo in which holding offenders accountable was not the norm, nor even necessarily possible. Jamillah Bowman Williams, #MeToo and Public Officials: A Post-Election Snapshot of Allegations and Consequences, Geo. L. 1, 8 (2018), https://www.law.georgetown.edu/wp-content/uploads/2018/11/MeToo-and-Public-Officials.pdf [https://web.archive.org/web/20200930125954/https://www.law.georgetown.edu/wp-content/uploads/2018/11/MeToo-and-Public-Officials.pdf]. Underrepresentation of these groups as lawmakers—both now and historically—reinforce hierarchies and subordination over time, by affecting which types of bills get introduced and passed, and which end up on the cutting room floor. Representation can shape values, priorities, and debate around who is deemed worthy of protection, in what ways, and whether legal interventions are needed to reduce inequality. Men—specifically White men—are also markedly overrepresented in the judiciary, where the laws are enforced.55Laura Moyer, Allison P. Harris & Rorie Spill Solberg, “Better Too Much Than Not Enough”: The Nomination of Women of Color to the Federal Bench, 43 J. Women, Pol. & Pol’y 363, 364 (2022). The life experiences and perspectives of the judiciary affects their approach to cases and the parties with whom they identify. Biases influenced by one’s social position can then get baked into precedent, which later constrains and influences subsequent rulings.56Sandra F. Sperino & Suja A. Thomas, Unequal: How America’s Courts Undermine Discrimination Law 133 (2017). Thus, lack of representation in both legislatures and courts can facilitate and exacerbate gaps in the law, ultimately failing to provide accountability and leaving women workers vulnerable to exploitation and abuse.

B.  The Current Landscape of Workplace Harassment

Current national statistics reflect the continued influence of these historical patterns of subordination. Hispanic women earn fifty-seven cents for every dollar earned by White, non-Hispanic men.57Robin Bleiweis, Jocelyn Frye & Rose Khattar, Women of Color and the Wage Gap, Ctr. for Am. Progress (Nov 17, 2021), https://www.americanprogress.org/article/women-of-color-and-the-wage-gap [https://web.archive.org/web/20250114113707/https://www.americanprogress.org/article/women-of-color-and-the-wage-gap/?__cf_chl_rt_tk=81mCwvcSVGPqXClh841ErfkiPP_kM3d_qdUK8YBG..M-1736854627-1.0.1.1-AZC1vUkU01_eXWQI8u1kifKKkVk0.DpWPHFjVmuSSzM]. In 2020, Black women earned sixty-four cents for every dollar earned by White, non-Hispanic men.58Id.; see also Ariane Hegewisch & Chandra Childers, Black Women to Reach Equal Pay with White Men in 2130, Inst. for Women’s Pol’y Rsch. (Aug. 13, 2020), https://iwpr.org/black-women-to-reach-equal-pay-with-white-white-men-in-2130 [https://perma.cc/74DK-M556]. Over time, this gap fuels income and wealth disparities; Black women are estimated to lose nearly one million dollars over the course of their careers.59Bleiweis et al., supra note 57.

Relatedly, broad societal hierarchies and unevenly distributed power within organizations also affect workplace culture, behavior, and policies.60Research shows that the strength with which leaders prevent and respond to harassment in the workplace corresponds to how frequently harassment occurs in that workplace. Junghyun Lee, Passive Leadership and Sexual Harassment: Roles of Observed Hostility and Workplace Gender Ratio, 47 Pers. Rev. 594, 594 (2018). Power can take many forms; however, economic power or lack thereof tends to be at the foundation. Thus, when one’s labor is devalued—as occurs most substantially with Black and Hispanic women wage gaps compared with White, non-Hispanic men—this fundamentally affects the bargaining power one has with respect to protecting themselves from harassment at work.61Marissa Ditkowsky, #UsToo: The Disparate Impact of and Ineffective Response to Sexual Harassment of Low-Wage Workers, 26 UCLA Women’s L.J. 78, 98–99, 117, 134 (2019). Economic disparities in bargaining power are compounded by continuing racism and sexism in low-wage industries where women of color are overrepresented.62Id. at 73; Amanda Rossie, Jasmine Tucker & Kayla Patrick, Nat’l Women’s L. Ctr., Out of the Shadows: An Analysis of Sexual Harassment Charges Filed by Working Women 9 (2018).

The EEOC has published a list of workplace conditions that increase the likelihood of harassment. The vast majority of the conditions noted are common features of low-wage industries.63Sarah Crawford & Sharyn Tejani, Nat’l Women’s L. Ctr., What Works at Work: Promising Practices to Prevent and Respond to Sexual Harassment in Low-Paid Jobs 2–4 (2020). For example, low-wage and precarious industries such as hospitality, food service, modeling, agriculture, construction, and custodial work often: (1) lack effective policies and procedures; (2) have minimal to no oversight; (3) require working in isolation; and (4) prioritize customer and client well-being over the worker.64Id. It is thus unsurprising that the women working in these industries experience the highest rates of harassment, among other forms of workplace violence.65Angela Onwuachi-Willig, What About #UsToo?: The Invisibility of Race in the #MeToo Movement, 128 Yale L.J.F. 105, 107 (2018). For example, surveys have found that 65% of casino workers reported unwanted touching by guests, while over half of restaurant workers reported sexual harassment as occurring on a weekly basis.66Crawford & Tejani, supra note 63, at 3. One casino worker described how the harassment was intertwined with her wages, stating that a guest wanted to “put the tip on [her] ass” and took back the tip when she refused.67Ditkowsky, supra note 61, at 72. Another worker, this time at a hotel, described having to jump over the beds to escape the room of a guest who exposed themselves to her while requesting shampoo.68Id. COVID-19 has only worsened these rates; one nationwide study found that 78% of surveyed restaurant workers reported an increase in hostility and harassment as they enforced COVID-19-related policies.69Catharine A. Mackinnon & Louise Fitzgerald, One Fair Wage, U.C. Berkeley Food Lab. Rsch. Ctr., Barry Commoner Ctr. for Health and Env’t, Take Off Your Mask So I Know How Much to Tip You 24 (Time’s Up Found. ed., 2020), https://static1.squarespace.com/static/6374f6bf33b7675afa750d48/t/6478b65bde58f3000319f012/1685632603986/OFW_COVID_WorkerExp-1.pdf [https://perma.cc/J32T-VRQP]; See also One Fair Wage & U.C. Berkeley Food Lab. Rsch. Ctr., No Rights, Low Wages, No Service (2021), https://uhclthesignal.com/files/wp-content/uploads/2021/09/ofw_nationalwagetheft.pdf [https://perma.cc/6MKE-MLAT].

Harrowing accounts of harassment are also extremely prevalent among domestic workers and farmworkers, who are among the least protected due to the working conditions and the historical factors discussed above. Studies have found that 48% of domestic workers have had clients expose themselves, while 80% of farmworkers have experienced some form of sexual violence while at work.70Crawford & Tejani, supra note 63, at 3. In many of these cases, low-wage workers’ bargaining power is further diminished by language barriers or distrust of government agencies due to immigration status.71Id. at 4.

Gender and racial hierarchies also shape who has access to leadership positions that hold power in the workplace and in government. For example, women and people of color remain vastly underrepresented within business leadership ranks.72Kimberly A. Houser & Jamillah Bowman Williams, Board Gender Diversity: A Path to Achieving Substantive Equality in the United States, 63 Wm. & Mary L. Rev. 497, 501–02, 508–09 (2021). These statistics remain stubbornly sticky despite nearly sixty years of anti-discrimination law under Title VII. Reviewing decades of national employment data, sociologists Kevin Stainback and Donald Tomaskovic-Devey found that Black men and women, as well as White women, made far fewer gains in managerial jobs than in professional jobs.73Stainback & Tomaskovic-Devey, supra note 44, at 31, 35. White men retained a disproportionate share of managerial jobs, which these authors attributed to continued White male advantage that led them to be “pushed up in organizational hierarchies.”74Id. at xxii.

Women also face gender-based harassment even when they break social and historical norms and move up to the top of the power hierarchy. In these cases, social and historical hierarchies are disrupted, and men resist and engage in demeaning behaviors to restore the status quo. Sociologist Raewyn Connell might characterize the problem in terms of “hegemonic masculinity”—“practice[s] . . . that allowed men’s dominance over women to continue,” that “embod[y] the currently most honored way of being a man” and “requir[e] all other men to position themselves in relation to it,” and that “ideologically legitimat[e] the global subordination of women to men.”75R. W. Connell & James W. Messerschmidt, Hegemonic Masculinity: Rethinking the Concept, 19 Gender & Soc’y 829, 832 (2005). This type of harassment is not necessarily sexual in nature and can consist of taunting, insubordination, and use of demeaning slurs and images. This is less discussed than the harassment that is driven by sexual desire and targets low-status women. However, at its core, it is driven by systemic power hierarchies that exploit women or justify their differential treatment, similar to other types of harassment.76Schultz, supra note 32, at 18–20.

A poignant example are the numerous accounts of workplace harassment in law enforcement and the military. In 2018, it was reported that almost 25% of women in active-duty military experienced sexual harassment while in the military.77Rachel A. Breslin, Samantha Daniel & Kimberly Hylton, Black Women in the Military: Prevalence, Characteristics, and Correlates of Sexual Harassment, 82 Pub. Admin. Rev. 410, 411 (2022). For women veterans, the percentage who reported experiencing sexual harassment rises to 80%, suggesting underreporting may be a significant problem for the military.78Renée Burbank, Stigmatizing Narratives in Military Sexual Trauma Cases, XXXI Kan. J.L. & Pub. Pol’y 185, 186–87 (2023). One particularly horrifying example comes from a female Navy lieutenant. In 1992, she went public with a personal story of being sexually assaulted by “the gauntlet,” which was described as a “nightly, coordinated, and systematic sexual assault of women who found themselves on the third floor of the hotel.”79Id. at 190–91. High rates of harassment are also commonplace in law enforcement. One nationally representative survey of law enforcement officers found that 71% of female law enforcement officers have experienced sexual harassment or sexual violence in the workplace.80Bruce G. Taylor, Poulami Maitra, Elizabeth Mumford & Weiwei Liu, Sexual Harassment of Law Enforcement Officers: Findings from a Nationally Representative Survey, 37 J. Interpersonal Violence NP8454, NP8466 (2022). These male-dominated environments are high-risk, as women are devalued and targeted for breaking gender stereotypes and hierarchies of power.

C.  Harassment as a Workplace Hazard

Based on historical and current social realities, we argue that harassment is a workplace hazard that is disproportionately distributed to women—particularly low-wage workers and women of color—creating a health and safety issue with civil rights and economic justice issues at the core. As such, harassment is best suited to be addressed by a multi-layered hazard prevention model, such as the Swiss Cheese Model we proposed above.81See infra Figure 1.

Harassment is a significant hazard to workers’ mental, physical, and economic safety following historical trends of gendered and racialized subordination. Studies show workplace harassment is associated with increased rates of (1) stress, (2) anxiety and depression, and (3) post-traumatic stress disorder (“PTSD”).82Kathleen M. Rospenda, Judith A. Richman, Jennifer L.Z. Ehmke & Kenneth W. Zlatoper, Is Workplace Harassment Hazardous to Your Health?, 20 J. Bus. & Psych. 95, 95–96 (2005). This effect may be particularly pronounced for women of color as they are vulnerable to harassment on the basis of both race and gender.83Michelle M. Vance, Jeannette M. Wade, Mervin Brandy Jr. & Aiyana Rice Webster, Contextualizing Black Women’s Mental Health in the Twenty-First Century: Gendered Racism and Suicide-Related Behavior, 10 J. Racial & Ethnic Health Disparities 83, 86 (2023). All three of these mental health effects are risk factors for increased rates of suicidal ideation, which also links workplace harassment to increased rates of suicide.84Id.; Linda L. Magnusson Hanson, Anna Nyberg, Ellenor Mittendorfer-Rutz, Fredrik Bondestam & Ida E. H. Madsen, Work Related Sexual Harassment and Risk of Suicide and Suicide Attempts: Prospective Cohort Study, BMJ, Sept. 2020, at 1.

Workplace harassment frequently occurs with, and may even precipitate, other forms of workplace violence.85Rospenda et al., supra note 82, at 98. Physical violence can occur in any workplace and among any type of worker, even women in leadership; but the risk for fatal violence is highest among sales, protective service, and transportation workers, while the risk for nonfatal violence resulting in days away from work is greatest for healthcare and social assistance workers.86About Workplace Violence, Ctrs. for Disease Control & Prevention: Nat’l Inst. for Occupational Safety & Health (December 3, 2024), https://www.cdc.gov/niosh/violence/about/index.html [https://perma.cc/GM9D-BXKB]. For women working in low-wage industries, the economic harms associated with workplace harassment can be particularly devastating. Economic violence can take many forms such as constructive discharge or retaliation for reporting or opposing workplace harassment, and can occur via termination, demotion, pay cuts, wage theft, or detrimental changes to job terms and conditions such as scheduling.

The detrimental effects of harassment are dangerously cyclical, leaving victims at risk of remaining stuck in these cycles. Like other health and safety hazards, preventing harassment demand multifaceted interventions, and many gaps remain. In Section II, we identify these gaps before turning to our data, which we analyze to examine the effectiveness of the overall policy response post #MeToo.

II.  Legal Constraints Fail to Provide Accountability

Title VII contains no reference to the word “harassment.” Harassment law is instead a product of regulatory and judicial interpretation of the statutory language stating it is unlawful for an employer “to discriminate . . . with respect to . . . conditions, or privileges of employment.”87Meritor Sav. Bank, FSB v. Vinson, 477 U.S. 57, 63 (1986). Lower courts began to recognize racial, religious and sex-based harassment claims in the 1970s,88Rogers v. EEOC, 454 F.2d 234, 240–41 (5th Cir. 1971) (involving a race-based harassment claim with a Latina employee assigned exclusively to Latino patients); Compston v. Borden, Inc., 424 F. Supp. 157, 160 (S.D. Ohio 1976) (involving religious harassment); Williams v. Saxbe, 413 F. Supp. 654, 657–61 (D.D.C. 1976), vacated, Williams v. Bell, 587 F.2d 1240, 1242 (D.C. Cir. 1978), remanded to Williams v. Civiletti, 487 F. Supp. 1387, 1389 (D.D.C. 1980) (involving sex-based harassment); see also Rhonda M. Reaves, One of These Things is Not Like the Other: Analogizing Ageism to Racism in Employment Discrimination Cases, 38 U. Rich. L. Rev. 839, 889 (2004). while the EEOC recognized sexual harassment as a form of discrimination in 1980.8945 Fed. Reg. 74676 (Nov. 10, 1980) (codified in 29 C.F.R. § 1604.11). The Supreme Court first solidified the cause of action in the 1986 decision, Meritor Savings Bank v. Vinson.90Meritor Sav. Bank, FSB v. Vinson, 477 U.S. 57 (1986). The foundation set forth in Meritor would be elaborated in subsequent Supreme Court rulings.91For example, in Meritor Savings Bank v. Vinson, the Supreme Court held that workplace sexual harassment is sex-based discrimination that violates Title VII of the Civil Rights Act of 1964 (“Title VII”).

In this Part, we discuss ten major limitations of harassment doctrine, which leave significant gaps and fail to protect many women who are subjected to harassment at work. If the laws are ineffective, this leaves many victims without remedy, while also failing to deter future harassment due to the lack of accountability, weak enforcement of existing law, and restricted access to justice. In Part III, we examine whether the flurry of state reforms during the height of the #MeToo movement began to acknowledge and address these gaps to meaningfully improve protection for working women. In the absence of federal reform, state reform serves as both a laboratory of innovation as well as a way to gauge bipartisan support.

A.  The Individuation of Harassment Evidence

As early as 1986 in Meritor v. Vinson, the Supreme Court imposed a compartmentalized frame on harassment cases, treating it as a matter of individual offenders and targeted victims as opposed to broader systemic harms in an organization. Meritor v. Vinson was brought by a Black woman, Mechelle Vinson, against her bank employer. Vinson was subject to sexual advances and repeated demands for sexual favors, fondled in front of other workers, followed to the restroom, and forcibly raped on several occasions by the bank vice president.92Meritor, 477 U.S. at 60. The bank had a grievance procedure, but it would have required Vinson to report the misconduct to her supervisor—the perpetrator of the harassment.93Id.

From the outset, the Court failed to assess Vinson’s story comprehensively. It treated her harassment as an isolated circumstance and refused to consider the evidence of harassment other women at the bank were experiencing alongside Vinson as relevant to the question of whether the harasser cultivated an environment that violates Title VII.94Tristin K. Green, Was Sexual Harassment Law a Mistake?, 128 Yale L.J.F. 152, 160 (2018). This was despite the lower court’s holding that even where a woman is not the object of harassment herself, there may be a valid Title VII claim if the atmosphere fostered pervasive harassment. Instead, Justice Rehnquist concluded that the District Court did not allow the presentation of a “wholesale evidence of a pattern and practice relating to sexual advances to other female employees in her case in chief.”95Meritor, 477 U.S. at 61.

This blinkered view of harassment is at odds with the concept of a hostile work environment, which can pervade and impact the workplace beyond one individual victim. The Court’s individualized approach also represents a marked departure from other claims available under Title VII. As early as the 1971 case of Griggs v. Dukes, the Court acknowledged that discrimination can operate systemically within a workplace and therefore permitted a wide variety of evidence from multiple sources.96Griggs v. Duke Power Co., 401 U.S. 424, 430 (1971). In these Title VII discrimination cases, including “disparate impact,” “pattern or practice,” or “systemic” cases, the law acknowledges group offenses, even if individual experiences of discrimination vary and are effectuated by multiple actors and systems within an organization.97Systemic Enforcement at the EEOC, U.S. Equal Emp. Opportunity Comm’n, https://www.eeoc.gov/systemic-enforcement-eeoc [https://perma.cc/QW4G-S8HG]. Consequently, the Court does not begin from the presumption that discrimination is limited to a single bad actor within the organization who has engaged in misconduct targeting a single individual.

Courts further compound the individuation of harassment claims through the routine enforcement of settlement and severance agreements containing non-disclosure provisions.98See Abigail Stephens, Contracting Away the First Amendment?: When Courts Should Intervene in Nondisclosure Agreements, 28 Wm. & Mary Bill Rts. J. 541, 542 (2019) (“[C]ourts regularly enforce even those contracts that require parties to waive their constitutional rights.”). Such non-disclosure provisions conceal harassment, making it difficult to detect and root out patterns of abuse.99Taishi Duchicela, Rethinking Nondisclosure Agreements in Sexual Misconduct Cases, 20 Loy. J. Pub. Int. L. 53, 64–65 (2018); Ditkowsky, supra note 61, at 96, 100. Settlement agreements commonly include non-disclosure provisions, and employers and their counsel often refuse to settle a case without some form of confidentiality provision. While some victims may want confidentiality,100Mutual non-disclosure can be a preferred approach for everyone involved—women of all backgrounds can be fearful of unwanted disclosure by their employer or the perpetrator. this requirement often pressures victims to sign and remain silent in order to achieve some type of closure. This manner in which non-disclosure provisions are included in settlement agreements serves to limit collective grievances, opportunities to negotiate, and accountability for repeat perpetrators and organizations that foster hostile work environments.

B.  Mandatory Arbitration Provisions

Access to legal justice under Title VII has also historically been barred for many workers by mandatory arbitration provisions. Approximately 56% of non-union private sector workers are required to sign mandatory private arbitration agreements,101Alexander J.S. Colvin, Econ. Pol’y Inst., The Growing Use of Mandatory Arbitration 9 (2017), https://files.epi.org/pdf/135056.pdf [https://perma.cc/NH6Y-8VYS]; Cynthia Estlund, The Black Hole of Mandatory Arbitration, 96 N.C. L. Rev. 679, 696 (2018) (estimating arbitration agreements had suppressed between 315,000 and 722,000 employment claims over the course of ten years). which represents roughly sixty million American workers.102Colvin, supra note 101, at 10. Of those, 30% have signed agreements that include class-action waivers.103Id. at 11. Arbitration agreements have become particularly prevalent since the 2011 Supreme Court ruling, AT&T v. Concepcion, which enabled companies to enforce class and collective action waivers through arbitration.104AT&T Mobility LLC v. Concepcion, 563 U.S. 333, 333–34 (2011); Am. Express Co. v. Italian Colors Rest., 570 U.S. 228, 228–29 (2013). Arbitration agreements divert claims from the public court system to private arbitration, in which neither the filings, rulings, nor proceedings are open to the public.105Jean R. Sternlight, Mandatory Arbitration Stymies Progress Towards Justice in Employment Law: Where To, #MeToo?, 54 Harv. C.R.-C.L. L. Rev. 155, 156–57, 175, 190 (2019); Duchicela, supra note 99, at 70–71 (“If an employee has signed an arbitration agreement, before or during their employment, their sexual misconduct claim will be preempted by the FAA.”). Even if the arbitration agreement does not require the victim to maintain the secrecy of the proceedings, arbitration is to a much greater extent shielded from public view, including media coverage and scholarly research.

Arbitration often offers poor remedies for the plaintiffs. When the arbitration agreement includes a class action waiver, the employee cannot file a collective claim in court or in arbitration, forcing them to bring an individual claim no matter the fact pattern.106Sternlight, supra note 105, at 177. Arbitration also offers few avenues for appeal, leaving workers little recourse if the arbitrator issues a bad ruling. Arbitration can further inhibit access to justice because claimants then have difficulty finding a lawyer willing to file a claim in arbitration when the deck is so heavily stacked against them. Research shows women of color are more likely to be denied access to courts than White women, due to mandatory arbitration.107Williams, supra note 7, at 1819. This is because of the particular prevalence of these clauses in low-wage industries where women of color are overrepresented.108Sidney A. Shapiro, Michael Duff, Tom McGarity & M. Isabelle Chaudry, Ctr. for Progressive Ref., Private Courts, Biased Outcomes: The Adverse Impact of Forced Arbitration on People of Color, Women, Low-Income Americans, and Nursing Home Residents 16–17 (2022), https://progressivereform.org/publications/private-courts-biased-outcomes-forced-arbitration-rpt [https://perma.cc/9UDC-RXL9]; see also M. Isabelle Chaudry & Jamillah Bowman Williams, Banning Workers from Suing Their Employer Hurts People of Color and Women Most, The Hill (Feb. 21, 2022, 4:30 PM), https://thehill.com/opinion/civil-rights/595208-banning-workers-from-suing-their-employer-hurts-people-of-color-and [https://web.archive.org/web/20250117234629/https://thehill.com/opinion/civil-rights/595208-banning-workers-from-suing-their-employer-hurts-people-of-color-and]. Thus, low-wage workers, who are already uniquely vulnerable to workplace violations including harassment and retaliation, suffer the most from contracts restricting their ability to access a court of law.

C.  Coverage Gaps Constrain Workers’ Access to Courts

Many workers are not covered by key antidiscrimination and labor law statutes, leaving them with no legal recourse regardless of the merits of the claim. Title VII only covers claims against “employers,” and by extension claims brought by “employees.”109Civil Rights Act of 1964, 42 U.S.C. § 2000e(b) (defining an “employer” as covered by the Act to be person with “fifteen or more employees”). This coverage restriction means that independent contractors lack any form of protection under Title VII. Independent contractors make up over a third of the nation’s workforce,110Williams, supra note 7, at 1817. and almost half of these unprotected independent contractors are women.111Id. Many of these are low-paid jobs in industries such as personal services, transportation, and educational services.112Id. Interns and student trainees also tend to be excluded from coverage as non-employees, even though their low status on the office hierarchy makes them easy targets for exploitation and poorly positioned to complain internally about their treatment. Women of color frequently land in these jobs due to the low barriers to entry, discrimination in other parts of the labor market, and the need for supplemental income.113Id. Research has shown that women and people of color are also overrepresented in most industries that tend to misclassify their workers as independent contractors.114Id. at 1818.

Title VII also largely excludes the most physically vulnerable low-wage workers from protection—often immigrants and women of color. For example, domestic workers who serve as housekeepers, nannies, babysitters, or home health care aides are often excluded from coverage if they are employed directly by individuals rather than agencies, as those individuals generally do not employ more than fifteen employees.115Id. at 1815–16. This means that women like live-in worker, Etelbina Hauser, report having nowhere to turn for legal protection despite being “consistently groped” and pressured for “sexual services.”116Ditkowsky, supra note 61, at 126. Domestic workers are often physically isolated from other workers, which further removes sources of social support and solidarity that might otherwise facilitate internal complaints and remediation. The physical isolation of private homes also tends to limit transparency and oversight of workplace practices. Thus, it is no surprise that studies indicate one-third of domestic workers face gender, race, language, or immigration-based abuse.117Terri Nilliasca, Some Women’s Work: Domestic Work, Class, Race, Heteropatriarchy, and the Limits of Legal Reform, 16 Mich. J. Race & L. 377, 403 (2011) (citing Domestic Workers United & DataCenter, Home Is Where the Work Is: Inside New York’s Domestic Work Industry 20 (2006), https://search.issuelab-dev.org/resources/2985/2985.pdf [https://perma.cc/MK43-NJLG]).

Undocumented workers are nominally covered by Title VII,118See Rios v. Enter. Ass’n Steamfitters Loc. Union 638 of U.A., 860 F.2d 1168, 1173 (2d Cir. 1988) (holding that Title VII must apply to undocumented workers, at least to the extent that those protections do not conflict with immigration laws); see also EEOC v. Tortilleria “La Mejor”, 758 F. Supp. 585, 590–91 (E.D. Cal. 1991) (finding Title VII applies to undocumented aliens). but the law does not prohibit workers from being fired—or deported—for their immigration status.119See Egbuna v. Time-Life Librs., Inc.,153 F.3d 184, 188 (4th Cir. 1998) (finding an employer cannot be held liable for refusing to hire someone who is not authorized to work in the United States); see also Cortezano v. Salin Bank & Tr. Co., 680 F.3d 936, 937 (7th Cir. 2012) (upholding summary judgment in favor of an employer where the plaintiff claimed under Title VII she was discharged because of her marriage to a Mexican immigrant). These workers are also unlikely to be awarded back pay due to their immigration status, which reduces the legal risk for employers.120Hoffman Plastic Compounds, Inc. v. Nat’l Lab. Rels. Bd., 535 U.S. 137, 151 (2002) (finding the NLRB did not have the authority to award back pay to undocumented workers who were illegally fired for engaging in protected labor organizing activity because they were not legally present in the United States). Immigrant workers make up a majority of the workforce in specific industries, including agricultural work.121Labor-Intensive Industries, New Am. Econ., https://www.newamericaneconomy.org/issues/labor-intensive-industries [https://perma.cc/38F7-T9DN]. In these cases, the threat of termination or deportation largely cuts off any meaningful access to justice and makes them particularly vulnerable targets for harassment.

Coverage gaps that predominantly affect women of color and immigrants are no historical accident.122See infra Part II.A.1. As previously discussed, occupations in which women of color and immigrants predominated were intentionally excluded from landmark federal employment legislation in the twentieth century.123Williams, supra note 7, at 1814–15. Employers have continued to treat women of color both as invisible and as their labor to control. Roles like nannies and maids are disproportionately held by immigrant women of color, traditionally employed in private homes of the mostly White middle- and upper-class, where a lack of transparency and adequate oversight gives employers the liberty to take advantage of these workers.124Heidi Shierholz, Econ. Pol’y Inst., Low Wages And Scant Benefits Leave Many In-Home Workers Unable To Make Ends Meet 2–3 (2013), https://www.epi.org/publication/in-home-workers [https://perma.cc/AB9T-79TF].

D.  Retaliation Law and Its Effect on Underreporting

The legal standard for Title VII retaliation claims, which requires the plaintiffs to show that the retaliatory conduct was “materially adverse,” fails to deter low-level and informal retaliation.125Burlington Northern v. White, 548 U.S. 53, 68 (2006); Civil Rights Act of 1964, 42 U.S.C. §§ 2000e–00e-17; Daiquiri J. Steele, Protecting Protected Activity, 95 Wash. L. Rev. 1891, 1893, 1897 (2020); Daiquiri J. Steele, Enforcing Equity, 118 Nw. U. L. Rev. 577, 581–82 (2023). Most courts find neither ostracizing nor harassing conduct to rise to the level of an adverse employment action for purposes of a retaliation claim under Title VII.126It is possible that the Supreme Court’s recent decision in Muldrow v. City of St. Louis, Missouri, which lowered the standard for adversity in proving a discrimination claim, may influence the standard of adversity required to prove a retaliation claim. 601 U.S. 346, 359, 977 (2024). They construe the harm as not significant enough to deter someone from filing a charge.127Nicole Buonocore Porter, Ending Harassment by Starting with Retaliation, 71 Stan. L. Rev. Online 49, 54 (2018). Courts have even held that a negative performance review is not sufficiently “material” to support a retaliation claim.128Id. And, as previously noted, judges with lifetime or fixed-term appointments may not recognize the threat that would deter a reasonable worker who lacks such security. One study, for example, revealed that many of the employment actions courts have held not “materially adverse” would actually dissuade participants from reporting.129Id. at 55.

The threat of retaliation can be a particularly powerful deterrent for marginalized populations.130Daiquiri J. Steele, Enduring Exclusion, 120 Mich. L. Rev. 1667, 1670–71 (2022). Underrepresented groups within a particular workplace—such as women in non-traditional occupations, or women of color in majority White occupations—have less access to internal social networks and political capital within the workplace, which both increases the likelihood and the detrimental effect of informal social sanctions. The fear of job loss and unemployment for a low-wage worker can be so economically threatening to the employee’s livelihood that it deters them from reporting even extreme misconduct. Concerns about retaliatory deportation can weigh even more heavily on an employee’s decision-making. Moreover, even where actual retaliation is absent, workplace culture that fosters the threat of retaliation alone can deter victims from reporting.

Fears about retaliation for at-will employees who complain about harassment are particularly well-founded, despite whatever assurances human resources may provide about the company’s policy regarding retaliation. Even though retaliation for speaking up against harassment and discrimination is prohibited by law, it is a common workplace reality.131Daiquiri J. Steele, Rationing Retaliation Claims, 13 U.C. Irvine L. Rev. 993, 995 (2023). Complainants may face formal action, such as termination, demotion, or pay cuts, as well as informal social sanctions. These repercussions originate not only from the perpetrator, but also from co-workers or supervisors who side with the perpetrator or perceive the complaint as disruptive. Studies have demonstrated that these negative consequences, such as being ostracized by coworkers, more often than not follow harassment reports.

E.  Rigid Administrative Exhaustion Requirements Block Access to Justice

Title VII’s administrative filing requirement imposes a notably short time window—less than a year—for the plaintiffs to bring a harassment claim. Before Title VII claimants can file a lawsuit against an employer, they must file an administrative claim with the EEOC within 180 days of the last occurrence of harassment.132Civil Rights Act of 1964, 42 U.S.C. § 2000e-5(e)(1); Nat’l R.R. Passenger Corp. v. Morgan, 536 U.S. 101, 117 (2002) (“It does not matter, for purposes of the statute, that some of the component acts of the hostile work environment fall outside the statutory time period. Provided that an act contributing to the claim occurs within the filing period, the entire time period of the hostile environment may be considered by a court for the purposes of determining liability.”). State discrimination laws generally do not offer substantially more lenient administrative filings deadlines. Many set the deadline at 180 days; some at 300 days. Even the most generous states do not exceed one year. Any lawsuit brought by an employee that has failed to timely file an administrative claim will be dismissed for failing to exhaust administrative remedies. This aggressive window can be unrealistic for traumatized workers who may be afraid to speak up about harassment or who may not recognize that the workplace harms they suffered qualified as unlawful harassment until years later. The narrow administrative filing window can be particularly detrimental for the vulnerable workers previously described, who may be concerned about retaliation and job loss.

These workers might reasonably choose job security over the possibility of a lawsuit, such that they may not be ready to file a legal claim until they have secured adequate support or alternate employment. Moreover, gaps in access to legal services and information often preclude workers from even knowing about the administrative filing requirement.

F.  Severe or Pervasive Requirement Excludes Strong Claims

To prove harassment under Title VII, the plaintiffs must show that they were subject to unwelcome comments or conduct on the basis of a protected category (race, sex, religion, color, or national origin) that was so “severe or pervasive” as to alter the conditions of the plaintiffs’ employment and create a “hostile or abusive work environment.”133Meritor Sav. Bank, FSB v. Vinson, 477 U.S. 57, 66–68 (1986). The “severe or pervasive” language originated in Meritor, although the court did not initially define the term.134Id. In a subsequent 1993 ruling, Harris v. Forklift, the Supreme Court elaborated on the meaning of the phrase by listing several non-exhaustive factors that affect whether conduct is deemed severe or persuasive: (1) the frequency of the conduct; (2) the severity of the conduct; (3) whether is the conduct is physically threatening, humiliating, or “a mere offensive utterance”; and (4) whether the conduct unreasonably interferes with work performance.135Harris v. Forklift Sys., Inc., 510 U.S. 17, 17 (1993).

As several commentators have observed, the “severe or pervasive” requirement has evolved to impose a very high burden of proof on the victim.136Judith J. Johnson, License to Harass Women: Requiring Hostile Environment Sexual Harassment to Be “Severe or Pervasive” Discriminates Among “Terms and Conditions” of Employment, 62 Md. L. Rev. 85, 85–86 (2003); Sandra F. Sperino & Suja A. Thomas, Boss Grab Your Breasts? That’s Not (Legally) Harassment, N.Y. Times (Nov. 29, 2017), https://www.nytimes.com/2017/11/29/opinion/harassment-employees-laws-.html; Sandra F. Sperino & Suja A. Thomas, Unequal: How America’s Courts Undermine Discrimination Law 30–52 (David Kairys & David McBride eds., 2017). For example, lower courts have inconsistently and often improperly interpreted the type of conduct necessary for a violation. In some courts, the standard has been deemed so high that it may reject claims for conduct that may be egregious, offensive, and in some cases even criminal.137Johnson, supra note 136, at 86. This significantly impacts outcomes of cases, as the “severe or pervasive” requirement has become a common basis on which courts grant summary judgment against the plaintiffs. Judges have ruled that things like indecent exposure, being threatened and referred to as a Black bi[***], and being offered pornography by one’s boss, are not sufficiently severe or pervasive, thus dismissing the cases on summary judgement.138Williams, supra note 7, at 1823. This leaves the plaintiff demoralized and without remedy and allows the employer to shield itself from accountability.139Sperino & Thomas, supra note 136, at 30–52. Summary judgment rulings, as Sandra Sperino has observed, are particularly problematic in employment contexts, in which a predominantly White male judiciary substitutes its own experiences, perspectives, and biases for those of a jury, whose experiences more closely reflect that of the various parties involved in the litigation.

Other lower courts have misinterpreted the Harris v. Forklift opinion to require that conduct be “severe, frequent and physically threatening,” effectively requiring severe and pervasive conduct that is also physical in nature.140Williams, supra note 7, at 1826. In McGraw v. Wyeth-Ayerst Laboratories, for example, the court held that repeated propositions, yelling, and non-consensual kissing by a supervisor was neither severe nor pervasive.141Id. Extreme lower court rulings can have a lasting effect, as courts later rely on those fact patterns and judicial interpretations to justify outcomes in favor of employers in subsequent cases.142Sperino & Thomas, supra note 136, at 37.

G.  The “Objectively” Hostile or Abusive Standard is Out of Touch

Closely related to the “severe or pervasive” requirement is the requirement that the working environment be both “subjectively” and “objectively” hostile or abusive. This means that the plaintiff perceived the conduct as hostile or abusive, and that a “reasonable person” in that situation would have found it hostile or abusive.143Harris v. Forklift Sys., Inc., 510 U.S. 17, 21–22 (1993).

Defining reasonableness has proven difficult as courts appear to lack a clear standard.144Danielle A. Bernstein, Reasonableness in Hostile Work Environment Cases After #MeToo, 28 Mich. J. Gender & L. 119, 124 (2021); see also Danielle Bernstein, #MeToo Has Changed the World—Except in Court, The Atl. (Aug. 13, 2021), https://www.theatlantic.com/ideas/archive/2021/08/metoo-courts/619732 [https://perma.cc/FWL2-V6G3]. In a 1998 case, Oncale v. Sundowner Offshore Services, Inc., the Court further noted that ensuring whether or not something is objectively hostile or abusive is crucial to “ensure that courts and juries do not mistake ordinary socializing in the workplace . . . for discriminatory ‘conditions of employment.’ ”145Oncale v. Sundowner Offshore Servs., Inc., 523 U.S. 75, 81 (1998). Here, the Supreme Court clarified that determining severity “requires careful consideration of the social context in which particular behavior occurs.”146Id.; see Michael J. Frank, The Social Context Variable in Hostile Environment Litigation, 77 Notre Dame L. Rev. 437, 437 (2002); Melissa K. Hughes, Through the Looking Glass: Racial Jokes, Social Context, and the Reasonable Person in Hostile Work Environment Analysis, 76 S. Cal. L. Rev. 1437, 1439 (2003).

The “objective” component of the hostile or abusive standard has also proven problematic. In the summary judgment context, judges superimpose or extrapolate from their own experiences when deciding what a “reasonable person” would consider hostile and abusive.147Hughes, supra note 146, at 1480. Yet, the judge’s own assumptions about tolerable behavior can be tainted by white and male privilege in ways they may not recognize. As previously discussed, the pervasive influence of hegemonic masculinity can lead judges to discount hostile aspects of the work environment simply because they are commonplace or fit within traditional workplace norms.148Id. at 1476–77.

For example, in Oncale, Justice Scalia recounted a variety of workplace behaviors that he considered inoffensive, such as a football player being smacked on the buttocks by his coach—which very well could be experienced as hostile.149Oncale, 523 U.S. at 82. However, when courts—and juries—are instructed to ignore the plaintiff’s actual (subjective) experience and focus on what a hypothesized “reasonable” (objective) other would consider harassment, it is an implicit invitation to default to a framework wherein workplace culture is largely defined by and governed by White men.150Onwuachi-Willig, supra note 65, at 110; see also Hughes, supra note 146, at 1472–73.

Broader representation in the judiciary may begin to address this bias. In other research, we have found that there is a significant disconnect between judges’ assessments of what is “objectively” abusive and hostile and a layperson’s assessment, which may mean that judges are disconnected from social realities and evolving social norms.151Elizabeth C. Tippett & Jamillah B. Williams, Misjudging a Reasonable Jury: Evidence that Courts Dismiss Meritorious Harassment Claims (forthcoming Conn. L.J. 2025). However, bias does not only impact judges. Racialized and sex stereotypes can also color perceptions of witnesses, fact finders, and others, clouding their view whether the plaintiff contributed to the harassment, the extent to which they feel the plaintiff is harmed by the perpetrator, and whether enduring the conduct is deemed acceptable and within the realm of their role as worker.152Onwuachi-Willig, supra note 65; see also Hughes, supra note 146, at 1439–40.

H.  The Standard for Vicarious Liability

As a general matter, when an employee commits a Title VII violation, the law imposes strict liability.153Meritor, 477 U.S. at 70–71; Faragher v. City of Boca Raton, 524 U.S. 775, 791 (1998). For example, when an employee engages in sex-based discrimination or retaliates against an employee for speaking out about it, courts do not inquire whether the employer should be held vicariously liable for the conduct. Employers are simply liable for the violation. Harassment, however, is the exception. In Meritor, the Supreme Court first raised the question of whether there might be some circumstances in which employers might not be held vicariously liable for harassment.154Id. at 69–72. This question was settled in two 1998 cases decided together, Burlington Industries v. Ellerth and Faragher v. City of Boca Raton (“Faragher/Ellerth”).155Burlington Indus., Inc. v. Ellerth, 524 U.S. 742 (1998); Faragher, 524 U.S. at 775. In these two cases, the Supreme Court imported tort principles into the employment discrimination context. The majority opinions held that employers would only be held strictly liable for harassment committed by a supervisor when the plaintiff experienced a tangible employment action, such as a demotion, firing, or pay cut.156Burlington Indus., 524 U.S. at 745; Faragher, 524 U.S. at 777–78. The Court also imposed a negligence standard when coworkers were responsible for harassment. Under this rule, employers would only be held liable for harassment that they knew or should have known about, and they failed to take action to correct it.157Burlington Indus., 524 U.S. at 744–45; Faragher, 524 U.S. at 799–800.

In cases involving supervisory harassment, in which the plaintiff suffered no tangible employment action, the Court created a new affirmative defense for employers. Even when a plaintiff proves a successful harassment case—which is an uphill battle due to the constraints discussed in this section—the employer can assert an affirmative defense to evade liability. Joanna Grossman argued that the defense effectively insulates employers from liability following an initial complaint about harassment.158Joanna L. Grossman, The First Bite Is Free: Employer Liability for Sexual Harassment, 61 U. Pitt. L. Rev. 671, 705 (2000); Elizabeth C. Tippett, The Legal Implications of the MeToo Movement, 103 Minn. L. Rev. 229, 240 (2018). To assert the defense, an employer must show that it “exercised reasonable care to prevent and correct promptly any sexually harassing behavior, and that the plaintiff employee unreasonably failed to take advantage of any preventive or corrective opportunities provided by the employer or to avoid harm otherwise” (the “Faragher/Ellerth defense”).159Burlington Indus., 524 U.S. at 765; Faragher, 524 U.S. at 807.

Beyond the exceptional nature of the Court’s departure from a strict liability framework, courts have also interpreted the Faragher/Ellerth defense in an expansive manner, favoring employers. In many cases, courts merely require employers to maintain anti-harassment and complaint policies, without inquiring into the effectiveness or reviewing the culture broadly.160Lauren B. Edelman, Christopher Uggen & Howard S. Erlanger, The Endogeneity of Legal Regulation: Grievance Procedures as Rational Myth, 105 Am. J. Socio. 406, 448–49 (1999); see also Lauren B. Edelman & Jessica Cabrera, Sex-Based Harassment and Symbolic Compliance, 16 Ann. Rev. L. & Soc. Sci. 361, 372–77 (2020) (identifying several cases in which courts applied the Faragher/Ellerth defense despite evidence that the employer’s complaint process was flawed). This trend of “judicial deference” is largely why anti-harassment policies and practices have proliferated in the workplace, many of which have been found to be ineffective at curbing harassment.161Lauren B. Edelman, Working Law: Courts, Corporations, and Symbolic Civil Rights, 173–74, 184–88 (John M. Conley & Lynn Mather eds., Univ. Chi. Press 2016) (arguing that judicial deference to internal employer systems significantly reduces the incentive for employers to ensure that they offer fair or just outcomes to employees who make use of those systems); Lauren B. Edelman, Linda H. Krieger, Scott R. Eliason, Catherine R. Albiston & Virginia Mellema, When Organizations Rule: Judicial Deference to Institutionalized Employment Structures, 117 Am. J. Socio. 888, 891 (2011); Susan Bisom-Rapp, Fixing Watches with Sledgehammers: The Questionable Embrace of Employee Sexual Harassment Training by the Legal Profession, 24 T. Jefferson L. Rev. 125, 145 (2002); Frank Dobbin & Alexandra Kalev, The Promise and Peril of Sexual Harassment Programs, 116 Proc. Nat’l Acad. Scis. 12255, 12258–60 (2019).

Likewise, the Faragher/Ellerth defense directs the blame for a hostile work environment on a plaintiff who was slow or reluctant to complain internally, rather than on the perpetrator or the employer. However, high rates of retaliation give many employees a valid reason to pause when reporting harassment or otherwise using grievance procedures.162At the summary judgment stage, judges are invited to apply their own professional experiences and biases as to whether they would feel comfortable reporting inappropriate behavior, a perspective that is likely very different from a female plaintiff, especially a woman of color, immigrant, or low-wage worker. See also Edelman, supra note 161, at 173–74, 184–88; Dobbin & Kalev, supra note 161, at 12255, 12258–59. Only one in four women subjected to sex-based harassment reported it using an internal grievance procedure; even fewer filed a charge with the EEOC.163Dobbin & Kalev, supra note 161, at 12255. At present, it is possible for a plaintiff to file a hostile work environment claim, and, despite evidence to her benefit, lose merely because she herself failed to utilize the internal grievance procedures created by the employer.164Green, supra note 94, at 164.

I.  Damage Caps Fail to Remedy Harms

The remedies available in Title VII cases include injunctive relief, reinstatement,165Front pay is available as an equitable remedy where reinstatement is infeasible or inappropriate. Pollard v. E. I. du Pont de Nemours & Co., 532 U.S. 843, 843 (2001). back pay, compensatory damages, punitive damages, and attorneys’ fees and costs.166Civil Rights Act of 1964, 42 U.S.C. § 2000e-5(g); 42 U.S.C. § 1981 (1991 Amendment to Title VII that provided for compensatory damages and punitive damages; punitive damages available for discrimination “with malice or with reckless indifference to the federally protected rights of an aggrieved individual”); Albemarle Paper Co. v. Moody, 422 U.S. 405, 405–06 (1975) (affirming that backpay may be available as a remedy for Title VII claims based on practices occurring after the effective date of Title VII, July 2, 1965); Kolstad v. Am. Dental Ass’n, 527 U.S. 526, 534 (1999) (interpreting “malice” and “reckless indifference” standard for purposes of punitive damages). Compensatory damages—that is, damages for pain and suffering—are subject to a statutory cap according to employer size.16742 U.S.C. § 1981(a), (b)(3). For employers with fewer than one hundred employees, compensatory and punitive damages cannot exceed $50 thousand; for two hundred or fewer employees, the cap is $100 thousand; for five hundred or fewer, the cap is $200 thousand; and for five hundred employees or more, the cap is $300 thousand.168Id.

Damage caps for compensatory and punitive damages can be particularly harmful in harassment cases when devastating psychological effects are common.169Mamoona Mushtaq, Safia Sultana & Iqra Imtiaz, The Trauma of Sexual Harassment and Its Mental Health Consequences Among Nurses, 25 J. Coll. Physicians & Surgeons Pak. 675, 676 (2015). Such effects can include suffering from depression, anxiety, stress, post-traumatic stress disorder, suicidal ideations, and adjustment disorders, among others.170Id. at 675. One study found that nurses who experience sexual harassment are three to eight times more likely to suffer from depression than women who were not harassed.171Id. These negative mental health outcomes have also been shown to have profound impact on long-term job-related outcomes, including lack of initiative, lower job satisfaction, increased propensity to leave, and financial problems.172Id. at 675–76.

In addition, other forms of available relief may not be especially meaningful in harassment cases. Although some employees quit or are fired in connection with workplace harassment, many harassment victims continue to work throughout the abuse, making them ineligible for back pay. Ironically, staying longer and enduring more prolonged harassment and abuse may end up resulting in lower damages. This is particularly problematic for low-wage workers who are economically vulnerable and cannot afford to quit their jobs. Conversely, if the employee was terminated, reinstatement may not be a useful remedy, as the plaintiff may be reluctant to return to an abusive workplace. Compensatory and punitive damages, along with attorneys’ fees and costs, may be the most important forms of relief available to harassment claimants. Yet, damage caps force courts and juries to limit relief to the plaintiffs to whom they might have made a much larger award to compensate for pain and suffering and to punish the employer for maintaining a hostile work environment.17342 U.S.C. § 1981a(b)(3).

Damage caps also limit access to justice. Because many plaintiff-side lawyers operate on contingency fees, a harassment claimant suing a small or even mid-size employer may have difficulty finding a lawyer willing to sue when the maximum recovery is less than $100 thousand. The effect of damage caps can be especially pronounced for low-wage workers, women of color, and immigrant workers engaged in domestic work or agricultural labor. When the size of recoverable wages is low due to a low base wage, plaintiffs are even more reliant on compensatory and punitive damages to attract the interest of a potential lawyer. Domestic workers, agricultural workers, and even restaurant and food-service workers may find themselves on the low end of the damage caps because they work for smaller operations. In such cases, a worker’s ability to find legal representation may ultimately depend on whether they can allege a separate tort or statutory claim not subject to the damage caps or whether they live in a state that offers more generous discrimination remedies under state law.

Damage caps also reduce deterrent effects on delinquent employers.174Section 1981 claims, for example, are not subject to damage caps, but can only be brought on the basis of race. Id. § 1981; see Saint Francis Coll. v. Al-Khazraji, 481 U.S. 604, 610 (1987); Shaare Tefila Congregation v. Cobb, 481 U.S. 615, 617 (1987). With minimal penalties, many employers are disincentivized to improve their responses to sexual misconduct in the workplace or to change workplace culture. Once again, vulnerable workers are doubly cursed—their employers know that their workers may not be covered by the statute, and even if they are covered, they may not find an attorney or recover very much. Facing little prospect of a big-ticket lawsuit, employers in these industries can turn a blind eye to harassment with little fear of accountability.

J.  Implied Hierarchy of Harassment Claims

Even prior to the #MeToo movement, the dominant narrative surrounding workplace harassment involved a subordinate White woman subjected to unwelcome sexual conduct or requests for sexual favors by a high-ranking White man. This scenario, for example, commonly appeared in early harassment training from the 1980s and 1990s.175Tippett, supra note 32, at 485. It was also, to some extent, reflected in the earliest EEOC regulations, which defined harassment in terms of sexual conduct and specifically referenced “quid pro quo” harassment, in which a supervisor requests sexual favors in exchange for some workplace benefit or the avoidance of harm.176MacKinnon, supra at 32, at 32–40; U.S. Equal Emp. Opportunity Comm’n, EEOC-CVG-1990-5, Policy Guidance on Employer Liability Under Title VII for Sexual Favoritism (1990) (superseded by U.S. Equal Emp. Opportunity Comm’n, EEOC-CVG-2024-1, Enforcement Guidance on Harassment in the Workplace (2024)).

This frame was not, however, compelled by the case law,177The earliest lower court rulings to recognize harassment claims involved a Latina dental assistant who was aggrieved by her employer’s decision to segregate its dental patients, and a religious harassment claim, which involved a Jewish employee subject to numerous derogatory epithets. Rogers v. EEOC, 454 F.2d 234, 236 (5th Cir. 1971); Compston v. Borden, Inc., 424 F. Supp. 157, 160 (S.D. Ohio 1976). As previously noted, the first Supreme Court case to recognize harassment, Meritor, was brought by a Black woman. Subsequent Supreme Court jurisprudence involved a variety of plaintiffs and fact patterns, including: a White woman subjected to denigrating sexual and gender-based comments by her supervisor (Harris v. Forklift), White female lifeguards subject to sexual conduct by their supervisors and ignored by human resources (Faragher), a White man subjected to humiliating and violent conduct by his male coworkers (Oncale), and a Black woman subject to racial slurs and taunting by a White woman (Vance v. Ball State). Harris v. Forklift Sys., Inc., 510 U.S. 17, 19 (1993); Faragher, 524 U.S. at 775–83; Oncale, 523 U.S. at 75; Vance v. Ball State Univ., 570 U.S. 421, 421–25 (2013). and it operates to the disadvantage of all other harassment claims that do not involve sexual conduct or that are brought on the basis of other protected classes. Intersectional claims brought on the basis of more than one protected category—often women of color experiencing racism and sexism—are at particular disadvantage.

Nowhere in the case law does the Supreme Court assert that sexual conduct forms a necessary part of a harassment claim or that certain protected classes are more deserving of relief than others.178Oncale, 523 U.S. at 79. The EEOC filing statistics also dispute the implicit narrative that sexual harassment claims predominate over other types of harassment claims. Nevertheless, the narrative of harassment as primarily a problem of sexual misconduct toward White women has had a measurable effect on lower court jurisprudence over time. This effect is well-documented in scholarly literature. Indeed, Pat Chew and Robert Kelly’s empirical study of harassment claims concluded that judges tend to discount race-based harassment claims.179Pat K. Chew & Robert E. Kelley, Myth of the Color-Blind Judge: An Empirical Analysis of Racial Harassment Cases, 86 Wash. U. L. Rev. 1117, 11660–63 (2009). Women of color pursuing litigation are further marginalized due to the courts’ pressure to separate out experiences of harassment into the false dichotomy of “Because of Race” or “Because of Sex,” when these are commonly intertwined.180Jamillah Bowman Williams, Beyond Sex-Plus: Acknowledging Black Women in Employment Law and Policy, 25 Emp. Rts. & Emp. Pol’y J. 13, 18–19 (2021). Empirical research has found that plaintiffs bringing intersectional claims are less than half as likely as plaintiffs bringing single claims to win their cases.181Williams, supra note 7, at 1822. Even within those statistics, Black women are more likely to lose their cases than Black men who bring intersectional claims, such as those based on both race and age.182Id.

In summary, harassment law is subject to a variety of gaps that enabled workplace harassment to continue in the decades leading up to the #MeToo movement. Next, we turn to the question of whether the many legislative reforms wrought by the #MeToo movement addressed these gaps.

III.  An Empirical Analysis of State and Federal Gender Equity Legislative Activity, 2016–2022

In previous scholarship, we discussed the ability of social movements to promote legal change.183Jamillah Bowman Williams, Naomi Mezey & Lisa Singh, #BlackLivesMatter—Getting from Contemporary Social Movements to Structural Change, 12 Calif. L. Rev. Online 1, 1 (2021) [hereinafter Williams et al., #BlackLivesMatter: Getting from Contemporary Social Movements]; Jamillah Bowman Williams, Naomi Mezey & Lisa Singh, #BlackLivesMatter: From Protest to Policy, 28 Wm. & Mary J. Race, Gender & Soc. Just. 103, 104 (2021) [hereinafter Williams et al., #BlackLivesMatter: From Protest to Policy]. While the window of opportunity may be small, #MeToo, like the mass Black Lives Matter protests during the summer of 2020, has the potential to generate staying power and remain influential on legal policy.184Williams et al., #BlackLivesMatter: From Protest to Policy, supra note 183, at 105. This is especially true if lawmakers, courts, and agencies follow the lead of workers who have been organizing for harassment-free workplaces long before #MeToo.185Id.; see also Steele, supra note 130, at 1667. Doing so will provide stakeholders an appropriate goalpost that they can measure their efforts against as they attempt to mitigate workplace harassment.

This Article builds on prior work that has begun to investigate the legal implications of #MeToo, but does so with an emphasis on empirical analysis.186See generally Tippett, supra note 158 (discussing the various legal issues raised by the #MeToo Movement); Williams et al., supra note 1 (analyzing the #MeToo movement as a form of social media activism, examining its impact on public discourse regarding sexual harassment and assault, and exploring its potential to effect lasting social, legal, and political change). The questions we explore include: (1) Has #MeToo effectively shifted the law forward in addition to raising awareness and sparking debate? (2) What topics were centered in bills versus introduced as secondary topics within proposed legislation? (3) To what extent did political factors such as state party lines and representation of women lawmakers influence the volume of bills introduced and passed? (4) To what extent did legislators take a comprehensive versus a narrow approach to workplace harassment?

A.  Methodology

To examine the actual and potential policy changes following #MeToo, our research team collected a corpus of 3,916 state bills187The search covered all fifty states plus the District of Columbia. and 255 federal bills relating to workplace gender equity, discrimination, and harassment that were introduced between 2016 and 2022. The corpus was collected through a legislative search of Legiscan, NexisUni, and Westlaw using seventy-five different search terms intended to identify relevant legislation.188See infra Appendix A. We collected data from these three databases as they are the most prevalent legislative databases and likely to collectively contain the most relevant data.

