Filtered Dragnets and the Anti-Authoritarian Fourth Amendment

Filtered dragnets are digital searches that identify a suspect based on the details of a crime. They can be designed to withhold information from law enforcement unless and until there is a very high probability that the individual has committed the offense. Examples today include DNA matching, facial recognition from photographs or video of a crime, automated child sexual abuse material detection, and reverse geolocation (geofence) searches. More are sure to come, and their wide-scale use will be irresistible to improve the low rates of criminal detection that currently afflict many communities.

However, filtered dragnets imperil society precisely because they detect crime too well. Sudden increases in the detection of criminal conduct will intensify the pathologies of American criminal justice: namely, that too many marginally harmful acts are criminalized, crimes are punished too harshly, and police and prosecutors have too much discretion. If nearly everybody commits some technical violation of criminal law that can be easily detected and harshly punished, all Americans will be at the mercy of the constable’s pity.

These threats are not well constrained by current Fourth Amendment jurisprudence, based on privacy rights, because filtered dragnets detect crime without revealing irrelevant details. Thus, Fourth Amendment theory and doctrine must strengthen the anti-authoritarian objectives endowed in its roots. A search conducted with a filtered dragnet should be considered reasonable only if it is administered in an evenhanded manner, and a subsequent seizure of a person is reasonable only when the misconduct is abhorrent enough to justify arrest and imprisonment.

INTRODUCTION

Nearly forty years ago, Justice Brennan asked his colleagues, who had just given a constitutional stamp of approval to the drug-sniffing dog, to imagine a device “that, when aimed at a person, would detect instantaneously whether the person is carrying cocaine.”1United States v. Jacobsen, 466 U.S. 109, 138 (1984) (Brennan, J., dissenting). Justice Brennan went on to criticize the majority for ignoring not only the privacy interest that is intruded upon, but also the accuracy of the technique (or lack thereof) and “whether the surveillance technique is employed randomly or selectively.” Id. at 140. If the device could detect the presence of cocaine inside a building, “there would be no constitutional obstacle to the police cruising through a residential neighborhood and using the device to identify all homes in which the drug is present.”2Id. at 138. For a thoughtful discussion of this dissenting opinion, see Kiel Brennan-Marquez, Big Data Policing and the Redistribution of Anxiety, 15 Ohio State J. Crim. L. 487, 491–92 (2018). He believed the prospect of police having a tool of near-perfect detection presented a catastrophic threat that the courts have a duty to stop.

We are not too far off from this scenario anymore,3With the exception of conduct that takes place on the Internet and the geolocation of smart devices, the vast majority of human affairs still occurs outside the realm of digitized documentation. That said, sensor technologies, facial recognition, and biometric surveillance are beginning to convert more offline activities into tracked or trackable affairs. Perhaps the technology in development that is most analogous to Justice Brennan’s cocaine device are quantum magnetometry sensors that are sensitive enough to detect materials through walls and underground. See Chris Jay Hoofnagle & Simson L. Garfinkel, Law and Policy for the Quantum Age 31–76 (2022). and some strategies already in use by law enforcement and intelligence agencies are similar to Brennan’s machine. Examples include DNA matching, facial recognition from photographs or video of a crime when it was in progress, automated child sexual abuse material detection, and reverse digital searches (where police use information known about the crime, such as location, timing, or special instrumentalities, to cross-check against service provider data in order to identify a suspect). Many more of these investigative techniques are sure to come, especially if or when the Internet of Things reaches its potential by placing increasingly powerful sensors on nearly every machine.

Twenty-first century policing will increasingly use data collected from tracking and sensing technologies to conduct investigations that work backwards. Law enforcement will use the particulars of a crime as a “fingerprint,” so to speak, to determine who should belong in the pool of suspects. Unlike the standard dragnet, which permits law enforcement to observe large amounts of data and to choose their targets, filtered dragnets force investigations to focus on the evidence of a crime. Computers will automatically scan through data without exposing it and will make a disclosure only when there is probable cause to believe that a person’s data matches the signature of the crime. Moreover, even when data is disclosed, filtered dragnet programs can be designed so that the only data revealed is potentially relevant data; extraneous details can be withheld.

When surveillance technologies meet all these benchmarks—that is, when (1) they are used to find an individual related to a crime (rather than to find a crime related to an individual), (2) when they report details from an otherwise private database only after meeting a high threshold of confidence (e.g., probable cause or higher), and (3) when they withhold details that are ex ante unlikely to be relevant to the current criminal investigation, the nature of that surveillance is different from other types of police work. Filtered dragnets, as I will call them, are structured to avoid many problems traditionally associated with mass surveillance.

Fourth Amendment theory and reasoning is just starting to find its legs in digital search cases,4See Carpenter v. United States, 138 S. Ct. 2206, 2209 (2018) (accessing several days’ worth of geolocation data constitutes a search that will ordinarily require a warrant); United States v. Jones, 565 U.S. 400, 413–15 (2012) (Sotomayor, J., concurring) (arguing that GPS tracking should be a search irrespective of whether a tracking device has physically intruded into a protected area). but filtered dragnets will destabilize criminal procedure law again. They will whittle down most of the privacy rationales for Fourth Amendment protection. Mounting a Fourth Amendment defense will require a litigant to convincingly argue that even though the defendant very likely committed a crime, and even though the police did not see or have discretionary access to data for any other persons and did not even have irrelevant data about the defendant for that matter, the search was nevertheless unreasonable. That sort of privacy über alles argument might work for crimes of questionable legitimacy—drug possession, for example—but it won’t work in the context of universally reviled conduct like murder.

What is more, filtered dragnets may reduce privacy intrusions on net, as compared with current investigation techniques, because they can remove many people from the scope of suspicion who would otherwise become targets of investigation. In other words, filtered dragnets break the privacy-security trade-off because they simultaneously increase criminal detection and privacy. As Bennet Capers has explained, they may be a useful tool to simultaneously tackle under-protection and over-policing problems.5I. Bennett Capers, Techno-Policing, 15 Ohio State J. Crim. L. 495, 496 (2018) (“The task is to reimagine Big Brother so that he not only watches us; he also watches over us—to reimagine Big Brother as protective, and as someone who will be there to tell our side of the story.”); I. Bennett Capers, Crime, Surveillance, and Communities, 40 Fordham Urb. L.J. 959, 989 (2013). For a discussion of the moral injuries when police cause indignities and abuse, see Eric J. Miller, The Moral Burdens of Police Wrongdoing, 97 Res Philosophica (2020). Outright bans of these technologies, as have been advocated in many corners,6See, e.g., Antoaneta Roussi, Resisting the Rise of Facial Recognition, 587 Nature 350, 352 (2020) (quoting Woodrow Hartzog, who described facial recognition technology as the “most dangerous ever to be invented”); Kate Conger, Richard Fausset & Serge F. Kovaleski, San Francisco Bans Facial Recognition Technology, N.Y. Times (May 14, 2019), https://www.nytimes.com/2019/05/14/us/facial-recognition-ban-sanfrancisco [https://perma.cc/858W-&M6N] (quoting ACLU attorney Matt Cagle, praising the ban as “forward-looking and looks to prevent the unleashing of this dangerous technology against the public”); Matthew Guariglia, Geofence Warrants and Reverse Keyword Warrants Are So Invasive, Even Big Tech Wants to Ban Them, Elec. Frontier Found. (May 13, 2022), https://www.eff.org/deeplinks/2022/05/geofence-warrants-and-reverse-keyword-warrants-are-so-invasive-even-big-tech-wants [https://perma.cc/VG22-ENMH]. would be irresponsible.7Undeterred crime is oppressive and unequal, too. James Forman Jr., Locking Up Our Own: Crime and Punishment in Black America 96­­–99 (2018); Alexandra Natapoff, Underenforcement, 75 Fordham L. Rev. 1715, 1715 (2006).

Nevertheless, even if filtered dragnets detect crime and nothing else, they pose serious social risks that Fourth Amendment law and scholarship are ill equipped to handle: What happens to Fourth Amendment theory and the practice of criminal justice if nearly every crime could be detected?

In the late 1990s, Larry Lessig asked this very question.8Lawrence Lessig, Code and Other Laws of Cyberspace 18 (1999) (“This difference complicates the constitutional question. The [technology’s] behavior is like a generalized search in that it is a search without suspicion, but it is unlike the paradigm case of a generalized search in that it creates no disruption of ordinary life and finds only contraband. . . . Is [it] constitutional? That depends on your conception of what the Fourth Amendment protects. . . . The paradigm case cited by the framers does not distinguish between these two very different protections. It is we, instead, who must choose.”). He anticipated that digital technologies may create a wedge between the privacy and anti-authoritarian rationales for criminal procedure. But most Fourth Amendment scholars do not even recognize a schism between privacy and anti-authoritarian goals. Instead, they continue to focus on privacy as the key constraint on any police activity that leverages large amounts of personal data. The scholars who have recognized liberty and anti-authoritarianism as a Fourth Amendment lodestar have insisted that all technology-assisted surveillance is a tool of abusive state power per se.9Paul Ohm, The Fourth Amendment in a World Without Privacy, 81 Miss. L. J. 1309, 1334–38, 1346 (declaring that considerations of power seem to be “the amendment’s essence, not merely a proxy for something deeper,” but then equating abuses of state power with the ability to solve crimes faster); David Alan Sklansky, Too Much Information: How Not to Think About Privacy and the Fourth Amendment, 102 Calif. L. Rev. 1069, 1120 (2014) (advocating for Fourth Amendment protection against any electronic surveillance that fails to leave a sphere of refuge or autonomy for the individual); Andrew Guthrie Ferguson, Surveillance and the Tyrant Test, 110 Georgetown L. J. 205, 266 (2021). But see Richard M. Re, Imagining Perfect Surveillance, 64 UCLA L. Rev. Discourse 264, 274–276, 281–285 (2016). Re’s essay, set in the year 2026 and describing a fictitious tool of perfect surveillance and crime reporting, anticipates the need for courts to shift the focus of Fourth Amendment law to the substance of criminal law. As a result, Fourth Amendment scholars lump filtered dragnets with all other surveillance and advocate for the strictest access controls, guaranteeing the continuation of a low rate of criminal detection.

This is the wrong course. The threat from filtered dragnets is tyranny, and the Fourth Amendment will be more effective and coherent if we recognize that. Filtered dragnets will dramatically increase the detection of crime, and this will intensify existing pathologies in American criminal justice that have little to do with privacy. Namely, we have too many crimes, too much punishment, and too much police and prosecutorial discretion. These problems jointly produce the risk of authoritarian power. An overly expansive criminal code paired with harsh penalties ensures that nearly everybody could be subjected to incarceration.10Glenn Harlan Reynolds, Ham Sandwich Nation: Due Process When Everything Is a Crime, 113 Colum. L. Rev. Sidebar 102, 103–04 (2013). See generally Harvey A. Silvergate, Three Felonies a Day: How the Feds Target the Innocent (2011). When the state also has unchecked power to choose where and when to investigate within the ocean of criminal-but-typically-ignored conduct, the populace is at the mercy of the state’s will.11Filtered dragnets, like any tool that cheaply and accurately finds evidence of crime, will not necessarily cause the state to abuse its power, but it will certainly give legislatures, police, and prosecutors a mechanism to abuse power more efficiently if they so choose.

Today, the criminal justice equilibrium rests on an unspoken compromise. The state has broad substantive law, harsh punishment, and unchecked discretion, it is true, but the populace has privacy rights that nearly guarantee low detection, even when police are highly motivated. When filtered dragnets give police near-perfect detection, the bargain has to be renegotiated.

This Article proposes a new grand bargain for Fourth Amendment law: the Supreme Court should recognize filtered dragnets as a legitimate and even desirable tool for criminal investigations. But constitutional rules should guarantee that the substance of American criminal law will be limited to conduct that is commonly recognized as heinous, that the severity of the punishment fits the reprehensibility of the crime, and that the enforcement of criminal laws is equitable and nonarbitrary.12In other words, as described in detail infra Part III, reversing Smith v. Maryland, 442 U.S. 735 (1979) and the third party doctrine will be of minimal relevance to the just use of filtered dragnets. Instead, cases that permit carceral arrest for minor misconduct (Atwater v. City of Lago Vista, 532 U.S. 318 (2001)) and that give police unfettered discretion in investigation and enforcement decisions (Whren v. United States, 517 U.S. 806 (1996)) are of much greater consequence. See infra Part V. Without these civil rights, if the substance of criminal law is left as broad and vague as it is today,13On vagueness and overbreadth, see Silvergate, supra note 10, at XI–XVI. See generally Risa Goluboff, Vagrant Nation (2016); Kiel Brennan-Marquez, Extremely Broad Laws, 61 Ariz. L. Rev. 641 (2019). and if penalties and the impact of prison are as debilitating as they are now, filtered dragnets would give the government the means of exercising tyrannical control through the omnipresent threat of criminal enforcement and the power of discretionary clemency.

This Article proceeds as follows: Part I describes some filtered dragnets that are already in use and lays out the essential features that distinguish them from other investigation tools.

Part II describes the potential social benefits that can be gained from the responsible use of filtered dragnets.

Part III describes the scholarship and caselaw challenging the constitutionality of filtered dragnets on privacy grounds and disagrees with it. By most common-sense meanings of privacy, filtered dragnets are in fact much more private than the sorts of investigations that routinely occur.

Part IV shows that the threat of filtered dragnets comes not in the form of privacy but in the form of tyranny. Perfect detection of crime in a system where criminal statutes are sprawling and criminal penalties are harsh will either create a country of convicts or will give government too much power to engage in selective leniency.

Part V reinterprets the Fourth Amendment prohibition of unreasonable searches and seizures to fit the criminal justice problems that emerging surveillance technologies will cause. The reasonableness of a seizure should depend on whether the defendant’s conduct truly warrants criminal liability and penalties. The reasonableness of a search should depend on both expectations of privacy and on evenhanded investigation practices.

Part VI explains why the Constitution, and the Fourth Amendment in particular, are well suited to carry out this shift even though it would mark a departure from twentieth century precedent.

The agenda laid out in this Article is ambitious—almost embarrassingly so. What I propose here would require a seismic shift in Fourth Amendment principles that would cross the procedural/substantive divide.14Other scholars have advocated for a Fourth Amendment theoretical inquiry that breaks out of a purely procedural lane. Morgan Cloud, Pragmatism, Positivism, and Principles in Fourth Amendment Theory, 41 UCLA L. Rev. 199, 200 (1993) (“The fragmentation of constitutional theory in law school curricula and academic scholarship is nowhere more evident than in the isolation of the fourth amendment from broad currents of contemporary jurisprudence. . . . This isolation has impoverished both fourth amendment theory and general constitutional theory alike.”); William J. Stuntz, The Substantive Origins of Criminal Procedure, 105 Yale L.J. 393, 393–411 (1995). Given that, I take comfort in the fact that I am not painting on blank canvas. This project is a remix of themes developed by Bill Stuntz,15William J. Stuntz, The Collapse of American Criminal Justice (2011). Bennett Capers,16Capers, supra note 5. Elizabeth Joh,17Elizabeth E. Joh, Discretionless Policing: Technology and the Fourth Amendment, 95 Calif. L. Rev. 199 (2007). Bernard Harcourt and Tracey Meares,18Bernard E. Harcourt & Tracey L. Meares, Randomization and the Fourth Amendment, 78 U. Chi. L. Rev. 809 (2011). Chris Slobogin,19Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. Chi. L. Rev. 317 (2008). Mark Kleiman,20Mark A. R. Kleiman, When Brute Force Fails (2009). and many others. Even so, it is awfully presumptuous to suggest courts might start invalidating criminal laws or sentencing rules using a new-fangled conception of the Fourth Amendment. But I will suggest it anyway because it is the only desirable and realistic option. The criminal justice system needs to be transformed in a manner that accepts much greater levels of detection in exchange for many fewer criminal prohibitions and punishments. It is a trade that has to be executed simultaneously in order to avoid disastrous consequences.21Criminal liability and sentencing cannot be reduced unless and until the detection of serious crimes is improved. Otherwise, the inevitable crime wave will turn on the backlash machinery of increased sentences and bloated criminal codes. On the other hand, unleashing filtered dragnet technologies without fixing existing statutes and sentences will expose many more people to criminal liability than is justified and will create too many opportunities for biased or opportunistic enforcement. See infra Part V. No legislative or local government process could pull off a massive rights horse trade of the sort that is required. It can only be accomplished through the style of landmark constitutional cases that, every generation or so, help realign Fourth Amendment operational rules with the ultimate purpose of Fourth Amendment protection.22I am referring here to the transition the Fourth Amendment made from a protection of property interests to a protection of privacy following Katz v. United States, 389 U.S. 347 (1967). See discussion infra Part V.

I.  WHAT ARE FILTERED DRAGNETS?

The progenitors of filtered dragnets have been around for a while. Fingerprinting analysis is a well-known and time-honored method of backwards investigation where the facts from the scene of a crime (the fingerprint markings) are cross-checked against a large stockpile of information in order to make a fairly confident match to a particular suspect.23Davis v. Mississippi, 394 U.S. 721, 727 (1969). Police dogs are another example.24Illinois v. Caballes, 543 U.S. 405, 409 (2005). We know that the mind-boggling sensitivity of a dog’s nose is such that, if it could talk, it could reveal vast amounts of information about a person—what is inside their bag, how their health is, whether they’ve been in recent contact with other people—that are unobservable to we mere humans. In some sense, the mind of a police dog is a treasure trove of personal information that remains inaccessible to police most of the time. But when they are trained to alert to contraband or to specific scents sampled from a crime scene, the dog and the training combine to create a “binary search”—a mechanism that tells the police nothing unless there is probable cause that a crime is being committed.25Jane Bambauer, Defending the Dog, 91 Ore. L. Rev. 1203, 1203 (2013).

These crime-driven, quasi-filtered investigations are the outliers in a system of police investigation that relies much more heavily on witnesses, confessions, and physical searches.26Throughout this article, I will distinguish suspect-driven investigations from crime-driven searches. See Slobogin, supra note 19, at 322–23 (using the term “event-driven”); Jane Bambauer, Other People’s Papers, 94 Tex. L. Rev. 205, 208 (2015) (using the term “crime-out”). But we can expect the practice to rapidly expand because of the greater amounts and variability of data available for cross-checking the facts of a crime against data from the population of potential suspects.

This Part lays out the two required features of filtered dragnets that will cause an unprecedented shock to Fourth Amendment theory. We will then visit examples of techniques that are already in use that either already satisfy the definition of filtered dragnets or soon will.

A.  Required Elements to Qualify as a Filtered Dragnet

Filtered dragnets provide a suspect’s data to police only if (a) their data matches uniquely criminal details such that there is a high probability they have engaged in criminal conduct; and (b) their data has been pared down to provide only relevant details about the suspected crime to the police. When combined, these features make filtered dragnets a qualitatively different style of police investigation.27Jack Balkin bristles when scholars describe “essential features” of a technology. Jack B. Balkin, The Path of Robotics Law, 6 Calif. L. Rev. Cir. 45, 45 (2015). Suffice it to say that I am defining here a techno-social application of data collection and processing. The same technology can be used in other ways, of course, but then those uses would not meet my definition of a “filtered dragnet.”

1.  Automated Matching of Uniquely Criminal Details

Filtered dragnet investigations will trawl through and process large amounts of data. There is no doubt that they are a dragnet. But to qualify as a filtered dragnet, the filter of the dragnet must constrain the system’s ability to leak information. A filtered dragnet must be programmed to alert police only if an individual’s data matches a unique fingerprint of a crime.28David H. Kaye, Identification, Individualization and Uniqueness: What’s the Difference?, 8 L. Probability & Risk 85, 92 (2009). In other words, the system blinds the police until at least probable cause (and hopefully more suspicion) is established.

Filtered dragnets are a subset of the category of investigations that Christopher Slobogin calls “suspectless searches.”29Christopher Slobogin, Suspectless Searches, 83 Ohio State L.J. 953, 954 (2022) [hereinafter Slobogin, Suspectless Searches]; see Christopher Slobogin, Virtual Searches 127–48 (2022) [hereinafter Slobogin, Virtual Searches]. Slobogin describes many of the same techniques that I do here, but his analysis has less futurism and is more interested in the way the Fourth Amendment should handle suspectless searches right now, when many cannot or do not match to uniquely criminal profiles. But they are a narrow subset. Very few of the suspectless searches that Slobogin analyzes (many of which I describe below) have the potential to become filtered dragnets. As they are practiced today, they will not meet the heightened standards for filtered dragnets because they do not use unique signatures of criminal behavior. For example, geofencing and familial DNA-matching procedures often allow police today to access data about a handful of individuals, all but one of whom are necessarily innocent, in order to help the police create leads for traditional follow-up investigation. To find the Golden State Killer, the FBI found a genetic match to a family member, and then used traditional genealogy to trace from that family member to the suspect.30Paige St. John, The Untold Story of How the Golden State Killer Was Found: A Covert Operation and Private DNA, L.A. Times (Dec. 8, 2020), https://www.latimes.com/california/story/2020-12-08/man-in-the-window [https://perma.cc/7LZU-9JGQ]. The revelation of that family member’s identity would not qualify as matching to “uniquely criminal detail.”

Slobogin argues that even when a small number of people, some of whom are guaranteed not to be the perpetrator (such as somebody whose DNA only partially matches that of the sample from a crime scene), are identified to the police, the intrusion into privacy is fairly minimal and should be handled through Fourth Amendment doctrines that allow for warrantless searches and seizures, like checkpoints.31Slobogin, Suspectless Searches, supra note 29, at 955–56. I agree with nearly all of Slobogin’s proposals about how courts should interpret the Fourth Amendment with respect to these examples. But they still do not meet the criteria I am setting—criteria that, when met, challenge the most basic conceptions of Fourth Amendment privacy. To meet the definition of a filtered dragnet for my purposes, police will remain ignorant to details and identities until there is a high probability that the information identifies and pertains to the perpetrators and no one else.

2.  Nondisclosure of Irrelevant Details

The first requirement on its own ensures that filtered dragnets are analogous to “binary searches” like drug-sniffing dogs—the sort that alert only if there is probable cause of a crime. But there is an additional affordance that should be exploited: filtered dragnets must refine the information that is ultimately disclosed to police by filtering out personal, irrelevant details even about a suspect. This is equivalent to a drug-sniffing dog that could magically produce a suspect’s drugs without any of the rifling through cars and pockets that are necessary today. Thus, the suspect will retain privacy over details that are not relevant to the criminal investigation at hand.

To be clear, neither of these requirements are meant to be absolute guarantees. All systems have error, and even if police are able to set very demanding thresholds for false positives, police will occasionally access licit, irrelevant details when a filtered dragnet falsely identifies a suspect who is then subjected to an arrest or probable cause–based search. But the requirements for disclosure in a filtered dragnet system can be calibrated to fit societal needs and expectations: the chance of false accusation error can be driven down to practically zero if we would like, if we are willing to tolerate the consequences that there will be more false negatives (more crimes that are not detected) or that police departments will need to access more data in order to maintain the same level of detection.

A.  Examples

Next, we will visit a set of backwards investigation techniques that are in use today. These use the particularities of a crime to lead police to a suspect. While most cannot meet the demanding definition of “filtered dragnet” formalized above, with time and additional data resources, they will surely get there.

1.  DNA Matching

DNA-matching investigations use parts (non-revelatory portions) of a DNA sequence produced from a sample collected at a crime scene or from a crime victim in order to identify a suspect using DNA databases. They are an obvious extension of fingerprinting analyses with some souped-up features. First, DNA matching can set a very high threshold of statistical probability of true match (or, in other words, a very low probability of a false match) because each DNA sequence has a large amount of data.32With enough of a sequence for matching, the investigator can have extremely high confidence that the combination of DNA markers will be unique to a single individual. Fingerprint analysis, by contrast, contains a natural limit on how confident an analyst can be that the patterns from prints left at a crime scene would be produced by just one person. Nevertheless, there are still opportunities for DNA matching to produce erroneous results. Erin E. Murphy, Inside the Cell: The Dark Side of Forensic DNA 29–83 (2015). Second, they can make use of popular commercial and ancestry databases for cross-checking and are therefore not limited to identifying individuals who have a history with the criminal justice system.

Third, familial or partial DNA matches are very useful for police investigations in a way that partial fingerprint matching is not. In familial DNA-matching investigations, such as the one that eventually led to the arrest of the Golden State Killer, police departments recover the identity not of the suspect but of one or more of the suspect’s genetic relatives.33David Lazer & Michelle N. Meyer, DNA and the Criminal Justice System: Consensus and Debate, in DNA and the Criminal Justice System: The Technology of Justice 907–08 (David Lazer ed., 2004) (describing “low-stringency” searches on DNA databases that will return results of individuals who are likely to be related to the person whose DNA was sequenced for the crime scene sample). This raises privacy concerns for the relatives whose identities are revealed to law enforcement in the course of finding the perpetrator.34Natalie Ram, Fortuity and Forensic Familial Identification, 63 Stan. L. Rev. 751, 791 (2011). So, as practiced today, familial DNA searches do not fit the definition of a filtered dragnet. They fail the second element (filtering out innocent and irrelevant details) by revealing identities and information about family members who are definitely not the perpetrator of the crime.35One might think these are relatively minor privacy intrusions (equivalent to a witness saying “the murderer was Moe’s cousin”). However, it is conceivable that in the future, if multiple databases are able to be accessed and triangulated, familial DNA matching can be part of a filtered dragnet system that automatically finds a familial match, trawls other data sources in order to identify the correct relative of familial match (based on, e.g., age, location, or personal history of the relatives), and discloses the identity of the suspect and the relevant details only when and if there is sufficient confidence that the correct suspect has been identified.36This is not far-fetched: police already use statistical packages like a service called “What Are the Odds” in order to understand the closeness of the blood relationship between the suspect and the person whose DNA created a familial match, and then they use traditional methods of genealogy research (e.g., cross-checking with Census records and other public records) to find the suspect. Ellen M. Greytak, CeCe Moore & Steven L. Armentrout, Genetic Genealogy for Cold Case and Active Investigations, 299 Forensic Sci. Int’l. 103, 103–04, 107 (2019). All of this can be automated.

DNA evidence holds an esteemed place in criminal justice and public perception. DNA evidence is durable (as long as it is handled properly) and judges and juries can justifiably place a high degree of confidence in the reliability of DNA-matching investigations.37Lazer & Meyer, supra note 33, at 880–81. Other types of data beyond DNA can have these qualities, too, but they provoke much more suspicion and dissent. Distinguishing them from DNA matching will become increasingly untenable.

2.  Facial Recognition

Facial recognition uses large databases of identified photographs (often scraped from the public Internet) to discover the identity of a person who would otherwise be anonymous.38The procedure works by converting images of faces into “face prints”—maps of the contours of an individual’s face—and then cross-checking the maps against each other. Natasha Singer, Never Forgetting a Face, N.Y. Times (May 18, 2014), https://www.nytimes.com/2014/05/18/technology/never-forgetting-a-face [https://perma.cc/L2PZ-DWL3]. The technology can be used as a filtered dragnet when police departments deploy facial recognition on photographic evidence from the scene of the crime.39Facial recognition can also be used when police have already sought and received a warrant for a person’s arrest based on probable cause from other sources and are attempting to locate the suspect. This would also constitute a filtered dragnet. For example, law enforcement has used facial recognition to pin identities to individuals who appeared in surveillance footage from the Capitol on January 6, 2021, as well as to robberies and street crimes.40Kashmir Hill, Your Face Is Not Your Own, N.Y. Times Mag. (Mar. 18, 2021), https://www.nytimes.com/interactive/2021/03/18/magazine/facial-recognition-clearview-ai [https://perma.cc/A2CC-GXGG]. Although facial recognition algorithms are less accurate for female and non-white faces,41Patrick Grother, Mei Ngan & Kayee Hanaoka, Nat’l Inst. of Standards and Tech., NISTIR 8280, Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects 48 (2019). industry members claim this is not the case for top-performing algorithms in active use.42Jake Parker & David Ray, What Science Really Says About Facial Recognition Accuracy and Bias Concerns, Sec. Indus. Ass’n (July 23, 2022), https://www.securityindustry.org/2022/07/23/what-science-really-says-about-facial-recognition-accuracy-and-bias-concerns [https://perma.cc/Z2Z2-ZZN6]; Hoan Ton-That, The Myth of Facial Recognition Bias, Clearview AI (Nov 28, 2022), https://www.clearview.ai/post/the-myth-of-facial-recognition-bias [https://perma.cc/4WXT-65Y6].

3.  Automated CSAM Detection

Last year, Apple unveiled a program that would automatically scan iPhoto images and cross-check them against a library of known child pornography when the images were uploaded to the iCloud. Apple had planned to use a hashing technique to check all files sent from Apple devices to be stored on iCloud servers. Essentially, every image received by an Apple phone is converted to a code that corresponds to the visual image.43The hash is a 1:1 transform, meaning that the hash function would convert an image into just one particular string of numbers, and conversely a single code (or string of numbers) would translate into one particular image. This allows Apple to check the hash of every image against a library of hashes that represent known child sexual abuse material (“CSAM”) in order to detect child pornography. However, those who traffic in CSAM would be alert to this and could make minor changes to the image to avoid exact matches. To prevent circumvention, Apple uses a form of perceptual hashing (called NeuralHash) that uses fuzzy matching to detect and alert to images that do not match exactly but are very likely depicting the same image. Apple, CSAM Detection: Technical Summary 4 (2021). When a person’s iPhoto images produce ten matches, Apple employees would automatically be alerted and would share the information with authorities. Thus, while every image would be hashed and cross-checked against child pornography, only the images that matched could lead to a disclosure to law enforcement. Apple has since abandoned its plans in response to criticism,44Lily Hay Newman, Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next, Wired (Dec. 7, 2022, 11:11 PM) https://www.wired.com/story/apple-photo-scanning-csam-communication-safety-messages [https://perma.cc/G8SL-RE53]. but the technological capability still exists.

4.  Geofences and Other Reverse Searches

In 2019, a spate of arsons involving vehicles parked in commercial lots was committed in short succession.45In re Search Warrant Application for Geofence Location Data Stored at Google Concerning an Arson Investigation, 497 F. Supp. 3d 345, 351 (N.D. Ill. 2020). Based on the locations, surveillance footage, and similar modi operandi, police had reason to believe that a single set of co-conspirators was involved in all six arsons. When federal investigators requested that the court issue a warrant requiring Google to search its time-logged geolocation records for cellphones that were at or near the scenes of the arsons during the times that they were committed, a U.S. magistrate judge complied.46Id. at 364. This type of process—where police start with the location, approximate time, and other details of a crime and ask service-providers to find a matching account—is known as a “geofence warrant,” and magistrate judges have issued orders authorizing their use under certain conditions. Judges have refused to issue warrants (without deciding whether warrants are actually necessary) when the request cast too wide a net—that is, if too many devices are likely to be identified as matching the search criteria.47E.g., In re Matter of Search of Info. Stored at Premises Controlled by Google, 481 F. Supp. 3d 730, 733 (N.D. Ill. 2020). For example, if police are investigating a crime that took place during a Beyoncé concert, even a geofence with a small radius, during a fairly precise window of time, will draw in too many false matches—too many phones of innocent bystanders. But this concern falls away if police can use multiple details or the intersection of several geofences in order to create a search criteria that will be unique to the perpetrator.48The arson case would have been an ideal investigation to use intersecting geofences. Unfortunately, the government did not request records in that way, and the court did not address the difference between the union and intersection of geofences in its opinion. In re Search Warrant Application, 497 F. Supp. 3d at 345. For example, in one recent case, a perpetrator who was suspected to have cased the location of a murder on the day before he committed it was identified using overlapping geofences from the day before and the day of the murder.49Slobogin, Suspectless Searches, supra note 29, at 954 (citing Tyler Dukes, To Find Suspects, Raleigh Police Quietly Turn to Google, WRAL NEWS (July 13, 2018, 11:07 AM), https://www.wral.com/to-find-suspects-police-quietly-turn-to-google/17377435 [https://perma.cc/BU4W-2Z4Q]). License plate readers, drone footage, Internet of Things data, and satellite surveillance imaging could also be sources of geolocation information in the likely circumstance that criminals begin to leave their devices at home.50Id. at 954–55; Eldar Haber, The Wiretapping of Things, 53 UC Davis L. Rev. 733, 736 (2019).

Geolocation data can be combined with other types of information, too, to form a signature of crime that is more likely to be unique. As an illustration, US intelligence agencies located Osama bin Laden in part by looking for locations where they would expect to find Internet and cell service but in fact found none.51Peter Bergen, Did Torture Help Lead to Bin Laden?, CNN (Dec. 10, 2014, 12:26 PM), https://www.cnn.com/2014/12/10/opinion/bergen-torture-path-to-bin-laden/index.html [https://perma.cc/EJV6-FV6W]. There are data sources outside of location data that can create a signature for reverse searching. For example, while investigating an arson case, the Denver police department sought and received a “keyword warrant”—a court order requiring Google to reveal the account information of users who had recently searched for the address of the arson during a fifteen-day period leading up to the crime.52Celes Keene, Reverse Keyword Searches and Crime, Lexology (Aug. 11, 2022), https://www.lexology.com/library/detail.aspx?g=de2f5b21-a9b1-4650-a911-31dd1f39e671 [https://perma.cc/T8HH-RREJ]. Cyberstalking, child pornography, and many other online crimes have used forms of reverse searches in order to identify the accounts associated with IP addresses that were used to engage in those crimes.53See, e.g., United States v. Forrester, 512 F.3d 500, 505 (9th Cir. 2008); United States v. Hood, 920 F.3d 87, 89 (1st Cir. 2019); United States v. Contreras, 905 F.3d 853, 855–56 (5th Cir. 2018).

5.  Scanners, Sensors, Cameras, and Microphones

Red light cameras were one of the first ventures into automated policing and were also much despised.54Erin Mulvaney & Dug Begley, Opposition Putting a Stop to Red Light Cameras, Hous. Chron. (Apr. 25, 2013, 9:19 AM), https://www.houstonchronicle.com/news/houston-texas/houston/article/opposition-putting-a-stop-to-red-light-cameras-4461447.php [https://web.archive.org/web/20220708020423/https://www.houstonchronicle.com/news/houston-texas/houston/article/Opposition-putting-a-stop-to-red-light-cameras-4461447.php]. These systems used sensors to detect if a car entered an intersection after the light had turned red, took a photograph of the car, and later used the image of the car (and its license plate) to track down the owner and mail a ticket. These systems are not dragnets per se (they do not make use of pre-existing collections of data), but they set the stage for Automatic License Plate Readers that do capture an abundant amount of data in case some particular parts of it are useful later, as when police are searching for a stolen vehicle.55Slobogin, Suspectless Searches, supra note 29, at 955. Similarly, short-range communications technologies can reveal a car’s speed. Joh, supra note 17, at 200.

Patterns that are highly suggestive of crime can also be automatically detected using recording devices with cameras, microphones, or sensors that operate in “always on” mode.56Haber, supra note 50, at 735. One example in use today is ShotSpotter microphones that are constantly “listening” in a public setting but alert the police and save data long term only when the noises captured by the shot-spotter match the sounds of gunshots.57ShotSpotter, ShotSpotter Frequently Asked Questions (2018), https://www.shotspotter.com/system/content-uploads/SST_FAQ_January_2018.pdf [https://perma.cc/3SD4-B2JU]. In theory, Alexa, which also constantly records to respond to watchwords like “Hey Alexa,”58Amazon, How Alexa Works: Wake Word (last visited Feb. 25, 2024), https://www.amazon.com/b?ie=UTF8&node=23608571011 [https://perma.cc/JXB3-246D]. could be designed to detect sounds that are particular to domestic violence or home invasion and automatically alert the authorities.

Other sensitive devices like terahertz scanners can detect when naturally occurring radiation is blocked by metal objects. When the blocking metal objects are gun shaped, the scanners can be programmed to alert.59I. Bennett Capers, Race, Policing, and Technology, 95 N.C. L. Rev. 1241, 1275–77 (2017) (arguing that these tools can lead us to “real reasonable suspicion”). But this is nothing compared to what quantum magnetometry will be able to do in the near future.60Dmitry Budker & Michael Romalis, Optical Magnetometry, 3 Nature Physics 227, 227 (2007). Quantum sensing is so sensitive to minute differences in magnetic fields that the sensors will be able to detect trace amounts of chemicals, even when they are concealed behind walls. So, Justice Brennan’s nightmare scenario is here: we will soon have contraband detection devices.

This survey of suspicionless searches and backwards investigations demonstrates that there is increasing viability and interest in using these types of techniques. The practices currently in use do not usually meet the two formal requirements for “filtered dragnets,” but it is useful to assume they eventually will. By assuming investigations will eventually meet the demanding definition of filtered dragnets, we will be able to state with more rigor precisely why it is we are nervous about these law enforcement technologies, and what the policy or constitutional response should be.

II.  THE ADVANTAGES OF FILTERED DRAGNETS

This Article will eventually explain why filtered dragnets impose serious risks on society that are not adequately (or even nominally) addressed in Fourth Amendment theory. But first, we will explore reasons to embrace, rather than resist, the integration of filtered dragnets into policing.

Filtered dragnets offer several advantages over the investigation practices in common use.61A police investigation strategy cannot be judged without comparison to its next best alternatives. See Tal Z. Zarsky, Governmental Data Mining and Its Alternatives, 116 Penn. St. L. Rev. 285 (2011). These include decreased exposure of innocent details, increased accuracy and efficacy of criminal investigations, increased detection and deterrence of crime, decreased discretion for suspect selection, and decreased risk to witnesses and victims. In combination, these advantages contribute such compelling benefits to society that courts and attorneys should feel a moral obligation to harness their powers as much as possible.

A.  Decreased Exposure of Innocent and Irrelevant Details

Filtered dragnets protect the privacy of innocent individuals, as well as the innocent-and-irrelevant details of a suspect. They protect innocent individuals whose data is scanned in the process by allowing police and courts to set a high standard for false match error. That is, filtered dragnets can be programmed to alert and reveal personal information only when the statistical probability that the person has engaged in crime is greater than 50%, or 80%, or 99%. This would ensure that the number of innocent individuals who are initially approached and investigated will be only a fraction of the number of criminals who are found.62I have called this “hassle”—the imposition of searches, seizures, or even the stress of becoming a person-of-interest, experienced by an innocent person who is targeted based on probable cause. Jane Bambauer, Hassle, 113 Mich. L. Rev. 461, 461 (2015).

Moreover, filtered dragnets limit the type of information that is revealed even about the proper subjects of investigation who have committed a crime. This is a game-changer. If police could have searched a house or a car in a manner that blinded them to everything except contraband or criminal evidence, the text and interpretation of the Constitution would probably differ from what we have today. The closest analogy we have to filtered dragnets, as I have mentioned before, are drug-sniffing dogs. Police dogs are allowed to sniff and alert based on the (mostly defensible) assumption that they will be trained well enough to have a low error rate.63Florida v. Harris, 568 U.S. 237, 238 (2013). The dog sniff and subsequent alert are, controversially, treated as a non-search in Fourth Amendment law unless the dog has trespassed into the home or curtilage of a resident.64Florida v. Jardines, 569 U.S. 1, 6–7 (2013). But once the dog alerts, the police have probable cause to perform an entire human-conducted unfiltered search of a person’s vehicle, home, or effects, thereby revealing intimate and innocent details while they look for contraband. Filtered surveillance is more privacy-protective than drug-sniffing dogs because it can restrict the sort of data that is revealed even as police are verifying that the alert is accurate.

I do not mean to suggest that filtered dragnets avoid all revelations about innocent people or activities. Relevant data disclosed to police as a result of a high probability match will frequently, maybe even usually, reveal information that is not directly tied to wrongdoing. For example, if in the future the police used a system that combines familial DNA matching with other records to identify a sexual assault offender, police may see and use the identity of the family member in order to confirm that the identification is sound and to show how the case was solved to a jury. This could reveal the identity of estranged parents or children of the suspect or could uncover paternity that was not previously known.65Neil Richards, Why Privacy Matters 99 (2021). But this is a consequence of the fact that all successful investigations impose some irreducible privacy costs on the innocent. Even using traditional strategies, police will occasionally and appropriately question a spouse in a manner that reveals the suspect is having an affair or may make other similar sensitive revelations. If the revelations are in service of pursuing a probable cause–backed  investigation, these will be innocent-but-relevant details.66Thus, I disagree with scholars like Neil Richards who suggest that familial DNA matching inevitably presents a risk of a free-for-all where police will routinely learn about paternity or about the genetic propensity for disease. See id. The advantage I describe here pertains to the shielding of innocent-and-irrelevant information.

B.  Increased Accuracy

By definition, filtered dragnets identify suspects and reveal information only when there is a high probability of crime. This is a form of increased accuracy—a reduction in false positive error. (In the next subsection, I will discuss the other form of increased accuracy—the reduction in false negative error—which would allow filtered dragnets, if deployed consistently, to solve more crimes and increase clearance rates.)

If filtered dragnets are held to higher probability standards than standard investigation techniques, they will cause proportionally fewer false starts and erroneous arrests and searches along the way.67Ram, supra note 34, at 788 (identifying the potential for exoneration as a reason to adopt familial DNA matching). Similarly, a more accurate criminal justice system also reduces the potential for abuse, too, because it denies state agents the ability to credibly threaten the innocent. Dhammika Dharmapala, Nuno Garoupa & Richard H. McAdams, Punitive Police? Agency Costs, Law Enforcement, and Criminal Procedure, 45 J. Leg. Stud. 105, 111 (2016) (citing Keith N. Hylton & Vikramaditya S. Khanna, A Public Choice Theory of Criminal Procedure, 15 Sup. Ct. Econ. Rev. 61 (2007)). In time, a shift toward filtered dragnets should decrease the dangers and anxiety that come from false suspicion and conviction at every stage of criminal investigation. Indeed, facial recognition systems that identify a suspect based on photographs or surveillance footage from a crime already outperform the accuracy rates of average eyewitnesses and PC-based warranted searches by a large margin.68False match error rates for facial recognition algorithms are now under 1% in ideal conditions and under 10% when used in the field, and facial recognition services recommend law enforcement use a threshold of 95% confidence. William Crumpler, How Accurate Are Facial Recognition Systems—and Why Does It Matter?, Ctr. Strategic & Int’l Stud. (Apr. 14, 2020), https://www.csis.org/blogs/strategic-technologies-blog/how-accurate-are-facial-recognition-systems-and-why-does-it [https://perma.cc/3YQS-UM7C]. By comparison, eyewitness identification during a lineup has error rates of 20% or more. Gary L. Wells & John W. Turtle, Eyewitness Identification: The Importance of Lineup Models, 99 Psych. Bulletin 320, 320 (1986). The same is true for racial differences in error rates: while some facial recognition technologies were, at least for a time, more likely to produce false matches for photographs of Black faces, the gap in false match error has already been reduced. Stewart Baker, The Flawed Claims About Bias in Facial Recognition, Lawfare (Feb. 2, 2022, 12:57 PM), https://www.lawfaremedia.org/article/flawed-claims-about-bias-facial-recognition [https://perma.cc/E8TC-HV8A]. In any event, even if gaps persist, those gaps may be less bad than the differences in false match error from human systems of suspect identification. And unlike traditional policing methods, facial recognition technology can be calibrated to only produce a match when the risk of a false match is below a certain threshold regardless of the target’s constraining alerts, in other words, to ensure equal false positive rates by race. Setting the false match rate to be equal is equivalent to ensuring that “probable cause” for Black suspects means the same thing it does for whites. For a full articulation of race-conscious analyses of error, see Sandra G. Mayson, Bias In, Bias Out, 128 Yale L.J. 2218 (2019).

Skeptics will have at least two critiques of my optimistic prediction: all systems have some error, and the sort of error that comes from a highly technical and data-driven system might be particularly worrisome since a falsely accused defendant will have to go up against a trusted and more accurate system.69See Andrea Roth, Trial by Machine, 104 Geo. L.J. 1245, 1281 (2016) (describing the “seduction of quantification” in machine processes).

It is true that no investigation tool is free from error, and it is also possible that police, prosecutors, and juries could be at risk of reflexively trusting the results of a filtered dragnet system because they are so reliable. But the premise of the critique might be plain wrong. When a filtered dragnet produces a spurious result, the error could very well be easier to catch than when an informant or witness makes a spurious identification. For example, when a man named Michael Usry was the target of an investigation based on his father’s partial genetic match to crime scene DNA, Usry was cleared as soon as his own DNA sample was collected and analyzed because it did not match the sample collected at the scene of the crime.70Jim Mustian, New Orleans Filmmaker Cleared in Cold-Case Murder; False Positive Highlights Limitations of Familial DNA Searching, NOLA.com (Mar. 12, 2015), https://www.nola.com/article_d58a3d17-c89b-543f-8365-a2619719f6f0.html?mode=comments [https://perma.cc/S3GZ-59DY]; Natalie Ram, Christi J. Guerrini & Amy L. McGuire, Genealogy Databases and the Future of Criminal Investigations: The Police Can Access Your Online Family-Tree Search and Use It to Investigate Your Relatives, 360 Science 1078, 1078 (2018). This should generalize: the more independent sources of data there are, the more protection there should be for innocent.71See Joshua A.T. Fairfield & Erik Luna, Digital Innocence, 99 Cornell L. Rev. 981 (2014). A person wrongly identified by facial recognition is more likely to have a credible digital alibi (e.g., geolocation data that puts them in an entirely different state at the time of a crime) than a wrongly identified person who was accused by a confidential informant.

The facts of United States v. Chatrie72United States v. Chatrie, 590 F. Supp. 3d 901 (E.D. Va. 2022). illustrate the propensity for the erroneous targets of filtered dragnets to be cleared earlier and easier than erroneous targets in traditional investigations. In that case, police used a geofence warrant to access the deidentified location data of individuals who were near the scene of a bank robbery during the hour that the crime took place.73Id. at 917–22. The geofence produced the deidentified location records of nineteen individuals, only one of whom was the perpetrator.74Id. at 920–21. These facts do not fit the requirements of a filtered dragnet because law enforcement accessed and manually examined information related to the eighteen individuals who were not the perpetrator, but we can think of these eighteen as stand-ins for those who are wrongly targeted by filtered dragnet. One hour of anonymous geolocation data conclusively ruled out sixteen of them, and an additional hour ruled out the other two. None of the eighteen were identified (by name or other direct identifier) to the police, and none were questioned.75Id. at 921. By contrast, consider the experiences of two individuals who were briefly implicated in the investigation before the FBI used geofence technologies. Using traditional policing methods, the FBI first investigated the ex-boyfriend of a woman who saw news reports about the bank robbery and called the police to offer a false tip. They also investigated somebody who owned the same kind of car that was used as the getaway vehicle when a bank employee reported the possible tip, but that, too, was a dead end.76Id. at 917. It is not clear from the opinion what sorts of encounters and information-gathering the police used to rule out these two, but I suspect the anxiety and privacy burden absorbed by them was greater, by almost any measure, than the burden to the eighteen individuals whose approximate movements in public during one to two hours were disclosed in deidentified form. If this case is representative, the geofence warrant process should be a method of first resort, rather than last resort, because it is likely to lead more quickly to both the identification of the right suspect and the elimination of wrong ones.

A second skeptical critique is that I am describing the positive qualities of filtered dragnets under the assumption that the systems will be deployed as intended and will not be manipulated or tampered with. This is a legitimate concern to which the long history of flaws in forensic labs can attest.77Murphy, supra note 32, at 29–83; John Solomon, More Wrongdoing Found at FBI Crime Lab, Midland Daily News (Apr. 14, 2013), https://www.ourmidland.com/news/article/More-Wrongdoing-Found-at-FBI-Crime-Lab-7133820.php [https://perma.cc/D43V-8T9L]. The FBI has acknowledged that flawed forensics have affected dozens of death penalty cases. FBI Admits Flawed Forensic Testimony Affected at Least 32 Death Penalty Cases, Equal Just. Initiative (Apr. 29, 2015), https://eji.org/news/fbi-admits-flawed-forensic-testimony-in-32-death-penalty-cases/#:~:text=These%20FBI%20examiners%20trained%20500,those%20defendants%20have%20been%20executed [https://perma.cc/RNX9-KZTH]. But as a comparative matter, data-driven techniques of this sort might be more accountable and auditable than old-school forms of criminal investigation. When the same level of scrutiny and doubt is applied to traditional investigations that would have to continue in the absence of new technologies—the risks of error and manipulation present in eyewitness testimonies, suspect interrogation, or warrant affidavits78Lazer & Meyer, supra note 33, at 917. The Innocence Project found that half of the cases that they selected as being likely to be a false conviction did indeed lead to exoneration once DNA evidence was tested. How did they select these cases? By looking for convictions that were based on the traditional (and highly faulty) forms of evidence that are noisy signals of guilt: testimony from jailhouse snitches and eyewitnesses, the defendants’ confessions, and pseudo-scientific evidence (e.g., hair analysis). Id. at 898–99. Other factors include incompetent defense counsel and police or prosecutorial misconduct.—the prediction that filtered dragnets will be more corrupt and error-prone is hard to believe.79For example, one study found that more than 25% of sexual assault suspects are exonerated when DNA re-analysis becomes available. Peter Neufeld & Barry C. Scheck, Convicted by Juries, Exonerated by Science: Case Studies in the Use of DNA Evidence to Establish Innocence After Trial xxviii (1996). If this sample is typical, the findings imply that the quality of traditional police investigations leading to investigation, arrest, and conviction is rather shoddy.

C.  Increased Detection and Deterrence

The accuracy and efficiency of filtered dragnets can help tackle longstanding social problems of chronically unsolved crime, assuming filtered dragnets are used regularly.80Ram, supra note 34, at 788 (describing increased crime solving as an argument in favor of familial DNA searching). About twenty-five million Americans—8% of the population—suffer from a violent felony or a felony-level theft each year.81Alexandra Thompson & Susannah N. Tapp, U.S. Dep’t. of Just., NCJ 305101, Criminal Victimization, 2021 2–3 (2022). These events are of course disproportionately likely to beset low-income households. While violent crime rates today are still down compared to the high-water marks in the 1980s and early 1990s,82In the U.S., crime rates are quite low in historical terms. Violent crimes have dropped by at least half since the early 1990s, and property crimes have dropped even more dramatically. John Gramlich, What the Data Says (and Doesn’t Say) About Crime in the United States, Pew Rsch. Ctr. (Nov. 20, 2020), https://www.pewresearch.org/short-reads/2020/11/20/facts-about-crime-in-the-u-s [https://perma.cc/R9A8-SDUH]; Rachel E. Morgan & Barbara A. Oudekerk, U.S. Dep’t. of Just., NCJ 253043, Criminal Victimization, 2018 1 (2019). Although crimes of all sorts (particularly murder) have skyrocketed during the COVID-19 pandemic, the pandemic-related stress on social and economic wellbeing make the recent data difficult to interpret. Compare Paul G. Cassell, Explaining the Recent Homicide Spikes in U.S. Cities: The “Minneapolis Effect” and the Decline in Proactive Policing, 33 Fed. Sent’g Rep. 83 (2020) (finding under-policing and under-deterrence as a main cause), with Jeffrey Fagan & Daniel Richman, Understanding Recent Spikes and Longer Trends in American Murders, 117 Colum. L. Rev. 1235 (2017), and German Lopez, The Rise in Murders in the U.S., Explained, Vox (Dec. 2, 2020, 10:35 AM), https://www.vox.com/2020/8/3/21334149/murders-crime-shootings-protests-riots-trump-biden [https://perma.cc/9NZR-HBHC] (suggesting pandemic-related shocks are the primary driver of higher homicide rates). the statistics are still grim, particularly for communities of color. In the U.S., about five people in every 100,000 are murdered each year.83FBI Uniform Crime Report, Crime in the United States 2013, Expanded Homicide Data Table 6, U.S. Dep’t Just., Fed. Bureau Investigation (2013), https://ucr.fbi.gov/crime-in-the-u.s/2013/crime-in-the-u.s.-2013/offenses-known-to-law-enforcement/expanded-homicide/expanded_homicide_data_table_6_murder_race_and_sex_of_vicitm_by_race_and_sex_of_offender_2013.xls [https://perma.cc/W9H4-64BB]. For African-Americans, the rate is above six per 100,000.84Id. (By comparison, the rates in France and Italy are 1.28 and 0.52 per 100,000, respectively.)85Id. The United States, even in its lowest crime period, is still far more crime-ridden than other developed nations. For example, 5.4 out of every 100,000 Americans were killed by homicide in 2016, whereas in France the rate was 1.4 out of every 100,000. See Victims of Intentional Homicide, 1990–2018, United Nations Off. on Drugs and Crime, https://dataunodc.un.org/content/data/homicide/homicide-rate [https://perma.cc/NLL4-FNLL]. In addition to the trauma and losses to crime victims, society also absorbs a range of economic costs and psychological distress in the course of guarding against crime.86See, e.g., David Anderson, The Aggregate Burden of Crime, 42 J.L. & Econ 611, 629–30 (1999); Aaron Chalfin & Justin McCrary, Are U.S. Cities Under-Policed? Theory and Evidence, 100 Rev. Econ. & Stat. 167, 167 (2018); Kathryn E. McCollister, Michael T. French & Hai Fang, The Cost of Crime to Society: New Crime-Specific Estimates for Policy and Program Evaluation, 108 Drug & Alcohol Depend. 98, 98 (2010). It is all too easy for scholars, lawmakers, and others who live in safe neighborhoods to forget: serious crime is just awful.

Crime clearance rates (that is, the proportion of crimes actually reported to the police that have led to an arrest or otherwise been considered solved) for violent crime is 42%, and the rate is under 15% for property crimes.87Crime Clearance Rate in the United States in 2020, by Type, Statista, https://www.statista.com/statistics/194213/crime-clearance-rate-by-type-in-the-us [https://perma.cc/XT5F-EHCQ]; Most Violent and Property Crimes in the U.S. Go Unsolved, Pew Rsch. Ctr. (2017) [hereinafter Pew Property Crimes], https://www.pewresearch.org/fact-tank/2017/03/01/most-violent-and-property-crimes-in-the-u-s-go-unsolved [https://perma.cc/XG8E-6FQ8]; What the Data Says (and Doesn’t Say) About Crime in the United States, Pew Rsch. Ctr. (2020), https://www.pewresearch.org/fact-tank/2020/11/20/facts-about-crime-in-the-u-s [https://perma.cc/92VY-8CGL]. Only about half of violent crimes and one-third of property crimes are ever reported to the police, and many arrests and convictions are erroneous. The low likelihood of reporting a crime, the low clearance rates, and the somewhat sizable chance of false arrest altogether mean that the probability a criminal will be prosecuted for any particular violent crime is probably under 20%.88Statista, supra note 87. The figure for property crime is 7%. Pew Property Crimes, supra note 87.

Clearance rates in black neighborhoods are even worse. The events over the last decade validate Bill Stuntz’s observation that “poor black neighborhoods see too little of the kinds of policing and criminal punishment that do the most good, and too much of the kinds that do the most harm.”89Stuntz, supra note 15, at 497; see also Randall Kennedy, Race, Crime, and the Law 19, 158–60 (1997). Dampening crime in lower income black communities is a civil rights goal of longstanding stature.90Forman, supra note 7, at 11 (“African Americans have always viewed the protection of black lives as a civil rights issue, whether the threat comes from police officers or street criminals.”), 61 (recounting the editorials in journals that served black D.C. neighborhoods that demanded more law enforcement to ensure that black neighborhoods stay peaceful), 128. Bennett Capers described underenforcement as the criminal justice problem that gets short shrift,91Capers, Techno-Policing, supra note 5, at 497. and that was before George Floyd’s murder made police violence and over-policing problems an issue of pressing global salience. There is some squeamishness today in discussing crime in black neighborhoods (and certainly in referring to that crime as “black on black”), but it is foolish to expect criminal justice reform to be lasting and meaningful if it does not tackle both of the scourges of inner-city policing: harsh policing and civilian violence.