The search terms were generated to identify a broad range of workplace gender equity legislation rather than more narrowly-focused harassment bills for several reasons. As articulated in Part II, harassment is a complex systemic problem stemming from a variety of social, political, and cultural factors. To the extent legislation helps to address the underlying inequity—such as pay equity—the intervention may ultimately help to reduce harassment indirectly over time.189See infra at Section II.F. We therefore sought to capture the full range of legislative interventions to enable us to evaluate them collectively. Taking a broader approach to harassment reform also allows us to identify patterns in and across legislative bills, including the extent to which the bills are: (a) individualized, offering siloed remedies for individual cases; (b) institutionalized, delegating responsibility to employer training, policy or practices; or (c) systemic, which are broader in scope and affecting many workers across industries.

The initial corpus contained a substantial number of duplicative bills, typically as a result of near-identical legislation that was introduced separately in both the House of Representatives and the Senate of a particular state legislature. Potential duplicates were flagged manually based on similar or identical bill names, numbers, or descriptions. The textual similarity of potential duplicates were then assessed using the “compare” function in Adobe Acrobat Pro, which counts and highlights all textual differences. Pairs of bills where 80% or more of the text was identical were deemed duplicates, and one copy of the duplicate bill was discarded for the substantive coding and quantitative analysis. The final corpus analyzed herein contained 3,012 state bills and 255 federal bills (“Legislative Corpus”).

We then coded for the substantive topic of the bills pulled into our dataset through the criteria listed in Table 1.190This variable captures what the researchers believe to be the Primary topic. When bills cover two or more topics, the additional topics are coded as Secondary topics. Bills fell into one of eleven topic groups, as defined below.

 

Table 1.  State Legislative Topics

Topic

Definition

Transparency

Bills that implement new reporting or recordkeeping on employers regarding harassment or assault, or that restrict the use of non-disclosure provisions in employment contracts or settlement agreements.

Government Officials & Contracts

Bills that regulate the conduct of government officials, lobbyists or government contractors, such as requirements that legislatures adopt harassment policies for members; prohibiting public funds from being used to settle harassment claims; or requiring state contractors to adopt certain employment practices.

Anti-Harassment Practices

Bills that require some or all employers to adopt anti-harassment practices, such as training, policies, notices, or procedures to investigate harassment. Also includes bills that extend unemployment benefits to employees who quit due to harassment.

Anti-Discrimination Law

Bills that extend or expand anti-discrimination protections, such as expanding coverage or adding new protected categories such as sexual orientation, family status, marital status, or victims of domestic violence.

Leave

Bills that mandate paid or unpaid leave or that provide for accommodation for pregnant or nursing mothers.

Pay Equity

Bills that alter legal rules, hiring practices, or compensation practices relating to pay disparities or withholding of promotion or opportunities on the basis of sex, such as equal pay laws, prohibitions on requesting salary history, protection for pay discussions in the workplace, or mandatory pay disclosures.

Occupational

Bills that expand or create legal protections for sectors or occupations that predominantly employ women such as domestic work, hospitality, hotels, and janitorial services.

 

Enforcement

Bills that alter or expand legal rules or remedies relating to harassment, discrimination, leave/accommodation, equal pay, non-disclosure agreements, private arbitration, or workplace bullying.

Mandatory Arbitration

Bills that attempt to alter the enforceability of private arbitration provisions in employment contracts.

Equal Rights Amendment

Bills that ratify or pass the Equal Rights Amendment.

Othera

Bills that do not fit into the above categories, many of which are symbolic in nature, such as designating “Equal Pay Day,” establishing commissions or reports. Also includes laws regarding vocational training in non-traditional occupations, and gender diversity in boards of directors.

Note:  a The bulk of the “Other” category consists of bills that engage with harassment or gender equity symbolically rather than substantively. Examples include bills that create Days or Months to honor gender inequities that other bills in the dataset are seeking to redress. Other bills considered symbolic are those that commission Task Forces or Studies on harassment or gender equity reform more broadly. The rest of the “Other” category were outliers such as grants or vocational training for women in “High-Wage, High-Demand” jobs, regulation on law enforcement and military, and bills requiring the appointment and disclosure of women on boards.

 

Each bill summary was reviewed and coded by a member of our five-person research team, which included four researchers with a J.D. and an economics Ph.D. fellow. Where the summary was not sufficient to code the bill into one of the above-listed categories, the researcher reviewed the full text of the bill. Bills that fell outside the scope of the study—such as laws relating to cyberbullying, rape kits, or “street harassment”—were removed from the Legislative Corpus.

Many of the bills in the Legislative Corpus were “bundled,” that is, they sometimes included a variety of separate measures.191See infra Table 2. Where a given bill covered more than one of the relevant topics, it was coded using a “primary” topic and any additional topics received a “secondary” classification. For example in 2019, the Connecticut legislature introduced a bill that would amend multiple statutes to establish “economic equality for women,” including by requiring equal pay for equal work, increasing the minimum wage, requiring paid family and medical leave, and requiring annual anti-harassment training for companies with fewer than twenty employees among others.192S.B. 68, Gen. Assemb. (Conn. 2019). Thus, while this bill was coded primarily as a Pay Equity bill, it also was secondarily classified under Anti-Harassment Practices, Leave, and others.

Where bills presented a close case regarding the applicable category, members of the team discussed the bill and made a final decision. Coding decisions were also cross-checked using keyword searches within the Legislative Corpus specific to each subcategory.193See infra Appendix B. Keyword searches within the corpus were performed using the Quanteda package in R. See Kenneth Benoit, Kohei Watanabe, Haiyan Wang, Paul Nulty, Adam Obeng, Stefan Müller, Akitaka Matsuo, William Lowe & Eur. Rsch. Council, Quanteda: Quantitative Analysis of Textual Data, quanteda, https://quanteda.io [https://perma.cc/T78F-63TZ]. Keyword searches within the Legislative Corpus were also used to populate subcategories of bills within the “Enforcement” category relating to harassment law reforms.194These subcategories are illustrated in Table 1, infra, under the “Enforcement” category.

B.  Volume of Gender Equity Legislation Post #MeToo

  1. Federal Reforms

The #MeToo movement produced few legislative successes at the federal level between 2016 and 2022. Although many bills were introduced, few of them passed. By contrast, there has been a massive wave of #MeToo-related legislation at the state level. This flurry of legislative activity took place in statehouses across the country and continued for a sustained period—extending throughout 2022.

In the U.S. Congress, from 2016 to 2022, 255 bills were introduced relating to sexual harassment, sexual assault, and gender equity in employment.195See infra Figure 2. There was a sharp rise in bills between 2016 and 2017, from twenty to fifty-nine. Congress continued to introduce legislation at a high rate in 2018 and 2019—reaching thirty-eight bills in 2019. Proposed legislation then dropped sharply in 2020, with five bills introduced that year.

Figure 2.  Federal Gender Equity Bills (2016–2022)

At the federal level, only six #MeToo related bills passed during the sample period, and three of those bills are very limited in scope. The most wide-reaching bill was the Ending Force Arbitration of Sexual Assault and Sexual Harassment Act of 2021, discussed in greater detail in Part V.E.196Pub. L. No. 117-90, 136 Stat. 26 (2022) (codified at 9 U.S.C. §§ 401–02). In 2022, Congress also passed the Speak Out Act of 2022, which limits the enforceability of non-disclosure and non-disparagement clauses relating to sexual harassment and assault.197Pub. L. No. 117-224, 136 Stat. 2290 (2022) (codified at 42 U.S.C. §§ 19401–04). Another substantive change came from the National Defense Authorization Act for Fiscal Year 2022, which created additional reporting requirements for sexual harassment in the military—an industry at high risk of workplace harassment, among other forms of workplace violence.198Pub. L. No. 117-81, 135 Stat. 1541 (2021). 

The remaining laws that passed at the federal level were quite limited in scope. Two such bills related to lawmakers themselves: one mandates anti-harassment training for Senators and Senate employees199S. Res. 330, 115th Cong. (2017) (enacted). and the other makes lawmakers financially liable for harassment settlements.200Congressional Accountability Act of 1995 Reform Act, Pub. L. No. 115-397, 132 Stat. 5927 (2018) (codified at 2 U.S.C. §§ 1301–02, 1311–17, 1331, 1341, 1351, 1361, 1371, 1371, 1381–85, 1401–16, 1431–38). A third

bill was symbolic in nature, designating April as National Sexual Assault Awareness and Prevention Month.201S. Res. 603, 117th Cong. (2022) (enacted).

  1. State Reforms

As aforementioned, the vast majority of harassment and gender equity legislation was introduced and passed by state legislatures rather than Congress. We will begin the state legislation analysis by looking at state-specific and political trends in introduction and passage rates of gender equity bills between 2016 and 2022. We will then take a closer look at the potential for bipartisan support of gender equity bills before moving to topical analysis; there, our goal is primarily to examine how well legislation has been able to fill the gaps in legal protection that leave so many workers vulnerable to harassment and other gender-based workplace harm.

i.  General Trends

Broadly speaking, states introduced—and passed—a large number of #MeToo related bills between 2016 and 2022. Since 2016, states introduced approximately 3,000 such bills, of which 382 passed—a passage rate of 12.7%. As Figure 3 illustrates, some amount of gender-related legislative activity predated the viral spread of the #MeToo movement in 2017, with 244 relevant bills introduced in 2016, though only 19 such bills passed. The volume of #MeToo related legislation nearly doubled between 2016 and 2017, with 427 bills introduced, of which 42 passed. Legislative activity continued to rise year over year even after the extensive media coverage faded, peaking in 2019 at 715 bills introduced, of which 96 passed. Legislative activity was somewhat lower between 2020 and 2022 but remained above the 2016 baseline level. These trends suggest that the legislative momentum of the #MeToo movement continued for several years.

Figure 3.  State Gender Equity Bills (2016–2022)

There was substantial variation between states in the volume of legislation introduced, as illustrated in Figure 4. The most active state legislatures were New York (340 bills), followed by New Jersey (208 bills), Mississippi (151 bills), California (113 bills), Illinois (112 bills), and West Virginia (112 bills). Other states with a relatively high volumes of legislative activity were not confined to consistently Democratic “blue” states,202Nathaniel Rakich, How Red or Blue Is Your State?, FiveThirtyEight (May 27, 2021, 6:00 AM), https://fivethirtyeight.com/features/how-red-or-blue-is-your-state-your-congressional-district [https://perma.cc/NUR9-PVA6]. and included “swing”203We used the FiveThirtyEight “partisan lean” index to classify states as “swing,” “blue,” or “red.” “Swing” states refer to states with a partisan lead in favor of either party within a five-percentage point margin. “Blue” refers to states with a partisan lead in favor of the Democratic Party exceeding five percentage points. And “red” refers to states with a partisan lead in favor of the Republican Party exceeding five percentage points. and Republican leading states, including Virginia, Michigan, Minnesota, Pennsylvania, Texas, Hawaii, and Missouri.

However, the states with very little legislative activity—those that introduced ten or fewer #MeToo related bills between 2016 and 2022—were “red” states: Arkansas (four bills), South Dakota (six bills), North Dakota (seven bills), Montana (seven bills), Idaho (nine bills), and Wyoming (ten bills). Nevertheless, the sustained engagement of most states in #MeToo legislation suggests that there was more sustained legislative interest and energy around #MeToo-related gender equity reform than the partisan gridlock in Congress would suggest.

Figure 4 also highlights the years in which bills were introduced in each state, indicated by color within each bar. Although each state had more legislative activity in some years than others, they generally depict some legislative activity during each year in the sample period. This further suggests sustained legislative activity over time, not just across states writ large, but within each state.

The states that passed the most #MeToo related bills were similar—but not identical—to those that introduced the most #MeToo related legislation, with California in the lead (seventy-three bills), followed by Illinois (thirty-one bills), New York (twenty-seven bills), Washington (twenty-five bills), New Jersey (seventeen bills), Virginia and Maryland (fifteen bills each), Nevada (thirteen bills), then Louisiana, Oregon, and Maine (twelve bills each).204See infra Figure 4.

Although blue states dominate the list, the most prolific bill-passing states also included a solidly red state (Louisiana), and two swing states (Nevada and Virginia). The group of states that passed between five and ten bills also included a handful of swing or red states, including Pennsylvania, Texas, Arizona, Tennessee, and Kentucky, each of which passed five bills. Ten states failed to pass any #MeToo bills. Of these, seven were red states, and three were swing states.205The red states were Missouri, Ohio, Iowa, Alaska, Montana, North Dakota, and Arkansas. The swing states were Minnesota, North Carolina, and Wisconsin. In other words, the volume of bills passed in any given state is somewhat more reflective of the partisan divides between red states and blue states than the volume of bills introduced.

Figure 4.  Bills Introduced by State (2016–2022)a

Note:  a Only states with at least 20 introduced bills were included in Figure 4. 

 

Figure 5.  Bills Passed by State (2016–2022)a

Note a Only states that passed at least one bill were included Figure 5.

C.  Political Trends in Gender Equity Legislation Post #MeToo

Now that we have a sense of the general landscape with respect to state legislation post #MeToo, we can take a closer look at the political trends. While all states introduced some harassment and gender equity reform legislation, there are trends in region, party, and even representation of women in legislatures, that provide information about who is leading the charge with respect to introducing and passing legislation that produces effective change.

  1. Political Party

Figure 6 presents a more direct breakdown of the relationship between partisanship and #MeToo legislation. Throughout much of the sample period, more #MeToo-related bills were introduced in Republican-led legislatures, relative to Democrat-led legislatures.206 However, Democratic legislatures passed far more bills than Republican-led legislatures by a margin of 3.6 to 1. These results suggest that there was substantial legislative interest in #MeToo related topics in both Republican and Democratic state legislatures—and perhaps even a greater level of experimentation in Republican legislatures—but far less momentum to pass those bills in Republican states.

 

Figure 6.  Bills Introduced and Passed by Party Majority and Year

a. Introduced bills

 

b. Passed bills

 

Note:  This figure does not include seven laws introduced in Alaska that had “N/A” for party majority

  1. Representation of Women Lawmakers

Part I discussed the historical exclusion and underrepresentation of women and racialized minorities in the lawmaking process. From 2016 to 2021, as the conversation around #MeToo and gender equity broadened, the percentage of women in state legislatures grew to record numbers in many states.207Carl Smith, The Rise of Women in State Legislatures: A State-by-State Map, Governing (March 10, 2021), https://www.governing.com/now/the-rise-of-women-in-state-legislatures-a-state-by-state-map.html [https://perma.cc/4FX3-TDVM]; see infra Figure 7.

Figure 7.  Percent of State Legislators Who Are Women, 2012–2021

We next analyzed the relationship between the average representation of women in each state legislature from 2016 to 2022, and the volume of gender equity legislation the state passed during that same period. The results suggest that states with more women lawmakers tended to pass more gender equity legislation in the years following #MeToo than states with fewer women lawmakers.208See infra Figure 8. One exception was California, which was an outlier in that it had dramatically higher bill passage rate. Because this skewed the data drastically, it was removed from the scatterplot.

Most states tended to cluster together along party lines. For example, traditionally red states including West Virginia, Wyoming, Alabama, and South Carolina had state legislatures with less than 20% of women lawmakers and also passed less than ten gender equity bills between 2016 and 2022. By contrast, Democratic strongholds such as Illinois, New York, and Washington had legislatures with between 30% and 40% women lawmakers, as well as over twenty gender equity bills passed in each of these states between 2016 and 2022. This suggests that Democratic states may be leading the way with respect to maximizing anti-discrimination legislation put forth—in line with the Swiss Cheese Model of risk reduction. However, the substance of the bills passed is another critical part of the analysis.

 

Figure 8.  Frequency of Gender Equity Legislation Passed, by Mean % Women Lawmakers, 2016–2022

D.  Topical Analysis of Gender Equity Legislation Post #MeToo

This Section takes a closer look at the types of bill topics introduced or passed and examines whether the activity was responsive to the gaps in protection previously identified in Parts I and II. We found that states attempted to pass a variety of legislative measures on a number of topics related to gender equity and workplace harassment. The breadth of introduced bill topics is promising, as it suggests legislators are open to taking a multi-layered approach to increasing protection and minimizing harassment—especially in industries at particular risk.

Figures 9 and 10 display the introduced and passed bills according to the topic of the legislation. As Figure 9 illustrates, pay equity was the most common topic of proposed legislation, with more than 700 bills introduced. Leave laws were the second most common topic, with 582 bills proposed. Enforcement bills—which included a variety of reforms to strengthen protections by changing legal rules and remedies—were the third most prevalent, with 376 bills. Laws mandating changes to employer practices and policies (“Anti-Harassment Practices”), such as harassment training and grievance procedures, came in fourth, with 332 bills.

The topics most commonly passed in the legislature did not correspond to the topics that were most frequently introduced. The most commonly passed topic was “Other,” which predominantly consisted of symbolic legislation, such as designating an “Equal Pay Day,” expressing a policy position, or establishing a task force. The second most commonly passed topic was laws relating to Anti-Harassment Practices, closely followed by laws relating to Pay Equity.

 

Figure 9.  Number of State Gender Equity Bills, By Primary Topic

The volume of bills introduced on specific topics could ultimately be viewed as a proxy for broad legislative interest in a topic, with pay equity and leave garnering the most interest. Legislative volume may also be an indicator of legislative creativity and innovation around a particular topic. Pay Equity bills in particular produced a wide variety of proposals to address the underlying problem, ranging from pay disclosure rules, protection from retaliation, new forms of equal pay mandates, or restrictions on the types of information employers can use to calculate pay rates. Republican led states were often as creative in this regard as Democratic ones.

For example, West Virginia introduced a bill entitled the “Katherine Johnson Fair Pay Act of 2019” in honor of Katherine Coleman Johnson, an African American mathematician born and educated in West Virginia.209S.B. 412, Reg. Sess. (W. Va. 2019). She was awarded the Presidential Medal of Freedom despite facing segregation and wage discrimination along with the rest of her Black female crew. The bill would prohibit an employer from (1) banning pay discussion in the workplace formally through waiver or informally and (2) inquiring about prospective employees’ wage or salary history.210Id. Utah and Wyoming also took steps to bolster equal pay protections; in 2016 and 2019, respectively, both states passed legislation increasing fines for employers and legal remedies for victims of wage discrimination.211S.B. 185, Gen. Sess. (Utah 2016) (enacted); H.R. 71, 65th Leg., Gen. Sess. (Wyo. 2019) (enacted).

Many states also used a bundling approach, by adding in additional topics that were “secondary” to a primary bill topic.212See discussion on page 136. Once secondary topics are included, the “Other” category remains the most commonly passed topic. However, other types of reforms received a substantial boost by including “secondary” topic codes, particularly the “Enforcement” category, which rises to second place when secondary topics are included. Likewise, anti-discrimination law reforms were much more frequent when adding analysis of secondary topics. This suggests that legislators are strategizing—proposing a bill on a primary topic, such as pay equity, that may garner wider support, and then in the same bill, adding other protections that are less likely to be presented and supported in standalone bills.

These secondary “hidden” topics are of note because they tend to add substance to bills that may otherwise lack the ability to promote effective change. We measure the effectiveness of a bill by assessing its ability to fill at least one of the many gaps identified in harassment and anti-discrimination law. The ability to fill these “holes,” to use the Swiss Cheese Model analogy, indicates an appropriate focus on how harassment and other gender inequities in the workplace are actually experienced by today’s most vulnerable workers. For example, many of the workers most vulnerable to harassment also have extremely limited economic bargaining power due to various factors including the racial and gender pay gap. To bolster these workers’ ability to fight existing wage discrimination, many state legislators added a cause of action into pay equity reform bills that would have otherwise lacked an enforcement mechanism that allowed workers to take their claims in court.

 

Figure 10. Total Number of State Gender Equity Bills Passed, By Topic

Secondary topics were a common feature of the dataset: almost 40% of bills had one or more secondary topics.213See infra Table 2. The most common topic bundle combined Pay Equity and Enforcement (307 bills), followed by Leave and Enforcement (200 bills). This bundle tended to reflect that new leave or pay equity laws were typically more substantive in nature and drafted with some sort of enforcement remedy beyond fines for employer violations—thereby increasing workers’ access to courts. For example, in 2016, even before the #MeToo activism, California passed an Equal Pay for Equal Work bill that was both systemic and substantive and included a bundle of enhanced protections.214A.B. 1676, 2015–2016 Gen. Assemb., Reg. Sess. (Cal. 2016) (enacted). This new law prohibits wage discrimination, creates a cause of action for employees aggrieved by wage discrimination, and prohibits retaliation against employees seeking enforcement of the law.215Id.

Table 2 also reveals less intuitive combinations, such as bundling Anti-Discrimination Law along with other bill topics. One example of this strategy comes from New York, where the 2020 legislature introduced an extensive bill that bolstered discrimination and harassment enforcement remedies and expanded protected classes to include individuals experiencing these harms on the basis of their sexual orientation and gender identity, marital status, familial status, and more.216S.B. 3817, 242nd State Assemb., Reg. Sess. (N.Y. 2019) (enacted). This strategy was also adopted in many Leave laws, which were frequently accompanied by reforms to Anti-Discrimination Law (seventy-five bills). Pay Equity was also commonly paired with reforms to Anti-Discrimination Law (forty-one bills). This bundled approach may have served as an effective strategy to effect systemic broadening of statutory protection without attracting undue attention and opposition.

Indeed, it appears that strategically “bundling” topics increased the ability of legislatures to pass reforms that either (1) create or strengthen a variety of enforcement mechanisms for harassment and other gender equity claims, or (2) broaden coverage under anti-discrimination statutes. Although standalone bills involving these reforms had less success, legislators appear to have successfully tacked them on to bills involving other subjects.

 

Table 2.  Common Bundles of Workplace Gender Equity Topics

 

Primary topic

Secondary topic

 

Anti-Discrimination Law

Anti-Harassment Practices

Enforcement

Anti-Discrimination Law

Anti-Harassment Practices

Mandatory Arbitration

Anti-Discrimination Law

Anti-Harassment Practices

Pay Equity

Anti-Discrimination Law

 

Anti-Discrim. Law

 

5

60

21

10

 

1

2

3

1

 

Anti-Harassment Practices

25

 

29

11

2

4

9

13

 

37

 

Enforcement

25

12

 

5

12

 

3

4

6

9

 

Govt. Officials and Contracts

8

58

11

 

1

 

 

1

1

19

 

Leave

75

 

200

 

 

 

18

6

2

27

 

Mandatory Arbitration

2

3

20

10

 

 

 

1

 

12

 

Occupational

1

12

12

 

3

 

 

 

1

5

 

Other

7

8

3

1

7

 

 

16

 

8

Pay Equity

41

1

307

47

17

 

22

51

 

54

 

Transparency

6

10

36

28

1

14

8

2

1

 

 

 

Reform initiatives that aim to strengthen enforcement mechanisms and broaden coverage under Title VII to protect more workers are essential because they increase access to the courts. Reform will not reduce the prevalence of harassment and other gender inequities if impacted workers are unable have their claim addressed by the court system. It is also true, however, that the judiciary needs reform itself, particularly with respect to its interpretation of the severe or pervasive standard, the objectively hostile standard, the Faragher/Ellerth defense, and retaliation. Until the judiciary is more in touch with the realities of the workplace, it is unclear how well this new wave of workers with access to the courts will fare.

Progressive coastal states such as California and New York provide examples of legislative agendas that substantially shift how workplace harassment is conceptualized by courts.217Johnson et al., supra note 30, at 8. This legislation attempts to remedy some of the shortcomings in harassment jurisprudence discussed in Part II.218Post #MeToo, New York lowered the severe or pervasive standard, eliminated the Faragher/Ellerth affirmative defense, and instituted training requirements. S. 6577, 242nd Gen. Assemb. (N.Y. 2019) (enacted). Both of these states also amended laws to expand protections for harassment and discrimination to include more protected categories as well.219Johnson et al., supra note 30, at 5.

Some states also improve enforcement by extending the administrative filing period of harassment and discrimination claims. Five states (California, Connecticut, Maryland, New York, and Oregon) extended the administrative filing deadline.220Four of these five states extended the filing period for harassment and discrimination claims. New York extended the administrative filing period for “sexual harassment” only. A.B. 9, 2019–2020 Reg. Sess., (Cal. 2019) (enacted);; S.B. 3, 2019 Reg. Sess., (Conn. 2019) (enacted); S.B. 451, 2022 Leg., (Md. 2022) (enacted); A.B. A8421, 2019–2020 Gen. Assemb., (N.Y. 2019) (enacted); S.B. 479, 2019 Reg. Sess. (Or. 2019) (enacted). Of these, three states extended the deadline for all discrimination claims.221A.B. 9, 2019–2020 Gen. Assemb., Reg. Sess. (Cal. 2019) (enacted); S.B 726, 80th Leg., Reg. Sess. (Or. 2019) (enacted); H. 729, Gen. Assemb., Reg. Sess. (Vt. 2022) (enacted). This is particularly important for low-wage workers, for whom inadequate filing deadlines exacerbate existing pressure to use limited time and resources to at once both find a job and seek legal recourse for harm suffered.

A relatively small number of bills sought to increase the damages available in harassment claims. These bills were also somewhat successful, with four states—Virginia, Nevada, New York, and Connecticut—increasing available damages. Many—but not all—who passed bills did so by (1) allowing the discrimination plaintiffs to recover both compensatory and punitive damages and (2) removing damage caps for victims of discrimination based on employer size. In some states—such as Nevada—damage caps remain, limiting the impact of recent increases in available damages.222S.B 177, 80th Leg. (Nev. 2019) (enacted).

IV.  Discussion & Implications

When analyzing the legislative activity over time, we found that proposed bills began to address a wider range of systemic gender equity issues over the time period;223Council B. B24-0649, 24th Council (D.C. 2023) (enacted); H.R. 1, 149th Gen. Assemb. (Del. 2017) (enacted); S. 2986, 218th Leg. (N.J. 2019) (enacted); S.B. 5258, 66th Leg., Reg. Sess. (Wash. 2019) (enacted). however, as with many movements, reform efforts gradually fizzled out over time. Importantly, however, they never returned below the 2016 baseline activity. These empirical results suggest that while the #MeToo movement may have sustained some of its initial impact on harassment and gender equity reform over the past five years, progress may be stagnating. Avoiding further stagnation requires legal stakeholders to offer workers consistent harassment and gender equity reform that are responsive to the changing realities of the current workplace. This includes acting swiftly to respond to the 2025 Trump administration’s attempts to reverse harassment-related protections for transgender workers under Title VII.224Exec. Order No. 14,168, 90 Fed. Reg. 8615 (Jan. 20, 2025).

A.  Did States Fill Any Gaps?

State legislation partially filled gaps left by federal law. While state legislators took a broad approach to introducing harassment and gender equity reform, they took a narrower approach to amending harassment law. While we did see efforts to combat noted gaps in protection such as mandatory arbitration at both the state–and even federal level–these efforts are typically limited to banning mandatory arbitration of sexual harassment claims—leaving harassment on other bases, as well as other discrimination claims, unprotected. This creates challenges for the plaintiffs experiencing harassment based on multiple categories or those experiencing both discrimination and harassment, which often occur together.

At the same time, state legislatures seriously attempted—and, in many cases, succeeded—in expanding the list of protected classes protected by anti-discrimination law. For example, some states have expanded protections to cover workers excluded from Title VII coverage, such as those working for small employers, independent contractors, and unpaid interns, among many others.225Ramit Mizrahi, Sexual Harassment Law After #MeToo: Looking to California as a Model, 128 Yale L.J.F. 121, 126–28 (2018). Some have also expanded liability and remedies for harassment by removing Title VII’s affirmative defense against harassment as well as its caps on compensatory and punitive damages for victims of harassment.226Id. at 130.

The most unexpected finding came from the Enforcement bill category. Enforcement was the third most introduced bill topic, suggesting stronger legislative support than expected. Moreover, when we considered secondary topics, the number of Enforcement bills nearly doubled. This suggests a strategy among state legislators to increase access to the courts and to strengthen relief available for harassment and gender equity issues, including pay equity, leave and accommodation, and anti-discrimination law. As a result, there will likely be an influx of the new plaintiffs who are able to have their day in state court. While this is generally good news, it also highlights the continuing and glaring failure of the judiciary to remedy the harassment that is experienced and brought before the courts. Expanding coverage to additional workers and increasing their access to the courts will only work if they are encountering a judiciary that is responsive to power hierarchies and realities of the workplace, while also being serious about curtailing harassment. It is clear that there is still work to be done in this respect, and we look forward to conducting further research examining the topical granularity of the Enforcement bills in our database and how future clams fare in court.

On the federal level, several bills failed in their attempt to remedy the judicially created harassment doctrine outlined in Part II. House Bill 8698, for example, introduced in October 2020, sought to amend Title VII to overturn Supreme Court jurisprudence that is unfavorable to victims of harassment, including Alexander v. Sandoval,227Overturning the Supreme Court’s decision in Alexander v. Sandoval, would allow a private right of action under Title VII Section 703 based on evidence of disparate impact. The Sandoval decision has prohibited private individuals from challenging specific types of disparate impact discrimination, state regulations with the effect of discriminating against classes of individuals. Alexander v. Sandoval, 532 U.S. 275, 293 (2001). Vance v. Ball State,228Vance v. Ball State Univ., 570 U.S. 421, 450 (2013). and Faragher/Ellerth.229Faragher v. City of Boca Raton, 524 U.S. 775, 807 (1998); Burlington Indus., Inc. v. Ellerth, 524 U.S. 742, 765 (1998). This bill would enhance enforcement by allowing the plaintiffs to sue under Title VII based on evidence of disparate impact, strengthening the plaintiff’s ability to sue under a theory of vicarious liability, and reducing the likelihood of judicial deference to employer anti-harassment policies and procedures, despite ineffectiveness.230H.R. 8698, 116th Cong., 2d Sess. (2020). The bill also created a broader exception to the Federal Arbitration Act for all employment-related rights and remedies under federal and state law, not just sexual harassment.231Id. at § 8. It would also have expanded available remedies by allowing the plaintiffs to collect pre-trial attorney’s fees.232Id. at § 4. House Bill 8698 would prohibit employment discrimination on the basis of sexual orientation and gender identity,233Id. at § 2. a proposal that was ultimately rendered moot by the Supreme Court’s 2020 decision in Bostock v. Clayton.234Bostock v. Clayton County., 590 U.S. 644, 1754 (2020).

Knowing the effect of the #MeToo movement on legislative agendas and bill passage rates is important for those who wish to maintain and expand the momentum that was fueled and, in some cases, created by these movements. More specifically, legislators and other legal decisionmakers, including the courts and government agencies, should make workers’ voices central to their work. Following the lead of worker organizers whose anti-harassment advocacy efforts predated the groundswell of attention brought by the #MeToo movement will not only bring consistency, but also timeliness and specificity to the anti-harassment agendas set by various legal stakeholders. Below, we outline four specific issues that we believe should be central to advocacy efforts in particular, due to their deleterious effects on workers most vulnerable to workplace harassment.

B.  Legal Gaps in Need of Greater Attention

While the past five years following the #MeToo movement have seen reforms that were more systemic and bipartisan than anticipated, major gaps persist, allowing harassment to remain a threat. Harassment and gender equity reform is particularly in need of (1) more systemic changes with greater oversight, transparency, and accountability, (2) greater focus on intersectional harms, (3) well-informed enforcement efforts by judges, attorneys, and agencies alike, and (4) more creative strategies to deal with retaliation.

  1. Symbolic Action and Individuation of Harassment Continues, and Even Worsens?

Our analysis revealed a substantial number of reforms that were symbolic in nature, which encourages institutional “window dressing,” to merely signal enhanced rights, but without effective policies or cultural shifts.235One prominent category we coded as symbolic were bills ratifying the Equal Rights Amendment to the United States Constitution; however, the Equal Rights amendments that apply to state constitutions may potentially be meaningful at the state level, to the extent they serve to protect reproductive rights following the Dobbs decision. See generally Dobbs v. Jackson Women’s Health Organization, 597 U. S. 215 (2022). Equal Rights Amendments (ERAs) are of questionable efficacy at the federal level, as the original ERA contained a seven-year deadline, and the Senate has not passed a House resolution lifting the deadline. Nevertheless, state legislators introduced sixty-nine bills relating to the ERA and passed five. Some states created days of honor or remembrance, without adding substance of additional protections or enforcement, which we do not expect to make a meaningful difference beyond raising public awareness about harassment and other gender equity issues. Others condoned behavior of a government official or stated policy support for an issue, without actually making changes that change circumstances for women on the ground. Many states also created task forces and commissions to study issues of harassment and gender equity, but subsequent legislation would be needed to effectuate any changes proposed by these groups. Symbolic reforms may even be counterproductive to the extent they “check the box” by passing a related bill, creating the appearance of having addressed the problem. This can provide political cover while failing to implement more meaningful systemic reform.

Even more troubling is the continuing popularity of bills imposing harassment training requirements. While these bills can have substantive impact, research has shown that unless certain conditions—such as transformative leadership or bystander-specific training—are met, trainings are likely to be ineffective at promoting changes in workplace behavior. Moreover, training requirements can even be counterproductive. Legal stakeholders, thus, need to be aware of how training requirements tend to individuate harassment, making it about individual perpetrators rather than broader shifts in workplace culture, power dynamics, and worker dignity that are required. Training, grievance procedures, and investigations that focus on damage control may obscure the systemic patterns so often present in harassment and discrimination cases. In the current landscape, given the central role of the Faragher/Ellerth defense, these employer practices and procedures do more to insulate the employer from liability than they do to mitigate workers’ risk of harassment or other gender-based harms.

  1. Greater Focus on Intersectional Harms

Congress and state legislatures can, and should, also introduce more legislation protecting specific industries where women of color are overrepresented. This includes not only domestic workers, but also independent contractors, farmworkers, healthcare, hospitality, retail, and restaurant workers.236Elyse Shaw, Ariane Hegewisch, Emma Williams-Baron & Barbara Gault, Inst. for Women’s Pol’y Rsch., Undervalued and Underpaid in America: Women in Low-Wage, Female-Dominated Jobs 26–30 (2016), https://iwpr.org/wp-content/uploads/2020/09/D508-Undervalued-and-Underpaid.pdf [https://perma.cc/6B3L-EXZJ]; Clare Malone, Will Women in Low-Wage Jobs Get Their #MeToo Moment?, FiveThirtyEight (Dec. 14, 2017), https://fivethirtyeight.com/features/the-metoo-moment-hasnt-reached-women-in-low-wage-jobs-will-it [https://perma.cc/5LTR-FRPT]. In 2017, California passed a bill that added a section to the California Labor Code pertaining to farm labor contractors’ requirement to provide sexual harassment trainings to employees. See S.B. 295, Assemb., Reg. Sess. (Cal. 2017). Although state legislatures have stepped up to fill substantial federal gaps in coverage post #MeToo, barriers to enforcement remain and limit potential impact. To be effective, more systemic reform efforts are required that go beyond harassment law to also broaden protections across legal doctrines to the benefit of all women workers. This means, in particular, supporting state and federal legislative agendas that close gaps for the most vulnerable women workers, including low-wage workers, women of color, workers with disabilities, and LGBTQIA+ workers.

 Importantly, this requires moving away from the narrow interpretation of sexual harassment by judicial precedent and envisioning a new legal agenda around gender equity reform that is responsive to the reality of our evolving workplace and society. Doing so will require not only our policymakers, but also agencies and courts, to internalize gender inequity—rather than sexual desire—as the foundation of workplace harassment, highlight how it is exacerbated by low-wage employment, and acknowledge how its impact, in many cases, compounds for women with additional protected characteristics, in precarious work, segregated working conditions, and occupationally isolating jobs.237Vicki Schultz, Open Statement on Sexual Harassment from Employment Discrimination Law Scholars, 71 Stan. L. Rev. Online 17, 18–19 (2018).

  1. Navigating an Employer-Friendly Judiciary

As aforementioned, our legislative analysis suggests that plaintiffs will have greater access to the courts in the near future; however, we must further question and examine what that means if the judiciary continues to constrain harassment law and gender equity doctrine. This is a key moment for employment and civil rights lawyers to advocate effectively for their clients and in doing so, set new precedents, for the court. Doctrinal areas in need of innovation include the “severe and pervasive” requirement, the “objectively” hostile or abusive standard, and the Faragher/Ellerth affirmative defense.

  1. Dealing with Retaliation is Required for Reforms to Work

Strengthening judicial enforcement is also important in the context of retaliation, which continues to go hand in hand with harassment. Despite high rates of retaliation and its role in deterring victims from speaking up and using existing protections, state legislative agendas failed to pass measures that would more effectively deal with this issue. Solving the problem of retaliation requires more than changes to anti-retaliation laws; it also requires stronger enforcement that would incentivize systemic changes to workplace culture. In addition to legislation strengthening anti-retaliation protections generally, more bills should focus on identifying and mandating what specific behaviors are considered retaliatory. These reforms could include retaliatory actions such as substantive changes to terms of employment, disclosing personnel files, contacting immigration authorities, or threatening to report an employee’s immigration status.238Id. Doing so would signal the legislature’s recognition that retaliation is rooted in systemic power imbalances and is particularly threatening for workers in low-wage industries or workers with intersectional identities including race and national origin.

Conclusion

Considerable legislative progress has been made in the first five years after #MeToo went viral. Overall, more harassment and gender equity reform has occurred than expected, and through a more varied and comprehensive approach than first predicted. This is particularly true at the state level where new laws also offer greater coverage and enforcement remedies under civil rights statutes regardless of worker classification and with consideration for their occupational hazards and intersectional vulnerabilities.

While it is clear that the #MeToo movement moved the law forward with respect to harassment and gender equity, more work needs to be done, particularly with respect to centering the interests of workers most vulnerable to harassment. Various institutions–including judges, lawmakers, and agencies–contributed to the dissonance between the legal enforcement of, and the realized experience of, workplace harassment. This dissonance is then distributed widely via media, leading to public apathy and confusion about the current landscape of workplace harassment and related gender equity issues. These legal stakeholders thus have a responsibility to ensure that access to justice is equitably and consistently distributed to all workers, especially those most vulnerable. Fulfilling this responsibility grows more

urgent everyday under an increasingly hostile second-term Trump administration.

This does not mean, however, that effective and responsive reform efforts are out of reach. Legislators and regulators alike should consult anti-harassment worker organizers in crafting future reform. Doing so will enable legal branches to establish greater consistency in their treatment of harassment and remain more up to date with the rapidly changing realities of workplace harassment. This, in turn, will have the desired effect of closing the gaps between how harassment is enforced on the books, how it is enforced in the workplace, and how it is experienced by working women.

Federal actors should also make fruitful use of state-level innovation to ensure that state-level successes achieve a broader impact. Now that states have provided evidence of bipartisan support for these issues, Congress and federal agencies including the EEOC, the Department of Health and Human Services, and even the Occupation Safety and Health Administration, should step in and offer a more systemic approach that covers the multitude of gender equity issues that contribute to harassment.

Lastly, our goal is for our dataset to be used as a public resource, from which further research can be developed with the hope of providing concrete findings regarding the effectiveness of state-specific harassment and gender equity legislation. In turn, this research can be used to bolster the advocacy efforts by worker organizers. Doing so will enable legal stakeholders to remain in conversation with those best situated to determine the needs of a given workplace with respect to preventing harassment: the workers themselves.

 

Appendix A.  Search Terms Used to Identify #MeToo Related Legislation

Abusive Work Environment

Gender

Pay Parity

Sexual Orientation

anti-SLAPP

Gender Expression

Predispute Arbitration

Sexual penetration

Antidiscrimination

Gender Identity

Pregnant Workers

Sexual Violence

Compensation History

Gender Representation

Public Right to Know

Sodomy

Confidentiality Agreement

Gratuities

Rape

Stalking

Confidentiality Clause

Harassment

Retaliation

Statute of Limitations

Confidentiality Provision

Harassment Complaints

Salary Experience

Statutory Right

Cyberbullying

Harassment Prevention

Salary History

Unauthorized Disclosure

Denim Day

NDA

Sex

Wage Disclosure

Discrimination

Non-biased Compensation

Sexual Abuse

Wage Discrimination

Discrimination Complaints

Non-consensual

Sexual Arousal

Wage Disparities

Domestic Violence

Nonconsensual dissemination

Sexual Assault

Wage Disparity

Equal Pay

Nondisclosure Agreement

Sexual Assault Awareness

Wage History

Equal Rights

Nondisparagement Agreement

Sexual battery

Wage Secrecy

Equal Rights

Paid Family Leave

Sexual Discrimination

Workplace Bullying

Equal Rights Amendment

Panic Button

Sexual Gratification

Workplace Climate

Ethics Violation

Panic Device

Sexual Harassment

Workplace Misconduct

Family Leave

Pay Disparity

Sexual Intimidation

Workplace Protections

Forced Arbitration

Pay Equity

Sexual Misconduct

 

 

 

 

Appendix B.  Search Terms Used on Bill Corpus to Verify Topic Coding

Topic

Search Terms

Anti-Discrimination

“gender identity” “gender expression” “sexual orientation” “pregnan” “famil* status” “marital status” “famil* responsibility”

Equal Rights Amendment

“equal rights amendment” “ratification”

Harassment Training/Policies/Procedures

“sexual harassment training” “sexual harassment prevention” “complaint process” and “complaint procedure”

Leave/Accommodation

“paid family leave” “safe” “paid sick leave” “domestic violence” “accommodation” “pregnan*” “adoption” and “foster”

Mandatory Arbitration

“mandatory arbitration” “forced arbitration” “arbitration agreement”

Occupational Protections

“domestic” “hotel” “farm” “janitor” “artist” “panic” “bill of rights” “entertainment” “gratuit*”

Pay Equity

“wage discrimination” “pay dispar” “equal pay for equal work” “equal pay” “salary history” “wage history” and “pay equity”

Enforcement

“severe” “pervasive” “statute of limitations” “punitive damages” “compensatory damages” “damages” and “tort”

Regulates Government Officials/Lobbyists/State Contractors

“lobbyist” “state contract” “legislator” “members of the legislature” “legislative staff” “public officials” and “expel”

Transparency/NDAs

“disclosure” “employment history” “non-disclosure agreement” and “nondisclosure agreement”

Other

“task force” “study” “high-wage, high-demand” “law enforcement” and “boards”

 

 

 

98 S. Cal. L. Rev. 761

Download

* Professor of Law & Faculty Director, Workers’ Rights Institute, Georgetown University Law Center; B.S. 2003, Georgetown University McDonough School of Business; M.A. 2005, University of Michigan; Ph.D. 2013, Stanford University; J.D. 2011, Stanford Law School. Thank you to Angelica Sanchez Diaz, Nick Gonzales, Keniece Gray, and Lolade Akintunde for research support. Thank you to participants at the Lutie Lytle Workshop for providing valuable feedback.

Professor of Law & James O. & Alfred T. Goodwin Senior Fellow, University of Oregon School of Law; B.A., 2002, Harvard College; J.D. 2006, Harvard Law School.

Research Fellow, Georgetown University Law Center; B.A. 2018, University of Miami; J.D. 2022, University of California, Berkeley School of Law.

Familial DNA and Due Process for Innocents

Ever since genealogical DNA unmasked the Golden State Killer in 2018, the use of this new forensic science has been ubiquitous. Police have solved several hundred cold cases by uploading unidentified crime scene DNA samples to consumer genealogical databases and, with expert assistance, building out family trees from the resulting matches to identify suspects. This practice has raised significant concerns among privacy scholars due to the intimate nature of DNA information and the lack of consent by the parties ultimately identified through their relatives’ choice to upload data. Critics argue that the Fourth Amendment bars law enforcement from running warrantless familial DNA searches using consumer databases, even among users who have given their consent. Several states have also passed legislation banning or severely restricting such searches.

This Article argues that the current debate around familial DNA has neglected the due process rights of another person: the innocent third party who is potentially convicted in the absence of accurate, exculpatory DNA evidence. Both the Compulsory Process and Due Process Clauses give a defendant the right to obtain exculpatory evidence in their defense through judicial subpoena and from the government itself under Brady doctrine. In close cases, the respective scopes of competing constitutional rights should be defined so as to not excessively burden one another. On that basis, this Article argues against any ban on, or categorical constitutional or statutory rule requiring, probable cause for law enforcement to conduct familial DNA searches. The privacy interests raised by critics are legitimate; yet the functional inability for law enforcement to identify unknown suspects due to the lack of probable cause disproportionately burdens defendants whose Compulsory Process and Due Process rights are already limited by existing materiality requirements and inadequate resources. For many innocent defendants, the State itself is the best and only source of investigative resources and potentially exonerating evidence.

Introduction

In 2019, after Christopher Tapp had served nearly twenty years of a sentence for the rape and murder of his eighteen-year-old friend Angie Dodge, his conviction was vacated.1Ken Otterbourg, Christopher Tapp, Innocence Project, https://innocenceproject.org/cases/christopher-tapp [https://perma.cc/4YNU-MQM6]. An Idaho jury convicted him in 1998 largely due to a series of interrogations during which the police attempted to get him to implicate various friends, including through the offer of an immunity deal, which was later withdrawn when it was discovered that one friend had an alibi.2Id. During questioning, police—including a former guidance counselor of Tapp’s, whom he personally trusted—threatened him with the death penalty and told him that he could not remember the murder because he was repressing it.3Id. Tapp was convicted despite DNA tests that had excluded both him and the initially-targeted friend as the source of semen found at the scene of the crime.4Id.

A decade after the conviction, the Idaho Innocence Project took up Tapp’s case and requested DNA testing on hairs found on the victim’s body, which had only been visually inspected previously.5Id. The FBI lab found that the DNA on the hair was consistent with that of the semen, meaning that the hair also excluded Tapp. In rejecting Tapp’s lawyers’ requests for further testing, an appeals judge found that “while DNA testing may be relevant in identifying one of the assailants, such does not make it more probable that Tapp is innocent.”6Id.

Ultimately, the Idaho Falls police—now with the public support of the victim’s mother—worked with the Innocence Project and the private company Parabon Nanolabs to identify the source of the DNA sample.7Id.  Parabon created a genetic profile from the sample and compared it with profiles submitted to various consumer ancestry databases.8Id. Starting with profiles in the database, Parabon was able to use other records to build a family tree that turned out to include a man named Brian Dripps, who had lived across the street from the victim and had even been questioned during the early investigation.9Id. Using a discarded cigarette butt collected by the Idaho Falls police, Parabon compared Dripps’s DNA with the sample from the crime scene and was able to identify Dripps as the source of the DNA.10Id. Dripps confessed to the murder and rape, saying that he had acted alone and did not even know Tapp.11Id. Christopher Tapp’s two-decade nightmare was over.

Tapp’s case was at the vanguard of the latest development in forensic science: law enforcement use of familial DNA mapping to identify crime scene samples against the profiles voluntarily uploaded by perpetrators’ relatives to direct-to-consumer (“DTC”) genealogical sites. Starting with the apprehension of California’s infamous Golden State Killer in 2018, familial DNA has been responsible for the police solving a series of high-profile crimes in recent years, including the 1981 New Hampshire murder of Laura Kempton by Ronney James Lee; the 1984 murder of fourteen-year-old Wendy Jerome by Timothy Williams in Rochester, New York; and Sherri Papini’s false claims of kidnapping and sex trafficking by fictitious Latina women in Shasta County, California in 2016.12Aaron Katersky & Meredith Deliso, Decades-Old New Hampshire Cold Case Murder Solved Through Genetic Genealogy, Officials Say, ABC News (July 20, 2023, 11:46 AM), https://abcnews.go.com/US/decades-new-hampshire-cold-case-murder-solved-genetic/story?id=101525486 [https://perma.cc/5KU6-FH2L]; Steven Pappas, Landmark Conviction: Familial DNA Testing Resolves 1984 Murder Cold Case, A First in NYS, 13 WHAM (Mar. 8, 2024, 10:35 PM), https://13wham.com/news/local/landmark-conviction-familial-dna-testing-resolves-1984-murder-cold-case-a-first-in-nys [https://perma.cc/FVS6-UF42]; Brittany Johnson, ‘That Was Absolutely the Breaking Point’: Prosecutor Discusses How DNA Evidence Helped Solve Papini’s Case, KCRA 3 (Sept. 19, 2022, 9:40 PM), https://www.kcra.com/article/prosecutor-says-dna-helped-solve-sherri-papini-case/41287016 [https://perma.cc/QH89-7MB9].

While law enforcement use of DTC databases has brought resolution to many cases, it has also been the source of significant consternation among privacy advocates and scholars. At the start of the DTC revolution, users were not necessarily aware that law enforcement might be able to access their DNA profiles.13Paige St. John, The Untold Story of How the Golden State Killer Was Found: A Covert Operation and Private DNA, L.A. Times (Dec. 8, 2020, 5:00 AM), https://www.latimes.com/california/story/2020-12-08/man-in-the-window [https://perma.cc/4D25-B9YQ]. In the current moment, even the most law-enforcement-friendly DTC companies explicitly allow users to “opt in” or “opt out” of sharing their information with police.14See GEDmatch & Community Safety, GEDmatch, https://www.gedmatch.com/community-safety/#:~:text=Just%20like%20any%20other%20user,with%20the%20law%20enforcement%20profile [https://perma.cc/KDE8-LFTV]; IGGM Frequently Asked Questions, FamilyTreeDNA, https://help.familytreedna.com/hc/en-us/articles/4413980686863-IGGM-Frequently-Asked-Questions [https://perma.cc/FGJ4-2NGU]. Even so, many argue that such consent should not include third-party relatives eventually identified through genetic genealogy because these relatives have no control over whether their family members have uploaded their own DNA to a DTC site.15See Natalie Ram, Investigative Genetic Genealogy and the Problem of Familial Forensic Identification, in Consumer Genetic Technologies: Ethical and Legal Considerations 211, 214 (I. Glenn Cohen et al. eds., 2021); Ayesha Rasheed, ‘Personal’ Property: Fourth Amendment Protection for Genetic Information, 23 U. Pa. J. Const. L. 547, 589–90 (2021); Karen J. Kukla, Direct to Consumer or Direct to All: Home DNA Tests and Lack of Privacy Regulations in the United States, 13 IP Theory 31, 32–33 (2023). As states have begun to regulate in this area, many have explicitly allowed for police access to DTC sites.16Ariz. Dep’t of Pub. Safety Sci. Analysis Bureau, Familial DNA Analysis, https://www.azdps.gov/sites/default/files/2023-08/Familial_DNA_Analysis_Flyer_3.pdf [https://perma.cc/YV9X-PEG8]. However, several states have passed statutes restricting law enforcement use of familial DNA. The District of Columbia and Maryland wholly ban familial DNA searches of police databases; in Maryland’s case, the ban extends even to searches by private citizens (and, thus, criminal defendants).17D.C. Code § 22-4151(b) (2025); Md. Code Ann., Pub. Safety § 2-506(d) (West 2024). Montana, meanwhile, prohibits police from conducting familial DNA analysis using either DTC or police DNA databases without probable cause, which may be very difficult to establish in many cases involving an unidentified sample.18Mont. Code Ann. § 44-6-104(2) (2023).

The constitutionality of familial DNA searches is governed by the Supreme Court’s most recent word on the Fourth Amendment in an era of evolving technology—Carpenter v. United States.19Carpenter v. United States, 585 U.S. 296 (2018). Carpenter invalidated the government’s use of a subpoena (rather than a warrant) to access a subject’s cell phone location data from their service provider, a practice it had previously justified under the “third-party doctrine” of the Fourth Amendment.20            Id. at 309. The Court held that a person has a reasonable expectation of privacy in the totality of their movements, and that, because carrying a cell phone is effectively involuntary in the modern age, such an expectation is not defeated by the fact that a user’s location data is shared with third-party service providers.21Id. at 309–12. Critics of unfettered law enforcement access to DTC DNA databases and of familial DNA searches generally point to the increasing ubiquity of both public and private databases and the large number of strangers who can be involuntarily identified through a fairly small number of users.22See Ram, supra note 15, at 220. They argue that a person has a reasonable expectation of privacy in their DNA against such non-consensual, indirect identification.23Id.

This Article is the first to examine this question with regard to a forgotten constitutional stakeholder: the potentially innocent “other” suspect who, like Christopher Tapp, familial DNA might exonerate. While critics on both sides tend to balance the privacy rights of targeted parties against the crime-solving interests of the government, the constitutional framework is more complicated than this given the due process rights of these potential defendants. In Part One, this Article explains the science of forensic DNA generally, familial DNA specifically, and their roles in investigations and exonerations. Part Two presents the Fourth Amendment background to this problem and summarizes the argument that courts should recognize a reasonable expectation of privacy that would prohibit warrantless familial DNA searches, even where DTC users give consent. Part Two also asserts that while this argument is colorable, it is weak. This is due to both standing problems and the fact that the privacy interest in not being identified as the specific depositor of a single DNA sample is not comparable to the interest in the privacy of one’s daily movements.

Part Three argues that a falsely accused suspect has a similarly colorable due process right in the availability of familial DNA testing. Such a right derives from three sources: the Compulsory Process Clause, the due process right to exculpatory evidence, and the due process right to post-conviction relief procedures. This Part argues both that defendants themselves should not be legally barred from running familial DNA searches in public or private databases and that the practical realization of their due process rights requires that law enforcement not be so barred either. Part Four concludes that, in close cases, competing constitutional rights must not excessively burden one another. On that basis, this Part argues against any categorical rule substantially preventing law enforcement from conducting familial DNA searches. While legislatures are well-advised to limit the use of this technology to serious cases in which other investigative techniques have failed, they should not adopt bans or probable cause requirements; if they do, they should at least create an explicit process for defense subpoenas. Furthermore, Part Four concludes that courts should not extend Carpenter to create a categorical warrant requirement for familial DNA searches of police databases or DTC databases where an initial user has given consent to law enforcement access.

I.  The Developing Practice of Forensic DNA

A.  DNA Science

Deoxyribonucleic acid (“DNA”) is a molecule found in cells that contains the genetic code for an organism’s development, function, growth, and reproduction.24Nat’l Libr. of Med., What is DNA?, MedlinePlus, https://medlineplus.gov/genetics/understanding/basics/dna [https://perma.cc/QM4G-XTYC]. DNA is hereditary, meaning it is passed from parent to child.25Id. The information in DNA is stored as a code made up of four chemical bases: adenine (“A”), guanine (“G”), cytosine (“C”), and thymine (“T”).26Id. Human DNA consists of about three billion bases and more than 99% of those bases are identical across the species.27Id. Their sequence determines the information available for building and maintaining the organism.28Id.

Variations in code can occur at any point in the genome, including non-coding areas.29Karen Norrgard, Forensics, DNA Fingerprinting, and CODIS, Nature Educ.: Scitable (2008), https://www.nature.com/scitable/topicpage/forensics-dna-fingerprinting-and-codis-736 [https://perma.cc/Z3H5-4KRB]. Scientists have discovered that these non-coding regions contain repeated units of DNA that vary in length between individual subjects; one particular type of repeat, the short tandem repeat (“STR”), is easily measured and compared for identification purposes.30Id. The FBI has identified thirteen areas, or “loci,” on a chromosome where STRs are found, which U.S. law enforcement now uses to identify individuals—for example, to identify remains, determine paternity, or match a suspect to a forensic sample from a crime scene.31Id.

DNA identification involves the use of statistics.32Id. The FBI has established the frequency with which each form, or “allele,” of the thirteen core STRs naturally occurs in people of different ethnicities.33Id. In a specific case, a lab will determine the allele profile of the thirteen core STRs for both the crime scene sample and the suspect’s sample. If they do not match, the suspect is excluded.34Id. If they have matching alleles at all thirteen STRs, it then becomes possible to make a statistical calculation to determine the frequency with which that genotype arises in the population.35Id. The probability, for example, of two unrelated Caucasians having identical DNA “fingerprints” is about 1 in 575 trillion.36Phil Reilly, Legal and Public Policy Issues in DNA Forensics, 2 Nature Revs.: Genetics 313, 314 (2001). Because there are 5,000 trillion pairs of people out of the 100 million Caucasians in the world, roughly eight or nine pairs would be expected to match at the thirteen STR loci.37Norrgard, supra note 29.

Given the exceedingly low likelihood of any given person matching the DNA profile associated with a crime scene, the probabilistic science of DNA has generated some of the most reliable evidence known to our justice system.38Id. This does not mean that it is always perfect evidence. DNA samples may be small in quantity, improperly preserved, or highly degraded (meaning that analysts can only obtain a partial profile).39Id. When fewer than thirteen alleles can be examined from a sample, it increases the possibility of a random match. Id. Furthermore, some crime scene samples contain DNA from multiple sources. All of these issues can confound the effectiveness of DNA fingerprinting as a means of identification. However, in cases in which all thirteen STR loci can be examined and matched, such matches are extraordinarily reliable.40See Holly A. Hammond, Li Jin, Y. Zhong, C. Thomas Caskey & Ranajit Chakraborty, Evaluation of 13 Short Tandem Repeat Loci for Use in Personal Identification Applications, 55 Am. J. Hum. Genetics 175, 175 (1994); Nat’l Comm’n on the Future of DNA Evidence, Nat’l Inst. of Just., Off. of Just. Programs, The Future of Forensic DNA Testing: Predictions of the Research and Development Working Group 5, 35 (2000).

The use of DNA science in crime solving has been facilitated by the rise of DNA databases maintained by law enforcement. The DNA profiles in these databases come primarily from two sources: (1) DNA samples taken from crime scenes where they can be obtained (for example, “rape kits”) and (2) samples taken from convicted offenders and, in some states, arrestees. All fifty states statutorily require at least some offenders, especially those convicted of sexual or violent crimes, to submit samples.41Xiaochen Hu, Mai E. Naito & Rolando V. del Carmen, Pre- and Post- Conviction DNA Collection Laws in the United States: An Analysis of Proposed Model Statutes, 1 J. Crim. Just. & L. 22, 24 (2017). In addition, thirty states statutorily authorize law enforcement to collect DNA samples from those arrested for certain types of crimes, usually felonies.42Id.; Figure 1. States That Have Enacted Arrestee DNA Collection Laws in the United States, Nat’l Inst. of Just., https://nij.ojp.gov/media/image/10251 [https://perma.cc/EP4Y-HBWZ]. The FBI maintains the Combined DNA Index System (“CODIS”), a program of support for law enforcement DNA databases nationwide.43Frequently Asked Questions on CODIS and NDIS, FBI, https://www.fbi.gov/how-we-can-help-you/dna-fingerprint-act-of-2005-expungement-policy/codis-and-ndis-fact-sheet [https://web.archive.org/web/20240625150854/https://www.fbi.gov/how-we-can-help-you/dna-fingerprint-act-of-2005-expungement-policy/codis-and-ndis-fact-sheet]. It includes the National DNA Index System (“NDIS”), which contains the DNA profiles contributed by federal, state, and local participating forensic laboratories.44Id. As of February 2024, CODIS had assisted in over 680,122 criminal investigations.45CODIS-NDIS Statistics, FBI, https://le.fbi.gov/science-and-lab/biometrics-and-fingerprints/codis/codis-ndis-statistics#:~:text=CODIS’s%20primary%20metric%2C%20the%20%22Investigation,in%20more%20than%20680%2C122%20investigations [https://web.archive.org/web/20240714204728/https://le.fbi.gov/science-and-lab/biometrics-and-fingerprints/codis/codis-ndis-statistics]. One study of Danish data found that police collection of criminal offenders’ DNA profiles increases detection probability and reduces recidivism rates over the next year by as much as 43%.46Anne Sofie Tegner Anker, Jennifer L. Doleac & Rasmus Landersø, The Effects of DNA Databases on the Deterrence and Detection of Offenders, 13 Am. Econ. J.: Applied Econ. 194, 221 (2021); see also Jennifer L. Doleac, The Effects of DNA Databases on Crime, 9 Am. Econ. J.: Applied Econ. 165, 165–68 (2017) (showing the significant deterrent effects of state DNA databases).

B.  DNA and Exonerations

One of the most important developments flowing from the rise of DNA evidence since the mid-1990s has been its potential for exonerating the wrongfully accused and convicted.47Jon B. Gould & Richard A. Leo, One Hundred Years Later: Wrongful Convictions After a Century of Research, 100 J. Crim. L. & Criminology 825, 829–30 (2010). A 1996 study found that as many as 25% of the cases sent for DNA analysis in the early days of the technology ended up excluding the primary suspect, demonstrating the significance of DNA technology in avoiding potential wrongful convictions.48Edward Connors, Thomas Lundregan, Neal Miller & Tom McEwen, U.S. Dep’t of Just., Convicted by Juries, Exonerated by Science: Case Studies in the Use of DNA Evidence to Establish Innocence After Trial xix–xx (1996). Between 1989 and 2020, the Innocence Project reports that 375 wrongfully convicted prisoners were freed due to post-conviction DNA testing.49DNA Exonerations in the United States (1989–2020), Innocence Project, https://innocenceproject.org/dna-exonerations-in-the-united-states [https://perma.cc/N2ZT-VGB6]. This is, unfortunately, due not only to the accuracy of DNA evidence but also to the unreliability of other forms of evidence that have been contributing to false convictions since time immemorial.50Id.

One significant factor in wrongful convictions has been the problem of false eyewitness identifications. Sixty-nine percent of DNA exonerations tracked by the Innocence Project involved eyewitness misidentification.51See Innocence Staff, How Eyewitness Misidentification Can Send Innocent People to Prison, Innocence Project (Apr. 15, 2020), https://innocenceproject.org/how-eyewitness-misidentification-can-send-innocent-people-to-prison [https://perma.cc/Q9AS-2UX9]. This is perhaps unsurprising due to the role of trauma in distorting witness recollections over time52See generally Kenneth A. Deffenbacher, Brian H. Bornstein, Steven D. Penrod & E. Kiernan McGorty, A Meta-Analytic Review of the Effects of High Stress on Eyewitness Memory, 28 Law & Hum. Behav. 687 (2004). and the fact that police practices around line-ups and show-ups can often—even unintentionally—prove overly suggestive and encourage bad identifications.53See False Confessions Happen More Than We Think, Innocence Project (Mar. 14, 2011), https://innocenceproject.org/false-confessions-happen-more-than-we-think [https://perma.cc/4TKB-N4FD]. Cross-racial identifications are notoriously less reliable than identifications made by witnesses of the same race as the suspect.54See Stephanie J. Platz & Harmon M. Hosch, Cross-Racial/Ethnic Eyewitness Identification: A Field Study, 18 J. Applied Soc. Psych. 972, 978 (1988) (showing that 53% of Caucasians correctly identified a Caucasian subject in a field study but only 40% of Caucasians correctly identified a Black subject).

False confessions, as exemplified by Christopher Tapp’s case, have been identified as a factor in over 25% of DNA exonerations.55False Confessions, Innocence Project, https://innocenceproject.org/false-confessions [https://perma.cc/V3UC-ZCED]; Explore the Numbers: Innocence Project’s Impact, Innocence Project, https://innocenceproject.org/exonerations-data [https://perma.cc/2EKT-3CPZ]. On average, people who confess to crimes they did not commit have been interrogated for sixteen hours or more.56Id. Other factors associated with false confessions include deceptive practices by police, such as lying about evidence, isolation, intimidation, and force.57Id. Whatever the particular causes, the problem of wrongful conviction has been found to disproportionately affect Black suspects.58See Explore the Numbers: Innocence Project’s Impact, supra note 55 (showing that 58% of the wrongful convictions recorded by the Innocence Project involved Black exonerees). But see Mark Saber, Brooke Nodeland & Robert Wall, Exonerating DNA Evidence in Overturned Convictions: Analysis of Data Obtained from the National Registry of Exonerations, 33 Crim. Just. Pol’y Rev. 256, 267 (2022) (finding that “being Black did not significantly impact the odds of obtaining an exoneration featuring DNA evidence” in Dallas and Harris Counties in Texas). The role of DNA in exonerations thus suggests that it improves not only accuracy but also equality in the criminal justice system.

Responding to the implications of DNA science for the wrongfully convicted, all fifty states have enacted statutes dealing with defendants’ access to DNA evidence post-conviction.59See Brandon L. Garrett, Claiming Innocence, 92 Minn. L. Rev. 1629, 1673–75, 1719–23 (2008) (collecting post-conviction DNA statutes from the forty-six states and the District of Columbia that had been enacted as of 2008); Ala. Code § 15-18-200 (2024) (providing for post-conviction DNA testing in capital cases only); Alaska Stat. § 12.73.010 (2024); Mass. Gen. Laws ch. 278A, §§ 1, 2; Miss. Code Ann. § 99-39-5 (202); Okla. Stat. tit. 22, § 1373.5 (2024). Such statutes generally provide not only a right to post-conviction testing under certain circumstances but also an easing of traditional rules of finality in cases where the results demonstrate innocence.60See Garrett, supra note 59, at 1673. At the federal level, the Innocence Protection Act provides for post-conviction DNA testing in federal cases, and the Justice for All Act creates financial incentives for states to provide for post-conviction DNA testing.6118 U.S.C. § 3600(g)(2); 42 U.S.C. § 14163a(b)(1)(D).

Increased public attention to the problem of wrongful convictions has also prompted several jurisdictions to create Conviction Integrity Units (“CIUs”) within their prosecutor’s offices to monitor and investigate potentially wrongful convictions.62See Saber et al., supra note 58, at 258. The creation of the CIU in Dallas County, Texas was the result of the County’s DNA retention policy as well as the election of District Attorney Craig Watkins, who made conviction integrity a particular priority.63See id. A nationwide study of data from the National Registry of Exonerations between 1989 and 2016 even found that Dallas County was the geographic region with the greatest likelihood of a DNA exoneration occurring.64See id. at 258, 265. Despite the increasing availability of DNA testing, however, one study of fifty cases found that DNA exonerations were met by skepticism among stakeholders in the system—by prosecutors, judges and victims. Anne Richardson Oakes & Julian Killingley, DNA Exonerations and Stakeholder Responses: A Case of Cognitive Dissonance?, 90 Tenn. L. Rev. 109, 110–11 (2022). The study found close to the same degree of skepticism as between two periods: 1990 to 1999 (the very early days of forensic DNA) and 2010 to 2019 (after DNA science had become more ubiquitous). Id. at 147. The authors posited that such skepticism may reflect the threat exonerations pose to the value systems and self-belief of such stakeholders, who may have acted in good faith and in genuine but mistaken belief in the exoneree’s guilt. Id. at 147–48.

C.  Familial DNA

An obvious limit to the use of forensic DNA in crime-solving is the fact that the universe of potential matches for crime scene samples comprises only profiles already stored in existing databases. In cases where an unknown perpetrator has no prior record or other reason to have a profile stored, DNA has been less useful. These limitations seemingly dissolved for the first time when police apprehended the Golden State Killer (“GSK”), Joseph DeAngelo, in 2018.

The GSK was a serial rapist and murderer who terrorized California across six counties in the 1970s and 1980s.65Paige St. John & Luke Money, Golden State Killer Given Life in Prison for Rapes, Murders That Terrorized a Generation, L.A. Times (Aug. 21, 2020, 5:17 PM), https://www.latimes.com/california/story/2020-08-21/golden-state-killer-sentencing-justice-victims-serial-murders-rapes [https://perma.cc/SQ9Q-WJW2]. Escalating from peeping Tom behavior to burglary and finally to home invasion rapes and murders, which often seemed to target couples, the GSK was responsible for at least thirteen murders and over fifty rapes.66Id. While initially famous for the horrific nature of his offenses and the length of his escape from justice, DeAngelo—a former police officer—would become equally famous as the first defendant identified through familial DNA.67Id.

Prosecutors took genetic material preserved from the rape kits of GSK’s victims and first sent it to FamilyTreeDNA, a DTC testing company.68St. John, supra note 13. DTC companies like FamilyTreeDNA allow customers to submit their own DNA through saliva samples and receive genetic information such as countries of origin, health risks, and the names of relatives who have also submitted to the database.69Direct-to-Consumer Genetic Testing FAQ for Healthcare Professionals, Nat’l Hum. Genome Rsch. Inst., https://www.genome.gov/For-Health-Professionals/Provider-Genomics-Education-Resources/Healthcare-Provider-Direct-to-Consumer-Genetic-Testing-FAQ#:~:text=Direct%2Dto%2Dconsumer%20genetic%20tests,risks)%20from%20a%20saliva%20sample [https://perma.cc/65Y6-QXZ4]. Therefore, they contain a different and more varied range of profiles than those available in CODIS as they are unrelated to known crimes. Furthermore, the genetic profiles collected in genealogy databases, instead of consisting of STRs, are unique single nucleotide polymorphism (“SNP”) profiles.70Christi J. Guerrini, Ray A. Wickenheiser, Blaine Bettinger, Amy L. McGuire & Stephanie M. Fullerton, Four Misconceptions About Investigative Genetic Genealogy, 8 J.L. & Biosciences 1, 3 (2021). These are more evenly distributed through a person’s genome than STRs and can thus carry information about a person’s physical appearance that would not be available from a profile in CODIS.71Id. at 4.

FamilyTreeDNA created a DNA profile for the GSK’s sample which officers hoped would yield the identities of close family relations and, thus, enable them to narrow their search.72See St. John, supra note 13. That attempt yielded only distant relations and proved unhelpful in identifying the killer.73Id. However, a civilian genealogy expert assisting the investigative team uploaded the DNA profile to another DTC company, MyHeritage, using her own personal user profile.74Id. She also uploaded it to GEDmatch, a then-public site to which users could upload their DNA profiles and seek out family members for free.75Id.

The MyHeritage search yielded a pool of second cousins of the killer, one of whom investigators visited at her home in Orange County. She then voluntarily provided a DNA sample, which showed that the killer was related to her through other family members investigators had discovered on a third DTC site, Ancestry.com.76Id. This narrowed the pool of suspects down to six men, only one of whom, Joseph DeAngelo, had blue eyes—a feature already known from the original DNA profile. After ten days of surveilling DeAngelo, investigators seized DNA-bearing evidence from his trash can, finally proving him to be the killer.77Id.

The GSK story raises obvious privacy concerns around the access afforded to law enforcement by the companies themselves in the first place. Immediately after DeAngelo’s arrest, an investigator confirmed only that the officers had uploaded the rape kit profile to the open-source GEDmatch site.78Id. For a time, the FBI treated the three private companies as privileged confidential sources, instructing California investigators that they were not to reveal their identities as they assembled charges against DeAngelo.79Id.

As it turns out, the companies had widely divergent views about assisting law enforcement. FamilyTreeDNA actively assisted the FBI, giving them access to the site for investigative purposes without knowing specifically which case they were investigating.80Id. Their terms of service at the time contained a warning that the company could be required to release users’ personal information in response to a “lawful request by public authorities,” and their CEO stated that he did not believe assisting the police violated this policy.81Id. By contrast, MyHeritage’s privacy policy contained the stronger language that information would only be released “if required by law” (suggesting the company would only release information to law enforcement in the face of a warrant or at least a subpoena).82Id. Because MyHeritage did not assist law enforcement directly but merely sold its services to a purported consumer, it arguably did not violate its own policy. Its marketing executive noted that their privacy policy “did not explicitly” address this form of access and said “[i]t is possible that the civilian geneticist thought she was not violating our terms of service.”83Id.

In the wake of the interest generated by the GSK case, most DTC companies have revised their policies to strengthen and clarify the degree of privacy to be expected vis-à-vis law enforcement. For example, MyHeritage now stipulates that “[w]e will not provide information to law enforcement unless we are required by a valid court order or subpoena for genetic information.”84MyHeritage Privacy Policy, MyHeritage, https://www.myheritage.com/privacy-policy [https://perma.cc/EC34-HGG2]. The popular site 23andMe.com makes an even stronger statement, promising “to use all practical legal and administrative resources to resist requests from law enforcement,” though noting that under some circumstances the company “may be required by law to comply with a valid court order, subpoena, or search warrant for genetic or personal information.”8523andMe Guide for Law Enforcement, 23andMe, https://www.23andme.com/law-enforcement-guide [https://perma.cc/8M74-Y6CY]. Furthermore, most sites now prohibit users from uploading DNA belonging to someone other than themselves or a dependent.86See Jasper Ford-Monroe, Why Familial Searches of Civilian DNA Databases Can and Should Survive Carpenter, 72 Hastings L.J. 1717, 1725 (2021). Even these strengthened policies leave somewhat open-ended the question of how hard companies will resist police requests and, specifically, whether they will take the hardline position of companies like Apple, who refuse to hand over customer data in the absence of a warrant supported by probable cause.87Apple, Apple Transparency Report: Government and Private Party Requests 1 (2022), https://www.apple.com/legal/transparency/pdf/requests-2022-H1-en.pdf [https://perma.cc/U99B-VVWL]. Furthermore, it is difficult to imagine how genetic companies could prevent users from uploading a third party’s DNA sample under their own name.88Ford-Monroe, supra note 86, at 1725.

There are also two notable outliers in the privacy trend in consumer genetics. GEDmatch (now owned by the Qiagen Corporation) has taken a different approach, allowing law enforcement to upload DNA samples in cases of murder, nonnegligent manslaughter, aggravated rape, robbery, aggravated assault, or when there is a need to identify a dead body.89Id. While users must actively “opt in” to have their own DNA profiles matchable by law enforcement, the site actively encourages them to do so, exhorting that users can help “provide answers to those with missing loved ones” and “enable law enforcement to solve violent crimes and exonerate the falsely accused.”90GEDmatch & Community Safety, supra note 14. The GEDmatch site features profiles of crime victims identified and murders solved, along with the story of Christopher Tapp.91Id. FamilyTreeDNA has remained the most friendly to law enforcement, now clarifying on its site that it will allow police to create profiles to help identify bodies or perpetrators in violent crimes and requires users affirmatively to “opt out” of their data’s inclusion in such searches.92IGGM Frequently Asked Questions, supra note 14. The state of California now legally requires consumer genetic companies to obtain consent in this manner.93Cal. Civ. Code § 56.181(a)(2)(C)–(D) (West 2024).

As of the end of 2022, 545 cases have been solved using familial DNA.94Michelle Taylor, How Many Cases Have Been Solved with Forensic Genetic Genealogy?, Forensic Mag. (Mar. 3, 2023), https://www.forensicmag.com/594940-How-Many-Cases-Have-Been-Solved-with-Forensic-Genetic-Genealogy [https://perma.cc/MZ35-2PJ9]. Another dimension of consumer genetic databases worth noting is their demographic differences from CODIS. Black Americans appear to be overrepresented in CODIS relative to the general population.95See Ford-Monroe, supra note 86, at 1736 (citing Kim Zetter, DNA Sample from Son Led to Arrest of Accused ‘Grim Sleeper’, Wired (July 12, 2010, 7:41 PM), https://www.wired.com/2010/07/dna-database [https://perma.cc/9PYW-SDMU]). By contrast, people of Northern European ancestry are more heavily represented in consumer databases (perhaps unsurprisingly due to the uncertainty of precise ancestral origins among people of vaguely European descent).96See id. (citing Antonio Regaldo, A DNA Detective Has Used Genealogy to Point Police to Three More Suspected Murderers, MIT Tech. Rev. (June 26, 2018), https://www.technologyreview.com/2018/06/26/2600/a-dna-detective-has-used-genealogy-to-point-police-to-three-more-suspected [https://perma.cc/VTJ4-BSB3]). One study found that at least 60% of Americans of European descent may be identifiable through a genealogical database of just 1.3 million people.97See Yaniv Erlich, Tal Shor, Itsik Pe’er & Shai Carmi, Identity Interference of Genomic Data Using Long Range Familial Searches, 362 Science 690, 690 (2018).

II.  The Privacy Argument for Restricting Familial DNA

This Section will consider the privacy interests implicated by law enforcement use of familial DNA, starting with the Fourth Amendment framework protecting privacy. It will summarize the scholarly commentary arguing that warrantless familial DNA searches may violate the Fourth Amendment, as well as new state statutory protections that limit such searches. Finally, it will argue that police conducting familial searches of their own databases or of DTC databases with the consent of genetically related users raises colorable but ultimately quite weak Fourth Amendment arguments.

A.  The Constitutional Dimension

The debate over familial DNA occurs at a time of high doctrinal instability around the meaning of the Fourth Amendment in a world of constantly changing technology. The Fourth Amendment provides that:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.98U.S. Const. amend. IV.

The Founders adopted the Amendment, which mirrored parallel provisions in state constitutions at the time, in response to the Crown’s use of general warrants in the Colonies.99Gerard V. Bradley, Searches and Seizures, Heritage Found., https://www.heritage.org/constitution/#!/amendments/4/essays/144/searches-and-seizures [https://perma.cc/D72C-SZR8]. Courts issued these warrants allowing Crown agents to search and seize evidence with no limitations.100Id. In the infamous cases Entick v. Carrington (1765) and Wilkes v. Wood (1763), the Crown used these broad warrants to arrest two pamphleteers critical of the government and to seize their books and papers.101Wilkes v. Wood [1763] 98 Eng. Rep. 489, 490; Entick v. Carrington [1765] 95 Eng. Rep. 807, 807–08. Ultimately, Carrington and Wilkes won trespass suits against the relevant government.102Wilkes, 98 Eng. Rep. at 490; Entick, 95 Eng. Rep. at 807–08.

With this brief history as backdrop, most early cases construing the Fourth Amendment understood it to prohibit only warrantless, trespassory interferences with property, allowing auditory surveillance by law enforcement where they did not physically intrude on the defendant’s property.103See Olmstead v. United States, 277 U.S. 438, 466 (1928) (holding that warrantless wiretapping of private telephone conversations did not violate the Fourth Amendment because it did not occur physically on the defendants’ property but on a publicly-available phone network); Goldman v. United States, 316 U.S. 129, 134–35 (1942) (holding that evidence obtained by use of a detectaphone, applied to the wall of the room adjoining the office of the defendant, was not unlawfully obtained, despite a prior trespass). In the watershed 1967 case United States v. Katz, however, the Court made a change.104Katz v. United States, 389 U.S. 347 (1967). In Katz, FBI agents had attached a listening device to the outside of a public telephone booth in which the defendant was making a call.105Id. at 348. Explicitly overruling prior precedent, the Court held that this constituted a warrantless search and announced a new rule: “[w]hat a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. . . . But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.”106Id. at 351–52. This new test for the existence of a Fourth Amendment search has become known (based on language in Justice Harlan’s concurrence) as the “reasonable expectation of privacy” test.107Id. at 360 (Harlan, J., concurring). To apply it, courts ask, first, whether the defendant had exhibited a subjective expectation of privacy and, second, whether that expectation was “one that society is prepared to recognize as reasonable.”108Bond v. United States, 529 U.S. 334, 338 (2000).

While Katz ostensibly renounced the property-based trespass rule of the Fourth Amendment, the subsequent half-century of Supreme Court jurisprudence has seen, nonetheless, a doctrinal struggle between property- and privacy-based conceptions of the right. Some cases have elaborated on the reasonable expectation of privacy test, recognizing, for example, a reasonable expectation against thermographic surveillance by a heat-sensing device set up across the street from one’s home.109Kyllo v. United States, 533 U.S. 27, 40 (2001). In other cases, the Court declined to recognize such an expectation against overhead surveillance of property by police aircraft flying at FAA-approved heights110See Florida v. Riley, 488 U.S. 445, 450–51 (1989); California v. Ciraolo, 476 U.S. 207, 215 (1986). or in discarded trash set out for collection.111California v. Greenwood, 486 U.S. 35, 37 (1988). Yet, in still other cases, the Court has held that the Katz reasonable expectations test has been “added to, not substituted for, the traditional property-based understanding of the Fourth Amendment” and therefore need not apply when “the government gains evidence by physically intruding on constitutionally protected areas.”112Florida v. Jardines, 569 U.S. 1, 11 (2013); United States v. Jones, 565 U.S. 400, 409 (2012). In Jardines, the Court relied upon common law trespass concepts to hold it to be a search when a police officer brought a drug-sniffing dog onto a suspect’s porch. Jardines, 569 U.S. at 8–9. The Court stated that a police officer simply entering a porch to knock on the resident’s door fell into the traditional “implied invitation” to enter such a space—the same invitation that renders it not a trespass for Girl Scouts or trick-or-treaters to do the same. Id. at 8. However, the Court found, “[t]he scope of a license—express or implied—is limited not only to a particular area but also to a specific purpose.” Id. at 9. An officer bringing a trained police dog onto a porch for the purposes of sniffing out narcotics, the Court held, violated the implied license and, thus, constituted a Fourth Amendment search. Id. at 11–12.

One rule of particular relevance to the context of familial DNA is the so-called “third-party” doctrine, which predated and survived Katz.113See Sarah Murphy, Watt Now?: Smart Meter Data Post-Carpenter, 61 B.C. L. Rev. 785, 794 (2020). See generally United States v. White, 401 U.S. 745 (1971). The third-party doctrine states that a person has no reasonable expectation of privacy in communications they share with a third party—that the law “permits the frustration of actual expectations of privacy by permitting authorities to use the testimony of those associates who for one reason or another have determined to turn to the police.”114White, 401 U.S. at 752. The third-party doctrine has excluded from the warrant requirement scenarios in which an associate of the defendant has voluntarily worn a wire, as well as transaction records the police obtain from the defendant’s bank and call records (so-called “pen” registers) they obtain from the defendant’s phone company.115Id. at 754; United States v. Miller, 424 U.S. 435, 443 (1976); Smith v. Maryland, 442 U.S. 735, 744 (1979). But see Ferguson v. City of Charleston, 532 U.S. 67, 85–86 (2001) (holding that it violated the Fourth Amendment for hospital staff to analyze urine samples they had obtained within the protections of doctor-patient privilege for the purposes of providing incriminating information to law enforcement).

Under both the property and privacy theories of the Fourth Amendment, courts have generally recognized the presumption that if police conduct does constitute a search, a warrant is required.116See Kit Kinports, The Origins and Legacy of the Fourth Amendment Reasonableness-Balancing Model, 71 Case W. L. Rev. 157, 157 (2020). However, the Supreme Court has also held that some searches that would otherwise be presumed to require a warrant supported by probable cause are nonetheless constitutional because “the touchstone of the Fourth Amendment is reasonableness.”117Florida v. Jimeno, 500 U.S. 248, 250 (1991). In such cases, the Court weighs the defendant’s privacy interests against competing government interests, which usually happens in cases involving either categorical exceptions to the Fourth Amendment or administrative searches.118See Kinports, supra note 116, at 177–81. The “reasonableness balancing” model of the Fourth Amendment has created categorical exceptions such as stop-and-frisks based only on reasonable suspicion,119Terry v. Ohio, 392 U.S. 1, 19–20 (1968). searches incident to arrest,120Chimel v. California, 395 U.S. 752, 768 (1969). and police uses of force in cases where the officer’s actions were reasonable based on the facts confronting them.121Graham v. Connor, 490 U.S. 386, 388, 395 (1989). Using such balancing, the Court has also created administrative exceptions for wholly suspicionless searches of parolees, airport security checkpoints, sobriety checkpoints, fire code and public safety inspections, among many others.122See Camara v. Municipal Court, 387 U.S. 523, 540 (1967); Samson v. California, 547 U.S. 843, 846 (2006); Mich. Dep’t of State Police v. Sitz, 496 U.S. 444, 447 (1990); United States v. Davis, 482 F.2d 893, 908 (9th Cir. 1973). For an argument that the common probation condition allowing suspicionless searches of probationers’ phones is due for Supreme Court consideration, see generally Daniel Yeager, Certain Certiorari: The Digital Privacy Rights of Probationers, 50 Conn. L. Rev. Online 1 (2017).

As investigative technology has developed at a seemingly geometric rate, however, the Court has struggled to address all seemingly invasive police behavior under the privacy and property tests—especially in light of the third-party doctrine.123See Paul Ohm, The Fourth Amendment in a World Without Privacy, 81 Miss. L.J. 1309, 1325–26 (2012); Stephen E. Henderson, The Timely Demise of the Fourth Amendment Third Party Doctrine, 96 Iowa L. Rev. Bull. 39, 39–40 (2011); Sherry F. Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 Stan. L. Rev. 119, 121 (2002). In United States v. Jones, the Court unanimously held that police engaged in a warrantless search by affixing a GPS tracking device to a suspect’s car to track its movements.124United States v. Jones, 565 U.S. 400, 404 (2012). While the majority opinion rested on trespass grounds—that “[t]he Government physically occupied private property for the purpose of obtaining information” by attaching the device,125Id. Justice Sotomayor’s concurrence suggested that, in the future, the digital age might make it “necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties.”126Id. at 417 (Sotomayor, J., concurring). The Court also distinguished between digital data and other types of searches in Riley v. California, which dealt with the search of a suspect’s cell phone incident to arrest.127Riley v. California, 573 U.S. 373 (2014). The Court concluded that “[c]ell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person,” due to the wealth of sensitive information they contain about a person’s browsing history, location, relationships, and so forth.128Id. at 393. It thus held that, absent an emergency, police require a warrant to search the contents of a phone otherwise properly seized incident to arrest.129Id. at 401–02.

The future that Justice Sotomayor alluded to in Jones seemed finally to arrive in 2018 with Carpenter v. United States, in which the Court made the biggest technology-reactive shift in Fourth Amendment doctrine since Katz.130Carpenter v. United States, 585 U.S. 296 (2018). Carpenter involved the 1994 Stored Communications Act (“SCA”), which authorized the Government to compel private companies to disclose telecommunication records when it “offers specific and articulable facts showing that there are reasonable grounds to believe” that the records “are relevant and material to an ongoing criminal investigation.”13118 U.S.C. § 2703(d). While the SCA required that a magistrate make this determination in order for the government to obtain a subpoena, it was on a reasonable suspicion standard rather than the probable cause necessary for a warrant.132By imposing a reasonable suspicion standard, the Stored Communication Act (“SCA”) was actually intended to make it more difficult for the government to access third-party electronic records than it would be if normal subpoena law applied. Orin Kerr, Does Carpenter Revolutionize the Law of Subpoenas?, Lawfare (June 26, 2018, 6:44 PM), https://www.lawfaremedia.org/article/does-carpenter-revolutionize-law-subpoenas [https://perma.cc/D5NU-6Q4J]. Prior to the SCA, telecom companies had only the narrow Fourth Amendment argument that complying with the subpoena would be unduly burdensome. Id.

In Carpenter, the government obtained subpoenas under the SCA for weeks’ worth of cell-site location information (“CSLI”) from the defendant’s cell phone providers.133Carpenter, 585 U.S. at 302. CSLI data consists of time-stamped records generated several times a minute when a user’s phone connects to a cell phone tower.134Id. at 301. While it does not provide as precise of geographic data as GPS, CSLI data from a subject’s phone over a substantial period of time

provides government analysts with a broad picture of that person’s movements.135Id. at 309.

The government argued that the subpoenas were constitutional under the third-party doctrine; Carpenter had voluntarily shared his location information with his carriers in the same manner a person does their call record or as a person shares their financial transactions with a bank.136Id. at 313. The Court rejected this argument, holding for the first time that an individual “maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI.”137Id. at 310. Importantly (and contrary to some pre-Jones precedent),138United States v. Knotts, 460 U.S. 276, 282 (1983). the Court held that there was no distinction for these purposes between public and private movements, even if a subject’s public movements would be visible to the naked eye of someone physically following them.139Carpenter, 585 U.S. at 313–14.

The Court based its rule on five factors specific to the technological context of CSLI data.140See Laura Hecht-Felella, Brennan Ctr. for Just., The Fourth Amendment in the Digital Age: How Carpenter Can Shape Privacy Protections for New Technologies 9–10 (2021) (distilling a five-factor framework for the privacy test from Carpenter). First, it noted that such data is comprehensive: it provides a record of movement that is “detailed” and “encyclopedic” and constitutes “near perfect surveillance.”141Carpenter, 585 U.S. at 309, 312. Second, it is intimate in the sense that a cell phone “faithfully follows its owner beyond public thoroughfares and into private residences, doctor’s offices, political headquarters, and other potentially revealing locales.”142Id. at 311. Third, it is inexpensive—especially compared to “traditional investigative tools” like the in-person surveillance approved in earlier third-party doctrine cases.143Id. Fourth, it is retrospective in the sense that it allows the government to go back in time and investigate anyone it wishes, without having to determine an investigative target in advance.144Id. at 312. And, fifth, it is functionally nearly involuntary, due to the fact that cell phones are “indispensable to participation in modern society.”145Id. at 315. Carpenter left several significant issues explicitly unresolved. First, its holding was based on the seven days of data actually requested from one of the cell phone providers, leaving open the question of whether a request for a shorter period of data would constitute a search. Id. at 310 n.3. Second, the Court stated it did not express a view on the question of “real-time CSLI” or “tower dumps,” in which law enforcement download information from all of the devices that connected to a particular cell phone tower during a particular interval. Id. at 316.

Some scholars have suggested that Riley and Carpenter adopt a “mosaic” theory of the Fourth Amendment—a concept the D.C. Circuit, the lower court in Jones, had originally imported from the national security context and relied on to exclude the GPS tracking data.146United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010). Under a mosaic theory, a Fourth Amendment search can arise based on police actions taken over time, even if no individual step taken in isolation would constitute a search.147See Orin S. Kerr, The Mosaic Theory of the Fourth Amendment, 111 Mich. L. Rev. 311, 313 (2012). Critics such as Orin Kerr argue that the mosaic theory suffers from problems of administrability and an overreliance on a subject’s probabilistic expectations of privacy, which is ill-suited to regulate electronic surveillance.148Id. at 346. In the wake of Carpenter, lower courts have been divided over whether to formally recognize the mosaic theory as a fundamental rule of the Fourth Amendment.149Compare United States v. Tuggle, 4 F.4th 505, 517 (7th Cir. 2021) (holding that long-term video surveillance of a suspect’s house using pole cameras does not violate his reasonable expectation of privacy and noting that lower courts are not bound by the mosaic theory and that many have disapproved it), with United States v. Moore-Bush, 381 F. Supp. 3d 139, 150 (D. Mass. 2019) (granting a defendant’s motion to suppress pole camera surveillance footage on the grounds that it allowed the government to “piece together intimate details of [the defendant’s] life” and noting that the mosaic theory had effectively been adopted by the Supreme Court).

These new iterations of the reasonable expectation of privacy test have sparked broader debate about Katz itself. Many critics have advocated for replacing the Katz test entirely due to its confusing and cyclical nature.150See, e.g., William Baude & James Y. Stern, The Positive Law Model of the Fourth Amendment, 129 Harv. L. Rev. 1821, 1825–26 (2016); Richard M. Re, Fourth Amendment Fairness, 116 Mich. L. Rev. 1409, 1447 (2018); Michael J. Zydney Mannheimer, The Contingent Fourth Amendment, 64 Emory L.J. 1229, 1284–87 (2015). Others have argued that modern Fourth Amendment case law is actually driven by consistent principles which can now be applied to evolving technology. Matthew Tokson, for example, argues that the expectation of privacy turns on the intimacy of the area searched, the amount of information sought, and the cost of the investigation.151See, e.g., Matthew Tokson, The Emerging Principles of Fourth Amendment Privacy, 88 Geo. Wash. L. Rev. 1, 51–53 (2020) (applying these principles to novel technology and concluding that the Supreme Court would likely find drone surveillance footage and data from smart home devices to implicate the Fourth Amendment but real-time use of facial recognition technology in public places not to). These factors, relevant in Carpenter, are worth bearing in mind while considering how courts apply the recent Fourth Amendment precedent to DNA evidence.

B.  DNA and the Fourth Amendment

Given that traditional forensic DNA technology is nearly thirty years old, it is unsurprising that much of the Fourth Amendment case law concerning it long predates Carpenter. As discussed above, early use of forensic DNA relied heavily on databases assembled by law enforcement from perpetrators and suspects who were already lawfully in custody. Broadly speaking, “intrusions into the human body” such as blood draws constitute Fourth Amendment searches.152Schmerber v. California, 384 U.S. 757, 770 (1966). Yet in Maryland v. King, the Supreme Court rejected a Fourth Amendment challenge to the Maryland DNA Collection Act (“MDCA”), which allows state and local law enforcement to collect DNA samples from individuals arrested for a crime of violence, an attempted crime of violence, burglary, or attempted burglary.153Maryland v. King, 569 U.S. 435, 443, 465–66 (2013).

In King, the Court recognized that the intrusion of the DNA swabbing was a search and engaged in a balancing test to determine whether it was reasonable as an administrative exception to the Fourth Amendment (and therefore not requiring probable cause of a crime likely to yield DNA evidence). Specifically, the Court balanced the defendant’s privacy interest against “the need for law enforcement officers in a safe and accurate way to process and identify the persons and possessions they must take into custody.”154Id. at 449. Noting that a search incident to arrest is a long-standing exception to the warrant requirement, the Court, nevertheless, did not invoke the doctrine directly (likely because it limits a search to what is necessary to protect officer safety, prevent escape, and preserve evidence).155Chimel v. California, 395 U.S. 752, 762–63 (1969). Instead, the Court found that “[w]hen probable cause exists to remove an individual from the normal channels of society and hold him in legal custody, DNA identification plays a critical role in serving those interests.”156King, 569 U.S. at 450; see also United States v. Buller, No. 17-CR-40105, 2018 U.S. Dist. LEXIS 2202, at *14 (D.S.D. Jan. 5, 2018) (applying King to uphold an administrative DNA swab, authorized by federal law, of a misdemeanor arrestee and noting that “King . . . did not explicitly limit its holding only to serious felonies”). Finding the intrusion on the defendant’s privacy through the physical act of swabbing for DNA to be minimal, the Court upheld the MDCA. In dissent, Justice Scalia analogized the collection of DNA from arrestees for whom there was no probable cause of a crime of violence to the general warrants of the Colonial era.157King, 569 U.S. at 466 (Scalia, J., dissenting).

King left open many questions, such as whether DNA identification analysis of a blood sample originally drawn for a non-identification purpose (such as blood-alcohol analysis) constitutes a search.158See State v. Mitcham, 535 P.3d 948, 953 (Ariz. Ct. App. 2023). Lower courts have found some limits to the government’s Fourth Amendment authority to perform DNA analysis on samples they’ve obtained from non-arrest contexts. For example, the Fourth Circuit has held that King did “not give a law enforcement agency carte blanche to perform DNA extraction and analysis derived from clothing lawfully obtained from the victim of a crime in relation to the investigation of other crimes.”159United States v. Davis, 690 F.3d 226, 246 (4th Cir. 2012) (emphasis added). Similarly, an Arizona court has held that a defendant’s consent to a blood draw for testing for intoxicants did not authorize the police to create a DNA profile from the blood cells to investigate other offenses.160Mitcham, 535 P.3d at 957. The court, however, applied the fruit of the poisonous tree doctrine to reverse the trial court’s suppression order, on the grounds that the police had probable cause to arrest the defendant for murder even without the DNA profile and, thus, would have obtained a DNA profile anyway due to Arizona’s statute authorizing the DNA collection from suspects arrested for violent crimes. Id. at 958–59; see also Ariz. Rev. Stat. Ann. § 13-610(K) (1956). Federal district courts have denied government requests to conduct purported administrative DNA swabs for purposes other than the identification and safety rationales stated in King.161See United States v. Daughtridge, No. 16-CR-107-1H, 2018 U.S. Dist. LEXIS 153401, at *3–5 (E.D.N.C. Sept. 10, 2018) (rejecting a request, unsupported by cause, for the purposes of “securing evidence”). Others, however, have allowed such explicitly evidence-gathering searches on a showing of reasonable suspicion short of probable cause.162See United States v. Hayes, No. 15-CR-29, 2017 U.S. Dist. LEXIS 61945, at *4 (W.D.N.Y. Apr. 24, 2017).

While most of the existing DNA-related precedent involves clear police intrusions on the person of the subject for the purpose of collecting samples, and thus clearly trigger Fourth Amendment concerns under either a privacy or trespass conception, the use of consumer DNA databases do not involve bodily invasion. Furthermore, courts generally do not recognize a property interest in one’s DNA. In Association for Molecular Pathology v. Myriad Genetics, the Supreme Court held that isolated, naturally occurring DNA sequences could not be patented because isolating a gene is not an “act of invention.”163Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 569 U.S. 576, 591 (2013). More directly on point, courts have traditionally declined to recognize a property right in one’s own genetic materials that is sufficient to support a conversion action in cases where hospitals have utilized patients’ excised cells.164See Moore v. Regents of the Univ. of Cal., 793 P.2d 479, 489–90 (Cal. 1990) (dismissing a splenectomy patient’s conversion action after the treating physician collected and commercialized his tissue); Greenberg v. Mia. Child.’s Hosp. Rsch. Inst., Inc., 264 F. Supp. 2d 1064, 1074–76 (S.D. Fla. 2003) (dismissing donors’ conversion claims against a hospital who used their voluntarily donated genetic information in research which it subsequently patented and enforced restrictively). Scholars argue that recognizing property rights in DNA would raise a host of problems ranging from the conceptual165See I. Glenn Cohen, The Right Not to Be a Genetic Parent?, 81 S. Cal. L. Rev. 1115, 1151 (2008) (demonstrating that Lockean bases for property rights are inapt in the case of genetic information). to the dignitary166Sonia M. Suter, Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic Privacy, 72 Geo. Wash. L. Rev. 737, 800 (2004) (arguing that it “diminishes the personal value of our genetic information to describe it as a commodity”). to the policy-based.167Jorge L. Contreras, Direct-to-Consumer Genomics and Personal Health Data, in Consumer Genetic Technologies: Ethical and Legal Considerations 51, 64 (I. Glenn Cohen et al. eds., 2021) (arguing that the propertization of genetic data “could have severe consequences for biomedical research, public health, and the health care system well beyond the comparatively small DTC testing industry”). Critics of the status quo argue that the rise of consumer genetic companies, with the accompanying privacy concerns, necessitate property-based tools such as conversion actions to ensure good behavior and privacy practices.168See Jessica L. Roberts, In Favor of an Action for Genetic Conversion, in Consumer Genetic Technologies, supra note 167, at 39, 50. At least a couple of courts have recently proved receptive to privacy-based conversion claims related to genetic information.169Id. at 49–50 (citing Peerenboom v. Perlmutter, No. 2013-CA-015257, 2017 Fla. Cir. LEXIS 14957, at *10 (Jan. 23, 2017); Cole v. Gene by Gene, Ltd., No. 14-cv-00004, 2017 U.S. Dist. LEXIS 10176, at *5 (D. Alaska June 30, 2017)). Five states—Alaska, Colorado, Georgia, Louisiana, and Florida—have current legislation granting people ownership of their genetic information.170See Contreras, supra note 167, at 51. Nonetheless, after Carpenter, the privacy theory of the Fourth Amendment provides a stronger foundation for the argument that familial DNA database searches trigger the Fourth Amendment.

C.  The Case for Genetic Privacy post-Carpenter

The proliferating concerns over genetic privacy sparked by the rise of DTC genetics companies have been particularly salient in the law enforcement context. This Section will review arguments that law enforcement use of DTC genetic databases generally and for familial DNA searches specifically raise Fourth Amendment concerns even when third-party users consent to law enforcement access.171This Article focuses its analysis on familial searches of DTC databases in which the original user has affirmatively consented to law enforcement searches. A situation with no such consent would give the initial user a potential Fourth Amendment claim after Carpenter’s weakening of the third-party doctrine, though, as this Section will argue, an indirectly identified family member should lack standing to raise it. See Minnesota v. Carter, 525 U.S. 83, 91 (1998) (holding that third parties lack standing to challenge the constitutional violations of others). A situation without such explicit consent but where a website’s Terms of Service stipulated that information was subject to search by law enforcement raises a separate question. After Carpenter, it is, again, unclear that the third-party doctrine alone would automatically bar such a claim based merely on use of the database, though the Terms of Service would be relevant to the question of whether the user had a reasonable expectation of privacy in the information they shared there. Many courts have held that agreeing to a website’s terms of service constitutes a full-blown waiver of Fourth Amendment rights against government searches. See, e.g., Commonwealth v. Dunkins, 229 A.3d 622, 629–30 (Pa. Super. Ct. 2020), allocatur granted, 237 A.3d 415 (Pa. 2020) (per curiam). As Orin Kerr argues, however, such decisions are problematic because Terms of Service can define relationships only between private parties, not between a private party and the government. See Orin S. Kerr, Terms of Service and Fourth Amendment Rights, 172 U. Pa. L. Rev. 287, 287–88 (2024). It will also survey the state legislative responses to these concerns.

1.  The Scholarly Debate

The scholarly concern over privacy issues raised by forensic DNA generally and familial DNA specifically has been widespread with the weight of commentary suggesting that warrantless familial DNA searches explicitly violate Carpenter or should at least be otherwise prohibited.172See, e.g., George M. Dery III, Can a Distant Relative Allow the Government Access to Your DNA?: The Fourth Amendment Implications of Law Enforcement’s Genealogical Search for the Golden State Killer and Other Genetic Genealogy Investigations, 10 Hastings Sci. & Tech. L.J. 103, 121–28 (2019) (arguing that Carpenter applies to familial DNA); Claire Mena, Another Katz Moment?: Privacy, Property, and a DNA Database, 55 U. Mich. J.L. Reform 729, 753 (2022) (arguing that Maryland v. King should be reevaluated in light of evolving DNA technology); Karen J. Kukla, Direct to Consumer or Direct to All: Home DNA Tests and Lack of Privacy Regulations in the United States, 13 IP Theory 31, 53–54 (2023) (arguing for federal privacy regulations similar to those of the European Union); Jordan Mason, No Longer Innocent Until Proven Guilty: How Ohio Violates the Fourth Amendment Through Familial DNA Searches of Felony Arrestees, 69 Clev. St. L. Rev. 185, 205–09 (2020) (arguing that Ohio’s routine familial DNA searches of arrestees violate Maryland v. King because they do more than simply “identify” a person but reveal information about his blood relatives and because the governmental interests identified in King relate only to the arrestee himself, not to family); Emma Kenny-Pessia, Ditching “DNA on Demand”: A Harms-Centered Approach to Safeguarding Privacy Interests Against DNA Collection and Use by Law Enforcement, 101 Wash. U. L. Rev. 627, 641–56 (2023) (identifying the privacy harms caused by familial DNA collection and proposing legislation to address them); Alexis B. Hill, Note, I Just Took a DNA Test, Turns Out My Relative’s a Murder Suspect: Restoring Fourth Amendment Balance to Direct-to-Consumer DNA Testing Companies, 89 Geo. Wash. L. Rev. 1046, 1046–47 (2021) (arguing that genetic testing companies should be required to include an option for consumers to opt out of law enforcement access that details the consequences of remaining in the law enforcement pool); Caroline Spiers, Note, Keeping It in the Family: Direct-to-Consumer Genetic Testing and the Fourth Amendment, 59 Hous. L. Rev. 1205, 1205 (2022) (arguing that the third-party doctrine should be abolished entirely or else not applied to DTC genetic testing). But see Teneille R. Brown, Why We Fear Genetic Informants: Using Genetic Genealogy to Catch Serial Killers, 21 Colum. Sci. & Tech. L. Rev. 1, 1–2 (2020). Scholars have sought to delineate the nature of the privacy harms suffered by persons who are genetically identified through familial searches.173See Kenny-Pessia, supra note 172, at 641–53. Some argue that privacy violations implicate autonomy interests and result in “people’s inability to make choices in accordance with their preferences,” a consequence with additional negative emotional effects.174Danielle Keats Citron & Daniel J. Solove, Privacy Harms, 102 B.U. L. Rev. 793, 849 (2022). Furthermore, because genetic surveillance can be both large-scale and untethered to suspicion, it can also chill the exercise of civil liberties and create the risk of discrimination and selective enforcement.175Neil M. Richards, The Dangers of Surveillance, 126 Harv. L. Rev. 1934, 1935 (2013); see also David Gray & Danielle Citron, The Right to Quantitative Privacy, 98 Minn. L. Rev. 62, 72 (2013) (arguing that, under a mosaic theory, the sheer quantity of data susceptible of aggregation in searchable databases may violate privacy even when a smaller amount of the same sort of information might not).

Natalie Ram, one of the leading scholars on genetic privacy, argues that, based on the factors the Court identified in Carpenter, courts should recognize a Fourth Amendment reasonable expectation of privacy in one’s own DNA, even when stored in a third-party database.176Natalie Ram, Genetic Privacy After Carpenter, 105 Va. L. Rev. 1357, 1424 (2019). On the question of intimacy, Ram notes that genetic information is “deeply revealing” as well as “highly detailed and precise about the individual information it discloses.”177Id. at 1386–87. As to comprehensiveness, she notes that the sudden proliferation of consumer genetic databases and the use of genetic information in medical records—while not yet as widespread as cell phone usage—suggests that genetic analysis is a substantially growing part of users’ lives.178Id. at 1387–88. As to expense, Ram points out that the use of genetic data in investigations is cheap, easy, and efficient, similar to CSLI data.179Id. at 1388. Finally, as to voluntariness, she points again to the sudden proliferation of genetic databases to argue that their use “may be approaching an ‘inescapable and automatic nature’ ” in the way that cell phone use once reached fairly quickly.180Id. at 1389. She concludes that these factors all urge that there be a reasonable expectation of privacy in one’s own genetic information, even when voluntarily shared with third-party databases. Furthermore, she notes that there is a much stronger property interest in one’s own genetic information than in one’s location data—a fact seemingly supported by the user agreements of genetic sites which emphasize the user’s “ownership” of their own data, as well as the statutes in the five states that recognize it.181Id. at 1390.

With respect to familial DNA, the argument, of course, becomes more complicated due to the fact that an individual’s genetic information could be accessed through a third party voluntarily sharing their information—not only with the database itself but also through “opting in” or choosing not to “opt out” of sharing with law enforcement. Ram argues that in such cases, the target of the investigation who is indirectly identified through a family member’s DNA cannot be said to have voluntarily consented to the search, due to the fact that: (1) genetic relatedness is intrinsically involuntary and (2) people rarely have control over the decision-making of even near relations, much less the distant relations through which investigative matches often occur.182Ram, supra note 15, at 213–14. She thus concludes that, while a law enforcement search of a consumer database for a direct match, voluntarily shared, may be appropriate, searches for indirect matches through third-party relations is not.183Id. at 225.

2.  Legislative Responses

In the U.S., sixteen states have explicitly allowed law enforcement to conduct familial DNA searches, though often with policies limiting the usage to serious crimes or cases in which the public safety is at risk.184Ariz. Dep’t of Pub. Safety Sci. Analysis Bureau, Familial DNA Analysis, https://www.azdps.gov/sites/default/files/2023-08/Familial_DNA_Analysis_Flyer_3.pdf [https://perma.cc/YV9X-PEG8] (listing Arizona, California, Colorado, Florida, Kentucky, Louisiana, Michigan, Minnesota, New York, North Carolina, Ohio, South Dakota, Texas, Virginia, Wisconsin, and Wyoming); Utah Code Ann. § 53-10-403.7 (LexisNexis 2024); see also Alexandra Nieto, Familial Searching: How Implementing Minimum Safeguards Ensures Constitutionally-Permissible Use of This Powerful Investigative Tool, 40 Cardozo L. Rev. 1765, 1771–76 (2019) (summarizing various state law enforcement policies on familial DNA searches); In re Stevens, 227 N.E.3d 1064, 1070–71 (N.Y. 2023) (upholding the authority of New York’s Commission on Forensic Sciences to promulgate regulations allowing for familial DNA searches by law enforcement). Other states, however, have passed statutes greatly limiting such searches. The District of Columbia and Maryland bar familial DNA searches of the states’ own DNA databases.185D.C. Code § 22-4151(b) (2025); Md. Code Ann., Pub. Safety § 2-506(d) (West 2024). As to consumer databases, Maryland also has the most detailed statute to date, requiring judicial authorization based on a sworn affidavit by law enforcement with approval of the relevant prosecutor.186Md. Code Ann., Crim. Proc. § 17-102 (West 2024). Familial DNA searches will only be authorized when the crime is murder, rape, a felony sexual offense, or an act presenting “a substantial and ongoing threat to public safety or national security.”187Id. Furthermore, law enforcement must first attempt to identify a suspect through CODIS, as well as to first pursue “reasonable investigative leads” that ultimately fail to identify them.188Id. The law also limits law enforcement to databases that provide explicit notice to users that law enforcement may use it and that “seeks acknowledgement and express consent from its service users” regarding this possibility.189Id.

Montana’s statute, while more vaguely drafted, appears to severely limit familial DNA searches. It provides that “[a] government entity may not obtain familial DNA search results or search results from partial matching from the [state-maintained] DNA identification index or a consumer DNA database without a search warrant issued by a court on a finding of probable cause.”190Mont. Code Ann. § 44-6-104 (2023). It has another provision requiring the government to obtain a warrant even for direct searches of consumer database users, unless “the consumer whose information is sought previously waived the consumer’s right to privacy.”191Id. If Idaho had such a statute during Christopher Tapp’s post-conviction proceedings, he would likely remain in prison, as no probable cause would have existed at the time for the Idaho Falls Police to have assisted his family by searching for the DNA of the neighbor who was ultimately identified. In many cases, police could establish probable cause that the owner of the unidentified sample committed a crime (as, for example, when semen is found in the body of a rape victim). At other times, such as when there are large numbers of DNA samples found at a scene, this might be impossible. Furthermore, probable cause must exist for the specific area to be searched.192See California v. Acevedo, 500 U.S. 565, 580 (1991). It would often be a preventative burden for police to have to establish probable cause that relatives of the perpetrator have created a searchable account with a particular ancestry site, which would be necessary to establish probable cause that the database contained evidence of a crime.