The most obvious and natural way to curb future violent crime is to increase the detection of very serious crimes today.92Mark Kleiman’s work catalogued a set of “dynamic concentration” probation and drug treatment programs that were unusually successful at recidivism reduction. Kleiman, supra note 20, at 34–65. They depended on good detection. Id. at 164. Kleiman pointed out that predatory crimes—those that terrorize and corrupt communities the most—are also the hardest to observe. Id. at 165. I am suggesting here that technology may give us the opportunity to run Kleiman-style compassionate crime control programs at a much more ambitious scale. Some scholars, Tom Tyler chief among them, have made the case that in the long run, law-abiding behavior has less to do with criminal law enforcement tactics than with cultural, economic, community, and norms-based factors.93Tom Tyler, Why People Obey the Law 171 (2006). Occasionally, this insight has been oversimplified and distorted to leave the impression that law enforcement detection rates have nothing to do with crime rates.94Shaila Dewan, Refund the Police? Why It Might Not Reduce Crime, N.Y. Times (Nov. 8, 2021), https://www.nytimes.com/2021/11/08/us/police-crime.html [https://perma.cc/U56T-8EPP]. This is a mischaracterization of the evidence.95Even Tyler’s work demonstrates that belief that lawbreakers will be caught and punished has a sizable and statistically significant impact on behavior. Tyler, supra note 93, at 59. While there are multiple “root causes” of crime,96Crime rates are the result of many social and economic factors that fall outside the realm of criminal law enforcement, such as population demographics (when the population is disproportionately young, there is more crime), fluctuations in the black market for drugs and other vices, environmental toxins (some criminologists have associated lead poisoning to impulsive and criminal behavior), and changes in the access to guns. Forman, supra note 7, at 50. data and common sense confirm that holding other factors steady, criminal behavior is sensitive to the probability of law enforcement detection. The relevant criminology studies consistently find evidence that detection reduces the incidence of future crime.97See, e.g., Aaron Chalfin & Justin McCrary, Criminal Deterrence: A Review of the Literature, 55 J. Econ. Lit. 5, 13–15, 23–29 (2017) (finding abundant evidence that crime is reduced when police manpower and redeployments increase, and much less consensus in the literature on severe punishment); Steven N. Durlauf & Daniel S. Nagin, Imprisonment and Crime: Can Both Be Reduced?, 10 Crim. & Pub. Pol’y 9, 17 (2011); Daniel S. Nagin, Deterrence in the Twenty-First Century, 42 Crime & Just. 199, 201 (2013); Daniel S. Nagin, Deterrence: A Review of the Evidence by a Criminologist for Economists, 5 Ann. Rev. Econ. 83, 88 (2013); Jeffrey Grogger, Certainty vs. Severity of Punishment, 29 Econ. Inquiry 297, 307–09 (1991); Kleiman, supra note 20, at 74–78; Jennifer L. Doleac, How Do State Crime Policies Affect Other States? The Externalities of State DNA Database Laws 1–3 (Dec. 2016) (unpublished manuscript), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2892046 [https://perma.cc/2KP5-7FHJ]. There is also some evidence that the swiftness of enforcement—the “celerity”—makes a difference.98Chalfin & McCrary, supra note 97, at 10.

Increased detection of crime not only reduces crime rates, but also improves other measures of social mobility and security as well. Greater crime detection increases the likelihood that offenders will seek and find employment, enroll in education, and live in a stable family environment, and it reduces school absenteeism in the community.99Anne Sofie Tegner Anker, Jennifer L. Doleac & Rasmus Landersø, The Effects of DNA Databases on the Deterrence and Detection of Offenders, 13 Am. Econ. J. Applied Econ. 194, 195 (2021). Indeed, given how dramatic the impact of detection is on increasing pro-social behavior, it is not at all clear that law enforcement should even be distinguished from the so-called “root causes” of crime. Fear that crime will not be well controlled is a root of many of the root causes of crime.100“Safe streets are a necessary platform for neighborhood growth and prosperity. . . . [T]he notion that poverty is the mother of crime has been turned on its head.” Philip J. Cook, Assessing Urban Crime and Its Control: An Overview 3 (Nat’l Bureau of Econ. Rsch., Working Paper No. 13781, 2008). To be clear, there are plenty of independent reasons to endorse or adopt the rehabilitative programs that criminologists and criminal justice scholars propose. See, e.g., Rachel Elise Barkow, Prisoners of Politics 76–77 (2019), for an example of an argument in favor of focusing on rehabilitative programs. But scholars like Barkow do not discuss the possibility that greater detection of crime can reduce crime rates and reduce net punishment.

So, an enduring and well-documented fact is that an increased likelihood of detection and enforcement drives crime rates down. This is much less true, and possibly not true at all, for the severity of punishment, where increasing the length of prison sentences is found to have no impact or even criminogenic effects.101Chalfin & McCrary, supra note 97, at 23–29. Thus, the state’s essential duty to protect its constituents from the violence and exploitation of others is well served by good detection. Unfortunately, crime rates are currently under the management of the American criminal justice system’s haphazard style of enforcement: occasional, error-prone, and harsh.102This critique, it should be noted, dates back to the eighteenth-century work of Jeremy Bentham and Cesare Beccaria. See generally Raymond Paternoster, How Much Do We Really Know About Criminal Deterrence?, 100 J. Crim. L. & Criminology 765 (2010).

D.  Decreased Discretion for Suspect Selection

Filtered dragnets are crime-driven rather than suspect-driven. In suspect-driven investigations, police have developed suspicion—or a hunch—around a particular individual and focus their observations in an attempt to develop a case.103Slobogin, supra note 19, at 322–23. Even Big Data–assisted suspect-driven investigations appear to perform poorly in identifying criminals who may have committed a crime. John S. Hollywood, Kenneth N. McKay, Dulani Woods & Denis Agniel, RAND Corp., Real-Time Crime Centers in Chicago: Evaluation of the Chicago Police Department’s Strategic Decision Support Centers 36 (2019). Suspect-driven investigations are propelled by the theories of police officers and proceed within their discretionary control. Police also have some control over filtered dragnet investigations (e.g., over where and when to deploy them), but once they are put into service, police lose control over the results. If facial recognition or reverse searches identify a wealthy or politically connected individual as the suspect of a crime, it will be much more difficult for police and prosecutors to avoid pursuing investigation and prosecution, as compared to cases where police use informants or witnesses as the main source of identification.

In later Parts, this Article describes the ways in which police can still exercise too much discretion by, for instance, using a filtered dragnet tool preferentially to solve some crimes and not using it on others that are substantially similar. But we should not lose sight of the ways filtered dragnets do constrain discretion. One of the greatest risks from mass surveillance (that is, dragnets) is its potential to create a resource for selecting the suspect first and then finding a crime, or for using legal but sensitive information to discredit political enemies and personal foes.104For example, the NSA’s strategy of revealing the pornography viewing habits of religious radical critics of the U.S. government. Conor Fridersdorf, The NSA’s Porn-Surveillance Program: Not Safe for Democracy, The Atlantic (Nov. 27, 2013), https://theatlantic.com/politics/archive/2013/11/the-nsas-porn-surveillance-program-not-safe-for-democracy/281914 [http://web.archive.org/web/20230323142324/https://www.theatlantic.com/politics/archive/2013/11/the-nsas-porn-surveillance-program-not-safe-for-democracy/281914]. Police cannot exert this type of control over filtered dragnets.105At least, they cannot exert control so easily. In Section IV.B, I will discuss how police units could still tamper with the process through the selection of crimes to solve or by avoiding or removing the analysis of a subset of constituents’ data.

The Supreme Court caselaw that has found fault with Big Data policing has involved digital searches in which the police first selected their target and then accessed long histories of their target’s whereabouts without a warrant.106Carpenter v. United States, 138 S. Ct. 2206, 2212 (2018) (accessing several days’ worth of geolocation data of a specific target); United States v. Jones, 565 U.S. 400, 403 (2012) (involving GPS tracking of a specific target). The Court is right to constrain investigations that permit police to access sensitive and detailed information without any justification or checking mechanism. Even when police have developed suspicion against a target, the low-tech factors that go into building up suspicion about a particular individual (e.g., testimony from an informant or presence in a “high crime neighborhood”) can impose an indirect racial tax on innocent minorities that could mostly be avoided with filtered surveillance programs that have very low error.107Kennedy, supra note 89, at 159; Ian Ayres & Jonathan Borowsky, ACLU of So. Cal., A Study of Racially Disparate Outcomes in the Los Angeles Police Department 27 (Oct. 2008), https://www.aclusocal.org/sites/default/files/wp-content/uploads/2015/09/11837125-LAPD-Racial-Profiling-Report-ACLU.pdf [https://perma.cc/U9GK-7BTU]; Floyd v. City of New York, 959 F. Supp. 2d 540, 556, 584 (S.D.N.Y. 2013). NYPD data showed that a substantial portion of the Terry stops (a.k.a. “stop-and-frisk”) had a predictably low chance of actually leading to the discovery of contraband based on the factors the police claimed were present. Sharad Goel, Maya Perelman, Ravi Shroff & David Alan Sklansky, Combatting Police Discrimination in the Age of Big Data, 20 New Crim. L. Rev. 181, 213 (2017).

Not all agree with this assessment. Kiel Brennan-Marquez has argued that “nothing about the logic or practice of data-driven law enforcement makes [] redistributive impulses necessary. On the contrary, they will be hard fought—and particularly in our current political climate, unlikely.”108Brennan-Marquez, supra note 2, at 490. I share a certain degree of Brennan-Marquez’s cynicism (I have wondered, for example, if law enforcement’s sloth-like speed in adopting crime-driven investigation practices rather than suspect-based practices are related to the loss of control over defining the pool of suspects),109Police use most of these tools as a last resort, perhaps because self-preservation of police discretionary power and popular (if ill-conceived) public resentment toward big data policing happen to push in the same direction. but he goes too far. There already is some evidence that data-driven policing has redistributed the costs of law enforcement and will continue to do so. DNA-based exonerations, for example, have proven the innocence of disproportionately more minority convicts than whites.110Edwin Grimsley, What Wrongful Convictions Teach Us About Racial Inequality, Innocence Project (Sept. 26, 2012), https://innocenceproject.org/what-wrongful-convictions-teach-us-about-racial-inequality [https://perma.cc/V3U6-R4FQ]. This suggests that, going forward, DNA-based investigations will shift police focus not only toward the guilty, but also away from wrongfully accused Black and minority suspects.

E.  Decreased Risk to Victims, Witnesses, and Suspects

Police investigations cause a range of problems that are not captured in the variables I have discussed so far—privacy intrusions, erroneous arrest, et cetera. When police have to rely on old school methods of case investigation, the system necessarily puts victims, witnesses, and suspects at risk of physical or economic harm.

Let us start with crime victims and witnesses. Cooperating with the government is a perilous activity for these individuals, as captured by the saying “snitches get stitches.”111Stuntz, supra note 15, at 4, 79–80. Drug and gun charges, by contrast, can be proven using physical evidence without any cooperating witnesses. On “snitches get stitches,” see Snitches Get Stitches—Meaning, Origin and Usage, English Grammar Lessons (Dec. 12, 2021), https://english-grammar-lessons.com/snitches-get-stitches-meaning [https://perma.cc/C242-MRDN]. By one theory, clearance rates for serious crimes are low in the U.S. because proving homicide or robbery cases requires victims and witnesses to testify and put themselves at risk.112In Washington, D.C., residents reported gunshots to 911 or police only 12% of the time as compared with the gunfire incidents detected by ShotSpotter technologies. The study found that crime is disproportionately underreported, and thus under-investigated, in minority and low-income neighborhoods. Jillian B. Carr & Jennifer L. Doleac, Brookings Inst., The Geography, Incidence, and Underreporting of Gun Violence: New Evidence Using ShotSpotter Data 2 (Apr. 2016), https://www.brookings.edu/wp-content/uploads/2016/07/Carr_Doleac_gunfire_underreporting.pdf [https://perma.cc/G7P6-3JBU]. Bill Stuntz hypothesized that police forces increased their focus on drug and gun possession charges because these crimes were “self-proving” once contraband was discovered, and therefore did not necessitate the cooperation of a victim or witness.113Stuntz, supra note 15, at 4. As a result, more serious crimes were harder to clear than low-level crimes. But, of course, those are the crimes that are more damaging to the community. If reverse searches, facial recognition, and other filtered dragnets could allow police to prove cases independently, without exposing victims and witnesses to the risk of social stigma and retaliation, they would contribute benefits to society that are not accounted for in the usual privacy-versus-security debates.

As for the suspects, the manner in which traditional policing builds up cases leave much to be desired. Police stops and searches are often vectors for bias and disrespect where swearing, insults, unwarranted accusations and suspicion, and unjustified physical contact lead to demoralization and distrust.114Capers, supra note 59, at 1243–44 (referring to “hard surveillance” and distinguishing it from soft forms); Forman, supra note 7, at 171. Traditional investigations are costly in terms of time, fear, property damage, and general unpleasantness. A person who is pulled over for a secondary inspection when a police dog alerts to her car may very well have no recourse when the police slash open the seats of her car to try to find drugs. Home searches and interrogations cause additional physical, emotional, and economic strain to suspects, irrespective of what sorts of private information is revealed. These costs will become more obvious and more salient when technology obviates the need for a government agent to tear open the upholstery of a suspect’s car, dishevel a dresser, and “grope[] and grab[] our children” at the airport.115As Senator Ron Paul colorfully puts it. Capers, supra note 59, at 1286.

***

In combination, these factors show that filtered dragnets should be part of any responsible law enforcement program. They extend the “pareto frontier” by allowing privacy and crime detection to increase at the same time.116As Part IV argues, the fact that filtered dragnets can rapidly increase crime detection is also the source of its risk. It would be counterproductive for law to prohibit their use based on a formalistic or expansive notion of Fourth Amendment protection. And yet, as the next Part shows, there is some risk that courts and lawmakers may do just that.

III.  FILTERED DRAGNETS AND PRIVACY

Most of the courts, scholars, and civil society organizations that have considered the societal impact of filtered dragnets such as geofencing and reverse keyword searches have concluded that they pose serious threats to privacy.117See, e.g., Guariglia, supra note 6. Putting aside for a moment whether filtered dragnets are consistent with the full set of Fourth Amendment principles, this Part argues that filtered dragnets pose almost no threat to Fourth Amendment privacy. What I mean is, among all of the meanings and purposes that the right to privacy is meant to capture, the only ones that are meaningfully violated by filtered dragnets are related to abuses of power. The privacy expectations of the non-offender, which are the ones that predominate Fourth Amendment analysis, suffer at most a technical violation. If we separate out the anti-authoritarian goals of privacy, nothing is left of the privacy critique of filtered dragnets.

This does not mean that filtered dragnets are harmless—to the contrary, as Part V will argue, they pose significant dangers to civil liberties. But by ruling out privacy as the vector of abuse, courts can harvest the benefits of analytical precision and adjust Fourth Amendment law to better match the problems. This Part describes how courts and scholars have responded to filtered dragnets so far and then explains why Fourth Amendment principles are so poorly suited to address the negative reactions.

A.  Judicial Reactions to Filtered Dragnets

Courts are not prepared for the challenges that filtered surveillance pose to Fourth Amendment jurisprudence. Indeed, they are struggling as it is to find principled limits in more common and straightforward digital dragnet cases.118For example, Carpenter v. United States, 138 S. Ct. 2206 (2018), wherein the Supreme Court considered the government’s access to seven days’ worth of cell site geolocation data and reached a holding without a rule. The access to records constituted a search requiring a warrant and probable cause, but the Court refused to say whether accessing data for a more limited amount of time would also be treated as a search. Id. at *11 n.3.

So far, lower court opinions are surprisingly unfriendly to technologies and practices that will be the predicates to filtered dragnets. For example, Baltimore tried to set up a program called Aerial Investigation Research (“AIR”) in which its police department collected and retained 45 days’ worth of aerial surveillance footage, but would not be allowed to access the footage unless a violent crime occurred and was likely to be caught on camera.119Slobogin, Suspectless Searches, supra note 29, at 962. Civil liberties organizations successfully challenged the program, arguing that the Fourth Amendment should constrain the government from amassing data that can be used for longitudinal location tracking no matter how constrained the Baltimore Police Department’s access and use of the data might be.120Leaders of a Beautiful Struggle v. City of Baltimore, 2 F.4th 330, 346 (4th Cir. 2021). The Fourth Circuit used the theoretical possibility of government access to information as a sufficient reason to find that a Fourth Amendment search on all Baltimore residents took place, regardless of the design, practice, and risk of abuse for the program.121Id. If this reasoning is adopted throughout the judiciary, law enforcement will not be able to collect their own information for filtered dragnets and will have to rely on data that is collected and held by private industry.

Many courts have expressed similar reservations when the government asks a private company like Google to trawl through its data to conduct reverse searches, too.122United States v. Chatrie, 590 F. Supp. 3d 901, 927 (E.D. Va. 2022). But these opinions suggest that a warrant process that is sufficiently narrow and “particularized” so as to avoid disclosing data of innocent bystanders to the police would satisfy Fourth Amendment requirements.123Id. at 927–32. This leaves an opening for filtered surveillance. It suggests that the automated scan that Google or another third party would perform of all its data in the process of identifying responsive records would not be a search in and of itself. In other words, the focus of the courts that have analyzed geofence warrants is not on the data that is scanned at all, but on the data that is ultimately revealed to police.

Courts might begin to clamp down on third-party scanning for law enforcement purposes following the logic of the Fourth Circuit’s decision in the Baltimore AIR case. Many scholars are advocating for this, as I describe next. But it is still not clear that filtered dragnets will be understood to be a search at all given that they are designed to alert only when probable cause of a crime has been established. Even if police use computing technologies to automatically scan through large amounts of personal data, the constitutionally relevant event is the revelation and use of information to the government agents who are making decisions.124It is tempting to think the aggregation and accumulation of data for potential eventual use is itself a form of risk or harm. This is the reasoning behind the “mosaic theory,” which captured the attention of some courts and scholars. United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2011); Priscilla J. Smith, Nabiha Syed, David Thaw & Albert Wong, When Machines Are Watching: How Warrantless Use of GPS Surveillance Technology Violates the Fourth Amendment Right Against Unreasonable Searches, 121 Yale L.J. Online 177, 201 (2011). Orin Kerr, who coined the term, is skeptical that courts can make it work. Orin Kerr, The Mosaic Theory of the Fourth Amendment, 111 Mich. L. Rev. 311, 346–47 (2012). It is worth noting that this theory does not comport with the attitudes of Americans. Matthew B. Kubler & Lior Jacob Strahilevitz, Actual Expectations of Privacy, Fourth Amendment Doctrine, and the Mosaic Theory, 6 Sup. Ct. Rev. 205, 248 (2016).

This is best captured by the binary search doctrine—the rule establishing that, for example, a drug dog’s alert is not a search under the Fourth Amendment because it reveals only the presence of contraband and criminal wrong-doing. There is little reason to believe the Supreme Court will backpedal. The Court has found that a universal fingerprinting database, possibly even one that requires involuntary contributions of fingerprints by individuals who are not yet in the database, could be justified, given that fingerprinting is an “inherently more reliable and effective crime-solving tool than eyewitness identification or confessions.”125Davis v. Mississippi, 394 U.S. 721, 727–28 (1969). More recently, in Maryland v. King, the Supreme Court found that police can forcibly swab an arrestee and cross-check his DNA against the database of DNA samples from unsolved crimes.126Maryland v. King, 569 U.S. 435, 465 (2012). The opinion focused almost entirely on the physical act of swabbing and took for granted that the cross-checking of a DNA sample to a crime database will not be a search because it reveals either nothing at all or reveals only a high-confidence match to a crime.127See id. at 445, 461–62.

That said, some of the Supreme Court decisions in the last ten years written by Justice Scalia incorporated a strong property-based formalism. In United States v. Jones, the use of a GPS device was a search not because of the sensitivity of the information gathered, but because of the touching of the suspect’s car.128United States v. Jones, 565 U.S. 400, 403 (2012). And in Florida v. Jardines, use of a drug-sniffing dog on a front porch was a violation of the Fourth Amendment because the practice involved a trespass with information gathering.129Florida v. Jardines, 569 U.S. 1, 5–6 (2013). The fact that the information gathering was in the form of a binary search did not alleviate the flaw, according to the majority.130Id. at 10–11. If Scalia’s formalism for real and tangible property is extended to personal data, filtered dragnets could be considered a search of all individuals whose data is mechanically scanned in the process, irrespective of how trivial the invasion to them may be.

Even if courts come to agree that mechanically processing data is a Fourth Amendment search, this would still not guarantee the death of the filtered dragnet. They might be reasonable searches under the special needs or checkpoints doctrines.131See Mich. Dep’t of State Police v. Sitz, 496 U.S. 444, 449–50 (1990); Illinois v. Lidster, 540 U.S. 419, 426–27 (2004). In the context of checkpoints, bulk searches, and other dragnets, the Supreme Court has articulated the factors that it would use to determine whether the searches are “reasonable” despite a lack of individualized suspicion. These factors include the intrusiveness of the search, the public and government interest that is served by the dragnet, and the degree of oversight or limitations on discretion that are involved.132See Christopher Slobogin, Government Dragnets, 73 Law & Contemp. Probs. 107, 107–08, 127 (2010). The Court focused on constraints over agents’ ad hoc discretion in United States v. Martinez-Fuerte, 428 U.S. 543, 559 (1976) (with respect to the location of a border and customs checkpoint). Justice Brennan, in dissent, pointed out that there remained a lot of agent discretion with respect to whom to focus on during the primary and secondary inspections, further emphasizing the importance of agent discretion. See id. at 576 (Brennan, J., dissenting).

Thus, judicial reasoning seems to be on a collision course between (a) cases that are eager to expand the recognition of privacy rights to cover all data subjects in large databases whose information is theoretically accessible to police and (b) cases that find highly probative “binary searches” are outside the ambit of Fourth Amendment prohibition.

B.  Scholarly Reactions to Filtered Dragnets

Lawrence Lessig saw this train wreck coming. In Code, he pointed out that the Internet and digital information technologies will allow police to identify a perpetrator with high confidence while remaining blind, by design, to the intimate details of the innocent. He explained that this will cause the privacy rationale for Fourth Amendment protection to lose relevance, at least when filtered dragnet investigations are possible. He expected these technologies would force a wedge between privacy and anti-authoritarian justifications for criminal procedure, when in the past, the two types of arguments traveled together.

Fourth Amendment scholars have doubled down on privacy.133See generally Sklansky, supra note 9; Ohm, supra note 9 (each arguing for strong and more capacious conceptions of privacy under Fourth Amendment law that will limit access to information no matter how or why it is sought). Even scholars like Andrew Ferguson and Neil Richards, who have focused on tyranny and power, have used those terms synonymously with surveillance capability. Ferguson, supra note 9, at 262–63, 266. They have lumped filtered dragnets together with all other digital surveillance in order to hinder police access. Dragnets of every sort, including the filtered sort, still suffer from analytical chaos because of value judgments and predictions that too often stay latent in the scholarship.134Christopher Slobogin took stock of the “analytical extremism” over a decade ago, and not much has changed. Slobogin, supra note 132, at 109. As a result, scholars are all over the map in terms of the proper treatment of digital dragnets, and none have focused on the right factors.

A few examples. Daphna Renan has argued that the collection, retention, and theoretical capability for law enforcement to access data is alone sufficient to constitute a privacy harm. Consent or a warrant should be required before the government collects any privately held data, and even before they access or request machine scanning of that data by third parties, irrespective of how limited and careful the readout is.135Daphna Renan, The Fourth Amendment as Administrative Governance, 68 Stan. L. Rev. 1039, 1042, 1054–55 (2016). Natalie Ram has approvingly held up Maryland’s law prohibiting law enforcement from using genomic databases to solve crimes unless they have received consent from all individuals whose data is in the genomic dataset.136Ram et al., supra note 70, at 1078–79. She has argued that Americans have a constitutional right, under the Carpenter decision, to the privacy of the genomic data held by a private third-party company and that unless consent to a law enforcement search is exhibited in some way, the police should not be able to ask or force the company to identify a match to a criminal sample. Natalie Ram, Genetic Privacy After Carpenter, 105 Va. L. Rev. 1357, 1366–67 (2019). More generally, this brand of scholars use access to data, rather than how it is used, as the sine qua non for Fourth Amendment analysis and ask why anybody should be under “lifetime surveillance.”137Lazer & Meyer, supra note 33, at 904 (summarizing what other scholars have asked with respect to including juveniles in DNA databases).

Scott Sundby and Nadine Strossen take the more moderate position that dragnets (of any sort) should be used only as a last resort,138Scott E. Sundby, A Return to Fourth Amendment Basics: Undoing the Mischief of Camara and Terry, 72 Minn. L. Rev. 383, 446 (1988); Nadine Strossen, The Fourth Amendment in the Balance: Accurately Setting the Scales Through the Least Intrusive Alternative Analysis, 63 N.Y.U. L. Rev. 1173, 1176, 1197 (1988) (suggesting a challenged investigation should be invalid if there is a less intrusive option, and finding mass searches are more intrusive than individualized ones). though it is not clear they would apply their conclusions to filtered dragnets in particular. Eldar Haber, in considering how the Internet of Things can become a rich source of police investigatory data for reverse searches, advocates for a warrant requirement that goes beyond the “super-warrant” requirements of the current Wiretap Act to create an “ultra-warrant” requirement.139Haber, supra note 50, at 785. Since the super warrant requires police to exhaust all other means of investigating before securing a wiretap warrant, the effect and objective of Haber’s recommendation is similar to Sundby’s and Strossen’s—to ensure that the criminal justice system strongly disfavors use of Internet of Things data in investigation.14018 U.S.C. § 2518. Haber’s reasoning is also consistent with Justice O’Connor’s reasoning in a dissenting opinion, in which she argued suspicionless inspections should only be permitted when law enforcement would not be effective using traditional police tactics that build up reasonable suspicion or probable cause before a search takes place. See Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 674 (1995) (O’Connor, J., dissenting).

Continuing down the spectrum, some scholars appreciate the potential benefits of filtered dragnets and have advocated for a style of restraint that differs from prohibition or PC-based warrant requirements. Stephen Henderson and Kiel Brennan-Marquez argue that police departments should have a budget for searches and seizures (including digital investigations that, at least right now, operate outside the formal definition of a Fourth Amendment search) so that they are incentivized to use the most efficacious practices rather than the most expedient ones.141Keil Brennan-Marquez & Stephen Henderson, Search and Seizure Budgets, 13 U.C. Irvine L. Rev. 389, 396–97 (2023). In my opinion, it would make more sense to limit government power by imposing a “prison budget” so that the state is forced to reserve incarceration resources for their most effective uses. See Kleiman, supra note 20, at 785. Christopher Slobogin has explicitly called for a more nuanced understanding of dragnets and suspicionless surveillance. He would allow dragnets that meet a standard of “generalized reasonable suspicion” where their efficacy outweigh the privacy intrusion enough to merit their use in criminal investigations.142Slobogin, supra note 132, at 139–40. Slobogin measures efficacy using the hit rate—the chance that an investigative technique will reveal relevant criminal evidence. Id. at 139. However, it is not entirely clear what he uses as the denominator in a hit rate. If courts are supposed to ask whether a person whose data is disclosed to police by a filtered dragnet is highly likely to be guilty of the investigated crime, filtered dragnets will always have high efficacy because they are defined to meet this standard. If the denominator is comprised of all individuals whose data is mechanically processed to find matches to the “fingerprint” of a crime, none of the filtered dragnets will meet the standard. Jeffrey Bellin recommends locating the Fourth Amendment interest in databases with the owner or holder of data, rather than the subject of the data searches, which would give a company the right to either consent to a search or to demand a warrant.143Jeffrey Bellin, Fourth Amendment Textualism, 118 Mich. L. Rev. 233, 270–72 (2019) (articulating an openness to considering some types of data and documents as personal to the consumer rather than owned and controlled by the third-party service provider, so context would play a role in edge cases under his proposal). Andrew Ferguson would allow the use of dragnets as long as the legislative branch explicitly authorizes their use.144Ferguson, supra note 9, at 272.

Reaching the other end of the spectrum, some scholars (myself included), see the use of filtered dragnets as a move toward justice rather than away from it.145See generally Bambauer, supra note 26. The prohibition of a highly reliable investigation tool is unethical when the prohibition would push police toward more invasive and less accurate investigation techniques and when serious crime would too often go undeterred. David Kaye and Michael Smith have made this argument with respect to DNA matching.146D.H. Kaye & Michael E. Smith, DNA Identification Databases: Legality, Legitimacy, and the Case for Population-Wide Coverage, 2003 Wis. L. Rev. 413 (2003).

Where does this leave us? Hopefully with an open mind and a hunger for reasoning from first principles.

C.  The Pointlessness of Fourth Amendment Privacy

Filtered dragnets will disrupt the equilibrium between the government, criminals, victims, and bystanders. That is obvious enough. Orin Kerr has made the descriptive and normative claim that courts intuitively adjust Fourth Amendment rules to strike a new balance between privacy and security whenever the government gains a significant new surveillance capability.147Orin S. Kerr, An Equilibrium-Adjustment Theory of the Fourth Amendment, 125 Harv. L. Rev. 476, 488–89 (2011). Filtered dragnets implicate only a few Fourth Amendment interests, and those few are not well served by the reasonable expectations of privacy test, by the warrant requirement, or even by intuitive adjustments. We are in new terrain in which a technology increases both privacy and crime control.

1.  Theoretical Dimensions of Fourth Amendment Privacy

Borrowing from a rich literature that catalogues and elucidates the concept of privacy,148Some attempts to organize the privacy discourse uses different stages of the information life cycle. See generally, e.g., Daniel J. Solove, A Taxonomy of Privacy, 154 U. Penn. L. Rev. 477 (2006); Jane Bambauer, The New Intrusion, 88 Notre Dame L. Rev. 205 (2012). For the purposes of this article, I have focused more heavily on articles that discuss the various types of risks and harms that occur when privacy is violated. the following arise most frequently in the context of government intrusions and surveillance:

i.  Freedom from Embarrassing Revelations, Social Dislocation, and Harassment

Perhaps the most common and robust form of privacy is the recognition that everybody has some legitimate, pro-social reason to want to keep licit details about their lives away from at least a subset of people.149Sklansky, supra note 9, at 1107–10 (using the concept of refuge). They want the freedom that comes from relative obscurity,150See generally Woodrow Hartzog & Evan Selinger, Surveillance as Loss of Obscurity, 72 Wash. & Lee L. Rev. 1343 (2015). where their decisions and behavior are not under the scrutiny and judgment of others.151Julie E. Cohen, Examined Lives: Informational Privacy and the Subject as Object, 52 Stan. L. Rev. 1373, 1377 (2000); Danielle Keats Citron & Daniel J. Solove, Privacy Harms, 102 B.U. L. Rev. 793, 854 (2022); see also Jane Bambauer & Tal Zarsky, The Algorithm Game, 94 Notre Dame L. Rev. 1, 23 (2018); Danielle Keats Citron, The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age 55–57 (2022) (describing how governments around the world have used details about licit-but-scandalous love affairs or other sexual secrets to suppress dissent). Everybody deserves to be shielded, at least to some degree, from embarrassment over the things they have said or done that did not cause any lasting harm to others and that can be misunderstood.152See Citron & Solove, supra note 151, at 837 (discussing reputational harms).

The scope of this interest ranges from trivial embarrassments (the regrettable hairstyle, the piece of toilet paper stuck to a shoe) to the truly life-changing (the ostracism of an HIV diagnosis, the physical attack carried out with the help of location information).153See Richards, supra note 65, at 146–51, 157–62. Much of the time, the sensitivity of a piece of information will depend greatly on context,154See generally Helen Nissenbaum, Privacy in Context (2010). but the point is that “everyone has facts about themselves that they don’t want shared, disclosed, or broadcast indiscriminately.”155Richards, supra note 65, at 73. When information is permitted to leap from one context to another and to be used in unexpected ways, it will cause harm.156See Solove, supra note 148, at 487–88; Cohen, supra note 151, at 1377; Richards, supra note 65, at 134, 142–45.

Filtered dragnets relieve, rather than exacerbate, these concerns. By shielding data from police (and everyone else) unless and until they match the fingerprint of a crime, filtered dragnets keep as much information private as practically possible.157Relatedly, filtered dragnets, when used as designed, will mitigate problems related to the dissolving boundaries between the state, private industry, and society by greatly limiting disclosure and use by law enforcement. For a description of dissolving boundaries, see Bernard E. Harcourt, Exposed 187–216 (2015). Indeed, if more police investigations were conducted through filtered dragnets, members of the community would be much more obscure and unknown vis-à-vis the state as compared with programs that involve heavy use of interviews, street patrols, traffic stops, and home searches.

ii.  Freedom from Manipulation

An actor can exploit access to another person’s data by discovering their vulnerabilities or gaps in rationality and then using those to persuade, cajole, or threaten the data subject into doing something.158See Richards, supra note 65, at 151; Citron & Solove, supra note 151, at 846. Again, as with freedom from embarrassment, filtered dragnets present a lower, rather than higher, risk of this sort because law enforcement and other government actors are blinded from nonrelevant information. The only use to which the dragnet data are put involves solving a crime.

iii.  Freedom from Indignity

The privacy literature prizes at least two forms of dignity that are not captured in other concepts on this list. First, privacy intrusions sometimes bring about an indignity from being singled out for suspicion.159One reason that courts have concluded that roadblock-style DUI checkpoints are reasonable under the Fourth Amendment is that all people are treated with equal indignity. This is borne out in public opinion surveys, where checkpoints and roadblocks are consistently rated as being a relatively low intrusion compared with other investigation techniques. See Christopher Slobogin & Joseph Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at ‘Understandings Recognized and Permitted by Society’, 42 Duke L.J. 727, 738 (1993). Dragnets, whatever their faults, do not have this intrusion. Nearly everybody suffers the same indignity when bulk data is scanned, just as they do at TSA checkpoints and DUI roadblocks.160This may explain why survey research finds that respondents generally do not find roadblocks intrusive; only 24% believed that they violate a reasonable expectation of privacy. James W. Hazel & Christopher Slobogin, ‘A World of Difference’? Law Enforcement, Genetic Data, and the Fourth Amendment, 70 Duke L.J. 705, 745 (2021). Another form of dignity concerns being treated as a human rather than being processed as a faceless line of data. This has some overlap with the concept of “individualized suspicion,” which I will discuss below, and which (in my opinion) filtered dragnets more than adequately should meet. Nonetheless, it is undeniable that filtered dragnets are entirely mechanical up until the point when a limited set of information is disclosed to police. Whether this should make a difference in the moral and legal status of filtered dragnets, though, is debatable.161See generally Frederick Schauer, Profiles, Probabilities, and Stereotypes (2006) (raising doubts about the differences between mechanical profiling and individualized consideration).

iv.  Freedom from Anxiety

A common theme throughout the discourse revolves around the idea of loss of control and the uncertainty and anxiety that arises from it.162See, e.g., Citron & Solove, supra note 151, at 841–42. When the government has personal information about a subject, the subject is uncertain how the information could be used and fears that it may be used against them. This fear is, in and of itself, a social cost. Kiel Brennan-Marquez has argued that new data-gathering technologies create, and to some extent have already created, an omnipresent low-level form of anxiety similar to the feeling one gets when seeing a patrol car in the rear-view mirror and “feeling your pulse quicken; awareness heightened and senses alert, as you try not to break any traffic rules.”163Brennan-Marquez, supra note 2, at 488.

A natural follow-up question is: What havoc can the government cause with data?164Although some would quibble, most privacy scholars at least implicitly recognize (and sometimes explicitly state) that privacy has primarily an instrumental value rather than an intrinsic one. See Richards, supra note 65, at 6. Richards later claims that “privacy is like other social goods, like public health or the environment,” id. at 97, but this seems incorrect to me. Personal and environmental health are both intrinsic goods—more of it is an end in itself, and there is no such thing as too much. The greatest risk posed by filtered dragnets is to offenders, and it is the risk that their offense (and nothing more) will be detected. Thus, for filtered dragnets, freedom from anxiety calls for a freedom from law enforcement itself. It vindicates the rights of the supposedly “guilty” rather than the innocent. Fourth Amendment privacy recognizes no such interest.

2.  Routine Compliance with Reasonable Expectations of Privacy

Data-driven policing has inspired a series of gloomy articles that predict the Fourth Amendment’s reasonable expectations of privacy test has become irrelevant.165See, e.g., Ohm, supra note 9, at 1320; Kimberly N. Brown, Outsourcing, Data Insourcing, and the Irrelevant Constitution, 49 Ga. L. Rev. 607, 659–63 (2015). As long as the third-party doctrine stands, permitting police to access data held by third-party companies without justification or oversight, privacy will be insufficiently protected. I agree with these scholars.166Bambauer, supra note 26, at 209. But courts are already addressing this problem. Cases like Carpenter v. United States—in which the Supreme Court found that police access to several days’ worth of geolocation data constitutes a search that would require a warrant or appropriate warrant exception—have proven that for suspect-driven searches, Fourth Amendment privacy is not yet irrelevant and is becoming more powerful by the day.167Carpenter v. United States, 138 S. Ct. 2206, 2209 (2018).

Nevertheless, the reasonable expectations of privacy test is very unlikely to impede the adoption of filtered dragnets. That test has repeatedly been interpreted to deny privacy interests of the guilty. “[A]ny interest in possessing contraband cannot be deemed ‘legitimate,’ and thus government conduct that only reveals the possession of contraband ‘compromises no legitimate privacy interest.’ ”168Illinois v. Caballes, 543 U.S. 405, 408 (2005). Jed Rubenfeld’s synthesis of Fourth Amendment caselaw seems to get it right: the Fourth Amendment aspires to support “a justified belief that if we do not break the law, our personal lives will remain our own.”169Jed Rubenfeld, The End of Privacy, 61 Stan. L. Rev. 101, 129 (2008) (differentiating the Fourth Amendment’s guarantee to security from a right to privacy). Filtered dragnets pass this test.170For binary searches, the reasonable expectations of privacy test adopts the “nothing to hide” attitude that privacy scholars very often condemn. See Richards, supra note 65, at 134. See generally Daniel J. Solove, Nothing to Hide: The False Trade-Off Between Privacy and Security (2011). Despite the scholarly criticism, it is an attitude that the general public shares with the Court. Public opinion surveys demonstrate that Americans’ taste for privacy is strongly influenced by whether they believe the person being searched has committed a crime or not. See Slobogin & Schumacher, supra note 159, at 759.

To be clear, there are reasons, independent of privacy, to protect law-violators-as-violators. These arguments, which I describe in depth in the next Part, are critical for understanding the threat from filtered dragnets. But they are only loosely related to “privacy” as the term is typically used, and they will not be incorporated into the reasonable expectations of privacy unless that test is changed beyond all recognition.

3.  The Irrelevance of the Warrant Requirement

In U.S. v. Chatrie, the geofence case described earlier, the court suggested it would approve a geofence warrant process if a magistrate or court got to make a probable cause determination before the geolocation data of a target were de-anonymized.171United States v. Chatrie, 590 F. Supp. 3d 901, 927 (E.D. Va. 2022). Generalizing to other filtered dragnets, law enforcement would seek a warrant after the filtered dragnet system alerts, but before any identifying data is revealed.

This process might be a good component for accountability and oversight, and to ensure that filtered dragnets are performing at or above the expected “hit rate,” but it is hard to imagine why a warrant could ever be denied. A warrant is valid as long as it is issued by a neutral judge or magistrate, is based on probable cause, and states with sufficient particularity what is to be searched or seized.172California v. Acevedo, 500 U.S. 565, 569–72 (1991); Illinois v. Gates, 462 U.S. 213, 230 (1983). The standards for both probable cause and particularization will be met—more than met—given that the definition of filtered dragnets I am using requires them to withhold information until the probability that the target has engaged in the investigated crime meets a high standard. As for particularization, because the filtered dragnet procedure begins with the signatures of a crime and works backwards to find the perpetrator, the profile for matching (what I have been calling the “fingerprint” of the crime) is as particularized to a crime as it can be.173Emily Berman argues that one of the purposes of the individualization requirement of the Fourth Amendment is to provide an opportunity for a suspect to challenge the evidence and beliefs of a police officer who thought they had probable cause to make the stop or search. Emily Berman, Individualized Suspicion in the Age of Big Data, 105 Iowa L. Rev. 463, 467 (2020). In this example, the non-privacy goal can be reconciled and adapted to filtered dragnets by requiring law enforcement to review and understand the data that connect the suspect to a crime.

Privacy advocacy groups have argued that warrants issued for reverse searches are tantamount to general warrants because they do not identify (or even anticipate) a particular suspect before they are issued.174Guariglia, supra note 6. But the only similarity that geofence warrants have to general warrants from the Colonial Era is the lack of a named suspect. In every other way, geofence warrants restrict the information that is revealed to that which is closely linked to a particular crime. By comparison, general warrants authorized agents of the colonial government to look for stolen or untaxed goods anywhere the agent “[should] think convenient to search.”175Brennan-Marquez & Henderson, supra note 141, at 402 (citing William J. Cuddihy, The Fourth Amendment: Origins and Original Meaning 233 (2009)). The only manner in which the geofence warrant is unconstrained—by allowing police to discover who the suspect is rather than requiring police to come with a suspect in mind—is a feature of geofence warrants that should be praised, as it limits the discretion of the police to select their targets in advance. This is the critical distinction between filtered dragnets like geofence warrants or DNA searches and suspect-driven searches—one that scholars and commentators too frequently gloss over.176See generally, e.g., Ram, supra note 136 (comparing the suspect-driven search in Carpenter to the crime-driven searches in the DNA forensic setting without recognizing the categorical differences between the two).

Thus, a warrant requirement is irrelevant to the adoption of filtered dragnets, apart from the time, resources, and general system friction involved, because they should routinely be granted.

***

Privacy scholars are courting disaster by lumping filtered dragnet techniques in with other types of dragnets and digital searches. Even if there are court victories in the short term, they will be pyrrhic. The very concept of “privacy” will become increasingly vulnerable to the “I have nothing to hide” argument that is loathed by the field (and rightly so).177See generally Solove, supra note 170. Courts might fail to sufficiently constrain unfiltered dragnets and suspect-driven investigations because of the utility and low harm of filtered dragnet techniques that happen to share the same Fourth Amendment bucket.

Arguments against mass surveillance often start with the observation that surveillance fundamentally shifts power from the surveilled to the surveillor.178“Privacy is about more than just keeping human information unknown or unknowable. . . . Put simply, privacy is about power.” Richards, supra note 65, at 3. Richards goes on to say, “we need to craft reasonable rules and protections so that we can maximize the good things about these technologies and minimize the bad things.” Id. at 5. This is true as far as it goes, but if the surveillor is constrained and can only see evidence of a crime, that power shift will often be a desirable one. In fact, assuming that the law is legitimate, the enforcement of a law is one of the most legitimate acts the government can do. The burden is therefore on surveillance scholars to explain why those who have violated the law may have justified interests in being protected from state detention and prosecution, even when their law-abiding conduct remains private. There are answers to this challenge, but they sound in tyranny rather than invasions of privacy. There is a virtue to being precise about the problems of filtered dragnets without reliance on capacious notions of privacy that would implicate nearly every law enforcement function.

IV.  FILTERED DRAGNETS AND TYRANNY

Filtered dragnets will provide a highly concentrated dose of criminal detection. Even though, in theory, the whole point of having law enforcement departments is to detect and prosecute crime, a drastic increase in criminal detection can have toxic effects on society. The dynamics and interaction of other criminal justice factors have come of age in a time of low detection and only make sense if detection continues to be difficult.

This Part begins by revisiting the interests that privacy scholars have identified that would be affected by filtered dragnets. Each of them is really an anti-tyranny concern garbed in the language of privacy. If we are more explicit about the goals and analyze the risks of authoritarianism that filtered dragnets may drag along with them, the problems (and, therefore, the remedies) become much more obvious.

The true threats from filtered dragnets are that: (1) many Americans will confront a real risk of criminal liability based on our overbroad criminal codes; (2) prosecutions of those crimes could lead to life-altering detentions in our inhumane prison systems; and (3) without the shield of abysmally low detection rates, the only protection is lenity, which is no protection at all from a government that attempts to exert authoritarian power.

A.  Privacy as a Stalking Horse for Anti-Authoritarianism

Neil Richards claims that privacy is a necessary bulwark “if we want political freedom against the power of the state.”179Richards, supra note 65, at 7. But privacy is inadequate on its own to protect the broad range of liberty and equality interests that arise with abuse of power. Filtered dragnets prove it. They can be used to trample liberties and to serve the public unequally even though the government will not know any irrelevant details about licit activities.

Instead of trying to expand the meaning of “privacy” to tackle every possible state abuse, courts and criminal justice scholars alike should seize the moment and force constitutional theory to shift its focus from privacy to anti-authoritarian constraint. To be sure, courts should continue to refine the conception of Fourth Amendment privacy interests to address unfiltered digital dragnets. But if we have any hope of harnessing the great potential of filtered dragnets without creating a despot’s playground, the Supreme Court will need to simultaneously cultivate an anti-authoritarian strand of Fourth Amendment rules.

When surveillance scholars use the concept of privacy to curb abuses of power, they are concerned about unnecessary social control and abuses of discretion.180They are also concerned about illegal use of a tool by rogue agents. See, e.g., Lazer & Meyer, supra note 33, at 906 (misusing DNA databases to extract phenotypes). There is always a risk that the government will use surveillance tools in violation of constitutional rules, statutory restrictions, or their own internal policies, but compared to opportunities of individual officers to abuse warrant or investigation practices in real space, filtered dragnets are more likely to be auditable.

1.  Unnecessary Social Control

Law enforcement serves the obvious and highly valued function of social control. As Kiel Brennan-Marquez explains, “we want people to worry about breaking the rules”181Brennan-Marquez, supra note 2, at 489.—at least, when the rules are good rules, and when the consequences for breaking rules are proportional and fair. However, Brennan-Marquez is concerned that data-driven policing tools will leave the police “awash in probable cause,” allowing them to stop, search, or arrest nearly anybody.182Id. at 491. This concern gets to the heart of the matter. But it is ultimately a critique of the substance of criminal law and the discretion of criminal justice decisionmakers. These are the same themes that Bill Stuntz repeatedly raised when he critiqued Fourth Amendment cases and scholars for allowing privacy to be a distraction from more pressing threats.183See generally Stuntz, supra note 15.

Let us return for a minute to Brennan-Marquez’s metaphorical driver who has just discovered a patrol car in the rearview mirror. If the government had done a massive purge of its penal codes and the only crimes left on the books were murder, rape, arson, armed robbery, and aggravated assault, and if false positive police error was vanishingly small, would the driver feel anxiety? For a time after the change, yes of course. There will be a short-term period of distrust and adjustment when technologies or rules change suddenly and dramatically.184People used to feel nervous about Caller ID, and at the advent of electricity, wealthy homeowners used to hire servants to turn on lights. Adam Thierer, Permissionless Innovation 70 (2016). But in the long run, anxiety will ebb under the pressure of persistent feedback of non-events and the absence of harm.

Public opinion surveys find that attitudes about privacy are mediated through attitudes about the substantive criminal law that is being enforced: a dog that is sniffing for bombs is perceived as less privacy-invasive than a dog that sniffs for drugs even though the experience is identical for the investigation target (at least, up until the moment that the dog alerts, that is).185Bambauer, supra note 25, at 1205. See also Slobogin & Schumacher, supra note 159, at 767 (speculating that the dangerousness of the investigated crime could explain some of their survey results). If assessments of privacy change not because of the revelations or techniques that are used but because of the crimes that are prosecuted, the concept of privacy is standing in for objections to the substance of the law.

The concern about unnecessary social control is better addressed by defining, as best we can, which types of antisocial conduct rise to the level of being worthy of criminal punishment and which do not. And the concern raises important questions about whether criminal violators are treated too harshly. Privacy is a blunt instrument for these purposes. It draws lines that have only a vague relationship to the distinctions we mean to draw.

2.  Selective Attention

Another serious concern is that police might make use of a system of surveillance to rifle around for something to use against a specific person or group.186Dan Markel, Against Mercy, 88 Minn. L. Rev. 1421, 1476–77 (2003); Joh, supra note 17, at 200; Brennan-Marquez, supra note 2, at 490–92. Motivations could range from political persecution to racism to personal vengeance to simply wanting to make a quota or appear well in performance metrics within a bureaucratized police department.

As with unjustified social control, the problem of discretion and selective attention is only indirectly related to privacy. Indeed, it is not even clear that privacy has any positive influence on police discretion. Privacy steers police toward information sources that disproportionately expose low-income and minority groups: if police cannot bring a drug-sniffing dog to a house, they will bring it to apartments and cars.187Bambauer, supra note 26, at 246. If police cannot search the full set of government and commercial DNA databases for a match to a crime scene sample, they will just use the government’s database of arrestee DNA data.188Ram et al., supra note 70, at 1078. At the same time, police can also engage in selective inattention by avoiding leads that could cause problems for friends or powerful people and by failing to give crimes perpetrated against low-status victims the same attention as the ones inflicted on high-status victims. When communities are under-protected, it is a form of too much privacy vis-à-vis the government.

The policy antidote to government discretion and bias is to directly limit discretion and bias. Filtered dragnets already do this, to some extent, because once they are employed, police lose control over who will ultimately be identified as a suspect. But law enforcement can still deploy filtered dragnets unfairly when selecting the neighborhoods or cases in which filtered dragnets will be deployed.189This is why Henderson’s and Brennan-Marquez’s proposal of search and seizure budgets seem inadequate to me: the concept of a budget does not guarantee that the budget will be spent wisely. See generally Brennan-Marquez & Henderson, supra note 141.

Thus, in the context of filtered dragnets, “privacy” concerns are attempting to capture and curb something bigger: too much social control at the discretion of the government.

B.  Filtered Dragnets and the Risks of Tyranny

An authoritarian regime thrives when it has unlimited discretion to issue stiff punishment based on criminal behavior that has negligible negative consequences (and possibly even positive consequences) to society. This threat is blunted if the state lacks the means to acquire evidence of criminal behavior, but with reliable surveillance mechanisms, law enforcement officials will be able to exert as much social control as they please, because nearly every person can be charged with a crime.190Kleiman, supra note 20, at 172–73.

Thus, filtered dragnets present risks that run along three vectors: (1) overbreadth of criminal law; (2) overly harsh punishment of criminals; and (3) overly discretionary investigations and enforcement. If these three forces remain unchecked, filtered dragnets could cause more harm than good. In the wrong hands, filtered dragnets could cause catastrophic risks of the sort that the Constitution is meant to prevent.

1.  Overbreadth of Criminal Law

A government that has the capacity to detect criminal behavior at very high rates must come under heightened standards of care when it promulgates or maintains its criminal laws. If we wince at the thought that everybody who commits a minor offense will get caught and will be prosecuted if they do not seem to qualify for a privilege or defense, this is a sign that the conduct is a poor fit for criminal law, and legislators must consider alternatives (e.g., warnings, civil fines, or positive incentives for pro-social conduct) instead.191Social stigma also provides a significant source of deterrence and self-control, often better than fear of punishment. Stuntz, supra note 15, at 52–53 (citing Daniel S. Nagin, Criminal Deterrence at the Outset of the Twenty-First Century, 23 Crime & Just. 1, 4–5 (1998)).

Right now, constitutional case law does very little to constrain the creation of criminal laws. Outside criminal statutes that would intrude upon specific individual liberties recognized in the Bill of Rights, the courts hold legislatures to very low standards of care (the rational basis test).192See generally Jeffrey D. Jackson, Classical Rational Basis and the Right to Be Free of Arbitrary Legislation, 14 Geo. J.L. & Pub. Pol’y 493 (2016). This latitude on substance has a curious relationship with the procedural restrictions imposed by the Fourth Amendment: as long as police have probable cause to believe that a person is violating or has violated a criminal law, police can make an arrest or initiate a search, no matter how trivial the offense. Thus, in Atwater v. Largo Vista, the Supreme Court found that the government acted within the bounds of the constitution when a police officer arrested a woman who was driving with two small children for the violation of a seatbelt law.193Atwater v. Largo Vista, 532 U.S. 318, 323–24 (2001).

Even if the Court is reluctant to interfere with legislators’ management of criminal codes, common sense dictates that some crimes are much worse than others. The state’s attention should focus on conduct that causes serious harm to others. There is a reason, for example, that the states that have regulated familial DNA-matching programs have allowed their use only for serious offenses like murder and rape,194Ram, supra note 34, at 781. and Baltimore’s Aerial Investigation Research (“AIR”) system, before it was dismantled, was restricted to use in investigating a limited set of very serious crimes.195Slobogin, Suspectless Searches, supra note 29, at 962. It is the same reason that the federal Wiretap Act permits courts to issue wiretap orders only when there is probable cause to investigate one of the explicitly listed serious criminal offenses.19618 U.S.C. § 2516. The same impulse explains why there is scholarly criticism and public outrage when a surveillance system adopted for the purpose of detecting one set of serious criminal violations (like smuggling or terrorism) is simultaneously used to detect violations of drug laws.197Renan, supra note 135, at 1060–63 (describing slippage between “silos” of law enforcement). The unstated assumption is that some crimes should be detected as well as possible (terrorism, for instance) and some should not.198Craig Lerner, The Reasonableness of Probable Cause, 81 Tex. L. Rev. 951, 1019–22 (2003).

The fact that state and federal criminal law has dramatically expanded in quantity and complexity is not in dispute.199Silvergate, supra note 10, at 268. “All of this is to say, of course, that many of those prosecuted are not real criminals who engaged in real crimes defined by clear and reasonable laws.” Id. And yet, curiously, responses to the problem tend to focus on procedural rather than substantive limits.200See, e.g., Reynolds, supra note 10 (advocating for due process constraints on charging decisions). The unchecked growth of substantive criminal law ironically creates a problem for public safety because the fear of prosecution prompts a demand for privacy and law enforcement obstruction.201This is, in a nutshell, the reason that Paul Ohm and other privacy scholars use law enforcement efficiency as a measure of Fourth Amendment violations. Ohm, supra note 9, at 1346. As Mark Kleiman put it, “improved enforcement of a law that should not have been passed in the first place can be a loss rather than a gain.” Kleiman, supra note 20, at 172.

The first and most obvious reason to place limits on criminal liability is to reduce the opportunity for unnecessary social control. The relationship between the government and the governed changes profoundly when a crime has been committed. The defendant in Atwater should have put a seatbelt on her children, and the government has an interest in encouraging, even requiring, that behavior. But not through criminal law.202Josh Bowers has criticized the Atwater decision, arguing that the reasonableness requirement of a Fourth Amendment seizure should protect individuals from “pointless indignities.” Josh Bowers, Probable Cause, Constitutional Reasonableness, and the Unrecognized Point of a ‘Pointless Dignity’, 66 Stan. L. Rev. 987, 1010 (2014). Every arrest is an indignity, of course, so the power of Bowers’ observation is the pointlessness of Atwater’s arrest. A second reason to constrain the substance of criminal law is to increase compliance with the rules we care about most.203Bloated criminal codes reduce law-abiding conduct because they cause what Murat Mungan calls “stigma dilution.” Murat Mungan, Stigma Dillution and Over-Criminalization, 18 Am. L. & Econ Rev. 88, 88 (2016). If functional and productive members of society are regularly engaged in violations of the criminal laws, the fact that a person has committed a crime (or has been convicted of it) loses its negative status signal. Overstuffed criminal codes also bleed into the problems of law enforcement discretion (discussed at greater length below) because the government has too much power to decide which members in the nation of criminals to send to prison.