D.  The Fourth Amendment Argument Against Familial DNA Searches is Weak

Any attempt to evaluate the strength of the Fourth Amendment argument against law enforcement use of familial DNA is necessarily complicated by the current instability of Fourth Amendment doctrine generally. Nonetheless, this Section will show that, whichever Fourth Amendment theory one subscribes to, the argument is fairly weak.

With respect to DTC databases in which users have opted in to sharing with law enforcement, the relevant rule is that consensual searches do not require warrants or any degree of suspicion to be reasonable under the Fourth Amendment.193See generally Amos v. United States, 255 U.S. 313 (1921); Schneckloth v. Bustamonte, 412 U.S. 218 (1973). It is therefore clear that if Person A submits their DNA sample to MyFamilyTree, opts in to law enforcement searches, and is subsequently identified as a match to a crime scene sample, no constitutional issues arise. If the DNA of said Person A leads the investigators indirectly to their Grandpa B, however, Grandpa may argue—with Ram and other scholars—that his privacy rights were violated because he did not consent to the search that led to his DNA. One possible response is that, at a physical level, it was not Grandpa’s genetic sample that was searched. In Fourth Amendment law generally, a defendant does not have standing to object to the violation of a third party’s constitutional rights.194See Rakas v. Illinois, 439 U.S. 128, 133 (1978). If only Person A was searched, Grandpa has no standing to object. This same argument would apply to familial searches of lawfully collected samples in police databases.

Critics argue, however, that the pervasiveness of technology should change existing Fourth Amendment principles and that there is functional identity between one person’s DNA and their family member’s, which should change our understanding of standing in these cases. As discussed above, Ram makes a good argument that genetic data obtained through familial searches meets the Carpenter factors insofar as it is intimate, comprehensive, and inexpensive, as well as involuntary from the perspective of the family member ultimately identified.195Ram, supra note 176, at 1386–90. Yet there are some compelling counterarguments. As to the intimacy of the data, Jasper Monroe-Jones notes that—unlike location or cell phone data—DNA “cannot reveal anything about a person’s actual actions, conduct, or character” but only, if anything, predisposition to various traits or diseases.196Ford-Monroe, supra note 86, at 1733. This point is even stronger when coupled with the fact that law enforcement officials who access consumer DNA sites only access the same identification information as other users, which does not include intimate information such as propensity for physical or psychological diseases.197See Guerrini et al., supra note 70, at 10. While it would be theoretically possible for law enforcement to reconstruct such intimate information from the information they can obtain, states could pass laws specifically prohibiting this practice, which the U.S. Department of Justice’s current Interim Policy on Forensic Genetic Genealogy already does.198Id. In short, a DNA match in a DTC database only provides one significant piece of information: the fact that a person or their family member was present at the place from which a sample was recovered.

Furthermore, critics may overstate the “inexpensiveness” of familial DNA searches—while putting a DNA sample into a consumer database may be easy, the process of building out family trees based on genetic relationships requires an expert in genetic genealogy and may take months.199Id. at 15. For now, at least, this process is not realistically comparable to looking at a map of cell tower pings. That said, due to the need for Fourth Amendment doctrine to be durable in the face of evolving technology, it should still be assumed that this technology may become less expensive in the future.

With the specific Carpenter factors only partially apposite to the problem of familial DNA, it is worth recurring to the test Carpenter attempts to apply: reasonable expectation of privacy. While it seems clear that Grandpa B cannot consent to Person A’s voluntary release of their genetic material to law enforcement, can it be said that he has a reasonable expectation of privacy in another person’s body? No authority recognizes such an expectation, which would need to be strong enough to overcome standing principles.200See State v. Hartman, 534 P.3d 423, 427 (Wash. Ct. App. 2023) (holding that the defendant did not have standing to challenge police use of familial DNA because there was no privacy interest in commonly held DNA that a relative voluntarily uploaded to a private database); People v. Williams, 178 N.Y.S.3d 420, 422 (Sup. Ct. 2022) (denying a motion to suppress evidence from a familial DNA search of CODIS because the defendant did not “establish that he was the victim of an unlawful search”); see also Ford-Monroe, supra note 86, at 1734; Brown, supra note 172, at 29; Antony Barone Kolenc, “23 and Plea”: Limiting Police Use of Genealogy Sites After Carpenter v. United States, 122 W. Va. L. Rev. 53, 100–01 (2019). It is a weak argument that, even if there is no reasonable expectation of privacy in personal genetic material left in another person’s bathroom, there should be a reasonable expectation of privacy in another person’s own genetic material that happens partially to match one’s own. As critics of the Katz test’s inherent circularity might note, with the increased public awareness of DNA science, such an expectation of privacy is even less reasonable than it might have been in, say, 1985.201See João Marinotti, Escaping Circularity: The Fourth Amendment and Property Law, 81 Md. L. Rev. 641, 649–53 (2022).

In addition, the preceding sections have made it clear that trespass-based theories of the Fourth Amendment provide even less traction for constitutional objections to familial DNA searches than does the Katz test. Clearly, a search of Person A’s sample (or the data it generates) is not a search of Grandpa B’s “person,” and most existing authorities hold that neither party has a property interest in the genetic sequence itself. Indeed, Greenberg v. Miami Children’s Hospital arose in Florida—one of only five states with statutes that recognize some form of property interest in genetic test results—and the court nonetheless held that the statute did not create a genetic property interest sufficient for establishing a conversion action.202Greenberg v. Mia. Child.’s Hosp. Rsch. Inst., Inc., 264 F. Supp. 2d 1064, 1075–76 (S.D. Fla. 2003). That said, as Jessica Roberts notes, at least a couple of courts have very recently shown receptiveness to conversion claims based on privacy violations involving a plaintiff’s own genetic material.203Roberts, supra note 168, at 44–45.

At the end of the day, there are colorable arguments on both sides of the question. As Ram argues, there is a mismatch in consent between the DTC user and the familial relation ultimately identified. Yet that mismatch complements another one: the mismatch in the sensitivity of the information consensually revealed about the initial user (including their immediately accessible name and contact information) and the information about the ultimately identified, distant relation (the match to a specific crime scene sample, established only after extensive analysis). Given the unique accuracy value of what such a search would reveal—near-certain presence at a crime scene—one could argue for a wholesale DNA carveout to the Fourth Amendment. In such cases, one might say that the crime-solving interests of law enforcement are particularly high relative to the interests of the suspect (privacy in the specific fact of having been at a crime scene). Entertaining such an argument, however, would require engaging in higher-level debates about the nature of the Fourth Amendment generally, which is beyond the scope of this paper.

The next Part will focus instead on one specific countervailing interest: the liberty interest of the falsely accused who could be exonerated through the availability of familial DNA searches to law enforcement. For constitutional purposes, the Due Process rights of this party must be weighed against the Fourth Amendment rights of a third party, and they must be weighed particularly heavily against any sub-constitutional privacy justifications for statutory restrictions on familial DNA searching.

III.  The Due Process Rights of the Innocent Suspect

This Part will argue that a falsely accused suspect has a colorable due process right in the availability of familial DNA testing. If a legislature or court were to impose a ban or probable cause requirement that could effectively preclude law enforcement from using familial DNA to identify unknown third-party suspects, it would impinge on already narrow, yet still cognizable, due process rights designed to protect innocents. The same would be true of any statute preventing private parties, including defendants, from conducting such searches. These rights derive from three sources, which this section will consider in turn: the Compulsory Process Clause, the Due Process right to exculpatory evidence, and the Due Process right to post-conviction relief procedures.

A.  The Compulsory Process Clause

The Sixth Amendment guarantees a criminal defendant, among other trial rights, the right “to have compulsory process for obtaining witnesses in his favor.”204U.S. Const. amend. VI. Unlike other Sixth Amendment rights, the Compulsory Process Clause is undertheorized and often overlooked by litigators.205Janet C. Hoeffel, The Sixth Amendment’s Lost Clause: Unearthing Compulsory Process, 2002 Wis. L. Rev. 1275, 1276 (2002). The case law on the Clause has been contradictory and confusing, alternating between the rule that it stands for the “accused’s ‘right to present a defense’ ” and the idea that it should be subordinate to statutory rules of evidence, such as the rules governing the admissibility of expert testimony, which apply to all litigants alike.206Id. (citing Washington v. Texas, 388 U.S. 14, 19 (1967)). It is also limited by the limits of the judicial power itself, which does not extend to the “executive” functions of the police and the prosecution.207See discussion infra Part III.A.3.

The constitutional idea of compulsory process has its origins in the burgeoning trial rights Parliament enacted in the late seventeenth and early eighteenth centuries, specifically for defendants accused of treason.208Robert N. Clinton, The Right to Present a Defense: An Emergent Constitutional Guarantee in Criminal Trials, 9 Ind. L. Rev. 711, 720 (1976). These included the right to notice of charges, the right to counsel, the right to produce witnesses under oath, and the right to compel attendance of involuntary witnesses. Id. Eventually Parliament extended the right to have witnesses give sworn testimony to all felony defendants, but there remained a gap between the rights of treason defendants and those in other cases. Hoeffel, supra note 205, at 1281. Trial rights in the American colonies initially paralleled and eventually surpassed their British counterparts in scope.209See Clinton, supra note 208, at 720. Pennsylvania recognized the most expansive rights; its Charter of Privileges, authored by William Penn, provided that “all criminals shall have the same Privileges of Witnesses and Council as their Prosecutors.”210Hoeffel, supra note 205, at 1281–82 (citing Pennsylvania Charter of Privileges § 5 (1701), reprinted in 1 Bernard Schwartz The Bill of Rights: A Documentary History 170–73 (1971)). At the time of the Founding, defendants’ trial rights within an adversary system were seen as a means of offsetting the power of the government.211Id. at 1282. Importantly, trial rights also protect truth-generation, and historical commentators emphasize their function of ensuring that innocent defendants are not convicted.212See William Blackstone, Commentaries on the Laws of England: Book the Fourth 208 (1769) (“It is better that ten guilty persons escape than that one innocent suffer.”); see also Akhil Reed Amar, The Future of Constitutional Criminal Procedure, 33 Am. Crim. L. Rev. 1123, 1132 (1996) (“Truth and accuracy are vital values. A procedural system that cannot sort the innocent from the guilty will confound any set of substantive laws, however just. . . . A Constitution proclaimed in the name of We the People should be rooted in enduring values that Americans can recognize as our values. Truth and the protection of innocence are such values.”); Daniel Epps, The Consequences of Error in Criminal Justice, 128 Harv. L. Rev. 1065, 1081–87 (2015) (surveying the impact of Blackstone’s principle).

  1.  The Subpoena Power

At the time the Bill of Rights was drafted, nine state constitutions included some sort of right for criminal defendants to call witnesses but only two, Massachusetts and New Hampshire, included the subpoena power.213Stephen Saltzburg, Compulsory Process Clause, Heritage Found., https://www.heritage.org/constitution/#!/amendments/6/essays/157/compulsory-process-clause [https://perma.cc/RS4F-FBW7]. Nonetheless, Congress adopted Madison’s draft language for the Sixth Amendment, including the subpoena power, with no discussion.214Id. While the Supreme Court would not formally consider the scope of the Compulsory Process Clause until the twentieth century, Chief Justice John Marshall, sitting as trial judge in the 1807 treason trial of Aaron Burr, would have the occasion to demonstrate his own understanding.215Id. Marshall approved a pre-indictment request for a subpoena of documents in the possession of President Thomas Jefferson without requiring the defense to pre-determine which ones might be material at trial.216Id.

The access to subpoenas of third-party witnesses and documents formally granted to most criminal defendants by state and federal rules of criminal procedure is notably narrower than what Justice Marshall understood compulsory process to require.217The Supreme Court has held that the Compulsory Process Clause provides fewer rights in discovery against the government than does the Due Process Clause under the Brady doctrine, discussed in the next Section. Pennsylvania v. Ritchie, 480 U.S. 39, 56 (1987). Thus, this Section focuses its analysis on subpoenas of third-party witnesses and evidence held by third parties. To avail themselves of the court’s subpoena power under Federal Rule of Criminal Procedure 17(c), a defendant must show that the evidence sought has “specificity,” “relevancy,” and “admissibility.”218United States v. Nixon, 418 U.S. 683, 700 (1974). A minority of circuits have followed Justice Marshall and held that the admissibility test requires only that evidence be potentially admissible at trial under the rules of evidence.219See generally In re Irving, 600 F.2d 1027 (2d Cir. 1979); United States v. Silverman, 745 F.2d 1386 (11th Cir. 1984). A majority, however, have applied a strict admissibility test, which requires a defendant to establish that the items sought are actually admissible before a subpoena will be enforced.220See United States v. Rand, 835 F.3d 451, 463 (4th Cir. 2016); United States v. Hang, 75 F.3d 1275, 1283 (8th Cir. 1996). See generally Thor v. United States, 574 F.2d 215 (5th Cir. 1978); United States v. Arditti, 955 F.2d 331 (5th Cir. 1992); United States v. Cuthbertson, 651 F.2d 189 (3d Cir. 1981); United States v. Fields, 663 F.2d 880 (9th Cir. 1981). Many states have similarly strict requirements.221See, e.g., People v. Kozlowski, 898 N.E.2d 891, 902 (N.Y. 2008) (requiring “a good faith factual predicate sufficient . . . to draw an inference that specifically identified materials are reasonably likely to contain information that has the potential to be both relevant and exculpatory”).

While proponents of the strict admissibility requirement often describe it as necessary to prevent a defendant from going on a “fishing expedition,”222See Bowman Dairy Co. v. United States, 341 U.S. 214, 219–21 (1951). critics point out that it foils the purpose of the Compulsory Process Clause.223Ken Miller, Focusing on a Subpoenaed Item’s Potential Evidentiary Use (As Nixon Intended) Will Permit Rule 17(c) Subpoenas to Promote Fair Trials, Fed. Law., Jan./Feb. 2018, at 25, 27. The defendant may never have seen the evidence sought and therefore be unable to explain how it is admissible, and in many cases, inadmissible evidence may be necessary to obtaining other admissible, exculpatory evidence.224Id. at 25. The rule in force in a given jurisdiction would therefore dictate whether, in a case where unidentified third-party DNA is recovered at a crime scene, the defendant could avail themself of the subpoena power to seek familial matches in a consumer database. In most cases, it would be impossible to tell in advance whether any matches would exist at all. If they did, they would be more likely to lead to relevant evidence after further testing, rather than be admissible in and of themselves. Regardless, even in a jurisdiction with a potential admissibility rule, statutes limiting familial DNA searches could fully thwart defendants’ right to compulsory process for securing evidence. For example, Maryland’s rule prohibits any “person” from conducting a familial search of the state DNA database, which would apply to defendants as well as state actors.225       Md. Code Ann., Pub. Safety § 2-506(d) (West 2024).

  1. The Right to Present a Defense and its State-Rule-Based Limitations

Another contested question regarding the Compulsory Process Clause is whether, beyond the right to subpoena witnesses, it gives defendants affirmative rights to put witnesses and evidence on the stand. If so, this would be a colorable basis for arguing that a defendant has a constitutional right to present familial DNA evidence—superior to any state-law prohibitions regulating DNA and at least equal to the Fourth Amendment rights of the identified parties. In 1967, the Supreme Court considered this question for the first time in Washington v. Texas, when it considered the constitutionality of two Texas statutes preventing a criminal defendant from offering the testimony of a person charged or convicted as a co-conspirator for the charged crime.226Washington v. Texas, 388 U.S. 14, 16 (1967). The Court first held that the compulsory process right is so fundamental to a fair trial that it is incorporated against the states by the Due Process Clause of the Fourteenth Amendment.227Id. at 17–19. It then concluded that it includes the right to “present a defense” to the jury:

The right to offer the testimony of witnesses, and to compel their attendance, if necessary, is in plain terms the right to present a defense, the right to present the defendant’s version of the facts as well as the prosecution’s to the jury so it may decide where the truth lies. Just as an accused has the right to confront the prosecution’s witnesses for the purpose of challenging their testimony, he has the right to present his own witnesses to establish a defense. This right is a fundamental element of due process of law.228Id. at 19 (emphasis added).

The Washington Court’s test for whether a state evidentiary rule violates this right is whether it is “arbitrary,” holding, in this case, that Texas “arbitrarily denied [the defendant] the right to put on the stand a witness who was physically and mentally capable of testifying to events that he had personally observed, and whose testimony would have been relevant and material to the defense.”229Id. at 23. In so doing, the Court noted that the Texas laws had deep common law roots in a rule that once totally barred defense witnesses, which was abolished by the Sixth Amendment but lived on in the form of various restrictions on the testimony of co-defendants.230Id. at 20–22.

 Washington would be the first of three cases in which the Supreme Court held that the Compulsory Process Clause gave the defendant a broad right to present evidence that is “relevant and material” to telling their side of the story, over state rules that are “arbitrary or disproportionate” to their purpose.231Rock v. Arkansas, 483 U.S. 44, 55–56 (1987). The second Supreme Court case in this line came in 1986 with Crane v. Kentucky, which reversed a trial court’s ruling that a defendant could not testify about alleged police coercion around his confession. Crane v. Kentucky, 476 U.S. 683, 691–92 (1986). The trial court had held that the issue of voluntariness had already been litigated during the defendant’s failed motion to suppress the confession. Id. at 686. While explicitly withholding comment on the strengths or merits of the defendant’s proffered testimony, the Court found that the defendant’s constitutional right to test the prosecution’s case at trial “would be an empty one if the State were permitted to exclude competent, reliable evidence bearing on the credibility of a confession when such evidence is central to the defendant’s claim of innocence.” Id. at 690. In holding that the testimony should have been admitted, the Court emphasized its “relevance” to the defense and the lack of a “rational justification” for its exclusion. Id. at 689, 691. Third, and finally, in Rock v. Arkansas the Court held that the Arkansas Supreme Court violated the defendant’s compulsory process rights by ruling that hypnotically refreshed testimony was per se inadmissible. Rock, 483 U.S. at 62. It held that the court’s per se ruling was “arbitrary” and “disproportionate” to the purposes it was designed to serve (in this case, ensuring the reliability of evidence). Id. at 55–56. The Court directed that “[i]n applying its evidentiary rules a State must evaluate whether the interests served by a rule justify the limitation imposed on the defendant’s constitutional right to testify.” Id. at 56. These cases explicitly emphasize the Compulsory Process Clause’s purpose of assisting the jury in the search for truth.232Rock, 483 U.S. at 54 (quoting Rosen v. United States, 245 U.S. 467, 471 (1918)) (observing that the “truth is more likely to be arrived at by hearing the testimony of all persons of competent understanding who may seem to have knowledge of the facts involved in a case, leaving the credit and weight of such testimony to be determined by the jury or by the court”). In one of the most comprehensive modern treatments of compulsory process, Janet Hoeffel observes that the Washington Court effectively adopted an overbreadth test based on its reasoning that the Texas law “prevent[ed] whole categories of defense witnesses from testifying on the basis of a priori categories that presume them unworthy of belief.” Hoeffel, supra note 205, at 1292 (quoting Washington, 388 U.S. at 22). As Janet Hoeffel notes, Washington and its progeny appear to stand for the proposition that the accused’s right to present a defense is a significant one.233Hoeffel, supra note 205, at 1298. When there is a clash between the defendant’s right to compulsory process and some state evidentiary rule—even one, as in Washington, based in common law—and the opponent of the evidence can test its reliability through the adversarial process, these cases all hold that “the Constitution prefer[s] that the jury hear the evidence.”234Id.

In other cases, however, the Supreme Court appears to subordinate the defendant’s right to put on a case to state laws—to “shrink,” as Hoeffel puts it, “the right to little more than a right to put on evidence, as long as it comports with the rules of evidence.”235Id. For example, in Chambers v. Mississippi, the Court decided for the defendant, holding that the combination of Mississippi’s hearsay rule excluding statements against penal interest and its so-called “ ‘voucher’ rule,” preventing a party from impeaching its own witness, violated Due Process.236Chambers v. Mississippi, 410 U.S. 284, 294, 298–302 (1973). In doing so, however, the Court did not ask the general question it asked in Washington and its progeny—whether the Mississippi rule was “arbitrary” or “disproportionate” to its stated goal of preventing perjured or unreliable testimony. Instead, it turned to the facts of the specific case and determined that the out-of-court statements at issue had “considerable assurance of their reliability.”237Id. at 300.

The Supreme Court further refined its compulsory process rule in cases unrelated to the reliability of evidence. United States v. Valenzuela-Bernal involved the pre-trial deportation of a possible defense witnesses—a context more analogous to statutory preclusion of defendants’ access to familial DNA searches. The Court held that to establish a violation, a defendant “must at least make some plausible showing of how [the excluded] testimony would have been both material and favorable to his defense.”238United States v. Valenzuela-Bernal, 458 U.S. 858, 867 (1982) (emphasis added). Then, in Taylor v. Illinois, the Court—while reemphasizing that the Sixth Amendment provides a defendant not only the right to subpoena witnesses but also the right to put them on the stand—rejected the defendant’s argument that such a right to exculpatory evidence is absolute.239Taylor v. Illinois, 484 U.S. 400, 406–11 (1988). It held that the accused “does not have an unfettered right to offer testimony that is incompetent, privileged, or otherwise inadmissible under standard rules of evidence” and noted that “the trial process would be a shambles if either party had an absolute right to control the time and content of his witnesses’ testimony.”240Id. at 410–11. On that basis, the Court held that the trial court did not violate the Compulsory Process Clause by excluding a defense witness when it found that the defendant had willfully failed to disclose the witness in an attempt to obtain a tactical advantage that would minimize the effectiveness of cross examination.241Id. at 416–17; see also United States v. Scheffer, 523 U.S. 303, 316–17 (1998) (upholding the Military Rule of Evidence categorically banning exculpatory polygraph evidence against defendant’s compulsory process claim because, unlike the hypnotized defendant in Rock, he would still be able to testify to “his version of the facts” in which the addition of the polygraph expert would only serve to bolster his credibility).

In practice, the circuits have routinely engaged in fact-specific analysis to uphold trial courts’ exclusion of defense evidence as not arbitrary or disproportionate, or on the grounds that the excluded evidence was not material or favorable.242See, e.g., United States v. Crater, 93 F.4th 581, 587–90 (1st Cir. 2024) (upholding the lower court’s decision not to enforce defendant’s subpoena of government witnesses because it was not material or favorable as at best it could be used only to impeach witnesses the government never called to testify); Cagle v. Branker, 520 F.3d 320, 325 (4th Cir. 2008) (upholding the exclusion of a defense witness’ testimony on the grounds that the court had found him to be “ ‘an opportunistic liar’ whom no reasonable jury would believe”); United States v. Corr, 543 F.2d 1042, 1052 (2d Cir. 1976) (noting that it was troubled by the trial court’s exclusion of evidence related to valuation of losses in a mail fraud case as it was “relevant to [defendant’s] good faith and tended to corroborate part of [defendant’s] own testimony” yet finding no error due to “the discretionary nature of the exclusion” and the fact that “the jury had ample opportunity to consider and weigh the defense” through other evidence). Even under a narrow view of the rule, however, it seems a criminal defendant who can show the existence of material, favorable DNA evidence has a Compulsory Process right for the court to subpoena that evidence. In practice, this would require that the defendant receive a crime scene sample from the prosecution as Brady material and obtain a subpoena from the court to allow the defense to upload it to a consumer DNA database, regardless of the database’s privacy policies.

In a case involving an unknown, third-party genetic sample found at a crime scene, the defendant has an argument that any potential matches to that profile are material in the sense that they would make the identity of a particular perpetrator other than the defendant more or less likely. The challenge, of course, would be in showing that potential DNA matches in a consumer database are likely to be favorable to a defendant. In most cases, this could not be known reliably ahead of time because the third-party sample could come from someone easily explained away as innocently present at the crime scene. Furthermore, it could not even be known ahead of time whether a consumer database would provide a familial match at all. Finally, even if a database did contain a familial match, the defense would need an expensive genetic expert to build out a profile of the actual perpetrator from the data of whichever family member had made their identity public. However, the fact that a right is difficult to realize in practice does not in and of itself allow the government to violate it.

  1. Constitutional Limitations

Another obstacle for a defendant seeking to make a compulsory process argument for the right to subpoena familial DNA evidence comes from the constitutional separation of powers. The Compulsory Process Clause governs a defendant’s rights at trial, not during the course of a police investigation. Courts have largely recognized the right to present a defense as implicating judicial, rather than executive, branch powers.243See Rebecca Wexler, Life, Liberty, and Data Privacy: The Global CLOUD, the Criminally Accused, and Executive Versus Judicial Compulsory Process Powers, 101 Tex. L. Rev. 1341, 1383 (2023). This distinction has extinguished compulsory process clause arguments in situations in which the law limits defendants’ ability to conduct investigations for themselves.

For example, as Rebecca Wexler has noted, in cases involving extraterritorial investigations, courts have held against compulsory process challenges the asymmetries between law enforcement and defense investigators created by Mutual Legal Assistance Treaties (“MLATs”).244Id. at 1358. An MLAT is a bilateral treaty that commits the signatory nations to reciprocal cooperation in criminal investigations, including waiver, where relevant, of privacy laws that would otherwise prevent the transfer of evidence across borders.245Id. MLATs do not, however, provide for defense subpoenas of material protected by such privacy laws, which puts it out of the reach of compulsory process. As one federal court put it, “the right to compulsory process . . . cannot be stretched to include compelling the invocation of treaty process powers available only to the Executive Branch.”246United States v. Rosen, 240 F.R.D. 204, 215 (E.D. Va. 2007).

Courts have applied similar logic in cases involving conflict between the asserted Sixth Amendment compulsory process rights of a defendant and a potential defense witness who asserts their Fifth Amendment privilege against self-incrimination. Trial courts are deemed to have a duty to protect the witness’s Fifth Amendment right, and if a trial court sustains a witness’s assertion of the privilege, the defendant lacks the right to force the witness to take the stand only to assert the privilege.247United States v. Lyons, 703 F.2d 815, 818 (5th Cir. 1983). If the witness has already testified for the prosecution and asserts the privilege on cross-examination, however, the trial court may strike the direct examination testimony if it finds a “substantial danger of prejudice by depriving [the defendant] of the ability to test the truth of the witness’s direct testimony.”248Id. at 819 (quoting United States v. Diecidue, 603 F.2d 535, 552 (5th Cir. 1979)). Otherwise, the case law establishes that in such situations of competing constitutional rights courts have no authority to either compel the government to grant immunity to a defense witness or to grant such immunity themselves.249See United States v. Simmons, 70 F.4th 1086, 1089 (8th Cir. 2023); United States v. Dolah, 245 F.3d 98, 105 (2d Cir. 2001). This rule appears based on the idea that immunity is “pre-eminently a function of the Executive Branch.”250See Wexler, supra note 243, at 1388 (quoting United States v. Turkish, 623 F.2d 769, 776 (2d Cir. 1980)).

The MLAT and Fifth Amendment examples suggest that when a statute or competing constitutional right prevents a defendant from fully realizing their compulsory process right, compulsory process is subordinate, and courts even lack the authority to force the government to take “executive” measures to allow the defendant the same end-runs around such rules that the government is allowed to take for itself. The case law is more conflicted when the question presented is whether the Compulsory Process Clause requires a court to compel a witness to give testimony protected by attorney-client privilege. Such cases involve a clash between the constitutional right of the defendant and the statutory right of the witness. The most recent Supreme Court case to touch this question, Swidler & Berlin v. United States, left it unresolved.251Swidler & Berlin v. United States, 524 U.S. 399, 408 n.3 (1998). In this case, the court held that attorney-client privilege survives a client’s death, but left open the question of whether “exceptional circumstances implicating a criminal defendant’s constitutional rights might warrant breaching the privilege.”252Id. Since then, a minority of courts have held that that a defendant’s Sixth Amendment rights (confrontation as well as compulsory process) require the court to pierce attorney-client privilege when the witness’s testimony is material.253See Murdoch v. Castro, 365 F.3d 699, 706 (9th Cir. 2004) (“[T]he attorney-client privilege ‘must fall before the right of petitioner to seek out truth in the process of defending himself.’ ”); State v. Hoop, 731 N.E.2d 1177, 1187 (Ohio Ct. App. 1999). Other courts categorically subordinate the compulsory process right to “traditional testimonial privileges,” in a logic similar to that of the Supreme Court in Chambers.254United States v. Serrano, 406 F.3d 1208, 1215 (10th Cir. 2005); People v. Gonzalez, 465 N.Y.S.2d 471, 473–74 (Sup. Ct. 1983). Still, other courts will engage in some sort of balancing to determine whether the compulsory process right pierces the privilege.255See, e.g., United States ex rel. Blackwell v. Franzen, 688 F.2d 496, 501 (7th Cir. 1982) (examining the record to determine “whether the probative value of the alleged privileged communication was such that the defendant’s right to effective cross-examination was substantially diminished”); Neku v. United States, 620 A.2d 259, 263 (D.C. 1993) (balancing the privileged testimony’s “probative value” against the interests the privilege serves and piercing where the probative value is “clear and substantial”).

The context of the Stored Communications Act (“SCA”) ostensibly provides an example most relevant to the context of familial DNA. Courts have interpreted the SCA to categorically bar defense counsel from subpoenaing U.S. service providers for users’ stored electronic communications regardless of how exculpatory the potential evidence might be, while expressly permitting law enforcement to subpoena such information.256Wexler, supra note 243, at 1373. The government’s subpoena power under the SCA is now, as discussed above, limited by Carpenter, thus lessening the adversarial asymmetry between prosecution and defense. Even after Carpenter, however, some courts have suggested in dicta that a categorical bar on criminal defense subpoenas for electronic communications under the statute might impinge on a defendant’s right to compulsory process under certain circumstances, though none have reached the issue.257See Facebook, Inc. v. Wint, 199 A.3d 625, 633–34 (D.C. 2019); Facebook, Inc. v. Superior Ct., 471 P.3d 383, 402 (Cal. 2020). A similar argument would seem to apply to a defendant being statutorily barred from subpoenaing relevant familial DNA evidence from a consumer site.258In a similar vein, Jacob McCarty has argued that the Compulsory Process Clause should be held to guarantee defendants access to material video evidence during the “acceptance period” prior to trial. He points to the unique salience of video technology and its heightened likelihood of destruction through routine video retention policies prior to trial. Jacob W. McCarty, Processing Speed: Expanding the Sixth Amendment Right to Compulsory Process in the Age of Big Data, 95 Tul. L. Rev. 183, 190–91 (2020).

  1. Conclusions on Familial DNA and Compulsory Process

In a case like Christopher Tapp’s, an innocent defendant would benefit from the ability to run an unidentified third-party DNA sample through a database to seek matches—direct or familial—that suggest other suspects.259The availability of such a sample from investigators in the first place raises separate issues under Brady doctrine, discussed in the next Section, infra. To the extent that the companies’ own privacy policies barred individuals from uploading DNA other than their own, this would likely require a court-issued subpoena to effectuate. In jurisdictions following the “strict admissibility rule,” the defendant would likely be unable to meet the admissibility requirement because it would be impossible to prove ahead of time that such a database would in fact contain matches relevant to the case. In jurisdictions following the “potential admissibility rule,” they would likely fare better. Either way, a rule like Maryland’s—which prohibits even defendants from conducting familial DNA searches, at least in police databases—wholly extinguishes the right to compulsory process for this type of evidence.

Privacy law scholars have called for an equivalent to the SCA to protect consumers’ genetic information,260See Natalie Ram, Christi J. Guerrini & Amy L. McGuire, Genealogy Databases and the Future of Criminal Investigation: The Police Can Access Your Online Family Tree Research—and Use It to Investigate Your Relatives, 360 Science 1078, 1079 (2018). yet courts have noted in the SCA context that the total unavailability of a category of evidence due to lack of subpoena power raises Compulsory Process issues. Critics note that the current admissibility requirement in the subpoena rules of most jurisdictions raises a similar problem, broadly speaking.261See, e.g., Miller, supra note 223, at 26. Should states pass consumer DNA statutes that wholly bar access to such evidence by defendants, these issues would be compounded, and the Sixth Amendment impairment would be even greater. A defendant has a colorable argument that such a statute would be “arbitrary or disproportionate,” under Washington, to its privacy goal.

B.  The Due Process Right to Exculpatory Evidence

The Sixth Amendment right to obtain judicial assistance in securing evidence from third parties is, as we have seen, severely limited. However, the Supreme Court has also recognized a Fourteenth Amendment due process right to the government’s exculpatory investigative materials that is distinct from—and broader than—the compulsory process right.262See Pennsylvania v. Ritchie, 480 U.S. 39, 56 (1987). Brady v. Maryland held that due process requires that a prosecutor turn over to the defendant all material, exculpatory evidence in their possession.263Brady v. Maryland, 373 U.S. 83, 87 (1963). United States v. Agurs clarified that this duty exists even without a request from defense counsel where suppression of the evidence would be “of sufficient significance to result in the denial of the defendant’s right to a fair trial.” United States v. Agurs, 427 U.S. 97, 107–08 (1976). It further held that failure to do so violates due process even when the prosecutor is not acting in bad faith.264Brady, 373 U.S. at 87. Subsequent cases confirmed that evidence tending to impeach prosecution witnesses constitutes material, exculpatory evidence for Brady purposes.265Giglio v. United States, 405 U.S. 150, 154 (1972). Regardless of whether the defense requests the evidence, favorable evidence is material “only if there is a reasonable probability that, had the evidence been disclosed to the defense, the result of the proceeding would have been different.”266United States v. Bagley, 473 U.S. 667, 682 (1985). Restated, the test is whether “the favorable evidence could reasonably be taken to put the whole case in such a different light as to undermine confidence in the verdict.”267Kyles v. Whitley, 514 U.S. 419, 435 (1995). However, evidence is not considered “ ‘suppressed’ by the government when the defendant has access to the evidence before trial by the exercise of reasonable diligence.”268United States v. White, 970 F.2d 328, 337 (7th Cir. 1992).

 1.  Brady and DNA

The Supreme Court has emphasized that the prosecutor has a duty to learn of any favorable evidence known to “the others acting on the government’s behalf,” such as the police.269Kyles, 514 U.S. at 437. It is currently uncertain to what extent a defendant has a Brady right to evidence of a third-party’s DNA from a CODIS search conducted on DNA found at a crime scene.270Garrett, supra note 59, at 1659–60. The sparse case law dealing with such claims has rejected specific arguments on their own facts, finding that the prosecution’s failure to disclose CODIS hits under the circumstances could not be “taken to put the whole case in such a different light as to undermine confidence in the verdict.”271Kyles, 514 U.S. at 435; see, e.g., State v. Rosa, 230 A.3d 677, 692–93 (Conn. App. Ct. 2020) (holding that evidence of third-party DNA collected from a sweatshirt near the crime scene was not material because there was no evidence to indicate how long the sweatshirt had been there or that it was even present when police first responded to the crime scene); Dorsey v. Steele, No. 15-08000-CV, 2019 U.S. Dist. LEXIS 166667, at *31–32 (W.D. Mo. Sept. 7, 2019) (rejecting as immaterial the defendant’s Brady claim based on an undisclosed CODIS hit to a third-party in addition to the hit to the defendant, because (1) the jury was told that 2.3 out of every 1,000 males would not be ruled out by the test, (2) that indeed there had been a hit in this case to yet another third-party they did hear about, and (3) because the evidence connecting other CODIS hits to the crime was weak in comparison to the extensive evidence against the defendant); State v. Knight, 245 N.E.3d 859, 879–80 (Ohio Ct. App. 2024) (holding that Brady was not violated because the prosecution eventually provided defense counsel with evidence of a third-party CODIS hit before trial, but that the trial court erred by granting the defendant only a continuance of the trial due to the lengthy delay in disclosure); People v. Jackson, No. B210542, 2010 Cal. App. Unpub. LEXIS 4855, at *8 (June 28, 2010) (finding no Brady violation where the withheld CODIS hit was inculpatory rather than exculpatory); Jones v. Comm’r of Corr., 274 A.3d 237, 256 (Conn. App. Ct. 2022) (finding no Brady violation because the third-party CODIS hit was not material as (1) the blood evidence was not at the crime scene but was in the victim’s locked car some distance from the crime scene, (2) the blood was dry, (3) the victim only recently had purchased the car, and (4) the petitioner did not present testimony or evidence linking a third party to the crime); State v. James, No. A-19-797521-W, 10C265506, 2020 Nev. Dist. LEXIS 165, at *22 (Feb. 21, 2020) (finding no Brady violation where there was sufficient independent evidence that the defendant sexually assaulted the victim); State v. Estes, No. CA2013-12-126, 2014 Ohio App. LEXIS 3230, at *P27–28 (July 28, 2014) (finding no Brady violation where the state did not disclose the identity of a third party whose DNA was found on heroin paraphernalia because the jury was told the defendant’s DNA was not found on it and the jury nonetheless found him guilty, believing that more than one person could have shared a straw). Nonetheless, the reasoning in those cases indicates that if the defendant can show materiality, CODIS hits are subject to disclosure under Brady.

Brady and its progeny apply to exculpatory evidence that remains in the government’s possession, but a separate line of cases governs situations in which the government no longer possesses the evidence in question.272United States v. Femia, 9 F.3d 990, 993 (1st Cir. 1993). In California v. Trombetta, the Court held that a defendant complaining of a state’s failure to preserve evidence must show, first, that the evidence “possess[es] an exculpatory value that was apparent before the evidence was destroyed” and, second, “[is] of such a nature that the defendant would be unable to obtain comparable evidence by other reasonably available means.”273California v. Trombetta, 467 U.S. 479, 488–89 (1984). Subsequently, the Court added a third element to this test in Arizona v. Youngblood, holding that “unless a criminal defendant can show bad faith on the part of the police, failure to preserve potentially useful evidence does not constitute a denial of due process.”274Arizona v. Youngblood, 488 U.S. 51, 58 (1988). Numerous states have since adopted statutes requiring law enforcement to preserve DNA evidence.275See Garrett, supra note 59, at 1669. The government’s failure to preserve evidence when there is a duty to do so gives rise to a due process violation under some state constitutions if the evidence is material.276See generally State v. Ferguson, 2 S.W.3d 912 (Tenn. 1999); Ex parte Gingo, 605 So. 2d 1237 (Ala. 1992); Thorne v. Dep’t of Pub. Safety, 774 P.2d 1326 (Alaska 1989); State v. Matafeo, 787 P.2d 671 (Haw. 1990); Commonwealth v. Henderson, 582 N.E.2d 496 (Mass. 1991); State v. Osakalumi, 461 S.E.2d 504 (W. Va. 1995).

Youngblood also said in dicta that there is no due process right to the government using any “particular investigatory tool,” including quantitative testing, to secure exculpatory evidence.277Youngblood, 488 U.S. at 58–59. This makes it unclear whether a defendant has a Brady right to require police to upload unidentified third-party samples into CODIS to search for exculpatory hits. The argument is that, due to the cooperation between local prosecuting authorities and the federal government, which runs CODIS, any data in the database could qualify as evidence “known to” others acting on “the government’s behalf.278See Nat’l Inst. of Just., DNA for the Defense Bar 31 (2012), https://www.ojp.gov/pdffiles1/nij/237975.pdf [https://perma.cc/KQJ8-8DGV]. Some courts have adopted this reasoning despite Youngblood.279See, e.g., Commonwealth v. Brison, 618 A.2d 420, 424–25 (Pa. Super. Ct. 1992) (acknowledging but not following the Youngblood dicta); State v. Schwartz, 447 N.W.2d 422, 427 (Minn. 1989); State v. Hammond, 604 A.2d 793, 806–08 (Conn. 1992) (indicating that state’s failure to have DNA tests performed on the vaginal swabs taken from the victim where DNA tests previously performed on the victim’s clothing exculpated the defendant may have constituted a breach of duty to disclose exculpatory evidence which could have affected the case’s outcome); State v. Thomas, 586 A.2d 250, 253 (N.J. Super. Ct. App. Div. 1991) (suggesting that the state’s failure to submit material for DNA analysis may trigger its obligation to reveal exculpatory evidence, as set forth in Brady). Others have rejected such claims but only because of a defendant’s failure to show that the testing would have been favorable to the defendant.280See Mitchell v. Artus, No. 07 Civ. 4688, 2008 U.S. Dist. LEXIS 42604, at *123–24 (S.D.N.Y. June 8, 2008) (rejecting an ineffective assistance claim where the petitioner failed to establish the first Brady prong by not demonstrating that the DNA testing on a bloody wooden door saddle would have been “favorable” to him); Leake v. Senkowski, No. 01 Civ. 7559, 2004 U.S. Dist. LEXIS 11939, at *74–75 (S.D.N.Y. June 30, 2004) (holding that the police’s failure to collect and test blood samples from bloody stains on the sidewalk and test a bloody sweatshirt did not constitute a Brady violation because the petitioner failed to “demonstrate either that the blood evidence, if preserved and tested, would have been ‘favorable to’ him or that prejudice resulted from the failure to preserve and test it”). Yet others have construed Youngblood to mean that Brady does not include the right to CODIS searches.281See, e.g., Batchilly v. Nance, No. 08 Civ. 7150, 2010 U.S. Dist. LEXIS 33031, at *116–17 (S.D.N.Y. Apr. 2, 2010) (holding that failure to test the DNA found on a bitemark was not a Brady violation both because the defendant could not demonstrate that the outcome would have been favorable to him, and because, per Youngblood, the government’s failure to run a DNA test does not constitute a Brady violation absent bad faith); Derr v. State, 73 A.3d 254, 274–75 (Md. 2013). Regardless, some states have allowed these defense-initiated searches through statute,282725 Ill. Comp. Stat. § 5/116-5 (2005) (allowing defense searches by court order); Ga. Code Ann. § 24-4-63 (West 2010) (providing defense access where “access to the DNA data bank is material to the investigation, preparation, or presentation of a defense at trial or in a motion for a new trial”). Other states permit database access without specifically identifying criminal defendants as those with rights to request such searches. Haw. Rev. Stat. Ann. § 844D-82 (West 2024); N.C. Gen. Stat. Ann. § 15A-266.8 (West 2019); Cal. Penal Code § 299.5(g)–(h) (West 2011); N.J. Stat. Ann. § 53:1-20.21 (West 2003). and individual laboratories have varying policies, some of which provide for running searches for the defense.283Nat’l Inst. of Just., supra note 278, at 148.

In District Attorney’s Office v. Osborne, the Supreme Court made clear that there is no substantive due process right for criminal defendants to access DNA testing.284Dist. Att’y’s Off. v. Osborne, 557 U.S. 52, 72 (2009). In Osborne, the defendant was convicted of kidnapping and sexual assault even though restriction-fragment-length-polymorphism DNA testing had not been performed on semen found in a condom at the scene of the crime.285Id. at 57–58. A much less precise form of DNA testing was performed, which ruled out over 80% of other members of Osborne’s race. Id. In a 1983 action, Osborne argued that he had a substantive due process right to the state’s evidence for the purposes of applying new DNA testing technology that might prove him innocent.286Id. at 72. The Court rejected that claim on the grounds that “[e]stablishing a freestanding right to access DNA evidence for testing would force us to act as policymakers, and our substantive due process rulemaking authority would not only have to cover the right of access but a myriad of other issues.”287Id. at 73–74

A defendant objecting to the suppression of DNA evidence during the discovery process, thus, only has a few clear constitutional arguments. A defendant might be able to argue that a CODIS hit on a third party from samples taken at the crime scene was material and exculpatory under Brady if they can pass the rather high bar of showing a reasonable probability that the outcome would have been different had it been disclosed. Christopher Tapp, whose own DNA was not found at the crime scene despite the presence of semen from other unknown sources, might have had such an argument if the other sources had been identified but undisclosed. A more challenging case arises when the government conceals the existence of testable samples of biological material that it had not itself tested. Osborne dealt only with the post-conviction context, and thus did not foreclose a procedural due process argument, under Brady, that a defendant has a right to know about untested samples. It would simply be extraordinarily difficult for a defendant to demonstrate the materiality of as-of-yet untested biological samples. Furthermore, Youngblood implies that the argument that Brady compels the state to affirmatively test unidentified third-party samples itself may be quite weak, despite some case law to the contrary.

2.  Conclusions on Brady and Familial DNA

Brady applies only to evidence known to the government, which would seem to render it irrelevant to un-searched consumer DNA databases. Even the strongest view of Brady emerging from the case law only requires the government to run searches within CODIS, which includes government-controlled databases. As a practical matter, however, the very existence of Brady doctrine renders consumer databases a powerful and promising new source of exculpatory evidence for criminal defendants. Brady requires that law enforcement turn over evidence of potentially culpable third parties generated by the familial DNA searches they conduct. Thus, preventing law enforcement from accessing consumer databases without probable cause effectively deprives innocent defendants of critical exculpatory evidence.

The reality is that police and prosecutors have independent motivations to bring the correct guilty party to justice. Some prosecutors even pursue this duty post-conviction, as evidenced by the rise of Conviction Integrity Units and examples of cooperation between the government and the defense that have led to DNA exonerations as technology has improved.288See Bruce A. Green, Should Prosecutors Be Expected to Rectify Wrongful Convictions?, 10 Tex. A&M L. Rev. 167, 178 (2023). Given the obstacles discussed in the prior Section that prevent defendants from subpoenaing familial matches from consumer databases, law enforcement access may be the only meaningful way for the defense ever to obtain it. This is particularly true given the exceedingly high costs of using a familial DNA hit to build out a family tree and identify the actual party who left the sample at the crime scene. Even if a defendant obtained an unnamed third-party sample from the government through a conventional Brady disclosure and also obtained a court order to input the sample into a consumer database, most defense teams would lack the resources to hire the forensic experts necessary to do anything useful with the results.

This reality also sits in significant tension with the holding of another watershed Due Process case, Ake v. Oklahoma.289Ake v. Oklahoma, 470 U.S. 68 (1985). In Ake, the Supreme Court held that the Fourteenth Amendment requires that indigent defendants raising the insanity defense be provided with state-funded psychiatric experts to examine them and testify on their behalf.290Id. at 86–87. The Ake Court balanced several factors: the private interest affected by the state action, the governmental interest affected if the safeguard were provided and the probable value of the procedural safeguards sought, and the risk of an erroneous deprivation of the affected interest if they were not provided.291Id. at 77. On the third point, the Court found that in the absence of a qualified psychiatric expert, “the risk of an inaccurate resolution of sanity issues is extremely high.”292Id. at 82. Despite similar accuracy concerns raised by DNA evidence, there is no parallel right to a state-funded forensic expert.293Garrett, supra note 59, at 1665. This means that even when the government hands over testable biological material to the defense, an indigent defendant’s counsel may still lack the means to have it tested.294Id.

All considered, as a formal matter, a law or constitutional holding severely restricting law enforcement access to familial DNA searching would most likely not violate Brady as courts have construed it. Yet, by effectively blocking the defense’s access to potentially valuable exculpatory evidence and to the state’s resources for testing it, such laws would indirectly burden the due process values implicated by both Brady and Ake. In trying to protect the privacy interests of guilty parties, such a rule would inadvertently impact the liberty interests of innocent ones.

C.  Due Process Rights to Post-Conviction Proceedings Under State DNA and Innocence Statutes

  1. The Lack of Constitutional Innocence Claim

The third potential source of due process rights related to familial DNA involves post-conviction appeals on the grounds of innocence. This landscape is governed substantively by the Supreme Court’s 1993 decision in Herrera v. Collins, which narrowly held that a convicted petitioner’s claim of actual innocence does not state a ground for federal habeas relief, absent some independent constitutional violation during the state proceeding.295Herrera v. Collins, 506 U.S. 390, 400 (1993). In dicta, the Court left open the possibility that “in a capital case a truly persuasive demonstration of ‘actual innocence’ made after trial would render the execution of a defendant unconstitutional, and warrant federal habeas relief if there were no state avenue open to process such a claim.”296Id. at 417; see also In re Davis, 557 U.S. 952, 952 (2009) (transferring an original writ of habeas corpus in a capital case to the federal district court for an evidentiary hearing to determine whether evidence that was unavailable at the time of trial clearly establishes petitioner’s innocence). The Court emphasized that “the threshold showing for such an assumed right would necessarily be extraordinarily high.”297Herrera, 506 U.S. at 417. A few years later in Schlup v. Delo, the Court reaffirmed that no constitutional claim of innocence exists, but it also held that a showing of actual innocence may allow a habeas petitioner to avoid the procedural bar on other, defaulted constitutional claims.298Schlup v. Delo, 513 U.S. 298, 313–17 (1995).

The Court finally addressed the issue of DNA in post-conviction appeals in the 2006 case House v. Bell.299House v. Bell, 547 U.S. 518 (2006). Paul House was convicted and sentenced to death in Tennessee for the 1985 murder of his neighbor, with the jury finding as an aggravating factor during the death phase that the murder was committed in the course of a rape or a kidnapping.300Id. at 532–33. At trial, the prosecution introduced primitive forensic evidence showing that the semen on the victim’s nightgown was consistent with House’s and that the blood on House’s pants was consistent with the victim’s, but not his own.301Id. at 528–29. The forensic expert testified that the blood sample on the pants excluded 93% of the white population.302Id. at 531. One of the government’s expert witnesses acknowledged that the state did not provide saliva samples from the victim’s husband, which would have helped to determine his secretor status and, thus, whether he too could have been a potential source of the collected semen.303Id. at 529.

After his conviction, House filed a state habeas petition based on ineffective assistance and faulty jury instructions.304Id. at 533. When the trial court dismissed the petition, House appealed, but only on the jury-instructions ground.305Id. at 533–34. After House’s conviction was affirmed, he filed a second state habeas claim for ineffective assistance and sought investigative and expert assistance.306Id. at 534. The Tennessee Supreme Court held that these claims were barred by a statute providing that claims not raised in prior post-conviction proceedings are procedurally defaulted.307Id. On federal habeas, the Eastern District of Tennessee held an evidentiary hearing to determine whether House fell within the “actual innocence” exception to the procedural default rule recognized in Schlup. Holding that he had failed to demonstrate actual innocence, the Court denied relief, and a divided Sixth Circuit ultimately affirmed.

The Supreme Court granted certiorari to determine, as required by Schlup, whether, in light of new evidence, “it is more likely than not that no reasonable juror would have found petitioner guilty beyond a reasonable doubt” in cases where a prisoner asserts innocence to avoid a procedural default.308Id. at 536–37 (citing Schlup v. Delo, 513 U.S. 298, 327 (1995)). The Court reviewed the new evidence, which reflected the dramatic evolution in DNA technology between 1985 and 2006. First, it noted that DNA testing established that the semen on the victim’s nightgown and panties came from her husband and not House.309House, 547 U.S. at 540. It noted that this would remove sexual assault as a potential motive for the crime and cast doubt on the jury’s finding of rape as an aggravating factor for sentencing.310Id. at 540–41. Second, it considered the testimony of an Assistant Chief Medical Examiner for the State of Tennessee that indicated that the blood found on House’s pants was chemically too degraded and too similar to blood collected during the autopsy to have come from the victim’s body on the night of the crime.311Id. at 542. He concluded that the stains were more likely to have been spilled from vials containing autopsy samples.312Id. at 542–43. On the basis of all of this evidence, the Court concluded that “although the issue is close [due to other, non-forensic evidence] . . . this is the rare case where—had the jury heard all the conflicting testimony—it is more likely than not that no reasonable juror viewing the record as a whole would lack reasonable doubt.”313Id. at 554. The Court then remanded for consideration of the merits of House’s ineffective assistance claims.314Id. at 555. While the prosecutor initially vowed to retry House if he successfully overturned his conviction, the prosecutor later dropped the charges after subsequent developments in DNA technology revealed an unknown perpetrator.315David G. Savage, DNA Evidence Means Freedom After 2 Decades, L.A. Times (May 13, 2009, 12:00 AM), https://www.latimes.com/archives/la-xpm-2009-may-13-na-court-dna13-story.html [https://perma.cc/HA6V-QVXG]. House had spent over twenty-two years on death row.316Id.

While House presents a rare case in which evidence of actual innocence had constitutional relevance in a federal habeas appeal, it is important to note how narrow a gateway the case represents. House’s substantive appeal was premised not on innocence but on ineffective assistance under the Sixth Amendment—a distinct constitutional error as required by Herrera. As in many similar cases, House was attempting to argue that his counsel had been ineffective in failing to discover and present exculpatory evidence at trial.317House, 547 U.S. at 533. Under Strickland v. Washington, a petitioner can make out an ineffective assistance claim if they can show a reasonable probability that counsel’s poor performance prejudiced the outcome.318Strickland v. Washington, 466 U.S. 668, 687 (1984). However, the Strickland test is explicitly deferential to the judgment of counsel, and courts will evaluate the reasonableness of attorney decisions ex ante, from the perspective of counsel at the time the decisions were made.319Id. at 689. It is often the case that—particularly given evolving technology—the absence of exculpatory DNA evidence at trial cannot be attributed to counsel’s ineffective assistance. In such cases, given Herrera, a petitioner has no constitutional grounds for an appeal.

  1. State Post-Conviction Statutes

As discussed in Part I, in response to political demand and the lack of existing remedies, all U.S. states and the federal government have now enacted statutes providing some sort of right to post-conviction DNA testing and for vacatur of sentence on demonstration of innocence.320See Garrett, supra note 59, at 1673–75. Rules of finality have likewise been displaced by statute in order to permit motions based on new evidence of innocence.321Id. As Brandon Garrett shows in a taxonomic study of such statutes, however, most statutes create various procedural hurdles that a petitioner must surmount before obtaining testing.322Id. at 1675.

Some states focus on the outcome and require a showing that the DNA evidence is at least probative of innocence or, more strenuously, “material,” meaning that “a reasonable probability exists that the petitioner would not have been convicted if exculpatory results had been obtained through DNA testing.”323Id. at 1676 (quoting Ariz. Rev. Stat. Ann. § 13-4240 (2001 & Supp. 2007)). Garrett notes that such tests would not be insurmountable if interpreted “to simply require that the DNA testing could be probative of innocence” but points out that some courts will “construct flimsy hypothetical scenarios and then hold that, if there exists even a possibility that DNA testing might not exculpate, it should not be granted.”324Garrett, supra note 59, at 1677.

Some states limit post-conviction innocence relief to DNA testing alone, precluding other sorts of scientific evidence of innocence, and others limit the relief only to technology unavailable at trial.325Id. at 1679. A majority of states limit DNA testing to cases involving serious or violent crimes.326Id. at 1680. Many states require that the petitioner be in custody to seek relief.327Id. Some exclude those defendants who pled guilty, and some specify that identity must have been at issue in the underlying trial (which, as Garrett notes, precludes relief in cases of guilty pleas).328Id. at 1681. Four states hold that attorney error or failure to exercise due diligence at trial to preclude post-conviction DNA testing (though such defendants might be eligible for a new trial on a Strickland claim).329Id. at 1682.