Consider two examples that illuminate the problem through opposite ideological lenses. First, abortion will be criminalized in many states in light of Dobbs v. Jackson Women’s Health Organization.204Dobbs v. Jackson Women’s Health Org., 597 U.S. 215 (2022). Some states are considering criminal liability for women who seek out an abortion.205Andy Rose, Alabama Attorney General Says He Has Right to Prosecute People Who Facilitate Travel for Out-of-State Abortions, CNN (Aug. 31, 2023, 7:39 AM), https://www.cnn.com/2023/08/31/politics/alabama-attorney-general-abortion-prosecute [https://perma.cc/B7RP-ANNL]. For liberals and progressives, criminal liability for abortion-seekers represents an intolerable overreach of the state. To combat the substance of these laws, organizations such as the ACLU have already issued warnings about the risk that geofence searches could facilitate arrests and prosecutions of a law that a sizable portion of the state’s constituents believe is unjust.206Chad Marlow & Jennifer Stisa Granick, Celebrating an Important Victory in the Ongoing Fight Against Reverse Warrants, ACLU (Jan. 29, 2024), https://www.aclu.org/news/privacy-technology/fight-against-reverse-warrants-victory [https://perma.cc/C2PB-NGKH].

By contrast, conservatives might be concerned about overzealous enforcement of gun restrictions.207Several credit card networks now flag gun transactions automatically. Landon Mion, Visa Joins Mastercard, AmEx in Specifically Labeling Gun Store Sales, N.Y. Post (Sept. 11, 2022), https://nypost.com/2022/09/11/visa-joins-mastercard-amex-in-specifically-labeling-gun-store-sales [https://perma.cc/M554-C4L9]. Geolocation and credit card transaction data could be used to create a filtered dragnet that finds individuals without a gun license who cross state lines, attend a gun show, make a sizable purchase, and immediately return to their state.

In both cases, perceived flaws in the substance of the law would not be so troubling if the laws carried only modest punishments—warnings or fines, for example, rather than the incarceration and downstream labor and housing problems that inevitably follow conviction.208See generally James B. Jacobs, The Eternal Criminal Record (2015). But given the breadth and severity of criminal law, plus the mostly unchecked discretion that police departments have when deciding which among an ocean of technical criminal violations to investigate, the prospect of near-perfect detection takes on a more sinister character. Thus, when people have reservations about, for example, Alexa devices being used to detect the sounds of domestic violence, the reservations stem not from the specific use case but the general capabilities. They wonder, for good reason, what mischief can be made from such a technology when the set of conduct that is forbidden and harshly punished is sprawling and unevenly enforced.209Jessica Bulman-Pozen & David E. Pozen, Uncivil Obedience, 115 Colum. L. Rev. 809 (2015) (illustrating that the set of legal rules operating on U.S. residents is often so unrealistic that fastidious obedience to them can annoy and frustrate law enforcement agents).

Criminal codes are often expanded when the state has not gotten a handle on crimes of violence and property theft. The criminalization of vice (alcohol and drugs) was supported by the community not necessarily out of concerns that the drugs themselves cause to users but because of the “unconscionable violence” that came along with trafficking and addiction.210Forman, supra note 7, at 129 (quoting Carl T. Rowan, Locking Up Thugs Is Not Vindictive, Washington Star (Apr. 23, 1976)). In other words, substantive criminal law is expanded to compensate for deficiencies in the detection and prosecution of crimes that were already on the books so that police could arrest for lower level crimes and (stochastically) reduce the incidence of more serious crimes.211K. Jack Riley, Nancy Rodriguez, Greg Ridgeway, Dionne Barnes-Proby, Terry Fain, Nell Griffith Forge, Vincent Webb & Linda J. Demaine, Just Cause or Just Because?: Prosecution and Plea-Bargaining Resulting in Prison Sentences on Low-Level Drug Charges in California and Arizona 76 (2005). If detection of the serious crimes were more functional, this should relieve the need for sprawling criminal codes.

Hence the dilemma: better crime detection could help stop the pattern of an upward ratchet, but as long as the criminal codes are already sprawling, there will be resistance to increasing detection.

2.  Overly Harsh Punishment

On severity of punishment, the United States stands out among developed nations. We use incarceration intensively. In France and the U.K., a criminal who punches a person in the nose would be sentenced to less than six months in jail.212U.K. Parliament, Comparative Prison Sentences in the EU, House of Commons Library (2015), https://commonslibrary.parliament.uk/research-briefings/cbp-7218 [https://web.archive.org/web/20240510064827/https://commonslibrary.parliament.uk/research-briefings/cbp-7218/. The same conduct in the U.S. would result in a sentence of about three years.213U.S. Sentencing Commission, Sourcebook of Federal Sentencing Statistics Table 15 (2020), https://www.ussc.gov/sites/default/files/pdf/research-and-publications/annual-reports-and-sourcebooks/2020/Table15.pdf [https://perma.cc/33WN-APC8]. Note, though, that the differences for non-violent offenses like theft appear to be smaller (fewer than 6 months in U.K. compared to a median of 8 months in the U.S.). Id. Moreover, no outsider would mistake our prisons for institutions of rehabilitation: the entire sentence is usually carried out in a facility that is punishing, with drab quarters, humiliating toilet and bathroom facilities, and rancid food.214Craig Haney, Criminality in Context 335–44 (2020). Once released, the negative consequences continue as the housing and labor markets penalize criminal convicts.215Forman, supra note 7, at 219. See generally Michelle Alexander, The New Jim Crow: Mass Incarceration in the Age of Colorblindness (2012). Long sentences also create risks of abuse by giving police officers and other state agents leverage to extract bribes, pleas, and false confessions.216Dharmapala et al., supra note 67, at 111 (citing David Friedman, Why Not Hang Them All?: The Virtues of Inefficient Punishment, 107 J. Pol. Econ. S259 (1999)).

The harshness of our sentences is the byproduct of a low detection rate. Communities that at various times have been disfigured from crime waves tend to demand more and harsher criminal penalties.217James Forman Jr.’s book Locking Up Our Own documents the set of factors and conditions that led communities of color to make entirely understandable demands for greater punishment, even though the result of those efforts have not had their intended effects. Forman, supra note 7, at 124. The intuitive appeal of using long prison sentences to make up for low detection rates became the explicit policy of federal and local governments following the landmark work of Gary Becker. Becker modeled crime with a simple formula determined by the probability of conviction and the severity of punishment.218Gary S. Becker, Crime and Punishment: An Economic Approach, 76 J. Polit. Econ. 169, 170 (1968). See also A. Mitchell Polinsky & Steven Shavell, The Theory of Public Enforcement of Law, in Handbook of Law and Economics 421 (2007). Because it is much easier and cheaper for the state to ratchet up punishment than to catch more perpetrators, his work persuaded many politicians to manage crime through tough sentencing.219Cass R. Sunstein, David Schkade & Daniel Kahneman, Do People Want Optimal Deterrence?, 29 J. Legal Studs. 237 (2000).

The sparseness of Becker’s model for crime rates leaves much to be desired for anybody looking for a comprehensive explanation for crime—crime, of course, has a range of social and economic causes220These are the levers most directly under the control of a politically accountable legislators, mayors, police departments, and prosecutors, but there are of course other factors. See generally Stephen J. Schoenthaler & Ian D. Bier, The Effect of Vitamin-Mineral Supplementation on Juvenile Delinquency Among American Schoolchildren: A Randomized, Double-Blind Placebo-Controlled Trial, 6 J. Alt. & Complementary Med. 7 (2000) (discussing malnutrition as a factor in crime); Civic Research Institute, The Science, Treatment, and Prevention of Antisocial Behaviors (Diana H. Fishbein ed., 1999) (reviewing evidence of the impact of alcoholism, drug use, sexual abuse, cognitive and genetic factors, and family/gender role factors); Clifford R. Shaw & Henry D. McKay, Juvenile Delinquency and Urban Areas (1942) (discussing the effect of weakened or disorganized social institutions on crime; this work planted the roots of what would become the “broken windows” theory).—but as Part II explained, there is little doubt that detection has a significant influence over the amount of crime in a given community.221Executive Office of the President, Economic Perspectives on Incarceration and the Criminal Justice System 36–40 (2016) (citing to the empirical literature finding that increased incarceration reduces crime, but less effectively than equivalent increased spending on police); Andrew von Hirsch, Doing Justice: The Choice of Punishments 62–65 (1976). See generally Raymond Paternoster, The Deterrent Effect of the Perceived Certainty and Severity of Punishment: A Review of the Evidence and Issues, 42 Just. Q. 173 (1987); Beau Kilmer, Nancy Nicosia, Paul Heaton & Greg Midgette, Efficacy of Frequent Monitoring with Swift, Certain, and Modest Sanctions for Violations: Insights from South Dakota’s 24/7 Sobriety Project, 103 Am. J. Pub. Health e37 (2013); Lawrence W. Sherman, Police Crackdowns: Initial and Residual Deterrence, 12 Crime & Just. 1 (1990). Punishment, by contrast, seems to have a U-shaped relationship to recidivism, where no punishment and long, harsh punishment both tend to increase the odds that a perpetrator will recidivate.222Amanda Y. Agan, Jennifer L. Doleac & Anna Harvey, Misdemeanor Prosecution (Nat’l Bureau Econ. Rsch., Working Paper No. 28600, 2021).

I do not want to overstate the case for reducing prison time. Roughly half of the inmates in prison are individuals with such consistent sociopathic and antisocial behaviors that for those inmates, long-term incapacitation has positive externalities. Not only does incapacitation prevent these particular individuals from committing additional crimes (specific deterrence), but their families and particularly children may benefit from having less, rather than more, exposure to them.223See generally Samuel Norris, Matthew Pecenco & Jeffrey Weaver, The Effects of Parental and Sibling Incarceration: Evidence from Ohio, 111 Am. Econ. Rev. 2926 (2021); Sara R. Jaffee, Terrie E. Moffitt, Avshalom Caspi & Alan Taylor, Life with (or Without) Father: The Benefits of Living with Two Biological Parents Depends on the Father’s Antisocial Behavior, 74 Child Dev. 109 (2003). Nevertheless, the social costs of harsh punishment do not seem to serve deterrence or otherwise be justified outside the context of heinous or repeated criminal activity.

Over-punishment and criminal detection are inextricably connected. We cannot expect to find a political will to reduce punishment unless the police have—and use—new means to detect and root out crime. Filtered dragnets can jolt and resettle the criminal justice system in a new equilibrium where detection, rather than harsh punishment, is the key mechanism for crime control.

3.  Discretionary Application

Once the police have committed to investigating a particular crime, filtered dragnets take discretion away from the police to drive the investigation. But there are other points in time before and after a filtered dragnet may be used when government agents can exert control over the process:

i.  Selective Protection

When it comes to serious crimes of violence and theft, American police forces have a troubling history of systematically ignoring the suffering of minority communities. Police once actively conspired to deprive former slaves of their right to protection by joining the murderous mobs.224Stuntz, supra note 15, at 104–05. Over the subsequent century, police started to exhibit a more passive form of selection by simply not investigating and pursuing crimes committed against African-Americans as zealously as crimes committed against whites.225This trend can be seen in studies finding that models predicting enforcement and sentencing often include a large and statistically significant effect for the race of the victim (with white victims receiving better protection). John J. Donohue III, An Empirical Evaluation of the Connecticut Death Penalty System Since 1973: Are There Unlawful Racial, Gender, and Geographic Disparities?, 11 J. Empirical Legal Studs. 637, 640 (2014). This is a form of inequality that is not adequately addressed in constitutional caselaw.226In fact, in the context of capital sentencing, the Supreme Court has explicitly said that there is not a constitutional guarantee that would prevent discretionary leniency to be executed arbitrarily. McCleskey v. Kemp, 481 U.S. 279, 292 (1987). Thus, courts must prevent police from using filtered dragnets to solve crimes committed against one set of privileged crime victims while failing to use the same tools to solve comparable (and comparably detectable) crimes committed against others.

ii.  Selective Crackdowns

Police also decide which crimes to target,227Mila Sohoni, Crackdowns, 103 Va. L. Rev. 31, 33–34 (2017). and when and where to focus their resources.228See generally Jeffrey Fagan, Garth Davies & Adam Carlis, Race and Selective Enforcement in Public Housing, 9 J. Empirical Legal Studs. 697 (2012) (describing selective enforcement of criminal trespass by race or public housing status). For example, police will decide which crime scene images should be subjected to facial recognition. There is no guarantee that they will pursue arrest and prosecution of violent or destructive participants at Black Lives Matter protests or at a pro-Trump rallies with the same vigor.

iii.  Controlling the Data

Whether police use government-held data or data held by private companies to operate a filtered dragnet, they can exert some influence over the process if they are allowed to use a subset of available information to run through the filtered dragnet.229Indeed, this is one counterintuitive reason it may be better to have police access data from third-party companies rather than collecting it themselves, so that private industry may serve as a source of public information and whistle blowing. Farhang Heydari, Hoover Inst., Aegis Series Paper No. 2106, Understanding Police Reliance on Private Data 6 (2021). For example, if the government were able to limit DNA-matching to the data collected from ex-convicts only, or if a geofence warrant could direct a service provider to look for matching records only among customers who live in a certain precinct, the police could do an end run around the discretion-reducing function of filtered dragnets.

iv.  Downstream Decisions

After a suspect is identified by a filtered dragnet, police and prosecutors still have unchecked power to use leniency and to simply not pursue the leads that they do not like.230Discretion among judges at the point of sentencing seems to reduce racial disparities or, at least, make them no worse. See Drug Arrests Stayed High Even as Imprisonment Fell From 2009 to 2019, Pew Charitable Trs. (Feb. 15, 2022) https://www.pewtrusts.org/en/research-and-analysis/issue-briefs/2022/02/drug-arrests-stayed-high-even-as-imprisonment-fell-from-2009-to-2019 [https://perma.cc/Z65C-26JF]. It is possible that institutional and cultural influences downstream have started to change the risks of disparate racial impact over time. See generally Joshua B. Fischman & Max M. Schanzenbach, Racial Disparities Under the Federal Sentencing Guidelines: The Role of Judicial Discretion and Mandatory Minimums, 9 J. Empirical Legal Studs. 729 (2012).

The unifying theme across these decision-making practices is that the Supreme Court has avoided interfering with law enforcement discretion any time it has a plausible connection to judgment about the best use of resources. In Whren v. United States, the Supreme Court rejected a constitutional challenge by a criminal defendant who was pulled over for making an illegal U-turn. The defendant argued that the police would not have pulled over a white person, or any person about whom the police did not have a pre-existing “hunch,” under similar circumstances.231Whren v. United States, 517 U.S. 806, 809 (1996). The court believed that the defendant’s theory of unequal enforcement of minor traffic infractions was irrelevant and unworkable.232Id. at 815. At the time it probably was.233In individual cases, it would have been difficult to prove that race was a but-for cause of a police officer’s decision to conduct a seizure. However, even at the time, some argued that the fact that race clearly played a role systemically should have been sufficient for the Court to decide that pretextual stops violated the Fourth Amendment. See Tracey Maclin, Race and the Fourth Amendment, 51 Vand. L. Rev. 333, 375 (1998). But it is not anymore and will be even less so in the future. Today, a defendant bringing a case like Whren might have the data, thanks to GPS tracking of police and civilian cars, to demonstrate that police pull over only a small fraction of the illegal U-turns and other traffic infractions that they observe, and that the enforcement disproportionately targets minority drivers (if this is so).234Christopher Slobogin has characterized law enforcement use of pretextual stops as a species of general warrant. Slobogin, Virtual Searches, supra note 29 at 102.

If police are able to use filtered surveillance to solve crimes at minimal expense, there will be even less need for discretion. So, if police have a filtered dragnet, courts must make sure they have an acceptable response to the question: “Why did you enforce the criminal law here and not there?”235See generally Harcourt & Meares, supra note 18 (recommending that the degree of suspicion and the evenhandedness of a search program should be of utmost Fourth Amendment importance).

In summary, a government that has the capacity to detect criminal behavior at very high rates must come under heightened standards of care with respect to the promulgation of criminal laws, the use of incarceration and punishment, and the application of detection tools.

V.  THE ANTI-AUTHORITARIAN FOURTH AMENDMENT

Anti-authoritarianism, rather than privacy, should be the benchmark for the Fourth Amendment when police develop cases using filtered dragnets. What makes facial recognition or a geofence or some other form of filtered dragnet “reasonable” is not that the privacy of the innocent is protected—they will all do that. Rather, an “unreasonable” use of these technologies means the state is misusing its power to punish and control.

The current trajectory of Fourth Amendment caselaw suggests that we are headed for one of two suboptimal endpoints: either the state will be able to use filtered dragnets with little to protect its citizens from the perils of broad criminal laws, harsh criminal sentences, and selective enforcement, or the state will effectively be prohibited from using filtered dragnets, leaving a criminal justice status quo that nobody would devise and few would defend.236Barkow, supra note 100, at 5 (“One could say our approach to crime is a failed government program on an epic scale, except for the fact it is not a program at all. It is the cumulative effect of many isolated decisions to pursue tough policies without analyzing them to consider whether they work or, even worse, are harmful.”). But if the courts start to take seriously the fundamental differences between filtered dragnets and other investigation techniques—if they recognize that technology can explode longstanding assumptions about the nature of risk when police increase the detection of crime—courts can harness the disruptive technology and help society land in a better equilibrium.

Thus, the Fourth Amendment must evolve to demand “reasonableness” when detection is easy. The thrust of my proposal is that the phrase “reasonable searches and seizures” should be understood as a more expansive and robust guarantee of reasonableness.237To some extent, this builds on the constitutional case law and scholarship that give the “reasonableness” phrase pride of place in Fourth Amendment interpretation. See Akhil Reed Amar, The Constitution and Criminal Procedure: First Principles 35 (1997); Miriam H. Baer, Law Enforcement’s Lochner, 105 Minn. L. Rev. 1667, 1730 (2021); Renan, supra note 135, at 1044, 1081–82. Specifically, the requirement of “reasonable” seizures should guarantee that the consequences of a seizure (e.g., carceral arrest and a possible prison sentence) are fitting and proportionate to the gravity of the suspected crime. The requirement of “reasonable” searches should guarantee not only that the search is conducted based on probable cause and in line with established warrant requirements, but also that the decision to search or not search is reasonable and non-arbitrary. The former ensures that the criminal law being enforced is serious enough to justify the loss of rights that comes along with an arrest or a long sentence. The latter ensures that criminal detection tools are used in an even-handed manner.

A.  Reasonable Seizing—Restricting the Substantive Criminal Law

The prospect of near-perfect detection requires more care in defining a reasonable seizure. In order for a carceral seizure of a person to be reasonable, state uses of force and coercion involved must be justified by the harm that the arrestee has imposed on society. “Freedom from unreasonable . . . seizures” should be interpreted to protect the interests of individuals who have engaged in conduct that is technically illegal but not morally reprehensible.238See generally Robert M. Cover, Violence and the Word, 95 Yale L.J. 1601, 1608 (1986) (reminding readers that all prison sentences are backed by the credible threat of state violence). Again, my argument is similar to Bill Stuntz’s work suggesting the physical intrusion and coercion of the policing process to be the main source of trouble. William J. Stuntz, Privacy’s Problem and the Law of Criminal Procedure, 93 Mich. L. Rev. 1016, 1026 (1995). Thomas Jefferson’s unfinished vision laid out in the Declaration of the Rights of Man and of the Citizen provides the blueprint. Article 4 states, “Liberty consists in the power to do anything that does not injure others”; Article 5 states, “The law has the right to forbid only such actions as are injurious to society”; and Article 8 states, “The law ought to establish only penalties that are strictly and obviously necessary.”239Declaration of the Rights of Man and of the Citizen (France 1789), https://avalon.law.yale.edu/18th_century/rightsof.asp [https://perma.cc/VZF7-CZ6G].

A seizure should only be reasonable if the underlying criminal conduct and the resulting punishment are also reasonable. While substantive due process rights and the Eighth Amendment provide some absolute constitutional limits against unreasonable criminal codes or punishments, these rights must be bolstered in the face of near-perfect detection. An analysis of reasonable seizures in light of filtered dragnets has two aspects to it: (1) whether the behavior is sufficiently blameworthy to belong in the criminal code at all, and (2) if so, whether the punishment fits the risks and harms of the crime.

Is the conduct crime-worthy? The first inquiry asks whether the suspect’s conduct is bad enough to justify arrest and incarceration at all.240Given the public interest in having the state intermediate misdemeanor and civil infractions as well, non-carceral short-term seizures should not require judicial scrutiny of the substance of the law. See Rachel A. Harmon, Why Arrest?, 115 Mich. L. Rev. 307, 359 (2016). This is a threshold issue. Criminal conviction needs to be blameworthy and stigmatizing. Defining what sort of conduct is “blameworthy” raises deep philosophical questions, but there is an aspect of the question that is empirical: it needs to be rare. If the conduct captured by the scope of the criminal codes is commonplace, the actor’s community evidently has not incorporated restraint deeply into its moral fabric.241A useful methodology may be the sort of surveys of past behavior that Tom Tyler relied on in his seminal work, Why People Obey the Law. One survey of Chicago residents suggested that there might be a natural breakpoint between minor traffic violations and neighborhood infractions, where survey respondents sometimes engaged in the activity (even if rarely), and the conduct for which over 90% of respondents state they have never engaged in (e.g., theft). Tyler, supra note 93, at 41. In those cases, government intervention short of criminal liability (including expressive law, civil fines, or positive reinforcement for its opposite) should be used.242To increase cultural legitimacy, punishment should rely more on reputation and relationship consequences than on punishment. Stuntz, supra note 15, at 30–31. One broad category of criminal laws that may deserve constitutional scrutiny are laws that criminalize the possession or sale of contraband items to adults. These are acts that are transactional. Kleiman, supra note 20, at 154–55.

This is at odds with cases like Atwater, where the court refused to second-guess a local government’s decision to criminalize a minor driving infraction,243Atwater v. Largo Vista, 532 U.S. 318, 323–24 (2001). but Fourth Amendment case law does occasionally break rank with Atwater and peeks at the substance of the criminal violation in order to gauge the reasonableness of a procedure. For example, when analyzing whether a warrantless traffic checkpoint is constitutional as a reasonable warrantless seizure, the Supreme Court explicitly considers “the gravity of the public concerns served by the seizure” as one of the factors.244Illinois v. Lidster, 540 U.S. 419, 427 (2004) (quoting Brown v. Texas, 443 U.S. 47, 51 (1979)). And the Court has refused to allow exigent circumstances to excuse the failure to secure a warrant for a home search and arrest when the underlying crime is a minor offense.245Welsh v. Wisconsin, 466 U.S. 740, 750 (1984) (citing McDonald v. United States, 335 U.S. 451, 459–60 (Jackson, J., concurring)). And Atwater is ahistorical: a quick tour of the notorious cases the Crown directed against colonists that inspired the Bill of Rights are offensive, in large part, because of the substance of the crimes. These included crimes such as writing or publishing “gross and scandalous reflections and invectives upon his majesty’s government” or the crimes of illegal trade and inadequate record-keeping.246Laura K. Donohue, The Original Fourth Amendment, 83 U. Chi. L. Rev. 1181, 1197 (quoting Entick v. Carrington, 19 Howell’s State Trials 1029, 1034 (CP 1765)), 1199 (publishing criticism), 1243 (illegal trade and recordkeeping), 1247 (same) (2016). Moreover, Donohue describes the limits in eighteenth century England to the meaning of the term “felon” or “felony,” which included only the most morally reprehensible crimes such as murder, theft, suicide, rape, and arson. Id. at 1222–23.

Is the punishment too harsh? If the suspect’s conduct is reprehensible enough to pass the initial threshold test, a post-conviction seizure could still be unreasonable if the quality and length of detention is disproportionately harsh.247Andrew von Hirsch, Doing Justice: The Choice of Punishments 66–83 (1976). The sentences of many crimes, even violent crimes, could probably be reduced to weeks or days, or even converted to non-carceral forms of punishment (like public service or surveillance-enabled supervised release) without increasing crime rates if detection rates were much higher than they currently are. Long-term prison sentences can be reserved for murder, treason, severe sexual assault, severe child abuse, and for the incapacitation of repeat criminals.248See generally Eric Helland & Alexander Tabarrok, Does Three Strikes Deter?: A Nonparametric Estimation, 42 J. Hum. Res. 309 (2007) (finding significant deterrent effect, and not just incapacitation effect, from three strikes laws). For other crimes, detection through filtered dragnets, rather than a small chance of very harsh punishment, can be the door jamb that stops the metaphorical revolving door of recidivism.

B.  Reasonable Searching—Minimizing Discretion

A police department’s use of filtered dragnets will be fair if it avoids gaps in the protection from crime as well as gaps in leniency from enforcement.

1.  Duty to Search

All cases of reported or otherwise known crimes that are equally suitable for filtered dragnets should be investigated.249At the very least, they should be investigated randomly rather than haphazardly. See Harcourt & Meares, supra note 18, at 851–54. For example, if a police department can use filtered dragnets to detect gun violence or robberies, and it fails to investigate daytime violence and robberies taking place near low-income schools even though it investigates every daytime robbery or assault that takes place near high-income schools,250Forman, supra note 7, at 125. the uneven use of filtered dragnets would render it an unreasonable search. As a practical matter, while it would make more sense for a constitutional challenge to come in the form of a § 1983 claim brought by a resident who is harmed by a detectable or deterrable crime, the challenge is more likely to emerge when a criminal defendant brings a claim similar to the claim brought in Whren (arguing that although they committed an offense, the crime is unequally enforced).251Whren v. United States, 517 U.S. 806, 810 (1996). Courts should be open to a claim and evidentiary proof of this sort.

2.  Duty to Cast a Large Dragnet

Law enforcement should not have undue control defining the search pool that will be used by a filtered dragnet. The database that will be used to cross-check against the facts of a crime should include everyone possible whose data is accessible and whose participation in the crime would not be an impossibility. This reduces the risk of arbitrariness or bias that could result if police search for potential leads and matches in one population while ignoring another.

By this standard, facial recognition systems like Clearview AI are more legitimate (in the sense of being less susceptible to bias or discretion, at least) when they match surveillance footage at a crime scene against the largest possible set of publicly available portraits on the open web. Contrast this with DNA filtered dragnets: it is increasingly common and popular to restrict local law enforcement who are running DNA searches to CODIS, the federally maintained database of arrestee or convict DNA samples.252Kaye & Smith, supra note 146, at 414–15; Ram, supra note 34, at 789 (it is not fair to subject relatives of people who are in the CODIS database to more police scrutiny than relatives of those who are not). Local police departments have expanded their DNA databases by choosing to include “exclusion samples” (that is, DNA samples collected from suspects or victims) and juvenile defendants. Lazer & Meyer, supra note 33, at 904. Whatever rationale might justify subjecting convicts to greater likelihood of being caught in their own future crimes, the logic does not follow to arrestees or to individuals whose crimes are detected through familial DNA.253Lazer & Meyer, supra note 33, at 909–11. Commentators have noted the race disparities in likelihood of detection that result from using arrestee DNA only. Ram, supra note 34, at 789.

The principle of evenhanded enforcement is consonant with what Bennett Capers meant when he argued that equitable policing may require “redistributing privacy.”254Bennett Capers, supra note 59, at 1243–45 (“In exchange for a reduction in hard surveillance of people of color, it will require an increase in soft surveillance of everyone.”). But it may require courts to enforce subpoenas or issue warrants in order to pierce through corporate policies that resist law enforcement access.255See generally Yan Fang, Internet Technology Companies as Evidence Intermediaries, 110 Va. L. Rev. (forthcoming 2024). These policies are already in place at some companies.256Ancestry, Ancestry Privacy Statement (Aug. 11, 2020), https://www.ancestry.com/c/legal/privacystatement_2020_8_11#:~:text=In%20the%20interest%20of%20transparency,data%20across%20all%20our%20sites.&text=We%20may%20share%20your%20Personal,(e.g.%2C%20subpoenas%2C%20warrants)%3B [https://perma.cc/Y8NN-FSXJ]. Of course, there may be times when law enforcement resources really are constrained so that investigating every trackable crime or casting the widest possible dragnet will not be possible, but the police should be able to offer some reasonable explanation. And an explanation that would not be reasonable is that too many individuals would be caught: if the availability of filtered dragnets forces law enforcement to confront the problem that there are too many criminal acts, the proper government response is to revisit and narrow or purge some of the substantive criminal laws.

C.  Police Culture: The Era of the Nerdy Police Force

The adoption of filtered dragnets will require law enforcement agencies to become more technocratic. Much of the initial investigation work is likely to be centralized, in upper management working at desks, and their compliance with Fourth Amendment restrictions will require competence, if not expertise, in statistical methods and data auditing procedures. To some extent, this change in operations is already happening with the gradual introduction of DNA forensic labs, facial recognition, and now, reverse searches. With clear Fourth Amendment guidance for filtered dragnets, police forces could rapidly adopt filtered dragnets and divest somewhat from traditional techniques. Police operations would shift away from self-initiated patrols and field-based investigation toward data-driven initiation and investigation. This will change who is qualified for and attracted to a policing job. Police investigators who are used to solving cases through interrogations and informants will begin to feel like the baseball scouts who still visit high school and college teams looking for “good legs” while their younger, nerdier, and (eventually) better paid colleagues use Bill James-style statistics to prioritize the team’s recruiting efforts.257See generally Michael Lewis, Moneyball (2003).

This may prove to be a feature—a way to achieve the reform of police culture by working backwards from shared ends that are appealing to both suburban families and Black Lives Matter activists (lowering crime, reducing false convictions, and achieving even-handed enforcement). The cultural shift can provide counterpressure to a problem that currently plagues police recruitment—that the people most interested in working for law enforcement have stronger-than-average preferences for meting out punishment.258Dharmapala et al., supra note 67, at 107. All the more reason civil liberties organizations should reconsider their instinctive negative reactions to filtered dragnets.

The criminal defense bar may get transformed, too. Andrew Ferguson has made the case that law enforcement data-collection and data-mining practices can be inverted to discover negligent or abusive practices within police departments.259Andrew Guthrie Ferguson, The Exclusionary Rule in the Age of Blue Data, 72 Vand. L. Rev. 561, 600–08 (2019). Defendants can make use of “blue data” to prove their cases that, for example, law enforcement had used an unreasonably narrow dragnet.260Id. To be fully effective, blue data investigations may require increased transparency and access to police programs. See generally Hannah Bloch-Wehba, Visible Policing: Technology, Transparency, and Democratic Control, 109 Calif. L. Rev. 917 (2021). This may offend a police department’s sense of agency and self-determination, but this is a reasonable price to pay for the power and efficiency of filtered dragnets.261Some will no doubt be concerned that filtered dragnets are a progression of the sort of bureaucratization of policing that has already caused dysfunction—the Compstat meetings, bulk, assembly-line adjudication, et cetera. Stuntz, supra note 15, at 57. But it is not clear that there are viable alternatives to a bureaucratic police force.

VI.  ADDRESSING FRIENDLY OBJECTIONS

Some readers will no doubt disagree with my description of the looming opportunities and problems that will arise with filtered dragnets, and as a result will reject the policy solutions offered in Part V. I addressed doubts about the upsides of filtered surveillance or the downsides of near-perfect detection as best I can in those earlier Parts. Whatever disagreements about the policy implications remain will have to be aired in other fora. Here, I address some objections that will be raised even by readers who agree that the policies advanced in this Article are sound.

“Friendly” critics will wonder why it is necessary to constitutionalize these policies rather than advocating for a legislative response. The answer, in brief, is that constitutional protections are the only viable tools when several criminal justice rules must be changed at the same time.

Friendly critics may also wonder why the Fourth Amendment is the right vehicle for course correction even if all agree that constitutional law must be pressed into service. On this question, I am more neutral. If the Eighth Amendment and Due Process clauses can be interpreted to reach the same anti-authoritarian objectives, there is little reason to insist on the Fourth Amendment as the primary source of these rights. But since filtered dragnets will inevitably cause seismic activity in Fourth Amendment law, and since highly efficient searches are the reason that the threat of government tyranny will become more pronounced, it is at least fair to say that the Fourth Amendment could be the right constitutional source for the anti-authoritarian rights described in Part V.

A.  Why the Courts? (Or, Why Not the Legislature?)

Not every problem in law enforcement needs to be solved through the constitution, but this one does. The political process is exceedingly unlikely to get us out of our criminal justice rut, where low detection rates are messily compensated through criminal liability for minor infractions. Political winds bob from too much lenity to authoritarian severity,262Stuntz, supra note 15, at 34–35. and as a result, surveillance restrictions and decriminalization usually rise and fall together depending on whether the mood is pro-rights or anti-crime. Political institutions do not have the tools to break surveillance and substantive criminal law apart and to work out a criminal justice horse trade. But a horse trade is what we need: we simultaneously need the police to detect more violent crime while also ensuring that no person who is caught with a $10 baggie of drugs could ever be in a position to go to prison for the rest of their life.263Forman, supra note 7, at 121 (describing a former client in this position). Even the more probable outcome—a five-year sentence, say, id. at 122, is vastly over-punitive compared to the risk of harm posed to the community. See generally Jane Bambauer & Andrea Roth, From Damage Caps to Decarceration: Extending Tort Law Safeguards to Criminal Sentencing, 101 B.U. L. Rev. 1667 (2021).

This trade—reduced criminal liability in exchange for greater detection—can only be accomplished through constitutional adjustment. If criminal liability and punishment are reduced without a simultaneous increase in detection, crime rates will rise and the ballot box consequences for political actors will be harsh. If detection capacity is increased without any change to the criminal codes, the political actors’ constituents will be justifiably nervous about how the newfound power of detection will be used. But if the two reforms happen at the same time—if the state is constrained by constitutional interpretation from detaining or imprisoning individuals based on minor infractions, or from levying long sentences for anything other than the most serious and violent offenses—surveillance is defanged because the threat of unjust prosecution is reduced.264See generally Bambauer & Roth, supra note 263 (using a new empirical approach to measure just sentences and finding that criminal sentences are disproportionate to the social harm the crimes caused).

Put another way, the political pressure to limit or ban surveillance tools might make sense as a second-best solution if decriminalization and reduced sentencing is politically infeasible, but the risk is that the strategy can lock out the first best solution—the low penalty/high detection solution. Indeed, in the wake of rising murder rates, the decriminalization and police reform movements are already more politically controversial than they were just a couple years ago. If crime rates continue to rise while detection is capped or suppressed through new legal constraints on technology, politically accountable decisionmakers will continue to use mass incarceration to manage crime.

To be fair, many luminaries in the field of criminal justice have seen roughly the same patterns of dysfunction and technological disruption that I have recounted and have recommended solutions in the form of legislation, administrative regulation, and restoring the role of local government. Bill Stuntz, for example, argued that many of the abuses of power in the criminal justice system would be avoided if local governments (rather than states) were the primary promulgators of criminal law and if juries (rather than prosecutors) were the decisionmakers who most often determined whether a defendant should be convicted or serve time.265Stuntz, supra note 15, at 8, 39. See generally Wayne A. Logan, Fourth Amendment Localism, 93 Ind. L.J. 369 (2018). Chris Slobogin, Barry Friedman, Maria Ponomarenko, Catherine Crump, and Andrew Ferguson have argued that legislatures and regulatory agencies should be more active in structuring how (non-filtered) dragnet and surveillance technologies should and should not be used in the field.266Ferguson, supra note 9, at 272. See generally Christopher Slobogin, Panvasive Surveillance, Political Process Theory, and the Nondelegation Doctrine, 102 Geo. L.J. 1721 (2014); Barry Friedman & Maria Ponomarenko, Democratic Policing, 90 N.Y.U. L. Rev. 1827 (2015); Catherine Crump, Surveillance Policy Making by Procurement, 91 Wash. L. Rev. 1595 (2016). But they also acknowledge that politically accountable bodies always run the risk that their decisions will disproportionately benefit the politically powerful and will be relatively indifferent to problems of under-protection and prejudiced enforcement.267Slobogin, supra note 132, at 134.

Daphna Renan has argued, convincingly in my opinion, that political processes alone cannot be expected to produce the sort of basic rights and counter-majoritarian protections that the Constitution should guarantee.268See generally Renan, supra note 135. Our agreement ends there, though, because Renan advocates for a Fourth Amendment superstructure, or set of principles, that would set requirements and boundaries on administrative agencies (such as the Privacy and Civil Liberties Oversight Board) tasked with creating law enforcement surveillance programs.269Id. at 1108–25. Again, Renan is primarily (though not exclusively) analyzing surveillance technologies that are not crime-driven filtered types of tools that I focus on here. But no board, no matter how independent, could actually make the grand maneuver that I’m asking readers to consider here—where filtered dragnets are permitted, but in exchange for protection from bad laws, harsh punishment, and discretionary application. Renan’s proposal may be a good second-best solution, but a dramatic reorientation of constitutional priorities can only be done by the Supreme Court. It is time for constitutional renewal in search of a better equilibrium.270Jack M. Balkin, The Cycles of Constitutional Time 44–65 (2020) (describing cycles of constitutional “rot,” where the accretion of rules and exceptions have permitted authoritarian practices to fester, and “renewal,” where constitutional theory and courts correct course).

B.  Why the Fourth Amendment?

The harder question, and I confess this is where I am on shakier ground, is why the anti-authoritarian principles that I claim are so important during this inflection point are the responsibility of the Fourth Amendment to solve rather than other parts of the Bill of Rights or notions of substantive due process.271Christopher Slobogin, A Defense of Privacy as the Central Value Protected by the Fourth Amendment’s Prohibition on Unreasonable Searches, 48 Tex. Tech. L. Rev. 143, 155 (2015). The case is somewhat easier for the principle that reasonable searching requires evenhandedness. At the founding, the Fourth and Fifth Amendments were meant to prevent the government from being able to rummage through a disfavored target’s things looking for evidence of a crime, so equal and non-arbitrary treatment was always a goal.272Stuntz, supra note 15, at 72.

The case for using the Fourth Amendment to put constraints on substantive criminal law and sentencing is a bit harder. After all, the Supreme Court has repeatedly authorized law enforcement agencies to execute stops, searches, and arrests, no matter how trivial the law-violating behavior may be to overall public safety.273See discussion of Atwater and Whren, supra Part V. As early as Boyd v. United States, decided in 1886, the Court found that Fourth Amendment protections do not apply to those who have committed a public offense, and courts have declined to second-guess whether the public offense was valid in the course of a Fourth Amendment analysis.274Boyd v. United States, 116 U.S. 616, 630 (1886). The Fourth Amendment protects rights that have “never been forfeited by his conviction of some public offence.” Id. And one may reasonably think that if courts are going to invalidate an overly harsh prison sentence on constitutional grounds, as I argue they should under the guise of protecting against unreasonable seizures, they would have already imposed these limits under the Eighth Amendment’s cruel and unusual punishment clause.275Harmelin v. Michigan, 501 U.S. 957, 997 (1991) (while the Eighth Amendment prohibits “grossly disproportionate” mandatory sentences, noncapital sentences would almost never be found to be grossly disproportionate).

Perhaps it would make as much sense to make Eighth Amendment or Due Process protections more robust to ensure that criminal liability is not overbroad and sentences aren’t overlong.276Note, though, that the Court has already stated a reluctance to expand substantive due process if other parts of the Bill of Rights are relevant to the claim. Sacramento v. Lewis, 523 U.S. 833, 842 (1998). But a long view of the Fourth Amendment can support a shift from the protection of the property, privacy, and autonomy of non-offenders to the protection of those same interests of those who are innocent in the more platonic sense.

In many ways, the history of Fourth Amendment caselaw shows a faltering and incoherent attempt to get to the main point: to make sure the state does not have too much power to enforce silly crimes and scare its constituents into submission.277Cloud, supra note 14, at 202. Cloud also notes that early Fourth Amendment case law was designed to constrain discretion (or “autonomy”) of law enforcement and the judiciary. Id. at 276–284. Silly crimes have been at the center of the original construction of the Fourth Amendment and each of its major reforms. Shortly after the American Revolution, sedition laws motivated creative lawyers like Alexander Hamilton to use procedure in order to correct flaws in the substantive criminal law that were not, at that time, adequately constrained by the First Amendment.278Stuntz, supra note 15, at 71–72. It is particularly strange that the attack required procedural rather than substantive challenges because prosecutions for the crime of seditious libel conducted by the British Crown was a major motivating force behind the Bill of Rights. Thomas P. Crocker, The Political Fourth Amendment, 88 Wash. U. L. Rev. 303, 309, 346 (2010). In the context of that time, when states had nearly full rein to search for physical evidence and when prosecutions were proved primarily using witnesses, the thought that constitutional protections could get in the way of convicting rapists and murderers would have been preposterous.279Tracey Maclin, The Supreme Court and the Fourth Amendment’s Exclusionary Rule 83–100 (2013); Stuntz, supra note 15, at 71–72. After all, the founders did not expect the Fourth Amendment to constrain how local law enforcement investigated crimes, and group searches executed without particularized warrants were tolerated.280Slobogin, Virtual Searches, supra note 29 at 103. Prior to the 1960s, state courts interpreted their constitutional guarantees of freedom from unreasonable searches and seizures to be very permissive. The investigation strategies that police departments adopted were generally considered reasonable. Stuntz, supra note 15 at 68–69. Thus, at that time, the buildup of procedure to help protect against crimes of belief and thought had little cost to the control of more conventional crimes.

Courts again increased Fourth Amendment procedural protections during two subsequent periods when the substance of criminal law was directed at questionable, arguably victimless vice crimes like gambling, alcohol (during prohibition), obscenity, and recreational drugs.281Stuntz, supra note 15, at 110. In the twentieth century, new information technologies changed the nature of police investigation by enabling wiretapping and forms of long-term tracking of suspects without reliance on trespass or witness cooperation. The standard story is that these technologies unsettled the balance between conflicting societal goals related to police investigations, which is true enough. But another important factor is that the test cases involved the detection and enforcement of gambling, bootlegging, and drug distribution crimes. Katz v. United States, the Fourth Amendment case that developed the reasonable expectations of privacy test, involved bugging a phone a bookmaker was using.282Katz v. United States, 389 U.S. 347, 348 (1967). And it followed the logic of Justice Brandeis’s dissent in an earlier case, Olmstead v. United States,283Olmstead v. United States, 277 U.S. 438, 471 (1928) (Brandeis, J., dissenting). which involved the wiretapping of a bootlegger.284Katz, 389 U.S. at 361 (Harlan, J., concurring). Katz marked the end of a primarily property-based conception of Fourth Amendment rights and ushered in the privacy phase. When test facts making their way to the Supreme Court involved more serious crimes, like stalking, the Supreme Court avoided finding a privacy violation.285Smith v. Maryland, 442 U.S. 735, 745–46 (1979). Bill Stuntz critiqued the privacy turn, noting that Fourth Amendment litigation became much too focused on privacy and failed to ameliorate problems of physical security (especially bodily security) when suspects were routinely frisked and thrown to the ground. Stuntz, supra note 15, at 37. See also Michael Klarman, Rethinking the Civil Rights and Civil Liberties Revolutions, 82 Va. L. Rev. 1 (1996).

To be clear, there are other reasons, separate from the substance of the criminal law being enforced, that justify a focus on privacy. Twentieth century surveillance capabilities certainly left Americans—criminals and the innocent alike—at greater risk of unwanted observation of licit activities. But there is also a clear pattern: courts have used criminal procedure to frustrate the enforcement of controversial criminal statutes that cover activities in which a sizable proportion of Americans willingly participate.286The converse is also true: when crime rates spike among the crimes that are most important to a well-functioning society, such as crimes of violence, Fourth Amendment procedural protections are tuned down. Yale Kamisar, The Warren Court and Criminal Justice: A Quarter-Century Retrospective, 31 Tulsa L.J. 1, 2–3 (1995). Once privacy posed a significant obstacle to police investigations, procedural rights became the default defense against a tyrannical state. There was less pressing need to press the Constitution into service to challenge whether conduct should even be considered criminal in the first place or whether the police are protecting communities fairly. For better or worse, the Fourth Amendment privacy rule created a tractor beam for public defenders and civil liberties organizations to concentrate their anti-authoritarian efforts.

Scholars have occasionally attempted to refocus the Fourth Amendment on a more general purpose to create a constraint on power.287Or to create a “constraint on the power of the sovereign, not merely on some of its agents” Arizona v. Evans, 514 U.S. 1, 18 (1995) (Stevens, J., dissenting). With gratitude to Tom Crocker for highlighting this passage. Crocker, supra note 278, at 335 n.188. Bill Stuntz faulted Fourth Amendment’s turn to privacy because it “tend[ed] to obscure more serious harms that attend police misconduct.”288William J. Stuntz, Privacy’s Problem and the Law of Criminal Procedure, 93 Mich. L. Rev. 1016, 1020 (1995). More recently, Thomas Crocker has argued that the Fourth Amendment should be understood as a substantive right, not just a procedural one, that follows in the vision of the First, Second, and Ninth Amendments.289As well as the Fifth Amendment’s takings clause. Crocker, supra note 278, at 309–10, 343. But ultimately, Crocker advocates for the use of this substantive right to argue for a more thorough protection against surveillance.290Id. at 311. Naturally, I think this misses the point. A citizen whose government makes nearly all conduct and action illegal will never feel secure no matter how many restrictions on surveillance are in place. And conversely, a government that is rigidly constrained from expanding its criminal laws beyond the conduct that is nearly universally reviled will be limited in its ability to threaten a citizen’s sense of liberty no matter how much surveillance is in place.

The happenstance of technology provides another reason to prefer the Fourth Amendment over other constitutional sources to redress the problems of overcriminalization and uneven protection. The privacy of the innocent was mediating the clash between American values in freedom and security. Increasing use of filtered dragnets will make this arrangement untenable. If we expect the role of the Fourth Amendment to be meaningful—to be something other than a brief paperwork requirement in the process of securing warrants for filtered dragnets—it is both necessary and appropriate that Fourth Amendment caselaw starts to look for its root function and embrace its substantive as well as procedural dimensions.

CONCLUSION

In 1967, Alan Westin, a leading light among privacy scholars, said that “the modern totalitarian state relies on secrecy for the regime, but high surveillance and disclosure for all other groups.”291Alan Westin, Privacy and Freedom 23 (1967). This is probably a true statement, but highly incomplete. Surveillance is a necessary condition for authoritarian control, but not sufficient on its own. Indeed, all modern states need surveillance. Modern systems of taxation, public benefits distribution, medical services, and public health could not function without copious amounts of personal data. Thus, surveillance is necessary for all states, not just despotic ones. Moreover, surveillance is no more unique to totalitarianism than are weapons, prisons, and other tools the state must use to carry out the most basic obligations to support social order and security.

The tools that live exclusively in the toolbox of despots are repressive substantive criminal laws, harsh punishment, and discretion to choose when to enforce the law. Even in George Orwell’s dark depiction Nineteen Eighty-Four, Big Brother was oppressive partly because of the substance of the law: the wrong thought could land a person in jail.292See generally, George Orwell, Nineteen Eighty-Four (1949).

Against this threat of uncontrolled surveillance, many privacy scholars recommend the dismantling of the surveillance apparatus. This Article focused instead on the “uncontrolled” quality of uncontrolled surveillance. Filtered dragnets are a highly controlled dragnet that reveal only criminal violations. Thus, they are only as threatening to society as the criminal statutes that they enforce and the discretion of the government agents who use them. With the right alignment of Fourth Amendment rules to authoritarian threats, the state can be made to heel—to detect crimes fairly without burdening any communities with under-protection or over-punishment. This will require some intrusion of the traditionally procedural domain of the Fourth Amendment into the substantive realm of criminal law and punishment. If the state can suddenly detect every violation, prison must be reserved for truly awful behavior, and law enforcement should have less latitude to seek out or avoid the investigations of members of certain groups.

These are radical proposals. They go well beyond the privacy framework that has dominated Fourth Amendment theory for over half a century. But they respond to a radical tool that will shock a criminal justice system that is already in crisis and deserves rescue.

97 S. Cal. L. Rev. 571

Download

* University of Arizona James E. Rogers College of Law. The author is grateful for the advice and invaluable feedback from Jordan Blair Woods, Tracey Maclin, Farhang Heydari, Toni Massaro, Tammi Walker, John Villasenor, Andrew Woods, Lilla Montagnani, Kiel Brennan-Marquez, Jeffrey Fagan, Christopher Slobogin, Derek Bambauer, Mark Verstraete, Xiaoqian Hu, Andrew Coan, Niva Elkin-Koren, Uri Hcohen, and Tal Zarsky.

Regressive White-Collar Crime

Fraud is one of the most prosecuted crimes in the United States, yet scholarly and journalistic discourse about fraud and other financial crimes tends to focus on the absence of so-called “white-collar” prosecutions against wealthy executives. This Article complicates that familiar narrative. It contains the first nationwide account of how the United States actually prosecutes financial crime. It shows—contrary to dominant academic and public discourse—that the government prosecutes an enormous number of people for financial crimes and that these prosecutions disproportionately involve the least advantaged U.S. residents accused of low-level offenses. This empirical account directly contradicts the aspiration advanced by the FBI and Department of Justice that federal prosecution ought to be reserved for only the most egregious and sophisticated financial crimes. This Articles argues, in other words, that the term “white-collar crime” is a misnomer.

To build this empirical foundation, the Article uses comprehensive data of the roughly two million federal criminal cases prosecuted over the last three decades matched to county-level population data from the U.S. Census. It demonstrates the history, geography, and inequality that characterize federal financial crime cases, which include myriad crimes such as identity theft, mail and wire fraud, public benefits fraud, and tax fraud, to name just a few. It shows that financial crime defendants are disproportionately low-income and Black, and that this overrepresentation is not only a nationwide pattern, but also a pattern in nearly every federal district in the United States. What’s more, the financial crimes prosecuted against these overrepresented defendants are on average the least serious. This Article ends by exploring how formal law and policy, structural incentives, and individual biases could easily create a prosecutorial regime for financial crime that reinforces inequality based on race, gender, and wealth.

INTRODUCTION

Fraud is an old crime. It can be found in criminal codes around the world for as long as the historical record exists. The Code of Hammurabi, composed around 1750 B.C.E. in Ancient Babylon, included several provisions outlawing various forms of fraud with punishments including death.1Martha T. Roth, Laws of Hammurabi, in Law Collections from Mesopotamia and Asia Minor 82–84, 105, 130 ¶¶ 9, 11, 126, 265 (Piotr Michalowski ed., 1997). As Alice Ristroph has noted, the second-lowest level of Hell in Dante’s fourteenth-century Inferno is reserved for people who perpetrate fraud, treating them more harshly than those who engage in physical violence.2Alice Ristroph, Criminal Law in the Shadow of Violence, 62 Ala. L. Rev. 571, 620–21 (2011) (quoting Dante, The Inferno, Canto XI, 23–29). On the other hand, fraud and financial crimes are capable of causing significant physical harm and, for that reason, some resist labeling white-collar crime as “non-violent.” See, e.g., Miriam Saxon, Subcomm. on Crime of the Comm. on the Judiciary, 95th Cong., 2d. Sess., White Collar Crime: The Problem and the Federal Response 4 (Comm. Print 1978) (“[P]articularly in those many instances of economic crime in which hundreds or thousands of people are affected, the harm to society can frequently be described as violent.”). According to the United States Supreme Court, “fraud has consistently been regarded as such a contaminating component in any crime that American courts have, without exception, included such crimes within the scope of moral turpitude.”3Jordan v. De George, 341 U.S. 223, 229 (1951).

Our state­ and federal criminal codes define myriad kinds of frauds, which comprise the majority of what we call “financial crimes” or “white-collar crimes.” Every year, tens of thousands of U.S. residents are convicted of financial crimes, most of them frauds.4See infra Section I.B.1. Yet, financial crime rarely surfaces in public discussion about how substantive criminal law fuels mass and unequal incarceration in the United States.

Instead, the terms “financial crime” and “white-collar crime” usually conjure up images of a rich banker on Wall Street or an elite executive in a powerful multinational corporation who is able to escape prosecution.5See Samuel W. Buell, “White Collar” Crimes, in The Oxford Handbook of Criminal Law 839 (Markus D. Dubber & Tatjana Hörnle eds., 2014) (noting public discussion of white-collar crime tracks a definition that includes bankers, “Wall Street,” or “corporate America,” as well as “professionals and other service providers and gatekeepers, such as lawyer and accountants, who are integral to the corporate world”). This imagery is fueled by an academic and popular discourse that tends to equate financial crime with the executive class and emphasizes the absence of prosecutions against wealthy people. For example, in recent years, much journalistic coverage of financial crime has focused on explaining why so few people and no companies were convicted of a crime connected to the financial crisis of 2008.6See, e.g., Miriam Baer, Myths and Misunderstandings in White-Collar Crime 108 (2023) (“Commentators simply cannot fathom why federal prosecutors were unable to mount cases against the architects of the subprime crisis, a crisis that is commonly described as one big scam.”); Jesse Eisinger, The Chickenshit Club: Why the Justice Department Fails to Prosecute Executives (2017); Patrick Radden Keefe, Why Corrupt Bankers Avoid Jail, New Yorker (July 31, 2017), https://www.newyorker.com/magazine/2017/07/31/why-corrupt-bankers-avoid-jail [https://perma.cc/QU8K-2UUX]; Michael Winston, Why Have No CEOs Been Punished for the Financial Crisis?, The Hill (Dec. 8, 2016, 6:10 PM), https://thehill.com/blogs/pundits-blog/finance/309544-why-have-no-ceos-been-punished-for-the-financial-crisis [https://perma.cc/4SWK-HFGA]; William D. Cohan, A Clue to the Scarcity of Financial Crisis Prosecutions, N.Y. Times (July 21, 2016), https://www.nytimes.com/2016/07/22/business/dealbook/a-clue-to-the-scarcity-of-financial-crisis-prosecutions.html? [https://perma.cc/8DTA-JKK3]; William D. Cohan, How Wall Street’s Bankers Stayed Out of Jail, Atlantic (Sept. 2015), https://www.theatlantic.com/magazine/archive/2015/09/how-wall-streets-bankers-stayed-out-of-jail/399368 [https://perma.cc/P3BD-7BYU]. Similarly, much academic scholarship about financial crime attempts to document and explain the causes and consequences of the U.S. Department of Justice’s (“DOJ”) routine policy of declining or deferring prosecution of financial crimes committed by or within large companies.7See, e.g., W. Robert Thomas, Incapacitating Criminal Corporations, 72 Vand. L. Rev. 905 (2019); Nick Werle, Note, Prosecuting Corporate Crime When Firms Are Too Big to Jail: Investigation, Deterrence, and Judicial Review, 128 Yale L. J. 1366 (2019); Mihailis E. Diamantis, Clockwork Corporations: A Character Theory of Corporate Punishment, 103 Iowa L. Rev. 507 (2018); Brandon L. Garrett, Too Big to Jail: How Prosecutors Compromise with Corporations (2014); Jennifer Arlen, Prosecuting Beyond the Rule of Law: Corporate Mandates Imposed Through Deferred Prosecution Agreements, 8 J. Legal Analysis 191 (2016); Jennifer Arlen & Marcel Kahan, Corporate Governance Regulation Through Nonprosecution, 84 U. Chi. L. Rev. 323 (2017). But see Samuel W. Buell, Is the White Collar Offender Privileged?, 63 Duke L. J. 823, 824–25 (2014) (questioning the validity of the popular belief that the American criminal system favors corporate offenders). This Article argues that this popular conception of financial crime is inaccurate.

The popular imagery surrounding white-collar crime is also kindled by prosecutors themselves. For decades, the DOJ has repeatedly and publicly touted its focus on fraud prosecutions that hold corporate executives and corporations accountable as opposed to poor and middle-class people. Prosecuting business executives, according to Attorney General Merrick Garland, is “essential to Americans’ trust in the rule of law.”8Attorney General Merrick B. Garland, Remarks to the ABA Institute on White Collar Crime (Mar. 3, 2022) (transcript available at https://www.justice.gov/opa/speech/attorney-general-merrick-b-garland-delivers-remarks-aba-institute-white-collar-crime [https://perma.cc/V9MT-8FU3]). That is because “the rule of law requires that there not be one rule for the powerful and another for the powerless; one rule for the rich and another for the poor.”9Id. Numerous attorneys general have made similar statements.10For example, in 2002, Attorney General John Ashcroft compared corporate fraud with the September 11th attacks. While those attacks were an assault on freedom “from abroad,” corporate fraud, according to Ashcroft, was an assault on freedom “from within.” Attorney General John Ashcroft, Enforcing the Law, Restoring Trust, Defending Freedom, Remarks to the Corporate Fraud/Responsibility Conference (Sept. 27, 2002) (transcript of remarks as prepared at https://www.justice.gov/archive/ag/speeches/2002/092702agremarkscorporatefraudconference.htm [https://perma.cc/P5RZ-SBT2]). In a 2014 speech about corporate crime, Attorney General Eric Holder boasted that DOJ charged more white-collar defendants between 2009 and 2013 than during any previous five-year period going back to at least 1994. Attorney General Eric Holder, Remarks on Financial Fraud Prosecutions at NYU School of Law (Sept. 17, 2014) (transcript available at https://www.justice.gov/opa/speech/attorney-general-holder-remarks-financial-fraud-prosecutions-nyu-school-law [https://perma.cc/HA2A-QFBK]). This prosecutorial discourse risks creating the false impression that financial crime is primarily committed by the most wealthy and privileged Americans and, perhaps as a result, is leniently, if ever, punished. The reality, as this Article shows, is the opposite.

In short, this Article shows that our prevailing conception of financial crime is, at best, incomplete and, at worst, wrong. It argues that scholarly and public discourse around financial crime, which focuses on the absence of “white-collar” prosecutions (that is, prosecutions of members of the wealthy executive class), paints an inaccurate picture of how financial crime is prosecuted. The United States does, in fact, prosecute a huge number of people for financial crimes—thousands per year. But these defendants are for the most part not wealthy executives. Instead, financial crime prosecutions disproportionately involve people who are low-income and people who are Black. This Article suggests that financial crime is in this way unexceptional in an American criminal system that otherwise consistently reflects class- and race-based inequality.11This Article thus suggests that the notion “carceral exceptionalism” in the context of white-collar crime is misguided. See Benjamin Levin, Mens Rea Reform and Its Discontents, 109 J. Crim. L. & Criminology 491, 548-57 (2019) (identifying “carceral exceptionalism” as the phenomenon in which “scholars and advocates on the left” favor “the full force of the carceral state” for certain “exceptional” defendants).

With data on the roughly two million federal criminal cases prosecuted since the early 1990s matched with county-level Census data, this Article is the first comprehensive study of all federal financial crime prosecutions.12As described in Section I.C, others explored similar questions in a series of studies produced in the 1980s through early 2000s known as the “Yale Studies.” The Yale Studies focused on 210 white-collar defendants prosecuted in seven federal district courts. See infra notes 112–116 and accompanying text. This Article demonstrates that, like all federal criminal defendants, the people convicted of financial crimes have fewer resources than the average U.S. adult. Financial crime defendants have attained less formal education than average and frequently rely on appointed counsel. Federal judges waive the fines of roughly eighty-six percent of federal financial crime defendants due to the defendant’s inability to pay. In other words, the median fine in a federal white-collar prosecution is $0.

This Article also shows that financial crimes are not prosecuted at equal rates across the U.S. population. Women are prosecuted at higher rates for financial crimes than for other types of federal crimes.13See infra Appendix Table A.3 (noting that women make up roughly thirty percent of federal financial crime defendants and roughly fourteen percent of all federal criminal defendants). The same is true in state courts, as Kaaryn Gustafson and others have pointed out.14See Kaaryn S. Gustafson, Cheating Welfare: Public Assistance and the Criminalization of Poverty 7 (2011) (pointing out that prosecutions of fraud are “unusual” in that they are more frequently prosecuted against women than other types of crimes); see also Brian A. Reaves, U.S. Dep’t of Just., Bureau of Just. Stat., Felony Defendants in Large Urban Counties, 2009 – Statistical Tables 5 (2013), https://bjs.ojp.gov/content/pub/pdf/fdluc09.pdf [https://perma.cc/C74Y-LETR] (“In 2009, the most frequently charged offenses among female felony defendants were fraud (37%), forgery (34%), and larceny/theft (31%).”). Financial crime prosecutions are also unequal by race. Black women are especially likely to be prosecuted for financial crimes and are prosecuted at roughly three times the per capita rate as Hispanic and non-Hispanic White women.15See infra Appendix Table A.3. The same is true for Black men, who are prosecuted at roughly three times the rate as Hispanic and non-Hispanic White men.16Id.

This analysis is especially important for understanding racial inequalities among female defendants. Black women are more likely to be convicted of a financial crime than any other type of federal crime.17This observation is based on the author’s analysis of the data. The data used in this paper is available for download at Stephanie Holmes Didwania, Data for “Regressive White-Collar Crime, Nw. Univ. (2024), https://doi.org/10.21985/n2-gav7-wt94 [hereinafter Didwania, Data]. This has been true every year since 1994—as far back as reliable federal criminal case data goes.18Id. The same is not true of any other race-gender group of defendants.19Id. Like Black women, non-Hispanic White women and non-Hispanic women of another race are prosecuted for financial crimes more than any other type of crime. Unlike Black women, however, this has not been the case every year for women who are not Black.

This Article also shows it is not the case that the defendants most overrepresented in financial crime cases (that is, low-income defendants and Black defendants) commit the most severe or complex financial crimes. The opposite is true. I argue that these prosecutorial patterns could easily stem from a combination of formal law and policy, individual biases, and systemic incentives.

A muddled view of how financial crime is prosecuted has meaningful consequences. Maybe because financial crime (often stylized as “white-collar” crime) is viewed as a pursuit of the elite, there seems to be little appetite for leniency toward those convicted of financial crimes on either side of the political aisle. As Benjamin Levin and Kate Levine write, “prosecuting some imagined class of bankers or executives remains very popular with many liberal, left, and progressive commentators.”20Benjamin Levin & Kate Levine, Redistributing Justice, Colum. L. Rev. 26 (forthcoming 2024). See also Douglas Husak, The Price of Criminal Law Skepticism: Ten Functions of the Criminal Law, 23 New Crim. L. Rev. 27, 51-52 (2020) (“Even those members of the public who tend to agree that the criminal justice system punishes too many persons with too much severity can be heard to complain when leniency is afforded to . . . white collar criminals.”). Along these lines, President Biden’s clemency efforts have almost exclusively—and in some cases explicitly—focused on people serving sentences for drug trafficking or possession.21For example, in September 2021, the Biden administration invited federal prisoners to apply for clemency if they had been released home under the pandemic relief bill and had four years or less remaining on their sentences. The invitation was limited, however, to people who had been convicted of drug crimes. Sam Stein, Biden Starts Clemency Process for Inmates Released due to Covid Conditions, Politico (Sept. 13, 2021, 1:17 PM), https://www.politico.com/news/2021/09/13/biden-clemency-covid-inmates-511658 [https://perma.cc/N93A-GUEM]. In April 2022, Biden took his first formal clemency actions as President, granting three pardons and seventy-five commutations. Press Release, White House, Clemency Recipient List (Apr. 26, 2022), https://www.whitehouse.gov/briefing-room/statements-releases/2022/04/26/clemency-recipient-list [https://perma.cc/6RQG-NGMV]. Of the seventy-eight clemency recipients, all but one had been convicted of drug crimes. Id. In October 2022, Biden announced a pardon of all prior federal convictions of marijuana possession. Press Release, White House, Statement from President Biden on Marijuana Reform (Oct. 6, 2022), https://www.whitehouse.gov/briefing-room/statements-releases/2022/10/06/statement-from-president-biden-on-marijuana-reform [https://perma.cc/3X8W-U2UE].

Not only has the Biden administration essentially excluded white-collar prisoners from its clemency efforts, but Attorney General Merrick Garland has also emphasized that cracking down on white-collar crime is one of DOJ’s top priorities.22Garland, supra note 8. In a March 2022 speech describing this white-collar initiative, then-Assistant Attorney General for the Criminal Division Kenneth A. Polite, Jr. echoed the idea that white-collar crime is not punished harshly enough, telling the audience, “When we talk about drug dealing and violence, we all have no problem conjuring notions of accountability for the criminal actors. But the sheer mention of individual accountability in white-collar cases was, and is, received as a shockwave in our practice.”23Assistant Attorney General Kenneth A. Polite, Jr., Justice Department Keynote at the ABA Institute on White Collar Crime (Mar. 3, 2022) (transcript of remarks as prepared for delivery at https://www.justice.gov/opa/speech/assistant-attorney-general-kenneth-polite-jr-delivers-justice-department-keynote-aba [https://perma.cc/L8UU-FFBB]). This Article cautions that directing more resources toward prosecuting white-collar crime could perpetuate class- and race-based inequalities rather than mitigate them.24This Article thus supports the argument advanced by Benjamin Levin and Kate Levine that those on the progressive left who hope the criminal system will work as a tool of progressive redistribution is unlikely to succeed. Levin & Levine, supra note 20, at 37–38 (forthcoming 2024) (arguing that “institutions of the punitive state are inherently regressive and are antithetical to the egalitarian vision articulated by many of the commentators who have embraced redistributive carceral projects”)

The federal criminal system is a worthy site to study the regressive prosecution of white-collar crime even though most criminal defendants in the United States are prosecuted in state courts.25In 2020—the last year for which data was available—around 1.2 million people were under the legal jurisdiction of a state or federal correctional authority. Within this population, eighty-seven percent of the people were under state jurisdiction and thirteen percent were under federal jurisdiction. This calculation excludes people held in local jails. See E. Ann Carson, U.S. Dep’t of Just., Bureau of Just. Stat., Prisoners in 2020 – Statistical Tables 7 (2021). This Article focuses on the federal system for two reasons. First, the federal criminal system is important in its own right. The federal government incarcerates more people than any state and federal prisoners on average serve longer sentences than state prisoners.26Id. at 7–8 (showing that the federal prisoner population was 152,156 in 2020 and the jurisdiction with the second-largest prisoner population (Texas) imprisoned 135,906 people in 2020). The median time served in state prison for prisoners released in 2018 was 1.3 years. Danielle Kaeble, U.S. Dep’t of Just., Bureau of Just. Stat., Time Served in State Prison, 2018 1 (2021). By contrast, the median federal sentence in the 1994–2019 period was two years. Federal criminal defendants must serve at least eighty-five percent of their sentence, so even accounting for good time credit, the median time served for federal prisoners over this period was at least 1.7 years. 18 U.S.C. § 3624(b)(1) (providing that federal prisoners serving more than 1 year in prison can get credit towards their sentence of 54 days per year if they display “exemplary compliance with institutional disciplinary regulations”). Fraud—the most common financial crime—is itself the third-most prosecuted type of federal crime after drug trafficking and immigration offenses.27This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17. Indeed, even as federal prosecutions of other types of crimes have exploded, fraud alone has constituted around 10 percent or more of the federal felony docket since the early 1990s.28Id.

Second, as described in Section I.B, federal officials repeatedly emphasize that it is their goal to prosecute the most egregious and complex financial crimes. Because state courts have concurrent jurisdiction over many financial crimes, DOJ and FBI can in theory focus their efforts on complex investigations. DOJ and FBI routinely tout their partnerships with other federal agencies to detect and prosecute sophisticated financial crimes. It seems unlikely that state prosecutors are doing better than the federal government at prosecuting complex financial crimes with fewer investigative resources. For this reason, prosecuting serious financial crime is often viewed as a federal project.29See Daniel C. Richman & William J. Stuntz, Al Capone’s Revenge: An Essay on the Political Economy of Pretextual Prosecution, 105 Colum. L. Rev. 583, 601–02 (2005).

Indeed, many observers rightly view the complexity of serious financial crimes as an impediment to prosecution. Criminal investigations can take years; relevant documents can number in the millions; trials can take months.30See, e.g., Press Release, U.S. Dep’t. of Just., Federal Jury Convicts Former Enron Chief Executives Ken Lay, Jeff Skilling on Fraud, Conspiracy, and Related Charges (May 25, 2006), https://www.justice.gov/archive/opa/pr/2006/May/06_crm_328.html [https://perma.cc/9UYY-Y7LE] (noting that the trial of Enron executives Kenneth Lay and Jeffrey Skilling took fifty-six days). This Article’s primary goal is not to determine whether the federal government has chosen the best balance in prosecuting the cases that it does, but rather to bring to light the fact that most financial crime cases are modest ones that disproportionately impact people with the fewest advantages.

This Article’s analysis advances in four steps. Part I traces the history of financial crime and shows how, for centuries, rich and powerful people have escaped prosecution for financial crimes while people who are poor and middle-class have been prosecuted. Section I.B describes how federal financial crime cases are prosecuted today and provides examples of four such cases. Section I.C argues that most scholarly and public discourse around financial crime overlooks the types of financial criminal cases that are most routinely prosecuted in U.S. courts.

Part II presents the bulk of the empirical analysis. It shows persistent income, gender, and race gaps in financial crime prosecutions that disfavor defendants who are low-income, male, and Black. Part III offers many possible explanations for the results. It groups these explanations into four categories. First, Section III.A considers but rules out the possibility that people who are overrepresented commit the most serious financial crimes. Second, Section III.B describes how systemic and structural conditions create a system in which prosecutors are motivated to prosecute the cases they view as most winnable. Third, Section III.C describes ways that formal criminal law and policies could lead prosecutors to focus their efforts on simplistic, low-level financial crimes. As one example, it shows how federal laws governing restitution benefit defendants with more resources. Finally, Section III.D describes how biases on the part of actors in the criminal system could contribute to inequality.

Part IV concludes. It argues that the findings provide vital context for understanding how financial crime is prosecuted in the United States and challenges the popular notion that financial crime is under-prosecuted.

I.  PROSECUTING FINANCIAL CRIME

This Part broadly traces the history of financial crime prosecution. As described in Section I.A, the United States has a long history of prosecuting poor and middle-class people for financial crimes. (Part II shows that this pattern continues through today, despite repeated statements to the contrary by modern prosecutors). Section I.B describes how the federal government has prosecuted fraud since the 1990s and presents four archetypical examples of federal financial crime cases, to which I return throughout the Article. Section I.C explains how this Article contributes to the existing literature on federal financial crime, which largely avoids discussing the relatively low-level cases that pervade the federal criminal system.

A.  Early Prosecutions and the Concept of “White-Collar” Crime

Most financial crimes are frauds.31Other financial crimes include embezzlement, antitrust violations, and counterfeiting. See infra Sections I.B (explaining how the FBI categorizes white-collar crime), II.A (explaining how the U.S. Sentencing Commission categorizes white-collar crime), and II.B, Table 1 (showing that fraud makes up almost eighty percent of cases in the data). For centuries and up to present day, Anglo-American legal systems have tolerated frauds committed by the rich and powerful while systematically prosecuting poor and middle-class people for fraud offenses.32See, e.g., Emily Kadens, The Persistent Limits of Fraud Prevention in Historical Perspective, 118 Nw. U. L. Rev. 167, 173-79 (2023) (describing challenges in efforts during the Middle Ages to regulate fraud in consumer markets). But wealthy people have always committed fraud and other financial crimes even if they went unpunished. For example, the term “robber barons” originated to describe medieval English nobles who engaged in extortion.33Barbara A. Hanawalt, Fur-Collar Crime: The Pattern of Crime Among the Fourteenth-Century English Nobility, 8 J. Soc. Hist. 1, 1 (1975). The title of Hanawalt’s article refers to legislation by King Edward III of England that only permitted noble families to wear minever fur. See id. at 2. As historian Barbara Hanawalt describes, “kings and barons [of medieval England] both assumed that a certain amount of criminal activity was involved in being a noble and that it would be tolerated as long as it did not become excessive.”34Id. at 2; see id. at 3, 15 n.9 (reporting that 14 out of around 10,500 felony indictments in the fourteenth century involved members of the nobility). Although medieval English nobles engaged in “widespread extortion,” they were rarely criminally prosecuted.35Id. at 2–3 (noting that “the kings could use a number of informal and indirect means to control the illegal activities of their barons without bringing them into common criminal courts”); see also Kadens, supra note 32, at 168 (“Fraud is not, as it is sometimes assumed, a creature of modern capitalism, industrialization, the spread of complex financial systems, or the development of the corporation. On the contrary, many of the same types of frauds that we see today have existed throughout the history of organized society.”).

In other words, society saw financial crimes committed by the elite as part of the social fabric. Fraud was thus considered what observers would come to call a “street crime,” meaning it was viewed as a crime when committed by poor or middle-class people. For example, one of early America’s most infamous fraudsters—Charles Ponzi—was a poor immigrant from Italy who worked as a dishwasher, waiter, and bank teller before launching the eponymous scheme that would eventually result in his arrest, conviction of federal mail fraud, and a seven-year prison sentence.36Sewell Chan, A Look Back at Charles Ponzi the Schemer, N.Y. Times (Dec. 15, 2008, 12:53 PM), https://archive.nytimes.com/cityroom.blogs.nytimes.com/2008/12/15/ponzi-the-schemer-evoked-once-again [https://perma.cc/L842-PRXA]. Despite eventually amassing enormous wealth through his pyramid scheme, Ponzi was never a member of the elite.37Id. (quoting Mitchell Zuckoff describing, “[Ponzi] had his nose pressed against the glass . . . . He was not linked with Wall Street and New York, though he had dreams of being like Rockefeller”).

Meanwhile, as centuries went on, the term “robber barons” adapted to refer to business magnates of the nineteenth century who monopolized industries, corrupted government, engaged in unethical business practices, and exploited workers and investors.38See Hal Bridges, The Robber Baron Concept in American History, 32 Bus. Hist. Rev. 1, 1 (1958). Like the medieval robber barons whose criminal activity was ignored by the King,39See supra note 33 and accompanying text. the robber barons of the 1800s were also rarely prosecuted.40Lawrence M. Friedman, Crime and Punishment in American History 290 (1993) (“[T]here was a certain lack of zeal for punishing business behavior [before the 1930s].”) (cited in Eisinger, supra note 6 at 59).

By the early twentieth century and spurred by the Great Depression, the public and federal government grew increasingly interested in regulating markets and prosecuting members of the upper classes. During this era, Congress passed antitrust laws and laws regulating Wall Street.41Congress passed the Sherman Act in 1890, the Federal Trade Commission Act (creating the FTC) in 1914, and the Clayton Act in 1914. The Antitrust Laws, Fed. Trade Comm’n, https://www.ftc.gov/advice-guidance/competition-guidance/guide-antitrust-laws/antitrust-laws [https://perma.cc/JZ6J-S5TT]. As the Federal Trade Commission describes, “[w]ith some revisions, these are the three core federal antitrust laws still in effect today.” Id. Following the stock market crash of 1929, Congress in 1934 created the Securities and Exchange Commission (“SEC”) to restore confidence in the stock market and enforce securities laws.42Securities Exchange Act of 1934, Pub. L. No. 73-291, 48 Stat. 881 (creating the U.S. Securities and Exchange Commission and requiring stock exchanges to register with the federal government).

Scholars and the public needed an entirely new phrase—“white-collar crime”—to recognize that fraud committed by members of the elite was crime. Recognizing that members of the upper class engaged in enormous amounts of unpunished financial crime, sociologist Edwin Sutherland coined the term “white-collar crime” in his 1939 presidential address to the American Sociological Society.43Edwin H. Sutherland, White-Collar Criminality, 5 Am. Socio. Rev. 1, 1–2, n.1 (1940) (Thirty-Fourth Annual Presidential Address delivered at Philadelphia, Pa., Dec. 27, 1939). Sutherland went on to write a book by a similar name. Edwin H. Sutherland, White Collar Crime (1949).

Sutherland defined a “white-collar crime” as “a crime committed by a person of respectability and high social status in the course of his occupation.”44Sutherland, White Collar Crime, supra note 43, at 7. Sutherland’s basic thesis was that the academic methods by which crime was understood and measured at the time were invalid because “they have not included vast areas of criminal behavior of persons not in the lower class.”45Sutherland, White-Collar Criminality, supra note 43, at 2.

Sutherland critiqued the academic criminological community for focusing too heavily on “street crimes” perpetrated by “low status” people and for being insufficiently interested in crimes committed by people in “high status” occupations. As an example, Sutherland explained, “The ‘robber barons’ of the last half of the nineteenth century were white-collar criminals, as practically everyone now agrees.”46Id. Sutherland warned, however,

The present-day white-collar criminals . . . are more suave and deceptive than the “robber barons” . . . . Their criminality has been demonstrated again and again in the investigations of land offices, railways, insurance, munitions, banking, public utilities, stock exchanges, the oil industry, real estate, reorganization committees, receiverships, bankruptcies, and politics. Individual cases of such criminality are reported frequently, and in many periods more important crime news may be found on the financial pages of newspapers than on the front pages.47Id.

Beginning in the mid-twentieth century, the federal government began to articulate and attempt to carry out a new vision of white-collar prosecution. In the 1970s the SEC created its first enforcement division to uncover fraud.48Harwell Wells, The Securities and Exchange Commission’s Enforcement Division: A
History, Temple 10-Q, https://www2.law.temple.edu/10q/the-securities-and-exchange-commissions-enforcement-division-a-history [https://perma.cc/C8HF-X9MS].
In 1977, Congress passed the Foreign Corrupt Practices Act which outlawed bribery of foreign officials principally by large U.S. companies.49Foreign Corrupt Practices Act of 1977, Pub. L. No. 95-213, 91 Stat. 1494. In the 1980s, DOJ prosecuted over 1,000 cases associated with the savings and loan crisis, including some top executives at major banks.50Kitty Calavita, Henry N. Pontell & Robert H. Tillman, Big Money Crime: Fraud and Politics in the Savings and Loan Crisis 28 (1997) (“By the spring of 1992, in excess of one thousand defendants had been formally charged in major savings and loan cases, with a conviction rate of 91 percent . . . .”). During this time, as some observers noted, “Many U.S. Attorneys’ Offices . . . restructured their offices in order to develop and prosecute a large number of cases of white-collar crime.”51Kenneth Mann, Stanton Wheeler & Austin Sarat, Sentencing the White-Collar Offender, 17 Am. Crim. L. Rev. 479, 480 n.3 (1980); see also Elizabeth Hinton, From the War on Poverty to the War on Crime: The Making of Mass Incarceration in America 24 (2016) (noting that FBI crime data during the 1960s and 1970s “emphasized street crime to the exclusion of organized and white-collar crime”). The next subsection describes the mechanics of this modern era of federal enforcement of financial crime.

B.  Modern Fraud Prosecutions: 1990s Through Present

Efforts to differentiate financial crime committed by the elite from financial crime committed by poor or middle-class people were short-lived. Today, the term “white-collar” crime eludes easy definition.52Stuart P. Green, The Concept of White Collar Crime in Law and Legal Theory, 8 Buff. Crim. L. Rev. 1, 2 (2004) (claiming that “the meaning of white collar crime . . . is deeply contested. . . . [but d]espite its fundamental awkwardness, the term ‘white collar crime’ is now so deeply embedded within our legal, moral, and social science vocabularies that it could hardly be abandoned”). Scholars, journalists, and public officials often use the term as in its original definition—to refer to financial crimes committed by wealthy people in the course of business activity,53See infra note 111 and accompanying text. as exemplified by Ralph Nader’s pithy description of white-collar crime as “crime in the suites,” rather than “crime in the streets.”54Ralph Nader, White Collar Fraud; America’s Crime Without Criminals, N.Y Times, May 19, 1985 (§ 3), at 3, https://www.nytimes.com/1985/05/19/business/white-collar-fraud-america-s-crime-without-criminals.html [https://perma.cc/E7DE-SZQS].

However, official definitions of the term “white-collar” crime typically do not refer to the social status or occupation of those who perpetrate it, but rather, to the type of criminal behavior committed by the defendant.55The FBI explains that it would be impractical for the FBI to report white-collar crime statistics based on the offender’s socioeconomic status because that data is not available in the Uniform Crime Reports. See Cynthia Barnett, U.S. Dep’t of Just., Fed. Bureau of Investigation, The Measurement of White-Collar Crime Using Uniform Crime Reporting (UCR) Data 1 (2000) (“Although it is acceptable to use socioeconomic characteristics of the offender to define white-collar crime, it is impossible to measure white-collar crime with UCR data if the working definition revolves around the type of offender. There are no socioeconomic or occupational indicators of the offender in the data.”). The FBI, for example, defines “white-collar crime” as “those illegal acts which are characterized by deceit, concealment, or violation of trust and which are not dependent upon the application or threat of physical force or violence.”56Id. The National Incident-Based Reporting System (“NIBRS”), which compiles data on crimes reported to law enforcement, classifies the following crimes as white-collar crimes: fraud, bribery, counterfeiting/forgery, embezzlement, and writing bad checks.57Id. at 2.

This Article roughly follows the NIBRS definition but uses the term financial crime because, as this Article shows, the term white-collar crime is a misnomer. I define a crime as a financial crime if it is categorized as an antitrust violation, bribery, counterfeiting, forgery, fraud, or tax offense.58See infra Section II.A (describing how the data is constructed). Since the mid-1990s, the federal government has prosecuted around 10,000 financial crimes per year, most of them frauds.59See infra Appendix Figure A.1. The statistics presented in the Article show the same patterns when the data is restricted to fraud cases. Until fiscal year 2018, the U.S. Sentencing Commission reported separately whether a defendant’s offense of conviction was a fraud, larceny, or embezzlement. Beginning in 2018, however, the U.S. Sentencing Commission began combining these three types of crime into one category in the data. To make the data consistent throughout, I combined the three categories together under the label “financial crime” in the years prior to 2018. This section describes in broad terms how the federal government prosecutes and talks about financial crime.

1.  The Statutory Landscape

Federal law today defines many types of financial crimes, most of which are contained in Chapter 47 of Title 18 of the United States Code. The most commonly prosecuted federal financial crimes are embezzlement of public money, mail and wire fraud, bank fraud, and tax fraud.60See infra Appendix Table A.1. Congress has repeatedly expanded the scope of federal financial criminal law and, over the years 1994 to 2019, federal defendants were prosecuted for violations of many different types of fraud.61See id.

Federal prosecutors use mail fraud (and its sister crime, wire fraud) particularly expansively. The original mail fraud statute prohibited the use of the mails to advance “any scheme or artifice to defraud.”62Act of June 8, 1872, Pub. L. No. 42-335, § 301, 17 Stat. 283, 323 (revising, consolidating, and amending the statutes relating to the Post Office Department). Congress has expanded the mail fraud statute several times since its original passage. Mail fraud is now defined in 18 U.S.C. § 1341. The original purpose of the statute was to protect the U.S. Postal Service from being used to commit fraud. Mail was the “first communications network in the United States,”63Anuj C. Desai, Wiretapping Before the Wires: The Post Office and the Birth of Communications Privacy, 60 Stan. L. Rev. 553, 553 (2007). and in 1870 the U.S. Postal Service enjoyed a natural monopoly over mail delivery.64See id. at 573. Perhaps because the mail was so widely used, “[o]ver time, the mail fraud statute came to be viewed as a stop-gap provision that provides a ‘first line of defense’ to combat innovative frauds until Congress could enact more specific legislation.”65Peter J. Henning, Maybe It Should Just Be Called Federal Fraud: The Changing Nature of the Mail Fraud Statute, 36 B.C. L. Rev. 435, 437 (1995).

In 1995, Peter Henning contended that “the mail fraud statute has become the primary provision to extend federal jurisdiction to crimes traditionally prosecuted only at the state and local level.”66Id. Today nearly all frauds use mail, telephone, radio, or the Internet in some way, giving the federal government the ability to prosecute almost any fraud it chooses. Federal prosecutors exercise enormous discretion in deciding which fraud crimes to prosecute, and the resulting prosecutions therefore reflect decisions by prosecutors and law enforcement agents about which cases to prioritize.

Although there are many federal financial crimes, their defining characteristic is that they involve dishonesty. To this end, most financial crimes include mens rea elements that require the government to specifically prove the defendant’s deceitful intent.67Some observers point out that financial crime’s traditionally high mental state requirements have, to some extent, been eroded with theories of, for example, willful blindness or reckless regard for falsity. Baer, supra note 6, at 30-31 (2023). For example, the mail fraud statute requires proof that the defendant devised or intended a “scheme or artifice to defraud.”6818 U.S.C. § 1341. Health care fraud similarly requires proof that the defendant knowingly and willfully executed “a scheme or artifice . . . to defraud any health care benefit program” or to obtain, “by means of false or fraudulent pretenses, . . . any of the money or property owned by, or under the custody or control of, any health care benefit program.”69Id. § 1347 (a)(1)–(2).

Despite this common element, the financial crimes that are prosecuted vary widely on many grounds. Victims of financial crimes can be individuals, organizations, or the government. Some financial crimes have a single concrete victim, others have many, and yet others have no concrete victim (like insider trading). Some financial crimes involve wrongdoing that is also investigated and enforced by the government through civil proceedings (such as securities fraud or tax fraud), while others have no regulatory counterpart (such as embezzlement). The next section broadly describes how federal prosecutors and agents investigate and bring financial crime cases.

2.  Federal Prosecutions in Practice

Nearly all federal financial crime prosecutions are brought by prosecutors who work in the ninety-three U.S. Attorney’s Offices (“USAOs”). Each USAO is associated with exactly one of the 94 geographically distinct federal district courts, with one exception.70The District of Guam and the District of the Northern Mariana Islands share a USAO. Every USAO is led by a U.S. Attorney, who is appointed by the President. The prosecutors who work in USAOs are called Assistant United States Attorneys (“AUSAs”).

Although USAOs must follow centralized policies dictated by DOJ leadership, they for the most part work independently, prosecuting crimes that occur within their jurisdictions. Most prosecutorial decisions (such as the decision to bring criminal charges) are subject to little judicial oversight and courts are “hesitant to examine the decision whether to prosecute.”71Wayte v. United States, 470 U.S. 598, 608 (1985). As a result, prosecutors enjoy broad discretion in deciding how to carry out their work.72See Stephanos Bibas, Prosecutorial Regulations Versus Prosecutorial Accountability, 157 U. Pa. L. Rev. 959, 959 (2009) (“Few regulations bind or even guide prosecutorial discretion, and fewer still work well.”); William J. Stuntz, The Pathological Politics of Criminal Law, 100 Mich. L. Rev. 505, 506 (2001) (describing prosecutors as “the criminal justice system’s real lawmakers”). In theory, a defendant can challenge their prosecution on the ground that it was brought selectively—that is, based on a prohibited consideration such as the defendant’s race or religion. See Oyler v. Boles, 368 U.S. 448, 456 (1962). In practice, however, selective prosecution challenges virtually never succeed. See Richard H. McAdams, Race and Selective Prosecution: Discovering the Pitfalls of Armstrong, 73 Chi.-Kent L. Rev. 605, 615–16 (1998) (noting that since 1886 there has been only one published case dismissing a criminal charge based on racially selective prosecution). But see Alison Siegler & William Admussen, Discovering Racial Discrimination by the Police, 115 Nw. U. L. Rev. 987, 987 (2021) (describing how federal courts can and should lower the discovery standards for defendants alleging racial discrimination by the police).

Despite limited oversight from the courts, individual prosecutors are subject to other forms of workplace oversight. AUSAs are governed by the Justice Manual, which contains detailed rules for how individual prosecutors should exercise their discretion. For example, the Manual dictates that charging decisions should be reviewed by supervisors and specifies that “[a]ll but the most routine indictments should be accompanied by a prosecution memorandum that identifies the charging options supported by the evidence and the law and explains the charging decision[s] therein.”73U.S. Dep’t of Just., Just. Manual § 9-27.300 (2023).

The Manual also expresses a nationwide policy that federal prosecutors should usually charge “the most serious offense that is encompassed by the defendant’s conduct and that is likely to result in a sustainable conviction.”74Id. However, the Manual leaves room for an AUSA to deviate from this policy by also considering “whether the consequences of those charges for sentencing would yield a result that is proportional to the seriousness of the defendant’s conduct, and whether the charge achieves [the] purposes of the criminal law.”75Id.

Given these policies, how do prosecutors decide which cases to charge? The answer is complicated and varied, but much legal and sociolegal scholarship has shown the perhaps unremarkable phenomenon that prosecutors seem to like to bring cases they think they can win.76See Brandon Hasbrouck, The Just Prosecutor, 99 Wash. & Lee U. L. Rev. 627, 632 (2021) (“The adversary system derails many prosecutors, including progressive prosecutors, and turns them into win-seekers instead of neutral agents of justice.”); Rachel E. Barkow, Institutional Design and the Policing of Prosecutors: Lessons from Administrative Law, 61 Stan. L. Rev. 869, 883 (2009) (suggesting that prosecutors “may feel the need to be able to point to a record of convictions and long sentences if they want to be promoted or to land high-powered jobs outside the government” and prefer to “keep up [their] conviction rate”); Tracey L. Meares, Rewards for Good Behavior: Influencing Prosecutorial Discretion and Conduct with Financial Incentives, 64 Fordham L. Rev. 851, 867 (1995) (“A prosecutor will naturally select the stronger cases to charge.”). But see Richard T. Boylan, What Do Prosecutors Maximize? Evidence from the Careers of U.S. Attorneys, 7 Am. L. & Econ. Rev 379, 379 (2005) (finding that “conviction rates do not appear to affect the careers of U.S. attorneys”). This is because obtaining convictions is often a metric for promotion and advancement.77Stephanos Bibas, Plea Bargaining Outside the Shadow of Trial, 117 Harv. L. Rev. 2463, 2471 (2004) (“[P]rosecutors want to ensure convictions . . . . Favorable win-loss statistics boost prosecutors’ egos, their esteem, their praise by colleagues, and their prospects for promotion and career advancement.”). Winning cases is also important for appropriations. As Lauren Ouziel describes,

U.S. Attorney’s Offices, after all, need money, and federal funds are not forthcoming—either from Congress in the first instance or Main Justice in the subsequent allocation—without some measure of demonstrated performance. For federal prosecutors, the relevant performance metrics are defendants charged and convicted. Both of these metrics determine the lump sum congressional appropriation for all ninety-three U.S. Attorneys’ Offices across the country, while individual offices’ caseloads largely determine the allocation of those funds among the offices. In short, case volume and prosecutorial success dictate a U.S. Attorney’s Office’s budget allocation.78Lauren M. Ouziel, Ambition and Fruition in Federal Criminal Law: A Case Study, 103 Va. L. Rev. 1077, 1108–09 (2017) (citing U.S. Dep’t of Justice, U.S. Attorneys, FY 2014 Performance Budget Congressional Submission 1, 15; Dep’t of Justice, Office of Inspector Gen., Audit Div., Audit Report 09-03, Resource Management of United States Attorneys’ Offices 7–10 (Nov. 2008)).

After a person is convicted of a federal crime, federal judges sentence them. At sentencing, a judge can impose fines or imprisonment or both on a defendant, and some scholars have pointed out that fines are imposed more frequently in financial crime prosecutions than in other federal prosecutions.79Max Schanzenbach & Michael L. Yaeger, Prison Time, Fines, and Federal White-Collar Criminals: The Anatomy of a Racial Disparity, 96 J. Crim. L. & Criminology 757, 768 (2006). Some have theorized that fines are more appropriate for defendants convicted of financial crimes because their crimes are more deterrable.80See, e.g., Stephanos Bibas, White-Collar Plea Bargaining and Sentencing After Booker, 47 Wm. & Mary L. Rev. 721, 724 (2005) (“An economist would argue that if one increased the expected cost of white-collar crime by raising the expected penalty, white-collar crime would be unprofitable and would thus cease.”). Others, including Richard Posner, have argued that fines should be more widely used for the entire spectrum of crimes given the high costs of physical incarceration. See Richard A. Posner, Optimal Sentences for White-Collar Criminals, 17 Am. Crim. L. Rev. 409, 409–10 (1980) (arguing in favor of “the substitution, whenever possible, of the fine (or civil penalty) for the prison sentence as the punishment for crime”). But see Dorothy S. Lund & Natasha Sarin, Corporate Crime and Punishment: An Empirical Study, 100 Tex. L. Rev. 285, 285 (2021) (arguing that “enforcers are unlikely to achieve optimal deterrence using fines alone”); Jed S. Rakoff, The Financial Crisis: Why Have No High-Level Executives Been Prosecuted?, N.Y. Rev. Books (Jan. 9, 2014), https://www.nybooks.com/articles/2014/01/09/financial-crisis-why-no-executive-prosecutions [https://perma.cc/5BRX-UBAD] (arguing that fines are inadequate to change corporate behavior and that the threat of imprisonment against executives would be a more effective deterrent). Researchers have also argued that the prevalence of fines in financial crime sentencing reflects a fine/incarceration tradeoff, in which the greater a defendant’s ability to pay a fine, the less (if any) imprisonment is imposed at sentencing.81See Joel Waldfogel, Are Fines and Prison Terms Used Efficiently? Evidence on Federal Fraud Offenders, 39 J.L. & Econ. 107, 107 (1995).

The literature on white-collar crime’s fine/incarceration tradeoff might give the impression that fines are widespread in financial crime prosecutions, but this is not the case. Most federal financial crime defendants do not have any fines imposed in their cases. In the data, the median fine amount for a defendant convicted of a federal financial crime is $0.82See infra Table 1. A fine of just $500 represents the top thirteen percent of fines imposed among people convicted of financial crimes.83This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17. It is true that fines are more prevalent among financial crime defendants than others (a fine of $500 for a federal defendant convicted of a non-financial crime would represent the top nine percent of all fines imposed),84Id. but it is not the case that fines are widespread among those who are convicted of financial crimes. Instead, fines are much more relevant in cases involving corporate defendants. This is because corporations cannot be imprisoned, fines generate revenue, and prosecutors worry about the collateral consequences that criminal conviction can impose on large corporations.85For example, Mary Jo White, former U.S. Attorney for the Southern District of New York (and future SEC Chair) said in an interview, “[a]ny prosecutor hesitates before bringing an action against a company because of the fear that that company will go out of business.” Interview with Mary Jo White, Debevoise, New York, New York, 19 Corp. Crime Rep. (Dec. 12, 2005), https://www.corporatecrimereporter.com/news/200/category/sampleinterviews [https://perma.cc/MLL3-UCCM].

In addition to fines and imprisonment, convicted defendants will usually be ordered to pay restitution to any concrete victim. Restitution is different from a fine. A fine is a form of punishment imposed on a defendant and usually paid to the government prosecuting the case. Restitution is instead paid by the defendant to either the victim or a government restitution fund. Like the law in all states, federal law requires courts to order restitution in any case “in which an identifiable victim or victims has suffered a physical injury or pecuniary loss.”8618 U.S.C. § 3663A(c)(1)(B).

Unlike fines, most defendants convicted of a financial crime are ordered to pay some restitution. The median restitution amount ordered is around $6,000.87See infra Table 1. In contrast, for federal defendants convicted of non-financial crimes, fewer than ten percent are ordered to pay any restitution.88This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17.

The majority of defendants convicted of federal financial crimes are sentenced to prison. Sentences for financial crime defendants are lower than the average among other types of federal crimes. For federal criminal defendants convicted of financial crimes, the average sentence is around sixteen months.89See infra Table 1. For all other federal criminal defendants, the average sentence is fifty-three months.90This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17. This could reflect the fact that most financial crimes do not carry mandatory minimum penalty provisions.91The only type of financial crime that carries a mandatory minimum is identity theft. Aggravated identity theft includes a two-year mandatory minimum penalty. 18 U.S.C. § 1028A; see also An Overview of Mandatory Minimum Penalties in the Fed. Crim. Just. Sys. § 3 (U.S. Sent’g Comm’n 2017) (listing federal crimes that carry mandatory minimum penalties).

3.  Federal Financial Crime Archetypes

This subsection illustrates some of the kinds of financial crime cases the federal government prosecutes. It centers around four real-world examples of federal financial crimes, from least to most severe.92As Miriam Baer has pointed out, most federal fraud offenses are not statutorily graded the way other types of crimes are. See Miriam H. Baer, Sorting Out White-Collar Crime, 97 Tex. L. Rev. 225, 228 (2018). Instead, a federal fraud’s severity is largely driven by the dollar amount of loss, as dictated by § 2B1.1 of the United States Sentencing Guidelines. See id. at 250 (“Because the federal criminal code declines to differentiate fraud up front—either by amount, mens rea, or degree of risk—whatever sorting there is of fraud offenses takes place at sentencing.”). These cases exemplify nationwide patterns that this Article reports and explores in Part II, and this Article returns to these examples throughout.

In Case A, a man who is a citizen of Mexico used a social security number belonging to another person to secure employment and attend a job orientation training with a local company.93Press Release, U.S. Attorney’s Office for the Eastern District of Louisiana, Mexican National Sentenced for Illegally Using a Social Security Number Belonging to Another Person (Oct. 12, 2022), https://www.justice.gov/usao-edla/pr/mexican-national-sentenced-illegally-using-social-security-number-belonging-another [https://perma.cc/4DMK-8C7S]. The man was prosecuted in the Eastern District of Louisiana and was ultimately convicted of violating 18 U.S.C. § 408(a)(7)(b), which makes it a crime to fraudulently use another person’s social security number. The man was sentenced to one year of probation.

In Case B, a man received Social Security and Department of Defense benefits intended for his late father for four years after his father’s death.94Press Release, U.S. Attorney’s Office for the Southern District of Ohio, Fifteenth Person Charged with Theft in Ongoing Social Security Benefits Fraud Investigation (Aug. 10, 2020), https://oig.ssa.gov/news-releases/2020-08-10-audits-and-investigations-investigations-aug4-oh-fifteenth-person-charged-social-security-fraud [https://perma.cc/5CFK-7JWP]. The man’s elderly father had moved in with the man in 2012.95Sentencing Memorandum of Defendant Napoleon Crawford at 2, United States v. Crawford, No. 1:20CR029 (S.D. Ohio Aug. 6, 2021). The man cared for his father for next four years, until his father’s death at age 92 in 2016.96Id. When the man began caring for his father in 2012, they joined bank accounts, into which his father’s benefits were deposited.97Id. After his father’s death, a death certificate was properly filed, but his late father’s benefit payments continued to be deposited into their joint bank account.98Id. Over the four years that followed his father’s death, the man collected $42,103 in Social Security benefits and $41,609 in Department of Defense benefits to which he was not entitled.99Press Release, supra note 94.

Case B was prosecuted in the U.S. District Court for the Southern District of Ohio. The man pled guilty to theft of public money. He was sentenced to eight months in prison and ordered to pay $83,712 in restitution to the Social Security Administration (“SSA”) and Department of Defense.100Id.

Case B was part of a federal initiative called the Social Security Administration Fraud Prosecution Project.101Id. The SSA Fraud Prosecution Project is a collaboration of the SSA Office of the Inspector General (“SSA OIG”) and DOJ.102Id. The investigation of Case B also involved employees of the Department of Defense Office of Inspector General, the Veteran’s Administration Office of Inspector General, the United States Office of Personnel Management Office of Inspector General, and the United States Secret Service.103Id. It appears that many federal agencies and employees devoted significant resources to bringing Case B and others like it.

In all, the SSA OIG reports that as a result of its audit program, it discovered dozens of instances of people collecting social security or veteran benefits intended for another person in Ohio, a state that has an adult population of more than eight million.104Id. See also Gustafson, supra note 14, at 57 (finding that in California, the state conducts biometric imaging (that is, fingerprinting) of all welfare applicants as a way to detect fraud and discovers around three people per month who have submitted a duplicate application). The SSA OIG investigation has led the USAO for the Southern District of Ohio to prosecute at least fifteen people in cases like Case B. The losses to SSA associated with these cases average just under $60,000 per defendant.105Id.

In Case C, a married couple owned and operated a company called Kingdom Connected Investments (“KCI”), which they advertised as a Christian organization.106Press Release, U.S. Attorney’s Office for the District of South Carolina, Married Greenville Business Owners Sentenced to More than Seventeen Total Years, Ordered to Pay More than $2.5 Million in Restitution for Defrauding Home Buyers and Sellers (Oct. 5, 2020), https://www.justice.gov/usao-sc/pr/married-greenville-business-owners-sentenced-more-seventeen-total-years-ordered-pay-more [https://perma.cc/SAN6-ZCTE]. KCI sought to pair clients who fell into two categories: (1) homeowners who owed more on their homes than the home was worth (that is, they were “underwater” on the home); and (2) potential homebuyers who did not have a high enough credit score to qualify for a conventional mortgage. KCI operated by matching homeowners (sellers) and buyers. KCI told the sellers they would transfer title of the home to KCI and take over the home’s mortgage payments, allowing the homeowners to get out of their underwater mortgage. KCI collected down payments from the buyers, telling them they were renting-to-own the home.

None of this was true. In reality, KCI never actually purchased the sellers’ homes, which meant each property still had an existing mortgage in the seller’s name(s) after the sellers thought they no longer owned the home. Rather than using the buyers’ down payments to pay the mortgages in full as promised, KCI used much of these down payments for personal use and to try to build their real estate business. Eventually, with the mortgages unpaid, nearly all the homes went into foreclosure and sold at auction. Many sellers learned that KCI had not actually purchased their home when they received foreclosure notices. Many of KCI’s buyers, who thought they were renting-to-own their homes, learned the truth when the home’s new owners sought to evict them. In all, KCI received $2.7 million from the buyers but only made $1.4 million in mortgage payments. Approximately 130 properties were involved in the scam, suggesting the average buyer lost around $20,000. Most sellers had their credit scores ruined by the foreclosures.

Case C was prosecuted in the U.S. District Court for the District of South Carolina. A federal jury found the defendants guilty of conspiracy to commit mail fraud and equity skimming after just ninety minutes of deliberation. The husband and wife were sentenced to seventy-eight and 136 months in prison, respectively, and ordered to pay $2,664,796.69 in restitution.

Case D will be familiar to many readers. JPMorgan Chase, a major U.S. bank, knowingly packaged shoddy mortgages into securities that did not meet its credit standards. JPMorgan Chase sold these securities to investors. A JPMorgan Chase manager (and attorney), Alayne Fleischmann, described JPMorgan Chase’s mortgage securities business as a “massive criminal securities fraud.”107Matt Taibbi, The $9 Billion Witness: Meet JPMorgan Chase’s Worst Nightmare, Rolling Stone (Nov. 6, 2014), https://www.rollingstone.com/politics/politics-news/the-9-billion-witness-meet-jpmorgan-chases-worst-nightmare-242414 [https://perma.cc/SWB2-6ARH?type=standard]. Before the 2008 crash, Fleischmann wrote a thirteen-page memo to her supervisor warning that the bank was improperly packaging bad mortgages into securities and selling them as investments. Fleischmann was fired and bankers at JPMorgan Chase continued in their scheme. Fleischmann eventually became a whistle-blower and provided detailed evidence about JPMorgan Chase’s wrongdoing to the SEC and federal prosecutors.

Unlike the defendants in Cases A, B, and C, the federal government never prosecuted either JPMorgan Chase the organization or any of its employees for their fraud. Chase instead agreed to a $13 billion settlement with federal and state agencies for wrongdoing during the crisis. As a publicly traded company, Chase paid the settlement with shareholders’ money and the settlement agreement did not name any bankers. A few weeks later, Chase’s CEO, Jamie Dimon, received a seventy-four percent raise, bringing his salary to $20 million per year.

C.  How We Talk About Financial Crime

Academic and journalistic writing about white collar crime tends to focus on cases like D.108See supra text accompanying note 7. It examines and seeks to understand the causes and consequences of a criminal system that is unwilling or unable to convict large firms and the people who lead them, even when those firms and people create staggering social harm and there is evidence that their conduct violates the criminal law. Much work in this area documents the DOJ’s increased use of deferred and non-prosecution agreements for companies engaged in corporate crime.109See, e.g., Arlen & Kahan, supra note 7; Veronica Root Martinez, The Government’s Prioritization of Information Over Sanction: Implications for Compliance, 83 L. & Contemp. Probs. 85, 85–87 (2020). Other work asks similar questions about individuals who hold positions of leadership in corporate organizations that commit crimes.110In this vein, some recent scholarship about white-collar crime committed by individuals has focused on a 2015 Memo from Deputy Attorney General Sally Quillian Yates (the “Yates Memo”) that outlines steps that federal prosecutors should take to “strengthen [the] pursuit of individual corporate wrongdoing.” Memorandum from Deputy Att’y Gen. Sally Quillian Yates to Assistant Att’ys Gen. & All U.S. Att’ys., Individual Accountability for Corporate Wrongdoing (Sept. 9, 2015) (on file with DOJ). For example, some have pointed out that even after the Yates Memo was promulgated, DOJ continued to enter deferred prosecution agreements with corporations without charging individuals. See, e.g., Paola C. Henry, Individual Accountability for Corporate Crimes After the Yates Memo: Deferred Prosecution Agreements & Criminal Justice Reform, 6 Am. U. Bus. L. Rev. 153, 160–161 (2016) (describing the post-Yates Memo case in which General Motors employees intentionally failed to disclose a safety defect in their ignition switches, which led to at least 124 deaths, but federal prosecutors entered a deferred prosecution agreement with GM without charging any individuals).

In contrast to much of the literature, this Article focuses instead on cases like A, B, and C, which represent the bread and butter of most federal financial criminal enforcement in the United States. Many scholarly examinations of federal white-collar crime characterize these cases as not white-collar crime. For example, Samuel Buell explains in his 2014 study of white-collar sentencing:

Many white collar offenses, maybe even most of them, are committed by pedestrian hucksters, scam artists, cheaters, and liars. Such persons have been among us for ages. This Article makes few claims about the treatment of this class of offenders—the home buyer who lies to obtain a mortgage, the taxpayer who cheats the Internal Revenue Service (IRS), the restaurant manager who bribes the health inspector, and their ilk. The discussion here responds to a public debate that does not often mention the small-time crook.111Buell, supra note 7, at 830–31 (2014); see also Mihailis E. Diamantis, White-Collar Showdown, 102 Iowa L. Rev. 320, 320 (2017) (“Not many people would rank white-collar criminals among the downtrodden of the criminal justice system.”); Darryl K. Brown, Street Crime, Corporate Crime, and the Contingency of Criminal Liability, 149 U. Pa. L. Rev. 1295, 1315 (2001) (“Painting with an overbroad brush, street offenders are outside the mainstream norms of society. More committed to subcultures or simply irrational, violent, or greedy, their crimes are clearly intentional. White-collar offenders, on the other hand, except for those white-collar crimes that plainly mimic street crimes—for example, embezzling from an employer is stealing and credit card or insurance fraud are just other forms of theft—are more reasonable, mainstream people.”). But see Pedro Gerson, Less is More?: Accountability for White-Collar Offenses Through an Abolitionist Framework, 2 Stet. Bus. L. Rev. 144, (noting that “[a]n important caveat to note at the outset is that [the author’s] definition of white-collar crime is significantly narrower than the one used by law enforcement, which focuses on the type of offenses and centers on crimes of ‘deceit, concealment or violation of trust’ without the use of force”); Benjamin Levin, Wage Theft Criminalization, 54 U.C. Davis L. Rev. 1429, 1483-84 (2021) (noting that the sorts of incidents reported in a 2000 FBI report tended to be low-level property crimes and frauds rather than “the dominant cultural (and legal) imagination of ‘white-collar crime’ ”); Daniel Richman, Federal White Collar Sentencing in the United States: A Work in Progress, 76 L. & Contemp. Probs. 53, 53 (2013) (“[C]rimes involving fraud, deceit, theft, embezzlement, insider trading, and other forms of deception . . . include[] a great many offenders and offenses of the middling sort.”); Posner, supra note 80, at 409–10 (using the term white-collar crime “to refer to the nonviolent crimes typically committed by either (1) well-to-do individuals or (2) associations, such as business corporations and labor unions, which are generally ‘well-to-do’ compared to the common criminal”).

This Article argues that when—as Buell notes—the public debate about white-collar crime excludes financial crimes committed by people who are not wealthy executives, the exclusion is not merely semantic. Using the term “white-collar crime” to only include prosecutions of elite people shields from public view the vast majority of prosecutions that happen under our financial criminal laws.

We have not always talked about financial crime this way. This Article provides updated and more comprehensive answers to some of the questions asked in a series of studies produced in the 1980s through early 2000s by Stanton Wheeler and others called the Yale Studies on White-Collar Crime (“Yale Studies”). In the final of four studies in this series, the authors analyzed the personal characteristics of those whom the authors characterized as federal white-collar defendants. Using a sample of roughly 210 white-collar defendants randomly sampled from seven federal district courts, the authors found that their sample of white-collar defendants “departs from common images of the typical white collar offender in that they are very similar to average or middle class Americans.”112David Weisburd, Elin Waring & Ellen Chayet, U.S. Dep’t of Just., White Collar Crime and Criminal Careers 2 (1993) (citing David Weisburd, Stanton Wheeler, Elin Waring & Nancy Bode, Crimes of the Middle Classes: White Collar Offenders in the Federal Courts (1991)). The seven districts studied were: the Central District of California, the Northern District of Georgia, the Northern District of Illinois, the District of Maryland, the Southern District of New York, the Northern District of Texas, and the Western District of Washington. Id. The authors also noted that their study found white-collar crimes to “have a much more mundane quality than those which are associated with white collar crime in the popular press,” noting that “the bulk of white collar crimes prosecuted in the federal courts are undramatic and maybe committed by people of relatively modest social status.”113Id. at 11.

The Yale study’s findings are similar but less extreme than the updated and more fulsome patterns this Article documents in Part II. This Article, for example, suggests that the average financial crime defendant is likely to have lower income than the average U.S. adult, whereas the authors of the Yale study find that “most white-collar offenders were from the middle class, that is, they were significantly above the poverty line, but they were not from the upper echelons of wealth and social status.”114David Weisburd, Stanton Wheeler, Elin Waring & Nancy Bode, Crimes of the Middle Classes: White Collar Offenders in the Federal Courts, U.S. Dep’t of Just., Off. of Just. Programs (1991), https://ojp.gov/ncjrs/virtual-library/abstracts/crimes-middle-classes-white-collar-offenders-federal-courts [https://perma.cc/VP9D-W3H4]. Part II also shows that Black people are disproportionately prosecuted for white-collar crimes, which the Yale study did not find.

A likely reason the nationwide findings presented in this Article suggest the federal financial criminal defendant population is even less advantaged than as suggested by the Yale study is that the Yale authors’ sample was not representative of all federal financial crime prosecutions. The authors explain that they chose seven districts “in part because some of them were known to have a significant amount of white-collar prosecution,”115Weisburd et al., supra note 112, at 16. and all of the chosen districts contain major U.S. cities. By focusing on districts with active and sophisticated white-collar dockets in large U.S. cities, the Yale study likely overrepresents the income of all federal financial crime defendants. It also uses a sample of federal financial crime defendants whose racial makeup (seventy-eight percent White) is different from what this Article observes in its nationwide analysis (forty-nine percent White).116Another possible explanation for this difference is that over time the federal government might have increasingly prosecuted low-income people for financial crimes. The Yale study considered defendants sentenced between 1976 and 1978; this Article considers defendants prosecuted in 1994 through 2019, so perhaps the federal government’s enforcement behavior changed in the sixteen years between our studies.