The accessibility of relief under these state statutes raises distinct constitutional due process issues. In District Attorney’s Office v. Osborne, the Supreme Court recognized that a convicted individual has “a liberty interest in demonstrating [their] innocence with new evidence under state law.”330Dist. Att’y’s Off. v. Osborne, 557 U.S. 52, 68 (2009). The Court affirmed that a state-created right “can, in some circumstances, beget yet other rights to procedures essential to the realization of the parent right.”331Id. (quoting Conn. Bd. of Pardons v. Dumschat, 452 U.S. 458, 463 (1981)). The Sixth Circuit had held below that Alaska had violated Osborne’s due process rights under Brady by failing to provide the defendant access to the DNA evidence used at trial, because the Alaska statute provides a substantive right to be released on a sufficiently compelling showing of new evidence that establishes innocence.332Id. The Supreme Court, however, held that Brady did not apply post-conviction and that a state “has more flexibility in deciding what procedures are needed in the context of post-conviction relief.”333Id. at 69. The appropriate test, the Court said, is whether Alaska’s post-conviction relief procedures “are fundamentally inadequate to vindicate the substantive rights provided” (in this case, the liberty interest in being released under Alaska’s innocence statute).334Id.

The Osborne Court examined Alaska’s post-conviction procedures, which provide for discovery in post-conviction proceedings and specified that such discovery is available for those seeking access to DNA evidence.335Id. at 70. The Alaska post-conviction statute limits discovery to “newly available” evidence and imposes due diligence and materiality limitations.336Id. Furthermore, the Court found that Alaska courts had suggested in dicta that in DNA cases, the state constitution may even provide an additional right of access to those who cannot meet the usual post-conviction discovery requirements, though the issue remains unsettled. The Court held that these procedures, which Osborne had not yet exhausted, were “adequate on their face” to the realization of his liberty interest under the post-conviction DNA statute.337Id. at 71.

Federal courts of appeals have been relying on Osborne to find state post-convictions procedures fundamentally adequate and, thus, reject Section 1983 claims based on refusal of post-conviction DNA testing.338See, e.g., McKithen v. Brown, 626 F.3d 143, 153 (2d Cir. 2010) (holding New York’s post-conviction DNA procedures were fundamentally adequate where they required only a showing that had the DNA test been performed at trial, “there exists a reasonable probability that the verdict would have been more favorable to the [petitioner],” an easier standard than that in the Alaska law approved by Osborne); Young v. Phila. Dist. Att’y’s Off., 341 Fed. Appx. 843, 844 (3d Cir. 2009) (per curium) (holding that there was no due process violation when the state denied DNA testing on the grounds that the defendant could not meet the “assert[ion] of actual innocence” requirement of the Pennsylvania DNA statute after having confessed). However, the Second Circuit came to the opposite conclusion about the New York City Police Department’s evidence management system in Newton v. City of New York.339Newton v. City of New York, 779 F.3d 140, 156 (2d Cir. 2015) In 1985, Alan Newton was convicted of rape, robbery, and assault based on eyewitness testimony.340Id. at 142–43. The rape kit was not tested at trial, but in 1988, Newton moved for an order authorizing his expert to conduct forensic tests on the rape kit pursuant to New York’s post-conviction relief statute. The statute authorizes vacatur based on the discovery of new evidence that “could not have been produced by the defendant at the trial even with due diligence on his part and which is of such character as to create a probability that had such evidence been received at the trial the verdict would have been more favorable to the defendant.”341N.Y. Crim. Proc. L. § 440.10(1)(g) (McKinney 2012). The New York Supreme Court granted the motion, but the officer of the Chief Medical Examiner Office reported that the rape kit contained no testable sperm.342Newton, 779 F.3d at 143.

In 1994, New York passed a post-conviction DNA statute that allows for testing upon the court’s determination that “if a DNA test had been conducted on such evidence, and if the results had been admitted in the trial . . . there exists a reasonable probability that the verdict would have been more favorable to the defendant.”343N.Y. Crim. Proc. L. § 440.30(1-a)(a)(1) (McKinney 1994). When Newton made a motion for testing under this statute on the grounds that technological advances since 1988 had rendered smaller samples testable, the court denied his motion after the District Attorney’s Office revealed that it had lost the rape kit entirely after the 1988 analysis.344Newton, 779 F.3d at 143. Ten years later, upon request from defense counsel, an Assistant District Attorney who had not been involved in Newton’s case searched for the rape kit again and found it in a barrel in an NYPD Property Clerk’s warehouse in Queens.345Id. at 144. After Newton had served more than twenty years in prison, new DNA testing of the rape kit exonerated him.346Id.

In reviewing the district court’s decision to set aside the jury verdict for Newton in a subsequent Section 1983 case, the Second Circuit applied Osborne to the facts of the case. It held that, first, like Osborne, Newton had a liberty interest in demonstrating his innocence on new evidence.347Id. at 147–48. It then turned to the question of whether New York’s procedural rules were fundamentally adequate to the realization of this interest. Newton argued that, like Alaska’s in Osborne, New York State’s similar procedures were fundamentally adequate, and, unlike Osborne, Newton had diligently availed himself of all of them. However, Newton argued that New York City’s ineffective evidence management system effectively nullified those procedures.348Id. at 150.

The Second Circuit agreed. Noting that Newton’s action focused not on the State law itself but on the execution of the law, the court did “not decide what specific City procedure is necessary to manage and track evidence,” but the court reinstated the jury’s verdict for Newton.349Id. at 151. It found that New York’s post-conviction DNA statute “is consistent with requiring the NYPD’s evidence management system to provide an adequate means to determine if evidence is available for testing and, if so, where the evidence is located.”350Id. at 152. It is important to note that the DNA statute also provides that, for the purposes of a post-conviction court considering a motion to vacate a conviction, “no inference unfavorable to the people may be drawn” from missing or destroyed evidence. Id. (quoting N.Y. Crim. Proc. Law § 440.30(1-a)(b) (McKinney 1994)). The Newton court held that this did not bar a civil remedy under § 1983. Id.

  1. Post-Conviction Statutes and Familial DNA

Newton suggests courts might be open to the argument that state procedures rendering DNA testing of old evidence effectively impossible could violate a defendant’s limited due process right to vindicate substantive rights under post-conviction relief statutes. Mismanaged storage procedures are distinctly different, however, from a formal legislative decision to restrict familial DNA searches through consumer sites. If Osborne stands for anything, it is the proposition that “[f]ederal courts should not presume that state criminal procedures will be inadequate to deal with technological change.”351Dist. Att’y’s Off. v. Osborne, 557 U.S. 52, 74 (2009). The Court made it quite clear that “the development of rules and procedures” in the area of DNA science should be left in the “hands of legislatures and state courts shaping policy in a focused manner.”352Id. at 56. A convicted prisoner might try to argue that a state statute effectively barring law enforcement from even attempting to re-open a case through familial DNA searches renders its procedures “fundamentally inadequate” under Osborne to vindicate their right to state-created post-conviction process. However, given the Court’s strong deference to legislatures, this argument is unlikely to prevail. It should be noted from this discussion of post-conviction process, however, that the lack of a constitutional innocence claim and the inapplicability of Brady post-conviction emphasize the importance of accuracy in initial criminal adjudications.

Conclusion: Adjudicating Due Process in Conflict

Part Two of this Article considered the argument that a subject has a Fourth Amendment right not to be subject to warrantless searches of their family member’s DNA within databases, even with the database user’s consent. It agreed with commentators who argue that DNA contains intimate information, and the consent of an actual database user is not logically equivalent to the consent of that user’s relatives who may be identified through a familial search. Nonetheless, Part Two concluded that the argument that such searches require a warrant after Carpenter is fairly weak. In the first place, the specific privacy interest recognized by Carpenter in the totality of one’s movements implicates detailed information about one’s actual life. By contrast, with the proper limitations on use, a DNA match reveals only one significant piece of information: that a subject left a particular sample in a particular place. More importantly, no authority recognizes a reasonable expectation of privacy in someone else’s bodily materials. Familial DNA works because a subject has left their own sample at a crime scene, and the police match it to the profile of a physical sample offered voluntarily by a relative. A suspect does not have a right to bar their spouse from allowing the police to take a sperm sample from their own body after marital intimacy in order to compare it to the sample in a rape kit. In the case of consumer databases, the suspect’s connection to the consenting party is even more attenuated and less voluntary. Thus, the idea that the Fourth Amendment allows them to override the third party’s use of their own body sample might be somewhat more colorable, but it is still, ultimately, weak.

On the other hand, familial DNA searches implicate the Sixth and Fourteenth Amendment rights of other criminal suspects in cases where unidentified third-party samples are found at crime scenes. Part Three of this Article argued that a criminal defendant has a colorable due process right not to have consumer DNA evidence rendered effectively unattainable by law enforcement. First, any statute preventing criminal defendants from exercising their Sixth Amendment right to subpoena that information would raise compulsory process issues. Even if legislatures or courts only barred law enforcement from conducting such searches, the defendant’s access to the subpoena power is heavily limited in many jurisdictions by the materiality and favorability requirements, and any useful hits resulting from such a search would in any case require expensive forensic testing to lead to a specific subject. Thus, the reality is that a defendant is usually only going to access important exculpatory evidence through Brady, which would put familial DNA largely out of reach if the police were precluded from conducting searches at all or only with probable cause. In any given case, this problem is also compounded by limited options post-conviction, at which point the Supreme Court has held that Brady does not apply and no independent right to DNA testing exists. Law enforcement’s ability to access the most accurate evidence on the front end affects a defendant’s right to obtain the most important kind of exculpatory evidence under Brady.

In Osborne, the Supreme Court declined to “constitutionalize” post-conviction DNA testing as a freestanding due process right to protect the liberty interest of a potentially wrongfully convicted party.353Id. at 73. Innocent defendants would then be especially harmed by an asymmetrical attempt to “constitutionalize” DNA on the front end—during investigations. Should courts recognize, or legislatures adopt, a Fourth Amendment rule that keeps familial DNA away from law enforcement absent probable cause, such defendants would be effectively shut off from the most accurate and valuable evidence at all stages of the criminal process. Like the Fourth Amendment argument, this Sixth Amendment argument is also somewhat weak since most courts do not even recognize a Brady right to law enforcement searches of public databases. Nonetheless, because a categorical ban on warrantless searches would essentially render all familial DNA evidence inaccessible, it would inherently block a defendant’s access to exculpatory evidence.

The admissibility of familial DNA is, thus, not a due process question in which it makes sense to think of balancing one defendant’s rights against purely “government interests” (although the accuracy of DNA evidence certainly makes the government’s crime-solving interest particularly high). Rather, there are two potential defendants’ liberty interests at stake—one of whom is most likely innocent. Constitutional rights necessarily have limits when they impact other parties’ constitutional rights; scholars debate whether these constitute limits on the scope of rights or simply their realization.354Compare Aharon Barak, Proportionality: Constitutional Rights and Their Limitations 99 (Doron Kalir trans., David Dyzenhaus & Adam Tomkins eds., 2012) (“A limitation of a constitutional right only narrows the ability to realize the right without changing the right’s actual boundaries. These limitations are constitutional only if they are proportional, as required by the limitation clause.”), with Robert Alexy, A Theory of Constitutional Rights 38 (Julian Rivers trans., 2002) (arguing that when two constitutional principles are in conflict, or when one is in conflict with the public interest, a special constitutional rule is formed which narrows the scope of the constitutional right). Many nations’ constitutions have general limitation clauses, which set out the specific conditions under which constitutional rights can be limited.355See, e.g., Canadian Charter of Rights and Freedoms § 1, Part I of the Constitution Act, 1982, being Schedule B to the Canada Act, 1982 (guaranteeing “the rights and freedoms set out in it subject only to such reasonable limits prescribed by law as can be demonstrably justified in a free and democratic society”). However, the United States does not have a general limitation clause and defines certain rights without any limitation.356Barak, supra note 354, at 133. Courts have treated some rights as having implicit limitations, such as when they engage in interest balancing to determine “unreasonableness” under the Fourth Amendment. For other situations, the Supreme Court has adopted its own, much criticized tiered system of scrutiny.357See Tiffani Lennon, Stepping Out of the Competing Constitutional Rights Conundrum: A Comparative Harm Analysis, 82 Denv. L. Rev. 359, 359 (2004); see also Ken Hyle, When Constitutional Rights Clash: Masterpiece Cakeshop’s Potential Legacy, 9 ConLawNOW 200, 203 (2018) (“The Court’s purported fallback to a categorical approach involving levels of scrutiny to resolve cases where constitutional rights collide is flawed in that it creates a hierarchy of constitutional rights . . . Under a traditional level of scrutiny analysis, courts examine government interests and the means necessary to achieve those interests for just one of the two constitutional rights in conflict.”). Sometimes, though inconsistently, courts limit constitutional rights through recourse to some version of John Stuart Mill’s harm principle, which holds that the only acceptable limitation on liberty is when it is necessary to prevent harm to others.358John Stuart Mill, On Liberty 80 (David Bromwich & George Kateb eds., 2003); see Hill v. Colorado, 530 U.S. 703, 725–29 (2000) (holding that the First Amendment was not violated by a Colorado law limiting abortion protest within eight feet of a person entering a healthcare facility, because the right not to be unduly harmed by being traumatized outweighed the right to free speech); Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (establishing a three-part test to determine when the government can restrict speech based on (1) imminent harm, (2) likelihood of producing illegal activity, and (3) intent to cause imminent illegality).

Generally, it is true that a constitutional right’s lack of limitation clause does not render the right absolute but instead subject to interpretation in harmony with the Constitution’s other provisions and other legitimate public interests.359Barak, supra note 354, at 135. This inherently entails courts prioritizing certain rights over others based on the facts of a particular case.360Id. at 361 (“Rights that advance the legal system’s most fundamental values and that contribute to the personal welfare of each member of the community differ from rights that rely upon general welfare considerations as their only justification.”). The U.S. Supreme Court has found limitations to individual rights in cases involving deference to military-decision-making due to the need for national security. See, e.g., Thomasson v. Perry, 80 F.3d 915, 926 (4th Cir. 1996). In cases involving parental decision-making, despite the Supreme Court recognizing a liberty interest in child rearing under the Fourteenth Amendment, where minor and parental interests have conflicted, the winner has been the minor, with the “scope of the state’s interest serving as the deciding factor.” Courtney Vorwald, When Parental and Minors’ Rights Conflict: Minors’ Constitutional Rights & Gay-Straight Alliances, 13 J. Gender, Race & Just. 465, 476 (2010) (citing Meyer v. Nebraska, 262 U.S. 390, 400 (1923) (holding that the right to raise and educate children is a liberty interest under the Fourteenth Amendment) and Troxel v. Granville, 530 U.S. 57, 88 (2000) (Stevens J., dissenting) (stating that parental rights “have thus never been regarded as absolute” due to the state’s parens patriae interest). During the Prohibition era the Supreme Court even narrowed the scope of the Fourth Amendment in order to facilitate enforcement of the Eighteenth Amendment. See Daniel Yeager, A History of the Fruit of the Poisonous Tree (1916–1942), 67 How. L.J. 51, 72–73 (2023). For an argument that U.S. courts should, as in other countries, recognize that two conflicting rights co-exist and allow the democratic political process to mediate them see, Jamal Greene, How Rights Went Wrong: Why Our Obsession with Rights Is Tearing America Apart 114–39, 248 (2021). In the context of criminal justice, for example, claims of Sixth Amendment deprivations “are subject to the general rule that remedies should be tailored to the injury suffered from the constitutional violation and should not unnecessarily infringe on competing interests.”361United States v. Morrison, 449 U.S. 361, 364 (1981). Thus, trial courts have discretion to limit a defendant’s Sixth Amendment confrontation right in a particular case through limiting the scope of cross-examination based on potential harms, such as harassment of the witness, prejudice, confusion of the issues, the witness’s safety, or questioning that is repetitive or only marginally relevant.362Delaware v. Van Arsdall, 475 U.S. 673, 679 (1986). In United States v. Stein, the Second Circuit found a violation of the Sixth Amendment right to counsel where a Department of Justice charging policy caused a private employer to terminate attorneys’ fees that they would otherwise have paid for according to the terms of their employees’ contracts.363United States v. Stein, 541 F.3d 130, 157 (2d Cir. 2008) (“[T]hese defendants can easily demonstrate interference in their relationships with counsel and impairment of their ability to mount a defense based on [trial court’s] non-erroneous findings that the post-indictment termination of fees ‘caused them to restrict the activities of their counsel,’ and thus to limit the scope of their pre-trial investigation and preparation.”). While the employees did not have a Sixth Amendment right to employer-funded legal counsel—in the same way that a suspect may not have a right for the police to conduct a familial DNA search—it nonetheless constituted an interference with the employees’ exercise of their Sixth Amendment right to mount a defense with their own assets that could not be justified by the state interest in encouraging cooperation by the corporate defendant.364Id. at 156.

Cases of competing constitutional interests are more delicate. In Nebraska Press Association v. Stuart, the Court rejected an absolute balancing test between the First and Sixth Amendments where, in order to protect the accused’s right to an impartial jury, a trial judge had issued an order restraining members of the press from publishing or broadcasting accounts of the defendant’s admissions.365Nebraska Press Ass’n v. Stuart, 427 U.S. 539, 560–61 (1976). The Court noted that “[t]he authors of the Bill of Rights did not undertake to assign priorities as between First Amendment and Sixth Amendment rights, ranking one as superior to the other”366Id. at 561. and proceeded to balance the nature and extent of pretrial news coverage, potential mitigating measures, and the effectiveness of a restraining order at preventing the danger; ultimately, the Court held for the petitioner journalists.367Id. at 562, 570.

When courts must adjudicate clashes between the constitutional rights of two criminal defendants, their work is complicated by the fact that the meaning of criminal due process is itself contested. Due process has a specific doctrinal meaning related to the procedures required by the Fifth and Fourteenth Amendments, the latter of which incorporates most rights in the Bill of Rights against the states.368Rosann Greenspan, Criminal Due Process in the Administrative State, 14 Stud. L., Pol. & Soc’y 169, 172 (1994). It also has a broader meaning that represents the “principles of civility or fairness that are supposed to underlie procedural and often substantive legal rules.”369Id. Because of its prominent role in the Bill of Rights, due process has become a distinctly American concept, with jurists in other nations resorting to other concepts such as “procedural justice,” “the rule of law,” “natural justice,” and “fundamental justice.”370Id.

In The Limits of the Criminal Sanction, Herbert Packer famously divides criminal justice thinking into two camps.371Herbert L. Packer, The Limits of the Criminal Sanction 153 (1968). One, which he refers to as the “Due Process Model,” values the observation of fair procedures, even at the expense of letting the guilty go free, while the other, the “Crime Control Model,” values accurate determinations of guilt and innocence.372Id. Accuracy has, in and of itself, been a value central to constitutionalized criminal due process since the start of the criminal procedure revolution in the mid-twentieth century.373See Ronald Jay Allen, Joseph L. Hoffman, Debra A. Livingston, Andrew D. Leipold & Tracey L. Meares, Criminal Procedure: Investigation and Right to Counsel 68 (4th ed., 2020) (“Thus, the problem with the mob-dominated trial in Moore [v. Dempsey], with the absence of any real defense counsel in Powell [v. Alabama], and with the beating-induced confession in Brown [v. Mississippi] was the same: All tended to lead to conviction and punishment without regard to whether the defendants were guilty.”). Rules about impartiality and reliability, the right to counsel for indigent defendants, the right to cross-examination, and the rule against involuntary confessions all exist to prevent the conviction of innocents due to malicious, lazy, hasty, or overzealous police and prosecutors.374See id. at 68–69; Thomas C. Grey, Procedural Fairness and Substantive Rights, in Due Process 182, 184 (J. Roland Pennock & John W. Chapman eds., 1977). In In re Winship, the Supreme Court held that the standard of proof beyond a reasonable doubt is a due process requirement in criminal trials on accuracy grounds.375In re Winship, 397 U.S. 358, 367 (1970) (“The preponderance [of the evidence] test is susceptible to the misinterpretation that it calls on the trier of fact merely to perform an abstract weighing of the evidence in order to determine which side has produced the greater quantum, without regard to its effect in convincing his mind of the truth of the proposition asserted.”).

As David Resnick argues, due process serves an important justificatory purpose, providing reasons for subjecting a person to criminal punishment.376David Resnick, Due Process and Procedural Justice, in Due Process, supra note 374, at 206, 214. He notes that “our concern with the subjective probability of correct outcomes reflects a requirement of morality and not simply efficiency or rationality.”377Id. at 215. Thus, while critics tend to pit accuracy values against due process values in cases where fair process requires guilty defendants to go free, the protection of innocents is a critical moral component of due process. The availability of DNA evidence inherently implicates accuracy values—not only the broader societal goal of identifying the guilty but also an individual’s right not to be punished without justification.

That said, Packer’s “Due Process Model” fits the argument that unwarranted familial DNA searches violate the Fourth Amendment rights of the third-party family members identified. Under this view of due process, the absence of “fair play” for the suspect should override the state’s interest in crime solving.378See Susan Bandes, Taking Some Rights Too Seriously: The State’s Right to a Fair Trial, 60 S. Cal. L. Rev. 1019, 1039 (1987). Some of the Supreme Court decisions that fit this model have been described as premised on “fundamental fairness”—most notably Rochin v. California, which excluded evidence found after law enforcement pumped a suspect’s stomach against his will and without judicial authorization.379Rochin v. California, 342 U.S. 165, 166, 174 (1952). In an opinion by Justice Frankfurter, the Court held that the stomach pumping—while producing accurate evidence—violated due process because it “shock[ed] the conscience.”380Id. at 172. The Fourth and Fifth Amendment exclusionary rules in general represent the primacy of fair play over accuracy since they necessarily better protect the procedural rights of the guilty than they do the innocent. However, an unjustly accused party could also argue that principles of fair play and fundamental fairness should prevent them from being criminally convicted without access to a whole body of highly reliable evidence.

It should be noted that there is a third set of due process values beyond these two that is related to the expressive function of criminal procedure and its relationship to public confidence in the justice system. The public will be more likely to support and participate in criminal justice when it believes that the process operates fairly.381Tracey L. Meares, Everything Old is New Again: Fundamental Fairness and the Legitimacy of Criminal Justice, 3 Ohio St. J. Crim. L. 105, 108 (2005); see also Tom R. Tyler & E. Allan Lind, A Relational Model of Authority in Groups, in 25 Advances in Experimental Social Psychology, at 115, 140–41 (Mark P. Zanna ed., 1992) (proposing a “group-value” theory of procedural justice based on the idea that people “belong to social groups and . . . are very attentive to signs and symbols that communicate information about their status within their groups,” such as whether a procedural system treats people with dignity, neutrality, and warrants trust from those subjected to it). On that basis, some critics point out that “[a] focus on the individual rights of the defendant to the exclusion of the interests of other participants belies the public’s critical role.”382Meares, supra note 381, at 116; see also Judith Resnik, Due Process: A Public Dimension, 39 U. Fla. L. Rev. 405, 408 (1987) (arguing “that the interaction between process and public is important and assists in the development of legal norms about the merits of disputes and how disputes should be handled”). In this view, a trial is not just a fact-finding mission but serves an “important symbolic function as public expressions of the affected parties’ rights to demand that official acts be explained and justified.”383T.M. Scanlon, Due Process, in Due Process, supra note 374, at 93, 99. This concept of due process is particularly important in the case of familial DNA. High-profile cases like the Golden State Killer have increased public awareness of this science, and exonerations like Christopher Tapp’s, which was widely covered in true crime media, have created demand for it as a means of recourse for the wrongfully accused and convicted.

Ultimately, the case of familial DNA does not present a simple, bilateral competition between fair Fourth Amendment process for a criminal defendant and public interest in crime-detection; it also implicates the Sixth and Fourteenth Amendment rights of an innocent suspect whose risk of wrongful conviction would be higher in a world with law enforcement access to familial DNA substantially restricted. Should courts consider Fourth Amendment claims challenging familial DNA evidence, they should bear in mind these other defendants when determining whether such searches are reasonable without a warrant. Furthermore, should states seek to regulate law enforcement use of DNA via statute, they should not adopt restrictions as broad as Montana’s. Ideally, even if states do restrict law enforcement access, they should at least create a formal subpoena process to clarify how criminal defendants can access this evidence. However, given the limitations on defense testing resources, this mechanism would likely benefit only a minority of defendants and should be supplemented by some degree of law enforcement access.

98 S. Cal. L. Rev. 761

Download

* Professor, California Western School of Law. Many thanks to Daniel Yeager and Donald Dripps for their valuable comments on drafts of this Article. I am also grateful to the helpful feedback I received at workshops from the faculties of California Western School of Law and the University of San Diego School of Law.

Punishment as Placebo

The modern criminal punishment regime has failed to deliver on its promise of public safety. For all of the resources expended and all of the human costs incurred, the ever-growing carceral state does not make us safer. Scholars across the social sciences have studied these shortcomings for decades using various methodologies. The burgeoning prison population has little relation to the crime rate, which advocates have argued supports decarceration efforts to remedy the inefficiency, inequality, and subordinating effects of harsh sentencing policies and institutional design choices that have supported the mass incarceration crisis. What then justifies the continued propagation of this failed regime?

This Article proposes a new balancing of considerations to answer this question that innovates punishment theory through the medical and experimental lens of placebos. The efficacy of policy must be balanced with its public perception; thus, a policy may not be effective at fixing a problem, but this is often less important than the perception of the policy. A medical placebo treatment may be physiologically inert, but it still can have a positive psychological and therapeutic impact by making the patient feel better because they think they are receiving effective treatment. In the same way, the cultural value of mass incarceration extends beyond its failed effectiveness by providing psychological and therapeutic value to help the public cope with their fear of crime, their moral commitments to justice, and their socialized feelings towards offenders.

This placebo methodology offers several unique insights about punishment theory and practice that learn from the extensive medical research and ethics literatures. By viewing punishment as a placebo, the modern punishment regime must confront unique questions concerning the social harm of punishment, the justifications for public deception, the ethics of experimentation, and the perverse economics of inefficacy. These theoretical synergies also provide practical insights into how to reverse and regulate such placebo punishments while focusing on a more humane and ethical punishment future.

Introduction

“Freedom from fear is a basic right of every American. We must restore it.”1Robyn Price Pierre, How a Conservative Wins the Presidency in a Liberal Decade, Atlantic (July 9, 2016), https://www.theatlantic.com/politics/archive/2016/07/fear-and-voting-in-america/490631 [https://web.archive.org/web/20240416060851/https://www.theatlantic.com/politics/archive/2016/07/fear-and-voting-in-america/490631]. Richard Nixon’s bold message to America illustrates one of the most underappreciated aspects of modern criminal punishment policies: the fear and perception of crime is just as important as the actual presence of crime. Nixon understood these political winds and social yearnings, and he ushered in a new vision of law-and-order national leadership through his War on Crime.2See Elizabeth Hinton, From the War on Poverty to the War on Crime: The Making of Mass Incarceration in America 56 (2016). This “fear of crime” was the overriding concern of Ronald Reagan’s administration that passed some of the most sweeping crime bills and policies in modern history.3John Hagan, Who Are the Criminals?: The Politics of Crime Policy from the Age of Roosevelt to the Age of Reagan 10 (2010) (“Fear of crime was the [Reagan] administration’s overriding concern.”); see also Ronald Reagan, Radio Address to the Nation on Crime and Criminal Justice Reform (Sept. 11, 1982), in Ronald Reagan Presidential Libr. & Museum, https://www.reaganlibrary.gov/archives/speech/radio-address-nation-crime-and-criminal-justice-reform [https://perma.cc/LG6F-389K] (referencing how “afraid” Americans are and the “many moments of fear” they suffer, in tandem with the rising crime rates that justify criminal justice reform). George H.W. Bush picked up this thread when he declared that “freedom from crime and the fear that stalks our cities” was a “fundamental civil right” that he was committed to protecting through crime control legislation.4Transcript of President’s State of the Union Message to Nation, N.Y. Times, Jan. 30, 1991, at A12, https://timesmachine.nytimes.com/timesmachine/1991/01/30/issue.html [https://web.archive.org/web/20200108065209/https://www.nytimes.com/1991/01/30/us/state-union-transcript-president-s-state-union-message-nation.html]. And not to be outdone by Republicans, Bill Clinton continued this trend when supporting further crime legislation by arguing that if “the American people do not feel safe on their streets, . . . then it is difficult to say that the American people are free.”5William J. Clinton, Remarks on Signing the Violent Crime Control and Law Enforcement Act of 1994 (Sept. 13, 1994), in Am. Presidency Project, https://www.presidency.ucsb.edu/documents/remarks-signing-the-violent-crime-control-and-law-enforcement-act-1994 [https://perma.cc/MJB3-2UWV].

These words from past presidents highlight an important duality in criminal law that has shaped an entire generation of policy yet is curiously understudied in the legal academy: the relationship between efficacy and perception. In other words, there are two values that criminal law and punishment seek to deliver as a public policy. First is the value of efficacy, which measures how effective the law is in actually achieving public safety goals by lowering crime rates and making us safer. Second is the value of public perception, which measures how the law assuages public fear and controls how we perceive or feel about our safety and the prevalence of crime. Both of these values have explanatory weight in how we study and think about criminal law and punishment. While there has been robust consensus that harsh, tough-on-crime policies have not delivered on their promises of efficacy in making Americans any safer, these discussions miss perhaps the more important value at play in our system. As we can see from former chief executives,6These statements from presidents of the United States were all made in the context of their support of criminal justice reform at the federal level. But these federal policies trickled down, incentivized, and emboldened the states to adopt similar policies. Sheldon A. Evans, Towards a Federalism(s) Framework of Punishment 21–40 (Mar. 2024) (unpublished manuscript) (on file with author). crime policy is just as (or even more) concerned with assuaging public fear and controlling public perception as it is with the law’s efficacy.

This Article takes the path less travelled by focusing on the value of perception in criminal legal policy. Even if we accept arguendo that criminal law enforcement and policies have objectively failed to lower crime rates, do these policies nevertheless hold some value in making Americans feel better about crime? This Article tackles that question through a theoretical methodology that brings to bear medical, social, and ethical considerations in a framework that portrays modern punishment as a placebo: something that is not efficacious at fixing the underlying problems of crime yet might have psychological and therapeutic value in impacting society’s perceptions of crime.7See Andrea Corradi & Eric P. Baumer, Did Mass Incarceration Leave Americans Feeling Less Afraid? A Multilevel Analysis of Cumulative Imprisonment and Individual Perceptions of Fear, 39 Just. Q. 1378, 1393 (2022) (finding that increased levels of incarceration did not translate into lessened fear of crime in individuals).

Placebos have been a part of medical research for generations, but they have also become a respected tool for studying social behavior.8See Charlotte Blease, Consensus in Placebo Studies: Lessons from the Philosophy of Science, 61 Persp. Biology & Med. 412, 419 (2018) (describing the Society for Interdisciplinary Placebo Studies, which covers “an unusually wide range of disciplines and academic scholars for an academic society, encompassing anthropology, biology, cognitive science, clinical research, genetics, psychology, psychotherapy, medicine, neuroscience, philosophy of science, and health-care ethics, as well as related subfields”); Melanie K. T. Takarangi & Elizabeth F. Loftus, Suggestion, Placebos, and False Memories, in Placebo Talks: Modern Perspectives on Placebos in Society 204, 213 (Amir Raz & Cory Harris eds., 2015). For example, a person’s lucky hat might make them feel more confident; as a result, social scientists can conceptualize and measure a positive placebo effect on this person’s perception and expectations when wearing this lucky hat.9Takarangi & Loftus, supra note 8, at 224; see also Jake Linford, Placebo Marks, 47 Pepp. L. Rev. 45, 50, 62–63 (2019) (arguing that high-performance trademarks that are associated with boosting athletic performance deliver a positive placebo effect to users).

At a societal level, the same can be true of legal rules. Anup Malani has considered how legal regulations in healthcare and even tort law shape people’s perceptions and expectations similar to placebo effects.10See Anup Malani, Regulation with Placebo Effects, 58 Duke L.J. 411, 413 (2008). Amitai Aviram has also studied the law’s role in manipulating perceptions when a law is designed to signal an increased or decreased risk of certain activity.11See Amitai Aviram, The Placebo Effect of Law: Law’s Role in Manipulating Perceptions, 75 Geo. Wash. L. Rev. 54, 56–57 (2006). Regardless of a law’s efficacy, Aviram recognized the law’s role in impacting social perceptions of safety.12Id. In this way, the law may have created a safer environment, but its primary value in increasing social welfare was a psychological placebo.13Id.

In the criminal legal context, this Article argues that modern punishment policies—and specifically, mass incarceration as a case study—would benefit from being conceived as a placebo. These policies promise to address the social problem of crime, but they are no longer designed or implemented efficaciously to fix that underlying problem. Instead, the primary value of these policies to the public is their ability to control, assuage, and in some cases manipulate feelings, perceptions, and expectations toward crime.

To build out the analogy a bit further, let’s liken punishment to a form of medical treatment. A patient may go to see their doctor with a particular physical health problem; the doctor may choose to prescribe the patient a placebo treatment that is not meant to efficaciously treat the patient’s physical problem but instead is meant to make the patient think they are receiving an effective treatment. The placebo is only delivering a psychological or therapeutic benefit to the patient. And because of the interesting ways that placebos work, the patient does indeed feel better. Applying this logic to punishment requires a bit of imagination, but nevertheless has conceptual value. The patient is the public, who is dealing with the social ill of crime. Thus, the public/patient seeks solutions from social decisionmakers such as politicians, police officers, prosecutors, and other actors who diagnose the problem and purport to give an effective solution; however, like a placebo, these policies that have increased the surveillance state, police power, and mass incarceration have not delivered on the efficacy front but are instead meant to control public perception and make the public feel better about crime. I understand this is not a perfect analogy and there are nuances to be explored below, but using this methodology of placebos is an important turning point in how we should think about criminal policy and how the efficacy and perception values interact. The objective study of efficacy must be balanced with these more subjective studies of feelings and perceptions of crime to understand the social currency of punishment.14See Philip Smith, Punishment and Culture 1 (2008) (explaining that punishment “cannot be understood without reference to public meaning”).

Using interdisciplinary tools of medicine, sociology, and ethics, this Article explores more than a mere metaphor by developing a fuller methodology that reframes criminal punishment in ways that hold valuable insights and complexities for the criminal theory literature. First, the placebo methodology studies and illuminates the types of social cues that impact public perception in the criminal space, such as the emotion of fear and the social and cultural meanings of punishment.15See Aviram, supra note 11, at 54 (discussing the “psychic” effects of the law, which are distinct from the “real” effects); Kathleen M. Boozang, The Therapeutic Placebo: The Case for Patient Deception, 54 Fla. L. Rev. 687, 700 (2002) (outlining medical literature that emphasize a placebo’s ability to improve the patient’s “spiritual, emotional, cognitive, physical, social, and environmental functioning which facilitate the individual’s development”); Murray Edelman, The Symbolic Uses of Politics 189 (1964) (arguing one of the principal functions of legislation is to provide symbolic reassurance to the public that the people in power are indeed “doing something” about a perceived problem). Second, it refocuses the punishment literature on the oft-forgotten history that the medical field shares with criminal law.16See Bryan S. Turner, The Body & Society: Explorations in Social Theory 181 (3d ed. 2008) (emphasizing the social influences and policy connections between the medical and legal fields). The so-called disease of the criminal mind,17See generally Stephen Garton, Criminal Minds: Psychiatry, Psychopathology, and the Government of Criminality, in The Oxford Handbook of the History of Crime and Criminal Justice (Paul Knepper & Anja Johansen eds., 2016) (outlining the history of using criminal psychology to diagnose and profile criminal offenders); Stanton E. Samenow, Inside the Criminal Mind (1984) (same). the dangerousness of the disabled,18See Jamelia N. Morgan, Policing Under Disability Law, 73 Stan. L. Rev. 1401, 1404–05 (2021) (describing how the disabled are disproportionately represented in police killings and more ordinary forms of policing); Susan M. Schweik, The Ugly Laws: Disability In Public 1–2, 33 (2009) (cataloging the history of laws that prohibited and criminalized the public appearance of the “unsightly” and disabled). and the criminalization of illness19See, e.g., HIV Criminalization and Ending the HIV Epidemic in the U.S., Ctr. for Disease Control & Prevention (Jan. 2023), https://www.cdc.gov/hiv/pdf/policies/law/cdc-hiv-criminal-ehe-2023.pdf [https://perma.cc/KVJ5-E7WK] (finding dozens of states’ laws that criminalize HIV exposure that are now outdated and do not reflect our current understanding of HIV). are just some examples. Just as individual people could be perceived as dangerous due to an illness or impairment, so too have we used the criminal law to excise people from society that threatened our fragile moral and cultural foundations. Third, the socio-medical ethics of placebo treatments frame unique questions specific to that field that provide an opportunity to discuss the larger ethical questions of punishment. For example, the crossover between the ethics of harm, benevolent deception of the public/patient, using placebos and punishments as tools of experimentation, and the economic incentives at play are important considerations of both the theoretical and practical stakes.

Finally, the above theoretical framings are foundational to the practical interventions that the placebo methodology might inspire.20See Smith, supra note 14, at 2 (citing Paul Kahn’s argument that the first step of legal reform is “to undertake a thick description of the meanings of criminal justice” without being prejudiced with the practical impacts). As with all punishment, underlying theory heavily impacts the types of practical punishments we impose on people who have violated criminal laws.21For example, the placebo methodology as applied to mass incarceration is premised on the medical principles of quarantine and incapacitation as a way of making those of us who have not run afoul of the criminal law feel safer. See also infra notes 61–62 and accompanying text. Throughout the analysis of the placebo methodology, this Article explores unique policy solutions gleaned from medical and scientific literature to consider how to fix the problems that overreliance on placebos can bring. This includes unique interventions rarely trodden in the punishment literature, such as new approaches to government regulation, ethical boundaries, policy experimentation, and cultural messaging. Thus, after a generation of failing to solve the problems of mass incarceration and the ballooning punishment regime, the placebo methodology hopes to elucidate innovative practical interventions.22See, e.g., Erika K. Wilson, Monopolizing Whiteness, 134 Harv. L. Rev. 2382, 2416 (2021) (extolling the virtue of using new toolsets to tackle longstanding legal problems); David A. Jopling, Talking Cures and Placebo Effects 161 (2008) (extolling the benefits of “philosophical insights” that “may, for example, help to break exploratory impasses, stimulate new avenues of exploration, and frame psychological problems in a new light”).

The placebo methodology and all its theoretical and practical draping must ultimately answer the most important question of punishment scholarship: Is punishment justified? If punishment does indeed operate as a placebo and provides meaningful value to public perception, is this enough to justify the status quo? Many people would agree that in general, we police and punish too much in this country. And even if it does not make us any safer, we should not give short shrift to the law’s power to make us feel better. These are questions that address the ultimate payoff of the criminal legal system and the degrees of punishment severity to which we are willing to condemn our fellow man for the utilitarian benefit of our collective feelings.

This Article humbly contributes to these discussions in four parts. Part I builds out the placebo methodology by diving deeper into the shared logic between placebos and punishment as treatments for physical and social ills, respectively. Part II applies the placebo methodology to the mass incarceration crisis as the most salient case study that dominates modern conversations about punishment. Part III further explores the placebo methodology as it applies to mass incarceration under a host of different socio-medical considerations, including the harm principle, justified deceptive practices, the ethics of experimentation, and economic incentives. Further, this Part also confronts the all-important question of whether punishment is justified under the placebo methodology. Part IV closes the Article by broadening the framework to other worthwhile legal disciplines, as well as considering tangential socio-medical framings of punishment that might also be worthy of future exploration. This Article hopes to advocate for the placebo methodology as a malleable toolset that should be utilized in future legal research exploring social modeling of behavior and policy.

Exploring punishment as a placebo policy is more than just a clever alliterative analogy. The placebo methodology gives punishment theory and policy interventions a new set of tools that fully appreciate the cultural and social impacts of criminal punishment. And with such an outlook that values both actual and perceived goals and benefits, we can establish a more careful and nuanced critique of the status quo that calls for a rejection of placebos in favor of panaceas.

I. The Placebo of Punishment Theory

When boiled down to its purest form, the placebo methodology seeks to add a set of social and cultural tools to understanding modern punishment based on how placebos work in the medical field.23Daniel E. Moerman & Wayne B. Jonas, Deconstructing the Placebo Effect and Finding the Meaning Response, 136 Annals Internal Med. 471, 472–73 (2002) (explaining the many cultural variables that help produce a placebo effect). Such analogies are not new in legal scholarship and often add value by discovering latent assumptions or highlighting underappreciated aspects of legal analysis through a new theoretical framing.24See, e.g., Stephen P. Garvey, Punishment as Atonement, 46 UCLA L. Rev. 1801, 1854 (1999) (using theological and secular understandings of atonement to argue for a restorative and libertarian punishment regime); Cheryl I. Harris, Whiteness as Property, 106 Harv. L. Rev. 1707, 1714–15 (1993) (analogizing and exploring the relationship between race and property rights); Chaz Arnett, Data, the New Cotton, U. of Md. Francis King Sch. of L. Stud. Rsch. Paper Series 2–6 (2022) (explaining the commonalities between the use of Black people to pick cotton and to mine data for profit). One might even argue that the entire foundation of legal analysis is based on analogizing cases and other legal texts to be similar or dissimilar to the case at hand. Following this tradition, this Part pushes deeper by explaining why framing punishment as a placebo is more than a metaphor, but a more fulsome methodology. Section I.A fleshes out the theoretical and literal connections between punishments and placebo treatments by focusing on the actors in each system. Section I.B explores the placebo effect of punishment and whether it succeeds in making us feel safer. These Sections offer important insights into the socialization of punishment and how we should think about the causes of crime, as well as introducing the ethical and practical dilemmas of power, politics, and subjective perceptions to be explored in later Parts.

A. The Placebo Methodology

The theoretical and logical connections between placebo treatments and criminal punishment is a simple idea: Like a medical treatment, punishment has been prescribed to our modern society to solve the underlying problems of crime; but like a placebo, our modern punishment system does not deliver on its promises of efficacy by lowering crime rates but rather is meant to control and mitigate public perception of crime.

Although the exact definition of a placebo treatment is contested in the medical literature,25See Blease, supra note 8, at 413 (cataloging the different definitions and expansions of the term “placebo” as a medical methodology); Moerman & Jonas, supra note 23, at 471 (“[T]he most recent serious attempt to try logically to define the placebo effect failed utterly.”). placebos, for purposes of this Article, can be defined as treatment that is administered by a person in power (usually a doctor or medical researcher) to provide psychological or otherwise therapeutic benefits to make patients feel better, with little or no active ingredients that would be efficacious to treat the physical medical problem.26There are two types of placebos recognized by the medical community: pure and impure. A pure placebo is a substance that has no active ingredient that would be beneficial for the patient’s condition. An impure placebo refers to a substance that does indeed have an active ingredient that may be beneficial, but that active ingredient has not been scientifically shown to be beneficial or is at a dosage too low to convey a physical benefit. See Alfredo Jose Pardo‑Cabello, Victoria Manzano‑Gamero & Emilio Puche‑Cañas, Placebo: A Brief Updated Review, 395 Naunyn-Schmiedeberg’s Archives Pharmacology 1343, 1344 (2022) (describing the differences and frequency between pure and impure placebos).

In this methodology, the individual patient being treated is the body politic. This is based on a larger relationship between the study of the physical body and its relation to society as a whole.27See generally Alexandra Howson, The Body In Society: An Introduction (2d ed. 2013) (studying the cultural and social feedback loops connecting the individual physical human body with society and nature); Chris Shilling, The Body and Social Theory 77 (3d ed. 2012) (“[T]he body is above all a metaphor of society as a whole.”). Since ancient times, the human body has served as a structural archetype of society and its institutions.28See Shilling, supra note 27, at 25–44 (charting the relationship between classical sociology and archetypes of the body as a framework for understanding society); see also Turner, supra note 16, at 16, 151 (citing and crediting social anthropologists “from Robert Hertz to Mary Douglas” for their studies of how civilizations have commonly used the body as an important metaphor for society). The Greek and Latin traditions had a double meaning for the term “diet.” It meant both a mode of ordering one’s life, as well as a political assembly of princes that performed legislative and administrative duties.29See Turner, supra note 16, at 142. The term “regimen” also had a dual meaning, referring both to a medical means of therapy and also a system of government that we refer to as a “regime.”30See id. This is part of the larger Western tradition that has found a double and connected linguistic and cultural meaning between caring for the individual body and upholding the larger social body. Political tradition borrows from human and natural traits to name its institutions, such as the “head” of organizations and governments, “branches” and “arms” of the same, and using the “body politic” to identify an entire society as one social organism.31Id. at 151–52. Religious tradition is rife with such symbols, often using the body as a metaphor for spiritual insights: the body of Christ was a symbol for the institutional church; Adam’s rib was a symbol of patriarchy; the flesh versus spirit dichotomy that represented moral weakness and strength respectively; and the list can go on.32See id. at 16, 30 (connecting the rich religious history of using the body as a metaphor for society, citing both Greek and later Christian traditions). These examples do not do justice to the sheer number of body-as-society analogies that abound to illustrate the body’s enduring importance into how we think about society and its institutions. The human body is a foundational lens of Western thought and philosophy on social order.33Id. at 151. Society is personified because our political and philosophical tradition recognizes that institutions mirror the very humans they seek to regulate.34R. H. Tawney, Equality 35–36 (1938) (explaining that society, like the human body, is an organism composed of different members, each with its own function that is suited to its station); Turner, supra note 16, at 79 (“The body politic is thus the artificial body which provides the framework within which the real bodies of men can find security and peace.”).

The body’s dysfunction and disease has also been an important characterization of social disorder in Western thought. Physical diseases were frequently interpreted as manifestations of a “deeper malaise in the social structure.”35Turner, supra note 16, at 143. Consequently, the concept of disease was used as a symbol of social problems that could break down and destroy the body politic just as actual disease could break down the physical body. Only a few hundred years ago, obesity was considered to be an individual “manifestation of the flabbiness of the social system,” especially as it exposed the sedentary lifestyle of the rich.36Id. Even cancer has a history of being described as a “disease of civilization” that manifested during certain social failings.37Id. (citation omitted). This is an interesting cause-and-effect relationship because in many ways, social hierarchies have always exposed some classes of society to various diseases. For example, the social hierarchy of the rich allowed those in agrarian societies to live less active lifestyles.38Id. Thus, social ordering can certainly impact the development of individual diseases, which in turn communicates a broader identity of a society in accordance with its social priorities. Consequently, the history of associating the presence of physical disease as a larger sign of social disorder, malaise, and even moral decay is well documented.39See, e.g., Damian R. Murray, Nicholas Kerry & Will M. Gervais, On Disease and Deontology: Multiple Tests of the Influence of Disease Threat on Moral Vigilance, 10 Soc. Psych. & Personality Sci. 44, 44 (2019) (finding social links between upholding social norms of morality and conformity to the prevention of disease); Melissa A. Wheeler, Melanie J. McGrath & Nick Haslam, Twentieth Century Morality: The Rise and Fall of Moral Concepts from 1900 to 2007, PLoS ONE 1, 2 (2019) (describing how some view the decline of morality as a social contagion).

The individual human body is more than biological muck; it is our tool for interacting with and understanding the natural and social world. The body serves as a mirror image to help us understand social institutions, and in turn, those social institutions help shape the roles of our bodies in social structure. The intersection between our bodies and our institutions govern issues of “health, gender, childhood, ethnicity[,] and disability[,] and many more substantive areas[,]”40Howson, supra note 27, at 12. including crime and punishment.

If the patient is the public, then the patient’s disease can be understood as crime itself that threatens the health of social order just as physical disease causes strain and breakdown of the physical body. To let such a social disease fester and ferment would be tantamount to allowing a physical plague to spread without proper intervention of cultural sanitation.41See Turner, supra note 16, at 72 (studying medical reformers and how this movement’s normative priors aligned with theories of social pollution and disease).

The disease/crime comparison is a longstanding principle in our social understanding and moral disapproval of deviant and antisocial behavior. Academics, commentators, and public officials have often used this crime/disease analogy to display their disgust and rally public and intellectual opinion. Emile Durkheim and contemporary scholar Martha Grace Duncan have separately written about how society treats crime and criminals as socially unclean things that must be resolved through institutional intervention.42See infra note 48 and accompanying text; Martha Grace Duncan, Romantic Outlaws, Beloved Prisons 119–87 (1996) (exploring the historical and modern comparisons of offenders and incarcerated persons as slime and filth). Academics have built on this concept by discussing a “quarantine” model of criminal justice that evokes the need to separate people with the contagious disease of criminality from the rest of society;43See, e.g., Gregg D. Caruso, Free Will Skepticism and Criminal Behavior: A Public Health-Quarantine Model, 32 Sw. Phil. Rev. 25, 30–31 (2016); Derk Pereboom, Free Will Skepticism and Criminal Punishment, in The Future of Punishment 49–78 (Thomas A. Nadelhoffer ed., 2013); Ferdinand D. Schoeman, On Incapacitating the Dangerous, 16 Am. Phil. Q. 27, 27 (1979); see also Ashley T. Rubin, Prisons and Jails Are Coronavirus Epicenters—But They Were Once Designed to Prevent Disease Outbreaks, The Conversation (Apr. 15, 2020, 5:59 PM), https://theconversation.com/prisons-and-jails-are-coronavirus-epicenters-but-they-were-once-designed-to-prevent-disease-outbreaks-136036 [https://perma.cc/GY6U-QJJU] (describing the connection between morality and physical disease, in which the criminally “infected” were quarantined in prisons). there are frequent comparisons to crime as a cancer of society that

suggest it will metastasize unless properly dealt with.44See Emily Wagster Pettus, US Judge Condemns Mississippi City’s ‘Crime Cancer’ as He Removes State Justice from Lawsuit, Associated Press (June 2, 2023, 12:58 PM), https://apnews.com/article/jackson-mississippi-appointed-judges-lawsuit-28492017a8397f624b72d4f756ae392e [https://perma.cc/4QVP-7JUR] (reporting that a federal judge referred to a city’s crime problem as a “crime cancer”); Priscilla A. Clapp & Jason Tower, A Criminal Cancer Spreads in Southeast Asia, U.S. Inst. of Peace (June 26, 2023), https://www.usip.org/publications/2023/06/criminal-cancer-spreads-southeast-asia [https://perma.cc/L45V-CGGA] (describing a crime wave in Myanmar as a growing cancer to that country’s social order); Norman E. Sharpless & Ronald A. DePinho, Crime and Punishment, 436 Nature 636, 636 (2005) (using crime policy as an analogy to what healthy cells do when encountering cancer in the body). Even our most liberal politicians have fallen prey to such logic, comparing the spread of violent crime to “a national plague.”45Edward M. Kennedy, Punishing the Offenders, N.Y. Times, Dec. 6, 1975, at L 29, https://timesmachine.nytimes.com/timesmachine/1975/12/06/79109347.html?pageNumber=29 [https://perma.cc/L5DA-7QPW].

Given these rhetorical similarities, it comes as no surprise that the criminal law has often found an ally in the medical sciences. First, we can consider how disease and crime were understood together throughout our history, which captures how physical diseases have been criminalized to various extents as a method of preserving social order and public health. Criminal laws have often been used to identify medically “dangerous” and “contagious” people who suffer from a host of diseases and ailments and excises them from the community through the same logic of medical quarantine. As medicine was used to diagnose a host of illnesses that illustrated social anxieties toward what dominant groups deemed unacceptable behavior,46See Peter Conrad & Joseph W. Schneider, Deviance And Medicalization: From Badness To Sickness 17 (Temp. Univ. Press 1992) (1980) (“[O]ur approach focuses on how certain categories of deviant behavior become defined as medical rather than moral problems and how medicine, rather than, for example, the family, church, or state, has become the dominant agent of social control for those so identified.”). crime policy followed close behind to regulate and punish such behavior.47See Morgan, supra note 18, at 1425 (“Medicalization provides pathways to criminalization in part because it positions disability as a problem to be cured—through medication, treatment, therapy, and containment.”). Religious laws that determined cleanliness go back for thousands of years, and were used to regulate and criminalize behavior of people suffering from leprosy and bloodborne diseases.48See Howson, supra note 27, at 95 (explaining the social theories of Mary Douglas and Emile Durkheim that realized that society sees everything that is out of place socially as dirt and unclean, and thus uses laws and other social mores to “clean” that what is unclean). In the era of the HIV/AIDS epidemic, intentional spread of the communicable disease was at one point criminalized as first-degree murder; only in the 1990s were these doctrines struck down in favor of lesser criminal offenses.49See, e.g., Smallwood v. State, 680 A.2d 512, 512–13 (Md. App. Ct. 1996) (reversing multiple attempted murder convictions for a defendant who knew he was HIV positive and yet still committed sexual assaults); see also Howson, supra note 27, at 98–100 (describing the stigmatization of HIV by associating it with socially denigrated groups such as “gay men, Haitians, drug users, sex workers[,]” and the continent of Africa). Perhaps unsurprisingly, the COVID-19 pandemic did not bring such harsh criminal sanctions toward those who intentionally or negligently spread the disease that caused harm. Thus, the medical authority of the era always determines which individuals are dangerous to public health, and criminal law has been a part of the infrastructure used to prevent spread of these diseases. It has also been used to assuage the public that they would be safe from such “dangerous” individuals because the law would keep them in their appropriate place.

Mental illness and disability have a jaded past that continues in criminal law to this day. Homosexuality was treated like a mental illness up until only a few decades ago,50See generally Sarah Baughey-Gill, When Gay Was Not Okay with the APA: A Historical Overview of Homosexuality and its Status as Mental Disorder, 1 Occam’s Razor 5 (2011) (outlining the history of homosexuality’s classification as a mental illness from the 1950s though the 2000s). and was criminalized accordingly.51See Bowers v. Hardwick, 478 U.S. 186, 190–96 (1986) (upholding statute criminalizing consensual homosexual sexual activity), rev’d, Lawrence v. Texas, 539 U.S. 558 (2003). Alcoholism, substance abuse, malingering, and even political dissent have been subsumed under various definitions of mental or physical disease to be regulated by the criminal law.52See Turner, supra note 16, at 181. People dealing with various mental health issues have often suffered from stereotypes that they possess characteristics of criminality.53See Morgan, supra note 18, at 1423–24 (explaining the historic and modern treatment of people suffering from mental health episodes and their interactions with police). These people are often mischaracterized by police and bystanders as being more dangerous, which then justifies legal use of force and coerced treatment through criminal law.54See, e.g., Heather Stuart, Violence and Mental Illness: An Overview, 2 World Psychiatry 121, 121 (2003) (finding that “[m]embers of the public exaggerate both the strength of the association between mental illness and violence and their own personal risk”); Bernice A. Pescosolido, John Monahan, Bruce G. Link, Ann Stueve & Saeko Kikuzawa, The Public’s View of the Competence, Dangerousness, and Need for Legal Coercion of Persons with Mental Health Problems, 89 Am. J. Pub. Health, 1339, 1339–45 (1999) (finding that public misperceptions of people suffering from mental health issues are central to stigmas and discriminations because people are more likely to condone legal action and coerced treatment of these individuals). Consequently, the prison as an institution has turned into the neoliberal mental health facility,55See generally Loïc Wacquant, Punishing the Poor: The Neoliberal Government of Social Insecurity (2009) (discussing the neoliberal shifts of closing health institutions and instead criminalizing public health problems as a way of managing the poor); Jonathan Simon, Mass Incarceration On Trial: A Remarkable Court Decision and the Future of Prisons in America (2014) (discussing the move away from the medical model in 1970s due to growing fear and anxiety about people who break the law, especially after several notable prison riots in 1970s). often responsible for distributing more prescription mental health treatments than any other institution.56See, e.g., Lili Holzer-Glier, Inside the Massive Jail that Doubles as Chicago’s Largest Mental Health Facility, Vera (May 26, 2016), https://www.vera.org/the-human-toll-of-jail-2016/inside-the-massive-jail-that-doubles-as-chicagos-largest-mental-health-facility [https://perma.cc/U9QM-6KUH] (discussing the Chicago jail as the largest mental health provider in the state). This should come as no surprise because over one-third of incarcerated persons have been diagnosed with a mental illness.57See Sanford H. Kadish, Stephen J. Schulhofer & Rachel E. Barkow, Criminal Law and its Processes: Cases and Materials 941 (11th ed. 2022) (“[Thirty-Seven] percent of people in prison and 44 percent of the people in jail have been told by a mental health professional that they had a mental illness.” (citation omitted)).