This Article also relates to Max Schanzenbach and Michael Yaeger’s 2006 examination of racial disparities in federal white-collar cases.117See Schanzenbach &Yaeger, supra note 79, at 758. Using regression analysis, Schanzenbach and Yaeger find that after controlling for many relevant defendant and case characteristics, Black and Hispanic defendants convicted of white-collar crimes receive longer prison sentences than do White defendants.118Id. at 790. They also find that a significant portion of this inequality can be explained by defendants’ ability to pay a fine, lending support to the idea that there is a fine/incarceration tradeoff in white-collar cases.119See id. at 792.

This Article fundamentally differs from Schanzenbach and Yaeger’s work because this Article is a descriptive analysis. Many studies—like Schanzenbach and Yaeger’s—estimate whether defendants within a criminal system appear to be treated differently for reasons they should not be (such as their race,120See, e.g., Crystal S. Yang, Free At Last? Judicial Discretion and Racial Disparities in Federal Sentencing, 44 J. Legal Stud. 75, 75 (2015). skin color,121See, e.g., Traci Burch, Skin Color and the Criminal Justice System: Beyond Black-White Disparities in Sentencing, 12 J. Empirical Legal Stud. 395, 395 (2015). gender,122See, e.g., Sonja B. Starr, Estimating Gender Disparities in Federal Criminal Cases, 17 Am. L. & Econ. Rev. 127, 127 (2015). or wealth123See, e.g., Christine S. Scott-Hayward & Henry F. Fradella, Punishing Poverty: How Bail and Pretrial Detention Fuel Inequalities in the Criminal Justice System 45 (2019).). In contrast, this Article does not seek to advance a causal claim about the sources of inequality. To that end, this Article does not compare the outcomes of federal financial crime defendants to each other; it compares the population of federal financial crime defendants to the underlying U.S. adult population. It then examines whether, where, and for how long these inequalities in who is prosecuted have existed. The next Part presents this empirical analysis.

II.  INEQUALITY IN FEDERAL FINANCIAL CRIME PROSECUTIOS

Between 1994 and 2019, 1.7 million defendants were convicted of federal crimes and sentenced under the U.S. Sentencing Guidelines.124This count does not reflect defendants who were convicted of offenses carrying a statutory maximum term of incarceration of six months or less (that is, petty misdemeanor cases), see U.S. Sent’g Guidelines Manual § 1B1.9 (U.S. Sent’g Comm’n 2021), which are typically handled by federal magistrate judges. 28 U.S.C. § 636(a)(4). Infra Part II. Around 15% of these defendants were convicted of financial crimes, making financial crime the third-most prosecuted type of federal crime over this period, following drug crime (35% of cases) and immigration crime (25% of cases).125This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17. Most defendants convicted of financial crimes were convicted of some type of fraud, and even counted alone, fraud is the third-most prosecuted type of federal offense.126Id.

This Part presents the first nationwide empirical analysis of federal financial crime cases. Section II.A explains how I constructed the data set. Section II.B presents summary information about federal financial crime cases. Sections II.C through II.E use sentencing data matched to county-level population data to examine inequality in who is prosecuted for federal financial crimes. Section II.C shows that people who are Black and low-income are overrepresented in financial crime prosecutions relative to the U.S. adult population, while people who are White and middle- to high-income are underrepresented. Section II.D shows that income and race gaps in the prosecution of financial crime have narrowed over the last few decades but remain significant. Section II.E documents differences in these inequality patterns across federal districts. It shows that USAOs in the Deep South prosecute female defendants at the highest rates. Because states in the Deep South have among the largest Black populations in the U.S., their more intensive prosecution of women for financial crimes drives the overrepresentation of Black women among financial crime defendants. Section II.E also shows that Black defendants are overrepresented in financial crime cases in nearly all federal districts, which demonstrates that the nationwide inequality patterns are not solely a function of different prosecutorial priorities between districts.

A.  Data

The descriptive analysis that follows presents two types of facts about federal financial crime prosecutions. First, it describes the scale of federal prosecution of financial crime. It answers questions like: How many people does the federal government prosecute for financial crimes per year? How does this number compare to prosecutions for other types of federal crimes? How has this number changed over time? Second, the analysis describes representation in federal prosecutions of financial crime. It answers questions like: Are low- or high-income people over- or underrepresented among federal defendants charged with financial crimes? Which, if any, racial or gender groups are over- or underrepresented? Does over- or under-representation vary over time? Does it vary between USAOs?

Answering these descriptive questions requires two types of data: data on federal criminal cases and data on the U.S. adult population. The dataset used in this Article includes quantitative data of the roughly 1.7 million federal defendants sentenced under the U.S. Sentencing Guidelines in fiscal years 1994 through 2019, matched at the district and year level to population data from the U.S. Census. I built the federal criminal case dataset by combining annual data files published by the U.S. Sentencing Commission (“Commission”).127The Commission data files are available for download from the U.S. Sentencing Commission website (fiscal years 2002–2021) and through the Inter-university Consortium for Political and Social Research (fiscal years 1987–2019). See Monitoring of Federal Criminal Sentences Series, Inter-university Consortium for Pol. and Soc. Rsch., https://www.icpsr.umich.edu/web/ICPSR/series/83 [https://perma.cc/8DN8-3EFT]; Commission Datafiles, U.S. Sent’g Comm’n, https://www.ussc.gov/research/datafiles/commission-datafiles [https://perma.cc/U2U7-NLYA]. To compute inequality statistics, I dropped from the dataset defendants whose race, Hispanic ethnicity, or gender information are reported as missing (roughly four percent of defendants).

The Commission data files include thousands of variables that describe federal criminal defendants and their cases. Critically for this project, the Commission data include a defendant’s self-reported race and Hispanic ethnicity, gender,128The Commission data uses a binary variable for gender (Male/Female), which the Codebook simply said “indicates the offender’s gender.” U.S. Sent’g Comm’n, Variable Codebook for Individual Offenders 31 (2013). For at least some of the 1994–2019 period, the Federal Bureau of Prisons’ Transgender Offender Manual indicated that an inmate’s gender identity, rather than their gender assigned at birth, be considered when recommending a housing facility, which suggests that transgendered prisoners are likely coded according to their gender identity rather than biological sex. See Daniel Politi, Trump Administration Gets Rid of Obama-Era Rules that Protected Transgender Inmates, Slate (May 13, 2018, 8:59 PM), https://slate.com/news-and-politics/2018/05/trump-administration-gets-rid-of-obama-era-rules-that-protected-transgender-inmates.html [https://perma.cc/PP8P-PPBH]. level of formal education, age, and the nature of the defendant’s prior criminal record. The Commission data also include variables that provide information about the subject of the defendant’s case, such as the type of offense (divided into thirty-five categories) and the statutes of conviction. The Commission data also include variables describing case outcomes, including details of the sentence imposed upon the defendant and their advisory sentencing range. Finally, the Commission data report the month, year, and federal district court in which the defendant was sentenced. These variables allow me to understand the geography and history of inequalities in federal financial crime prosecutions.

After building the Commission dataset, I merged it with county-level data published by the U.S. Census Bureau that describes the U.S. adult population (“Census Data”). The Census Data’s county-level intercensal population estimates include annual age-by-race-by-gender data of county populations.129See Annual County Resident Population Estimates by Age, Sex, Race, and Hispanic Origin: April 1, 2020 to July 1, 2019, (CC-EST2019-ALLDATA), U.S. Census Bureau, https://www.census.gov/data/tables/time-series/demo/popest/2010s-counties-detail.html [https://perma.cc/XEN9-83YG]; Intercensal Estimates of the Resident Population by Five-Year Age Groups, Sex, Race, and Hispanic Origin for Counties: April 1, 2000 to July 1, 2010, U.S. Census Bureau, https://www.census.gov/data/
datasets/time-series/demo/popest/intercensal-2000-2010-counties.html [https://perma.cc/XZ4R-FS93]; State and County Intercensal Datasets 1990–2000, U.S. Census Bureau, https://www.census.gov/data/datasets/time-series/demo/popest/intercensal-1990-2000-state-and-county-characteristics.html [https://perma.cc/9J3T-DNAA].
The Economic Research Service of the USDA publishes county-level educational attainment information of the adult population using data from the U.S. Census and American Community Survey.130See Educational Attainment for Adults Age 25 and Older for the U.S., States, and Counties, 1970–2020, USDA, Econ. Rsch. Serv., https://www.ers.usda.gov/data-products/county-level-data-sets/county-level-data-sets-download-data [https://perma.cc/7HBS-GZJ2]. Unlike population data, this data is not reported for every year. It is only reported for 1970, 1980, 1990, 2000, 2007–11 (five-year average), and 2016–2020 (five-year average). For this project, I use the data from 2007–2011 because it is closest to the midpoint of the study period (1994 to 2019).

After compiling the county-level Census Data, I aggregated it to the federal district level with a district‑to-county crosswalk file.131Mary Eschelbach Hansen, Jess Chen & Matthew Davis, United States District Court Boundary Shapefiles (1900–2000), Inter-univ. Consortium for Pol. & Soc. Res. (Mar. 2, 2015), https://doi.org/10.3886/E30468V1 [https://perma.cc/5NA7-94ZH]. This matched data allowed me to measure per capita prosecution rates between districts and to compare characteristics of the federal defendant population with the entire adult resident population over time and within each federal judicial district.

B.  Preliminary Descriptive Statistics of Federal Financial Crime Cases

Before examining inequality in federal financial crime cases, Table 1 presents descriptive statistics of these cases from the data. I define a case as a “financial crime” if the Commission data characterizes it as an antitrust, bribery, counterfeiting, forgery, fraud, embezzlement, larceny,132Although larceny is not typically considered a white-collar crime, I include it in my definition for consistency because in fiscal year 2018, the Commission data began combining fraud, embezzlement, and larceny into one offense category. Defendants coded as committing larceny crimes in years prior to 2018 were frequently convicted of fraud and embezzlement crimes. or tax crime.

The Commission data do not include a variable to characterize the victim(s) in the case, so I coded this variable based on the criminal statute under which the defendant was convicted. Based on the statute of conviction, I coded the case as involving one of these four victim types: (1) a government victim; (2) a private victim; (3) no concrete victim; or (4) an unknown victim. For example, a case in which the defendant is convicted of embezzling or stealing public money is coded as having a government victim.133See 18 U.S.C. § 641. A case in which the defendant is convicted of defrauding a bank is coded as having a private victim.134See id. § 1344. A case in which the defendant is convicted of making a false statement to a federal agent is coded as having no concrete victim.135See id. § 1001. A case in which a person is convicted of defrauding a health insurer is coded as having an unknown victim because a person can commit this crime by defrauding either a government insurer (like Medicare) or a private insurer.136See id. § 1347.  Appendix Table A.1 lists the statutory provisions for defendants convicted of the most common financial crimes and how they were coded.137A complete list of all statutory provisions and how they were coded is on file with the author and available by request.

Table 1 provides summary statistics of many variables about the defendants and their cases in the data. Column (1) of Table 1 presents averages for the variables across all 276,210 defendants convicted of financial crimes in the years 1994–2019. Columns (2) through (5) present averages for the same variables among defendants whose crimes involve the lowest losses (column (2)) through largest losses (column (5)).138The observations in columns (2) through (5) do not sum to 276,210 because the “loss amount” variable is only available beginning in 1999. Even beginning in 1999, around twenty percent of observations are missing an entry in this variable. Because the severity of financial crimes is (for the most part) increasing in loss amount, readers should think of moving across Table 1 from column (2) to column (5) as moving from less serious to more serious financial crimes.139It is important to note that when I use the term “loss,” throughout this Article, I mean the “dollar amount of loss for which the offender is held responsible,” which is how this variable is defined by the Commission. Commentary to the U.S. Sentencing Guidelines directs courts to consider “actual or intended loss,” and there appears to be a recent circuit split on the question of whether using intended loss is acceptable. Compare United States v. Gadson, 77 F.4th 16, 21–22 (1st Cir. 2023) (district court did not commit plain error by using intended loss to calculate bank-fraud defendant’s base offense level) with United States v. Banks, 55 F.4th 246, 248 (3d. Cir. 2022) (concluding that the Commission’s commentary that includes “intended loss” in the definition of “loss” should be afforded no weight). See also Baer, supra note 6, at 53 (criticizing the loss variable for encompassing intended loss).

Overall, Table 1 presents initial descriptive patterns that suggest regressive inequality in financial crime prosecutions. First, readers will notice that fraud makes up more than 80% of financial crime cases across all columns, making up 76.5% of low-level cases (column (2)) and 87.8% of high-level cases (column (5)). The median loss in a financial crime prosecution is just under $50,000, but it is $0 in the lowest quartile and nearly $850,000 in the highest. The median fine in all categories—even the most serious financial crimes—is $0.

Table 1 shows there are differences in the representation of defendants by race, gender, and income levels across the severity distribution. Black defendants and female defendants make up a smaller share of defendants in high-loss cases than in other types of cases. Specifically, Black defendants and female defendants each make up around 30–40% of defendants in low to medium-loss cases, but only around 25% of defendants in high-loss cases. Hispanic defendants are particularly overrepresented in low-loss cases. This could be because around half of Hispanic defendants convicted of financial crimes are not U.S. citizens, and among non-citizen defendants many are convicted of crimes that do not involve a concrete victim, such as making a false statement to federal officials or using a false social security number, as in Case A described in Section I.B.

The pattern is similar for education. Defendants who have not completed high school—who are likely to be those with the fewest resources—appear in low-level cases at much higher rates (28% of defendants) than they appear in high-loss cases (11% of defendants). The pattern for defendants who have college degrees—who are likely to be those with the most resources—is the opposite. College graduates make up 31% of defendants in high-loss cases and just 10% of defendants in low-loss cases.

Overall, Table 1 provides initial descriptive evidence of patterns that this Article explores in the next three subsections. It suggests that people who are likely to have the most advantages—people who are male, White, and have completed college—are more frequently prosecuted for more serious financial crimes than others. The rest of this Part examines inequality in the entire data, over time, and by geography.

Table 1.  Federal Financial Crime Prosecutions, 1994–2019
 

All Financial Crimes

(1)

Low Loss

(2)

Med-Low Loss

(3)

Med-High Loss

(4)

High Loss

(5)

Offense Characteristics
Antitrust0.0020.0030.0030.0030.003
Bribery0.0210.0260.0200.0150.015
Counterfeiting/Forgery0.0830.1890.1030.0490.021
Fraud0.8330.7650.8330.8320.878
Tax Offense0.0610.0180.0440.1050.083
Government Victim0.2460.3050.3150.2940.151
Private Victim0.4220.2980.4400.4550.540
No Concrete Victim0.0570.1420.0350.0200.008
Unknown Victim0.2760.2560.2100.2310.302
Loss (median in $)48,362020,802105,997847,375
Defendant Characteristics
Black0.2930.3020.3840.3240.237
Hispanic0.1470.1990.1140.1150.137
Other Race/Ethnicity0.0680.0640.0560.0580.065
White0.4920.4340.4460.5030.561
Male0.7020.6880.6100.6740.766
Less than HS0.1890.2820.2110.1570.106
HS Only0.3150.3560.3550.3080.248
Some College0.3100.2580.3160.3430.333
College Grad0.1860.1040.1180.1920.313
U.S. Citizen0.6690.6710.7400.7730.797
Retained Counsel0.3370.2180.2640.4080.562
Fines Waived0.8590.8270.9050.9090.920
Case Characteristics
Guidelines Mean (months)28.712.312.622.654.3
Any Incarceration0.5590.4910.4950.7020.863
Sentence (months)16.48.47.214.236.2
Below Guidelines0.4780.2360.4950.6110.599
In-Range0.4990.7300.4840.3690.383
Above Guidelines0.0210.0330.0190.0180.017
Fine (median in $)00000
Restitution (median in $)5,800011,42265,000429,968
Observations276,21043,15143,14643,22643,071
Note: All variables are coded as 0/1 unless otherwise noted. Guidelines and sentence length variables are capped at 470 months—the Commission’s assigned value for life sentences. Many variables are not reported in all years.

C.  Overall Inequality (All Districts, All Years)

This section begins by examining whether one can fairly say the government focuses its financial crime enforcement efforts on “white-collar” crime. It suggests the answer is no. It shows that low-income and Black defendants are disproportionately represented while higher-income and White defendants are underrepresented in federal financial crime cases relative to the U.S. population. It shows that this overrepresentation is particularly stark for Black women, who are underrepresented in federal criminal cases as a whole but overrepresented in financial crime prosecutions.

The Commission data do not provide information about a person’s income or wealth, so Figure 1 uses three proxies for a defendant’s financial means: the level of formal education attained by the defendant, whether the defendant’s fines were waived by the court based on the defendant’s inability to pay them, and whether the defendant retained paid counsel. Appendix Table A.2 presents the same results in table form.

Figure 1.  Proxies for Poverty in Federal Financial Crime Cases
 
Note: Educational attainment is only reported for defendants sentenced in fiscal years 1997 through 2019. Defense counsel type is only reported for defendants sentenced in fiscal years 1994 through 2003. Waived fines are reported for all years (1994 through 2019).

Figure 1 shows the averages for all federal financial crime defendants (dotted columns), for U.S. citizen financial crime defendants (solid columns), and for the U.S. adult population (striped columns). It reports the estimates separately for U.S. citizen-defendants because Census data, which is used to compute the averages across the U.S. adult population, chronically undercounts people who are not U.S. citizens.140U.S. Census Bureau, Counting the Hard to Count in a Census 1, 4 (July 2019) (listing “[m]igrants and minorities” as a population in the U.S. that is “hard-to-count,” which is defined as a population “for whom a real or perceived barrier exists to full and representative inclusion in the [Census] data collection process”). Despite this undercounting, the averages for U.S. citizen-defendants are very similar to the averages among all federal defendants.

As Figure 1 shows, nearly 20% of financial crime defendants did not graduate high school, which is true of only around 10% of U.S. adults. Around 30% of the U.S. adult population has a college degree, but less than 20% of federal financial crime defendants have one. Around 85% of federal financial crime defendants have their fines waived by the court. Put another way, only around 15% of federal financial crime defendants can afford to pay their fines. The majority (around two-thirds) of federal financial crime defendants rely on appointed counsel. These averages suggest that defendants convicted of financial crimes are likely to have a lot less income and wealth than the average U.S. adult.

Figure 2 displays race-gender representation in federal financial crime cases (solid columns) and all federal criminal cases (striped columns) over the years 1994 to 2019. Appendix Table A.3 presents the same results in table form. The horizontal line at y = 1 demarcates the boundary for whether a group is over- or under-represented in federal cases relative to their share of the U.S. adult population.141For each group, the column height represents the share of defendants in that group divided by the share of people in that group in the U.S. adult population over the period 1994–2019. For example, Black men make up roughly 18.8% of fraud defendants and roughly 5.5% of the U.S. adult population, so the height of their solid green column is (18.8/5.5) = 3.42. An alternative way to compute inequality would be to subtract rather than divide each defendant group’s representation from their representation in the U.S. adult population. When computed this way, the inequality patterns are similar but less extreme because the race-gender groups are not equally sized.

Figure 2 shows that, as many readers will already know, Black and Hispanic men are the most overrepresented groups in the federal criminal system (their striped columns extend the highest), while women who are not Black or Hispanic are the most underrepresented groups (their striped columns extend the lowest). Overall, there are five race-gender groups that are underrepresented relative to the adult population: women of all race and ethnicity groups and White men. Men who are not Black or Hispanic are prosecuted at rates closest to parity (their striped columns are the shortest), with White men slightly underrepresented and men who are another race slightly overrepresented.

For financial crimes, the pattern is different in a few notable ways. First, unlike in the entire federal defendant population, Black men and women are the most overrepresented groups in financial crime prosecutions, while White and Hispanic women are the most underrepresented groups. Black men are significantly more overrepresented in financial crime prosecutions than any other group (their solid column is much taller than any other solid column). Men who are not Black are also overrepresented in financial crime cases but to a much lesser extent than Black men.

Black women are overrepresented among financial crime defendants despite being underrepresented in the federal criminal defendant population. Women of all other race and ethnicity groups are underrepresented in financial crime prosecutions, just as they are in all federal prosecutions. These findings suggest that financial crime prosecutions are an important site of racial inequality in the federal criminal system and that this inequality uniquely burdens defendants who are Black.

Figure 2.  Race-Gender Representation in Federal Prosecutions, 1994–2019
 
Note: The y-axis is scaled such that a group that is x times overrepresented will have the same size column as a group that is x times underrepresented. BM=Non-Hispanic Black Men; BW=Non-Hispanic Black Women; HM=Hispanic Men; HW=Hispanic Women; OM=All Other Men (including Alaska Native, American Indian, Asian, Native Hawaiian, and Other Pacific Islander Men); OW=All Other Women (including Alaska Native, American Indian, Asian, Native Hawaiian, and Other Pacific Islander Women); WM=Non-Hispanic White Men; WW=Non-Hispanic White Women.

D.  Inequality in Financial Crime Prosecutions over Time

This section describes how the federal financial criminal caseload has changed over the past quarter century. It shows first that the annual number of financial crime prosecutions remained stable until 2015, when it began to decrease. Second, it shows that the caseload decline in 2015 did not coincide with any noticeable change in the education, gender, or race gaps that persist throughout the period. Third, it shows that since around 2008, Black defendants have been prosecuted at roughly three times the per capita rates that Hispanic, non-Hispanic White, and other defendants have been prosecuted for financial crimes. Beginning in 2008, defendants in all racial or ethnicity groups who are not Black were prosecuted at very similar per capita rates. Fourth, it shows that this race gap is larger but shrinking among female defendants and smaller but more stable among male defendants. Because most of the patterns I documented are stable over time, most of the figures that accompany this section are contained in the Appendix.

Before examining how inequality has changed over time, this section first considers how overall levels of financial crime prosecution have changed since the early 1990s. Appendix Figure A.1 plots the federal government’s criminal caseload for the three most-prosecuted types of crime: drug trafficking (dotted line); immigration (dashed line); and financial crime (solid line). As Figure A.1 reveals, the annual number of federal prosecutions of financial crime remained stable until it began to decline in 2015. On the other hand, financial crime as a share of all federal prosecutions has decreased over a longer period, but this is not due to a significant decrease in the number of financial crime cases; rather, it is a result of a steep rise in immigration-related prosecutions, which dilute financial crime’s share of all federal criminal cases.

It is possible that as the number of financial crime prosecutions decreased beginning in 2015, inequality in who is prosecuted for financial crimes also changed. Appendix Figure A.2 looks for changes in the average education levels of defendants prosecuted for financial crimes, while Figure 3 considers changes in the race and gender composition of the financial criminal defendant population over time. Figure A.2 studies defendants’ educational attainment because education proxies for a defendant’s income, which is not a variable that the Commission data reports.142See supra Section II.C.

Figure A.2 plots financial crime cases prosecuted against defendants who did not graduate high school, graduated high school but did not attend college, attended college but did not earn a bachelor’s degree, and earned a bachelor’s degree. Panel A, which plots the share of defendants in each category, shows that the educational composition of financial crime defendants remained largely stagnant over the 1997 to 2019 period.

Panel A suggests a small increase in the share of financial crime defendants who have attended or completed college and a small decrease among defendants who never attended any college over the same period. However, as Panel B reflects, these changes have not kept pace with the population, which has on average seen increased formal education over time. If anything, the education gap expanded over the period, as Panel B shows. Panel B plots the extent to which defendants in each educational group are over- or under-represented relative to the U.S. adult population. It shows that defendants who have not completed high school were prosecuted at higher rates in the late 2010s than in earlier parts of the period. Thus, Figure A.2 suggests that overall changes in the financial crime caseload over time did not benefit those with few resources; if anything, the opposite is true.

Financial crime also has a race and gender gap. As with nearly all types of crime, men are more likely to be prosecuted for financial crimes than women. Racial gaps in financial crime also persist among both male and female defendants. Figure 3 plots the per capita rates at which each race-gender group is prosecuted for financial crimes over the 1994–2019 period. To avoid cramming eight lines into one graph, Panel A plots the prosecution rates for female defendants and Panel B for male defendants. The panels are arranged side-by-side and scaled with the same y-axis so that readers can compare female and male defendants by looking across the panels. The y-axis measures the number of financial crime defendants in each race-gender group divided by the U.S. adult population of that race-gender group (then multiplied by 1000). Thus, a higher line indicates a higher rate of prosecution.

Figure 3.  Financial Crime Cases by Race, 1994–2019
A.  Female DefendantsB.  Male Defendants
  
Note: Each line represents the number of financial crime cases brought against defendants in the race-gender group, multiplied by 1,000 and divided by the U.S. adult population of that race-gender group. Race-gender groups are labeled as in Figure 2.

Figure 3 shows several facts about race and gender inequality in federal financial crime prosecutions. First, financial crime has a persistent gender gap. Men are prosecuted for financial crimes at higher per capita rates than women. Second, Figure 3 shows that Black men and women are prosecuted for financial crimes at the highest rates. Since 2008, there does not appear to be a significant race gap among any other race groups for either female or male defendants. Instead, Black adults are uniquely susceptible to prosecution for financial crimes.

Third, the racial gaps appear to narrow over time for women but not men. For female defendants, Panel A shows that prosecution rates among racial groups compressed over the 1994 to 2019 period. The data bears this pattern out: Black women comprised 38% of female financial crime defendants in 1994 and 32% in 2019.143This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17. For male defendants, Panel B shows less compression. The data also bears this pattern out: Black men comprised 25% of male financial crime defendants in 1994 and 27% in 2019.144Id. Over this period, Black men and Black women constituted between 5–7% of the U.S. adult population, so these changes cannot be attributed to significant changes in the composition of the underlying population.145In 1994, Black men made up 5% of the U.S. adult population and Black women made up 6%. In 2019, Black men made up 6% of the U.S. adult population and Black women made up 7%.

E.  Inequality in Financial Crime by Geography

The previous section showed that over the last three decades, financial crime cases have remained a significant portion of the federal criminal docket and that income, gender, and racial inequalities persist in these prosecutions. Among male and female defendants, Non-Hispanic Black people are prosecuted at roughly three times the per capita rate as all other defendants. People who did not complete high school are by far the most overrepresented group in financial crime cases, while those who have completed college are the only group that is significantly underrepresented.

But averages across the entire federal criminal system as presented in the previous sections obscure differences in how individual USAOs prosecute financial crime. For example, the previous sections showed that Black women and Black men are overrepresented in federal financial crime cases while White women are underrepresented, but one might wonder whether this is true in all federal districts in the United States. Variation over the entire country might reflect variation in underlying rates of financial crime, office priorities, or the individual attitudes of decisionmakers such as prosecutors and agents. This section measures and maps inequalities in financial crime prosecutions at the USAO level. Figure 4 begins by showing the intensity with which each USAO prosecutes financial crimes. Darker shading means a larger share of the district’s cases are financial crime cases.

Figure 4 shows that the districts that focus more heavily on fraud cases include large urban districts like the Central District of California (home to Los Angeles), the Northern District of Illinois (home to Chicago), and the Southern District of New York (home to Manhattan). In these USAOs, financial crime respectively constitutes 32.1%, 36.7% and 29.3% percent of all criminal cases. This finding is perhaps unsurprising because these districts encompass many major financial centers. The five districts that border Mexico have much less intense financial crime caseloads (less than 6% of all prosecutions in all five districts) because immigration cases dominate the federal criminal caseloads in those districts.146This observation is based on the author’s analysis of the data. See Didwania, Data, supra note 17. The five federal districts that border Mexico are the District of Arizona, the Southern District of California, the District of New Mexico, the Southern District of Texas, and the Western District of Texas. Together, the USAOs in these five districts prosecuted 32% of all federal criminal cases between 1994 and 2019. Id. In these USAOs, immigration cases made up 55% of the caseload. In the remaining 88 USAOs, immigration cases made up 10% of the caseload. Id. Figure 4 also shows that USAOs in Western states appear to prosecute financial crime less intensely than states in the Deep South147The term “Deep South” does not have a settled definition. Most definitions suggest the core states are Alabama, Georgia, Louisiana, Mississippi, and South Carolina, which is the definition used in this Article. and the Great Lakes Region.148The Great Lakes region includes Illinois, Indiana, Michigan, Minnesota, New York, Ohio, Pennsylvania, and Wisconsin.

Figure 4.  Financial Crime Prosecution Intensity (All Years)
 
Note: This figure maps the share of each district’s criminal cases that are financial crime cases. Each shade represents an equal interval in the distribution. Lightest shading means roughly 2–11% of cases in the district are financial crime cases; second-lightest shading means 11–19% of cases are financial crime cases; second-darkest shading means 19–28% of cases are financial crime cases; and darkest shading means 28–37% of cases are financial crime cases.

Figure A.3 shows that districts in the Deep South, Alaska, and Oklahoma prosecute women for financial crimes at among the highest rates in the United States. Figure A.3 plots the intensity with which each district prosecutes women for financial crimes relative to men. Darker shading means female defendants make up a larger share of that USAO’s financial crime caseload. There are eight districts in which women constitute more than forty percent of financial crime defendants: the Southern, Middle, and Northern Districts of Alabama; the District of Alaska; the Middle District of Georgia; the Middle and Western Districts of Louisiana; and the Northern District of Oklahoma. By contrast, women make up the smallest portion of fraud defendants in New England and southwestern states. There are ten districts in which women make up less than twenty-five percent of fraud defendants: the Southern District of California, the District of Connecticut, the District of Massachusetts, the District of Minnesota, the District of New Hampshire, the District of New Jersey, the Eastern and Southern Districts of New York, the Eastern District of Pennsylvania, and the District of Rhode Island.

Prosecuting women for financial crimes at higher rates in the Deep South, Alaska, and Oklahoma compared with other jurisdictions is likely to create racial inequality among female defendants because the Deep South states have among the largest Black populations in the United States.149Over the 1994–2019 period, the states with the largest Black adult populations were Mississippi (34% of adults); Louisiana (30% of adults); Georgia (28% of adults); Maryland (28% of adults); South Carolina (27% of adults); and Alabama (24% of adults). Alaska and Oklahoma have among the largest Indigenous populations in the United States.

Figure 5 explores the geography of race and gender inequality in financial crime prosecutions. It depicts whether race-gender groups are over- or under-represented in financial crime prosecutions relative to their share of the U.S. adult population in each federal district. In Figure 5, districts filled in blue stripes mean the group is underrepresented (with darker shades of blue representing more underrepresentation). Districts filled in solid red mean the group is overrepresented (with darker shades of red representing more overrepresentation).

Panels A and B show that Black men are overrepresented in financial crime cases in every federal district, and Black women are overrepresented in all but six federal districts.150The six districts in which Black Women are underrepresented in financial crime cases relative to their share of the adult population are the District of Columbia, the Southern District of California, the Southern District of Florida, the District of New Jersey, the Eastern District of New York, and the Southern District of New York. In contrast, Panel H shows that White women are underrepresented in financial crime cases in every federal district. White men are overrepresented in roughly half of all districts, but in all districts, it is clear their representation is relatively close to parity because all of the districts have pale shading. These findings demonstrate that the racial inequalities documented across the full United States are generated at least in part by inequalities within—not just between—USAOs.

As in Figure 5, Figure 6 explores the geography of income inequality in financial crime prosecutions. As throughout, the defendant’s level of formal education is used as a proxy for income because the Commission data does not report information about a defendant’s income or wealth. Also, like Figure 5, Figure 6 uses red solid- blue striped shading to indicate whether defendants are over- or under-represented relative to the U.S. adult population. Districts shaded in blue stripes mean the group is underrepresented (with darker shades of blue representing more underrepresentation). Districts shaded in solid red mean the group is overrepresented (with darker shades of red representing more overrepresentation). The shading in Figure 6 uses the same red/blue scale as Figure 5 so readers can compare.

Figure 5.  Race-Gender Representation in Financial Crime Prosecutions
A.  Cases Against Black MenB.  Cases Against Black Women
  
C.  Cases Against Hispanic MenD.  Cases Against Hispanic Women
  
  
E.  Cases Against Men of Another RaceF.  Cases Against Women of Another Race
  
G.  Cases Against White MenH.  Cases Against White Women
  
Note: This figure maps the over- and under-representation of each race-gender group in the district’s financial crime cases. Districts shaded in striped (solid) fills prosecute the race-gender group at lower (higher) rates than the district’s population. Darker shading indicates larger disparity.
Figure 6.  Educational Representation in Financial Crime Prosecutions
A.  Cases Against Defendants with a College Degree
 
B.  Cases Against Defendants Without a High School Degree
 
Note: This figure maps the over- or under-representation of defendants in the district’s financial crime cases. Districts shaded in striped (solid) fill prosecute the education group at lower (higher) rates than the district’s population. Darker shading indicates larger disparity.

Figure 6 shows that defendants who have graduated from college—and are likely to be the wealthiest federal defendants—are underrepresented in financial crime prosecutions in every federal district in the United States, even those that prosecute the most complex and sophisticated financial crime (such as the Southern District of New York). In contrast, defendants who have not completed high school—and are likely to have the fewest resources—are overrepresented in nearly every district, although they are underrepresented in eleven districts.

The preceding discussion suggests that USAOs could significantly vary in the average severity of financial crimes they prosecute. Figure 7 investigates this theory and depicts the median loss associated with financial crime cases in each federal district. In other words, Figure 7 shows the severity of the average financial crime prosecution by each USAO. It shows significant variation in severity across USAOs.

Figure 7.  Median Loss Amount in Financial Crime Prosecutions (All Years)
 
Note: This figure maps the median loss in financial crime cases by USAO. Each shade represents an equal interval. Lightest shading means the median loss amount in financial crime cases is between $7,519 and $44,323; second-lightest shading means the median loss is between $44,323 and $81,127; second-darkest shading means the median loss is between $81,127 and $117,931; and darkest shading means the median loss is between $117,931 and $154,735.

Figure 7 shows that the most serious financial crimes are prosecuted in the Northeast (including the Eastern and Southern Districts of New York, and the Districts of Connecticut, Massachusetts, and Rhode Island), as well as a few scattered districts that are home to major U.S. cities (the Southern District of California, the Southern District of Florida, the Northern District of Georgia, the Northern District of Illinois, and the District of Minnesota). The least serious financial crimes are prosecuted in Southern and Great Plains states.

III.  EXPLAINING THE FINDINGS

Part II presented evidence of income, racial, and gender inequality in the prosecution of federal financial crimes. It showed that the federal prosecution of financial crime has a disparate impact, prosecuting low-income and Black people at higher rates than the rest of the U.S. adult population, while prosecuting college graduates and White people at lower rates than the rest of the adult population. Part II also showed that these inequality patterns have persisted since the 1990s and appear in every federal judicial district. This Part offers several potential explanations for the inequalities documented in Part II. It first examines differences in the reported offense conduct of financial crime defendants in different education, race, and gender groups. It shows that the defendant groups that are the most overrepresented are also prosecuted for, on average, the least serious financial crimes. It then describes how systemic incentives, formal law and policy, and individual biases could explain the Article’s findings. I do not attempt to definitively prove that any particular mechanism dominates. Instead, this Part is designed to present many possible explanations for the regressive nature of federal white-collar prosecution.

A.  Charged Offense Conduct

As a threshold matter, this section examines whether the federal financial crime cases brought against defendants of different education, race, and gender groups systematically differ in reported offense conduct. The DOJ and FBI routinely state that they prioritize prosecuting serious and sophisticated financial crimes. It could be that the groups that are most overrepresented in financial crime prosecutions also commit on average the most serious financial criminal offenses, and that overrepresentation is thus consistent with the federal government carrying out its stated priorities. This section considers but rejects that hypothesis.

To perform this analysis, this section considers three variables that capture offense conduct: (1) the offense severity (which primarily corresponds with the amount of monetary loss in financial crime cases); (2) whether the case involved illegal drugs; and (3) the average amount of aggravation computed in the case. I define the amount of aggravation as the amount by which the defendant’s base offense level was increased or decreased at sentencing on account of their offense characteristics.151The U.S. Sentencing Guidelines Manual identifies many offense characteristics that can increase or decrease the advisory sentencing range for a person convicted of a financial crime. For example, a person’s offense level will increase if their conduct “resulted in substantial financial hardship” to multiple victims, or if it involved damage to “property from a national cemetery or veterans’ memorial,” or if it involved the misappropriation of a trade secret, among other things, U.S. Sent’g Guidelines Manual §§ 2B1.1(b)(2)(B)–(C), 2B1.1(b)(5), 2B1.1(b)(14) (U.S. Sent’g Comm’n 2021). The aggravation measure can therefore be a positive or negative number. Figure 8 presents averages for each of these measures of offense conduct by defendants’ educational attainment. As before, I use the defendant’s level of formal education as a proxy for income because the Commission data do not include information about defendants’ income or wealth.

Figure 8.  Financial Crime Case Characteristics by Education Group
A.  Median Loss Amount in Financial Crime Cases
 
B.  Share of Financial Crime Cases Involving Drugs
 
C.  Average Aggravation in Financial Crime Cases
 
Note: Average aggregation is the average difference between defendants’ base and final offense levels.

Figure 8 suggests that financial crime defendants who have attained more formal education are prosecuted for financial crimes that are more serious than the financial crimes prosecuted against defendants with less formal education. The median loss amount for defendants without a high school diploma is just $18,500, while the median loss amount for defendants with a college degree is $168,276. The amount of aggravation in the offense is also increasing in formal education, as Panel C shows. In contrast, Panel B shows that the presence of illegal drugs in financial crime cases is roughly equal across all education groups.

Figure 9 plots the same three variables by defendant race-gender group. Figure 9 demonstrates that Black men and women—who Part II showed are prosecuted for financial crimes at the highest rates—do not commit the most serious financial crimes. Cases involving female defendants also tend to be less severe than those against male defendants. Median loss amounts for female financial crime defendants are lower than for male financial crime defendants in all racial groups except Hispanic defendants, in which loss amounts are roughly equal between male and female defendants. In all racial groups, female financial crime defendants are less likely to have drugs involved in their cases. Finally, financial crime cases against women involve fewer aggravating characteristics.

In all measures, financial crime cases brought against White men appear to be the most serious. They involve by far the largest losses—the median loss amount for financial crime prosecutions of White men is $80,150; for Black women and women who are not White, Hispanic, or Black, the amount is $29,520 and $29,416, respectively. Financial crime cases against White men are also the most likely to involve drugs and the largest average aggravation.

Given that differences in offense conduct do not appear to justify the inequalities documented in Part II, the remaining sections explore alternative explanations for the findings. The data do not allow me to disentangle whether the inequalities documented in this Article are created by intentional discrimination, subconscious bias, are a byproduct of systemic incentives that shape prosecutorial and investigative decisions about which cases to prioritize, or are some combination of all these (or other) reasons. Sections III.B, III.C, and III.D consider many explanations for the findings.

Figure 9.  Financial Crime Case Characteristics by Race-Gender Group
A.  Median Loss Amount in Financial Crime Case
 
B.  Share of Financial Crime Cases Involving Drugs
 
C.  Average Aggravation in Financial Crime Cases
 
Note: Race-gender groups are labeled as listed in Figure 2. Average aggregation is the average difference between defendants’ base and final offense levels.

B.  Systemic and Structural Explanations

In many areas of law, the government struggles to aggressively prosecute or pursue legal claims against sophisticated lawbreakers. This section focuses on systemic explanations for why federal prosecutors might focus on lower-level financial crime cases. It argues that complicated financial crimes are difficult to detect, hard to investigate, and burdensome to prove. As Jesse Eisinger put it, “Embezzlement is as easy to understand as purse snatching. But securities manipulation is a more abstract concept.”152Eisinger, supra note 6, at 59. The workplace realities that prosecutors and investigators confront could create the inequalities documented in Part II.

The inequalities in financial crime prosecutions might reflect structural realities that have been documented in many other settings. In an article examining how the federal government prosecutes drug crime, for example, Lauren Ouziel lays bare the “disconnect between [federal criminal] law’s ambition and fruition.”153Ouziel, supra note 78, at 1077. Ouziel shows that in federal drug prosecutions, the substantive criminal law is explicitly designed to target the most serious defendants—those whose crimes involve large quantities of illegal drugs and acts of physical violence, and those who have significant prior criminal records.154See id. at 1079. But despite this ambition, the federal government nonetheless prosecutes many defendants who do not fall into these categories.155See id. Ouziel argues that the pressure and incentives that federal prosecutors face in their work—among other things—contribute to this ambition/fruition divide.156See id. at 1110–11 (arguing that because it is difficult for the federal government to monitor prosecutors’ “performance” in enforcing federal drug laws, it turns to “proxies” such as arrests and seizures).

Examples of the ambition/fruition divide are not limited to the criminal setting. In the context of environmental enforcement, Nathan Atkinson shows that the Environmental Protection Agency (“EPA”) imposes fees on corporate pollution that are roughly one-fifth the size necessary to make polluting unprofitable ex ante.157Nathan Atkinson, Profiting from Pollution, 41 Yale J. Regul. 1, 5–6 (2023); see also Roy Shapira & Luigi Zingales, Is Pollution Value-Maximizing? The Dupont Case 1 (Nat’l Bureau of Econ. Rsch., Working Paper No. 23866, 2017) (showing that DuPont’s toxic pollution—which ultimately led to a roughly one billion-dollar judgment against the company—was a rational, profit-maximizing choice rather than the result of ignorance or poor governance). In another example, ProPublica journalists Paul Kiel and Jesse Eisinger showed a perhaps illogical disparity in the Internal Revenue Service (“IRS”) enforcement efforts: taxpayers who receive the Earned Income Tax Credit (“EITC”)—mostly low-income wage earners—are audited at higher rates than households with much larger earnings.158Paul Kiel & Jesse Eisinger, Who’s More Likely to be Audited: A Person Making $20,000—or $400,000?, ProPublica (Dec. 12, 2018, 5:00 AM), https://www.propublica.org/article/earned-income-tax-credit-irs-audit-working-poor [https://perma.cc/5CF6-YGWB] (showing that in 2017, EITC recipients were audited at twice the rate of taxpayers with incomes between $200,000 and $500,000). Along the same lines, a county-level analysis by ProPublica’s Paul Kiel and Hannah Fresques found that America’s poorest counties are our most audited.159Paul Kiel & Hannah Fresques, Where in the U.S. Are You Most Likely to Be Audited by the IRS?, ProPublica (Apr. 1, 2019), https://projects.propublica.org/graphics/eitc-audit [https://perma.cc/DH7Q-ER5A]. Yet recent research shows that despite the lower costs to carry them out, IRS audits of low-income people yield less net revenue than audits of wealthy taxpayers at the top of the income distribution.160William C. Boning, Nathaniel Hendren, Ben Sprung-Keyser & Ellen Stuart, A Welfare Analysis of Tax Audits Across the Income Distribution 1 (Nat’l Bureau of Econ. Rsch., Working Paper No. 31376, 2023). IRS’s choice to focus much of its enforcement activity on EITC filers also contributes to racial inequality in audits.161This is because Black taxpayers are more likely to claim the EITC than non-Black taxpayers, EITC claimants are audited at high rates, and because among EITC recipients, Black taxpayers are more likely to be audited than non-Black taxpayers. See Hadi Elzayn, Evelyn Smith, Thomas Hertz, Arun Ramesh, Robin Fisher, Daniel E. Ho & Jacob Goldin, Measuring and Mitigating Racial Disparities in Tax Audits 3–4 (Stanford Inst. for Econ. Pol’y Rsch., Working Paper, 2023), https://dho.stanford.edu/
wp-content/uploads/IRS_Disparities.pdf [https://perma.cc/D8QN-W35Y] (analyzing around 150 million tax returns and estimating that Black taxpayers are audited at higher rates than non-Black taxpayers and that this difference is primarily driven by the difference in audit rates among taxpayers who claim the EITC). See generally Jeremy Bearer-Friend, Colorblind Tax Enforcement, 97 N.Y.U. L. Rev. 1 (2022) (arguing that IRS enforcement decisions are vulnerable to racial bias even though the IRS does not ask taxpayers to identify their race or ethnicity when they file tax returns).

Like the drug crime and IRS contexts, prosecutors and law enforcement agents working on financial crimes face incentives and constraints that likely lead them to focus their efforts on straightforward, uncomplicated, and winnable prosecutions.162See Stuntz, supra note 72, at 535 (“[Unelected line prosecutors] are likely to seek to make their jobs easier, to reduce or limit their workload where possible. That inclination means two things: limiting the number of cases on their dockets, and limiting the cost of the process per case.” (citation omitted)). Of course, what kinds of cases and defendants an agent or prosecutor thinks are “winnable” requires judgments that will be filtered through and reinforced by the agent or prosecutor’s individual biases, as described in Section III.D.

How do prosecutors decide which potential cases are winnable? They likely consider the evidentiary strength of their case, the resources necessary to investigate and prosecute the case, and how a jury is likely to view the case.163See Anna Offit, Prosecuting in the Shadow of the Jury, 113 Nw. U. L. Rev. 1071 (2019) (presenting ethnographic research showing that federal prosecutors think about how hypothetical jurors will view their cases when making investigative and plea bargaining decisions). These assessments are likely shaped by biases, as described in the next section.

All these factors—the strength of the evidence, the resources necessary to bring the case, and how a jury is likely to view the case—militate toward prosecuting low-level cases. As described in Sections I.B and III.C, a financial crime prosecution typically requires a prosecutor to prove beyond a reasonable doubt that the defendant intended to defraud someone. In simplistic cases, such as when an employee uses a company credit card to buy personal items, the evidence of fraud will often be straightforward and easily attainable: typically, the victim (the employer) will have records showing unauthorized purchases and can turn those records over to prosecutors.

In contrast, the task of building a case will be much more difficult in frauds for which there is no victim who can provide evidence of the fraud, such as when a fraud is carried out in a large corporate organization with many diffuse victims. As Miriam Baer describes, “[l]ife within corporate settings is remarkably compartmentalized and siloed. Information and responsibility fractures among multiple units and departments, allowing criminal targets to claim that the left hand did not know what the right hand was doing, or at very least, that an intent to harm or deceive was absent.”164Baer, supra note 6, at 110.

In such cases, the government will typically need to rely on a whistleblower for evidence and may have a hard time proving that any particular person involved had the requisite intent to defraud. Whistleblowers can be hard to recruit because, although they are occasionally rewarded for bringing wrongdoing to light, more often they are fired and struggle to find a new job in their industry.165William D. Cohan, High Risk but Little Reward for Whistle-Blowers, N.Y. Times (Mar. 26, 2015), https://www.nytimes.com/2015/03/27/business/dealbook/high-risk-but-little-reward-for-whistle-blowers.html [https://perma.cc/22RX-N2PG]; see also William D. Cohan, Wall St. Whistle-Blowers, Often Scorned, Get New Support, N.Y. Times (Feb. 11, 2016), https://www.nytimes.com/2016/02/12/business/dealbook/wall-st-whistle-blowers-often-scorned-get-new-support.html [https://perma.cc/ZHR4-XUYS] (describing an advocacy group, Bank Whistleblowers United, “that aims to improve the status of Wall Street whistle-blowers and change the way Wall Street is regulated”); Alexander I. Platt, The Whistleblower Industrial Complex, 40 Yale J. Regul. 688, 707–09 (2023). This is precisely what happened to Alayne Fleischmann, the whistleblower in Case D.166See Daniel C. Richman, Corporate Headhunting, 8 Harv. L. & Pol’y Rev. 265, 269 (2014) (describing likely difficulties in bringing criminal charges against individuals involved in the 2008 financial crisis). But see Miriam Baer, supra note, 6, at 15 (“[W]hite-collar crimes are not always as difficult to prove as some commentators suggest . . . . When the government feels like it, it mobilizes its extensive resources.”).

Second, building and bringing complex cases takes a lot of work and resources. It uses up prosecutors’ and investigators’ time. The more witnesses there are to interview, the more documents there are to review, and the more expertise is required to understand the fraud—all these tasks require a lot of resources. A straightforward case can move forward more quickly and easily.

Relatedly, the resource differences on each side of a criminal case can strain the government’s ability to prosecute. Charging a person who will hire a large law firm to represent them in defense will create a different resource dynamic than prosecuting a person who will rely on appointed counsel.167Of course, there are many talented attorneys who work as appointed counsel, but they do not have the same level of resources as a large law firm. Some research has found that attorneys who are retained rather than appointed appear to achieve better outcomes for their clients. See, e.g., Amanda Agan, Matthew Freedman & Emily Owens, Is Your Lawyer a Lemon? Incentives and Selection in the Public Provision of Criminal Defense, 103 Rev. Econ. & Stat. 294, 294 (2021) (finding worse outcomes for criminal defendants represented by appointed rather than retained counsel); Thomas H. Cohen, Who is Better at Defending Criminals? Does Type of Defense Attorney Matter in Terms of Producing Favorable Case Outcomes, 25 Crim. J. Pol’y Rev. 29, 29 (2014). Several studies also show that federal public defenders outperform Criminal Justice Act panel attorneys. Radha Iyengar, An Analysis of the Performance of Federal Indigent Defense Counsel 2 (Nat’l Bureau of Econ. Rsch., Working Paper No. 13187, 2007); see also Michael A. Roach, Indigent Defense Counsel, Attorney Quality, and Defendant Outcomes, 16 Am. L. & Econ. Rev. 577, 615 (2014). These resource differences could easily lead the federal government to disproportionately prosecute indigent defendants.

C.  Formal Law and Policy

The substantive laws and rules that define financial crimes and govern how they are prosecuted and sentenced favor sophisticated criminal lawbreakers in many ways. We see examples of this phenomenon in other contexts, too. For example, by far the largest source of theft in the United States is wage theft, which some researchers estimate accounts for more than $15 billion stolen every year.168David Cooper & Teresa Kroeger, Employers Steal Billions from Workers’ Paychecks Each Year, Econ. Pol’y Inst. (May 10, 2017), https://www.epi.org/publication/employers-steal-billions-from-workers-paychecks-each-year [https://perma.cc/K74Q-7Q92]. An employer commits wage theft when they do not pay an employee wages to which the employee is legally entitled, such as by paying less than the minimum wage, not paying required overtime wages, or asking employees to work “off the clock” before or after their shifts.169Ihna Mangundayao, Celine McNicholas, Margaret Poydock & Ali Sait, More than $3 Billion in Stolen Wages Recovered for Workers Between 2017 and 2020, Econ. Pol’y Inst. (Dec. 22, 2021), https://www.epi.org/publication/wage-theft-2021 [https://perma.cc/R7W4-ZBVY]. For a comprehensive examination of efforts to criminalize wage theft, see generally Levin, supra note 111. But wage theft is almost never prosecuted.170See Chris Opfer, Prosecutors Treating ‘Wage Theft’ as a Crime in These States, Bloomberg L. (June 26, 2018, 3:31 AM), https://news.bloomberglaw.com/daily-labor-report/prosecutors-treating-wage-theft-as-a-crime-in-these-states [https://perma.cc/4QSZ-RKX8] (noting that “[w]hen a business doesn’t pay workers minimum wages or overtime, it usually risks a government investigation or private lawsuit,” but that “[p]rosecutors in New York and California are starting to view wage violations as an actual crime more often, as opposed to a matter for civil courts”). The primary way that stolen wages are recovered is through civil actions brought by the U.S. Department of Labor’s Wage and Hour Division, state departments of labor, state attorneys general, and civil class actions. In contrast, larceny and auto theft each steal around $5 billion per year and robbery steals around $380 million.171Table 23: Offense Analysis, Number and Percent Change, 2018–2019, U.S. Dep’t of Just., Fed. Bureau of Investigation, 2019 Crime in the United States, https://ucr.fbi.gov/crime-in-the-u.s/2019/crime-in-the-u.s.-2019/tables/table-23 [https://perma.cc/2UTR-ZPPV]. Unlike wage theft, these crimes are frequently prosecuted.172According to FBI statistics, police clear around thirty-one percent of robberies, fourteen percent of auto thefts, and eighteen percent of larceny offenses. Table 25: Percent of Offenses Cleared by Arrest or Exceptional Means, by Population Group, 2019, U.S. Dep’t of Just., Fed. Bureau of Investigation, 2019 Crime in the United States, https://ucr.fbi.gov/crime-in-the-u.s/2019/crime-in-the-u.s.-2019/topic-pages/tables/table-25 [https://perma.cc/SNG9-GJNQ].

There are myriad ways that federal criminal law and formal policy similarly benefit sophisticated people who commit higher-value, more complex crimes. Here, I focus on two: the mens rea requirements of fraud statutes, and the way restitution is calculated and prioritized.

1.  Mens Rea Elements

As described in Section I.B, most financial crimes contain mens rea elements that require the government to prove the defendant’s intent to defraud. In a relatively straightforward fraud—such as Cases A, B, and C described in Section I.C—it is easy to see how a jury could view the defendants’ conduct and conclude that they intentionally deceived their victims. But in a complex fraud case involving many parties, such as Case D, proving a deceitful intent or scheme on the part of any particular participant could be very difficult for prosecutors.173Daniel Richman is more skeptical of claims that proving criminal intent is a significant hurdle to white-collar prosecutions in the context of the financial crisis, noting that mens rea elements “are far from trivial burdens, but prosecutors regularly meet them in any number of mundane white-collar cases.” Richman, supra note 166; see, e.g., Danielle Kurtzleben, Too Big to Jail: Why the Government Is Quick to Fine but Slow to Prosecute Big Corporations, Vox (July 13, 2015, 10:52 AM), https://www.vox.com/2014/11/16/7223367/corporate-prosecution-wall-street [https://perma.cc/N4AM-H57C] (quoting Brandon Garrett as explaining that in the aftermath of the 2008 financial crisis, prosecutors preferred to focus on “crimes that seem tangential to the crisis . . . . where it [was] easier to show that a small number of people had intent . . . versus some of the mortgage fraud, where there [were] sophisticated actors working with each other, where to show intent to defraud [prosecutors would] have to show that there [was] a clearly deceptive scheme that misled someone else”). As a result, complicated and sophisticated financial crimes—which Table 1 shows are more likely to be perpetrated by people who are high-income, male, and White—are likely much more difficult to prosecute.

2.  Restitution Calculations

The rules around restitution calculations also benefit defendants who commit complex crimes. As described in Section I.B, federal law (like the law in all states) requires courts to order restitution in any case “in which an identifiable victim or victims has suffered a physical injury or pecuniary loss.”17418 U.S.C. §§ 3663A(a)(1), 3663A(c)(1)(B).

One might imagine this means people who commit more complex, higher-value crimes will have to pay more restitution and could therefore be more desirable to prosecute from a prosecutor’s perspective. But this is not the case because the restitution statute contains two exceptions. First, it does not require restitution in cases in which “the number of identifiable victims is so large as to make restitution impracticable.”175Id. § 3663A(c)(3)(A). Second, it does not require restitution in cases in which “determining complex issues of fact related to the cause or amount of the victim’s losses would complicate or prolong the sentencing process to a degree that the need to provide restitution to any victim is outweighed by the burden on the sentencing process.”176Id. § 3663A(c)(3)(B). In other words, financial crimes that are more complex, for which losses are harder to calculate, and for which there are more victims are much less likely to involve restitution. Thus, even if JPMorgan Chase or any of its employees had been convicted of a crime in connection with the financial crisis, they would have had a strong argument that the statute did not require them to pay restitution. In contrast, the defendants in Cases B and C were ordered to pay restitution because their crimes were not complex enough to trigger a statutory exception.

3.  Restitution Policy

Notwithstanding the statutory exceptions, federal prosecutors and judges tend to be highly committed to ensuring as much restitution as possible for victims of financial crimes. For example, the federal sentencing statute instructs judges to consider “the need to provide restitution to any victims of the offense” when sentencing defendants.177Id. § 3553(a)(7). The Justice Manual tells prosecutors that when “determining whether it would be appropriate to enter into a plea agreement,” they should consider (among other factors) “[t]he interests of the victim, including any effect upon the victim’s right to restitution.”178U.S. Dep’t of Just., supra note 73, at § 9-27.420. Similarly, the Manual instructs prosecutors to “take[] into account the need for the defendant to provide restitution to any victims of the offense” when making sentencing recommendations.179Id. at § 9-27.730. Assistant Attorney General for the Criminal Division Kenneth A. Polite, Jr. described federal white-collar efforts in a recent speech, telling the audience, “[c]onsidering victims must be at the center of our white-collar cases. . . . Though we cannot always recover every cent, we deploy all tools at our disposal to restrain assets, obtain restitution, and when possible, repatriate assets for victims.”180Polite, supra note 23.