The criminality of physical ailments and the treatment of mental illness change according to social constructions of who the dominant social group deems deserving of criminal punishment. As Jamelia Morgan has studied, mental and physical disability is just one area that has been “conceived of as a social contagion or pathology to be contained through policing and carceral control.”58Morgan, supra note 18, at 1414; see also Adrienne Phelps Coco, Diseased, Maimed, Mutilated: Categorizations of Disability and an Ugly Law in Late Nineteenth-Century Chicago, 44 J. Soc. Hist. 23, 23 (2010) (describing statutes that explicitly criminalized “[a]ny person who is diseased, maimed, mutilated or in any way deformed so as to be an unsightly or disgusting object, or an improper person to be allowed in . . . public places in this city[,]” stating that they “shall not therein or thereon expose himself or herself to public view”). See generally Jonathan Simon, Governing Through Crime: How the War on Crime Transformed American Democracy and Created a Culture of Fear (2007) (arguing that crime policy and fear is used as a tool of governance). All of these criminal laws are socio-medical reactions that were purportedly meant to keep society safe based on the best science of the time; but they often functioned by subjugating the sick, disabled, and the most vulnerable. Fear was central in these criminal responses; it was fear of the unknown, fear of the unclean, and fear of the transmission of such conditions in the general public.59See Howson, supra note 27, at 100–01 (citing the work of Douglas by explaining the socialization of a “polluting person” as being connected to moral wrong, and their wrong “unleashes danger for someone” else); see also Jody David Armour, Negrophopia and Reasonable Racism: The Hidden Costs of Being Black in America 4, 38–39 (1997) (analyzing legal arguments that seek to institutionalize and justify irrational fear of Black men).

This interaction between the patient/public and disease/crime raises even more interesting questions. For one, the entire public may not be suffering from the disease of crime, just as a medical malady might not be spread throughout the entire body. Just as diseases are often concentrated in certain areas of the body, crime too is unfortunately concentrated in certain pockets of our body politic. Crime tends to be concentrated in poor areas with high population density.60See David Weisburd, Taryn Zastrow, Kiseong Kuen & Martin A. Andresen, Crime Concentrations at Micro Places: A Review of the Evidence, 78 Aggression & Violent Behav. 1, 13 (2024) (confirming previous studies that found that crime is concentrated at the street level and is most prevalent on densely populated streets in cities). Perhaps there is a further lesson here in the methodology; neglect can often lead to problems. If an individual neglects to care for their body through nutrition, hygiene, or general maintenance, we might not be surprised that such neglect correlates with medical problems down the road. So too should we think about our body politic neglecting our inner cities, our less financially fortunate citizens, and how such social and institutional neglect leads to problems of crime.

Also, conceptualizing crime as a social ill or disease can lead to some problematic conclusions unless properly contextualized. Framing crime as a disease is a tool of dehumanization that seeks to justify treating criminal offenders as a cancer: something to be removed or excised from society, or even killed.61See generally Anna Roberts, Criminal Terms, 107 Minn. L. Rev. 1495 (2023) (criticizing the use of terms and language that dehumanize and mischaracterize people who commit crimes, those impacted by crimes, and the criminal legal system as a whole). Humans have a pattern of dehumanizing others by comparing them to animals, nonconscious life forms, or inanimate objects to justify treating them as nonhumans. This is one of the darkest corners of our collective psyche; labelling people as rats, roaches, diseases to be cured, mud and filth, and a whole host of other analogies that form the basis for treating human beings like those things being analogized.62See Nick Haslam, The Many Roles of Dehumanization in Genocide, in Confronting Humanity at its Worst: Social Psychological Perspectives on Genocide 119–21 (Leonard S. Newman ed., 2020) (explaining the important role that the language of dehumanization has when seeking to treat others as less than human); Duncan, supra note 42, at 119–87 (1996) (exploring the historical and modern comparisons of offenders and incarcerated persons as slime and filth). Cages and steel bars are suitable for animals; a dustpan and trashcan are suitable for dirt and grime; excising and killing unhealthy cells is quite appropriate for cancer and biological diseases. We must resist the urge from our ancestors to go down this dehumanizing path because history bears witness to where it often leads. Labelling people that violate criminal laws as animals, dirt, or cancerous cells has the danger of repeating the punishment mistakes of the past.

Instead of using the cancer analogy and the broader disease/crime framing to dehumanize and justify excising or segregating cancerous cells, we should instead address the underlying problems to prevent the disease in the first place and to make conscious interventions for the social body to heal cells to prevent their criminal or antisocial growth.63See Dariusz Adamek & Anastazja Stoj, Cancer as a “Mafia” Within the Body: A Proposition of Conceptual Approach That Seems Congruent to the Complex Biology of the Disease, 1 Integrative Cancer Sci. & Therapeutics 51, 51 (2014) (describing cancer cells as acting similar to an organized criminal organization, stating that they are not “aliens,” but rather “alienated” from their normal counterparts).

The disease/crime framing also challenges us to consider the possibility that a treatment itself has become harmful to the social body. Just as chemotherapy introduces a carefully regulated level of poison to the body to kill cancerous cells, such a treatment can also wreak havoc on healthy cells and the body as a whole.64See Kevin H. Wozniak, The Politics of Crime Prevention: Race, Public Opinion, and the Meaning of Community Safety, 198–99 (John Hagan ed., 2023) (“[U]se of surveillance, arrest, and punishment to fight crime is like chemotherapy to fight cancer. It may reduce the problem, but it inevitably sickens the patient in the process, and it may fail and kill the patient regardless.”). Unfortunately, chemotherapy also has the potential to lead to adverse health outcomes, including death, as part of the natural course of the treatment.65See Katrina Megget, Chemotherapy Causes Death in More than 25% of Cancer Patients, PharmaTimes Online (Nov. 13, 2008), https://pharmatimes.com/news/chemotherapy_causes_death_in_more_than_25_of_cancer_patients [https://perma.cc/9EKS-U8BZ] (citing a study stating that “the use of chemotherapy to treat seriously ill cancer patients has found the treatment caused or hastened death in 27% of cases”). The considerations of punishment and mass incarceration must ask these same questions. How much has punishment had external and downstream impacts on the rest of society, and might it too also lead to negative outcomes for the body as a whole? And as will be discussed below, has the placebo treatment of mass incarceration itself become harmful to the body? The final part of the placebo analogy connects the role of doctors to various actors in the criminal justice system who prescribe and apply the treatment of punishment. Doctors play an important role in the healthcare system as care providers, and they deal directly with patients to give medical advice and prescribe treatments. Even with all of the medical advancements and growth in scientific knowledge, doctors continue to this very day to prescribe placebo treatments to their patients in clinical settings.66See Franklin G. Miller & Luana Colloca, The Legitimacy of Placebo Treatments in Clinical Practice: Evidence and Ethics, 9 Am. J. Bioethics 39, 40 (2009) (citing studies stating that the use of impure placebos is seen positively by contemporary physicians); Pardo‑Cabello et al., supra note 26, at 1344 (using survey data that found that 77% of the surveyed physicians prescribed placebo at least once a week). In this way, public officials in our executive departments and legislatures have built similar relationships of trust with their constituencies who have decried the social disease of crime; these decisionmakers have prescribed a solution of harsh criminal punishment as a way of treating this disease and returning society back to a state of health and harmony.67See Jeffrey Bellin, Mass Incarceration Nation: How the United States Became Addicted to Prisons and Jails and How it Can Recover 5 (2023) (“Politicians claimed to be trying to solve the problem of crime. The critical flaw in the last fifty years of ‘tough on crime’ policies is that this never works.”). High-level politicians help facilitate and work with legislators and state actors such as police and prosecutors to deliver the treatment of punishment at the street level.68See Evans, supra note 6, at 34–48 (discussing how federal law-enforcement initiatives trickle down to the local level).

However, the incentives of politicians are not congruent with those of doctors. Consequently, we see politicians wield their prescribed treatment of punishment in a perverse loop meant to keep themselves in power. Instead of using criminal policies to make Americans feel safer, they use these policies to control public perception of crime in a way that ensures it will be politically advantageous. This is accomplished through the somewhat oversimplified political process that follows: Politicians and media whip up and create fear of crime in the populace because fear drives votes69See John A. Shjarback & Jacob T. N. Young, The “Tough on Crime” Competition: A Network Approach to Understanding the Social Mechanisms Leading to Federal Crime Control Legislation in the United States from 1973–2014, 43 Am. J. Crim. Just. 197, 201–02 (2018) (citing studies showing that politicians, starting in the 1960s, stirred up public concern about crime to win votes, as opposed to the more popular political theory that politicians were merely responding to existing fears about crime; “[i]n sum, research indicates that politicians and governments can, and do, influence public perception of crime.”); see also Corradi & Baumer, supra note 7, at 1395 (“[P]oliticians often used sensational and exaggerated claims about crime in a fearmongering campaign designed to appeal to potential voters, offering increasingly punitive policies as a way to address the fears they stoked.”). and views70See Valerie J. Callanan, Media Consumption, Perceptions of Crime Risk and Fear of Crime: Examining Race/Ethnic Differences, 55 Soc. Persps. 93, 93–95 (2012) (describing how increased media coverage of crime increases public fear and perception of being victimized). respectively, and voters give power to these politicians who promise to fix the problem.71See e.g., Bellin, supra note 67, at 67–70 (discussing a case study of New York’s harsh drug laws in the 1970s that were passed under the leadership of Governor Nelson Rockefeller based on the promise that it would put drug dealers out of business and deter crime). While crime is indeed real and its impacts often terrible on an individual and societal level, politicians perversely operationalize fear of wrongdoing to bolster their political power.72See Michael Orsini & Paul Saurette, “Take Two and Vote in the Morning”: Reflections on the Political Placebo Effect, in Placebo Talks: Modern Perspectives on Placebos in Society 239, 250 (Amir Raz & Cory Harris eds., 2015) (studying political placebo effects when politicians “tap into emotional landscapes of fear and anger” to enjoy “demonstrable political gains even if the larger cause is not affected”); Rachel Elise Barkow, Prisoners of Politics: Breaking the Cycle of Mass Incarceration 6 (2019) (describing the political campaign ad of George H.W. Bush featuring the crimes of Willie Horton as a means to instill fear, cast doubt on Bush’s political rival’s ability to keep the country safe, and highlight Horton’s race through a prevalent dog whistle). Therefore, there is an incentive to maintain an optimal level of fear and to push the “fear” button every few years to ensure that voters continue to trust in the politician and their policies. In 2022, for example, Fox News ramped up its coverage of crime to prime the public to vote for law-and-order Republican candidates before the congressional midterm elections; after the elections, their coverage of crime dropped by a stunning 50%.73See Adam Gabbatt, Crime Coverage on Fox News Halved Once US Midterms Were Over, The Guardian (Nov. 25, 2022, 5:00 AM), https://www.theguardian.com/media/2022/nov/25/fox-news-crime-coverage-decline-us-midterm-elections [https://perma.cc/787K-5YE4] (comparing the 141 crime segments from Labor Day to the election with the 71 crime segments the week after the election). Studies have also shown that Americans’ perception of crime changes favorably when a member of their party occupies the White House.74See Megan Brenan, Record-High 56% in U.S. Perceive Local Crime Has Increased, Gallup (Oct. 28, 2022), https://news.gallup.com/poll/404048/record-high-perceive-local-crime-increased.aspx [https://perma.cc/EC2Y-S2XA] (finding that Republicans traditionally think crime rates are higher when Democrats are in office and vice versa). Thus, while Americans do not feel safer from crime, they do feel that they are in safe hands when voting their preferred politician into office.75See Corradi & Baumer, supra note 7, at 1394–95 (finding that Americans still have the same level of fear toward crime even after decades of mass incarceration). Putting these principles together, the placebo methodology takes shape by explaining the operation and incentives of using punishment as a treatment that turns out to be a mere placebo as a consequentialist project.76Adam J. Kolber, The Experiential Future of the Law, 60 Emory L.J. 585, 590–95 (2011) (arguing that one of the primary functions of law is to manage the balance between good and bad subjective experiences). Most people, even in high-crime areas, aren’t often witnesses to actual crimes that unfold before them.77Prevailing crime rates measure how many particular crimes are reported in proportion to every 100,000 people. For example, during some of the highest crime rates in the country, robbery was reported to have a crime rate of 60.1, meaning that there were 60 robberies for every 100,000 people. See infra note 107. This illustrates that robberies—even as problematic as they are—are relatively rare, and a person’s chance of being the victim of a robbery is relatively low. They hear about crime from their friends, they see it on the news, and they feel the anxiety of their neighbors.78See Cass R. Sunstein, Hazardous Heuristics, 70 U. Chi. L. Rev. 751, 758–59 (2003) (“Many perceived ‘epidemics’ are in reality no such thing, but instead a product of media coverage of gripping, unrepresentative incidents.”). Thus, lowering these perceptions of crime would have multiple social benefits. Businesses are more likely to invest in areas that they perceive as low-crime, individuals are more likely to civically engage in these communities, and even property values can be impacted by market perceptions of crime.79See Arthur Acolin, Rebecca J. Walter, Marie Skubak Tillyer, Johanna Lacoe & Raphael Bostic, Spatial Spillover Effects of Crime on Private Investment at Nearby Micro-Places, 59 Urb. Stud. 834, 836–38 (2022) (outlining literature showing that private businesses and property owners base their investment decisions, in part, on perceived crime rates); Johanna Lacoe, Raphael W. Bostic & Arthur Acolin, Crime and Private Investment in Urban Neighborhoods, 108 J. Urb. Econ. 154, 155–56 (2018). Thus, if a placebo policy of punishment made society feel better, the law would be justified as yielding positive future outcomes. This explains in part why politicians and decisionmakers have been so adamant to prioritize public perception of crime.80See Aviram, supra note 11, at 59, 78–79 (stating that “[b]y enacting a law to address an overestimated risk, politicians may capture some of the credit for what individuals perceive to be a reduction in the risk”). It is indeed a social lever they can turn to yield the social and political outcomes they desire.

The social and political aspects of crime policy are all tied together in a muddled mess that prioritizes perceptions of crime over the efficacy of crime policy. Thus, the placebo of crime and punishment in the modern era is indeed meant to control perception, but in a way that benefits the very people who prescribe the treatment.

Punishment operates on a placebo treatment cycle. The placebo methodology shows how punishment policies utilize similar social and cultural dynamics to control public perception and feeling toward the diagnosed problem, as opposed to treating the actual problem through effective means. Ultimately, this operates according to power, which is a similar motivation in most policy, medical and criminal alike.

B. The Placebo Effect

Conceptualizing punishment as a placebo gets even more nuanced if we theorize the placebo effect, which refers to the physical benefit that placebos can produce for patients. So far, this Article has focused on the dichotomy between efficacy and perception, arguing that punishment acts like a placebo because these criminal policies have little efficacy but instead operate to control public perception in ways that benefit politicians, law enforcement, and even the broader Prison Industrial Complex (“PIC”).81See Sheldon A. Evans, Punishment Externalities and the Prison Tax, 111 Calif. L. Rev. 683, 706–07 (2023) (discussing the Prison Industrial Complex as a system of private and public interests that include politics and businesses that work together to build, lobby, and perpetuate the mass incarceration system). But placebos provide more than mere psychological benefits. One of the curious miracles of placebo treatments is that if a doctor prescribes such a treatment to a patient, the patient will certainly feel better; but in some circumstances, the placebo will actually deliver a measurable physical benefit in which the patient’s body will actually improve from a biological and medical perspective. The medical literature has extensively studied this phenomenon called the “placebo effect,” in which a treatment that has little physical benefit can somewhat trick the patient’s body into activating its own powerful disease-fighting and recovery systems.82See Jopling, supra note 22, at 21 (describing the placebo effect as stemming from the body’s “powerful innate capacity to heal itself, to restore itself to equilibrium, and to repair damage”); Malani, supra note 10, at 434 (characterizing the placebo effect as the body’s reallocation of resources toward the healing process, which also has application in social institutions). This Section theorizes what this means for thinking about punishment as a placebo.

Modern medicine and sociology have come together to understand the mysteries of how the positive placebo effect works. Scientists have hypothesized that placebos release endorphins and dopamine in the brain, which have been shown to increase pleasure and decrease the feeling of pain;83Anne Harrington, Foreward, in Placebo Talks: Modern Perspectives on Placebos in Society vii, viii (Amir Raz & Cory Harris eds., 2015); Ginger A. Hoffman, Anne Harrington & Howard L. Fields, Pain and the Placebo: What We Have Learned, 48 Persps. Biology & Med. 248, 258–62 (2005) (finding evidence suggesting that placebo responses and responses caused by morphine or another opioid are mediated by largely overlapping pain receptors in the brain). these natural chemicals in the brain also impact a patient’s positive motivation and psychological outlook on their medical condition.84See Caglar Irmak, Lauren G. Block & Gavan J. Fitzsimons, The Placebo Effect in Marketing: Sometimes You Just Have to Want It to Work, 42 J. Mktg. Rsch. 406, 408 (2005) (pointing to a placebo’s role in increasing motivation). Sociologists add to this understanding by explaining the cultural and social meanings that give placebos such power.85See Daniel E. Moerman, Looking at Placebos Through a Cultural Lens and Finding Meaning, in Placebo Talks: Modern Perspectives on Placebos in Society 99, 102–07 (Amir Raz & Cory Harris eds., 2015) (explaining the social and cultural aspects that shape expectation and placebo effects); Clara M.A. de Bruijn, Marc A. Benninga & Arine M. Vlieger, Teenagers’ and Parental Attitudes Towards the Use of Placebo Pills, 182 Eur. J. Pediatrics 1425, 1425 (2023) (explaining that the positive placebo effect operates through multiple factors “involving a complex interaction between patients’ beliefs and expectations, social and physical environmental perceptions, and conditioning from past experiences”). First, the disease must be socially conceptualized since the diagnosis dictates the treatment. In some cultures, a headache might be the affliction of demonic forces, or it might be chemical activity in the brain.86See David B. Morris, Placebo, Pain, and Belief: A Biocultural Model, in The Placebo Effect: An Interdisciplinary Exploration 192, 196 (Anne Harrington ed., 1997) (detailing how cultures of faith can impact the view of illness, where Babylonians believed a headache was a demonic assault, and even modern Christian denominations associate health outcomes as determinants of faith). Thus, the meaning and definition of the disease is the starting point to understand the cultural and social power of the placebo. Second, the doctor’s relationship to the patient also carries weight; Anne Harrington—a prominent leader in placebo studies—once characterized doctors as walking placebos because of their powerful role in shaping patient expectations.87See Natasha K.J. Campbell & Amir Raz, Placebo Science in Medical Education, in Placebo Talks: Modern Perspectives on Placebos in Society 83, 88 (Amir Raz & Cory Harris eds., 2015) (citing Anne Harrington). If the doctor, healer, or shaman in the community is somebody whom a patient respects, trusts, and recognizes as a person of high social standing, these feelings will increase the patient’s own subjective belief that the doctor is prescribing them a treatment that is actually efficacious.88See Howard Spiro, Clinical Reflections on the Placebo Phenomenon, in The Placebo Effect: An Interdisciplinary Exploration 37, 47 (Anne Harrington ed., 1997) (explaining the historical and traditional role of doctors as a power conduit through which they determined health outcomes of entire communities); Howard Brody, The Doctor as Therapeutic Agent: A Placebo Effect Research Agenda, in The Placebo Effect: An Interdisciplinary Exploration 77, 83 (Anne Harrington ed., 1997) (describing the powerful impact that trusted doctors wielded in their historical communities). Third, patients’ own experiences shape their subjective social understanding and response to placebos. Research shows that patients who have had positive experiences with placebos in the past are good candidates for future placebo treatments.89Donald D. Price & Howard L. Fields, The Contribution of Desire and Expectation to Placebo Analgesia: Implications for New Research Strategies, in The Placebo Effect: An Interdisciplinary Exploration 117, 120 (Anne Harrington ed., 1997). Thus, hypothetically, if a patient had a good experience with eye of newt to treat their previous malady, this could subjectively impact their belief that eye of newt will perform well with a new ailment, or they would just as soon trust their doctor’s prescription of a crocodile tooth.

There is something about these medical and sociological factors that trigger the body’s own immune system towards positive physical results. Placebos can deliver positive medical results when treating things like the common cold and cardiovascular disease.90See Boozang, supra note 15, at 692–98 (outlining medical literature that claims placebos can serve as an actual physical cure for all ailments); see, e.g., Laura Bienenfeld, William Frishman & Stephen P. Glasser, The Placebo Effect in Cardiovascular Disease, 132 Am. Heart J. 1207, 1210–19 (1996) (measuring a positive placebo effect in cardiovascular disease). Placebos are also incredibly effective at treating more subjective medical ailments such as pain and depression.91See, e.g., Marco Annoni, The Ethics of Placebo Effects in Clinical Practice and Research, 139 Int’l Rev. Neurobiology 463, 469 (2018) (citing robust empirical evidence that placebos match or surpass that of conventional medications for conditions like pain, depression, recurring migraine, and irritable bowel syndrome); Tor D. Wager, James K. Rilling, Edward E. Smith, Alex Sokolik, Kenneth L. Casey, Richard J. Davidson, Stephen M. Kosslyn, Robert M. Rose & Jonathan D. Cohen, Placebo-Induced Changes in fMRI in the Anticipation and Experience of Pain, 303 Sci. 1162, 1162–64 (2004) (finding placebo effects account for both lower reported pain and reduced activity in pain processing areas of the brain). As it turns out, placebos can deliver positive psychological and physical results.

The placebo effect offers an interesting insight into crime and punishment as a social institution that also prioritizes and capitalizes on the subjective perceptions of the public in ironic ways that might indirectly produce public safety benefits. The crime and punishment literature has long had to grapple with two seemingly contradictory truths. On the one hand, crime rates have steadily declined in this country since the 1990s, which means we are actually getting safer.92See Eric P. Baumer & Kevin T. Wolff, Evaluating Contemporary Crime Drop(s) in America, New York City, and Many Other Places, 31 Just. Q. 5, 8–11 (2014) (analyzing the declining crime rates in America since the 1990s). On the other hand, there is near universal agreement among criminologists, sociologists, and economists that modern incarceration policies have contributed very little, if it all, to this public safety outcome.93See infra notes 121–130 and accompanying text.

Scholars have tried to answer the all-important question of the factors that cause the rise and fall of crime. This Article offers a unique contribution to this literature by conceptualizing the placebo effect of punishment, which describes the indirect ways that punishing offenders over the past generation has triggered other social and institutional movements that are much more responsible for the actual drop in crime than the actual placebo of punishment itself. In other words, punishment acts like a placebo because it manipulates how the public perceives crime in ways that trigger other social and institutional behaviors that actually are responsible for the lower crime rate. While punishment may have a very small direct effect on crime, it has much more indirect impact on crime.

For instance, more prisons and the growth of the PIC might mean more police officers on the streets to fill these prisons. While the police and prisons are two separate institutions, there is tremendous practical overlap in how they complement each other and work together. Consequently, as the number of prisons across the nation skyrocketed during the 1990s prison-building boom, so too did politicians dedicate tremendous funds to hiring thousands of police officers to enforce the rising drug war.94See Lauren-Brooke Eisen, The Federal Funding That Fuels Mass Incarceration, in Excessive Punishment: How the Justice System Creates Mass Incarceration 43, 44–46 (Lauren-Brooke Eisen ed., 2024) (describing the hundreds of millions of dollars that the federal government used to fund the militarization of local police departments and the hiring of new police officers during the tough-on-crime era). In this way, punishment policies of incarceration indirectly supported the growth of police forces. And there is evidence that the presence of additional police officers on the street deters would-be offenders because it increases the likelihood that they will be caught in the act or effectively tracked down soon after committing a crime.95See Aaron Chalfin & Justin McCrary, Criminal Deterrence: A Review of the Literature, 55 J. Econ. Literature 5, 13–22 (2017) (finding that police deployment and presence has a measurable impact on deterrence). Similar to a placebo, punishment policies did not contribute to actually treating the disease of crime; instead, they triggered other institutional behavior to increase police presence in a way that more effectively lowered the crime rate.

In some places, there might also be a self-fulfilling prophecy for communities that feel safer and employ social behavior that then makes them safer. Pedestrian traffic is a well-documented feedback loop in this regard, because people who feel that their neighborhood is a safe place to walk will choose to walk more places during day and night hours; in turn, this increased pedestrian traffic means that there are more eyes, ears, and potential witnesses which deter criminal behavior in these neighborhoods.96See Hongwei Dong, Does Walkability Undermine Neighborhood Safety?, 22 J. Urb. Design 59, 73–74 (2018) (finding that the impact of walkable neighborhoods depends on crime type and that other factors such as mixed-use land might increase crime). But see Narae Lee & Christopher Contreras, Neighborhood Walkability and Crime: Does the Relationship Vary by Crime Type?, 53 Env’t & Behav. 753, 780 (2021) (finding that walkable and dense neighborhoods increase victimizations of crime). It also might be interesting to theorize how punishment policies indirectly impact other social behaviors that have been linked to lower crime rates, such as increasing employment and high school graduation rates,97See infra note 126 and accompanying text, which highlights the impact that high school graduation and job training has on crime rates. among others.

These few paragraphs are not meant to be exhaustive and represent a short foray into digging into the empirics of crime policy to understand how punishment policies might be impacting social and institutional behavior to indirectly have positive impacts on the social ill of crime. Just as placebos operate according to biological functions that are triggered through a patient’s social understandings and expectations, so too can punishment be theorized as a treatment to the social ill of crime that triggers beneficial behaviors that produce lower crime rates.

* * *

As a closing thought to this Part, I implore readers to not lose the forest for the trees. This Article has thus far argued that mass incarceration policies can be conceptualized as a placebo treatment that while not efficacious, may nevertheless deliver benefits to public perception. But admittedly, analogizing criminal punishment to medical placebo treatments is not a 1:1 comparison; nor is it a perfect analogy that is seamlessly intuitive or foolproof to the avid intellectual. For example, comparing politicians, police, and others to doctors leaves a bit to be desired given the unique doctor/patient relationship that may not be fully captured in the punishment context. Some might find that analogizing crime to a social disease is also problematic and might struggle to make the connection between an individual’s reaction to a placebo treatment and society’s reaction to the institution of punishment. But the frustration that comes from trying to perfectly fit an octagon peg into a round hole misses the fact that the shapes are similar enough to make observations that might be shared by both. Sure, it doesn’t fit perfectly, but they are indeed from the same family and the same logic of design.98My apologies to readers for using an analogy (octagon to circle) to explain another analogy (punishment to placebo). Like all analogies, theorizing punishment as a placebo helps us conceptualize and understand similar principles in seemingly unrelated subjects.

The placebo methodology that this Article builds must be judged according to its ability to highlight latent truths about punishment policies. Consequently, this punishment as placebo analogy should be justified because its theoretical and explanatory contributions outweigh its imperfections around the edges.

II. Mass Incarceration as Placebo

The theoretical grounding of placebo punishment policies is perhaps most impactful in how we should reconceptualize the study and discussion of mass incarceration. Although the placebo methodology could be applied to many case studies of different punishment tools,99See infra Part IV. mass incarceration is the “beating heart”100See Evans, supra note 81, at 685. of the criminal punishment system. It is the prison, as an institution, that is at the center of the wider penal imagination and has been imbedded with so much social and cultural meaning as to how we separate society from dangerous “others.”101See Smith, supra note 14, at 57, 59–61 (capturing the prison as the center of “the wider penal imaginary” and as a social and cultural icon at “intersecting discourses on crime, morals, civilization, and the state”). While the national population of incarcerated persons is declining,102The U.S. prison population reached its height in 2010 at 2.3 million people. Ever since, it has plateaued and declined to its present number. This has been in large part a result of progressive decarceration efforts of a few large states and counties, but a total of thirty-nine states have enjoyed incremental decreases in prison populations over the past decade. See Ashley Nellis, Mass Incarceration Trends, The Sent’g Project (May 21, 2024), https://www.sentencingproject.org/reports/mass-incarceration-trends [https://perma.cc/NJ7B-G4M8]. the carceral system still boasts physical control over 1.9 million people.103See Wendy Sawyer & Peter Wagner, Mass Incarceration: The Whole Pie 2023, Prison Pol’y Initiative (Mar. 14, 2023), https://www.prisonpolicy.org/reports/pie2023.html [https://perma.cc/5S2K-HPZZ] (documenting how many people are incarcerated in different conditions, under different governments and circumstances). Nearly 7 million are surveilled under a growing e-carceration and parole population.104See Victoria Law, “Prisons Make Us Safer”: And 20 Other Myths About Mass Incarceration 9 (2021) (estimating that 6.7 million people in the United States are subject to other “forms of supervision includ[ing] house arrest, electronic monitoring, parole, and probation”). And the carceral state extends even further to the experiences of the 113 million individuals who have had close relatives incarcerated at some point in their lives.105Brian Elderbroom, Laura Bennett, Shanna Gong, Felicity Rose & Zoë Towns, Every Second: The Impact of the Incarceration Crisis on America’s Families 10 (2018), https://everysecond.fwd.us/downloads/everysecond.fwd.us.pdf [https://perma.cc/N87T-TVEF] (“[A]pproximately one in two adults (approximately 113 million people) has had an immediate family member incarcerated for at least one night in jail or prison. One in seven adults has had an immediate family member incarcerated for at least one year, and one in 34 adults has had an immediate family member spend 10 years or longer in prison.”) In effect, one-third of Americans have been impacted by the wide and unforgiving reach of mass incarceration.

The placebo methodology as applied to mass incarceration argues that it is best understood as a set of laws and policies meant to control public perception of crime, playing on the subjective emotions of fear, safety, and the ever-elusive ideal of justice. Much has already been written about the failed efficacy of mass incarceration policies to improve public safety,106See infra notes 120–137 and accompanying text; see also Kari Hong, The Absurdity of Crime-Based Deportation, 50 U.C. Davis L. Rev. 2067, 2119–20 (2017) (“It is now widely recognized that mass incarceration has been too costly with respect to long prison sentences, the loss of human capital, the racial disparities in convictions, the financial toll of mass incarceration, and the ineffectual nature of prisons to stop crime.”). but this misses one of the foundational principles of the policy’s placebo: regardless of its actual effects, it still delivers costs and benefits based on how it controls public perception of crime.

This Part builds on the existing mass incarceration literature by discussing whether the benefits of perception are worth the costs of mass incarceration. Section II.A develops the history of mass incarceration through the lens of policies that would assuage public fears, and Section II.B continues by discussing the policies’ ineffectual impacts on public safety. In light of these historical and modern conclusions, Section II.C argues that the placebo methodology more accurately captures the intent and impacts of mass incarceration policies.

A. Research and Development

The history of fear and mass incarceration in the modern era begins with the unprecedented crime wave in the 1960s and 1970s. During these two decades, violent crime rose by 271%, burglary and robbery rose by 231% and 318%, respectively, and similar increases were reported for sex crimes and property crimes.107According to the UCR Data Tool, the violent crime rate was 160.9 reported offenses per 100,000 population in 1960 and 596.6 reported offenses per 100,000 population in 1980. The burglary rate was 508.6 reported offenses per 100,000 population in 1960 and 1,684.1 reported offenses per 100,000 population in 1980. The robbery rate was 60.1 reported offenses per 100,000 population in 1960 and 151.1 reported offenses per 100,000 population in 1980. Michael Schearer, The Armed Career Criminal Act: Imprecise, Indeterminate, and Unconstitutional 3 (Dec. 3, 2015) (unpublished manuscript). See also Lisa L. Miller, The Myth of Mob Rule: Violent Crime and Democratic Politics 104 (2016) (stating that “there is little dispute that violent crime grew dramatically between 1960 and the 1990s and within every state”). This fear of the “other” was further cemented by studies during the 1970s showing that a small number of offenders were responsible for a high proportion of offenses committed.108See, e.g., Robert J. Sampson & L. Ash Smith, Rethinking Criminal Propensity and Character: Cohort Inequalities and the Power of Social Change, 50 Crime & Just. 13, 14 (2021) (citing a 1972 study showing that “just 6 percent of males in a Philadelphia birth cohort committed over 50 percent of all offenses through age 18”); Natalie N. Martinez, YongJei Lee, John E. Eck & SooHyun O, Ravenous Wolves Revisited: A Systematic Review of Offending Concentration, 6 Crime Sci. 1, 1 (2017) (citing similar studies finding a small percentage of offenders are responsible for a large share of criminal activity); Mark A. Peterson, Harriet B. Braiker & Suzanne M. Polich, Doing Crime: A Survey of California Prison Inmates 39–40 (1980) (determining that 10% of incarcerated persons are “criminal specialists” that are responsible for 58% of all armed robberies, 65% of all burglaries, 60% of all motor vehicle thefts, and 46% of all assaults). Further, criminological studies began persuading lawmakers that rehabilitation did not work consistently109See, e.g., Douglas Lipton, Robert Martinson & Judith Wilks, The Effectiveness of Correctional Treatment: A Survey of Treatment Evaluation Studies 53 (1975) (compiling 231 studies over 20 years from multiple jurisdictions and finding that there were no reliable predictors for rehabilitative efficacy in prisons). But see Francis T. Cullen & Karen E. Gilbert, Reaffirming Rehabilitation 2–5 (1982) (finding that rehabilitative tools did work in the prison system when developed and applied in the proper contexts); D.A. Andrews, Ivan Zinger, Robert D. Hoge, James Bonta, Paul Gendreau & Francis T. Cullen, Does Correctional Treatment Work? A Clinically Relevant and Psychologically Informed Meta-Analysis, 28 Criminology 369, 384–86 (1990) (finding that rehabilitative tools did work in the prison system when developed and applied in the proper contexts). and that high levels of recidivism would continue without more incapacitation efforts.110See Kadish et al., supra note 57, at 25 (stating that despite modern evidence that rehabilitative programs worked to reduce recidivism, “the conventional wisdom that ‘nothing works’ had become fixed in the public mind”).

The Nixon administration, for its part, was driven by its own fear of political opposition, namely from recently empowered African Americans after the Civil Rights movement and anti-war “Hippies,” two groups that threatened Nixon in national politics.111See Tom LoBianco, Report: Aide Says Nixon’s War on Drugs Targeted Blacks, Hippies, CNN (Mar. 24, 2016), https://www.cnn.com/2016/03/23/politics/john-ehrlichman-richard-nixon-drug-war-blacks-hippie [https://perma.cc/BR2R-HWDV] (quoting a 1994 interview with John Ehrlichman, Nixon’s domestic policy chief, focusing on anti-war “hippies” and “black people” that sought to disrupt those communities by “arrest[ing] their leaders, raid[ing] their homes, break[ing] up their meetings, and vilify[ing] them night after night on the evening news”). Thus, Nixonian criminal politics was defined by convincing the nation that “the whole problem is really the blacks . . . The key is to devise a system that recognizes this while not appearing to.”112Hinton, supra note 2, at 142 (quoting Nixon’s chief of staff). While there was already a racialized fear of the dangerous “other” imbedded in American culture,113See generally Khalil Gibran Muhammad, The Condemnation of Blackness: Race, Crime, and the Making of Modern Urban America (2010) (tracking the historical roots of the overcriminalization of Black Americans and the association of Blackness with criminality). the rise in crime during the same era as the Civil Rights and anti-war movements prompted an unprecedented fear of crime that was directed towards certain communities.114See Vesla M. Weaver, Frontlash: Race and the Development of Punitive Crime Policy, 21 Stud. Am. Pol. Dev. 230, 230–31 (2007) (recognizing that while the rise of violent crime played an important backdrop, Republicans framed the issue in punitive ways to slow the civil rights momentum of the 1960s and 1970s); see, e.g., David F. Musto, The American Disease: Origins of Narcotic Control 241, 294–96 (3d ed. 1999) (explaining how government officials associated drugs with certain demographics that were seen as being socially deviant and threatening to the social fabric of society such as Blacks, Chinese, Bolsheviks, Hispanics, and others and how fear of the “other” fueled social and criminal drug policy).

By targeting these “others”—groups that were outside of the mainstream social and cultural understandings of American white middle-class identity—Nixon captured the populism of his era. Social scientists have long recognized that the fear of crime became a defining “cultural theme” during this era that called for policies that “aim[ed] to reduce fear levels.”115David Garland, The Culture of Control: Crime and Social Order in Contemporary Society 10 (2001). Empirical criminologists of the time were baffled by these changes. The mass incarceration policies developing before their very eyes had little to do with actual crime control or preventing victimization but were instead driven by fear and myth that traded on racial and cultural stereotypes emerging from the anxieties of suburbanite imagination and political rhetoric.116See Smith, supra note 14, at 5, 86–89 (highlighting the importance of these themes of fear and crime, the racialized aspects of punishment and its connection to American culture, and how different they were from effective crime policy); see also David L. Bazelon, The Hidden Politics of American Criminology, 42 Fed. Prob. 3, 3 (1978) (stating in the late 1970s that “politics is at the heart of American criminology”). And this penal populism of fear has been carefully nurtured as a winning political strategy ever since.117See, e.g., Walker Newell, The Legacy of Nixon, Reagan, and Horton: How the Tough on Crime Movement Enabled a New Regime of Race-Influenced Employment Discrimination, 15 Berkeley J. Afr. Am. L. & Pol’y 3, 16–18 (2013) (discussing Nixon’s and Reagan’s impact on the infusion of criminal law, race, and politics); Barkow, supra note 72, at 6 (discussing George H.W. Bush’s presidential campaign that activated fear and politicized crime by using ads featuring Willie Horton, a Black man, who had recently committed a terrible crime); Harry A. Chernoff, Christopher M. Kelly & John R. Kroger, The Politics of Crime, 33 Harv. J. Legis. 527, 529–30 (1996) (discussing the impacts and the political failure of Clinton’s 1994 Crime Bill); Anne Gearan & Abby Phillip, Clinton Regrets 1996 Remarks on ‘Super-Predators’ After Encounter with Activist, Wash. Post (Feb. 25, 2016), https://www.washingtonpost.com/news/post-politics/wp/2016/02/25/clinton-heckled-by-black-lives-matter-activist [https://perma.cc/NT6E-BNUW] (discussing Hillary Clinton’s rhetoric in the 1990s, referring to young Black offenders as “super predators”). National and local actors alike adopted this tough-on-crime strategy, promising more punitive punishment as a way of promising to reduce fear and anxiety related to crime.118See Michael C. Campbell & Heather Schoenfeld, The Transformation of America’s Penal Order: A Historicized Political Sociology of Punishment, 118 Am. J. Socio. 1375, 1390–97 (2013) (discussing the political synergy between local and state actors supporting a national, party-wide tough-on-crime agenda). Consequently, fear was increasingly used as a justification and catalyst for harsher punishments, and politicians were all too willing to stoke, control, and benefit from these public fears.119See Corradi & Baumer, supra note 7, at 1379 (finding that “a promised reduction in fear and increase in personal safety were frequent claims throughout the [tough-on-crime] period”).

B. Treatment Efficacy

Although controlling public perception and fear of crime was one of the primary drivers of developing mass incarceration policies, their efficacy in reducing crime should not be ignored. The mass incarceration policies of the 1980s and onward have enjoyed association with lower crime rates because crime has generally gone down over the past thirty years.120See Matthew Friedman, Ames C. Grawert & James Cullen, Crime Trends: 1990–2016, Brennan Ctr. for Just. (2017), https://search.issuelab.org/resources/27693/27693.pdf [https://perma.cc/NF8N-B3F9] (measuring falling crime rates from 1991 to 2016 in all major categories). But there is debate among criminologists and economists about the actual correlation between incarceration rates and crime rates.

The weight of analysis tends to agree that there is some correlation between the population of incarcerated persons and the crime rate, but the connection is minimal.121See, e.g., Joan Petersilia, Beyond the Prison Bubble, 268 Nat’l Inst. Just. J. 26, 27 (2011) (“Mass imprisonment has helped reduce crime rates, but most specialists agree that the effects have been considerably smaller than proponents claim . . . .”). In just twenty years, between 1980 and 2000, the incarceration rate exploded by over 300%.122See Growth in Mass Incarceration, The Sent’g Project, https://www.sentencingproject.org/research [https://perma.cc/TM3H-H4L4] (reporting the prison population in 1980 and 2000 at 315,974 and 1,334,170, respectively). And yet, this treatment has yielded marginal utility. For example, Steven Levitt found that increased rates of incarceration in the 1990s were only responsible for 25% of the drop in crime during that time.123Steven D. Levitt, Understanding Why Crime Fell in the 1990s: Four Factors That Explain the Decline and Six That Do Not, 18 J. Econ. Persps. 163, 178–79 (2004) (estimating that as much as 25% of the crime drop during the 1990s came from higher incarceration rates). Don Stemen found that between 1980 and 2000, every 10% increase in the prison population was only responsible for a 2% to 4% decrease in the crime rate.124Don Stemen, The Prison Paradox: More Incarceration Will Not Make Us Safer, Vera Rsch. Advisory Bd. (July 2017), https://www.vera.org/downloads/publications/for-the-record-prison-paradox_02.pdf [https://perma.cc/N3JB-22V4] (finding that between 1980 and 2000, every 10% increase in incarceration rates yielded a 2% to 4% reduction in crime rates). Additionally, many others have come to argue that there is a much lower correlation; they posit that the exploding incarceration rate was only responsible for a 2% to 15% decrease in crime rates.125See, e.g., James Forman, Jr., Locking Up Our Own: Crime and Punishment in Black America 218 (2018) (summarizing criminology literature that credits “[t]he tough on crime movement” and incarceration for lowering the crime rate, although acknowledging other contributing factors); Thom Brooks, Punishment: A Critical Introduction 52 (2d ed. 2021) (summarizing studies that “reveal that the effects of deterrence upon crime rates are at most between about a 2 and 5 per cent decrease in crime following a 10 per cent increase in the prison population” (citations omitted)); Todd R. Clear, The Problem with “Addition by Subtraction”: The Prison-Crime Relationship in Low-Income Communities, in Invisible Punishment: The Collateral Consequences of Mass Imprisonment 183 (Marc Mauer & Meda Chesney-Lind eds., 2002) (finding that low levels of incarceration within a neighborhood increased public safety); Robert J. Sampson, The Incarceration Ledger: Toward a New Era in Assessing Societal Consequences, 10 Criminology & Pub. Pol’y 819, 822 (2011) (estimating incarceration has had a 10 to 15% reduction in crime rates). But even the high watermark of a 25% impact should make us question whether such a use of resources is justified when these resources could be reinvested in programs that have been proven to be far more efficient at lowering crime rates.126There are dozens of such programs that range from early childhood education to drug and mental health courts and a number of things in between. See, e.g., Carrie Pettus-Davis & Matthew W. Epperson, From Mass Incarceration to Smart Decarceration 3, 8 (Am. Acad. of Soc. Work & Soc. Welfare, Working Paper No. 4, 2015) (finding that specialized drug and mental health courts significantly reduce recidivism and a need for incarceration); Lance Lochner & Enrico Moretti, The Effect of Education on Crime: Evidence from Prison Inmates, Arrests, and Self-Reports, 94 Am. Econ. Rev. 155, 160, 183 (2004) (finding that “a 1-percent increase in male high school graduation rates would save as much as $1.4 billion, or about $2,100 per additional male high school graduate.”); Brooks, supra note 125, at 64 (discussing the success of juvenile drug and alcohol treatment and mental health treatment that reduce recidivism); Paula Smith & Myrinda Schweitzer, The Therapeutic Prison, in The American Prison: Imagining a Different Future 4 (Francis T. Cullen, Cheryl Lero Jonson & Mary K. Stohr eds., 2014) (describing the success of a 141-prong instrument to measure rehabilitative qualities of prison programs that reduce recidivism); Kate Weisburd, Rights Violations as Punishment, 111 Calif. L. Rev. 1305, 1314 (2023) (describing over ten incarceration alternatives, such as specialty courts, electronic monitoring, diversion programs, religious programs, and others).

Another group of scholars refutes the above by arguing that there is no statistically significant correlation between the increase in the population of incarcerated persons and the decrease in crime.127See, e.g., John E. Eck & Emily B. Eck, Crime Place and Pollution: Expanding Crime Reduction Options Through a Regulatory Approach, 11 Criminology & Pub. Pol’y 281, 282 (2012) (“After a decade of enquiry, for example, researchers cannot confidently attribute the dramatic decline in U.S. crime during the 1990s to any government policy: police hiring, police practices, incarceration policies, or other criminal justice strategies.”). Starting in the 1990s, the National Criminal Justice Commission found that there is “little or no correlation between rates of crime and the number of people in prison.”128See Steven R. Donziger, The Real War on Crime: The Report of the National Criminal Justice Commission 42 (1996) (summarizing National Criminal Justice Commission findings). Twenty years later, during a time when the incarcerated population reached its height,129See supra note 102 and accompanying text, indicating that the population of incarcerated persons reached its recorded height in 2010. Jeffrey Fagan and Tracey Mears found that increasing the number of people incarcerated resulted in “stable if not higher levels of crime.” They decried the lack of commensurate public safety benefit for the ever-increasing rates of incarceration.130Jeffrey Fagan & Tracey L. Meares, Punishment, Deterrence and Social Control: The Paradox of Punishment in Minority Communities, 6 Ohio St. J. Crim. L. 173, 176 (2008).

A smaller group of scholars have come to even starker conclusions, arguing that mass incarceration has had negative impacts on public safety, causing a criminogenic effect. Don Stemen found that when incarceration rates increase past 325 to 492 inmates per 100,000 people (of which many states have far surpassed), crime rates begin to rise.131Don Stemen, Reconsidering Incarceration: New Directions for Reducing Crime, Vera Inst. of Just. 7 (Jan. 2007), https://www.vera.org/publications/reconsidering-incarceration-new-directions-for-reducing-crime [https://perma.cc/FPW8-NJJG] (calling the point at which incarceration rates start to yield criminogenic effects an “inflection point”). Francis Cullen, Cheryl Jonson, and Daniel Nagin performed a systematic review of multiple meta-analyses of the impacts that incarceration has on crime rates and reported that in the most compelling studies, incarceration was not associated with any deterrent effects but instead increased recidivism rates anywhere from 7 to 14%.132Francis T. Cullen, Cheryl Lero Jonson & Daniel S. Nagin, Prisons Do Not Reduce Recidivism: The High Cost of Ignoring Science, 91 Prison J. 48S, 54S–58S (2011) (reviewing several studies that separately found custodial incarceration increased crime rates). These authors have linked this data to a number of potential explanations since incarcerating large numbers of people can depress economies, threaten social network formation, and politically disenfranchise communities, which can then lead to criminal behavior.133See Evans, supra note 81, at 708–14. See also Stephen J. Schulhofer, Tom R. Tyler & Aziz Z. Huq, American Policing at a Crossroads: Unsustainable Policies and the Procedural Justice Alternative, 101 J. Crim. L. & Criminology 335, 336 (2011) (“Through its criminogenic impact, imprisonment has cross-cutting effects for the wider population, promising safety through deterrence at the same time as it increases victimization at the hands of former inmates.”).

On the other end of the spectrum, there are scholars that have defended the status quo, arguing that mass incarceration policies in the 1990s were causally related to lower crime rates. This literature is most associated with the harshest criminal sentencing policies, such as the three strikes laws that went into effect during that time.134See, e.g., Bill Jones, Why the Three Strikes Law Is Working in California, 11 Stan. L. & Pol’y Rev. 23, 24–25 (1999) (claiming there were sharp declines in crime from 1994–1999, which arguably could only be explained by the three strikes law that went into effect at that time); Eric Helland & Alexander Tabarrok, Does Three Strikes Deter?: A Nonparametric Estimation, 42 J. Hum. Res. 309, 326–28 (2007) (finding a deterrence effect of three strikes laws on second strike offenders, concentrated among violent offenders). But see Walter L. Gordon III, California’s Three Strikes Law: Tyranny of the Majority, 20 Whittier L. Rev. 577, 587–88 (1999) (finding that three strikes laws had marginal impact on crime in California). But even among these scholars, there was growing unease about the continued growth and marginal impacts of the carceral state. The intellectual and empirical journey of John DiIulio, Jr. illustrates this point. In 1996, he argued that prisons were a bargain since locking up a person for “about $25,000” per year in the prison system saved society from the potential murder and mayhem he or she would otherwise be committing on the streets.135John J. DiIulio, Jr., Prisons are a Bargain, by Any Measure, Brookings (Jan. 16, 1996), https://www.brookings.edu/articles/prisons-are-a-bargain-by-any-measure [https://perma.cc/3JU5-LS8E]. As a Democrat, he channeled bipartisan fears in the 1990s, stating that “a wave of young, violent, mostly minority, remorseless juvenile delinquents, known as super-predators would plague the country and increase crime rates” without harsh incapacitation measures.136See Matt Delisi, Brendan D. Dooley & Kevin M. Beaver, Super-Predators Revisited, Criminology Rsch. Focus 21, 21 (2007). Yet only a few years later in 1999, he realized that mass incarceration had reached the limits of its utility. He argued that locking up more people would not have any further public safety benefit and that it was time to shift the penal focus to drug treatment and effective parole programs.137See John J. DiIulio, Jr., Two Million Prisoners Are Enough, Wall St. J. (Mar. 12, 1999, 12:37 AM), https://www.wsj.com/articles/SB921187476975066509 [https://web.archive.org/web/20201024103321/https://www.wsj.com/articles/SB921187476975066509]; see also The Superpredator Myth, 25 Years Later, Equal Just. Initiative (Apr. 7, 2014), https://eji.org/news/superpredator-myth-20-years-later [https://perma.cc/6YYA-KALF] (discussing DiIulio’s participation in an amicus brief in 2012 stating that predictions of superpredator recidivists were unfounded). Unfortunately, politicians benefiting from mass incarceration were not so keen to heed his advice.

These seemingly conflicting streams of data can be best harmonized with a general model of marginal utility across four stages.138I use the term “general model” here because this Article is not embarking on its own empirical project that analyzes an original data set regarding incarceration rates and their impact on violent crime and property crime. Instead, it interprets others’ data in a way that generalizes the findings. At the first stage, studies have shown that incarceration is most effective as a deterrent and incapacitation tool when the crime rate is high.139See Rucker Johnson & Steven Raphael, How Much Crime Reduction Does the Marginal Prisoner Buy?, 55 J.L. & Econ. 275, 300–02 (2012) (finding that between 1978 and 1990, each additional prison year (for example, locking one more person up for one more year) prevented 2.5 violent crimes and 11.4 property crimes; between 1991 and 2004, however, those numbers fell to 0.3 violent crimes and 2.7 property crimes). For every unit of punishment, you get a higher payoff in crime reduction. At the second stage, punishment suffers from the law of diminishing returns, in which every unit of punishment still achieves a measure of crime reduction but much less than the previous stage.140See William J. Stuntz, The Collapse of American Criminal Justice 245 (2011) (reviewing deterrence literature and concluding that “[i]f punishment deters crime, we seem to be getting much less deterrent bang for the imprisonment buck than we once did”). At the third stage, the crime rate levels off, during which every unit of punishment does not achieve any payoff in crime reduction.141See David Roodman, The Impacts of Incarceration on Crime, Open Philanthropy (Sept. 2017), https://www.openphilanthropy.org/files/Focus_Areas/Criminal_Justice_Reform/The_impacts_of_incarceration_on_crime_10.pdf [https://perma.cc/4VGL-ZYSB] (estimating that the impact of incarceration on crime in the US today is zero). At the fourth stage, there is an inflection point at which punishing offenders actually increases the crime rate.142See Wesley Vaughn, Opinion, Does Putting More People in Prison Reduce Crime? Maybe Not Anymore: Opinion, AL.com (Sept. 15, 2014, 2:19 PM ), https://www.al.com/opinion/2014/09/does_putting_more_people_in_pr.html [https://perma.cc/84DJ-28SN] (reviewing Pew research and interviewing experts to conclude that “as prison populations continue to grow, the benefit of incarceration declines and reverses, and you even see crime increase. That seems to [the author] to be where we are now”).

Like many medical treatments, law and policy can have similar diminishing returns over time as social problems and disease adapt in the same way that all organisms adapt and evolve in the physical and social body. As a result, a treatment program must be adaptive to long-term illnesses and should be administered differently in different phases.

These statistical studies, cost-benefit analyses, and other tools of administrative expertise have been abandoned in the criminal punishment regime.143See Aaron Littman, Free-World Law Behind Bars, 131 Yale L.J. 1385, 1438 (2022) (stating that in the policy area of incarceration and incarcerated persons’ rights, “costs and benefits are not weighed, and alternatives are not assessed, either by courts considering constitutional claims or even necessarily by carceral agencies during their internal rulemaking processes” (citations omitted)). See generally Justin Driver & Emma Kaufman, The Incoherence of Prison Law, 135 Harv. L. Rev. 515 (2021) (documenting the inconsistencies and lack of regulatory analysis by courts and administrative agencies of prison conditions and prisoners’ rights). There are decades of data to which this Article cannot do justice that question and prove the inefficacy of mass incarceration policies to improve public safety. Thus, a policy that fails to track and account for actual impacts on public safety should be understood as prioritizing the placebo methodology’s focus on tracking and accounting for public perception of crime, which is all too vulnerable to political power, abuse, and perverse incentives.