One consequence of prosecutors’ and judges’ desire to provide restitution to victims of financial crimes is that defendants with more resources can argue (either as a pitch to prosecutors before charging or to a judge at sentencing) that they should not be prosecuted or incarcerated because a criminal case or prison sentence will interrupt their ability to earn income to pay toward restitution. For example, a financial advisor convicted of fraud in the District of Massachusetts made this argument in his sentencing memo, writing:

If incarcerated, [the defendant] will not be able to contribute to restitution; he will lose his job and have to start all over upon his release. Whereas in his current position, where he has advanced to a management position in a relatively short amount of time, he will be able to contribute immediately toward a restitution award.181Def.’s Sentencing Mem. at 9, United States v. Cody, No. 17-CR-10291 (D. Mass. Mar. 9, 2019); see also, e.g., Def.’s Sentencing Mem. at 2, United States v. Luna, No. 19 CR 902-1 (N.D. Ill. Nov. 11, 2020) (noting that the defendant already paid some restitution to the victim, was working full-time in a new job and wanted to continue to repay the victim, and arguing that “paying the victim back is a goal the Court should consider in fashioning a non-custodial sentence” for the defendant).

Indeed, federal courts routinely justify low or probation-only sentences for financial crime defendants by stating their desire to allow the defendant to work and provide restitution.182See United States v. Menyweather, 447 F.3d 625, 634 (9th Cir. 2006) (affirming a probation-only sentence for a defendant convicted of fraud and observing “that the district court’s goal of obtaining restitution for the victims of Defendant’s offense . . . is better served by a non-incarcerated and employed defendant”); United States v. Bortnick, No. 03-CR-0414, 2006 U.S. Dist. LEXIS 11744, at *14, *19 (E.D. Pa. Mar. 15, 2006) (imposing a seven-day sentence to a defendant in an $8 million fraud case with a 51–63 month advisory Guidelines range because “[d]efendant owes a substantial amount of restitution, which he will be able to pay more easily if he is not subjected to a lengthy incarceration period”); United States v. Peterson, 363 F.Supp.2d 1060, 1063 (E.D. Wis. 2005) (imposing a one-day sentence so defendant would not lose his job and could pay restitution to the bank he defrauded). But see United States v. Mueffelman, 470 F.3d 33, 40 (1st Cir. 2006) (affirming a 27-month sentence despite the defendant’s argument that “anything beyond a probationary sentence would impair his ability to provide restitution for victims” and his promise to “earn $120,000–175,000 per year to pay toward restitution, with a friend promising to make up any short fall”). In one of the Yale Studies that surveyed federal district court judges about how they sentence white-collar defendants, one judge was asked about his decision not to impose a prison sentence on a person convicted of not reporting large amounts of income. The interviewer asked the judge, “[Y]ou must have considered sending him to a term in prison. What made you decide that that wasn’t appropriate in this case?” The judge responded,

Well, the restitution. There is half a million dollars back in the coffers that we wouldn’t have got if I had sent him to prison. He would have served his term, and there would have been no way of getting it, and eventually some day or other he would have gotten out of the country somehow or other and gotten that money. That was it.183Mann et al., supra note 51, at 492.

A defendant with fewer resources or without stable employment will have a harder time making this argument to a prosecutor, which could explain why wealthy defendants are less likely to be prosecuted for financial crimes.184Indeed, federal prosecutors often decline or defer prosecution of corporations for this reason. See supra notes 85, 109, 110 and accompanying text.

D. Bias

As described in Section I.B, federal investigative agencies and DOJ have nearly absolute discretion in deciding which cases to investigate and prosecute. Although individual agents and federal prosecutors might be constrained formally and informally by office policies and norms, there are almost no formal legal constraints on how enforcement agents decide which cases to investigate and how prosecutors decide which cases to pursue.185See supra note 71 and accompanying text. Wide discretion often allows decisionmakers to make discriminatory decisions, either consciously or subconsciously.

1. Stereotypes About Dishonesty

Deceit is the central characteristic of financial crime. Social psychologists have documented consistent stereotypes that associate honesty with social class, race, and gender in the United States. For example, literature in psychology finds that participants often view people of low socioeconomic status as lazy, incompetent, and prone to substance abuse, while viewing people of high socioeconomic status as more competent and intelligent.186Federica Durante & Susan T. Fiske, How Social-Class Stereotypes Maintain Inequality, 18 Current Op. Psych. 43, 43 (2017).

Stereotypes characterizing women—and, in particular, women of color—as dishonest are pervasive in the United States, which might explain why Black women are overrepresented among financial crime defendants despite being underrepresented in federal prosecutions overall. Women have long been viewed as dishonest in criminal cases,187See, e.g., Diana L. Payne, Kimberly A. Lonsway & Louise F. Fitzgerald, Rape Myth Acceptance: Exploration of Its Structure and Its Measurement Using the Illinois Rape Myth Acceptance Scale, 33 J. Rsch. Personality 27 (1999). and Marilyn Yarbrough and Crystal Bennett describe “a hierarchy when credibility issues arise in the courts. It is not only a simple hierarchy of men over women, but it is one where White women are found to be more credible than African American women.”188Marilyn Yarbrough & Crystal Bennett, Cassandra and the “Sistahs”: The Peculiar Treatment of African American Women in the Myth of Women as Liars, 3 J. Gender Race & Just. 625, 634 (2000) (citing Rosemary C. Hunter, Gender in Evidence: Masculine Norms vs. Feminist Reforms, 19 Harv. Women’s L.J. 127, 165 (1996)). The rhetoric and law of welfare reform in the 1990s also surfaced and magnified already prevalent gender- and race-based stereotypes about dishonesty. Gustafson, supra note 14, at 1 (“[W]hile welfare use has always carried the stigma of poverty, it now also bears the stigma of criminality.”); see also Julilly Kohler-Hausmann, Welfare Crises, Penal Solutions, and the Origins of the “Welfare Queen,” 41 J. Urb. Hist. 756, 757 (2015) (arguing that “opponents of welfare programs recruited the penal system to discredit public aid beneficiaries and administration”); Franklin D. Gilliam, Jr., The “Welfare Queen” Experiment: How Viewers React to Images of African-American Mothers on Welfare, Nieman Reports (June 15, 1999), https://niemanreports.org/articles/the-welfare-queen-experiment [https://perma.cc/3EX2-FLW3] (finding that when White subjects viewed a television story about welfare reform, they were more likely to believe that “welfare recipients cheat and defraud the system” when exposed to a segment that depicted a female benefits recipient as Black compared to one that depicted the female benefits recipient as White). And as Chan Tov McNamarah explains, “[S]kepticism of Black credibility is part of a larger, historically created space in which those who are deemed rational, reliable, and worthy of belief are White and male.”189Chan Tov McNamarah, White Caller Crime: Racialized Police Communication and Existing While Black, 24 Mich. J. Race & L. 335, 372 (2019) (citing Sheri Lynn Johnson, The Color of Truth: Race and the Assessment of Credibility, 1 Mich. J. Race & L. 261 (1996)); see also Kurtis Haut, Caleb Wohn, Victor Antony, Aidan Goldfarb, Melissa Welsh, Dillanie Sumanthiran, Ji-ze Jang, Md. Rafayet Ali & Ehsan Hoque, Could You Become More Credible by Being White? Assessing Impact of Race on Credibility with Deepfakes, ArXiv, Feb. 16, 2021, at 1, 1–2, https://arxiv.org/pdf/2102.08054.pdf [https://perma.cc/E9BJ-XQUG] (displaying Deepfake still photos and video clips that used the same audio but altered the speaker’s race and finding that speaker race had a negligible effect on credibility when presented as a static image but a statistically significant effect when presented as a video (with a White speaker viewed as more credible than a South Asian speaker)). These kinds of prejudices could affect how agents decide which people to investigate and prosecutors decide which cases to bring.

2.  In-Group Favoritism

Bennett Capers argues, “[T]o understand mass incarceration, we must not only understand overcriminalization and overenforcement in minority communities. We must also understand the role played by under-enforcement, and privilege, in nonminority communities.”190I. Bennett Capers, The Under-Policed, 51 Wake Forest L. Rev. 589, 609 (2016). Consciously or not, prosecutors and agents might be less willing to prosecute people with whom they have more in common, a phenomenon often referred to as “in-group favoritism.”

In-group favoritism occurs when a decision-maker gives preferential treatment to those who share a salient trait with the decision-maker, such as by being a member of their gender, racial, ethnic, or religious group.191Jim A.C. Everett, Nadira S. Faber & Molly Crockett, Preferences and Beliefs in Ingroup Favoritism, Frontiers Behav. Neuroscience, Feb. 13, 2015, at 1. In this subsection, I do not mean to rule out that conscious class-, gender-, or race-based bias is also a potential cause of the inequalities documented in Part II. For many years, there was a growing consensus that the majority of discrimination in the United States takes the form of in-group favoritism,192See, e.g., Anthony G. Greenwald & Thomas F. Pettigrew, With Malice Toward None and Charity for Some: Ingroup Favoritism Enables Discrimination, 69 Am. Psych. 669, 669 (2014); Linda Hamilton Krieger, Civil Rights Perestroika: Intergroup Relations After Affirmative Action, 86 Calif. L. Rev. 125 (1998). although in recent years overt racism and sexism have grown increasingly prevalent.193See, e.g., Charles R. Lawrence III, Implicit Bias in the Age of Trump, 133 Harv. L. Rev. 2304, 2311 (2020) (reviewing Jennifer L. Eberhardt, Biased: Uncovering the Hidden Prejudice that Shapes What We See, Think, and Do (2019)) (reflecting on the choice to review “a book about hidden bias when the active threat is self-proclaimed racists marching in the streets[] . . . . [and] when the President of the country was holding rallies and building walls to proclaim himself the protector of a white nation”); see also Griffin Edwards & Stephen Rushin, The Effect of President Trump’s Election on Hate Crimes (Jan. 2019) (working paper), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3102652 [https://perma.cc/2J38-N6P6].

In-group favoritism is well-documented in the criminal system. In prior work, I showed that federal prosecutors exhibit gender-based in-group favoritism, treating defendants of their own gender relatively more leniently than other-gender defendants.194Stephanie Holmes Didwania, Gender Favoritism Among Criminal Prosecutors, 65 J.L. & Econ. 77, 77 (2022). CarlyWill Sloan has also shown that state-level prosecutors demonstrate race-based favoritism in prosecuting property crimes in New York County. CarlyWill Sloan, Racial Bias by Prosecutors: Evidence from Random Assignment (Jan. 10, 2022) (working paper), https://github.com/carlywillsloan/Prosecutors/blob/master/sloan_pros.pdf [https://perma.cc/7AZT-SF99]. New research suggests that firms risking prosecution appear to strategically leverage in-group favoritism to help improve negotiations with federal prosecutors.195Brian D. Feinstein, William R. Heaston & Guilherme Siqueira de Carvalho, In-Group Favoritism as Legal Strategy: Evidence from FCPA Settlements, 60 Am. Bus. L.J. 5 (2023). Other scholars have previously documented in-group favoritism among other actors in criminal legal systems, including judges196See, e.g., David S. Abrams, Marianne Bertrand & Sendhil Mullainathan, 41 J. Legal Stud. 347, 350 (2012) (finding that African American judges exhibit smaller racial disparities in sentencing than their White counterparts); Oren Gazal-Ayal & Raanan Sulitzeanu-Kenan, Let My People Go: Ethnic In-Group Bias in Judicial Decisions—Evidence from a Randomized Natural Experiment, 7 J. Empirical Legal Stud. 403, 403, 421 (2010) (finding that Arab and Jewish judges in Israel are less likely to detain defendants who share their ethnicity). But see Briggs Depew, Ozkan Eren & Naci Mocan, Judges, Juveniles, and In-Group Bias, 60 J.L. & Econ. 209, 209 (2017) (finding that judges exhibit “negative in-group bias” toward juvenile defendants of the judge’s race); Claire S.H. Lim, Bernardo S. Silveira & James M. Snyder, Jr., Do Judges’ Characteristics Matter? Ethnicity, Gender, and Partisanship in Texas State Trial Courts, 18 Am. L. & Econ. Rev. 302, 305 (2016) (finding that “matches between judges’ and defendants’ ethnicity, race, and gender . . . have negligible effects” on sentence length). and police officers.197See, e.g., Bocar A. Ba, Dean Knox, Jonathan Mummolo & Roman Rivera, The Role of Officer Race and Gender in Police-Civilian Interactions in Chicago, 371 Science 696, 696 (2021) (showing that “Hispanic and Black officers make far fewer stops and arrests and they use force less [often than White officers], especially against Black civilians”); John J. Donohue, III & Steven D. Levitt, The Impact of Race on Policing and Arrests, 44 J.L. & Econ. 367, 367 (2001) (finding that police departments with more minority officers are more likely to arrest White suspects, with little impact on the arrests of non-White suspects); Mark Hoekstra & CarlyWill Sloan, Does Race Matter for Police Use of Force? Evidence from 911 Calls, 112 Am. Econ. Rev. 827, 827 (2022) (finding that “White officers increase force much more than minority officers when dispatched to more minority neighborhoods”). As an important caveat, however, some research finds evidence of a phenomenon called the black-sheep effect, in which people punish in-group members more harshly than out-group members for bad behavior.198See José M. Marques, Vincent Y. Yzerbyt & Jacques-Philippe Leyens, The “Black Sheep Effect”: Extremity of Judgments Towards Ingroup Members as a Function of Group Identification, 18 Eur. J. Soc. Psych. 1 (1988); see also Depew et al., supra note 196, at 233 (finding in-group disfavoritism on the basis of race in juvenile sentencing).

Perhaps more than in other types of federal cases (most of which involve immigration, drugs, or firearm possession), prosecutors and federal agents might feel affinity for financial crime defendants who work as business professionals due to cultural or social proximity. This hypothesis is not new. Over 40 years ago, one of the Yale Studies described in Section I.B.2 surveyed federal district judges and found sentiment of in-group favoritism when judges were asked about sentencing white-collar defendants. For example, one federal judge described his views on sentencing white-collar defendants to prison this way:

I think the first sentence to a prison term for a person who up to now has lived and has surrounded himself with a family, that lives in terms of great respectability and community respect and so on, whether one likes to say this or not I think a term of imprisonment for such a person is probably a harsher, more painful sanction than it is for someone who grows up somewhere where people are always in and out of prison. There may be something racist about saying that, but I am saying what I think is true or perhaps needs to be laid out on the table and faced.199Mann et al., supra note 51, at 486–87.

The authors believe the judge’s previous comment is the result of increased empathy toward wealthy and professional class white-collar defendants.200Id. at 500.

The [judges’] interview responses repeatedly give evidence of the judges’ understanding, indeed sympathy, for the person whose position in society may be very much like their own. In places, the interviews exude the pain that judges feel in seeing the offender uprooted from his family, humiliated before his friends, and exposed to the degradation of imprisonment.

Id.; see also Bibas, supra note 80 (“[J]udges may prefer to look ex post at the sympathetic, white, educated offender who reminds judges of themselves and seems to pose no danger.”).
Indeed, in-group favoritism often takes the form of empathy toward in-group members, and, in experimental settings, people are often more likely to feel empathy in observing the pain of an in-group member compared to an out-group member.201See Mina Cikara, Emile G. Bruneau & Rebecca R. Saxe, Us and Them: Intergroup Failures of Empathy, 20 Current Directions in Psych. Sci. 149, 149 (2011); Jennifer N. Gutsell & Michael Inzlicht, Intergroup Differences in the Sharing of Emotive States: Neural Evidence of an Empathy Gap, 7 Soc. Cognition & Affective Neuroscience 596, 596 (2012); Xiaojing Xu, Xiangyu Zuo, Xiaoying Wang & Shihui Han, Do You Feel My Pain? Racial Group Membership Modulates Empathic Neural Responses, 29 J. Neuroscience 8525, 8525 (2009). It is plausible that prosecutors and FBI agents are more empathetic about the harms of federal prosecution when it comes to potential defendants with similar levels of formal education and wealth.

CONCLUSION

This Article has shown that, contrary to popular wisdom, financial crime is frequently prosecuted in the United States. Part II showed that federal financial crimes are prosecuted in ways that replicate inequalities that exist throughout American criminal law. Black men and women are more likely to be prosecuted for financial crimes than any other racial and gender group. Unlike the traditional view of white-collar crime, which posits that it is a form of crime largely perpetuated by economic elites, the findings also show that federal financial crime defendants are likely to have fewer resources than most U.S. adults.

Part III offered many explanations for these findings. It argued that systemic incentives, formal law and policy, and individual biases could all drive inequality. It also showed that the overrepresentation of Black and low-income defendants does not appear to be because these defendants commit the most egregious forms of financial crime (in fact, the opposite is true).

The inequalities documented in this paper are concerning because they seem to be overlooked. The intense focus on elite white-collar criminals—by the media, the academy, and the federal government itself—seems to at best not understand the realities of the system in which they are operating. This Article hopes to address this mistake.

APPENDIX

Figure A.1.  Federal Criminal Cases: Three Most Common Offense Types, 1994–2019
 
Note: This figure plots the number of cases sentenced each fiscal year between 1994 and 2019 for the three most commonly prosecuted types of federal crime: drug trafficking and possession, immigration, and financial crime.
Figure A.2.  Educational Attainment in Federal Financial Crime Cases Over Time
A.  Educational Attainment in Federal Financial Crime Cases
 
B.  Educational Attainment Representation in Federal Financial Crime Cases
 
Note: For each year, the “Representation Gap” in panel B is computed as the share of financial crime defendants in the educational group divided by the share of the U.S. adult population between the ages of 25 and 54 in that educational group.
Figure A.3.  Gender Inequality in Financial Crime Prosecutions (All Years) 
  
Note: This figure maps the share of each district’s financial crime cases that are prosecuted against women. Each shade represents an equal interval in the distribution. Lightest shading means roughly 15–22% of financial crime defendants in the district are women; second-lightest shading means 22–29% of financial crime defendants are women; second-darkest shading means 29–36% of financial crime defendants are women; and darkest shading means 36–43% of financial crime defendants are women. 
Table A.1.  Victim Coding: Most Prosecuted Financial Crimes
Crime (Short Description)StatuteShare of CasesVictim
Conspiracy or Defrauding the United States18 U.S.C. § 3710.185U
Embezzlement or Theft of Public Money18 U.S.C. § 6410.079G
Attempt or Conspiracy to §§ 1341‑4818 U.S.C. § 13490.074P
Bank fraud18 U.S.C. § 13440.073P
Wire fraud18 U.S.C. § 13430.072P
Mail fraud18 U.S.C. § 13410.065P
Tax Fraud26 U.S.C. § 72010.053G
False Statements to Federal Officials18 U.S.C. § 10010.050N
Counterfeiting18 U.S.C. § 4720.046P
Credit Card Fraud18 U.S.C. § 10290.046P
Identity Theft18 U.S.C. § 10280.044U
Mail Theft18 U.S.C. § 17080.031G
Accessory to a Crime18 U.S.C. § 20.027U
Social Security Fraud42 U.S.C. § 4080.021G
Embezzlement by Bank Employee18 U.S.C. § 6560.015P
Healthcare Fraud18 U.S.C. § 13470.015U
Conspiracy to Defraud the Government18 U.S.C. § 2860.013G
Note: This table reports how victim status was coded for the most prosecuted federal financial crimes. G=government victim; N=no victim; P=private victim; U=unknown victim. The table is restricted to crimes constituting at least one percent of charged cases. Many additional types of financial crimes were also coded, and a complete crosswalk is available from the author by request.
Table A.2.  Proxies for Poverty in Federal Fraud Prosecutions
 

% of Financial Crime Defs

(All)

% of Financial Crime Defs

(Citizens)

% of U.S. Adult Pop

(if applicable)

Less than HS18.8916.7811.09
High School Only31.4931.5929.43
Some College31.0232.2427.42
College Graduate18.6019.4032.06
Fines Waived85.8989.04
Retained Counsel33.7333.63
Observations276,210161,552 
Note: Computations are for federal defendants sentenced under the U.S. Sentencing Guidelines for financial crimes in fiscal years 1994–2019. U.S. adult population averages computed over the years 1994–2019.
Table A.3.  Race-Gender Representation in Federal Fraud Prosecutions
 % of Financial Crime Defs% of All Defs% of U.S. Adult Pop
Black Men18.6219.515.55
Hispanic Men10.8640.377.11
Another Race Men4.693.762.93
White Men36.0622.8232.89
All Men70.2386.4748.47
Black Women10.703.346.41
Hispanic Women3.854.266.97
Another Race Women2.080.923.29
White Women13.135.0134.86
All Women29.7713.5351.53
Observations276,2101,667,763 
Note: Computations are for federal defendants sentenced under the U.S. Sentencing Guidelines in fiscal years 1994–2019. U.S. adult population averages computed over the years 1994–2019.
97 S. Cal. L. Rev. 299

Download

* Associate Professor of Law, Northwestern Pritzker School of Law. I am grateful to Joshua Braver, Samuel Buell, Franciska Coleman, Brandon Garrett, Michael Gentithes, Ben Grunwald, Andrew Hammond, Paul Heaton, Carissa Hessick, Christine Jolls, Kay Levine, James Lindgren, Yair Listokin, Yaron Nili, Lauren Ouziel, Maria Ponomarenko, John Rappaport, Megan Stevenson, Neel Sukhatme, Kegon Teng Kok Tan, Nina Varsava, Lisa Washington, Ron Wright, as well as participants at the 2022 CrimFest Conference, the 2022 Chicagoland Junior Scholars Conference, the 2022 Empirical Criminal Law Roundtable, the 2023 Annual Meeting of the American Law and Economics Association, the 2023 Conference on Empirical Legal Studies, the 2023 Harvard/Stanford/Yale Junior Faculty Forum, the Larry E. Ribstein Law & Economics Workshop at George Mason University Antonin Scalia Law School, the Soshnick Colloquium on Law and Economics at Northwestern Pritzker School of Law, and the University of Wisconsin-Madison La Follette School of Public Affairs Seminar for thoughtful comments on this work. Thomas Gordon and Matthew Marcin provided excellent research assistance. Finally, I thank the fantastic student editors of the Southern California Law Review for their meticulous and insightful editorial assistance.

The Double Jeopardy Clause and Successive Prosecutions by Separate Sovereigns for the Same Act

Under the so-called dual sovereignty doctrine (“DSD”), the Fifth Amendment’s Double Jeopardy Clause (“DJC”) is not implicated by successive prosecutions brought by separate sovereigns against the same defendant for the same act. For example, if a defendant is prosecuted first by the federal government for a certain crime, that defendant’s right not “to be twice put in jeopardy of life or limb”1ullen Professor, University of Houston Law Center. I am grateful to the following for their comments, suggestions, questions, and criticisms: Lincoln Dow, Meredith Duncan, Lonny Hoffman, and Teddy Rave, as well as the students in my Fall 2022 course on the Supreme Court. I also benefitted from superb research assistance provided by Austin Falcon, Jared Peloquin, Zeshan Mohiuddin, and lawyers in the Houston office of Latham & Watkins. Amanda Watson and her terrific library staff provided invaluable support. Finally, I appreciate the backing of Dean Leonard Baynes and Associate Dean Greg Vetter, and financial support from the University of Houston Law Foundation. for the same offence does not protect him against a subsequent prosecution by a state government for a crime involving the same conduct. As the Court put it in the recent case of Gamble v. United States,2Gamble v. United States, 139 S. Ct. 1960 (2019). Throughout this Article, I refer to criminal defendants using the masculine pronoun, principally because nearly 90% of federal criminal defendants (and more than 90% of inmates in federal custody) are male, and it would therefore be precious to use nongendered pronouns. See Mark Motivans, U.S. Dep’t of Just., Federal Justice Statistics, 2019, at 8, 16 (2021), https://bjs.ojp.gov/content/pub/pdf/fjs19.pdf [https://perma.cc/Q24S-4MN2]. “a crime under one sovereign’s laws is not ‘the same offence’ as a crime under the laws of another sovereign.”3Gamble, 139 S. Ct. at 1964.

I argue in this Article that this DSD errs in two respects, one of which has drawn a bit of attention, and one of which has gone entirely unnoticed in the cases and academic literature. First, as suggested by Justices Ginsburg and Gorsuch in their separate Gamble dissents,4See id. at 1989–91 (Ginsburg, J., dissenting); id. at 1996–99 (Gorsuch, J., dissenting). Until Gamble, Justice Thomas had been similarly skeptical of the originalist justification for the dual sovereignty doctrine (“DSD”), but he changed his mind. Compare Puerto Rico v. Sanchez Valle, 579 U.S. 59, 78 (2016) (Ginsburg, J., joined by Thomas, J., concurring), with Gamble, 139 S. Ct. at 1980 (Thomas, J., concurring). and as I elaborate, the DSD rests on a mistaken originalist view of how successive prosecutions by separate sovereigns were regarded at common law; consequently, the inference as to how the eighteenth-century English doctrine applies to the United States, which rests on a concept of divided sovereignty alien to the common law, is fundamentally flawed.5I am not the first academic to comment on this misreading of historical record. Indeed, the Double Jeopardy Clause (“DJC”) literature pertaining specifically to the historical meaning of the provision is exhaustive; sources I have found especially illuminating include the following: Jay A. Sigler, Double Jeopardy: The Development of a Legal and Social Policy 2–4 (1969); George C. Thomas III, Double Jeopardy: The History, The Law 46–86 (1998). Scholarship that attacks the DSD in particular began to develop following the initial appearance of the doctrine itself. Again, the literature is substantial; and again, arguments I have found particularly compelling include the following: J.A.C. Grant, The Lanza Rule of Successive Prosecutions, 32 Colum. L. Rev. 1309 (1932); Walter T. Fisher, Double Jeopardy, Two Sovereignties and the Intruding Constitution, 28 U. Chi. L. Rev. 591 (1961); Lawrence Newman, Double Jeopardy and the Problem of Successive Prosecution: A Suggested Solution, 34 S. Cal. L. Rev. 252 (1961); George C. Pontikes, Dual Sovereignty and Double Jeopardy: A Critique of Bartkus v. Illinois and Abbate v. United States, 14 W. Rsrv. L. Rev. 700 (1963). For perhaps the most trenchant critique, see Paul G. Cassell, The Rodney King Trials and the Double Jeopardy Clause: Some Observations on Original Meaning and the ACLU’s Schizophrenic Views of the Dual Sovereign Doctrine, 41 UCLA L. Rev. 693 (1994). For an unusually perspicuous analysis of the common law, see Donald Eric Burton, Note, A Closer Look at the Supreme Court and the Double Jeopardy Clause, 49 Ohio St. L.J. 799, 801 (1988); see also Michael Kline, Note, Wading in the Sargasso Sea: The Double Jeopardy Clause, Non-Capital Sentencing Proceedings, and California’s “Three Strikes” Law Collide in Monge v. California, 27 Pepp. L. Rev. 861, 863–65 (2000); infra note 23.

Second, the current and longstanding view of the DJC assesses whether that Clause is implicated by focusing on whether the same offense (or conduct) forms the basis for successive prosecutions by separate sovereigns. I offer an entirely different methodology that does not depend (as does this orthodox view) on an unsound originalist analysis.6See infra text accompanying notes 32–38 in Part III. Moreover, the approach I offer in this Article to the DSD/DJC analysis would remain superior to the existing jurisprudence even if the originalist argument for the DSD were historically sound. A nonoriginalist could therefore embrace my elements-based approach regardless of the historical critique. I nevertheless stress the weakness of the originalist argument primarily in order to clear the field of what is essentially a red herring and to obtain potential buy-in from committed originalists. Finally, although, as I say, I am not aware of any court or academic who has proposed the approach to double jeopardy I develop here, an interesting student note examined a related issue: namely, whether a criminal defendant who is subsequently sued for civil damages can invoke (or should be able to invoke) preclusion in the civil proceeding. See Wystan M. Ackerman, Note, Precluding Defendants from Relitigating Sentencing Findings in Subsequent Civil Suits, 101 Colum. L. Rev. 128, 128–30 (2001). Rather than focusing on what a defendant did or how a sovereign has defined an offense, the better approach to determining whether successive prosecutions by separate sovereigns violate the DJC is to focus on what the jury found. The methodology I propose hones in on the elements of the crime with which a criminal defendant is charged in the initial prosecution because the outcome of that trial will turn on the factfinder’s evaluation of those elements. To my knowledge, nobody has previously proposed this approach to analyzing double jeopardy challenges to successive prosecutions brought by separate sovereigns.

My starting point is the Supreme Court’s recent decision in Gamble, which I summarize in Part I. Next, in Part II, I identify what I refer to as the twin errors that animate the Gamble holding, one entirely historical, and the other primarily analytical. In Part III, I propose a new methodology for examining whether successive prosecutions violate the DJC; I refer to this methodology as an “elements-based approach.” In Part IV, I compare the analytical method outlined in Part III with Gamble itself and illustrate how Gamble would have been decided using an elements-based approach. In Part V, I turn to the principles of issue preclusion and full faith and credit and argue that an elements-based approach to double jeopardy analysis is symmetrical to a similar inquiry in the civil domain. Finally, I conclude by pointing to the DJC-DSD cases the courts have adjudicated over the past two decades, and I ask how consequential the modification I sketch would be on criminal defendants.

Download

Self-Defense Exceptionalism and the Immunization of Private Violence

After the high-profile trial of Kyle Rittenhouse, the parameters of lawful self-defense are a subject of intense public and scholarly attention. In recent years, most commentary about self-defense has focused on “Stand Your Ground” policies that remove the duty to retreat before using lethal force. But the reaction to Rittenhouse’s case reflects a different, more extreme way that the law governing defensive force is changing. In particular, advocates and legislators say that private citizens like Rittenhouse who exercise self-defense should be entitled to immunity—an exemption from prosecution—giving them an extraordinary procedural benefit not attaching to other defenses that are adjudicated at trial. As this Article reveals, this effort to transform self-defense into something exceptional within criminal law began more than a decade ago in the shadows of Stand Your Ground. One-quarter of U.S. states have already enacted laws providing for self-defense immunity.

This Article examines this fundamental yet understudied shift in self-defense law. It shows how the concept of immunizing defensive force is foreign to the Anglo-American legal tradition as well as settled principles of modern criminal law and procedure, including the exceedingly narrow role of immunities. It tells the story of how self-defense immunity arose not as part of the broader criminal justice reform movement, but rather at the behest of the movement to insulate defensive gun use from liability. And it demonstrates the costs of treating self-defense as an immunity, such as increasing violence, diminishing the institution of the jury, delegitimizing criminal law outcomes, and undermining judicial economy. After exposing the unreasoned rise and inevitable costs of self-defense immunity, this Article concludes that self-defense should remain an affirmative defense to criminal charges rather than immunize a defendant from being prosecuted at all. Self-defense reform should move in lockstep with other criminal law defenses so as to avoid the societal harms that result from immunizing defensive violence.

INTRODUCTION

On August 25, 2020, seventeen-year-old Kyle Rittenhouse traveled to Kenosha, Wisconsin, with an illegally obtained AR-15–style rifle in the wake of the shooting of Jacob Blake by a police officer.1Kim Bellware, What to Know About the Contentious Trial of Kyle Rittenhouse, Wash. Post (Nov. 10, 2021, 8:03 AM), https://www.washingtonpost.com/nation/2021/11/10/rittenhouse-trial-faq [https://perma.cc/ED9L-K3MG]. Rittenhouse said he went heavily armed to provide medical aid and protect property, albeit strangers’ property, during racial justice protests and unrest following yet another police shooting of a Black man.2Id. Instead, he shot three men during altercations, killing two of them.3Id. Rittenhouse was charged with crimes including murder,4See Crim. Complaint, State v. Rittenhouse, 2020 CF 000983 (Aug. 27, 2020). Wisconsin does not have a crime called “murder”; instead, it proscribes “first-degree intentional homicide” when a person “causes the death of another human being with intent to kill that person.” Wisc. Stat. § 940.01 (2022). and in his defense he asserted self-defense: he feared that the men would disarm him and use his own rifle against him unless he shot them first.5Shaila Dewan, Can Self-Defense Laws Stand Up to a Country Awash in Guns?, N.Y. Times (Nov. 13, 2021), https://www.nytimes.com/2021/11/13/us/rittenhouse-arbery-self-defense.html [https://
perma.cc/YC5U-XKFD].

Rittenhouse’s case was closely watched and controversial, splitting the nation into diametrically opposed camps regarding the appropriateness of his conduct. It also raised difficult factual and legal questions, including whether he provoked the confrontations and thereby negated the lawfulness of his defensive force.6Cynthia Lee, How a Vaguely Worded Wisconsin Law Could Let Rittenhouse Walk, Politico (Nov. 17, 2021), https://www.politico.com/news/magazine/2021/11/17/wisconsin-self-defense-law-rittenhouse-522814 [https://perma.cc/7C86-Y292] (describing Wisconsin’s initial aggressor doctrine in relation to the Rittenhouse case). At the end of a two-week trial at which dozens of witnesses testified, a jury deliberated for three days and returned a verdict of not guilty.7Julie Bosman, Kyle Rittenhouse Was Found Not Guilty of Intentional Homicide and Four Other Charges, N.Y. Times (Nov. 19, 2021), https://www.nytimes.com/live/2021/11/19/us/kyle-rittenhouse-trial [https://perma.cc/6A5R-6XEW]. The outcome should have pleased those who supported Rittenhouse’s conduct that summer night. Instead, a common reaction was, as former President Donald Trump put it, that Rittenhouse “shouldn’t have been prosecuted in the first place.”8Fox News, Trump on Rittenhouse Verdict, YouTube (Nov. 19, 2021), https://
http://www.youtube.com/watch?v=b0lReIesfZE&t=6s [https://perma.cc/39J9-D7PW]; see also Bosman, supra note 7 (quoting Republican candidate for Wisconsin governor, Rebecca Kleefisch, as asserting that the prosecution of Rittenhouse was a “complete disgrace”).

If that sentiment were simply a feature of modern political rhetoric, it might be undeserving of close scrutiny. Indeed, the politics of self-defense shone brightly after the Rittenhouse trial. U.S. Representative Marjorie Taylor Greene even introduced a bill to award Rittenhouse a civilian’s highest congressional tribute, a Congressional Gold Medal, for his “courageous actions.”9Kyle H. Rittenhouse Congressional Gold Medal Act, H.R. 6070, 117th Cong. (Nov. 23, 2021); Mariana Alfaro, Rep. Greene Introduces Bill to Award Congress’s Highest Honor to Kyle Rittenhouse, Who Fatally Shot Two Men, Wash. Post (Nov. 24, 2021, 7:35 PM), https://www.washingtonpost.com/
politics/greene-rittenhouse-congressional-gold-medal/2021/11/24/c09980d2-4d49-11ec-a1b9-9f12bd39
487a_story.html [https://perma.cc/6XEN-XCX7]. Greene voted not to grant the same award to the police officers who defended the Capitol during the riots of January 6, 2021. Annie Grayer & Kristin Wilson, 21 Republicans Vote No on Bill to Award Congressional Gold Medal for January 6 Police Officers, CNN: Politics (June 16, 2021, 12:19 PM), https://www.cnn.com/2021/06/15/politics/congressional-gold-medal-house-vote/index.html [https://perma.cc/82HH-EDCN].
Several Republican politicians invited Rittenhouse to intern in their offices.10Jon Skolnik, Lauren Boebert Challenges Madison Cawthorn to “Sprint” for Rittenhouse Internship, Salon (Nov. 24, 2021, 5:25 PM), https://www.salon.com/2021/11/24/lauren-boebert-challenges-madison-cawthorn-is-in-a-wheelchair-to-sprint [https://perma.cc/H96Z-X8JF]. Just days after the verdict, he was welcomed at Trump’s Mar-a-Lago Club in Florida.11Jennifer Hassan, Donald Trump Meets with Kyle Rittenhouse After Verdict, Calls Him “A Nice Young Man,” Wash. Post (Nov. 24, 2021, 6:28 AM), https://www.washingtonpost.com/nation/
2021/11/24/trump-meets-kyle-rittenhouse [https://perma.cc/MU3U-99SP].

But this Article shows how the notion that people “should not fear exposure to criminal prosecution when they use firearms to defend themselves and their homes” is more than rhetoric.12Amicus Brief of Attorney General Eric Schmitt Supporting Dismissal of the Case, State v. McCloskey, No. 2022-CR01300, at *1 (Cir. Ct. Mo. July 20, 2020). Rather, it is the foundation for an effort to grant an exemption from prosecution to those who, like Rittenhouse, claim self-defense in defending against criminal charges. After Rittenhouse’s acquittal, one advocate penned “Kyle’s Law” to cement the exalted status of self-defense.13Kyle’s Law: Stopping Politically Motivated Prosecutions of Self-Defense, Law of Self Defense [hereinafter Kyle’s Law], https://losd.ubpages.com/kyleslaw/ [https://perma.cc/DV72-N9UN]. The proposed statute would alter the law in various ways, including effectively immunizing lawful defensive force from prosecution altogether.14See id. (“Let’s make ALL probable cause hearings in self-defense cases into something akin to self-defense immunity hearings—if the prosecution can’t disprove self-defense by a preponderance of the evidence at this pre-trial hearing, the matter is dismissed with prejudice . . . .”). The measure also proposes exposing prosecutors to personal liability in self-defense cases. Id. As it turns out, more than one-fourth of U.S. states have already done just that,15See Ala. Code § 13A-3-23(d) (2016); Colo. Rev. Stat. § 18-1-704.5(3) (1985); Fla. Stat. § 776.032 (2005); Ga. Code Ann. § 16-3-24.2 (2014); Kan. Stat. Ann. § 21-5231 (2011); Ky. Rev. Stat. Ann. § 503.085 (West 2006); Okla. Stat. tit. 21 § 1289.25(F) (2018); S.C. Code Ann. § 16-11-450 (2006); Mich. Comp. Laws § 780.961(1) (2006); Idaho Code § 19-202A(1) (2018); Utah Code Ann. § 76-2-309 (2021); S.D. Codified Laws § 22-18-4.8 (2021); Iowa Code § 704.13 (2017); N.C. Gen. Stat. § 14-51.3 (2011). and the trend is likely to continue.16See, e.g., S. 1120, Reg. Sess. 2023–2024 (N.Y. 2023); S. 666, 101st Gen. Assemb., 2d. Reg. Sess. (Mo. 2022); see also S. 215, 134th Gen. Assemb., Reg. Sess. (Ohio 2021); S. 71, 64th Leg., Budget Sess. (Wyo. 2018).

In the past decade, legal scholarship has explored “Stand Your Ground,” or the removal of the common law duty to retreat before using lethal defensive force in public.17See, e.g., Megan Miller & John Pepper, Assessing the Effect of Firearms Regulations Using Partial Identification Methods: A Case Study of the Impact of Stand Your Ground Laws on Violent Crime, 83 Law & Contemp. Probs. 213 (2020); Tamara Rice Lave, Shoot to Kill: A Critical Look at Stand Your Ground Laws, 67 U. Mia. L. Rev. 827 (2013); Jeannie Suk, The True Woman: Scenes from the Law of Self-Defense, 31 Harv. J.L. & Gender 237 (2008). Civic groups, including the American Bar Association, have also evaluated and critiqued Stand Your Ground. See, e.g., Am. Bar Ass’n, National Task Force on Stand Your Ground Laws: Final Report and Recommendations (Sept. 2015) [hereinafter ABA Task Force], https://www.americanbar.org/content/dam/aba/administrative/
diversity/SYG_Report_Book.pdf [https://perma.cc/SM5C-4BPU]; Giffords Law Ctr., “Stand Your Ground Kills”: How These NRA-Backed Laws Promote Racist Violence (May 2021), https://giffords.org/lawcenter/report/stand-your-ground-kills-how-these-nra-backed-laws-promote-racist-
violence [https://perma.cc/9YYG-RANF]; Rand Corp., The Effects of Stand Your Ground Laws (Apr. 2020), https://www.rand.org/research/gun-policy/analysis/stand-your-ground.html [https://perma.
cc/8JVJ-N384].
That literature shows how Stand Your Ground interacts with an expansion of gun rights in a way that can lead to more violence and exacerbate existing patterns of discrimination in the criminal justice system.18See infra notes 234–38 and accompanying text (discussing literature). Articles have likewise explored additional features of the intersection of criminal law, self-defense, and gun rights.19In earlier work, I considered how increased gun carry can dilute the ways self-defense law traditionally has operated to steer conflicts away from unnecessary lethal violence. Eric Ruben, An Unstable Core: Self-Defense and the Second Amendment, 108 Cal. L. Rev. 63, 100–01 (2020) (“If the Second Amendment protects a broad right to carry handguns virtually everywhere and at all times, and most Americans choose to exercise that right, conflicts would regularly present a threat of lethal violence, and lethal force would regularly be perceived as a reasonably proportional and necessary response. In such a world, necessity and proportionality mean less, no longer moderating between lethal and nonlethal defensive force.” (citations omitted)). Others have observed how the criminal law provides “thin and blurry” answers to the question of when brandishing a gun is lawful self-defense or a crime, Joseph Blocher, Samuel W. Buell, Jacob D. Charles & Darrell A.H. Miller, Pointing Guns, 99 Tex. L. Rev. 1173, 1190 (2021), and how citizen arrest provisions, when combined with gun rights, can lead to deadly outcomes, Kimberly Kessler Ferzan, Taking Aim at Pointing Guns? Start with Citizen’s Arrest, Not Stand Your Ground, 100 Tex. L. Rev. Online 1, 7–12 (2021). And legal scholars are starting to explore whether self-defense law might be bolstered in light of changed circumstances—especially the proliferation of gun carry—to limit the unnecessary loss of life.20Cynthia Lee recently has proposed that policymakers adjust the initial aggressor doctrine to place more of a burden on those who carry guns and then claim self-defense after using them in confrontations. Cynthia Lee, Firearms and Initial Aggressors, 101 N.C. L. Rev. 1 (2022). Rafi Reznik has argued that self-defense should be conceived as an excuse, not a justification, for otherwise unlawful violence. Rafi Reznik, Taking a Break from Self-Defense, 32 S. Cal. Interdisc. L.J. 19 (2022); see also infra notes 207–09 and accompanying text (discussing the justification/excuse distinction and Reznik’s argument). Meanwhile, Guha Krishnamurthi and Peter N. Salib explain how the confluence of expansive self-defense laws and firearm possession creates dangers of violence for even well-intentioned, rational actors. See Guha Krishnamurthi & Peter N. Salib, Small Arms Races, U. Chi. L. Rev. Online (June 3, 2022), https://lawreviewblog.uchicago.edu/2022/06/03/krishnamurthi-salib-small-arms-races [https://
perma.cc/6TGF-CQXY]. After the Supreme Court established a broad Second Amendment right to carry handguns in New York State Rifle & Pistol Association v. Bruen, 142 S. Ct. 2111 (2022), the focus on how self-defense law—as well as the criminal law more generally—might be adjusted to achieve optimal outcomes will only increase. See generally Eric Ruben, Public Carry and Criminal Law After Bruen, 135 Harv. L. Rev. F. 505 (2022) (highlighting intersections between criminal law and public carry beyond licensing that could attract policymaking attention after Bruen).

Yet the notion that self-defense is exceptional and “deserves” to be immunized, as one legislative witness put it,21Self-Defense Amendments: Hearing on H.B. 227 Before the H. Judiciary Comm., 64th Leg., 2021 Gen. Sess. (Utah 2021), https://le.utah.gov/av/committeeArchive.jsp?timelineID=180423 [https://perma.cc/C63Q-C36R] (statement of Mitch Vilos). has evaded close scrutiny. Articles about Stand Your Ground have acknowledged what Cynthia Ward termed the “curious beast” of self-defense immunity as well as the “confusion” it invites.22Cynthia V. Ward, Three Questions About “Stand Your Ground” Laws, 95 Notre Dame L. Rev. Reflection 119 (2021); see also Benjamin M. Boylston, Immune Disorder: Uncertainty Regarding the Application of “Stand Your Ground” Laws, 20 Barry L. Rev. 25 (2014) (discussing vagueness in how states are to implement self-defense immunity); Jennifer Randolph, Comment, How to Get Away with Murder: Criminal and Civil Immunity Provisions in “Stand Your Ground” Legislation, 44 Seton Hall L. Rev. 599, 618 (2014) (observing how self-defense immunity provisions are unclear, which could lead to inconsistent application). In an earlier article, Jonathan Markovitz critiqued how self-defense immunity can “increase opportunities for racial stereotypes to cloud the reasonableness component of the self-defense determination.” Jonathan Markovitz, “A Spectacle of Slavery Unwilling to Die”: Curbing Reliance on Racial Stereotyping in Self-Defense Cases, 5 U.C. Irvine L. Rev. 873, 877 (2015). Mary Anne Franks, in an article about the asymmetrical distribution of violence between genders, observed how “immunity, by decreasing the likelihood of arrest or prosecution of a person using deadly force, lowers the transaction costs of using such force, which arguably makes the use of violence more appealing.” Mary Anne Franks, Men, Women, and Optimal Violence, 2016 U. Ill. L. Rev. 929, 936 (2016). I build on this observation in Section III.A. However, self-defense immunity warrants a sustained analysis in terms of how it began as an adjunct to the gun rights movement and how it fits within the criminal justice system today. That, in turn, calls for an examination of a more general topic that similarly has received little attention: the procedural treatment of criminal law defenses and why prosecutorial immunities are so few in number. To exempt a category of defendants from the ordinary criminal process is profound, bestowing “a far greater right than any encompassed by an affirmative defense, which may be asserted during trial but cannot stop a trial altogether.”23Bunn v. State, 667 S.E.2d 605, 608 (Ga. 2008). Examining why the criminal law is generally opposed to granting an exemption from prosecution is an important, understudied part of the inquiry.24See infra notes 94–105 and accompanying text (discussing immunity in the context of criminal law’s distinctive function of expressing a community’s moral condemnation).

This Article proceeds in three parts. Part I shows how justifications for otherwise criminal conduct, like self-defense, have traditionally been adjudicated: as affirmative defenses to criminal charges. Some have argued that immunizing self-defense is simply a return to past protections that have been lost in recent times.25See infra notes 174–78 and accompanying text (discussing reliance on historical arguments in advocacy for self-defense immunity). But those engaging in private violence have always been exposed to criminal prosecution and trial. The argument that self-defense exceptionalism is rooted in tradition is unsupported.

Part I also shows how modern pretrial criminal procedure is consistent with the historical antecedents. The formal process is overwhelmingly structured to bring cases forward to trial, even if few cases get that far.26See Carissa Byrne Hessick, Punishment Without Trial: Why Plea Bargaining Is a Bad Deal 32–33 (2021) (noting that guilty plea rates have been above 90% since the 1990s). Pretrial screening is largely geared toward questioning the basis for the charged offense, not adjudicating potential defenses.27See infra Section I.B (discussing pretrial screening mechanisms). The criminal law makes exceptions for a narrow set of pretrial matters—narrower than in the civil context. The scant prosecutorial immunities and their narrow justifications can be linked to the criminal law’s aims and distinctive character, which are especially protective of public prosecutions. The exceptions that receive prosecutorial immunity tend to be fundamentally different than self-defense in both their scope and purpose. In particular, other criminal law immunities benefit narrow classes of defendants and must be addressed ahead of trial to protect distinctive public interests like maintaining foreign relations or preserving the balance of powers.28See infra Section I.C (discussing immunities and other pretrial matters). Self-defense, in contrast, can be invoked by any defendant and, like a multitude of other defenses,29“Current law recognizes a surprising variety of . . . possible bars to conviction, from amnesia to withdrawal.” Paul H. Robinson, Criminal Law Defenses: A Systemic Analysis, 82 Colum. L. Rev. 199, 203 (1982). Paul Robinson identifies fifty-four such bars to conviction. Id. at 203 n.7. can be adjudicated at trial without undermining its role as justifying otherwise unlawful conduct. Moreover, interests served by self-defense law—like maintaining the legitimacy of the legal order—are actually undermined by immunity.

Part II then turns to the next logical question: Why are states now diverging from American legal tradition and standard practices to treat self-defense as something exceptional? The Article traces self-defense immunity from a barely debated and misunderstood change to Colorado law in the 1980s to a primary ambition of gun rights advocates in the 2000s. The resulting legal changes are often characterized as “Stand Your Ground laws,” but that understates the transformation that is afoot. Stand Your Ground relates to just one of many ways that legislators are remaking the law governing defensive force. Indeed, one possible reason why self-defense immunity has escaped close scrutiny is that the typical focus is on the substantive elements establishing what lawful self-defense is, and especially the duty to retreat, while glossing over changes to how self-defense is adjudicated.30Cf. Ward, supra note 22, at 138 (“Clarifying the issues is a necessary step toward a rational conversation not only about Stand Your Ground, but also about other controversial elements of self-defense.”).

Yet while Stand Your Ground has garnered the most attention, advocates—and especially gun rights advocates—have pursued a deeper goal: insulating defensive gun use from legal oversight to the greatest extent possible. It is hard to overstate the degree to which the quick rise of self-defense immunity is due to lobbying by advocates for one deadly weapon (the gun) that is used in a minuscule percentage of self-defense confrontations.31See Eric Ruben, Law of the Gun: Unrepresentative Cases and Distorted Doctrine, 107 Iowa L. Rev. 173, 202 (2021) (“According to the [National Crime Victimization Survey], fewer than 1 percent of crime victims report using a gun in self-defense . . . .” (citing David Hemenway & Sara J. Solnick, The Epidemiology of Self-Defense Gun Use: Evidence from the National Crime Victimization Surveys 2007–2011, 79 Preventative Med. 22, 22 (2015))). The loudest voices advocating for immunizing self-defense tend not to be those seeking criminal justice reform generally but rather those seeking to expand gun rights. A National Rifle Association (“NRA”) lobbyist, for example, drafted and led the campaign to institute self-defense immunity in Florida, which then became a model for states across the nation.32See infra notes 162–64 and accompanying text (discussing the involvement of the National Rifle Association in the spread of self-defense immunity laws). The playbook for transforming self-defense into an immunity mirrors the one used to expand gun rights.33See infra notes 149–54 and accompanying text (describing similarities in arguments raised for gun rights and self-defense immunity). The overlap between gun rights and self-defense rights advocacy begs the question of whether any principle other than bestowing a benefit on gun users is guiding self-defense’s transformation from an affirmative defense into an immunity. Part II raises several possibilities, but it finds each too thin to justify such an immense procedural departure.

Part III then explores functional and institutional costs of immunizing private violence. Self-defense immunity sends a signal that people can judge for themselves when to deploy violence in the name of self-protection without exposure to prosecution, thereby encouraging unnecessary violence.34See infra Section III.A. Meanwhile, by preventing the community, through the jury, from evaluating the lawfulness of defensive force, immunity jettisons the institution best suited for adjudicating self-defense.35See infra Section III.B. In addition, immunizing self-defense creates an inefficient process by which courts consider the same witnesses and arguments that will be presented at trial during a separate pretrial hearing, setting up the sort of mini-trial that criminal procedure generally disfavors.36See infra Section III.C.

Trials like Rittenhouse’s spark intense disagreement and debate. But such trials are a feature—not a bug—of the American justice system. The Article concludes that policymakers should keep self-defense in its traditional place as an ordinary affirmative defense to criminal charges. Criminal justice reform is desperately needed, but treating private violence as privileged at the behest of gun rights advocates is a perilous path.

I.  SELF-DEFENSE AND PRETRIAL CRIMINAL PROCEDURE

       As Carl Sagan famously put it: “You have to know the past to understand the present.”37Carl Sagan, Cosmos 41 (1980). That maxim applies equally well for modern criminal law. This Part thus explores how self-defense was historically implemented in criminal procedure. It shows how the criminal justice system that the United States adopted from England was “trial-centered, in the sense that the legal system sought to resolve most criminal business at trial,”38John H. Langbein, The Origins of Adversary Criminal Trial 7 (2003). including claims of self-defense. This Part then shows how that treatment continued in modern times until the recent effort to grant pretrial prosecutorial immunity for self-defense. The effort to recharacterize self-defense as an immunity invites a question about how immunities fit within the criminal justice system. This Part closes by addressing that question, showing how and why prosecutorial immunities are few in number and narrowly construed, and how and why their typical rationale does not apply to self-defense.

A.  Historical Procedure

In 1841, in People v. McLeod, a New York court considered a habeas corpus petition for a defendant charged with murder.39People v. McLeod, 1 Hill 377 (N.Y. Sup. Ct. 1841). The defendant sought his “unqualified discharge” on the basis of pretrial evidence that, among other things, he acted in lawful self-defense.40Id. at 392–93. The court emphatically rejected the “extraordinary” request,41Id. at 406. noting the “absurdity of such a proposition in practice, and its consequent repudiation by the English criminal courts” whose law and procedure the United States inherited.42Id. at 404. Among other things, granting the defendant’s request “would be to trench on the office of the jury.”43Id. at 397. As the court explained, “[a]n innocent man may be, and sometimes unfortunately is[,] imprisoned. Yet his imprisonment is no less lawful than if he were guilty. He must await his trial before a jury.”44Id. at 404. That early American understanding of the appropriate time—and the appropriate entity—to adjudicate self-defense was firmly rooted in the English common law tradition.

During the seventeenth and eighteenth centuries in England, after a felony was charged, judges lacked authority to discharge defendants “without further trial.”45Michael Dalton, The Country Justice 407 (1618) (“[I]t is not fit that a [m]an once arrested and charged with Felony (or suspicion thereof) should be delivered upon any [m]an’s discretion, without [further] [t]rial.”). Justices of the peace played the central role in administering the criminal law. See generally Larry M. Boyer, The Justice of the Peace in England and America from 1506 to 1776: A Bibliographic History, 34 Q.J. Libr. Cong. 315 (1977) (discussing the power and reach of justices of the peace in criminal matters); see also Saul Cornell, The Right to Keep and Carry Arms in Anglo-American Law: Preserving Liberty and Keeping the Peace, 80 Law & Contemp. Probs. 11 (2017) (discussing justice of the peace manuals used by English and American officials between 1688 and 1835). This was true regardless of whether the defendant was believed to be justified in engaging in the alleged offense conduct.46See Richard Burn, The Justice of the Peace and Parish Officer 207 (1756) (“If a felony is committed, and one is brought before a justice upon suspicion thereof, and the justice finds upon examination that the prisoner is not guilty, yet the justice shall not discharge him, but he must either be bailed or committed; for it is not fit that a man once arrested and charged with felony, or suspicion thereof, should be delivered upon any man’s discretion, without further trial.”); see also Langbein, supra note 38, at 46–47 (“[T]he JPs had no power to dismiss felony charges for insufficiency of the evidence.”); id. at 47 (“What passed for truth in English criminal procedure would have to emerge at trial, from the altercation of citizen accusers and citizen accused.”). Some justices of the peace pressured prosecutors to discharge cases, while recognizing their own limited ability to discharge cases before trial. Id. at 47 n.184. In the 1700s, judges began conducting a “pretrial inquiry” that “increasingly took on the trappings of a public hearing, which would ultimately come to be known as the preliminary hearing.”47Langbein, supra note 38, at 274. At such hearings, however, the defense attorney was limited to challenging the prosecution’s case and was not entitled to present the defense’s case.48Id. at 274–75; see also id. (“As late as 1787 an experienced Old Bailey barrister serving as defense counsel remarked in response to a question from the bench that ‘[t]he Magistrates at Bow Street never receive evidence for prisoners, only for prosecutors.’ ” (citing Darcy Wentworth & Mary Wilkerson, Old Bailey Sessions Papers (“OBSP”) 15, 19 (Dec. 1787, #8) (quoting Newman Knowlys))).

Classic common law treatises demonstrate how self-defense was just like other defenses in that it was a trial issue, not a pretrial issue. For example, Michael Foster, a judge on the King’s Bench and the author of a widely read treatise published in 1762, observed that the defendant raising self-defense “standeth upon just the same foot that every other Defendant doth: the Matters tending to Justify, Excuse, or Alleviate, must appear in Evidence before He can avail himself of them.”49Michael Foster, A Report of Some Proceedings on the Commission of Oyer and Terminer and Goal Delivery for the Trial of the Rebels in the Year 1746 in the County of Surry, and of Other Crown Cases 255 (1762). And the opportunity to introduce that evidence was not until trial: “[W]hether the Facts alledged by way of Justification, Excuse, or Alleviation are True, is the proper and only Province of the Jury.”50Id.; see also id. (“In every Charge of Murder, the Fact of Killing being first proved, all the Circumstances of Accident, Necessity, or Infirmity are to be satisfactorily proved by the Prisoner.”).

Several years after Foster’s publication, William Blackstone completed “the preeminent authority on English law for the founding generation,”51Alden v. Maine, 527 U.S. 706, 715 (1999); see also District of Columbia v. Heller, 554 U.S. 570, 593–94 (2008). in which he explained that “it is incumbent upon the prisoner to make out, to the satisfaction of the criminal court and jury,” any “circumstances of justification, excuse, or alleviation.”52See 4 William Blackstone, Commentary on the Laws of England *201 (1769). The jury, Blackstone wrote, is “to decide whether the circumstances alleged [regarding self-defense or other affirmative defenses] be proved to have actually existed”; the judge then decides “how far [the proved circumstances] extend to take away or mitigate the guilt.”53Id.

Edward Hyde East, in his influential 1803 treatise, built on Blackstone’s and Foster’s accounts and elaborated on the lack of a pretrial process for asserting self-defense.541 Edward Hyde East, Treatise of the Pleas of the Crown 340 (1803). He wrote that “the jury alone [is] to decide” on “the truth” of the defendant’s allegations of “justification, excuse, or alleviation,” though the judge could consider such defenses when deciding on bail.55Id.; see also id. (“And where a party is committed upon such a charge [of homicide], he may be brought up by habeas corpus before the court of [the King’s Bench], and if a clear case be laid before the court, whereby the homicide appears to be either justifiable or excusable, they will upon view of the depositions and commitment admit the party accused to bail, as in Mrs. Barney’s case . . . where the charge clearly appeared to be groundless.”). The McLeod case demonstrates that this current continued in the United States into the nineteenth century.56See supra notes 39–44 and accompanying text. In his 1872 Commentaries on the Law of Criminal Procedure, Joel Prentiss Bishop described how a defendant entering a plea of not guilty at arraignment formally “puts himself upon the country,” or submits to a trial by jury.57Joel Prentiss Bishop, Commentaries on the Law of Criminal Procedure; or, Pleading, Evidence, and Practice in Criminal Cases 487 (2d ed. 1872); see also Going to the Country, Black’s Law Dictionary (11th ed. 2019) (“The act of requesting a jury trial. A defendant was said to be ‘going to the country’ by concluding a pleading with the phrase ‘and of this he puts himself upon the country.’ ”); see also Francis Wharton, A Treatise on the Criminal Law of the United States § 530 (1874) (“In all cases of felony the prisoner shall be arraigned, and where any person on being so arraigned shall plead not guilty, every such person shall be deemed and taken to put himself upon the inquest or country for trial . . . .” (quoting criminal procedure rules in Pennsylvania)). The jury therefore remained the primary entity to decide disputed fact issues in criminal cases, including regarding self-defense.58Joel Prentiss Bishop, Commentaries on the Criminal Law § 735 (1868) (discussing how “inquiries concerning facts . . . must be passed upon by the jury”); Wharton, supra note 57, § 488 (describing how in a self-defense case, “[t]he jury must judge whether the danger was apparent”).

Pretrial processes, like the preliminary hearing and the grand jury, generally did not provide a defendant an opportunity to introduce evidence of any particular defense.59See James Manford Kerr & Francis Wharton, A Treatise on Criminal Procedure § 112 (10th ed. 1918) (“[N]or has the practice of taking the prisoner’s examination [at the preliminary magistrate’s review] been generally adopted.”); id. § 1288 (“The question before the grand jury being whether a bill is to be found, the general rule is that they should hear no other evidence but that adduced by the prosecution.”). Kerr and Wharton recognize limited exceptions “to avoid circuity and oppression,” such as if “the defendant, in a liquor prosecution, tenders a license.” Id. § 113. As the 1918 edition of Francis Wharton’s treatise on criminal procedure observed, “the better opinion is that on a preliminary hearing the magistrate is to hold the defendant for trial” when “there is made out a probable case of guilt.”60Id. § 114. Similarly, in a proceeding before the grand jury, “it is not the usage to introduce, in matters of confession and avoidance, witnesses for the defense, unless their testimony becomes incidentally necessary to the prosecution.”61Id. § 1288; see also id. § 1290 (“[A] grand jury has no authority by law to ignore a bill for murder on the ground of insanity, though it appear plainly from the testimony of witnesses, as examined by them on the part of the prosecution, that the accused was in fact insane . . . .”); see also Confession and Avoidance, Black’s Law Dictionary, supra note 57 (defining “confession and avoidance” to be “[a] plea in which a defendant admits allegations but pleads additional facts that deprive the admitted facts of an adverse legal effect”); Brooks v. Haslam, 4 P. 399, 399 (1884) (noting that self-defense “amounts simply to a plea in confession and avoidance”); Jordan v. State, 593 S.W.3d 340, 343 (Tex. Crim. App. 2020) (“Self-defense is a confession-and-avoidance defense requiring the defendant to admit to his otherwise illegal conduct.”).

The notion that self-defense could be adjudicated by a judge before trial thus has no basis in the common law tradition imported from England and implemented in America. The next Section shows how that basic understanding carried forward to modern times.

B.  Modern Procedure

In 1971, Indiana passed a statute providing that “[n]o person . . . shall be placed in legal jeopardy of any kind whatsoever” after exercising lawful self-defense.62Loza v. State, 325 N.E.2d 173, 176 (Ind. 1975) (quoting and discussing Ind. Code § 35-13-10-1 (repealed 1976)). Armed with that broad statutory language, one defendant sought a pretrial determination of the lawfulness of his claimed self-defense.63Id. In Loza v. State, Indiana’s highest court recognized the novelty of the proposition before reacting much like the New York court did more than a century earlier in McLeod.64See id. (“This statute has not been previously interpreted by our courts, and our research discloses no interpretation of any similar statute by any sister state.”); supra notes 39–44 and accompanying text (discussing People v. McLeod, 1 Hill 377 (N.Y. Sup. Ct. 1841)). In particular, in order “to prevent absurdity,” the court held that the new law “neither creates a new remedy nor does it alter our procedure in any respect.”65Loza, 325 N.E.2d at 176; see also Myers v. State, 137 N.E. 547, 548 (Ind. 1922) (noting that alleged facts surrounding claims of self-defense are “proper matters for the jury alone to consider and weigh”); Landreth v. State, 171 N.E. 192, 194 (Ind. 1930), overruled in part on other grounds by Burris v. State, 34 N.E.2d 928 (Ind. 1941) (“[T]he defense of self-defense is an ultimate fact solely for the determination of the jury from the evidence.”). In other words, self-defense remained a trial issue. The Loza court’s understanding was consistent with modern pretrial procedure.

Modern criminal procedure is heavily constitutional,66See William J. Stuntz, Substance, Process, and the Civil-Criminal Line, 7 J. Contemp. Legal Issues 1, 7 (1996) (“Only in criminal procedure does constitutional law dominate the field.”). and an overview of the minimalist pretrial constitutional requirements for defenses (like self-defense) is therefore instructive. Under the Fourth Amendment, police officers must have probable cause before making an arrest,67See generally Terry v. Ohio, 392 U.S. 1 (1968) (discussing when the probable cause requirement applies in police-citizen interactions). The probable cause standard is expressly referenced in the Fourth Amendment. U.S. Const. amend. IV (“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” (emphasis added)). and an impartial magistrate must review whether probable cause exists if the arrestee is to remain in custody.68See Gerstein v. Pugh, 420 U.S. 103, 114 (1975) (“[W]e hold that the Fourth Amendment requires a judicial determination of probable cause as a prerequisite to extended restraint of liberty following arrest.”). The Supreme Court has described probable cause as “a fluid concept” that “requires only a probability or substantial chance of criminal activity, not an actual showing of such activity.”69Illinois v. Gates, 462 U.S. 213, 232, 243–44 n.13 (1983). Admittedly, probable cause is “not a high bar.”70Kaley v. United States, 571 U.S. 320, 338 (2014).

Importantly, moreover, probable cause does not require robust consideration of self-defense, if it requires any at all. The Third Circuit has held that “affirmative legal defenses”—like self-defense—“are not a relevant consideration in [a police] officer’s determination of probable cause.”71Holman v. City of York, 564 F.3d 225, 229 (3d Cir. 2009). In contrast, the Second Circuit has held that “a police officer’s awareness of the facts supporting a defense can eliminate probable cause.”72Jocks v. Tavernier, 316 F.3d 128, 135 (2d Cir. 2003). That said, such evidence must be “conclusive” or first-hand,73See Ryan P. Sullivan, Revitalizing Fourth Amendment Protections: A True Totality of the Circumstances Test in § 1983 Probable Cause Determinations, 105 Iowa L. Rev. 687, 708–09 (2020) (discussing Jocks, 316 F.3d 128, and other relevant case law). and once an officer has probable cause to make an arrest, the officer does not constitutionally have “to investigate exculpatory defenses offered by the person being arrested or to assess the credibility of unverified claims of justification.”74Jocks, 316 F.3d at 135–36; see also Baker v. McCollan, 443 U.S. 137, 145–46 (1979) (observing that police officers do not have “to investigate independently every claim of innocence”); District of Columbia v. Wesby, 138 S. Ct. 577, 588 (2018) (“[P]robable cause does not require officers to rule out a suspect’s innocent explanation for suspicious facts.”). Self-defense is not singled out for special treatment, but rather is treated like any other defense.75Jocks, 316 F.3d at 135.

Subsequently, once a prosecutor makes a charging decision, there is “no federal constitutional right to any review” of that decision before trial “apart from the grand jury clause of the Fifth Amendment.”76Ronald Jay Allen, Joseph L. Hoffmann, Andrew D. Leipold, Debra Livingston & William J. Stuntz, Criminal Procedure: Adjudication and Right to Counsel 1037 (2011) (citing Gerstein v. Pugh, 420 U.S. 103, 119 (1975)). The grand jury, meanwhile, is also guided by the standard of whether there is “probable cause necessary to initiate a prosecution for a serious crime.”77Kaley v. United States, 571 U.S. 320, 328 (2014). In United States v. Williams,78United States v. Williams, 504 U.S. 36, 51 (1992). the Supreme Court held that, notwithstanding the constitutional obligation to disclose material exculpatory evidence to a defendant before trial,79Brady v. Maryland, 373 U.S. 83, 87 (1963) (“[T]he suppression by the prosecution of evidence favorable to an accused upon request violates due process where the evidence is material either to guilt or to punishment.”). the Constitution does not require prosecutors to disclose substantial exculpatory evidence to the grand jury, including regarding a potential claim of self-defense.80Williams, 504 U.S. at 51. Looking back to the common law history, the Court explained that the grand jury is “an accusatory [body],” not “an adjudicatory body,” and its task is “to assess whether there is adequate basis for bringing a criminal charge.”81Id. Historically, “it has always been thought sufficient for the grand jury to hear only the prosecutor’s side.”82Id. at 37.

In some jurisdictions, by either law or internal policy, prosecutors are held to a higher standard than the federal constitutional baseline with respect to grand juries.83Sara Sun Beale, William C. Bryson, James E. Felman & Katherine Earle Yanes, Prosecutor’s Duty to Present Exculpatory Evidence, in Grand Jury Law and Practice § 4:17 (2d ed. 2021) (“In approximately a quarter of the states, there are statutes or judicial decisions that require prosecutors to inform the grand jury of exculpatory evidence in some circumstances.”). However, most such departures only require presenting “evidence that is clearly exculpatory” or “that would exonerate the accused or lead the grand jury to refuse to indict.”84Id. The United States Justice Manual, for example, provides that “when a prosecutor conducting a grand jury inquiry is personally aware of substantial evidence that directly negates the guilt of a subject of the investigation, the prosecutor must present or otherwise disclose such evidence to the grand jury before seeking an indictment against such a person.” U.S. Dep’t of Just., Presentation of Exculpatory Evidence, in Department of Justice Manual § 9-11.233 (2021). That is a hard standard for a defendant to satisfy. Beale et al., supra note 83, § 4:17 (characterizing this “test” as “very difficult . . . to satisfy”). The Manual provides that “failure to follow the Department’s policy should not result in dismissal of an indictment,” but that “appellate courts may refer violations of the policy to the Office of Professional Responsibility for review.” U.S. Dep’t of Just., supra. Given the low bar for indictment—again, probable cause85Kaley v. United States, 571 U.S. 320, 328 (2014).—even these jurisdictions stop far short of adjudicating self-defense before trial.

The Federal Rules of Criminal Procedure, which “almost always reflect the basic position adopted in a substantial number of states,”86Wayne R. LaFave, Jerold H. Israel & Nancy J. King, Principles of Criminal Procedure: Post-Investigation 4 (2004). provide other pretrial procedural steps apart from the grand jury, most notably a preliminary hearing.87Fed. R. Crim. P. 5.1(e). Yet the preliminary hearing—consistent with historical practices88See supra notes 47, 58–60 and accompanying text (discussing the historical focus on prosecution evidence at preliminary hearings).—focuses on the prosecution’s evidence for the charged offense, and not evidence of self-defense or any other affirmative defense. Again, the standard is probable cause: the prosecutor need only show “probable cause to believe an offense has been committed and the defendant committed it.”89Fed. R. Crim. P. 5.1(e). Moreover, the prosecutor gets to decide whether to have a preliminary hearing at all: if the prosecutor secures an indictment before a grand jury, then the defendant has no right to demand a pretrial hearing.90The same is true in “most states and for most charges.” Marc L. Miller, Ronald F. Wright, Jenia I. Turner & Kay L. Levine, Criminal Procedures: Prosecution and Adjudication 188 (6th ed. 2019) (discussing preliminary hearings).

It thus has remained true under conventional criminal procedure that “[i]f a defendant claims innocence or has a defense,” including self-defense, “the proper body to decide the issue is the petit jury.”91Beale et al., supra note 83. Recent reform efforts, however, characterize self-defense not as a “defense” but as an “immunity,” calling to mind exceptions to the general rule—a category of traditional immunities and other matters that are adjudicated pretrial. The next Section addresses such pretrial issues in relation to self-defense.

C.  Immunities from Prosecution

Recent legislation declaring that self-defense is an immunity from prosecution has led judges and commentators to treat self-defense as a “true immunity” comparable to others.92Rogers v. Commonwealth, 285 S.W.3d 740, 753 (Ky. 2009) (“[T]he General Assembly has made unmistakably clear its intent to create a true immunity, not simply a defense to criminal charges.”). This classification invites questions about how other prosecutorial immunities operate, why they exist, and whether they share anything in common with self-defense.93In considering these questions, I build on Cynthia Ward’s observation that self-defense immunity “seems quite different” from traditional immunities. See Ward, supra note 22, at 134–35 (“Traditionally, immunity from prosecution is offered to certain government officials, or to citizens performing important roles in the legal process (such as witness in a criminal case), where it might reasonably be argued that society’s interests in protecting such roles and functions outweighs its interest in prosecuting the individual. That seems quite different from the immunity procedure outlined in Florida’s self-defense law.” (citation omitted)).

Common immunities from prosecution include diplomatic immunity, judicial immunity, legislative immunity, executive immunity, immunity after compelled testimony, and immunity bestowed on the basis of a plea agreement.94Since my focus is on immunities from criminal prosecution, I do not address the operation of immunities geared toward civil suits and liability such as sovereign and qualified immunity. See, e.g., State v. Velky, 821 A.2d 752, 759 (Conn. 2003) (“Sovereign immunity is not applicable in criminal cases, because, at least ordinarily, the charges are not brought ‘in effect’ against the government.”); Kipps v. Caillier, 197 F.3d 765, 768 (5th Cir. 1999) (“Public officials acting within the scope of their official duties are shielded from civil liability by the qualified immunity doctrine.” (emphasis added)); Temich v. Cossette, No. 11CV958, 2015 U.S. Dist. LEXIS 76064, at *6 (D. Conn. June 12, 2015) (“The defense of qualified immunity is not germane to a criminal proceeding.”). These are “defenses” in the sense that they are asserted by a defendant as a way to avoid a conviction. But their essence goes beyond ordinary defenses because immunities operate to exempt a person from the mandate of the criminal law, not to justify otherwise criminal conduct because of the circumstances surrounding that conduct.95Immunity, Black’s Law Dictionary supra note 57 (“Any exemption from a duty, liability, or service of process; esp., such an exemption granted to a public official or governmental unit. Cf. IMPUNITY.”). Black’s Law Dictionary cross-references “impunity” in its definition of “immunity,” which similarly denotes an “[e]xemption from punishment.”96Impunity, Black’s Law Dictionary, supra note 57. The example that Black’s uses to describe impunity relates to diplomatic immunity: “because she was a foreign diplomat, she was able to park illegally with impunity.”97Id. Immunity gets asserted early in the criminal process to head off the prosecution of someone possessing such an exemption.

As such, prosecutorial immunities are a remarkable departure from the ordinary criminal process described above; moreover, they are in tension with a basic, distinctive function of criminal law. Criminal law is traditionally viewed as a means to declare “a formal and solemn pronouncement of the moral condemnation of the community.”98Henry M. Hart, Jr., The Aims of the Criminal Law, 23 Law & Contemp. Probs. 401, 405 (1958) (describing distinctions between criminal and civil wrongs); see also Paul Robinson, Criminal Law 21 (1997) (discussing the criminal law’s role in “creating and maintaining the social consensus on morality necessary to sustain norms”). The community’s role in implementing the criminal law—through a public prosecution and jury trial—is intertwined with that function. It is no coincidence that the prosecutor in a criminal case is called “The People” in many jurisdictions.99See, e.g., Law Reporting Bureau of the State of N.Y., New York Law Reports Style Manual § 8.1(a) (2012), http://www.courts.state.ny.us/reporter/new_styman.htm [perma.cc/62GF-KVATJ] (“In criminal actions, the prosecuting authority is usually described as ‘The People of the State of New York.’ ”).

Prosecutorial immunity dilutes the formal power of the public in assessing an alleged crime, and it thus raises special concerns in criminal law that might exist only to a lesser extent in the civil context, where immunity is sometimes granted, for example, primarily to avoid costs.100See generally Alexandra B. Klass, Tort Experiments in the Laboratories of Democracy, 50 Wm. & Mary L. Rev. 1501 (2009) (describing a growing conferral of tort immunity without accompanying compensatory schemes); John C.P. Goldberg, The Constitutional Status of Tort Law: Due Process and the Right to a Law for the Redress of Wrongs, 115 Yale L.J. 524 (2005) (describing and critiquing widespread tort reform); see also Protection of Lawful Commerce in Arms Act, Pub. L. No. 109-92, 119 Stat. 2095 (codified at 15 U.S.C. § 7901 et seq. (2005)) (shielding federally licensed firearm manufacturers, dealers, and sellers from civil, but not criminal, actions “resulting from the criminal or unlawful misuse” of firearms). In the criminal context, immunities tend to be justified by a narrower, more compelling rationale. As a general matter, only when avoiding the criminal justice process is a defense’s entire raison d’être is it exempted from prosecution as an “immunity.” Put differently, the public policies underlying the above-mentioned criminal law immunities necessarily require the avoidance of prosecution and trial.

Consider diplomatic immunity. A key reason why we immunize conduct by foreign diplomats in the United States is to protect American diplomats outside the United States from exposure to foreign court systems.101See U.S. Dep’t of State Off. of Foreign Missions, Diplomatic and Consular Immunity: Guidance for Law Enforcement and Judicial Authorities 5 (2018) [hereinafter Diplomatic and Consular Immunity] (“On a practical level, a failure of the authorities of the United States to fully respect the immunities of foreign diplomatic and consular personnel may complicate diplomatic relations between the United States and the other country concerned. It may also lead to harsher treatment of U.S. personnel abroad, since the principle of reciprocity has, from the most ancient times, been integral to diplomatic and consular relations.”); William F. Marmon, Jr., Note, The Diplomatic Relations Act of 1978 and Its Consequences, 19 Va. J. Int’l L. 131, 134, 142 n.64 (1978) (“[I]t is to our advantage not to expose our personnel to [foreign] court systems.” (quoting the testimony of Hampton Davis during a Senate Foreign Relations Hearing)). There is no way to satisfy that goal through an affirmative defense at trial. Consistent with the purpose of diplomatic immunity, it also does not protect diplomats from sanction upon return to their home countries.102See Vienna Convention on Diplomatic Relations, Apr. 18, 1961, 23 U.S.T. 3227, 500 U.N.T.S. 95, at art. 31(4) (“The immunity of a diplomatic agent from the jurisdiction of the receiving State does not exempt him from the jurisdiction of the sending State.”). Judicial, legislative, and executive immunities are similarly geared to specific policy rationales necessitating avoidance of a trial. Each protects “governmental officials from personal liability arising from their official duties” because of the strong interest in facilitating their ability to serve the public.103Robinson, supra note 29, at 231. The Supreme Court has explained how legislative immunity enables “representatives to execute the functions of their office without fear of prosecutions.”104Tenney v. Brandhove, 341 U.S. 367, 374 (1951). An added component of legislative and judicial immunity is to preserve the balance of power between the three branches of government by insulating legislative and judicial officers from prosecutions by the executive branch.105James Walton McPhillips, Note, “Saturday Night’s Alright for Fighting”: Congressman William Jefferson, the Saturday Night Raid, and the Speech or Debate Clause, 42 Ga. L. Rev. 1085, 1093 (2008) (observing how legislative immunity insulates legislators from an “unfriendly executive”). Again, interests that these governmental immunities serve cannot be furthered—and indeed would be undermined—if they were treated as defenses to be proved at trial. The remarkable benefit of immunity is thus granted because of strong public policy arguments that inherently entail a bar to prosecution.

How does self-defense relate to immunities? Self-defense is not about trial avoidance but exculpation.106Robinson, supra note 29, at 220 (observing that justification defenses exculpate because “by the infliction of the intermediate harm or evil, a greater societal harm is avoided or benefit gained”). Like other justification defenses and unlike immunities, it can be adjudicated in the traditional way—through trial—without undermining its rationale.107Id. at 220. “The societal benefit underlying [immunities] arises not from [the defendant’s] conduct, but from foregoing his conviction.” Id. at 232. Moreover, unlike typical immunities, self-defense furthers interests that are in fact undermined by short-circuiting a prosecution and trial.

T. Markus Funk has identified seven values served by self-defense law: protecting the state’s monopoly on force, protecting the individual attacker’s right to life, maintaining the equal standing between people, protecting the defender’s autonomy, ensuring the primacy of the legal process, maintaining the legitimacy of the legal order, and deterring attackers.108T. Markus Funk, Rethinking Self-Defence: The ‘Ancient Right’s’ Rationale Disentangled 18 (2021). Immunity arguably advances the interests in protecting a defender’s autonomy or deterring attackers. But it runs roughshod over other values, especially self-defense law’s dual roles of ensuring the primacy of the legal process and maintaining the legitimacy of the legal order. Both roles underlie the idea that “the authority to punish and condemn” remain with “the liberal state,” not with individual citizens.109Id. at 44. In his discussion of ensuring the primacy of the legal process, Funk notes that “[t]o the extent possible, . . . the justice system must promote the resolution of disputes in the courts.”110Id. at 43. Immunity, however, dilutes the state’s oversight of defensive violence and, perhaps worse still, undermines the community’s role through the jury to assess the lawfulness of violence—a point addressed in greater depth in Part III. In other words, in contrast to typical immunities, whose purposes areoverall advanced by providing an exemption from prosecution, key values underlying self-defense law are undercut by providing such an exemption.

Immunities, of course, are not the only matters that receive pretrial resolution. Some defenses—like those based on statutes of limitations, double jeopardy, and speedy trial requirements—are also adjudicated in advance of trial. Other issues, like competency to stand trial, also receive pretrial determination. In the effort to implement self-defense immunity, some have analogized self-defense to those other pretrial issues even though they are not technically “immunities.”111See, e.g., People v. Guenther, 740 P.2d 971, 977 (Colo. 1987) (en banc) (analogizing self-defense immunity to prosecutorial bars based on the statute of limitations, double jeopardy, and speedy trial requirements); Rogers v. Commonwealth, 285 S.W.3d 740, 755 (Ky. 2009) (comparing self-defense immunity hearings to competency hearings). Yet these issues, like traditional immunities, protect interests that necessarily call for avoiding trial and thus are dissimilar to self-defense. Statutes of limitations affirm the belief that “[a]fter a period of time, a person ought to be allowed to live without fear of prosecution.”112Model Penal Code § 1.07, cmt. at 16–17 (Tentative Draft No. 5, 1956); see also Toussie v. United States, 397 U.S. 112, 114–15 (1970) (observing that a limitations period “is designed to protect individuals from having to defend themselves against charges when the basic facts may have become obscured by the passage of time and to minimize the danger of official punishment because of acts in the far-distant past”). Double jeopardy protections are “designed to protect an individual from being subjected to the hazards of trial and possible conviction more than once for an alleged offense.”113Green v. United States, 355 U.S. 184, 187 (1957). Speedy trial guarantees mandate “the Government [to] move with the dispatch that is appropriate to assure [the defendant] an early and proper disposition of the charges against him.”114United States v. Marion, 404 U.S. 307, 313 (1971). And resolving competency questions must also happen before a trial since the entire point is to determine the defendant’s “ability to participate meaningfully in the trial.”115Rogers, 285 S.W.3d at 755.

In connection with competency hearings, one exception to the general rule of limiting pretrial criminal matters to those that inherently require pretrial determination involves the insanity defense. Courts tend to draw a clear line between the question of competency to stand trial, which is adjudicated in advance of trial, and insanity at the time of the offense, which is a trial issue.116See, e.g., Bishop v. Superior Court ex rel. County of Pima, 724 P.2d 23, 25–26 (Ariz. 1986) (en banc) (stating that competency and the insanity defense “are distinctly different inquiries, one leading to a determination of whether the trial can proceed at all, and the other to the trial defense of insanity”); Ricks v. State, 242 S.E.2d 604, 606 (Ga. 1978) (“The issue of the accused’s insanity at the time of the alleged crime is a question for the trial jury. The issue of the accused’s competency to stand trial is a question for a special jury upon a special plea of insanity.”). As a general matter, therefore, an insanity defense is submitted to the fact finder at trial and is not decided at a pretrial hearing.117See, e.g., Tenn. Code. Ann. § 39-11-501 (2014) (providing the defense of insanity is “a matter for the trier of fact alone”); Wis. Stat. § 971.165 (2008) (requiring a continuous, bifurcated trial for the insanity defense); State v. Fichera, 903 A.2d 1030, 1035 (N.H. 2006) (“[S]anity is a question of fact to be determined by the jury . . . .” (quoting State v. Hall, 808 A.2d 55 (N.H. 2002))); State ex rel. Smith v. Scott, 280 S.E.2d 811, 814 (W. Va. 1981) (“Consequently, we hold that a trial court judge is not under any duty to hold a hearing on the issue of criminal responsibility in advance of trial regardless of how compelling the pretrial reports may be. Criminal responsibility is a jury question . . . unless both prosecutor and judge concur that the outcome of the proceedings would be a foregone conclusion.”); Bonner v. State, 520 S.W.2d 901, 906 n.2 (Tex. Crim. App. 1975) (“The issue of insanity at the time of the commission of an offense is a defensive one, and therefore is properly raised during the course of the trial on the merits.”); People v. Ford, 235 N.E.2d 576, 578 (Ill. 1968) (“The defense of insanity at the time of the crime, like any other defense, must be raised at the time of trial and submitted to the jury who are hearing the case, and no special jury is called or pretrial hearing conducted to determine this question.”). However, such bifurcation is not universally followed. Pennsylvania law, for example, grants a judge the discretion to “hear evidence on whether the person was criminally responsible for the commission of the crime charged” so long as the judge is already conducting a competency hearing.11850 Pa. Cons. Stat. § 7404(a) (2014); see also Commonwealth v. Scott, 578 A.2d 933, 936–37 (Pa. Super. Ct. 1990) (describing procedure).

In that context, judicial economy might weigh in favor of considering evidence of both competency and insanity at a pretrial hearing. At least one other state—North Carolina—gives courts discretion to hold a pretrial insanity hearing so long as the state consents.119N.C. Gen. Stat. § 15A-959 (1973) (“Upon motion of the defendant and with the consent of the State the court may conduct a hearing prior to the trial with regard to the defense of insanity at the time of the offense.”). That exception is highly limited in that courts and prosecutors can override a defendant’s request for a hearing, making it quite different from self-defense immunity.120See infra Part II. And in Washington, a defendant may request a pretrial insanity determination, but the statute notes that any acquittal under the statute cannot be used to contest mental health detention—a possibility that distinguishes insanity and self-defense.121Wash. Rev. Code § 10.77.080 (1998) (“The defendant may move the court for a judgment of acquittal on the grounds of insanity: PROVIDED, That a defendant so acquitted may not later contest the validity of his or her detention on the grounds that he or she did not commit the acts charged.”); see also Christopher Slobogin, The Guilty but Mentally Ill Verdict: An Idea Whose Time Should Not Have Come, 53 Geo. Wash. L. Rev. 494 (1985) (discussing “not guilty but mentally ill” verdicts, by which a defendant is still incarcerated for treatment despite being found not guilty by reason of insanity).

This Section has set out the limited nature of criminal law immunities and other pretrial matters and offered a normative explanation, rooted in the criminal law’s distinctive role, for that narrow scope. Below, the Article considers additional arguments for and against expanding immunities to include self-defense.122See infra Section II.C, Part III. First, however, the Article turns to the story of how self-defense immunity arose in the first place.

II.  THE PUSH TO MAKE SELF-DEFENSE EXCEPTIONAL

In light of the American criminal law tradition of adjudicating self-defense at trial, how did self-defense immunity arise? This Part shows how self-defense immunity emerged out of Colorado in 1986, laid dormant for almost two decades, and then became a central component of gun rights advocacy in the 2000s. The Part then analyzes the thin rationales put forward for treating self-defense as deserving of exceptional treatment through prosecutorial immunity.

A.  Inauspicious Beginning in Colorado

Accounts of recent self-defense reforms tend to begin with Florida’s 2005 Stand Your Ground legislation.123See, e.g., Elizabeth Chuck, Florida Had First Stand Your Ground Law, Other States Followed in “Rapid Succession,” NBC News (July 18, 2013, 7:03 AM), https://www.nbcnews.com/news/us-news/forida-had-first-stand-your-ground-law-other-states-followed-flna6c10672364 [perma.cc/QX22-DB36]. Indeed, Florida’s law served as a model that influenced legal changes across the country.124See infra notes 162–69 and accompanying text (describing the influence of Florida’s self-defense reform). But the first example of a self-defense immunity statute was not Florida’s but rather a last-minute compromise bill from Colorado twenty years earlier.125See Colo. Rev. Stat. § 18-1-704.5 (1986); Dirk Johnson, “Make My Day”: More Than a Threat, N.Y. Times (June 1, 1990) (noting that “[n]o other state [was] believed to have such a law” providing immunity from criminal prosecution for lawful self-defense).

The Colorado law did not, at first, provide for prosecutorial immunity. Rather, the bill initially added a legal presumption to self-defense law to enhance the scope of lawful self-defense against home intruders.126William Wilbanks, The Make My Day Law: Colorado’s Experiment in Home Protection 31 (1990). To be sure, homeowners already had an expanded right to self-defense through the “Castle Doctrine,” which generally removed a person’s duty to retreat before using lethal defensive force in the home.127See Blackstone, supra note 52, at *223 (“[T]he law of England has so particular and tender a regard to the immunity of a man’s house, that it stiles it his castle, and will never suffer it to be violated with impunity.”); 1 Matthew Hale, The History of the Pleas of the Crown 486 (1680) (writing that when a man is assailed in his own house he “need not fl[y] as far as he can, as in other cases of se defendendo, for he hath the protection of his house to excuse him from flying, for that would be to give up the protection of his house to his adversary by flight”). All American jurisdictions accept some version of the Castle Doctrine. Sanford H. Kadish, Stephen J. Schulhofer & Rachel E. Barkow, Criminal Law and Its Processes: Cases and Materials 924 (2017); see also People v. Tomlins, 107 N.E 496 (N.Y. 1914) (“It is not now and never has been the law that a man assailed in his own dwelling is bound to retreat. If assailed there, he may stand his ground and resist the attack.”). However, Colorado policymakers wanted to do more, so they borrowed from a California statute that a person confronting a home intruder is legally “presumed” to fear for their life.128See Cal. Penal Code § 198.5 (1984) (“Any person using force intended or likely to cause death or great bodily injury within his or her residence shall be presumed to have held a reasonable fear of imminent peril of death or great bodily injury to self, family, or a member of the household when that force is used against another person, not a member of the family or household, who unlawfully and forcibly enters or has unlawfully and forcibly entered the residence and the person using the force knew or had reason to believe that an unlawful and forcible entry occurred.”). That presumption would satisfy one requirement of lethal defensive force—that the defender reasonably perceives a threat of death or serious bodily injury129See Colo. Rev. Stat. § 18-1-704(2)(a) (“Deadly physical force may be used only if a person reasonably believes a lesser degree of force is inadequate and . . . [t]he actor has reasonable ground to believe, and does believe, that he or another person is in imminent danger of being killed or of receiving great bodily injury.”).—thereby relieving the defendant of the need to produce evidence of such heightened fear.

Prosecutors objected because they “believed that it would be very difficult, if not impossible, to rebut the presumption in favor of the homeowner.”130Wilbanks, supra note 126, at 42. The presumption would result in a helpful jury instruction for the defendant and could help a defendant avoid taking the stand to demonstrate a fear of death or great bodily injury. The presumption would not shift the burden of proof, however, since the prosecution already had to disprove self-defense beyond a reasonable doubt. See Martin v. Ohio, 480 U.S. 228, 236 (1987) (“[A]ll but two of the States, Ohio and South Carolina, have abandoned the common-law rule and require the prosecution to prove the absence of self-defense when it is properly raised by the defendant.”). There was little public debate regarding the subsequent compromise that became the nation’s first law providing immunity from prosecution for self-defense.131Wilbanks, supra note 126, at 38 (noting the compromise negotiations were “held behind closed doors” and “were unannounced . . . and lacked formality”). Yet the law appears to have imported a civil immunity provision enacted in Colorado in 1982 into the criminal law.132See infra notes 133–35 and accompanying text (describing Colorado’s civil immunity law).

By way of background, in 1981, a Colorado jury awarded a plaintiff more than $300,000 in damages from a defendant for gunshot injuries incurred while the plaintiff was burglarizing the defendant’s shop.133Wilbanks, supra note 126, at 21–23. The public outcry was swift and the shop owner’s lawyer helped to draft a bill immunizing people like his client from civil damages.134Id. at 23. The resulting law barred payouts for personal injuries “sustained during the commission of or during immediate flight from” a felony if the person inflicting the injury reasonably believed that physical force was “reasonable and appropriate” to prevent both injury and the commission of the felony.135Id. at 24. The wisdom of such civil immunity is beyond the scope of this Article; more important for present purposes is that it did not address immunity from criminal liability. As discussed above, criminal liability is geared toward vindicating public harms in a way that civil liability is not.136See supra notes 92–98 and accompanying text. The Colorado shop owner case demonstrates another distinction between civil and criminal cases in that the prosecutor declined to prosecute. Wilbanks, supra note 126, at 22. In criminal cases, a prosecutor with legal experience weighs the viability of a case before pressing charges and then must prove the case beyond a reasonable doubt. In re Winship, 397 U.S. 358, 364 (1970) (“[T]he Due Process Clause protects the accused against conviction except upon proof beyond a reasonable doubt of every fact necessary to constitute the crime with which he is charged.”). In contrast, civil plaintiffs are frequently not lawyers (even if they have representation by one) and face a lesser burden of proof: they have to prove their case by a preponderance of the evidence, not beyond a reasonable doubt. See Addington v. Texas, 441 U.S. 418, 423–24 (1979) (observing that in “the typical civil case involving a monetary dispute between private parties[, s]ince society has a minimal concern with the outcome of such private suits, plaintiff’s burden of proof is a mere preponderance of the evidence,” whereas “[i]n a criminal case, on the other hand, the interests of the defendant are of such magnitude that . . . the state [must] prove the guilt of an accused beyond a reasonable doubt”). This presents a risk of over-litigation in the civil context that is generally absent from the criminal context. Nonetheless, the criminal immunity bill that later passed in Colorado in 1986 mirrored the earlier civil immunity law. The law provided that a person “shall be immune from criminal prosecution” if the person used defensive force and four conditions were met relating to an unlawful home intrusion.137Colo. Rev. Code § 18-1-704.5(3) (1986) (emphasis added). The four conditions were that (1) the defendant was an “occupant of a dwelling”; (2) another person “made an unlawful entry into the dwelling”; (3) “the occupant ha[d] a reasonable belief that such other person . . . committed a crime in the dwelling in addition to the uninvited entry, or [wa]s committing or intend[ed] to commit a crime against a person or property in addition to the uninvited entry”; and (4) “the occupant reasonably believe[d] that such other person might use any physical force, no matter how slight, against any occupant.” Id.

The 1986 law’s legislative sponsors and the negotiating prosecutors appeared to have different beliefs about what the new law actually accomplished. The sponsors appreciated that they had achieved “greater protection [for defendants] than a presumption for the homeowner as part of an affirmative defense at trial.”138Wilbanks, supra note 126, at 46. The negotiating prosecutors, in contrast, believed that they gave up nothing. Denver’s district attorney, for example, publicly commented that the “compromise is just a clarification of existing law.”139Id. at 45 (quoting Norman Early).

In that vein, some prosecutors tried to argue in subsequent litigation that the new provision could not possibly grant true immunity for self-defense.140People v. Guenther, 740 P.2d 971, 975 (Colo. 1987). Among other things, they pointed out that the provision appears alongside other affirmative defenses in Colorado’s criminal code.141Id. When the issue reached the Colorado Supreme Court, however, the justices rejected the prosecutors’ interpretation that self-defense remained an ordinary defense to be proved at trial, noting that “[i]t must be presumed that the legislature has knowledge of the legal import of the words it uses.”142Id. at 976. The plain meaning of “shall be immune from criminal prosecution” in the statute, they concluded, was “to bar criminal proceedings against a person for the use of force under the circumstances set forth” in the law.143Id. at 975. In the course of reaching that holding, the justices acknowledged what went unsaid during the legislative hearings: that “the immunity created by [the law] is an extraordinary protection which, so far as we know, has no analogue in Colorado statutory or decisional law.”144Id. at 980. In fact, immunity for self-defense in criminal cases does not appear to have existed anywhere else in the country.145See Johnson, supra note 125 (“No other state is believed to have such a law.”).

Perhaps because of its unusualness, or because it was an eleventh-hour deal seemingly unrooted in any principle other than compromise, Colorado’s self-defense immunity law was not immediately enacted elsewhere. In 1987, for example, Oklahoma’s governor vetoed legislation similar to Colorado’s, which subsequently passed after the immunity provision was removed.146Wilbanks, supra note 126, at 50–51. Nonetheless, Colorado’s immunity provision was on the books, providing a template for future efforts.

B.  Auspicious Effort by Gun Rights Advocates

The Colorado self-defense immunity law was not instituted at the behest of gun rights advocates or other lobbyists, but rather, it arose as a compromise with prosecutors after a locally elected leader perceived a need for expanding self-defense protections against home intruders.147Id. at 31 (“Rep. Armstrong says that the idea and initiative for the original bill was her own as she did not contact any lobbyists (the Colorado District Attorneys Council, the National Rifle Association, homeowners associations) to seek help in drafting the initial bill.”). In more recent times, however, gun rights advocates and the NRA in particular have led a campaign to expand not only the right to have and carry guns but also to brandish and shoot them when gun owners feel threatened.148For accounts of the NRA’s recent focus on self-defense law, and especially Stand Your Ground, see Mary Anne Franks, The Cult of the Constitution 85 (2019) and Caroline E. Light, Stand Your Ground: A History of America’s Love Affair with Lethal Self-Defense 161–62 (2017). Most public attention to this campaign has centered around Stand Your Ground, but looking closely at testimony and commentary reveals a deeper ambition: immunizing defensive gun use from prosecution.

The parallels between the NRA’s lobbying for gun rights and its lobbying for self-defense immunity is striking. Gun rights advocates frequently claim that the right to keep and bear arms is being disrespected in the courts and therefore that the Second Amendment needs more protection.149Joseph Blocher and I explore that rhetorical move in Eric Ruben & Joseph Blocher, “Second-Class” Rhetoric, Ideology, and Doctrinal Change, 110 Geo. L.J. 613, 613 (2022); see also Joseph Blocher & Eric Ruben, No, Courts Don’t Treat the Second Amendment as a ‘Second-Class Right,’ Wash. Post (Nov. 17, 2021, 6:00 AM), https://www.washingtonpost.com/outlook/2021/11/17/no-courts-dont-treat-second-amendment-second-class-right [https://perma.cc/S9QU-UHDD] (discussing “allegations of widespread mistreatment” of the right to keep and bear arms). The claim with self-defense is similar: as one gun rights advocate put it, self-defenders are “victimized . . . in court.”150Self-Defense Amendments: Hearing on H.B. 227 Before the Senate Natural Resources, Agriculture, and Environment Comm., 2021 Gen. Sess., at 35:30 (Utah 2021), https://le.utah.gov/
av/committeeArchive.jsp?timelineID=182900 [https://perma.cc/8K2K-MH86] (statement of Clark Aposhian).
The executive director of the NRA’s Institute for Legislative Action lamented that “people who defend themselves are more likely to be charged with crimes and, as the old sayings go, be forced to ‘tell it to the judge’ and ‘let the jury sort it out.’ ”151Chris W. Cox, “Castle Doctrine” Legislation: Protecting Your Right to Protect
Yourself, NRA-ILA (Apr. 1, 2012), https://www.nraila.org/articles/20120401/castle-doctrine-legislation-protecting-your-right-to-protect-yourself [https://perma.cc/7M2Q-PW9V].
That creates a problem, he explained, because “a murder trial puts the defendant at risk of a long prison sentence—or worse.”152Id. The NRA lobbyist most directly involved with Florida’s landmark Stand Your Ground bill in 2005 was likewise moved by this notion.153Mike Spies, The N.R.A. Lobbyist Behind Florida’s Pro-Gun Policies, New Yorker (Feb.
23, 2018), https://www.newyorker.com/magazine/2018/03/05/the-nra-lobbyist-behind-floridas-pro-gun-policies [https://perma.cc/ND4Z-RRE2] (describing Marion Hammer’s role in the enactment of Florida’s 2005 law and subsequent amendments).
A basic problem, in her view, was that people were “being arrested” and “prosecuted . . . for exercising self-defense that was lawful.”154Id. (quoting Marion Hammer).

An answer to that feeling of disregard for self-defense was to transform it from an affirmative defense to an immunity. The NRA devised a self-defense immunity law155Id. and found legislative sponsors in Florida who agreed with the complaint that, as one put it, “law-abiding citizens” who “protect themselves [are] in a posture that they have to defend themselves from their own government.”156Talk of the Nation, Opinion, Why I Wrote “Stand Your Ground” Law, NPR (Mar. 26, 2012, 1:00 PM), https://www.npr.org/2012/03/26/149404276/op-ed-why-i-wrote-stand-your-ground-law [https://
perma.cc/AKP6-KD45] (interview of State Rep. Dennis Baxley (R-Fla.)).
The measure passed in 2005 and went even further than Colorado’s, extending prosecutorial immunity to all self-defense—not just self-defense in the context of home invasions.157See id. In particular, the law provided that someone using lawful self-defense is “immune from criminal prosecution,” with “criminal prosecution” defined to “include[] arresting, detaining in custody, and charging or prosecuting the defendant.”158See Fla. Stat. § 776.032 (2005). The self-defense immunity provision adopted in Florida in 2005 is as follows:

Immunity from criminal prosecution and civil action for justifiable use of force.—

(1) A person who uses force as permitted in s. 776.012, s. 776.013, or s. 776.031 is justified in using such force and is immune from criminal prosecution and civil action for the use of such force, unless the person against whom force was used is a law enforcement officer, as defined in s. 943.10(14), who was acting in the performance of his or her official duties and the officer identified himself or herself in accordance with any applicable law or the person using force knew or reasonably should have known that the person was a law enforcement officer. As used in this subsection, the term “criminal prosecution” includes arresting, detaining in custody, and charging or prosecuting the defendant.

(2) A law enforcement agency may use standard procedures for investigating the use of force as described in subsection (1), but the agency may not arrest the person for using force unless it determines that there is probable cause that the force that was used was unlawful.

(3) The court shall award reasonable attorney’s fees, court costs, compensation for loss of income, and all expenses incurred by the defendant in defense of any civil action brought by a plaintiff if the court finds that the defendant is immune from prosecution as provided in subsection (1).

Id. The law, formally called, “An act relating to the protection of persons and property,” 2005 Fla. Laws 199, also enacted Stand Your Ground, 2005 Fla. Laws 202, and two presumptions making it easier to defend deadly defensive force in a person’s home and cars, see id. (creating Fla. Stat. § 776.013(1), (4)).

After some Florida judges placed the burden on the defendant to prove self-defense at a pretrial hearing, legislators stepped in to strengthen the immunity provision by clarifying that the burden of proof is on the prosecutor to disprove self-defense before trial by clear and convincing evidence.159See Love v. State, 286 So. 3d 177, 180 (Fla. 2019) (recounting the history of the burden shift for self-defense immunity in Florida). That standard is much higher than the probable cause standard that prosecutors must satisfy to indict, which, as discussed above, is the primary focus of traditional and modern pretrial screening.160See supra Section I.B (discussing pretrial screening and the probable cause standard). And there have been efforts to increase the burden even more, such as by requiring the prosecutor to disprove self-defense beyond a reasonable doubt—the same burden borne by the prosecutor at trial.161See Lizette Alvarez, Florida Poised to Strengthen ‘Stand Your Ground’ Defense, N.Y. Times (Mar. 15, 2017), https://www.nytimes.com/2017/03/15/us/stand-your-ground-florida.html [https://
perma.cc/HF98-Z8EM] (describing effort to increase the burden for disproving self-defense at immunity hearings to the beyond-a-reasonable-doubt standard).

Unlike Colorado’s law, which failed to attract buy-in elsewhere, Florida’s law was aggressively promoted by the NRA and the conservative American Legislative Exchange Council (“ALEC”),162See NRA Presents ALEC Model Legislation in Grapevine, Texas, NRA Inst. Legis. Action (Aug. 12, 2005), https://www.prwatch.org/files/NRA_2005.png [https://perma.cc/MK8P-8AAY] (“At the recent Annual Meeting of the American Legislative Exchange Council (ALEC) in Grapevine, TX, Marion Hammer presented the ALEC Criminal Justice Task Force with proposed model legislation based on Florida’s landmark “Castle Doctrine” law, that passed in Florida earlier this year.”); Press Release, ALEC Statement on “Stand Your Ground” Legislation (Mar. 26, 2012), https://www.alec.org/
press-release/alec-statement-on-stand-your-ground-legislation-32612 [https://perma.cc/T8Q2-8X58] (“Florida’s ‘Stand Your Ground’ law was the basis for the American Legislative Exchange Council’s model legislation, not the other way around.”)
which described the need to “[p]rotect[] citizens from prosecution or liability if they use a firearm in self defense [sic] inside or outside their homes.”163See, e.g., ALEC, 2007 Legislative Scorecard, http://www.alec.org/am/pdf/2007
alecscorecard.pdf [https://web.archive.org/web/20081106044025/http://www.alec.org/am/pdf/2007
alecscorecard.pdf].
Similar laws were introduced in states across the country,164Id. (tracking where ALEC model legislation had been successfully introduced or enacted); see also Adam Weinstein, How the NRA and Its Allies Helped Spread a Radical Gun Law Nationwide, Mother Jones (June 7, 2012), https://www.motherjones.com/politics/2012/06/nra-alec-stand-your-ground [https://perma.cc/34DP-N7NG]. and the NRA-promoted sentiment that civilians asserting self-defense should have a path to immunity was frequently invoked. When legislators debated Iowa’s self-defense law, one objected that a person must “spend eternity in prison trying to defend themselves” after being put “in that untenable situation where they have to make that snap decision and defend themselves or another from an aggressor.”165Iowa House of Representatives Floor Debate on HF 517 During the 87th General Assembly, Iowa Legislature, at 1:15:45 PM (Mar. 7, 2017), https://www.legis.iowa.gov/perma/093020194217 [https://web.archive.org/web/20230421065522/https://www.legis.iowa.gov/dashboard?view=video&chamber=H&clip=H20170307124009459&dt=2017-03-07&offset=1793&bill=HF%20517] (statement of Rep. Matt Windschitl); see also id. at 1:52:00 PM (“We want to make absolutely certain that, if someone ever does find themselves in that situation where they’ve used Stand Your Ground or not retreated, that we provide to them the protections from criminal and civil actions against them.”). In Ohio, a legislative witness inveighed that “[t]he mere fact of acting justly in self-defense should not result in dragging folks who used defensive force in accordance with Ohio law through the mud, costing them valuable time and resources.”166Memorandum of Support for Senate Bill 215 from Ohio Gun Owners to the Ohio Senate Veterans and Public Safety Committee (Oct. 5, 2021) (statement of Rob Knisley, Ohio Gun Owners). In South Carolina, a self-defense bill’s sponsor argued that “the State should have to prove you did something wrong before they can send you to jail” to await trial in homicide cases.167WCBD News 2, Stand Your Ground in South Carolina, YouTube (May 19, 2016), https://www.youtube.com/watch?v=RptJ8dKVWJg [https://perma.cc/HQ7R-2MCQ] (interviewing House Rep. Greg Delleney, Jr., regarding H. 4703). And in Utah, an advocate complained that people should not have to “go through the crucible of a self-defense trial.”168Self-Defense Amendments: Hearing on H.B. 227 Before the Senate Natural Resources, Agriculture, and Environment Comm., 2021 Gen. Sess. (Utah 2021) [hereinafter Hearing on H.B.
227], https://le.utah.gov/av/committeeArchive.jsp?timelineID=182900 [https://perma.cc/8K2K-MH86] (statement of Mitch Vilos).
Ultimately, after the passage of Florida’s law, more than twenty other states passed some sort of self-defense reform, such as Stand Your Ground,169See The Effects of Stand Your Ground Laws, Rand Corp. (Apr. 22, 2020), https://
http://www.rand.org/research/gun-policy/analysis/stand-your-ground.html#fn3 [https://perma.cc/TA4X-5R64] (counting twenty-four states that passed self-defense reform in the decade after Florida’s 2005 enactment).
with at least thirteen enacting self-defense immunity.170See Ala. Code § 13A-3-23(d) (2016), Colo. Rev. Stat. § 18-1-704.5(3) (1985), Fla. Stat. § 776.032 (2005), Ga. Code Ann. § 16-3-24.2 (2014), Kan. Stat. Ann. § 21-5231 (2011), Ky. Rev. Stat. Ann. § 503.085 (West 2006), Okla. Stat. tit. 21 § 1289.25(F) (2018), S.C. Code Ann. § 16-11-450 (2006), Mich. Comp. Laws § 780.961(1) (2006), Idaho Code § 19-202A(1) (2018); Utah Code Ann. § 76-2-309 (2021), S.D. Codified Laws § 22-18-4.8 (2021), Iowa Code § 704.13 (2017), N.C. Gen. Stat. § 14-51.3 (2011).

But the fact that people who lawfully defend themselves are sometimes prosecuted and forced to argue self-defense is unexceptional. It is a truism that self-defense sometimes exculpates—that is precisely why it is an available defense to criminal charges. Singling out self-defense for special treatment as an immunity should have a compelling rationale similar to the ones that justify other prosecutorial immunities. The next Section searches for such a rationale in the legislative debates and commentary.

C.  Searching for a Rationale

A common assertion among advocates for self-defense immunity is that awaiting trial is “not giving the right to self-defense the consideration it deserves.”171Hearing on H.B. 227, supra note 168, at 8:40 (statement of Mitch Vilos). But why not? After all, awaiting trial is the traditional process and the one afforded other defenses. In his systematic analysis, Paul Robinson identifies dozens of other affirmative defenses that bar conviction.172Robinson, supra note 29, at 203 n.7. What is the basis for treating self-defense differently than these other defenses? Though legislative debates offer no consistent rationale, four can be teased out: restoring procedural protections for self-defense lost to history, stopping politically motivated prosecutions of self-defenders, vindicating the notion that self-defense is a “natural right,” and reducing defense costs for gun owners. None of these is as strong as the rationale for traditional immunities—an inherent need for pretrial adjudication.173See supra Section I.C (discussing traditional prosecutorial immunities). Moreover, each is unpersuasive on its own terms.

Some advocates argue that prosecutorial immunity restores self-defense to an exalted place from a bygone era. In Florida, for example, a witness testified that making the prosecutor disprove self-defense before trial “recover[s] a right that we as citizens lost to defend ourselves from criminals.”174Mark Obbie, The Politician Who Brought America ‘Stand Your Ground’ Is Pushing to Make Self-Defense Claims More Bulletproof, Trace (Sept. 27, 2015), https://www.thetrace.org/2015/09/stand-your-ground-florida-bill-baxley [https://perma.cc/2HEH-HTVM] (quoting testimony of Eric Friday). In Utah, a witness testified that “Utah used to have a robust preliminary hearing procedure” as it relates to self-defense, and that immunity “restores some much-needed balance.”175Self-Defense Amendments: Hearing on H.B. 227 Before the Senate Natural Resources, Agriculture, and Environment Comm., 2021 Gen. Sess., at 2:37 (Utah 2021) (testimony of Mark Moffatt), https://le.utah.gov/av/committeeArchive.jsp?timelineID=182900 [https://perma.cc/8K2K-MH86].

A related move has been to couple self-defense immunity with Stand Your Ground and then defend both on the basis of Stand Your Ground history. For example, the NRA has said that Stand Your Ground laws, such as Florida’s (which includes an immunity provision), “focus on the narrow issue of whether and to what extent a person who would otherwise have a right to self-defense forfeits that right by not first attempting to flee the confrontation.”176Stand Your Ground, NRA Inst. Legis. Action (Feb. 1, 2014), https://www.nraila.org/
articles/20140201/stand-your-ground [https://perma.cc/WKE5-VCKB].
With omnibus bills like Florida’s so purportedly reduced, the NRA then asserted that removing the duty to retreat has “a pedigree in American law dating back over 150 years.”177Id. Other advocates have similarly ignored everything in recent self-defense legislation other than Stand Your Ground and then defended the entirety on the basis of Stand Your Ground history.178A legal scholar with the Cato Institute, which also supports Florida-style self-defense laws, similarly downplayed their ambition. As he put it, “[Stand Your Ground] laws are a tremendously misunderstood aspect of the debate over firearms regulation and criminal-justice reform” because “[a]ll they do is allow people to assert their right to self-defense in certain circumstances without having a so-called ‘duty to retreat.’ ” Ilya Shapiro, Testimony Before the U.S. Senate Judiciary Committee’s Subcommittee on the Constitution, Civil Rights, and Human Rights: Hearing on “‘Stand Your Ground’ Laws: Civil Rights and Public Safety Implications of the Expanded Use of Deadly Force” 1 (Oct. 29, 2013), https://www.cato.org/sites/cato.org/files/pubs/pdf/syg_senate_
testimony_-_shapiro_with_attachments.pdf [https://perma.cc/NVT7-T2Y7]; see also id. (arguing that “there’s nothing particularly novel” about Stand Your Ground laws). The misdirection might be unwittingly assisted by opponents of immunity legislation who adopt a similar Stand Your Ground framing. See, e.g., ABA Task Force, supra note 17.