C. Placebo Responses

To summarize, mass incarceration policies do not deliver on their public safety promises and were never solely designed to do so. Out of a culture of fear, myth, and superstition, our society decided to pivot from careful, rehabilitative carceral efforts to a mass incapacitation effort to satisfy collective retributive cultural morality and expressive condemnation of the “others” who we feared.144See Aliza Hochman Bloom, Reviving Rehabilitation as a Decarceral Tool, 101 Wash. U. L. Rev. 1989, 1997–99 (discussing the dominant rehabilitative goals of criminal punishment before the 1970s). We now benefit from thirty years of data that shows that mass incarceration policies are no longer (and may never have been) effective at lowering crime rates. Yet we still choose to punish harshly and ineffectively. This Article concludes that modern punishment can no longer be justified under the veneer of public safety. Rather, it is motivated by controlling public perception and fear of crime in a way that subjugates entire communities to the benefit of those in power. This Section further cements the data connecting medical and social placebos in the punishment context. First, placebos enjoy the largest impacts on patient outcomes when the patient is experiencing the highest amount of symptoms. For example, placebos deliver the highest amount of pain relief when the patient is experiencing the most amount of pain.145See Price & Fields, supra note 89, at 118. This makes intuitive sense; when somebody is experiencing pain, their main concern is finding something to subside that pain, so they are more susceptible to and even desperate for any treatment that a trusted doctor tells them will provide relief. The subjective aspect of pain means that the placebo’s effects are judged in relation to the level of pain the patient is suffering. The higher the pain, the more the placebo relieves.146See id. The very nature of placebos means that they do not deliver an objective and consistent level of psychological and therapeutic benefit; it is all relative to the patient’s perception of their problem.147See supra notes 107–110 and accompanying text; see also Aviram, supra note 11, at 78 (“Placebo effects are most visible, and most conveniently illustrated, in cases of widespread panics.”).

This finding also makes intuitive sense when considering the placebo methodology approach to punishment. Public support for mass incarceration policies was highest when the “disease” of crime had the most crippling impacts on public fear. Data shows that public support of harsh tough-on-crime policies was highest from the 1970s through the 1990s but has declined as of the late 2000s.148See Peter K. Enns, The Public’s Increasing Punitiveness and Its Influence on Mass Incarceration in the United States, 58 Am. J. Pol. Sci. 857, 861–64 (2014) (showing trend patterns of Americans’ attitudes towards harsh criminal justice policies increasing from the 1970s to the 1990s but starting to decrease and level off in the late 2000s). Criminologist Lisa Miller has documented this by studying public perception of crime and concluded that politicians’ ability to manipulate public perception of crime for political gain is highest when violent crime rates are high; this power of perception sharply declines when violent crime rates are lower.149See generally Miller, supra note 107. To simplify, the public enjoys a higher positive reaction to the placebo treatment of mass incarceration when its fear of crime is at its highest. As the disease subsides, so does the effectiveness of the placebo.

Second, placebos also share in the law of diminishing returns. This is described as a “placebo sag” in the medical literature to indicate that there is a danger of treatment complacency.150See Boozang, supra note 15, at 719 (describing how placebos lose their impact over time based on a patient’s past experience); Bennett Foddy, Justifying Deceptive Placebos, in Placebo Talks: Modern Perspectives on Placebos in Society 52, 63 (Amir Raz & Cory Harris eds., 2015) (“Another reasonable objection against the clinical placebo is that, if the use of placebo becomes too widespread, its effectiveness will diminish . . . .”). Although patients may receive tremendous therapeutic benefit from Placebo A, the benefit wanes over time as patient perceptions of what they believe to be an efficacious treatment continues to decline. It is an understandable psychological cycle if a patient perceives Placebo A as not having the same effect as it did a month ago; thus, their future expectations based on their own experience contribute to the sag. Continuing to prescribe Placebo A will not deceive patients forever—or society for that matter.

The support for mass incarceration has also started to sag. Indeed, this goes a long way in explaining recent movements for criminal justice reform;151See Press Release, ACLU, 91 Percent of Americans Support Criminal Justice Reform, ACLU Polling Finds (Nov. 16, 2017), https://www.aclu.org/press-releases/91-percent-americans-support-criminal-justice-reform-aclu-polling-finds [https://perma.cc/UJM7-47BF] (finding that 91% of Americans “say that the criminal justice system has problems that need fixing” and 71% “say it is important to reduce the prison population in America”). after over thirty years of mass incarceration policies, the public is starting to realize that the placebo is losing some of its luster. There has been a steady drumbeat toward reform, but this must be tempered with continued fluctuation in public perception of crime. When the public is confronted with political and media messaging that suggests a spike in crime, public support for harsh criminal punishments returns in certain segments of the social body.152See Megan Brenan, Americans More Critical of U.S. Criminal Justice System, Gallup (Nov. 16, 2023), https://news.gallup.com/poll/544439/americans-critical-criminal-justice-system.aspx [https://perma.cc/G328-UMX8] (finding in 2023 that 58% of Americans do not think the criminal justice system is harsh enough, up sharply since 2020). This finding of an increase of people supporting tougher crime policies tracks the small spike in crime that happened after the COVID-19 lockdowns ended in 2020–2021. This ever-changing landscape of public perception—and the powerful harbingers of doom that continue to press these “fear” buttons—is best understood as a placebo method of controlling public perception to maximize political gain.

Finally, perhaps the most consequential aspect of placebo treatments is that placebos can indirectly have a negative impact on a patient’s health by giving them a false sense of healing. When a patient takes a placebo treatment, three things can happen regarding the patient’s actual physical health. First, the placebo makes the patient feel better, which has a positive impact on the body’s ability to physiologically fight the disease and the patient actually gets better. Second, the placebo has some effect on the patient’s feelings but has no impact on the body; in this scenario, the disease is allowed to run its natural course and may result in the patient’s natural immune system fighting off the disease and the patient improving. Third, take the same scenario, but the disease runs its natural course, resulting in the patient getting worse.153See Jopling, supra note 22, at 122 (discussing the importance of three research arm studies to measure the impact of placebos, the active drug, and the natural progression of the disease). As a result, placebos can indeed be dangerous depending on the seriousness of the affliction. All the while, the patient believes they are receiving an efficacious treatment and forgoes seeking other treatments that might be more effective.

This third scenario has important ramifications for the status quo and how we chart future treatments for the social problem of crime. If we are indeed in an era in which mass incarceration has a criminogenic effect,154See Evans, supra note 81, at 708–14. then the placebo is truly lulling society into a false sense of feeling better. Because mass incarceration policies operate in the modern era primarily as a placebo, this comes at the expense of the disease of crime being permitted to run its natural course and make us all worse off than we would otherwise be under a different punishment regime.

III.  Socio-Medical Ethics and Justifications

The study, theory, and practice of punishment can benefit from the same reflection that placebos have sparked in medicine, but the synergies between these fields still spark questions of ethics and justifications. This Part builds on this theme by applying considerations of socio-medical ethics to frame and answer whether placebos in the punishment sphere can be justified. Like medicine, these answers are nuanced and context specific.155See Annoni, supra note 91, at 470 (arguing against categorical bans of placebos in the medical field and instead focusing on the particular contexts in which the ethics and harm of placebos can be mitigated). There are indeed a number of different ethical justifications to consider, but this Part focuses on the issues that carry the most insight for future discussion inside the punishment literature. This Part also focuses on perhaps the most important question of punishment theory and answers in the negative: Is punishment justified under the placebo methodology?

Section III.A considers perhaps the most important question in the placebo methodology, which is the harm principle of punishment when considered against the “do no harm” principle of medicine. These different approaches are important when considering the harm and social costs that punishment wreaks across entire communities. Section III.B explores the important ethical differences between the doctor-patient and politician-constituent power dynamics. Benevolent deception and medical expertise are at the heart of the doctor-patient placebo treatment schedule, but such benevolence and policy expertise are missing from the politician-constituent power dynamic. Section III.C discusses the ethics of experimentation with placebo research toward finding efficacious treatments. This contributes to how we might view the dark past of experimenting with harsh punishments and informs us towards a more ethical future. Section III.D covers the economics of placebos and their continued popularity and use in the medical field. Just as economic markets have a way of shaping how placebos are prescribed by doctors and perceived by patients, so too can the economics of punishment shape our social and cultural understandings in ways that can lead toward a different punishment regime. In turn, each vignette also considers policy solutions that seek to remedy the ethical and practical problems of punishment placebos and their overreliance on controlling and even manipulating public perception.

The discussion and solutions proposed throughout each Section are not magical or mystical cures that can solve all of the many problems and social harms of mass incarceration. These realities and strategies of punishment reform—which are unique to placebo understandings of punishment—are meant to mitigate and not propagate. The most important concern is whether these discussions and solutions themselves become placebos, proposed and advocated by a school of scholars as a way of assuring and placating more revolutionary thinkers away from pursuing transformational work.156See Paul Butler, The System Is Working the Way It Is Supposed to: The Limits of Criminal Justice Reform, 104 Geo. L.J. 1419, 1466 (2016) (criticizing “ratchets” of incremental criminal legal reform “because they placate and take energy and focus away from the actual transformative work”). Getting closer to equitable justice is worthwhile, and trading among lesser evils is often the difficult choice scholars and policymakers must pursue to achieve incremental progress that is transformative in scope.157See John F. Pfaff, Locked In: The True Causes of Mass Incarceration—and How to Achieve Real Reform 186 (2017) (“We can’t go from soaring prisons one day to emptying them of the most serious offenders the next. Progress is incremental, and a reform movement that races ahead of itself could end up foundering as a result.”).

A. Placebos as Harm

Although this Article focuses on the synergies between the medical field of placebos and the policy design of mass incarceration, there are important differences that shed light on the theoretical and practical framing of punishment. Perhaps the biggest shortcoming of the placebo methodology of punishment is the difference between how these fields view harm.158See Aviram, supra note 11, at 58 (discussing this difference between medical and legal placebos). By recognizing these shortcomings, this Section seeks to further refine and tailor the placebo methodology to the specific attributes of the punishment context.

The medical field’s approach to “do no harm” is an important foundational ethic upon which the entire institution is built. This principle traces back to the Hippocratic Oath159See Stavros A. Antoniou, George A. Antoniou, Frank A. Granderath, Anna Mavroforou, Athanasios D. Giannoukas & Athanasios I. Antoniou, Reflections of the Hippocratic Oath in Modern Medicine, 34 World J. Surgery 3075, 3075–77 (2010) (reflecting on modern practices of the Hippocratic Oath). and undergirds the purpose of the entire medical field. This is of prime importance when applied to placebo treatments. Placebos, by definition, must be either inert or have active ingredients that will not harm the patient.160See Veronica de Jong & Amir Raz, Active Expectations: Insights on the Prescription of Sub-Therapeutic Doses of Antidepressants for Depression, in Placebo Talks: Modern Perspectives on Placebos in Society 33, 33 (Amir Raz & Cory Harris eds., 2015) (explaining the differences between pure and impure placebos that differ based on whether there are active pharmaceutical ingredients in the treatment). At best, they may help the patient; at worst, they will do no harm.161See Orsini & Saurette, supra note 72, at 252 (discussing the difference between medical and political placebos). But see Annoni, supra note 91, at 467 (noting that even placebos are not always inert and can also have the negative impact of inducing “psychological addiction”).

The opposite is true of the punishment field, which is specifically designed to impose harm on the criminal offender.162See H.L.A. Hart, Punishment And Responsibility 4–5 (1968); Joel Feinberg, Doing And Deserving 98 (1970); John Rawls, Collected Papers 26 (Samuel Freeman ed., 1999). This harm has come in many forms throughout history,163See Rob Canton, Why Punish? An Introduction to the Philosophy of Punishment 16 (2017) (outlining various means of punishment throughout history that philosophers had to justify through their theories of punishment); Richard A. Posner, An Economic Theory of the Criminal Law, 85 Colum. L. Rev. 1193, 1211–12 (1985) (outlining a litany of medieval and cultural punishment practices that viewed punishment as an economic tool to help society reach optimal deterrence and that justified the severity of punishment as compensation for law enforcement inefficiency). and modern criminal punishment continues to take away some aspect of the offender’s liberty by exerting government control over the offender’s body, including incarceration, e-carceration, and parole.164See David Gray, Punishment as Suffering, 63 Vand. L. Rev. 1617, 1624–26 (2010) (defending an objective view of punishment as intending to impose suffering or harsh treatment, no matter the subjective experience of the offender); John Bronsteen, Christopher Buccafusco & Jonathan Masur, Happiness and Punishment, 76 U. Chi. L. Rev. 1037, 1037 (2009) (“When the state punishes a criminal, it inflicts suffering.”). Capital punishment, of course, imposes the ultimate harm upon the offender by ending their life. This is not merely an accidental byproduct; it is the intended purpose of punishment.

This requires at least two analyses that can be bifurcated into theoretical harm and practical harm, both of which are important to answer whether these harms of punishment might be justified under the placebo methodology. On the theoretical side, we must remember the conceptual framework outlined in Part I. If society is like the body, and crime is like a disease, then treating the disease benefits the body at the expense of the disease. If punishment were effective, it would serve the same purpose as medicine by treating and getting rid of the disease of crime to the benefit of society. This becomes more problematic when this social disease is being directly caused by humans in society. As discussed above, this need not require inhumane treatment to punish and/or rehabilitate them. Thus, punishment is intended to impose some level of accountability on the offender just as medicine is intended to treat infirmities and the body of society benefits.

Under this theoretical treatment, the placebo policies of punishment become problematic because punishment is used to deliver harm to offenders regardless of any actual benefit to society. The punishment placebo would not merely be inert as in the medical context but would be delivering harm to a large segment of society—primarily poor people of color165See infra notes 169–177 and accompanying text. —for the mere psychological or therapeutic benefit of everybody else and for the political benefit of the powerful. Delivering this level of theoretical harm would not be justified under utilitarian or deontological justifications. The utilitarian might be persuaded, but ultimately must consider the costs and benefits of the policy to understand the greater good. Here, placebo policies are pitting the minimal benefits of manipulating public perception against the social costs of imposing harm on millions of people and tens of millions of families.166See supra notes 103–105 and accompanying text. The level of harm hardly seems justified according to the minimal benefits and the perverse political incentives behind it. Kantian deontologists would also oppose a placebo justification, since this school of thought rejects using a person as some means to achieve a broader social goal.167See Immanuel Kant, The Metaphysics of Morals, in The Cambridge Edition of the Works of Immanuel Kant: Practical Philosophy 353, 429 (Mary J. Gregor ed. and trans., 1st ed. 1996) (articulating that a person as a moral individual is an end in and of themselves, and should not be treated merely as a means); Annoni, supra note 91, at 468 (explaining Kantian ethics in the placebo context). But modern retributivists may still justify a placebo punishment if it indeed makes society feel that moral justice has been paid to the offender.168See Kadish et al., supra note 57, at 33–37 (cataloging different variations of retributivism); Barkow, supra note 72, at 3 (admitting that retributivists may still justify such a system that makes them feel better even with little consequentialist benefit).

On the practical side, the placebo of punishment policies results in actual harm being visited upon entire communities that face the brunt of mass incarceration, which adds further consideration to the utilitarian balancing above. It is not enough to recognize the tremendous harm done to the individual offender during and after their time incarcerated, but these harms extend to their communities as underappreciated externalities.

Mass incarceration policies have devastated economic growth in these communities.169See Evans, supra note 81, at 708–09 (explaining negative economic externalities of mass incarceration). Working-age men and boys are often the most targeted due to their involvement with criminal behavior; when these communities are hollowed by the incarceration of these men, small and large businesses alike are less likely to invest and survive in these communities.170See supra note 79 and accompanying text. And even when incarcerated persons are on parole or get out of prison, they face an uphill battle when finding a job and are often paid less than their non-offender competition.171See Adam Looney & Nicholas Turner, Brookings Inst., Work and Opportunity Before and After Incarceration 1, 4 (2018), https://www.brookings.edu/wp-content/uploads/2018/03/es_20180314_looneyincarceration_final.pdf [https://perma.cc/XH5U-X7NF] (describing the difficulties in finding employment, as well as the lack of educational or training programs); James Kilgore, Progress or More of the Same? Electronic Monitoring and Parole in the Age of Mass Incarceration, 21 Critical Criminology 123, 130–31 (2013) (discussing the difficulty of people on parole finding jobs if they have a criminal record, and how electronic monitoring and other restrictive conditions of release limit a person’s ability to go to interviews or respond to employment opportunities).

Social networks and family formation also suffer objectively negative outcomes from mass incarceration. In heterosexual relationships, it becomes harder for women to find suitable mates if many potential options are incarcerated or have difficulty assimilating back into society after being incarcerated.172See Evans, supra note 81, at 709–10 (explaining negative family formation dynamics in heterosexual and LGBTQ+ romantic relationships); Joyce A. Arditti, Families and Incarceration: An Ecological Approach, 86 Fams. Soc’y: J. Contemp. Soc. Servs. 251, 254 (2005) (discussing “prison widowhood” as an often-ignored social status). Incarceration also leads to the breakdown of strong family dynamics, since so many incarcerated persons are held in places that are geographically far away and thus prevent in-person visits from their family. In addition, the exploitative prison-phone industry creates cost prohibitive conditions for many poor families to stay in touch over the phone.173See Peter Wagner & Wanda Bertram, State of Phone Justice 2022: The Problem, the Progress, and What’s Next, Prison Pol’y Initiative (Dec. 2022), https://www.prisonpolicy.org/phones/state_of_phone_justice_2022.html [https://perma.cc/5S2K-HPZZ] (describing high costs of phone calls for incarcerated persons to keep in touch with their family). Also, many incarcerated persons are parents, which has negative behavioral and educational impacts on their children who grow up without them.174See Sara Wakefield & Christopher Uggen, Incarceration and Stratification, 36 Ann. Rev. Socio. 387, 398 (2010) (estimating that “52% of state prison inmates and 63% of federal inmates are parents” and that “[a]n estimated 2.2 million children (about 3% of the total population under 18 in the United States) currently have a parent incarcerated”); Sara Wakefield & Christopher Wildeman, Mass Imprisonment and Racial Disparities in Childhood Behavioral Problems, 10 Criminology & Pub. Pol’y 793, 794–96 (2011) (discussing how a father’s incarceration produces harmful effects on children’s behavioral and mental health); Bruce Western & Christopher Muller, Mass Incarceration, Macrosociology, and the Poor, 647 Annals Am. Acad. Pol. & Soc. Sci. 166, 172 (2013) (summarizing studies showing higher levels of aggressive behavior, depressive symptoms, and reduced academic achievement among children whose parents have been incarcerated); Cynthia C. Harper & Sara S. McLanahan, Father Absence and Youth Incarceration, 14 J. Res. On Adolescence 369, 388 (2004) (finding elevated incarceration rates for the national male cohort in fatherless households).

There are also tremendous negative political impacts on these communities. Voting-age incarcerated persons are not able to vote during their incarceration. In some jurisdictions, these persons are permanently disenfranchised even after their incarceration.175See Disenfranchisement Laws, Brennan Ctr. for Just., https://www.brennancenter.org/issues/ensure-every-american-can-vote/voting-rights-restoration/disenfranchisement-laws [https://perma.cc/2LX5-KH8D] (giving a visual representation of states and their approach to disenfranchising offenders with criminal convictions). Not only does this have measurable impact on elections, but it also contributes to the individual offender’s sense of self as a nonpolitical actor. Political scientists and sociologists have shown how affected communities have developed a sense of isolationism from civic discourse.176See Monica C. Bell, Police Reform and the Dismantling of Legal Estrangement, 126 Yale L.J. 2054, 2085–88 (2017) (discussing legal estrangement and how it contributes to a better understanding of the literature of law enforcement legitimacy); Todd R. Clear & Dina R. Rose, Individual Sentencing Practices and Aggregate Social Problems, in Crime Control and Social Justice: The Delicate Balance 27, 42 (Darnell F. Hawkins, Samuel L. Myers, Jr. & Randolph N. Stone eds., 2003) (describing a kind of “social isolation” from the state where “residents in disadvantaged communities become more disenchanted” and “more removed from the civic community”). This impacts the politician-constituent relationship and has served to undermine the legitimacy of the criminal legal system as a whole in these communities.177See Pfaff, supra note 157, at 10–11 (considering a host of incarceration costs and the difficulty in measuring them); Zachary Hoskins, Beyond Punishment? A Normative Account of the Collateral Legal Consequences of Conviction 4–5 (2019). Further, as explained above, mass incarceration can have a criminogenic effect if it contributes to community perceptions of illegitimacy that following the rule of law has little benefit.178See generally Tommie Shelby, Dark Ghettos: Injustice, Dissent, And Reform (2016) (describing the phenomena among people’s failure to obey the law as a result of having to live under unjust conditions); Canton, supra note 163, at 28 (recognizing the importance of legitimacy in the context of punishment’s role in maintaining social order).

This short summary of actual harm caused by the placebo of mass incarceration policies cannot be justified under any view other than those that recognize mass incarceration’s intent to maintain political power and use that power to subjugate communities.179See Dorothy E. Roberts, Abolition Constitutionalism, 133 Harv. L. Rev. 1, 4 (2019) (arguing that “[c]riminal punishment has been instrumental in reinstating the subjugated status of [B]lack people”); Angela Y. Davis, Abolition Democracy 35–37 (2005) (connecting the foundations of the PIC with the persistence of racism). If the goal is to make the streets safer, that goal has failed. If the goal is to maintain existing power dynamics, then placebos in medical and punishment contexts are quite effective at controlling perceptions of crime and disease and cementing the doctor and politician as the conduit through which things will be perceived as getting “better.”

Perhaps Vincent Chiao said it best: “To rely on criminal punishment solely . . . to make other people feel safer, even when doing so does not make them actually safer” is not justified because it is hard to see how these people’s subjective feelings “could be sufficiently important to justify imposing such serious costs on others.”180See Vincent Chiao, Criminal Law in the Age of the Administrative State 94 (2018).

B. Deception Versus Consent

Placebos also introduce the ethical dilemma in medical treatment of utilitarian notions of deception, which is all too relevant to the punishment policies of the modern era. In the broader social context, lying, fraud, and deception are viewed as unacceptable social behaviors that can emotionally hurt and financially injure a victim.181See Boozang, supra note 15, at 724–34 (analyzing the moral acceptance and justifications for lying). But like most social mores, there are exceptions to this general rule that might be applicable to the placebo punishment context. For instance, intentionally lying might be justified if it produces beneficial results and emotions or even serves as a lesser evil to avoid more harm.182See Jopling, supra note 22, at 236–37 (outlining the utilitarian approach of placebo ethics). Indeed, we paternalistically deceive our children;183Intentionally using myth and caricatures are accepted parts of modern parenting, such as deceiving our children about the existence of Santa Claus or the Tooth Fairy. We often use these benevolent deceptions as ways of teaching our children important lessons or incentivizing good behavior. we might sugarcoat the truth to shield the feelings of a spouse or loved one; and even in the cold world of legal ethics, it is ethical to intentionally withhold information from a client for their benefit.184See Model Rules of Pro. Conduct r. 1.4 cmt. 7 (Am. Bar Ass’n 2023) (deeming it ethical to withhold information from a client for a reasonable amount of time if immediate transmission might cause the client to act imprudently).

There are at least three ethical considerations that, when considered together, might be used to justify placebo treatments in the medical field that are found lacking in the context of punishment policies. The first considers the expertise of the person in power. In the medical field, placebo practitioners are medical experts who can correctly dose and administer placebos as a treatment specialized for each individual patient.185See Orsini & Saurette, supra note 72, at 251 (criticizing the desire for a one-to-one analogy between political and medical placebos). Doctors prescribe placebos because they often follow the science showing how effective they are in assuaging subjective patient ailments such as pain, depression, and other complaints.186See id. Indeed, it is this very expertise, built on years of experience and advanced studies, that supports any potential deception. The only reason the doctor knows such a treatment will work is because they have likely used these placebos in the past to provide therapeutic treatment and have tracked the progress of past patients in conjunction with studying the scientific literature.

To illustrate the importance of expertise and how it implicates trust, contrast the following situations: first, a doctor prescribes a placebo to a patient; second, a person pretending to be a doctor prescribes a placebo to a patient. Deception is taking place in both scenarios, but most would admit to being more comfortable with the former. If a doctor prescribes a placebo, there is a certain level of trust on the part of the patient toward the doctor that the doctor knows what they are doing; a patient may not like the doctor’s decision to prescribe a placebo, but many would feel comfortable trusting the doctor’s experience. In the latter situation, the ultimate medical result might be the same, but many would still be uncomfortable since the fake doctor has no expertise whatsoever. The patient received a placebo in both situations but would no longer have the same trust and understanding of the treatment in the hands of a fraud. Even if the patient experienced a positive placebo effect in both situations, the expertise and trust in the doctor in the first situation seems more justified than the deception and lack of expertise in the second situation.

In the punishment context, there is a much looser sense of expertise from our legislators and executive actors who are prescribing and delivering the treatment of punishment and mass incarceration to society.187See id. Politicians are not experts and many are not even former practitioners of criminal policy and punishment.188Barkow, supra note 72, at 111 (identifying that “most politicians have no expertise or training in criminal justice policy”). They are lawyers, businesspeople, career public servants, and the like that bring generalist viewpoints to a host of different issues. Rachel Barkow opens her book Prisoners of Politics with the stark statement that “[w]e do not rely on experts or use studies and rational assessment to minimize crime” but instead base criminal policy “on emotions and the gut reactions of laypeople.”189Id. at 1; see also Darryl Brown, History’s Challenge to Criminal Law Theory, 3 Crim. L. & Phil. 271, 283 (2009) (recognizing that criminal law is unique because unlike other areas such as evidence, commercial law, or procedural law that are the product of specialized commissions operating within legislative oversight, criminal law is largely the product of the democratic political process); Emile Durkheim, The Division of Labor in Society 44 (Steven Lukes ed., W.D. Halls trans., Palgrave Macmillan 1984) (1893) (arguing that punishment constitutes a collective emotional response). This is a far cry from nearly every other consequential policy area, including public health, the environment, financial institutions, and other complex social issues.190See Sonja B. Starr, On the Role of Cost-Benefit Analysis in Criminal Justice Policy: A Response to The Imprisoner’s Dilemma, 98 Iowa L. Rev. Bull. 97, 99 (2013) (“Regulatory [cost-benefit analysis] is now a well-established feature of the administrative state, and it is perhaps curious that nothing like it has ever been incorporated into the carceral state. Incarceration, after all, is one of the most profound exercises of state authority.”). Instead, political incentives, penal populism, and fear of the “other” all rule supreme in crime policy.191See id.

Practitioners like police and prosecutors are a bit more mixed. There are still many who subscribe to outdated and disproved methods such as the broken-windows theory,192See Daniel T. O’Brien, Chelsea Farrell & Brandon C. Welsh, Looking Through Broken Windows: The Impact of Neighborhood Disorder on Aggression and Fear of Crime Is an Artifact of Research Design, 129 Ann. Rev. Criminology 53, 64–68 (2019) (finding through a meta-analysis of nearly 300 studies that the theory was based on a flawed reading of the data). predictive policing,193See Andrew Guthrie Ferguson, Policing Predictive Policing, 94 Wash. U. L. Rev. 1109, 1114–15 (2017) (arguing for careful regulation and oversight of predictive policing technology given the potential drawbacks). overcharging and stacking,194See Andrew Manuel Crespo, The Hidden Law of Plea Bargaining, 118 Colum. L. Rev. 1303, 1313–16 (2018) (describing the prosecutorial strategies of piling on multiple overlapping criminal charges for the same criminal conduct and overreaching on charges that the prosecutor may not believe are supported by evidence). and pushing for harsh sentences for incapacitation purposes. However, there are several more progressive practitioners who are challenging the old guard and trying to use emerging data to facilitate more effective policies.195See Barkow, supra note 72, at 155–60 (documenting the progressive prosecutor movement across the country and the potential for reform). This is the double-edged sword of expertise, because both of these camps can be considered to be “experts” due to their level of practical experience. Just like doctors who prescribe a large number of placebos to patients with the hope that it will have a placebo effect, these practitioners on the ground are prescribing punishment policies that they hope will have some effect on public safety, whether directly or indirectly. And we the public have some sense of trust in these practitioners, in part, because of their expertise.196See, e.g., Trust in America: Do Americans Trust the Police?, Pew Rsch. Ctr. (Jan. 5. 2022), https://www.pewresearch.org/politics/2022/01/05/trust-in-america-do-americans-trust-the-police [https://perma.cc/R8GM-H5DE] (finding that the majority of Americans have some confidence that police officers act in the best interest of the public and 26% saying they have great confidence). The takeaway from this analysis is that there can be no placebo-like justification for non-expert legislators who enact criminal statutes, but there may be some argument that the expertise of police and prosecutors should be given some weight.

The second ethical consideration that might justify deception is the intent of the person in power, which also highlights stark differences between the medical and punishment fields. Many doctors prescribe placebos out of benevolent care only when they view it to be in the best interests of the patient.197See Jopling, supra note 22, at 238–39 (discussing the importance of benevolence in placebo treatments); Boozang, supra note 15, at 724–25 (considering the justifications of benevolent deception when doctors apply placebo treatments). This gestures toward the “classical paternalistic paradigm that dominated traditional medicine.”198Annoni, supra note 91, at 464; see also Jopling, supra note 22, at 108–09 (quoting Hippocrates as subscribing to and perhaps creating this traditional paternalistic view). Like parents who benevolently guide, deceive, and withhold information from their children because of large gaps in information, intellectual ability, and emotional stability, the traditional practice of medicine justified treatments under a paternalistic view of patients.199See Spiro, supra note 88, at 47 (explaining the historical and traditional role of doctors as a power conduit through which they determined health outcomes of entire communities, including their role as parents of the community). Not only does this ethical justification substantiate the earlier requirements of expertise, but it also highlights the necessary selfless intent of doctors to justify deception. Parents deceive their children most often for the sole benefit of the child, and while there are indeed some that might use such deception for their own parental gain, this is often not accepted as best practice. Similarly, doctors may be justified in using benevolent deception if the primary purpose is the sole benefit of the patient. As argued above, this is a complex question in which a doctor (or politician) must consider the full range of costs and benefits of deception. But the ultimate takeaway is that deception is partly justified by benevolent and selfless intent.

Using this methodology to analyze politicians and their role in punishment leaves much to be desired. In a perfect world, politicians would be public servants who seek to serve their constituents’ best interests, but political theory has long disproved this romanticized ideal.200See Sheldon A. Evans, Interest-Based Incorporation: Statutory Realism Exploring Federalism, Delegation, and Democratic Design, 170 U. Pa. L. Rev. 341, 385–92 (2022) (outlining political theories that assert politicians are self-interested in getting re-elected and maintaining power). Lawmakers are not bound by a comparable code of medical ethics where constituent interests are placed at the forefront.201See, e.g., Code of Medical Ethics, Am. Med. Assoc., https://code-medical-ethics.ama-assn.org [https://perma.cc/GYD7-J73C] (describing the code of ethics for medical professionals). They do indeed seek to serve their constituents but are also incentivized into doing what is necessary to maintain their power.202See, e.g., Lynn A. Baker & Ernest A. Young, Federalism and the Double Standard of Judicial Review, 51 Duke L.J. 75, 114–15 (2001) (recognizing some of Congress’s attempts to federalize criminal law as nothing more than press releases for political gain, having little to do with public safety). There may be an argument that politicians believe they are serving society by assuaging fears with placebo punishment policies if they believe that fixing the actual crime rate is not as important to public health as controlling perceptions of crime. However, as argued above, there are simply too many self-interested incentives involved in the tough-on-crime movement from those wishing to maintain their power. The lies that politicians maintain about mass incarceration, the manipulation of public fear, and the withholding of the truth from the public cannot be justified under the medical ethics of benevolence,203See also J.A. Barnes, A Pack of Lies: Towards a Sociology of Lying 14 (1994) (differentiating between benevolent and malicious lies depending on the liar’s intent to benefit the victim or to benefit themselves, respectively). but should be characterized as maleficent and at least partially self-interested deception that wreaks havoc in the form of underappreciated social costs.

Yet there is some nuance to consider regarding intent among lawmakers, police, prosecutors, and others who prescribe and deliver the placebo treatment of punishment. As in the substantive criminal law, we assign blameworthiness according to a person’s level of intent for their wrongdoing. The highest level of culpability is committing an act with purpose, meaning that it was the person’s conscious desire to commit the act or to procure the desired result of the crime.204Model Penal Code § 2.02(2)(a). Next comes knowledge, which describes a person who has near certainty that their action will procure the result of the crime.205Id. § 2.02(2)(b). Then there is recklessness and negligence, which capture situations in which a person knows or should have known that their actions will procure a certain result.206Id. §§ 2.02(2)(c)–(d). There are indeed actors in the criminal legal system who are purposive or at least have sufficient knowledge that these punishment policies are ineffective but nevertheless have some placebo effects towards public safety. These are the most culpable actors in the mass incarceration crisis. But there are others who are less culpable but still responsible for contributing to the crisis. These decisionmakers might honestly believe the status quo is an effective system that they seek to propagate and expand. At best, these lawmakers, law enforcement officials, and prosecutors can be said to be reckless or even negligent because they are consciously disregarding the danger of these policies or really do not perceive any dangerousness but nevertheless should have known the dangerousness of these policies. Given the amount of scholarship, the accessibility of experts, and the continued deterioration of the criminal legal system, these decisionmakers are at best negligent, and at worst purposive, in their culpability of the mass incarceration crisis.

The third ethical consideration that might justify deception in the use of placebos is the issue of consent. Modern medicine has largely departed from the benevolent paternalism of the past and has been sharply redefined towards a progressive ideal that fosters partnership between doctor and patient.207See Boozang, supra note 15, at 742 (stating that paternalism in the modern medical ethics context has largely been rejected as a justification for prescribing treatment). The legal principles of informed consent are also applicable in medical malpractice cases. See id. at 731 nn.258–60 (discussing the contours of informed consent to medical treatments and its exceptions in legal precedent). This type of dynamic has restructured the entire culture of medical treatment, in which doctors are resources of information that a patient can consult; by explaining complex medical information and treatments to their patients, doctors can partner with their patients and ultimately allow the patient to make the final decision on what treatment they receive. Thus, the modern ethics of prescribing placebos is complicated by the issue of consent.

This ethical dynamic is resolved through a fascinating aspect of placebo treatments, namely the consent of self-deception. Patients may desire to gain the benefits of placebos or other unverified alternative medical treatments for the sake of achieving a larger health goal.208See Shlomo Cohen & Haim Shapiro, “Comparable Placebo Treatment” and the Ethics of Deception, 38 J. Med. Phil. 696, 703 (2013) (stating that some patients may “want to be locally manipulated [with a placebo treatment] for the sake of achieving [a] larger goal,” such as pain relief). Perhaps an active medication is known to have side effects, whereas a placebo might deliver similar therapeutic relief without the side effects. Or perhaps active medication is cost-prohibitive to patients whereas placebos are more cost-effective for the relative benefit the patient receives.209See Annoni, supra note 91, at 467 (considering potential economic justifications for placebo treatments when factoring in the relative amount of therapeutic relief they offer). Medical ethicists have considered these possibilities and ultimately come out in favor of patient discretion; in other words, patients should have the power and control over their treatment to give doctors the green light to deceive them.210See Boozang, supra note 15, at 734; Adam J. Kolber, A Limited Defense of Clinical Placebo Deception, 26 Yale L. & Pol’y Rev. 75, 75–78 (2007). Under such treatment plans, the patient will never know which treatment is a placebo or when the deception is coming. That way, they can still enjoy the ignorant bliss of placebo benefits. This adds yet another wrinkle in an already complicated ethical space. As opposed to the principle of informed consent, in which the patient must consent to each separate treatment, a doctor-patient relationship may also be formed on the basis of general consent under which the patient consents to the doctor or the overall treatment plan.211See Annoni, supra note 91, at 468 (explaining the difference between informed medical consent and general medical consent). This obviates the need to consent to each individual treatment and instead gives the patient the power to consent to the doctor and all of their subsequent methods.212See Malani, supra note 10, at 449 (“In other words, the patient consents to the doctor rather than consent to the treatments.”). If patients want to be deceived, and give consent to be deceived,213See Jopling, supra note 22, at 224–25 (characterizing this phenomenon as a type of cognitive dissonance in which patients lie to themselves and know they are lying to themselves). placebos might also be justified under a consensual doctor-patient relationship.

The self-deception model of consent is an interesting consideration of collective cognitive dissonance and might also have some explanatory value in placebo punishment policies. Let us first consider that most Americans want criminal justice reform.214See supra note 151 and accompanying text. There may indeed be much disagreement among these constituents about what such reform would look like, but there is a growing dissatisfaction. But like most political opinions, these Americans are looking for a type of general consent as opposed to informed consent. These constituents simply want the problem to get better and are not necessarily invested in each reform proposal that might come to the table. This is our system of republican government: we vote in politicians, thereby giving some form of majoritarian consent, and we expect them to fix the problems we have elected them to fix. Whether it be sentencing reform, decriminalization of drug crimes, or defunding the carceral state and reinvesting in other social programs, the average American voter is not concerned with the specifics of how politicians address these problems.

The public has accepted the diagnosis of the social problem of crime, and they are giving general consent to the overall treatment plan of mass incarceration with little care or concern about the overall placebo of the treatment. This is quite different from saying that the public wants to be deceived, but the political system allows for some consent for elected officials to deceive us, even after the public collectively understands that the criminal legal system is broken.215Id. A political theory of self-deception, as realized through the placebo methodology, might be the strongest case that justifies politicians intentionally deceiving the public through mass incarceration and punishment placebos. If the public implicitly agrees to deception, politicians should be allowed to deceive.

Most considerations in this Section have failed to justify the use of placebo policies in the punishment context, and these medical ethical concerns can also inform some future policy safeguards. Whatever the next tectonic shift in carceral policies may bring, we must be aware of the placebo nature and politics of these policies. Politicians will support what makes voters feel better; for the Left, this may look like progressive policies that make them feel like criminal justice is no longer targeting certain communities; for the Right, this may look like less costly and more efficient policies that make them feel safer and more fiscally responsible.216See Eisha Jain, Capitalizing on Criminal Justice, 67 Duke L.J. 1381, 1391 (2018) (surveying the political and legislative difficulties of criminal legal reform); William J. Stuntz, The Pathological Politics of Criminal Law, 100 Mich. L. Rev. 505, 510 (2001) (describing the political economy that favors overcriminalization). There is indeed political will to make a change, as Red and Blue states across the country have experimented with new punishment policies,217See Lauren-Brooke Eisen & Inimai Chettiar, Brennan Ctr. for Just., The Reverse Mass Incarceration Act 10 (2015) (tracking California’s decarceration between 2006–2012 that saw a 23% drop in its prison population and a 21% and 13% drop in violent and property crime, respectively, as well as New York’s progress between 1994–2014 that saw a 28% drop in its prison population and a 31% and 28% drop in violent and property crime, respectively); see also id. (tracking Texas’s investment of $55 million in 2005 to incentivize local governments to adopt alternative punishment tools and decarcerate and in 2007, spending $241 million to fund more such programs instead of investing $500 million to build new prisons, which resulted in a 12% drop in crime from 2011–2014 and also tracking Mississippi’s progress from 2008–14, which saw a 21% drop in its prison population that corresponded with a drop in crime rates). presidential administrations from both parties have pushed through reformist legislation,218See, e.g., Jamiles Lartey, Trump Signs Bipartisan Criminal Justice Overhaul First Step Act into Law, The Guardian (Dec. 21, 2018, 2:12 PM), https://www.theguardian.com/us-news/2018/dec/21/trump-prison-reform-first-step-act-signed-law [https://perma.cc/5828-NB9H] (covering the legislative passage of the First Step Act, a bipartisan piece of legislation that expanded rehabilitative opportunities); Ames Grawert, Lauren-Brooke Eisen, Stephanie Wylie & Noah Kim, Criminal Justice Reform Halfway Through the Biden Administration, Brennan Ctr. for Just. (Jan. 10, 2023), https://www.brennancenter.org/our-work/analysis-opinion/criminal-justice-reform-halfway-through-biden-administration [https://perma.cc/XAP8-6KCD] (tracking the criminal justice policy changes of the Biden Administration). and grassroots organizations have become part of the mainstream decarceration movement.219See generally Amna A. Akbar, Sameer M. Ashar & Jocelyn Simonson, Movement Law, 73 Stan. L. Rev. 821 (2021) (studying legal avenues in which grassroot social movements can buck trends and challenge the status quo). But even with this bipartisan support to change something about the system, will the resulting change be yet another placebo? The next generation must not make the same mistakes of our past by settling for yet another placebo punishment policy.

There are no easy answers to what appears to be an insurmountable social and cultural problem based on political incentives and unethical behavior. An informed consent punishment model would be an interesting thought experiment, requiring partnership and active participation between politicians and constituents before any new criminal law, punishment, or reform was adopted. However, such an informed consent model would be practically impossible and would also theoretically fail to address the problems of punishment placebos. Putting so much power in the hands of uninformed constituents carries the risk of even more criminal legal policy falling prey to fear-based penal populism.220See generally John Rappaport, Some Doubts About “Democratizing” Criminal Justice, 87 U. Chi. L. Rev. 711 (2020) (discussing the potential downsides to fully democratizing criminal justice). But see Lauren M. Ouziel, Democracy, Bureaucracy, and Criminal Justice Reform, 61 B.C. L. Rev. 523, 579–82 (2020) (advocating for more community involvement in policymaking by focusing on the “[d]eliberative mechanisms [that] would ideally open a dialogue between the enforcement bureaucracy and the various communities of interest that comprise the criminal justice public”). Providing the public with more information, facts, studies, statistics, and so forth in an effort to educate the masses through public service announcements is unlikely to decouple the social and cultural feelings of punishment and its connection to safety. Using direct voter ballot initiatives is another interesting proposal because they have had success in legalizing marijuana and banning forced prison labor,221See Hanna Darroll, Three Key Criminal Legal Reform Takeaways from the 2022 Midterms, ACLU (Nov. 15, 2022), https://www.aclu.org/news/criminal-law-reform/three-key-criminal-legal-reform-takeaways-voting-in-2022-midterms [https://perma.cc/7U35-Q2YN] (recording results from several states that voted to further legalize medical and recreational use of marijuana, as well as outlawing forced prison labor for low wages). but have also maintained capital punishment222See Death Penalty Repeal Effort Fails Again, CBS News (Nov. 9, 2016, 10:51 AM), https://www.cbsnews.com/losangeles/news/death-penalty-repeal-effort-fails-again [https://perma.cc/B3C2-L3P7] (reporting that California—one of the most progressive states in the union—voted down a measure that would eliminate the death penalty). and a number of harsh sentencing laws.223See Anna Simonton & Daniel Nichanian, How Criminal Justice Reform Fared at the Ballot Box on Tuesday, The Appeal (Nov. 5, 2020), https://theappeal.org/politicalreport/criminal-justice-reform-2020-election-results [https://perma.cc/SQ6H-ANLW] (reporting the mixed results of ballot initiatives in California, Oklahoma, and Kentucky, many of which recorded voters deciding to uphold the status quo of harsh sentencing). There is simply no safeguard for people’s fear and none for politicians’ penchant for exploiting it.

This Section has leaned heavily into diagnoses and has been light on effectual treatments. The ethics of social deception of placebo punishment policies cannot be justified through the same traditional medical lens of paternalism nor the benevolent power that doctors use to maintain public health in the community. Neither can placebo punishment policies be fully justified through modern medical ethics of informed consent, but the concept of general consent and self-deception paints a dismal picture of the American public’s apathy toward specific involvement in criminal justice. This leaves hope that further examination of placebo ethics can lead to some policy interventions, especially when considering the infrastructure of expertise below.

C. Experimentation Ethics

The placebo ethics of scientific experimentation introduces another tool that shifts the discussion of punishment theory and mass incarceration. The medical field often uses placebo trials as a methodology for finding treatments that are more effective than their predecessors, which justifies the use of the placebos toward the gain of medical knowledge. This Section uses this ethical justification of placebos to explore the unjustified experimentation of punishment policies and mass incarceration.

Starting with the medical context, double-blind placebo studies are the gold standard in the experimental setting to determine the efficacy of pharmaceutical drugs.224See Jopling, supra note 22, at 191 (discussing the “enviable degree of success” of double-blind placebo studies in determining the “relative effectiveness of medications and medical procedures”); Megan T. Stevenson, Cause, Effect, and the Structure of the Social World, 103 B.U. L. Rev. 2001, 2003–04 (2023) (explaining placebos as parts of randomized control trials as the gold standard for measuring efficacy). There are at least two groups225See Jopling, supra note 22, at 122 (explaining the procedure of placebo trials and advocating for at least three groups, to include a group that receives no treatment to track the natural progressions of the disease with no medical intervention). of consenting patients,226See Pilar Hereu, Eulàlia Pérez, Inma Fuentes, Xavier Vidal, Pilar Suñé & Josep Maria Arnau, Consent in Clinical Trials: What Do Patients Know?, 31 Contemp. Clinical Trials 443, 443–46 (2010) (detailing what consents and disclosures are part of the average placebo clinical trial). both of whom are suffering from a disease or ailment that serves as the subject of the treatment. The first blind describes the patients who are unaware of what treatment they are receiving. The first group is given the drug being tested by the trial, while the second group is given a placebo.227See Shobha Misra, Randomized Double Blind Placebo Control Studies, the “Gold Standard” in Intervention Based Studies, 33 Indian J. Sexually Transmitted Diseases & AIDS 131, 132–33 (2012) (explaining the process of designing a double-blind study). The second blind describes the researchers themselves. To avoid the power, bias, and favoritism of researchers who are administering the treatments,228See Brody, supra note 88, at 83 (capturing how the power and stature of a doctor can shape patient’s subjective expectations in furtherance of placebo treatments); Moerman, supra note 85, at 102 (describing the social importance that doctors serve and the language they use as a means of impacting patient expectations). the researchers are also blind to which group is getting the drug versus placebo treatments. Thus, the efficacy of the drug being tested is the positive difference between the medical outcomes of the drug group and the placebo group. If both the drug group and placebo group enjoy physical improvements, isolating the positive impact of the placebo is paramount to determining the actual effectiveness of the drug apart from any placebo effects.229See, e.g., Irving Kirsch, Antidepressants and the Placebo Effect, in Placebo Talks: Modern Perspectives on Placebos in Society 17, 18–21 (Amir Raz & Cory Harris eds., 2015) (explaining the difference between positive placebo effects and the actual efficacy of the drug being tested by the trial).

The utilitarian outcomes of experimenting to develop more effective medicines justify the necessary deception of the placebo groups along the way. If the placebo group knew they were getting the placebo and the drug group knew they were getting the active drug, the positive placebo effects would be lost and would jeopardize the utility of the study.230There have been a small number of studies suggesting that patients can still enjoy positive placebo effects if they are told they are taking a placebo. See Jopling, supra note 22, at 206–08; Azgad Gold & Pesach Lichtenberg, The Moral Case for the Clinical Placebo, 40 J. Med. Ethics 219, 221 n.254 (2014) (citing studies showing mixed results of positive placebo effects when disclosing placebo treatments).

Medical ethicists have raised concerns based on deontological grounds of the duty of doctors to always provide the best available care.231See Franklin G. Miller & Howard Brody, What Makes Placebo-Controlled Trials Unethical?, 2 Am. J. Bioethics 3, 3 (2002) (citing several ethicists with these concerns, including a 1994 petition to include new language in the Declaration of Helsinki, which governs the ethics of placebo trials). This goes past the Hippocratic Oath to do no harm and requires doctors to provide the best care possible based on the inherent worth of a human life and its connection to individual health. These ethicists have criticized placebo trials as exploitative and have argued that it is inherently unethical to evaluate new treatments when there are already proven treatments available.232See Ilja Richard Pavone, Legal Responses to Placebo-Controlled Trials in Developing Countries, 27 Global Bioethics 76, 79 (2016).

For example, if a research trial is trying to find the next generation of treatments for a non-deadly disease, such as depression, a placebo trial may be organized. The new drug to be tested is X, even though Y is already on the market and available to patients. Y has an efficacy rating of one, which is quite effective at helping depression patients. However, the placebo group will not receive any effective treatment for their depression. Thus, their depression may get better or worse based on the placebo effect or the natural course of the disease. The drug group receiving X, on the other hand, sees a great improvement, measured at an efficacy rating of two. This result is traditionally seen as a success in medical science because X will benefit countless future depression patients, but it came at the expense of the placebo group who all the while could have gotten better if they had been prescribed Y.

In the punishment placebo context, there are many lessons to learn from medicine’s more developed and sophisticated rules of ethics. Placebo methodologies have long been used in sociological and policy studies to determine the efficacy of criminal law and policy when compared to the status quo or an inert placebo policy.233See Joshua D. Angrist & Jörn-Steffen Pischke, Mastering ‘Metrics: The Path from Cause to Effect 1–46 (2015) (describing the general use and utility of randomized control trials in social science); see, e.g., Yu-Wei Luke Chu & Wilbur Townsend, Joint Culpability: The Effects of Medical Marijuana Laws on Crime, 159 J. Econ. Behav. & Org. 502, 507 (2019) (explaining the use of statistical placebo methodology to measure the impacts of medical marijuana laws on crime rates); Eric Helland & Alexander Tabarrok, Using Placebo Laws to Test “More Guns, Less Crime”, 4 Advances Econ. Analysis & Pol’y 1 (2004) (using a similar methodology to measure the impact that “shall-issue” gun laws have on crime rates). These types of experiments and analyses have also been a hallmark of Our Federalism.234See New State Ice Co. v. Liebmann, 285 U.S. 262, 311 (1932) (Brandeis, J., dissenting) (“It is one of the happy incidents of the federal system that a single courageous State may, if its citizens choose, serve as a laboratory; and try novel social and economic experiments without risk to the rest of the country.”); see also Fed. Energy Regul. Comm’n v. Mississippi, 456 U.S. 742, 787–88 (1982) (O’Connor, J., concurring in part and dissenting in part) (“[T]he Court’s decision undermines the most valuable aspects of our federalism. Courts and commentators frequently have recognized that the 50 States serve as laboratories for the development of new social, economic, and political ideas.”). The Brandeisian ideal of state laboratories has yielded new innovations in punishment practice but has often yielded harsher and more ineffective punishments as a result of the fear and penal populism that has taken hold since the tough-on-crime era.235See Evans, supra note 6, at 28–31 (citing harsh punishments that were the fruits of federalism experimentation from states that were later nationalized). Three strikes laws, ending parole for certain offenses, and even the very development of prisons as an institution, were all policies started and championed by various states until they were more widely adopted.236See id. at 36. And while states have been experimenting with many decarceration policies,237See supra note 217 and accompanying text. the norm still rests on the harsh side of the scale.

Given the placebo nature of mass incarceration policies, they are difficult to justify unless the punishment system is becoming more efficacious, like the ethics in the medical field. States will continue to experiment with various progressive and harsh punishment policies, and they do so in part to align these policies with the preferences of their constituency.238See Charles M. Tiebout, A Pure Theory of Local Expenditures, 64 J. Pol. Econ. 416, 418 (1956) (positing an explanation of federalism in which states compete horizontally with one another for constituents. “The consumer-voter may be viewed as picking that community which best satisfies his preference pattern for public goods.”); see, e.g., Richard L. Revesz, Rehabilitating Interstate Competition: Rethinking the “Race-to-the-Bottom” Rationale for Federal Environmental Regulation, 67 N.Y.U. L. Rev. 1210, 1222 (1992) (arguing that “there ought to be an affirmative justification for federal intervention” in environmental regulation and listing market-failure and public choice arguments as two possible justifications); William L. Cary, Federalism and Corporate Law: Reflections upon Delaware, 83 Yale L.J. 663, 705 (1974) (arguing that state competition for business in the corporate world would create a race to the bottom). Thus, if Jurisdiction A continues with the status quo of mass incarceration policies and Jurisdiction B decides to experiment with bail reform, lower sentences, or drug courts, there would be a value to criminology and punishment theory if the delta between these similarly situated jurisdictions could be measured. Jurisdiction B might prove that these new policies are ineffective, or they might create support for a new paradigm in punishment, as has been the case throughout federalism’s state experimentation in criminal law.

For the reform-minded utilitarian, mass incarceration is a necessary part of the experiment to prove to politicians and bureaucrats around the country that progressive punishment reform is more efficacious than the current placebo. The delta between the placebo of mass incarceration policies and the growing number of programs that have been shown to reduce first-time offenses and recidivism239See supra note 126 and accompanying text. is a powerful policy tool that justifies change. This is true even though it comes at the cost measured in years of human lives. But while such reformers use metrics to prove their efficacy points, mass incarceration as a placebo is allowed to remain across the country, and the disease of crime is allowed to fester.

For the abolitionist-minded deontologist, there are two groups of people to consider. The first is the communities in Jurisdiction A who are not benefiting from the placebo of mass incarceration policies, although they may indeed enjoy psychological or therapeutic benefit.240But see Corradi & Baumer, supra note 7, at 1394 (finding that “people from states/counties with starkly divergent cumulative imprisonment, crime trends, and crime rates—contrasts that are presumably more likely to be known and appreciated—exhibited levels of fear that were statistically indistinguishable from one another”). The second group is the millions of people who are suffering because of the harm and social costs of mass incarceration. These people did not consent to be a part of this grand thought experiment but have been caught in the middle of this ethical dilemma and human rights crisis.241But see Claire Finkelstein, Punishment as Contract, 8 Ohio St. J. Crim. L. 319, 331–34 (2011) (arguing for a social contract theory of punishment, in which people implicitly enter a contract with the state to enjoy the benefits of citizenship and then must abide by the consequences of punishment).

The moral supremacy of the deontological and abolitionist arguments cannot be denied, but the uncomfortable truth is that utilitarians hold the pragmatic high ground.242See Evans, supra note 81, at 717 (stating that “abolition activists may hold the moral high ground, but reformists and economists hold the pragmatic high ground”). Experimentation is at the heart of placebo and punishment policy alike. It is a double-edged sword that can bring about tremendous positive change, but it can also be captured by political incentives and penal populism. Consequently, the only utilitarian justification for continuing to use mass incarceration as a placebo would be to wean ourselves off from relying on placebos and begin rigorous analysis that will lead to improved public safety.

The ethics of using placebos in experimentation provides a unique starting point to discuss potential ways to mitigate the harm and justify the practices of placebos in the punishment context. Just as the government plays a key regulatory role in the administration of new drugs, this process might have some value in approving the next generation of punishment policies. Drugs often undergo a rigorous regulatory process that can last years before they are approved for doctors to prescribe, and placebo human trials are merely a step along that long journey.243See Phillip Zhang, Preeti Patel & Nicole R. Winston, Federal Medication Development Regulation, Nat’l Libr. of Med. (Feb. 12, 2024), https://www.ncbi.nlm.nih.gov/books/NBK574558 [https://perma.cc/SH7E-U9VQ] (explaining the step-by-step regulatory process by which the FDA approves pharmaceutical drugs).

What this experimentation ethic requires is an FDA-like project that gives experts the space, the time, and the resources to approve, reject, or reform new and existing punishment policies. This FDA model would hand over full regulatory power to expert agencies and commissions. The legislature would no longer be in control because they simply do not have the expertise required and the stakes are too high to trust generalists.244See Rappaport, supra note 220, at 809–12 (discussing the alternatives to the democratization approach that rely on expert administration). But see Jocelyn Simonson, Police Reform Through a Power Lens, 130 Yale L.J. 778, 849–58 (2021) (challenging the traditional determination of who is considered an “expert” in criminal policy and arguing that community members who actually experience the brunt of policing and punishment should also be recognized as experts). For a discussion on the disagreements between these positions, see Benjamin Levin, Criminal Justice Expertise, 90 Fordham L. Rev. 2777 (2022). Just as Congress does not have much say in whether Drug A is both efficacious and safe for the market, legislatures would not have much say in whether getting rid of mandatory minimums, for example, would be efficacious and safe for the public.

As Barkow has suggested, there is already an infrastructure of expertise that can be readily tapped for such a transition. Sentencing commissions exist across the country that serve advisory roles to federal and state legislatures; although quite different from the FDA, they are comprised of expert scholars, advocates, and judges.245See Barkow, supra note 72, at 10, 136–37 (proposing the creation of more sentencing commissions and recognizing that more than half of the states do not have such commissions); see also Judge Nancy Gertner, Supporting Advisory Guidelines, 3 Harv. L. & Pol’y Rev. 261, 262–63 (2009) (calling on the U.S. Sentencing Commission to “become a repository of studies on recidivism, alternatives to incarceration, and evidence-based practices”). While existing commissions have succeeded in recommending reforms and pushing back against penal populist policies, most have little teeth and their policy recommendations can often be ignored if they do not line up with the political incentives ruling their respective legislatures.246See Barkow, supra note 72, at 43–44, 171–73 (detailing the U.S. Sentencing Commission’s success at lowering sentencing for crack cocaine to be more in line with powder cocaine as well as the success of commissions in Minnesota and Washington). Consequently, there would only need to be a formal legislative delegation and other adjustments to ensure these existing commissions have the necessary power to assume regulatory control over punishment policies.

One of the flaws of this FDA punishment model, however, is that the marketplace of regulating food and drugs is vastly different from regulating criminal acts in material ways. Whereas the FDA is a government agency that regulates private companies, a government agency that regulates other government actors usually takes the form of checks and balances. Since any proposed expert agency of punishment policies would be the progenitor of new policies, there would need to be sufficient checks against these new policies. Thus, if the expert agency adopts a new punishment regulation, the courts would still have the ability to strike it down as a check against the administrative state. Executives would still have the discretion to fire appointees, and the legislature would still be able to impeach such appointees.

This author has also contemplated that such punishment agencies could work in the federalism context, whereby the federal government agency serves as a watchdog over state punishment practices.247See Evans, supra note 6, at 45–50 (explaining reimagining of federal criminal justice as a watchdog and check against abuse of state prison systems). Since 94% of criminal convictions248See Kate Berry, How Judicial Elections Impact Criminal Cases 1 (2015). and around 83% of incarcerated persons are handled by the states,249See Sawyer & Wagner, supra note 103 (estimating that 1,561,000 people are incarcerated in state prisons and local jails out of the total 1,873,000 incarcerated population). most of the harm of placebo punishment policies are being felt at the state level. This federalism approach would borrow less from the FDA and more from the DOJ’s Civil Rights Division and the preclearance process of the Voting Rights Act.250Although the preclearance process of § 5 of the Voting Rights Act of 1965, 42 U.S.C. § 1973(a), was struck down in Shelby County v. Holder, 570 U.S. 529 (2013), it still serves as a useful example of federal government oversight over states that violate federal civil rights. The preclearance process gave the federal government power to approve or reject new voting laws before they went into effect in certain states and counties to mitigate voting discrimination. The DOJ could indeed perform similar watchdog functions over various state punishment policies, and it might also have the benefit of creating some uniform accountability for both carceral and non-carceral punishments.251See generally Driver & Kaufman, supra note 143; Littman, supra note 143 (describing the lack of regulation on various prison conditions and prisoners’ rights issues); Weisburd, supra note 126, at 1333–34 (detailing the lack of federal or state regulation of noncarceral tools such as halfway houses, electronic monitoring, and more). Admittedly, this structure would lack the power of the Voting Rights Act to prevent policies from going into effect. However, the DOJ and the federal government could more easily tie federal funding to this punishment approval process. For instance, if Louisiana wanted to increase penalties for drug offenses, they would maintain their sovereignty to do so. However, if the DOJ disapproved of this policy, it would be well within its purview to rescind federal funding for criminal legal projects,252To this day, states continue to receive federal funding through Byrne Justice Assistance Grants, which are important funds that states usually need to shore up budget shortfalls in their criminal legal systems. See Evans, supra note 6, at 31. and it could partner with other federal agencies to discuss their funding options as well.253See id. at 55–57 (proposing multi-agency efforts to fund programs that mitigate underlying causes of crime, such as education, homelessness, and public health).

Handing over so much power to agencies filled with experts is not without its own concerns. Many scholars have expressed reservations about shifting power to experts in ways that might not be productive. Megan Stevenson’s study of more than two dozen meta-analyses led her to conclude that there is very little evidence from randomized control trials that many of the rehabilitation reformist interventions are effective at reducing recidivism or first-time offenses.254See Stevenson, supra note 224, at 2020–23 (arguing that only 29 out of 122 studies looking at various reformist interventions were effective at reducing recidivism or first-time offenses and of those twenty-nine studies, many had experimental defects). The reliance on “evidence-based reform” might also give people a false sense of efficacy, reliability, and neutrality when discretion is still being used to draw lines, make judgment calls, and enshrine perverse incentives.255See id. at 2040–41; see, e.g., Ngozi Okidegbe, Discredited Data, 107 Cornell L. Rev. 2007, 2007 (2022) (arguing that supposed neutral pretrial algorithms reproduce inequities because they are built with “carceral knowledge sources”); Erin Collins, Abolishing the Evidence-Based Paradigm, 48 BYU L. Rev. 403, 403 (2022) (arguing that the evidence-based movement is political, with agendas that strengthen rather than challenge the existing system); Cecelia Klingele, The Promises and Perils of Evidence-Based Corrections, 91 Notre Dame L. Rev. 537, 537 (2016) (illustrating how evidence-based practices that were originally designed to improve the criminal legal system have turned into reforms used to empower the carceral state). Even experts can be influenced by their own moral and social views on punishment, and these views will often impact which experts are selected by the government to serve on these commissions. Therefore, there is potential for political capture of such agencies, as we see in the administrative state quite commonly.256See Mirko Bagaric and Richard Edney, The Sentencing Advisory Commission and the Hope of Smarter Sentencing, 16 Current Issues Crim. Just. 125, 171 (2004) (realizing the limitations of existing sentencing commissions); see also Rachel E. Barkow, The Evolving Role of the United States Sentencing Commission, 33 Fed. Sent’g Rep. 3, 4–7 (2020) (explaining how politics has impacted and weakened the original purpose of the U.S. Sentencing Commission). Agencies and commissions can be vulnerable to corporate capture, especially if lobbyists or other interests seek to influence commission members by employing them as consultants outside of their government duties. These are important considerations that require careful institutional design choices to mitigate such influences.

The takeaway of this Section is that a placebo punishment methodology enlightens the discussion of ethical experimentation and requires careful consideration of the utilitarian benefits and social costs. Using the mass incarceration placebo is unfortunately a necessary evil to pave a way forward, as justified by creating better consequentialist punishment outcomes. And further, allowing experts into the experimentation process is key to mitigate the past generation of perverse political incentives and penal populism. Allowing experts to conduct these experiments and approve the experiments of others would begin to yield the type of results to turn back the tide of mass incarceration. And while the data, studies, and policies of these experts may not alone be enough to change the social and cultural sentiments towards punishment,257See Ian Loader & Richard Sparks, Public Criminology? 60, 107–08 (2011) (criticizing the “narrowly instrumental focus” of expert- and evidence-based reformers because crime policy is political, which accounts for questions of power and how society feels about what constitutes a good society); Barkow, supra note 72, at 15 (realizing that even expert analysis as a solution faces an uphill battle because “criminal justice policy-making cannot be completely removed from politics and the populist desire for severe responses to high-profile crimes”). they can get much closer to punishment policies that effectively make us safer.

D. Placebo Economics

The placebo ethics of economic incentives holds further insight for the marketplace of placebo punishment policies. Ethicists criticize the use of placebos on economic grounds because it requires a patient to pay for a product that is physiologically inert. Placebos are tantamount to snake oil, even if sold or prescribed benevolently by the doctor acting as a salesman. The same ethical criticism should be made of placebo punishment policies and the larger economic debates that have the potential of influencing the very social and cultural meanings necessary to change public views on punishment.

The economic aspect of placebos may be important to shaping the patient’s subjective expectations and perceptions of the treatment. When a doctor prescribes a treatment or drug, this usually necessitates some pecuniary commitment of the patient to go the pharmacy and buy the drug or over-the-counter product.258See Annoni, supra note 91, at 467 (acknowledging that “[m]any [placebos] involve the expenditure of time and money”). Imposing this economic cost may be necessary to the placebo’s impact because a patient would perceive an effective drug to require such out-of-pocket expense. This imposes costs on patients and insurance companies for products that carry little physical benefit but nevertheless provide some psychological and therapeutic benefit. Thus, patients and insurance companies are required to pay for products that are designed to deceive the patient into feeling better, as opposed to a physiologically efficacious treatment.259See Jopling, supra note 22, at xviii–xix (summarizing other ethicists’ views on the justification for insurance companies and other third parties to pay for placebos).

In addition to the doctor-patient relationship, there is also a robust, direct-to-consumer placebo market of supplements, vitamins, and other remedies that claim to contribute to health benefits without any scientific proof.260See, e.g., Kirsch, supra note 229, at 18–24 (arguing that the majority of antidepressant medications have little more efficacy than placebos); Bruce P. Barrett, Roger L. Brown, Kristin Locken, Rob Maberry, James A. Bobula & Donn D’Alessio, Treatment of the Common Cold with Unrefined Echinacea: A Randomized, Double-Blind, Placebo-Controlled Trial, 137 Annals Internal Med. 939, 939 (2002) (finding no statistically significant differences between the echinacea and placebo groups for any of the measured outcomes); Ondine van de Rest, Johanna M. Geleijnse, Frans J. Kok, Wija A. van Staveren, Willibrord H. Hoefnagels, Aartjan TF Beekman & Lisette CPGM de Groot, Effect of Fish-Oil Supplementation on Mental Well-Being in Older Subjects: A Randomized, Double-Blind, Placebo-Controlled Trial, 88 Am. J. Clinical Nutrition 706, 710–12 (2008) (finding no effect of fish oil supplementation on mental well-being in older patients). In fact, many of these so-called health supplements have been scientifically debunked, and yet consumers still flock to this marketplace—which sells substances that are not regulated by the FDA—to the tune of $40 billion every year.261See Malani, supra note 10, at 439 (describing the “$36–47 billion [market] in 1997” of alternative medications); Arthur K. Shapiro & Elaine Shapiro, The Placebo: Is It Much Ado About Nothing?, in The Placebo Effect: An Interdisciplinary Exploration 12, 24 (Anne Harrington ed., 1997) (citing the $30 billion spent annually on medical and supplement “fraud”; the $13.9 billion spent annually on “vitamins, organic diets, excessive jogging, holistic treatment, and alternative treatment”; and other fads). Thus, these alternative treatments that have no scientific backing still make up a “significant segment of the healthcare industry.”262Boozang, supra note 15, at 691 (citing David M. Eisenberg, Roger B. Davis, Susan L. Ettner, Scott Appel, Sonja Wilkey, Maria Van Rompay & Ronald C. Kessler, Trends in Alternative Medicine Use in the United States, 1990–1997: Results of a Follow-up National Survey, 280 J. Am. Med. Ass’n 1569, 1569 (1998)).

Economic incentives also complicate the ethics of the medical industry. Doctors can be incentivized by personal economic gain, receiving stipends, cash bonuses, expensive trips and a whole host of other extra benefits based on their prescriptions. The underworld of pharmaceutical companies paying doctors to increase prescriptions has been uncovered to great public outcry.263See, e.g., Neil Vigdor, It Paid Doctors Kickbacks. Now, Novartis Will Pay a $678 Million Settlement, N.Y. Times (July 1, 2020), https://www.nytimes.com/2020/07/01/business/Novartis-kickbacks-diabetes-heart-drugs.html [https://web.archive.org/web/20240111004529/https://www.nytimes.com/2020/07/01/business/Novartis-kickbacks-diabetes-heart-drugs.html] (describing the hundreds of millions of dollars that Novartis paid to doctors through “fishing junkets, golf outings and . . . six-figure honorariums”); Katie Thomas, Agustin Armendariz & Sarah Cohen, Detailing Financial Links of Doctors and Drug Makers, N.Y. Times (Sept. 30, 2014), https://www.nytimes.com/2014/10/01/business/Database-of-payments-to-doctors-by-drug-and-medical-device-makers.html [http://web.archive.org/web/20220802195929/https://www.nytimes.com/2014/10/01/business/Database-of-payments-to-doctors-by-drug-and-medical-device-makers.html] (“From August to December 2013, drug and device companies made 4.4 million payments to more than half a million health care professionals and teaching hospitals—adding up to about $3.5 billion.”); see also Aaron P. Mitchell, Niti U. Trivedi, Renee L. Gennarelli, Susan Chimonas, Sara M. Tabatabai, Johanna Goldberg, Luis A. Diaz Jr. & Deborah Korenstein, Are Financial Payments from the Pharmaceutical Industry Associated with Physician Prescribing?: A Systematic Review, 174 Annals Internal Med. 353, 358 (2021) (finding that doctors’ receipts of financial payments and benefits from pharmaceutical companies were consistently associated with higher and increased prescriptions from those respective companies). Even the government could not turn a blind eye to these perverse medical incentives and has been active in investigating and increasing regulations to mitigate these harms.264See David Grande, Limiting the Influence of Pharmaceutical Industry Gifts on Physicians: Self-Regulation or Government Intervention?, 25 J. Gen. Internal Med. 79, 80–82 (2009) (detailing different approaches that state and federal governments have used to regulate the pharmaceutical industry from incentivizing doctors to prescribe medications); Robert Pear, Drug Industry Is Told to Stop Gifts to Doctors, N.Y. Times (Oct. 1, 2002), https://www.nytimes.com/2002/10/01/us/drug-industry-is-told-to-stop-gifts-to-doctors.html [http://web.archive.org/web/20240806025732/https://www.nytimes.com/2002/10/01/us/drug-industry-is-told-to-stop-gifts-to-doctors.html] (reporting governmental warnings to pharmaceutical companies to stop incentivization for doctors to prescribe medications). This is relevant to the current discussion because, according to some experts, these personal incentives exist for doctors to prescribe drugs they know to be placebos.265See, e.g., Kirsch, supra note 229, at 18–24 (arguing that the majority of antidepressant medications have little more efficacy than placebos).

Applying these economic ethical concerns to the placebo punishment sphere, taxpayers should not be expected to pay the expensive costs for a punishment regime that is both inefficient and not efficacious. The prison system itself costs taxpayers approximately $80 billion annually according to conservative estimates and as much as $182 billion annually according to more liberal estimates.266See Vanessa Taylor, E-Carceration Brings the Oppression of the Prison System into Your Own Home, MIC (Mar. 30, 2021), https://www.mic.com/impact/what-is-e-carceration-understanding-the-us-justice-systems-dirty-little-secret-66261004 [https://perma.cc/84VX-HN9X] (reporting conservative estimates from the Bureau of Justice Statistics and liberal estimates from the Prison Policy Initiative). During the height of the mass incarceration era, state and local expenditures for the incarceration system rose by 946%, outpacing the very social programs better equipped to handle rising crime rates such as education, healthcare, and public welfare.267See Barkow, supra note 72, at 173 (“Between 1977 and 1999, state and local expenditures for corrections rose by 946 percent, far outpacing the growth in outlays for education (370 percent), hospitals and health care (411 percent), and public welfare (510 percent).” (citation omitted)). And this is just a fraction of the $305 billion that conservatively estimates the total cost of the criminal legal system.268See Emily D. Buehler, Justice Expenditures and Employment in the United States, 2017, U.S. Dep’t of Just. Bull. (July 2021), https://bjs.ojp.gov/sites/g/files/xyckuh236/files/media/document/jeeus17.pdf [https://perma.cc/56YA-FVWW] (reporting the growth in criminal justice spending from $188 billion in 1997 to $305 billion in 2017). This is quite the sum for government services that do not effectively deliver public safety benefits.

Politicians are also incentivized to support the punishment marketplace through the PIC. The broader PIC supports a multi-billion-dollar industry that includes a host of private and non-profit companies outside of the prisons’ walls.269See, e.g., Steven Obadiah, Those Profiting from the Prison-Industrial Complex, SNOQAP (Aug. 1, 2020), https://www.snoqap.com/posts/2020/8/1/those-profiting-from-the-prison-industrial-complex [https://perma.cc/V4B3-7WPK] (highlighting the massive growth in the prison population between 1980 and 2008, its contribution to the proliferation of private prisons, and the tensions produced through the privatization of incarceration); INCITE! Women of Color Against Violence & Critical Resistance, The Critical Resistance INCITE! Statement on Gender Violence and the Prison Industrial Complex, in Abolition Now! Ten Years of Strategy and Struggle Against the Prison Industrial Complex 15, 19–20 (CR10 Publications Collective ed., 2008) (finding that even nonprofits are a part of the PIC because they can be used to monitor and control social justice movements, divert public monies, redirect activist energies, allow corporations to mask involvement in mass incarceration through donations and philanthropic work, and other activities). Private prisons alone are estimated to bring in $4 billion in profit,270See Clyde Haberman, For Private Prisons, Detaining Immigrants Is Big Business, N.Y. Times (Oct. 1, 2018), https://www.nytimes.com/2018/10/01/us/prisons-immigration-detention.html [https://web.archive.org/web/20201112023703/https://www.nytimes.com/2018/10/01/us/prisons-immigration-detention.html?0p19G=3248]. and incarcerated people who are forced to work at slave wages produce $11 billion in goods and services.271See Dani Anguiano, US Prison Workers Produce $11bn Worth of Goods and Services a Year for Pittance, The Guardian (June 15, 2022), https://www.theguardian.com/us-news/2022/jun/15/us-prison-workers-low-wages-exploited [https://perma.cc/WSG7-APYN] (detailing the economic contribution and the “pennies an hour in wages” incarcerated persons make). This is a small sample of the larger PIC, which supports the carceral industry by providing soap, clothes, food, surveillance, weapons, construction, and other goods and services that uphold the status quo. Although not nearly as scandalous as private companies making direct payments to doctors, lobby organizations and unions for the PIC contribute to political campaigns in ways that incentivize politicians, benefit private companies, and incentivize locking up and surveilling more and more people.272See Heather Ann Thompson, The Prison Industrial Complex: A Growth Industry in a Shrinking Economy, 21 New Lab. F. 39, 41 (2012) (describing the powerful “American Legislative Exchange Council (ALEC), a powerful new political lobby committed to beating back unions, locking people up, and accessing cheap labor” and other efforts that lobby for longer prison sentences that increase profits); Michael Cohen, How For-Profit Prisons Have Become the Biggest Lobby No One Is Talking About, Wash. Post (Apr. 28, 2015), https://www.washingtonpost.com/posteverything/wp/2015/04/28/how-for-profit-prisons-have-become-the-biggest-lobby-no-one-is-talking-about [https://web.archive.org/web/20220225000154/https://www.washingtonpost.com/posteverything/wp/2015/04/28/how-for-profit-prisons-have-become-the-biggest-lobby-no-one-is-talking-about/#expand]; see also James Kilgore, Mass Incarceration and Working Class Interests: Which Side Are the Unions On?, 37 Lab. Stud. J. 356, 367 (2013) (studying the political impact that prison guard unions and PIC lobbying efforts have on political discourse of maintaining mass incarceration).

Placebo ethics questions the economic practice of requiring people to pay for a product that is known to be ineffective and scrutinizes the perverse economic incentives at play. But looking forward, a focus on inefficient or ineffective economic practices can also play a role in changing the very social behavior and cultural understandings necessary for a new punishment paradigm.

The last generational shift in punishment was based on this very placebo ethic, but in slightly different terms. The dominant rehabilitative model was believed by scholars and politicians of the time to be far too ineffective for the relative economic costs. This logic took hold in the 1960s and 1970s, when the federal government spent billions of dollars to improve existing prisons and jails to lower recidivism,273See Cong. Budget Off., Federal Law Enforcement Assistance: Alternative Approaches ix, 8 (1978), https://www.cbo.gov/sites/default/files/95th-congress-1977-1978/reports/78-cbo-032.pdf [https://perma.cc/DJQ7-UESJ] (describing the $6.6 billion spent on seed programs to improve recidivism and lower crime at the state and local level). all just to see the crime rate rise.274See supra note 107 and accompanying text. Politicians and taxpayers alike lost their logical patience to see the long-term positive impacts that rehabilitative models were having275See supra notes 108–110 and accompanying text. and instead turned to fear and emotion by favoring harsher sentencing. This paved the way for the implementation of mass incarceration policies during Reagan’s 1980s276See, e.g., Comprehensive Crime Control Act of 1984, Pub. L. No. 98-473, 98 Stat. 1976 (1984); Anti-Drug Abuse Act of 1986, Pub. L. No. 99-570, 100 Stat. 3207 (1986); Anti-Drug Abuse Act of 1988, Pub. L. No. 100-690, 102 Stat. 4181 (1988). and Clinton’s 1990s.277See Violent Crime Control and Law Enforcement Act of 1994, Pub. L. No. 103-322, 108 Stat. 1796 (1994). It took nearly twenty years of frustrations (1960s and 70s) to boil into a generational shift in policies over the next twenty years (1980s and 1990s).

We have started to see this same multi-decade cycle reflected in the current twenty year frustration period in the 2000s and 2010s. Fiscal conservatives and libertarians—who might have traditionally been the staunchest supporters of law-and-order politics—have started to ring the alarm bells that mass incarceration policies are simply too expensive for the relatively small social benefits.278See, e.g., David Dagan & Steven Teles, Prison Break: Why Conservatives Turned Against Mass Incarceration 39 (2016) (explaining how the Tea Party movement characterized mass incarceration as government overreach); John S. Baker, Jr., Measuring the Explosive Growth of Federal Crime Legislation, 5 Federalist Soc’y For Law & Pub. Pol’y Stud. 23, 27–28 (2004) (“The federal government is supposedly a government of limited powers and, therefore, limited jurisdiction. Every new crime expands the jurisdiction of federal law enforcement and federal courts.”); see also Marie Gottschalk, Democracy and the Carceral State in America, 651 Annals Am. Acad. Pol. & Soc. Sci. 288, 290–91 (2014) (stating that institutions on the political Left and Right “have embraced framing the problem of the carceral state as primarily a dollar-and-cents issue that begs for a bipartisan solution”). Perhaps the surest bet in decarceration over the past fifteen years is that economic downturn has yielded the most significant reforms. The smart-on-crime movement, which boasted more efficient and effective punishment policies, started in the early 2010s as it was spurred by state budgetary cost concerns coming out of the Great Recession of 2008.279See Nazgol Ghandnoosh, U.S. Prison Population Trends: Massive Buildup and Modest Decline, The Sent’g Project (Sept. 17, 2019), https://www.sentencingproject.org/app/uploads/2022/08/U.S.-Prison-Population-Trends.pdf [https://perma.cc/U56Z-SF8C]; see, e.g., Jeremy W. Peters, Albany Reaches Deal to Repeal ‘70s Drug Laws, N.Y. Times (Mar. 25, 2009), https://www.nytimes.com/2009/03/26/nyregion/26rockefeller.html [https://web.archive.org/web/20240126031152/https://www.nytimes.com/2009/03/26/nyregion/26rockefeller.html] (describing how budgetary pressure to reduce imprisonment rates and shifting political winds combined to permit legislation to reduce drug penalties). The country’s recent battle with COVID-19 also sparked increased debate about penal spending when states struggled to balance their budgets given the tremendous negative economic impacts of the pandemic.280See Louise Sheiner & Sophia Campbell, How Much Is COVID-19 Hurting State and Local Revenues?, Brookings (Sept. 24, 2020), https://www.brookings.edu/blog/up-front/2020/09/24/how-much-is-covid-19-hurting-state-and-local-revenues [https://perma.cc/3Z8C-K548] (“We project that state and local government revenues will decline $155 billion in 2020, $167 billion in 2021, and $145 billion in 2022—about 5.5 percent, 5.7 percent, and 4.7 percent, respectively—excluding the declines in fees to hospitals and higher education. Including those fees to hospitals and higher education would bring these totals to $188 billion, $189 billion, and $167 billion.”); see also States Grappling with Hit to Tax Collections, Ctr. on Budget & Pol’y Priorities (Nov. 6, 2020), https://www.cbpp.org/sites/default/files/atoms/files/4-2-20sfp.pdf [https://perma.cc/Z4RS-RKP7] (discussing states having to make cuts to meet budget shortfalls caused by the coronavirus pandemic).

Economics were not the entire story, but they were part of the social and cultural shift of these times. Social and cultural expectations shape a patient’s positive and negative experience with a placebo and so too are we seeing the social and cultural expectations of economics impact how Americans are starting to negatively view the placebo of mass incarceration. There are few things more “American” from a cultural standpoint than demanding to get your money’s worth. And as perceptions of the costs of mass incarceration change,281See, e.g., supra notes 135–137 and accompanying text. so too will economics impact our cultural rejection of placebo punishment policies.

The placebo punishment framework and the broader health literature it incorporates not only help us think about these ethical economic problems but also gesture towards unique health-related solutions that can inform punishment reform. One approach would be to regulate the market with economic tools like a “sin tax” of some type. This author and others have previously proposed various methods for increasing the economic costs of incarceration on government actors to disincentivize them from over relying on carceral punishment tools,282See, e.g., Adam M. Gershowitz, An Informational Approach to the Mass Imprisonment Problem, 40 Ariz. St. L.J. 47 (2008) (arguing that prosecutors should be made aware of prison capacity and incarceration rates to inform their decision-making); Rachel E. Barkow, Federalism and the Politics of Sentencing, 105 Colum. L. Rev. 1276, 1278 (2005) (arguing the benefits of focusing on the costs of incarceration due to state sensitivity to balancing their budgets). See generally Russell M. Gold, The Price of Criminal Law, 56 Ariz. St. L.J. 841 (2024) (arguing that local county-level decision-makers should be forced to consider the local costs of criminal justice without enjoying a correctional free lunch by being covered by state and federal programs). such as imposing a tax on local prosecutors when charging and prosecuting a person and suggesting prison time.283See Evans, supra note 81, at 729–35 (explaining the considerations and potential operation of a state- or federal-imposed prison tax on local prosecutorial budgets). These types of sin taxes have been applied across the public health sphere from cigarettes to sugary drinks.284See How Do State and Local Cigarette and Vaping Taxes Work?, Tax Pol’y Ctr. (Jan. 2024), https://www.urban.org/policy-centers/cross-center-initiatives/state-and-local-finance-initiative/state-and-local-backgrounders/cigarette-and-vaping-taxes (discussing how different tobacco products, such as cigarettes and vaping products, are taxed and the variances in tax rates among different states); Susan M. Kansagra, Maura O. Kennelly, Cathy A. Nonas, Christine J. Curtis, Gretchen Van Wye, Andrew Goodman & Thomas A. Farley, Reducing Sugary Drink Consumption: New York City’s Approach, 105 Am. J. Pub. Health e61, e63 (2015) (describing taxes imposed on sugary drinks in New York City and other jurisdictions and its impact at reducing consumption). Passing along these costs onto constituents, such as raising taxes for the express purpose of maintaining the prison population, would also likely change the social and cultural expectations of the mass incarceration placebo and could result in further public outcry for reform.285See Evans, supra note 81, at 748 (arguing that passing carceral costs directly onto constituents would introduce a new level of political accountability onto state and local prosecutors).

Another economic insight from the placebo punishment framework is its focus on effective treatments and diagnoses alike. The crime-as-disease framing diagnoses crime as our social and cultural norms have defined it: as the thing to be focused upon for economic investment in the punishment remedy. However, drug addiction, gun violence, mental health and educational problems, and disparities in economic opportunity are the more accurate diagnoses. It is understandable that if a doctor diagnoses cancer, the medical priority is to immediately address that life-threatening problem; but the secondary treatment should be to do everything possible to prevent the cancer from coming back as part of a preventative medical treatment regimen. While this does not condone the use of placebo punishment policies in the past, we must now focus on economically investing in the right treatments for the right diagnoses. This calls for a multivariate investment in punishment policy into education, health policy, job training, and the “all of the above” approach that reformists have advocated for since the beginning of the mass incarceration era.286See Forman, supra note 125, at 31–32 (documenting that Black leaders in the 1980s and 1990s wanted such an “all of the above” approach but had to settle when politicians were only willing to deliver more prisons and police); Barkow, supra note 72, at 4 (calling for the same “all-of-the-above approach to crime prevention and not just [to] rely on a criminal justice response”). Further, the broader we understand this preventative medicine approach so as to avoid future need for placebos, the more we can rely on a multi-agency funding campaign involving the likes of HHS, HUD, DOE, and a host of other governmental grant and funding partners that can tackle the crime problem.287See Evans, supra note 6, at 55–57 (advocating for cooperative federalism funding from multiple federal agencies); see also Littman, supra note 143, at 1469 (calling for the support of “[f]ree-world regulatory agencies with words like ‘safety,’ ‘health,’ and ‘protection’ in their names” as “the arms of government that provide the kinds of services abolitionists hope will replace carceral responses”).

These economic interventions are not without critics, but dismantling the placebo punishment policies of mass incarceration is designed to take into account more than just dollars and cents. For instance, Marie Gottschalk has levied a series of criticisms against exclusively focusing on economic cost-benefit analysis to solve the mass incarceration crisis in part because it fails to capture the human rights deprivations of incarceration and only serves to reinforce the neoliberal zeal to further cut costs of the welfare state.288See Marie Gottschalk, The Folly of Neoliberal Prison Reform, Bos. Rev. (June 8, 2015), https://www.bostonreview.net/articles/marie-gottschalk-neoliberal-prison-reform-caught [https://perma.cc/FZ4U-QUU2]; see also Gottschalk, supra note 278, at 290–91. Just like in the 1970s and 1980s, economics will not be the only factor that leads to a generational shift in punishment policy.289See Gottschalk, supra note 278, at 291 (stating that since no single factor explains the rise of mass incarceration, no single factor such as economics will “bring about its demise”). Neither do these tools of economic accountability and reinvestment seek to hollow out the welfare state; rather, they propose the opposite. By focusing on the right diagnoses, we transform the social and cultural tradition from viewing human offenders as a cancer to viewing the institutional failures of the social welfare state as the disease to be remedied with robust reinvestment.

This Section’s focus on highlighting the ethical concerns of placebo economics adds another analytical tool to the placebo methodology of punishment. It is hard to justify mass incarcerations’ placebo focus on controlling public perception of crime based on the actual price tag for such ineffective policies. But this Section also highlights that economics play an important role in shaping public perception and expectation of punishment policies. The more something costs, the more we expect as a society and the more we resent the waste when the policies do not work. Economics can indeed shape the social and cultural perceptions of our punishment future by imposing interventions that increase costs or that refocus policy on the underlying causes of the crime/disease we seek to prevent.

IV. Beyond Punishment and Placebos

The comparisons, synergies, and differences between the medical use of placebos and legal punishment policies offer numerous insights into how we might think about and approach the biggest problems of mass incarceration, but these placebo analyses also offer several insights across criminal legal policy and society as a whole. This Part zooms out to briefly consider these broader questions and applications. Section IV.A illustrates that a placebo methodology can be valuable in legal analysis whenever there is need to compare the effectiveness of a policy with its value on changing the public’s perception of the problem it was purported to address. Section IV.B considers a few alternatives to the placebo methodology that utilize some of the same truths about punishment but according to different, but tangential, socio-medical frameworks.

A. Beyond Punishment

The placebo methodology need not be limited to punishment. Learning from medical ethics and public health literatures, placebo analyses offer an underutilized methodology that impacts theoretical framing and practical problem solving. This Section briefly considers this bigger picture by developing the placebo methodology around a few case studies to spark further scholarly inquiry.

First, it is interesting to consider how much the future use of placebos in the legal literature would contribute to other well-established methodologies. For example, political economists have developed an entire field studying the symbolic value of law and policy.290See, e.g., Edelman, supra note 15, at 189 (arguing that one of the purposes of most legislation is to provide symbolic reassurance to the public). Analyzing the law as a symbol implicates some of the same themes as the placebo methodology because they both consider how law impacts both perceptions of society and perceptions of the lawmakers enacting such symbols. Thus, scholars have studied the theoretical symbolisms of tax policy, the environment, health law, and numerous other fields.291See Aviram, supra note 11, at 90 n.106 (citing John P. Dwyer, The Pathology of Symbolic Legislation, 17 Ecology L.Q. 233, 234–36 (1990)) (discussing symbolic environmental, health, and safety laws); Steve R. Johnson, The Dangers of Symbolic Legislation: Perceptions and Realities of the New Burden-of-Proof Rules, 84 Iowa L. Rev. 413, 446–58 (1999) (discussing the forces that lead to symbolic tax laws with no real effect). One of the key differences is that this symbolic methodology generally focuses on how lawmakers avoid political accountability through passing symbolic laws; in other words, they can gain the benefit of public perception by appearing to do something meaningful through symbolic legislation, and need not be answerable for the law’s actual effects.292John W. Lee & W. Eugene Seago, Policy Entrepreneurship, Public Choice, and Symbolic Reform Analysis of Section 198, The Brownfields Tax Incentive: Carrot or Stick or Just Never Mind?, 26 Wm. & Mary Env’t L. & Pol’y Rev. 613, 620 (2002) (describing how “symbolism” is used in the political science literature to mean the use of symbols to demonize political enemies and gain political advantage). The focus on political accountability and shirking can certainly add to the placebo methodology, but the methodology focuses more on the effectiveness versus perception value proposition along with the ethical considerations of policy justifications.

Behavioral economics walks a parallel path by studying how social contexts and heuristics impact decision-making.293See Edward Cartwright, Behavioral Economics 3–4, 10–12 (2011) (explaining the basic precepts of behavioral economics and its differences with the rational actor standard economic model). This discipline adds tremendous explanatory value to a host of legal and policy decisions by studying the extent to which social norms can contribute to irrational decisions.294See id. See generally Richard H. Thaler, Misbehaving: The Making of Behavioral Economics (2011) (applying the concepts of behavioral economics to a host of human decision-making processes, including buying stocks, assigning faculty offices, and home finances). Feel-enomics—or how people feel about the economy—is often more important than the actual economy.295See, e.g., Roland T. Rust & Ming-Hui Huang, The Feeling Economy: How Artificial Intelligence Is Creating the Era of Empathy 2 (2021) (arguing that the rise of artificial intelligence has allowed human decisionmakers to focus less on rational thinking and more on feelings); Christina Pazzanese, We’ll Gather Together—Even Though Everything Seems So Much More Expensive, Harv. Gazette (Nov. 21, 2023), https://news.harvard.edu/gazette/story/2023/11/why-americans-feel-inflation-economy-are-much-worse-than-they-are [https://perma.cc/2HNX-F9V6] (explaining why Americans often feel that the economy is worse than it actually is). For example, negotiators will seek to punish their adversary when they perceive unfair treatment, which can actually lead to a negative result for both parties.296See Johan Almenberg, Anna Dreber, Coren L. Apicella & David G. Rand, Third Party Reward and Punishment: Group Size, Efficiency, and Public Goods, in Psychology of Punishment: Psychology of Emotions, Motivations and Actions 73, 73–88 (Nicolas M. Palmetti & Jennifer P. Russo eds., 2011) (citing the literature that covers social and psychological experiments of punishing adverse parties in what is designed to be mutually beneficial negotiations). Thus, a person’s perception of what is socially right and wrong behavior can impact their decision-making, which can lead to net-negative results for all.297See id. at 74 (“Shared beliefs of what constitutes appropriate behavior greatly affect human decision making in many social domains, ranging from dress codes and marriage practices to personal conflicts and public policy.”). Heuristics have also been an important contribution of behavioral economics, which study the mental shortcuts we use when making snap decisions about people, the natural world, and social conventions that can lead to erroneous assumptions.298See Amos Tversky & Daniel Kahneman, Judgment Under Uncertainty: Heuristics and Biases, 185 Sci. 1124, 1124–30 (1974) (discussing common errors in the assessment of probabilities and the prediction of values). This spans the gamut of making snap judgements about a person’s profession, their guilt in committing some offense, or other attributes based on stereotypes that function as judgmental heuristics.299See, e.g., Janis E. Jacobs & Maria Potenza, The Use of Judgment Heuristics to Make Social and Object Decisions: A Developmental Perspective, 62 Child Dev. 166, 166 (1991) (citing a study that found that people used personality descriptions and stereotypes when asked to assess their likely profession); Galen V. Bodenhausen, Stereotypes as Judgmental Heuristics: Evidence of Circadian Variations in Discrimination, 1 Psych. Sci. 319, 320–21 (1990) (finding that “stereotypes function as judgmental heuristics and, as such, are likely to be more influential under circumstances in which people are less motivated or less able to engage in more systematic and careful judgment” as applied in studies involving the misbehavior of college students and their guilt). Heuristics are often informed by learning social cues and stereotypes about different classes of people, and this social context impacts a person’s perception of others at the danger of making a bad and inaccurate judgment call.300See, e.g., Bailey Maryfield, Just. Rsch. & Stat. Ass’n, Implicit Racial Bias, 2–6 (2018) (finding that implicit biases negatively impacted criminal justice outcomes for Black Americans).

The similarities between behavioral economics and the placebo methodology of criminal punishment should not go unnoticed. Behavioral economics focuses on social contexts and operationalizes the importance of a decisionmaker’s social perception. The placebo methodology benefits from this literature, but it prioritizes public perception as opposed to that of the decisionmaker. Heuristic judgements are often a theme in criminal legal scholarship addressing racial profiling and sentencing disparities, and this relates to how the crime-as-disease framing characterizes certain people and communities as being part of the crime problem.

Within this broader context of using these themes about perception and accountability in legal scholarship, placebos have found some limited value. Aviram has already used slightly different placebo methods to analyze travel regulations.301See Aviram, supra note 11, at 56–59. Malani has also convincingly applied placebo methods to analyze pharmaceutical regulations, health law, consumer protection, and torts.302See Malani, supra note 10, at 435–65. Others have invoked the language and terminology of placebos but often as a hollow comparison meant to denote an ineffective legal policy in fields such as financial regulation,303See, e.g., Florian Heeb, Julian F. Kölbel, Stefano Ramelli & Anna Vasileva, Is Sustainable Finance a Dangerous Placebo?, 2023 Swiss Fin. Inst. Rsch. Paper No. 23-46, at 2; Usha Rodrigues & Mike Stegemoller, Placebo Ethics: A Study in Securities Disclosure Arbitrage, 96 Va. L. Rev. 1, 10 (2010). labor and employment,304See Seth Katsuya Endo, Neither Panacea, Placebo, Nor Poison: Examining the Rise of Anti-Unemployment Discrimination Laws, 33 Pace L. Rev. 1007, 1008 (2013); Anne O’Rourke & Sarah Kathryn Antioch, Workplace Bullying Laws in Australia: Placebo or Panacea?, 45 Common L. World Rev. 3, 21 (2016). and environmental policy.305See Ruth Greenspan Bell, The Kyoto Placebo, 22 Issues Sci. & Tech. 28, 28 (2006); see also Orsini & Saurette, supra note 72, at 240 (explaining the common, yet shallow, placebo analogies of public policy).

Narrowing this to the criminal legal context, there are myriad values of the placebo methodology outside of studying mass incarceration. This could extend to other punishment policies such as whether placebo policies might factor into the state of e-carceration and bail reform. In the same way that mass incarceration policies have been used to control public fear and perception, it might be possible that similar goals are imbedded in the pre-conviction bail context and even the post-conviction surveillance context.306Controlling public fear has been associated with bail reform and policy since at least the early 1980s. See, e.g., John S. Goldkamp, Danger and Detention: A Second Generation of Bail Reform, 76 J. Crim. L. & Criminology 1, 16, 53–54 (1985) (acknowledging the connection between the public’s heightened fears of crime and pre-trial detention policies); Steven R. Schlesinger, Bail Reform: Protecting the Community and the Accused, 9 Harv. J.L. & Pub. Pol’y 173, 189 (1986) (citing resources from the early 1970s and 1980s discussing how preventative incarceration can help “lessen the oppressive fear of crime that hangs so heavily over the American society”). Courts are willing and ready to add to this literature, often looking for unique ways to characterize problems as placebos in the punishment regime.307See, e.g., State v. Williams, 550 A.2d 1172, 1216 (N.J. 1988) (Handler, J., concurring) (describing the majority’s failure to identify prosecutorial misconduct as “a placebo for the public,” because it allowed the public to believe justice was being served when in reality it allowed pernicious prosecutorial practices to continue); Rose v. State, 724 S.W.2d 832 (Tex. Crim. App. 1986) (describing problems of sentencing by saying that “[t]he Legislature has heeded the clamor of the mob; it has cast an ineffectual placebo into the public arena; it has quelled the outcry but avoided an effective solution; it has committed legislative cowardice”).

Policing is also a ripe field that might benefit from placebo methodologies. Deterrence advocates are often at odds with critical race theorists and abolitionists in this debate, disagreeing about the effectiveness of police presence on catching offenders and deterring future crime. While there are convincing criminological studies suggesting that more police officers can deter crime if it increases an offender’s likelihood of getting caught,308See Christopher Lewis & Adaner Usmani, The Injustice of Under-Policing in America, 2 Am. J.L. & Equal. 85, 99 (2022) (stating that “[t]he empirical literature on deterrence is unequivocal that increasing the size of police forces is a much more efficient way to prevent crime than increasing the length of prison sentences”); see also supra note 95 and accompanying text. many Critical Race Theory (“CRT”) scholars argue that policing comes at too heavy a cost for poor and minority communities subjected to surveillance, excessive use of force, and police killings.309See Paul Butler, Chokehold: Policing Black Men 9–13, 81–83 (2017) (explaining the use of criminal law and policing to control and subjugate Black men); Devon W. Carbado, Blue-on-Black Violence: A Provisional Model of Some of the Causes, 104 Geo. L.J. 1479, 1485 (2016) (conveying the idea that frequent police encounters in the Black community increase exposure of those communities to police violence). A placebo analysis of policing has some precedent, since the American Public Health Association adopted a policy recognizing policing as a public health issue.310See Littman, supra note 143, at 1470; see also Advancing Public Health Interventions to Address the Harms of the Carceral System, End Police Violence Collective (Oct. 26, 2021), https://www.endingpoliceviolence.com [https://perma.cc/742C-53VJ] (containing the text of a resolution passed at an American Public Health Association conference). This recharacterization paves a smoother path for a placebo analysis that may focus on how policing impacts perceptions of public safety versus its actual efficacy on public safety; this would, of course, include the nuances of racial politics such as considerations of who the police are meant to keep safe, who benefits from feeling more safe, and who suffers the social costs and consequences of police presence.

This Section is not meant to be exhaustive, but it illustrates the broader appeal and applicability of deeper examinations and use of placebo methodologies in legal scholarship. The ongoing discussions that pit the objective effectiveness of policies against how the police impact public perception of the problem will continue to shape future decision-making. By adding socio-medical ethics and policy solutions to these discussions, multiple literatures can benefit from the placebo methodology as deeper considerations of the law’s value and continued role in society.

B. Beyond Placebos

As this Article has highlighted, comparing punishment policies to a medical placebo treatment is a worthwhile methodology but one that is not a perfect analogy. This Section considers a number of alternative socio-medical framings that also have value for future consideration. Each of these alternative framings expand on different aspects of our social understanding of punishment in ways that highlight latent truths that might impact how we should think about future policy.

Perhaps the most analogous framing is thinking about punishment as a penicillin treatment. The core value of this alternative is that it highlights the changing efficacy of punishment policies across time. Penicillin is an antibacterial treatment that has significant diminishing returns. As penicillin continues to be administered to a patient and a broader population, bacteria will begin forming new strains that are resistant to this treatment.311See Patricia T. Alpert, Superbugs: Antibiotic Resistance Is Becoming a Major Public Health Concern, 29 Home Health Care Mgmt. & Prac. 130, 130 (2016) (discussing the process of antibiotic treatment’s role in the evolution of resistant superbugs). These diminishing returns are shared among many antibacterial treatments, which is why many doctors do not prescribe the treatment long enough for any leftover bacteria to develop immunity. These so-called “superbugs” are incredibly dangerous because they can withstand antibacterial treatments, leaving very few options to treat them otherwise.312See Christopher T. Walsh & Michael A. Fischbach, New Ways to Squash Superbugs, 301 Sci. Am. 44, 45, 47–49 (2009) (discussing the rise and resistance of superbugs and describing the cutting-edge research being conducted to fight them).

As discussed in Section II.B, there are indeed diminishing returns in the mass incarceration context. Many scholars believe that harsh incarceration policies may have been necessary in a time when violent crime was high but would now argue that these same policies are ineffective and potentially damaging to society in the modern age.313See supra notes 123–26 and accompanying text. Perhaps, like penicillin, crime and those who commit it have adapted. People who are sent to prison have an incredibly high recidivism rate in part because prison has been known to increase offenders’ access to criminal networks.314See Erica Bryant, Why Punishing People in Jail and Prison Isn’t Working, Vera Inst. (Oct. 24, 2023), https://www.vera.org/news/why-punishing-people-in-jail-and-prison-isnt-working [https://perma.cc/452P-SPEK] (citing studies showing that incarceration increases recidivism). See generally Jens Soering, An Expensive Way to Make Bad People Worse: An Essay on Prison Reform from an Insider’s Perspective (2004) (discussing the ways that prisons contribute to hardening offenders at an enormous cost to society). Therefore, the very people we are trying to quarantine from society in such a medical model of punishment are the very people the criminal justice system is responsible for turning into so-called “super predators” as many in the 1990s believed.315See supra notes 136–137 and accompanying text.

If this penicillin model has any practical value, the most important thing we can learn is that we must transition away from the penicillin of prisons. Perhaps prisons served their role in the 1980s and 1990s when violent crime was high. But like penicillin, this “treatment” is not effective over long periods of time; in fact, it is actually dangerous if used long-term. Instead, using prisons effectively to mitigate the growth of crime is important, and now we are in an era of transitioning to second-order treatments meant to ensure the infection or social disease of crime can be managed long-term.

Another alternative framing in the same vein is to consider punishment as an addictive drug. This controversial concept results in quite a different set of considerations in which there is very little benefit and almost entirely unjustifiable costs. For many abolitionists and progressive reformers, mass incarceration might fit within this description. It is a social institution to which society seems to be addicted. Every time we attempt to make reforms, the same system reemerges, and we go back to our carceral fix. Worst yet, just like a drug, many in our society realize how bad mass incarceration is.316See New Polling Shows Criminal Justice Reform Is a Winning Issue for 2024 Election, FWD.us (Oct. 9, 2024), https://www.fwd.us/news/new-2024-polling-demonstrates-ongoing-support-for-criminal-justice-reform [https://perma.cc/8T95-HXZY] (finding that “76% of Republicans, 82% of Independents, and 85% of Democrats” support criminal justice reform, with strong support for reducing prison and jail populations). Yet we cannot help ourselves. We are addicted to the retributive ideas, the incapacitation logic, and the dopamine feelings of safety. If we honor the alliterative patterns of this Article, we might portray this framing of punishment as a type of poison. The cost of continuing to ingest such a substance is a slow assured death given the harm it is causing the body politic.

This framing is a bit more radical, but it may nevertheless have some kernel of truth to it. How then does this make us think about punishment and mass incarceration? Like an illicit substance, we must break our addiction from these policies. But not even an abolitionist would support such a cold-turkey approach in abolishing prisons. Prison abolition is a generational project that will take years and even decades to accomplish,317See Jamelia Morgan, Responding to Abolition Anxieties: A Roadmap for Legal Analysis, 120 Mich. L. Rev. 1199, 1213 (2022) (describing the long-term goals and commitments of the abolitionist movement); Dorothy E. Roberts, The Supreme Court, 2018 Term—Foreword: Abolition Constitutionalism, 133 Harv. L. Rev. 1, 114 (2019) (“Prison abolition is a long-term project that requires strategically working toward the complete elimination of carceral punishment.”). which is comparable to a long-term weaning off from the substance. Perhaps we can make annual benchmarks and create a five-, ten-, and twenty-year plan to gradually lower the incarceration rate in ways that will not result in millions of offenders being released back into society all at once.

But even the most stalwart survivor who has dedicated themselves to sobriety knows that relapse is only one moment of weakness away. Whenever crime ticks up, even infinitesimally, we see people rallying for a return to tough-on-crime principles.318See Abdallah Fayyad, Lawmakers Are Overreacting to Crime, Vox (Apr. 25, 2024), https://www.vox.com/policy/24139552/crime-rates-falling-tough-laws-mass-incarceration [https://perma.cc/7VHH-4KM7] (discussing that even as crime rates have been falling, overblown media reports on a few instances of crime have caused lawmakers to crack down and pass traditional tough-on-crime policies); Amanda Hernández, ‘Tough-on-Crime’ Policies Are Back in Some Places That Had Reimagined Criminal Justice, Stateline (Mar. 18, 2024), https://stateline.org/2024/03/18/tough-on-crime-policies-are-back-in-some-places-that-had-reimagined-criminal-justice [https://perma.cc/QLC9-DKDU] (discussing how communities such as Minneapolis, Portland, and those that experimented with criminal justice reform are responding to “knee-jerk” reactions with minor crimes and rolling back such reforms). It only takes the slightest trigger of crime—whether it be a summer crime wave or even just one particularly egregious crime that gets news coverage—to make society crave retributivism, incapacitation, and the feeling of safety and justice that comes with locking people up and throwing away the key.

Another fascinating socio-medical framework to consider is malingering by proxy, which describes a psychological condition in which a person tells others that their own child or loved one is sick in order to garner sympathy, attention, and financial gain.319See Adam Amlani, Gurinder S. Grewal & Marc D. Feldman, Malingering by Proxy: A Literature Review and Current Perspectives, 61 J. Forensic Sci. S171, S171 (2016) (defining malingering as a psychological condition in which the person intentionally falsifies some physical or psychological disease or symptoms to achieve tangible personal gain, and that doing this by proxy means the person playing the “sick” role is somebody other than the malingerer). This is most prevalent among parents, who will tell others in the community that their child is sick.320See, e.g., Eden Gillespie, Malingering by Proxy: Parents Who Make Kids Sick for Profit, N. Z. Herald (May 26, 2017), https://www.nzherald.co.nz/lifestyle/malingering-by-proxy-parents-who-make-kids-sick-for-profit/FM2XC22SVW2UITTW3X232N3KY4 [https://perma.cc/8D3V-E2DY] (describing individual stories of a mother who told her community that her child had cancer in order to garner more than $43,500 in donations, which included shaving the child’s head and forcing the child to wear bandages and a face mask). The parent will make their otherwise healthy child appear sick by mimicking symptoms, such as shaving the child’s head to mimic hair loss suffered by chemotherapy, or by forcing the child to wear bandages or a face mask to mimic injuries or an immune-compromised disorder.321See id. By mistreating their child in this way, parents often hope to garner sympathy from the community, to be seen as a hero in their own right for taking care of their sick child, and even to ask for donations to help them pay for fake medical treatments.

Malingering is an interesting framing when conceptualizing the role of politicians, law enforcement, prosecutors, and others who are delivering mass incarceration services to the public. Under the placebo framework, these actors were likened to doctors prescribing treatment; but unlike doctors, these actors were deceiving the public for political gain. Under a malingering framing, these actors would similarly be deceiving the public for their own gain by trying to convince the public of the fake malady of criminal behavior in a way that garners public support for their cause. Like the placebo methodology, this framing is rough around the edges and requires the reader not to lose the forest for the trees. Instead of looking for exact 1:1 comparisons, the big picture takeaway is that this framing highlights the perverse incentives of politicians and decisionmakers in advocating for and convincing the public about the merits of harsh punishment policies.

The medical literature is still exploring the level and types of treatment for malingerers, having to confront whether this condition should be considered a psychological disorder.322See, e.g., Christopher Bass & Derick T. Wade, Malingering and Factitious Disorder, 19 Prac. Neurology 96, 104 (2019) (concluding that there is little evidence and few studies about effective ways to treat people with these disorders and that many patients continue to feign sickness for many years); Amlani et al., supra note 319, at S176 (suggesting a detailed fact-finding endeavor to confirm deception of symptoms, a team-based approach to treating the malingerer, and potential referral to child protective agencies to secure the safety of the proxy). Regardless of this medical question, malingering by proxy is an incredibly harmful antisocial behavior that harms both the communities subject to the false information and the proxy, a usually-vulnerable party who must pretend to be sick. The takeaway from such a framing would be to hold our lawmakers, police officers, prosecutors, and all others who are using deceptive means (whether purposely, knowledgeably, recklessly, or negligently)323See supra notes 203–207 and accompanying text. accountable for their mischaracterizations that have damaged the community and the public trust.

This Section is meant to be creative, thought-provoking, and controversial. In the same way that the placebo methodology challenges the status quo and our assumptions about mass incarceration, the framings of penicillin, illicit drugs, and malingering offer brief vignettes of alternative ways to highlight different aspects of the modern punishment crisis and how to resolve it. This Section illustrates the value of socio-medical tools to break free of stale approaches to crime and punishment, and I hope it sparks new discussion and theories of the criminal legal system to push the boundaries of what is possible toward reformist interventions.

Conclusion

The medical study of placebos offers a unique approach to theorizing criminal punishment. Because crime is often considered a social disease and punishment is seen as its treatment, mass incarceration policies truly deliver a placebo impact. The placebo methodology captures the importance of the social and cultural context required for mass incarceration policies to control the public’s fear and perception of crime, without having commensurate value on impacting public safety.

This approach offers multiple innovations that raise interesting questions about the future of mass incarceration policies. The interdisciplinary insights from medical ethics provide a stark picture of the sheer lack of justifications for using placebo policy in the punishment context. The negative social costs and harm, malevolent use of deception, the pervasive use of experimentation toward harsher punishment, and the perverse economic incentives require us to abandon placebo policies and move toward punishment practices that can actually make us safer by focusing on what causes the crime/cancer problem through preventative medical and social means.

This is the double-edged sword of the placebo methodology. It reveals the latent problems of punishment policies, but it also provides insight into avoiding the same placebos in the coming generation. This Article hopes to contribute to the larger conversation, ensuring that the sword is slicing in the right direction toward a safer, fairer, and more justified punishment future.

 

98 S. Cal. L. Rev. 513

Download

*Professor of Law, Washington University School of Law. I thank Erin Blondel, Vincent Chiao, Chad Flanders, Daniel Fryer, Trevor Gardner II, Fareed Nassor Hayat, Ben Levin, Angelo Petrigh, Sandra Mason, Ion Meyn, Mark Pickering, Ji Seon Song, and Kit Wellman for helpful thoughts and comments. In addition, I extend my thanks to the community of scholars that provided valuable comments and feedback at the University of North Carolina School of Law, the John Mercer Langston Writing Workshop, CrimFest!, the Decarceration Works-in-Progress Workshop, and the St. Louis Criminal Law Theory Workshop. I also thank Sydney Everett for her excellent research assistance.