Nostalgia is a staple of gun rights advocacy,179See Ruben & Blocher, supra note 149, at 632 (describing rhetorical appeals to an imagined past in gun rights advocacy). so it is unsurprising to see appeals to history when it comes to self-defense immunity. Yet, as shown in Section I.A, there is no basis in Anglo-American legal tradition for immunizing private defensive violence. Treating self-defense as exceptional through immunity is a thoroughly modern innovation.

An alternative rationale is that people exercising lawful self-defense are targeted for “political” prosecutions.180See, e.g., Tucker Carlson, Kyle Rittenhouse’s Trial Is the Most Bizarre Court Proceeding Ever Caught on Camera, Fox News (Nov. 10, 2021), https://www.foxnews.com/opinion/tucker-carlson-kyle-rittenhouse-trial [https://perma.cc/9N8K-GCRX] (saying Kyle Rittenhouse’s prosecutor “didn’t want to know what happened that night” and was “under enormous political pressure” to “declare Kyle Rittenhouse a murderer”). Indeed, it has become an article of faith on the political right that people exercising self-defense with firearms are targeted for political prosecutions. See, e.g., Kyle’s Law, supra note 13 (“Too often, rogue prosecutors bring felony criminal charges against people who were clearly doing nothing more than defending themselves, their families, or others from violent criminal attack.”). Prosecutors have vigorously rejected that narrative, and advocates for immunizing self-defense have failed to offer convincing evidence of political prosecutions, let alone the sort of systemic abuses that would justify a radical change to self-defense law. Advocates for both of the first immunity statutes—in Colorado (1986) and Florida (2005)—could not point to a single example of an improper prosecution.181See Wilbanks, supra note 126, at 54 (“[T]he sponsors of the bill were not able to point to any case in the past where they viewed the prosecutor to have incorrectly (in their view of the homeowner’s right of self-defense) charged a homeowner.”); Spies, supra note 153 (“Hammer and the Republican sponsors of Stand Your Ground could not point to a single instance in which a person had been wrongfully charged, tried, or convicted after invoking Florida’s traditional self-defense law.”). Rather, the chief NRA lobbyist for the Florida law ultimately contended that whether bad prosecutions have been brought is “not relevant.”182Spies, supra note 153; see also Daniella Rivera, ‘It’s Not Working’: KSL Investigates Unintended Consequences of New Utah Self-Defense Law, KSL.com (Nov. 16, 2021, 12:17 PM), https://www.ksl.com/article/50284891/its-not-working-ksl-investigates-unintended-consequences-of-new-utah-self-defense-law [https://perma.cc/R34W-ZCRG] (“Lisonbee said the [Utah immunity] law was intended to address politically motivated prosecutions but could not provide examples of that happening in Utah.”).

In subsequent efforts to immunize self-defense, advocates have invoked the prosecutions of George Zimmerman for the shooting death of Trayvon Martin and Rittenhouse for the Kenosha incident as exemplars of political prosecutions justifying self-defense immunity.183See, e.g., Kyle’s Law, supra note 13 (naming the Zimmerman and Rittenhouse prosecutions as evidence of political prosecutions that rationalize the adoption of self-defense immunity). Looking to Zimmerman’s prosecution is somewhat ironic given that it took place in Florida after Florida adopted its 2005 immunity provision and Zimmerman opted not to have a pretrial immunity hearing.184See Lizette Alvarez & Cara Buckley, Zimmerman Is Acquitted in Trayvon Martin Killing, N.Y. Times (July 13, 2013), https://www.nytimes.com/2013/07/14/us/george-zimmerman-verdict-trayvon-martin.html [https://perma.cc/LWH5-H78G] (noting that the shooting occurred on February 26, 2012, and the trial took place in 2013). Furthermore, in both cases the juries reached verdicts only after extensive deliberation. The lead homicide investigator in the Zimmerman case recommended charges but was initially overruled.185Matt Gutman, Trayvon Martin Investigator Wanted Manslaughter Charge, ABC News (Mar. 27, 2012, 8:18 AM), https://abcnews.go.com/US/trayvon-martin-investigator-wanted-charge-george-zimmerman-manslaughter/story?id=16011674 [https://perma.cc/8TGG-8BQJ]. Many perceived the declination of charges as reflecting racial bias, as Martin was an unarmed Black teenager.186See Markovitz, supra note 22, at 879–80 n.32 (recounting how many thought “the criminal justice system was indifferent to Trayvon Martin’s death, and was disinclined to try to provide justice”). A special prosecutor ultimately brought charges and a trial was held.187See Alvarez & Buckley, supra note 184. The law considered by Zimmerman’s jury did not include how initial aggressors have a limited right to self-defense, since the judge declined to instruct the jury on the initial aggressor doctrine;188See Alafair Burke, What You May Not Know About the Zimmerman Verdict: The Evolution of a Jury Instruction, HuffPost (July 15, 2013), https://www.huffpost.com/entry/george-zimmerman-jury-instructions_b_3596685 [https://perma.cc/BDD9-7TGS]. perhaps that would have made a difference in the verdict. Others have argued that prosecutors in both cases made strategic errors that may have affected the outcomes.189Some legal scholars have asserted that the Zimmerman prosecution made a tactical error by pursuing a murder theory rather than solely a manslaughter theory. David G. Savage & Michael Muskal, Zimmerman Verdict: Legal Experts Say Prosecutors Overreached, L.A. Times (July 14, 2013,
12:00 AM), https://www.latimes.com/nation/la-xpm-2013-jul-14-la-na-zimmerman-legal-20130715-story.html [https://perma.cc/8BM3-XDAN]. That, of course, is different than saying Zimmerman should not have been prosecuted at all. Various commentators have also critiqued the strategy and tactics deployed in the Rittenhouse prosecution. See, e.g., Ashley Collman, Did Prosecutors Bungle the Kyle Rittenhouse Case? Legal Experts’ Reviews Are Mixed, Insider (Nov. 16, 2021, 12:29 PM), https://www.insider.com/legal-experts-say-kyle-rittenhouse-prosecution-made-some-mistakes-2021-11 [https://perma.cc/T6T7-97DW].
In the Zimmerman trial, half of the jurors reportedly wanted to convict but changed their minds.190Richard Luscombe, George Zimmerman: Half of Jurors ‘Initially Favored Conviction,’ Guardian (July 16, 2013, 7:22), https://www.theguardian.com/world/2013/jul/16/george-zimmerman-jurors-trayvon-martin [https://perma.cc/S4E7-4GY3].Deliberations in both cases extended over multiple days before the jurors returned not guilty verdicts.191Id.; see Bosman, supra note 7 (noting that the Rittenhouse jury deliberated for three days before reaching its verdict).

Of course, in an ideal world, prosecutors would have perfect clarity into guilt and innocence, and prosecutions that result in acquittals after trial would never be brought. That, of course, is not realistic and is the reason why affirmative defenses and trials exist.192Cf. Ward, supra note 22, at 136 (“The adjudication process itself is a recognition of human imperfection—because we can never have perfect knowledge, we subject our suspicions to the test of a criminal trial (or at least the prospect of a criminal trial) before punishing someone suspected of a crime.”). Moreover, in light of the radical nature of the change wrought by singling out self-defense for immunity, if political prosecutions are the justification, then advocates should put forth more and better examples.

Another rationale that advocates raise is that self-defense is philosophically or morally distinct as a natural or human right.193See, e.g., Self-Defense Amendments: Hearing on H.B. 227 Before the H. Judiciary Comm., 64th Leg., 2021 Gen. Sess. (Utah 2021), https://le.utah.gov/av/committeeArchive.jsp?timelineID=
180423 [https://perma.cc/XB2Y-GLUD] (testimony of Clark Aposhian, Utah Shooting Sports Council, noting “[s]elf-defense is a basic human right”).
The Republican Party platform refers to the right of self-defense as “God-given.”194See Republican Nat’l Convention, Republican Party Platform of 2016, at 12 (2016), https://prod-cdn-static.gop.com/static/home/data/platform.pdf [https://perma.cc/S4TQ-NA62]. And the argument that self-defense is a justification and not an excuse is often explained by referencing moral philosophy.195See Reznik, supra note 20, at 26–27. But these understandings of self-defense as a natural, divine, or human right have long existed in harmony with adjudication at trial. Blackstone, for example, referred to self-defense as a natural right,1961 William Blackstone, Commentary on the Laws of England *139–40 (1765). but he believed, as described above, that self-defense is squarely a jury question.197See supra notes 52–53 and accompanying text (discussing Blackstone’s account of the process for raising affirmative defenses). Saying that self-defense is a natural right does not rationalize treating it as an immunity any more than it rationalizes erasing the common law elements of necessity and proportionality that have long guided self-defense decision-making.198See, e.g., Isaacs v. State, 25 Tex. 174, 177 (1860) (stating that the right to self-defense “is founded on the . . . law of nature” but that the common law requirement of “necessity of the case, and that only . . . justifies a killing”).

That leaves the fourth explanation, which perhaps arises most often: that gun owners should not have to pay typical criminal defense costs if they have a claim of self-defense. The NRA’s former executive director noted that “the legal fees . . . can easily top $50,000.”199Cox, supra note 151. A representative of a gun rights advocacy group in Wyoming expressed a similar view: “We don’t want to have a gun owner bankrupted by the criminal process just because he had to use a firearm in self-defense.”200Arno Rosenfeld, Senate Removes Immunity from ‘Stand Your Ground’ Law, Cody Enter. (Feb. 28, 2018), https://www.codyenterprise.com/news/local/article_d303bdba-1cc8-11e8-8673-776a19213ae2.html [https://perma.cc/6TPX-XS8P] (quoting Aaron Dorr of Wyoming Gun Owners discussing Senate File 71). And in Utah, an advocate said, “I have people calling me all the time [and saying] I’m afraid it will ruin me if I have to defend myself.”201Self-Defense Amendments: Hearing on H.B. 227 Before the H. Judiciary Comm., 64th Leg., 2021 Gen. Sess. (Utah 2021), https://le.utah.gov/av/committeeArchive.jsp?timelineID=180423 [https://perma.cc/EGF2-RRLM] (statement of Mitch Vilos). The legislative sponsor of the Utah bill recounted how a person leaving a gun carry class remarked, “I would rather die than financially ruin my family” by using a gun in self-defense.202House of Representatives Floor Debate on H.B. 227 During the 2021 General Session, Utah State Legislature, at 1:00:11 (Feb. 22, 2021), https://le.utah.gov/av/floorArchive.jsp?
markerID=114533 [https://perma.cc/YF2H-3WSJ] (statement of State Rep. Karianne Lisonbee).

The cost of criminal defense is a concern for all defendants, not just those asserting that violent conduct was justified as self-defense, and cost typically is not a sufficient rationale for prosecutorial—as opposed to civil—immunity.203See supra notes 100–01 and accompanying text (comparing rationales for civil and prosecutorial immunities); cf. Ward, supra note 22, at 135–36 (questioning the trial hardship rationale for self-defense immunity procedures). If self-defense, alone among affirmative criminal law defenses, is to be immunized, it warrants a much stronger rationale than cost saving for gun owners. This is especially true in light of the costs incurred as a result of self-defense immunity that are discussed in the next Part.

III.  THE COSTS OF IMMUNIZING PRIVATE VIOLENCE

The previous Section showed how the usual arguments put forth to support self-defense immunity are thin. It also is important to consider whether immunizing private violence has costs that further undercut exceptional treatment of defensive force. This Part contends that it does: immunizing self-defense can lead to more unlawful violence with less legal oversight; diminish the jury, thereby inviting less accurate and less legitimate outcomes; and introduce inefficiency into the criminal justice process.

A.  More Unlawful Violence (and Increased Impunity)

The message that self-defense immunity sends is troubling: that people can engage in defensive violence that they believe is lawful with less legal oversight. Both logic and data suggest that this message could bring about more assaults and homicides because of the impunity it signals—and in fact provides. Frederick Schauer has observed that “[q]uite often, officials who are immune for one reason or another from formal legal sanctions violate the law with some frequency.”204Frederick F. Schauer, The Force of Law 90 (2015). One can expect the same result from self-defense immunity, except for a much larger swath of the population; relatively few people receive official immunity, but everyone is entitled to assert self-defense when defending against criminal charges.205Moreover, officials often are constrained by other forms of oversight that could compensate for the negative effects of granting immunity. See id. at 86 (discussing internal punishment that can play a role “in ensuring official obedience to law”).

Rafi Reznik has recently argued that the modern understanding of self-defense as a justification, not an excuse, can signal societal acceptance of the alleged offense conduct in a way that promotes more violence;206See Reznik, supra note 20, at 68 (“[W]e should not want to tell self-defenders that they have done the right thing, nor provide them with the powers that justification confers, vindicate the values that justificatory self-defense stands for, or accept the socio-political conditions that self-defense laws create or perpetuate.”). immunity sends an even more powerful signal. As Reznik describes, in the dominant view, a justification indicates that “the wrongfulness of the act is negated.”207Id. at 26. Excuses, on the other hand, do not negate the wrongfulness of the conduct but “negate the blameworthiness of the actor.”208Id. at 27. The upshot is that “[j]ustifying self-defense,” as opposed to excusing it, “can . . . amount to an encouragement and it can even amount to an imperative.”209Id. at 33; see also Markovitz, supra note 22, at 875–76 (observing how “legal determinations of self-defense are, in effect, reflective of policy determinations about socially acceptable forms of violence”). Reznik argues that self-defense should be considered an excuse, which it was under English common law.210See Reznik, supra note 20, at 65; see also Darrell A. H. Miller, Self-Defense, Defense of Others, and the State, 80 Law & Contemp. Probs. 85, 87–95 (2017) (tracing the intellectual history of self-defense from an excuse to a justification). On the ground, however, the trend is going in the opposite direction: jurisdictions are granting immunity to self-defenders, which goes even further down the path toward encouraging the use of violence than considering self-defense a justification.211Cf. Schauer, supra note 204, at 7 (noting that “[s]ometimes the law” creates positive incentives “by granting immunity from otherwise applicable and legally enforced obligations”).

This trend is especially problematic because people are often wrong about the lawfulness of defensive force. One study found, for example, that a majority of self-reported defensive gun uses are likely illegal.212David Hemenway, Debra Azrael & Matthew Miller, Gun Use in the United States: Results From Two National Surveys, 6 Inj. Prevention 263, 266 (2000). People “view [a] hostile encounter from their own perspective; in any mutual combat both participants may believe that the other side is the aggressor and that they themselves are acting in self-defense.”213Id. A particular incident from the summer of the Rittenhouse shooting is exemplary.

Two months before the Rittenhouse shooting, Mark and Patricia McCloskey stood outside their St. Louis, Missouri, mansion as racial justice protesters marched nearby.214Tom Jackman, St. Louis Couple Who Aimed Guns at Protesters Charged with Felony Weapons Count, Wash. Post (July 20, 2020, 8:33 PM), https://www.washingtonpost.com/nation/2020/07/20/st-louis-couple-who-aimed-guns-protesters-charged-with-felony-weapons-count [https://perma.cc/5PW7-6PG3]. The protestors do not appear to have entered the McCloskeys’ property, though they marched on the sidewalk in a gated community in which the McCloskeys lived. See Jessica Lussenhop, Mark and Patricia McCloskey: What Really Went on in St Louis that Day?, BBC (Aug. 25, 2020), https://www.bbc.com/news/election-us-2020-53891184 [https://perma.cc/C53B-FGL2] (reporting that, while protestors walked into the private neighborhood, video from the event “does not show the protestors cross[ed] onto the McCloskeys’ property, remaining instead on the sidewalks and in the roadway”). Both were captured on video screaming angrily and wielding firearms: Mr. McCloskey, an AR-15–style rifle, and Ms. McCloskey, a handgun that she pointed at one protester after another.215See Jackman, supra note 214; see also KMOV St. Louis, Charges Filed Against Mark and Patricia McCloskey, YouTube (Jul. 20, 2020), https://www.youtube.com/watch?v=sUMfKFLGDcE [https://perma.cc/QP6H-CH8Q]. In Missouri, it is a crime to “exhibit[], in the presence of one or more persons, any weapon readily capable of lethal use in an angry or threatening manner.”216Mo. Rev. Stat. § 571.030 (2022). A local prosecutor charged the couple with violating that statute.217See Jackman, supra note 214. In their defense, the couple asserted that their conduct was justified to protect themselves and their property.218Id.

Speaking at the 2020 Republican National Convention (the McCloskeys, like Rittenhouse, became celebrities on the political right for their gun use),219Caitlin O’Kane, St. Louis Couple Who Pointed Guns at Black Lives Matter Protesters to Speak at Republican National Convention, CBS News (Aug. 18, 2020, 2:06 PM), https://www.cbsnews.com/news/republican-national-convention-mark-patricia-mccloskey-to-speak [https://perma.cc/ATS7-DQH7]. Mr. McCloskey subsequently announced his candidacy for a
U.S. Senate seat, prominently displaying on his campaign website a photograph of himself and
Ms. McCloskey holding their guns during the racial justice protest. McCloskey for
Senate, https://www.mccloskeyforsenate.com [https://web.archive.org/web/20211106143557/https://
http://www.mccloskeyforsenate.com].
Mr. McCloskey, a lawyer, expressed outrage that the prosecutor “actually charged [them] with felonies for daring to protect [their] home.”220CNBC, Couple Who Pointed Guns at BLM Protesters Speaks at RNC, YouTube (Aug. 24, 2020), https://www.youtube.com/watch?v=gK8P0vUQ4lg [https://perma.cc/AU64-926A]. Then, in a remarkable move, Missouri’s attorney general urged dismissal of the local charges on the basis of the sentiment underlying immunity: “Missourians should not fear exposure to criminal prosecution when they use firearms to defend themselves and their homes from threatening intruders.”221Amicus Brief of Attorney General Eric Schmitt Supporting Dismissal of the Case, State v. McCloskey, No. 2022-CR01300, at *1 (Cir. Ct. Mo. Jul. 20, 2020). In the end, however, the couple effectively conceded that they were not lawfully defending themselves when they pled guilty to the crimes of assault and harassment, thereby waiving any claim for self-defense.222Meryl Kornfield, St. Louis Couple Who Pointed Guns at Protesters Plead Guilty, Will Give Up Firearms, Wash. Post (June 17, 2021, 7:07 PM), https://www.washingtonpost.com/nation/
2021/06/17/st-louis-couple-guns [https://perma.cc/EFL6-859X]; see Hagan v. State, 836 S.W.2d 459, 461 (Mo.1992), overruled on other grounds by State v. Heslop, 842 S.W.2d 72 (Mo. 1992) (“The general rule in Missouri is that a plea of guilty voluntarily and understandably made waives all non-jurisdictional defects and defenses.” (citation and quotation marks omitted)). Mr. McCloskey nonetheless showed no remorse, saying of the criminal conduct, “I did it, and I’d do it again.” Joel Currier, St. Louis
Gun-Waving Couple Plead Guilty to Misdemeanor Charges, St. Louis Post-Dispatch (June
17, 2021), https://www.stltoday.com/news/local/crime-and-courts/st-louis-gun-waving-couple-plead-guilty-to-misdemeanor-charges/article_5b02e25b-0034-58a3-8181-f0a724ffa323.html [https://perma.
cc/J5NN-A3MY]. The Supreme Court of Missouri suspended both Mark and Patricia McCloskeys’ law licenses because of their convictions for offenses involving moral turpitude. See In re Mark T. McCloskey, Order, No. SC99301 (Mo. Feb. 8, 2022); In re Patricia McCloskey, Order, No. SC99302 (Mo. Feb. 8, 2022).
In other words, despite their confident assertions that they were legally justified in their actions, they ultimately admitted that they had no legal justification for their conduct.223The case did not end there. The Missouri governor, who asserted that the prosecution was “political” and “out of control,” pardoned the couple. Meryl Kornfield, Missouri Governor Pardons
Mark and Patricia McCloskey, Who Pointed Guns at Protestors, Wash. Post (Aug. 3, 2021, 10:25
PM) https://www.washingtonpost.com/nation/2021/08/03/mccloskey-pardon [https://perma.cc/UP68-AY2Q]; Marc Cox Show, Interview of Governor Mike Parson, Facebook (July 17, 2020), https://www.facebook.com/watch/?v=273414383946013 [https://perma.cc/L63N-AUWR].

Unlawful defensive force imposes an especially troubling risk to Black men and women, like many of those marching in front of the McCloskey house, who are mistaken as threats all too frequently. Data has consistently shown that Black people are more likely to be misperceived as a threat than white people.224L. Song Richardson & Phillip Atiba Goff, Self-Defense and the Suspicion Heuristic, 98 Iowa L. Rev. 293, 307–14 (2012) (discussing data). According to L. Song Richardson and Phillip Atiba Goff, this is in part because Black people “serve as our mental prototype (i.e., stereotype) for the violent street criminal.”225Id. at 310. A prosecution and trial can separate out biased and unreasonable threat perceptions from unbiased and reasonable ones better than any individual can in the moment.226To be sure, I am not saying that juries are never biased. The point, rather, is that a jury with representation from a cross-section of the community as required by law should reflect more diverse voices than a lone defendant (or judge), which would make it better suited to discern biased and unreasonable threat assessments. I discuss virtues of the jury in greater detail below. See infra Section III.B. And getting it right is important for ensuring a fair and just implementation of criminal law.

Well-intentioned people can have flawed perceptions of lawfulness, but encouraging restraint for defensive violence through the threat of prosecution and punishment is even more important for those who are ill-intentioned. For some people, “genuine and sanction-independent obedience [to the law] is rare.”227Schauer, supra note 204, at 75; see id. at 59 (noting how law serves to “constrain[] moral outliers”). In that circumstance, “coercion through the threat of sanctions emerges as the principal mechanism for securing the obedience that turns out to be so often necessary.”228Id. at 75. Immunity lessens the law’s constraining force and risks that someone prone to violence will construe immunity as a license to commit violence.229See generally Dan M. Kahan, Gentle Nudges vs. Hard Shoves: Solving the Sticky Norms Problem, 67 U. Chi. L. Rev. 607 (2000) (discussing the criminal law’s ability to shape norms and behavior).

In this regard, it is notable that a study of the effects of Colorado’s 1986 immunity law found that those invoking immunity “used force (sometimes deadly force) as much out of anger as self-defense.”230Wilbanks, supra note 126, at 322. Moreover, the legal change primarily benefited defendants other than the intended beneficiaries—homeowners confronting stranger intruders.231Id. In the years immediately following the enactment, the only “strangers” who intruded into homes and faced defensive force triggering immunity were police officers.232Id. at 321.

Unfortunately, more recent empirical studies on the impact of changes to self-defense law do not distinguish between the effect of various simultaneous changes, such as Stand Your Ground, presumptions, and immunity. Several such studies have shown that self-defense reforms that include an immunity provision correlate with more violent crime.233See, e.g., Alexa R. Yakubovich, Michelle Degli Esposti, Brittany C. L. Lange, G. J. Melendez-Torres, Alpa Parmar, Douglas J. Wiebe & David K. Humphreys, Effects of Laws Expanding Civilian Rights to Use Deadly Force in Self-Defense on Violence and Crime: A Systematic Review, Am. J. Pub. Health (Mar. 10, 2021) (reviewing the literature). One study found that in the decade following Florida’s 2005 legislation, “monthly rates of homicide increased by 24.4% and monthly rates of homicide by firearm by 31.6%.”234David K. Humphreys, Antonio Gasparrini & Douglas J. Wiebe, Evaluating the Impact of Florida’s “Stand Your Ground” Self-Defense Law on Homicide and Suicide by Firearm: An Interrupted Time Series Study, 177 JAMA Internal Med. 44, 49 (2017). Another found that the law was associated with a 44.6% increase in adolescent firearm homicides.235Michelle Degli Esposti, Douglas J. Wiebe, Jason Gravel & David K. Humphreys, Increasing Adolescent Firearm Homicides and Racial Disparities Following Florida’s ‘Stand Your Ground’ Self-Defence Law, 26 Inj. Prevention 187 (2020). In February 2020, the U.S. Commission on Civil Rights released a report finding no evidence of crime deterrence and an increase in homicide rates in states that adopted such laws.236U.S. Comm’n on C.R., Examining the Race Effects of Stand Your Ground Laws and Related Issues 6 (2020). A commissioner recommended rejecting self-defense immunity because it “remove[s] incentives to mitigate or reduce the use of deadly force by protecting the claimant regardless of the collateral consequences.”237Id. at 26 (statement of Michael Yaki). Yet, as noted, the power of these studies as regards the impact of self-defense immunity is limited and, hopefully, future empirical studies will seek to isolate the effect of self-defense immunity.

A corollary to the signals sent by self-defense immunity is that sometimes immunity can in fact hinder or prevent a conviction of someone who engages in unlawful violence. The analysis of cases soon after Colorado passed its self-defense immunity law in 1986 found that the statute likely led to an acquittal in one case that would otherwise have been a probable conviction, as well as decisions not to prosecute in others.238Wilbanks, supra note 126, at 321–24. The district attorney for a single county in Kansas has reported “declin[ing] to file charges against thirty-three people based on self-defense immunity,” thirty of which were deemed homicides by the coroner.239Report of District Attorney Marc Bennett 18th Judicial District of Kansas
43 (Jan. 18, 2022), https://www.sedgwickcounty.org/media/60604/final-c-lofton-january-18-2022.pdf [https://perma.cc/6N6Y-5KC2].
Three additional cases were charged by the district attorney but dismissed on self-defense immunity grounds by a judge.240Id. at 45.

Those arguing in support of self-defense immunity do not contest, and implicitly concede, much of this analysis. They acknowledge that the risk of having to defend against a prosecution causes gun owners to hesitate before deploying lethal force, and they seek to reduce such hesitation.241See, e.g., supra notes 202–03 and accompanying text (expressing gun owner concerns about the cost of defending against a prosecution). However, a cost of immunizing self-defense is to transform the signals sent by conventional self-defense law in a way that likely leads to more unlawful, and at times discriminatory, violence. Furthermore, immunizing self-defense erects an obstacle to achieving a basic goal of the criminal justice system: punishing those who commit crimes of violence.

B.  Fewer Juries in Matters of Community Importance

Another consequence of granting a defendant immunity is to disempower a jury from deciding facts surrounding a properly charged crime. The institution of the jury has long played a central role in self-defense cases. The jury is well-equipped to resolve disputes about the lawfulness of violence. Moreover, and importantly in the context of self-defense, the community’s involvement through the jury legitimates the law and promotes acceptance of outcomes as well as community healing.

Today, the jury is most often discussed solely in the context of defendants’ rights,242See U.S. Const. amend. VI (granting defendants the right to “an impartial jury”); Duncan v. Louisiana, 391 U.S. 145, 155 (1968) (“A right to jury trial is granted to criminal defendants in order to prevent oppression by the Government.”). but the jury’s importance to society is actually far deeper. At the nation’s founding, Anti-Federalists were adamant about protecting the institution of the jury because, even more than protecting the defendant, the jury integrated “the people in the administration of government.”243Herbert J. Storing, What the Anti-Federalists Were For, in 1 The Complete Antifederalist 19 (Herbert J. Storing ed. 1981). As Laura I. Appleman has put it, “the right of the jury trial” is about “the participation of the citizenry in [the] rule of law.”244See Laura I. Appleman, The Lost Meaning of the Jury Trial Right, 84 Ind. L.J. 397, 413 (2009); see also id. (noting that juries play an invaluable role for “the local community and to the people at large”); accord Stephen A. Siegel, The Constitution on Trial: Article III’s Jury Trial Provision, Originalism, and the Problem of Motivated Reasoning, 52 Santa Clara L. Rev. 373 (2012); Meghan J. Ryan, Juries and the Criminal Constitution, 65 Ala. L. Rev. 849, 882 (2014); George C. Harris, The Communitarian Function of the Criminal Jury Trial and the Rights of the Accused, 74 Neb. L. Rev. 804 (1995). This feature of the jury—as a key means of community involvement in the law’s implementation—is reflected in the fact that a defendant has no federal constitutional right to waive a jury trial, even if a defendant can demand one.245U.S. Const. amend. VI (“In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed . . . .”); Singer v. United States, 380 U.S. 24, 34 (1965) (“[T]here is no federally recognized right to a criminal trial before a judge sitting alone.”). Some states do grant defendants a right to demand a bench trial as a matter of state law. See, e.g., Md. Code Ann., Crim. § 4-246 (West 2023) (“A defendant may waive the right to a trial by jury at any time before the commencement of trial . . . .”). Prosecutors and courts generally can demand jury trials even over the defendant’s objection.246See, e.g., Singer, 380 U.S. at 24–26 (upholding Rule 23(a) of the Federal Rules of Criminal Procedure, which requires the government to consent to and the court to approve a defendant’s waiver of a jury trial); Fla. R. Crim. P. 3.260 (“A defendant may in writing waive a jury trial with the consent of the state.”); Ky. R. Crim. P. 9.26 (“Cases required to be tried by jury shall be so tried unless the defendant waives a jury trial in writing with the approval of the court and the consent of the Commonwealth.”); State v. Greenwood, 297 P.3d 556, 558–59 (Utah 2012) (holding that a trial court erred when granting a defendant’s request for a bench trial over the prosecution’s objection); State v. Burks, 674 N.W.2d 640, 647 (Wis. Ct. App. 2003) (permitting the trial judge to insist on a jury trial even when both the defense and prosecution prefer a non-jury trial). Today, as in the past, there is a “strong preference for jury trials on all elements of a criminal case.”247Rodgers v. Commonwealth, 285 S.W.3d 740, 755 (Ky. 2009) (emphasis added).

Accuracy is one important interest served by this longstanding commitment to juries, because “[j]uries . . . are considered the best deciders of fact.”248See Ryan, supra note 244, at 872; see also Paul F. Kirgis, The Right to a Jury Decision on Sentencing Facts After Booker: What the Seventh Amendment Can Teach the Sixth, 39 Ga. L. Rev. 895, 905 (2005) (“As our system has implicitly recognized for centuries, juries are simply the best actors to decide fact questions.”); Jenia Iontcheva, Jury Sentencing as Democratic Practice, 89 Va. L. Rev. 311, 339–343 (2003) (discussing the virtues of the jury as a deliberative democratic body); Colleen P. Murphy, Integrating the Constitutional Authority of Civil and Criminal Juries, 61 Geo. Wash. L. Rev. 723, 745 (1993) (“The Founders considered the jury to be superior to a single judge in finding facts because it embodied the common sense of twelve individuals with a variety of experiences and knowledge.”). This is in no small part because juries “are more representative of their communities than judges . . . . They better represent various races, socio-economic classes, various levels of formal education, differing religions, and a broader spectrum of political engagement than do judges.”249Ryan, supra note 244, at 878; see also Laura Gaston Dooley, Our Juries, Our Selves: The Power, Perception, and Politics of the Civil Jury, 80 Cornell L. Rev. 325, 325 (1995) (“[T]he modern jury is the most diverse of our democratic bodies.”). This is especially true when the task is assessing “matters reflecting their communities’ values,”250Ryan, supra note 244, at 878. See generally Andrew Guthrie Ferguson, Why Jury Duty Matters (2012) (discussing the value of juries and jury duty in the American democracy). like self-defense.

Self-defense is inherently fact-based, calling for answering difficult questions about the reasonableness of a defendant’s perception of—and violent response to—a threat. Evaluating the lawfulness of self-defense calls for an assessment of whether defensive force was reasonably necessary and proportionate to a reasonably perceived threat.251See Ruben, supra note 19, at 81–89 (discussing elements of necessity and proportionality in self-defense law); United States v. Peterson, 483 F.2d 1222, 1229 (D.C. Cir. 1973) (“ ‘[T]he law of self-defense is a law of necessity’; the right of self-defense arises only when the necessity begins, and equally ends with the necessity . . . .”). A counterargument to the claim that a jury is best placed to decide on self-defense reasonableness might be that judges already decide questions of reasonableness for other purposes, especially determining the lawfulness of searches and seizures under the Fourth Amendment, so why not do so for self-defense, too? However, judicial determination of reasonableness in the Fourth Amendment context is itself heavily criticized, not least because “judges are not representative of the societal standards upon which [such] questions are based, thus likely skewing judges’ conclusions.” Ryan, supra note 244, at 874; see also id. at 877 n.177 (collecting scholarship critical of judicial determinations of reasonableness in the Fourth Amendment context). Criminal law scholars devise complex classifications in an attempt to capture the permutations of defensive confrontations and how they intersect with the law of self-defense,252See, e.g., Larry Alexander, Recipe for a Theory of Self-Defense: The Ingredients, and Some Cooking Suggestions, in The Ethics of Self-Defense 20, at 21–28 (Christian Coons & Michael Weber eds., 2016) (categorizing those who might be involved in self-defense situations and affect the application of law to facts as the victim, a nonthreatened third party, a culpable aggressor, a culpable person, a culpable faker, an innocent aggressor, an anticipated innocent aggressor, and an innocent bystander). but it is impossible to resolve self-defense claims through any sort of rote analysis. It is necessary to apply community values and experiences to assess reasonableness, and judges, unlike juries, are often removed from both.253See Ryan, supra note 244, at 874 (noting that judges “are not representative of society, nor are they usually representative of the individual communities that they serve”); id. at 874–77 (surveying literature on judicial diversity). Simply because a jury is comprised of a cross-section of the community, the jury will incorporate perspectives and experiences that lead to a fair resolution of disputed facts more so than a single judge who is likely insulated from the circumstances that gave rise to the violence.

Moreover, importantly, community resolution of the difficult factual questions that go into self-defense can legitimate the law and promote acceptance of outcomes.254See Funk, supra note 108, at 49 (“[W]idely rejected self-defence decisions can adversely impact the broader public’s view of the legitimacy of the legal order.”); id. (“Self-defence outcomes that are broadly rejected as immoral threaten to incrementally erode the justice system’s moral credibility, undermine compliance with the law, and reduce cooperation with legal authorities.”). Precisely because “juries have the power to incorporate societal norms and values into their decisions . . . citizens can view these determinations as legitimate and as not influenced by the political leanings of government-employed judges.”255Ryan, supra note 244, at 881. That sense of legitimacy, in turn, can help a community accept a case’s outcome and move past the trauma of community violence.

For example, after the killing of Trayvon Martin, the quick decision not to prosecute George Zimmerman led to mass protests across the country.256Patrik Jonsson, George Zimmerman Charged in Trayvon Martin Case: Why Now, and What Next?, Christian Sci. Monitor (Apr. 11, 2012), https://www.csmonitor.com/USA/Justice/2012/0411/
George-Zimmerman-charged-in-Trayvon-Martin-case-Why-now-and-what-next [https://perma.cc/
VZ8T-7P28] (describing protests).
Many thought that the declination of charges suggested that “the criminal justice system was indifferent to Trayvon Martin’s death and was disinclined to try to provide justice.”257Markovitz, supra note 22, at 879–80 n.32. The fact that Martin was a Black teenager triggered speculation that race was part of the reason for not immediately prosecuting Zimmerman.258Id. This speculation is consistent with data: as one researcher found, “[w]ith respect to race, controlling for all other case attributes, the odds a white-on-black homicide is found justified is 281 percent greater than the odds a white-on-white homicide is found justified.” John K. Roman, Race, Justifiable Homicide, and Stand Your Ground Laws: Analysis of FBI Supplementary Homicide Report Data 9 (2013). If the homicide occurred in a state with a Stand Your Ground law, like Florida, that “increases the odds of a justifiable finding by 65 percent.” Id. at 9–10; see also Nicole Ackermann, Melody S. Goodman, Keon Gilbert, Cassandra Arroyo-Johnson & Marcello Pagano, Race, Law, and Health: Examination of “Stand Your Ground” and Defendant Convictions in Florida, 142 Soc. Sci. & Med. 194 (2015) (finding a defendant was two times as likely to be convicted for killing a white victim as a non-white victim under Florida’s 2005 self-defense law). When a special prosecutor subsequently charged Zimmerman, the move brought great relief. Martin’s mother commented that “[w]e simply wanted arrest, nothing more, nothing less, and we got it.”259Jonsson, supra note 256 (quoting Trayvon’s mother, Sybrina Fulton). Although many people who wanted a prosecution may have been disappointed by the jury verdict of not guilty, that the process was followed, and that the decision was rendered by a jury certainly lowered the temperature of the earlier protests.

Conversely, a prosecution’s dismissal because of immunity sends a very different signal to the community. Victims and family members can never know how a jury of their peers would decide on the legality of defensive force. Indeed, a homicide case in Utah elicited the opposite reaction after the defendant was discharged because of self-defense immunity.260See Rivera, supra note 182 (describing the discharge of Troy James Pexton). A family member of the victim of the alleged homicide exclaimed in court: “We all feel the justice system has no doubt failed us.”261Id. (quoting from court audio recordings). Another said: “This has forever changed my outlook on the system and the faith that I once had that justice would prevail.”262Id. Similarly, in Kansas, after a prosecutor declined to bring homicide charges against juvenile detention officers citing a self-defense immunity law, the victim’s family viewed the decision as “yet another instance of an unarmed Black teenager killed by law enforcement with impunity” and without “even an ounce of accountability.”263Ryan Newton, Laura McMillan & Stephanie Nutt, Sedgwick County Prosecutor: No Charges in Cedric Lofton’s Death, KSN.com (Jan. 18, 2022), https://www.ksn.com/news/local/watch-live-da-holds-news-conference-unknown-subject [https://perma.cc/LP62-X55D] (quoting statement from Cedric Lofton’s family). Likewise, a community partnership expressed “outrage[]” at the declination of charges, viewing it as a “blatant disregard for the life” of the victim.264Id. (quoting statement by the Progeny youth/adult partnership).

The denouncements above demonstrate that self-defense immunity can not only prevent a community from healing, but can also undermine the rule of law and faith in the judiciary. In this regard, it is notable that the criticism in such cases is not at the legislature for passing a self-defense immunity bill, or at the governor for signing it, but rather at the “justice system” that “no doubt failed.”265Rivera, supra note 182. Moreover, under the law of self-defense, the harm caused by defensive violence is supposed to “remain[] a legally recognized harm which is to be avoided whenever possible,”266Robinson, supra note 29, at 213. and the conduct underlying self-defense is supposed to “remain[] generally condemned and prohibited.”267Id. at 220. Immunity dilutes the force of such legal values and erodes trust that the judicial system will enforce them.

C.  Inefficient Mini-Trials

One counterargument to concerns about self-defense immunity is that it will only weed out rare, egregious prosecutions. In some places where self-defense immunity is already enacted, the defendant has the burden of proving self-defense at an immunity hearing,268See, e.g., People v. Guenther, 740 P.2d 971, 977 (Colo. 1987) (en banc). or, in the alternative, the prosecutor must only show probable cause that self-defense did not justify the defendant’s violence.269See, e.g., Rodgers v. Commonwealth, 285 S.W.3d 740, 754 (Ky. 2009); State v. Hardy, 390 P.3d 30, 39 (Kan. 2017). In those places, most self-defense cases might still proceed to trial. This, however, raises a question about judicial economy.

To be sure, the likely trajectory for self-defense immunity is for legislators to strengthen it, similar to how Florida recently placed the burden on prosecutors to disprove self-defense by clear and convincing evidence at a pretrial hearing.270See supra notes 159–61 and accompanying text. Since Florida has led the way for NRA-backed initiatives to be subsequently passed elsewhere,271See David Cole, Engines of Liberty: The Power of Citizen Activists to Make Constitutional Law 105 (2016) (“Florida has generally been the NRA’s starting line for legislative gun rights campaigns . . . .”). it is no surprise that when Utah passed its self-defense immunity law in spring 2021, a legislative sponsor said the law “basically copie[d] and paste[d]” the clear and convincing evidence standard “from Florida[’s] statute.”272Rivera, supra note 182 (quoting Rep. Karianne Lisonbee, R-Clearfield, on the floor of Utah’s House of Representatives); Utah Code Ann. § 76-2-309 (West 2021) (setting out clear and convincing evidence standard). Furthermore, even in jurisdictions with lesser prosecutorial immunity standards currently, immunity still sends troubling signals that could increase violence.273See supra Section III.A.

Setting aside these concerns and focusing narrowly on the argument that immunity will have little impact on prosecutions outside of rare cases, a question arises: Why undertake an expensive immunity hearing that will mirror the eventual trial at all? Two goals of the rules governing criminal procedure are to “secure simplicity of procedure” and “to eliminate unjustifiable expense.”274Fed. R. Crim. P. 2. Self-defense immunity runs counter to those goals.

In this regard, it is helpful to contrast self-defense with other pretrial issues discussed above,275See supra Section I.C. which generally implicate evidence that is both clear-cut and distinct from proof of guilt or innocence. Whether too much time has passed between criminal conduct and a prosecution so as to violate a statute of limitations, for example, may call only for simple arithmetic unrelated to the alleged offense conduct.276See Toussie v. United States, 397 U.S. 112, 114–15 (1970) (“The purpose of a statute of limitations is to limit exposure to criminal prosecution to a certain fixed period of time following the occurrence of those acts the legislature has decided to punish by criminal sanctions.”). The same could be said for speedy trial issues.277See United States v. Loud Hawk, 474 U.S. 302, 312 (1986) (“[T]he Sixth Amendment’s guarantee of a speedy trial ‘is an important safeguard to prevent undue and oppressive incarceration prior to trial, to minimize anxiety and concern accompanying public accusation and to limit the possibilities that long delay will impair the ability of an accused to defend himself.’ ” (quoting United States v. Ewell, 383 U.S. 116, 120 (1966))). Determining whether a pending prosecution is substantially the same as an earlier one, thereby violating double jeopardy protections, calls for a comparison of the two prosecutions.278See Brown v. Ohio, 432 U.S. 161, 165 (1977) (“The legislature remains free under the Double Jeopardy Clause to define crimes and fix punishments; but once the legislature has acted courts may not impose more than one punishment for the same offense and prosecutors ordinarily may not attempt to secure that punishment in more than one trial.”). And determining whether diplomatic immunity attaches often only requires inquiring into the defendant’s status as a diplomat and whether the sending state has waived the immunity.279See, e.g., United States v. Khobragade, 15 F. Supp. 3d 383, 385 (S.D.N.Y. 2014) (“With several exceptions not applicable here, diplomatic officers may not be arrested, detained, prosecuted or sued unless their immunity is waived by the sending state.”); see also Diplomatic and Consular Immunity, supra note 101, at 7–8 (“Diplomatic agents . . . enjoy complete immunity from the criminal jurisdiction of the host country’s courts and thus cannot be prosecuted no matter how serious the offense unless their immunity is waived by the sending state . . . .”).

Yet proving or disproving whether self-defense exculpates requires consideration of the same witnesses and evidence that will be introduced at trial to prove the charged crime. Indeed, this is implicit in affirmative defenses (like self-defense), which contend that something happening at the time of the alleged offense justified or excused the underlying conduct. Resolving the lawfulness of self-defense ahead of trial would call for delving into the circumstances surrounding the charged offense and receiving testimony from the same witnesses of the alleged crime who will testify at trial. Self-defense immunity hearings, when they do not result in a dismissal, involve “mini-trials of the evidence in advance of the actual trial” that criminal procedure typically seeks to avoid.280See, e.g., United States v. Bazezew, 783 F. Supp. 2d 160, 166 (D.D.C. 2011) (discussing preference to avoid mini-trials in the context of evidentiary disputes).

To be sure, adding costs and inefficiencies is not always inappropriate. Many scholars agree that grand juries are ineffective at eliminating bad prosecutions281See, e.g., Roger A. Fairfax Jr., Grand Jury Innovation: Toward a Functional Makeover of the Ancient Bulwark of Liberty, 19 Wm. & Mary Bill Rts. J. 339, 341–45 (2010) (summarizing critiques); Andrew D. Leipold, Why Grand Juries Do Not (and Cannot) Protect the Accused, 80 Cornell L. Rev. 260, 265–69 (1995). The classic cliché is that a grand jury would “indict a ham sandwich.” See In re Grand Jury Subpoena of Stewart, 545 N.Y.S.2d 974, 977 n.1 (Sup. Ct. 1989), aff’d as modified, 548 N.Y.S.2d 679 (App. Div. 1989) (“[M]any lawyers and judges have expressed skepticism concerning the power of the Grand Jury. This skepticism was best summarized by the Chief Judge of this state in 1985 when he publicly stated that a Grand Jury would indict a ‘ham sandwich.’ ”). and that the plea bargain system that is used to resolve the vast majority of criminal prosecutions creates injustices.282See Jenia I. Turner, Transparency in Plea Bargaining, 96 Notre Dame L. Rev. 973, 974 (2021) (“Today, over ninety-five percent of convictions at the state and federal levels are the product of guilty pleas.”); Jenia I. Turner, Plea Bargaining, in 3 Reforming Criminal Justice: Pretrial and Trial Processes 73, 80–88 (Erik Luna ed., 2017) (reviewing critiques of plea bargaining). Some scholars and advocates have thus suggested reforms that would be costly, like enhancing internal prosecutorial screening283See Ronald Wright & Marc Miller, The Screening/Bargaining Tradeoff, 55 Stan. L. Rev. 29, 30–35 (2002) (“By prosecutorial screening we mean a far more structured and reasoned charge selection process than is typical in most prosecutors’ offices in this country.”); see also Allen et al., supra note 76, at 1039 (“In a system that resolves a huge majority of cases without trials, the choice of how best to screen prosecutors’ charging decisions is critically important to the quality of justice the system delivers.”). or devising something akin to summary judgment for criminal procedure.284Carrie Leonetti, When the Emperor Has No Clothes: A Proposal for Defensive Summary Judgment in Criminal Cases, 84 S. Cal. L. Rev. 661, 666, 685 n.105 (2011). But self-defense immunity is extrinsic to that broader conversation, which is about how to improve the pretrial process for all issues bearing on guilt and innocence, and for all defendants. Self-defense immunity grants a benefit for one defense championed by powerful lobbyists. That may explain why self-defense immunity is passing in legislatures, but it hardly rationalizes the costs.

CONCLUSION

A central goal of this Article is to show that the exceptionalism reflected in self-defense immunity laws is not rooted in history, tradition, or longstanding priorities of criminal law and procedure. Self-defense has always been an affirmative defense, embedded in a system of defenses and vindicated through the same criminal justice process as other defenses. Those pursuing self-defense immunity have thus far failed to put forward a compelling rationale for a radical departure from legal tradition. Self-defense should remain unexceptional within the system of criminal law defenses to avoid the unwarranted harms that can come from immunizing private violence.

96 S. Cal. L. Rev. 509

Download

* Associate Professor, SMU Dedman School of Law; Fellow, Brennan Center for Justice at N.Y.U. School of Law. Many thanks to Hillel Bavli, Joseph Blocher, Jake Charles, Guillermo Jose Garcia Sanchez, Chris Jenks, Cynthia Lee, Pamela Metzger, Darrell A. H. Miller, Adam Sopko, Jenia Iontcheva Turner, and Cynthia Ward, as well as participants in the U.C. Davis Law Review’s 2021 symposium, for helpful comments and suggestions. Tiereney Bowman, Robert Larkin, Maggie Gianvecchio, Darby O’Grady, Meredith Palmer, and Nick Salinaro provided excellent research assistance.

Suing SPACs

In 2020, the financial world became transfixed by a massive increase in the number of firms going public through special

Read More »

Overturning Override: Why Executing a Person Sentenced to Death By Judicial Override Violates the Eighth Amendment

INTRODUCTION

Judicial override is a practice by which a judge overrules a sentence decided by a jury. Perhaps the most alarming, infamous, and controversial form of judicial override occurs when a judge overrules a jury’s recommendation for life imprisonment and replaces it with the death penalty. The use of judicial override in capital punishment cases has only ever been allowed in four states: Alabama, Delaware, Florida, and Indiana.[1] As of 2017, all four of these states have officially abandoned the practice. However, thirty-five individuals who were sentenced to death via judicial override remain on death row awaiting execution.[2] Today, their lives hang in the balance as the following constitutional question remains: Does the execution of a person sentenced to death by judicial override violate the Eighth Amendment of the United States Constitution?

This Note argues that executing these thirty-five individuals who were sentenced to death by judicial override would, in fact, be a “cruel and unusual” punishment under the Eighth Amendment and thus unconstitutional. Importantly, this Note is not arguing that the death penalty itself is unconstitutional; rather, the Note’s argument is centered around the specific constitutional issue of execution as the direct result of the pre-2017 practice of judicial override.

This Note’s argument proceeds in the following stages. Part I provides background information regarding the history of judicial override in four different states, a summary of relevant United States Supreme Court precedent, an overview of the Eighth Amendment to the United States Constitution, and the Court’s previous interpretations of the meaning of “cruel and unusual punishments.” Part II asserts that a punishment of death by judicial override is more objectionable than the death penalty itself, emphasizes the importance of jury sentencing, and calls attention to the presence of racial bias in judicial override. Additionally, Part II argues that the execution of a person sentenced to death by judicial override violates the Eighth Amendment under multiple constitutional theories, including living constitutionalism, the moral reading of the Constitution, and originalism. Part III briefly addresses counterarguments concerning adherence to Supreme Court precedent and federalism, and Part V concludes this Note by suggesting two potential solutions to the issue at bar.

          [1].      Michael L. Radelet, Overriding Jury Sentencing Recommendations in Florida Capital Cases: An Update and Possible Half-Requiem, 2011 Mich. St. L. Rev. 793, 794 (2011); Petition for Writ of Certiorari at 5, McMillan v. Alabama, 141 S. Ct. 876 (2020) (No. 20-193).

          [2].      Petition for Writ of Certiorari, supra note 1, at 6.

* Executive Senior Editor, Southern California Law Review, Volume 95; J.D. Candidate 2022, University of Southern California Gould School of Law; B.A. Political Science 2018, University of California, Los Angeles. Thank you to Gonzo for your unwavering support throughout my law school journey. I am also grateful to Professor Rebecca Brown for her guidance during this Note’s development. Finally, thank you to all of the Southern California Law Review editors for spending countless hours on the publication process.

 

Provisional Assumptions

In courtrooms, the law often asks individuals to ignore information—carefully, purposely—that otherwise feels important. Juries, for example, are often asked

Read More »

Crack Taxes and The Dangers of Insidious Regulatory Taxes

An unheralded weapon in the War on Drugs can be found in state tax codes: many states impose targeted taxes on individuals for the possession and sale of controlled substances. These “crack taxes” provide state officials with a powerful means of sanctioning individuals without providing those individuals the protections of the criminal law. Further, these taxes largely escape public scrutiny, which can contribute to overregulation and uneven enforcement.

The controlled substance taxes highlight the allure to lawmakers of using tax law to regulate behavior, but also the potential dangers of doing so. Surprisingly, the judiciary has an underappreciated role in creating the allure of regulatory taxes. Because courts apply less scrutiny to taxes than to other types of laws, regulatory taxes get a blank check when challenged, incentivizing their use. Courts must reconfigure the way they approach regulatory taxes to remove the judicially created incentive for insidious regulatory taxes like controlled substance taxes.

Introduction

“ ‘It was going through the mail and the mail lady smelled it and called the police . . . . I’m not ever gonna get out from underneath this, ever, not unless I win the lottery and become a millionaire’ . . . .”[1] The North Carolina woman offering these statements was troubled not by her arrest and charge of attempted drug trafficking, but by the twenty-thousand-dollar tax assessment she received for possessing controlled substances (that is, illegal drugs). North Carolina brings in millions of dollars from its so-called “crack tax”[2] or “Al Capone law”[3] each year,[4] and several other states use similar taxes on the possession and sale of controlled substances to further regulate already criminalized activities.[5]

The idea of taxes as a weapon in the War on Drugs may seem surprising, but perhaps it is predictable that lawmakers wanting to look tough on drugs would co-opt tax law in this way. More surprising though is the underappreciated role courts have in incentivizing lawmakers to enact controlled substance taxes and other regulatory taxes to achieve their goals.

How do courts incentivize the enactment of regulatory taxes? At its core, the answer to this question is a story of veiled consequences of elevating form over substance. Courts have habitually treated tax laws with the utmost respect,[6] resulting in a privileged regime of relaxed judicial scrutiny for taxes.[7] Governments must raise revenue, and taxation is a powerful tool to raise that revenue from whatever members of society lawmakers see fit. Unelected judges, the line of thinking goes, should be hesitant to upset these fundamentally political decisions.[8] This hesitancy has pushed courts to be exceedingly cautious when examining laws labeled “taxes.”

In addition to their revenue-raising role, taxes have also long been recognized as legitimate and powerful tools to regulate behavior.[9] One might expect courts to heighten their scrutiny of taxes with intentional regulatory goals (as opposed to mere revenue-raising taxes) to ensure that the interests of regulated individuals are appropriately considered. However, this is rarely the case, even when the taxes’ revenue goals are insignificant compared with their regulatory goals.[10]

In short, as critics of “tax exceptionalism”—the idea that tax law is categorically different from other areas of law and should be treated so—have long observed and frequently lamented, courts often employ a unique approach to analyzing tax laws.[11] Once a court determines that laws are tax laws, those laws become privileged before the judiciary, even when the laws have intentional regulatory effects.[12] This subtle elevation of form (tax law) over substance (regulatory effects) results in the judicially created incentive for lawmakers to pursue their regulatory goals through taxation rather than through direct regulation: taxes will not face as much scrutiny from courts.[13]

Lawmakers have noticed and responded, using taxes to achieve regulatory goals where other laws might receive more scrutiny from courts.[14] Though this phenomenon may appear benign, it can generate serious harms for individuals, as controlled substance taxes illustrate.[15] By adopting the taxes rather than increasing existing criminal sanctions, lawmakers impose punishment on those possessing and selling controlled substances without running up against legal protections for criminal defendants.[16] Even those people who would be acquitted under the criminal law can still be sanctioned for their behavior through these insidious regulatory taxes.[17] Thus, controlled substance taxes are a potentially powerful and unchecked weapon in the War on Drugs. Given the biased manner in which the War on Drugs has been carried out,[18] skirting protections for individuals is particularly concerning, as tax law becomes a tool of state oppression of overpoliced communities.[19]

The harms of these taxes do not stop with those cavalierly imposed on individuals. Regulatory taxes like controlled substance taxes also impose stealth costs on society because they are less effective than their direct regulation alternatives.[20] For example, controlled substance taxes are often burdensome laws for tax authorities to administer, making the taxes a costly alternative to laws directly regulating controlled substances, which are enforced by those more familiar with the substances.[21] Further highlighting the insidious nature of these taxes, they also obscure the total amount of regulation that an activity is subject to by remaining out of public view, leading to harmful overregulation that is difficult to address.[22]

Despite the dangers of regulatory taxes like controlled substance taxes, these insidious taxes have gone largely unnoticed in the tax literature. Rather, tax scholars have focused on the relative substantive strengths of taxation versus direct regulation when analyzing the best options for achieving regulatory goals.[23] Literature regarding the related phenomena of fines and civil forfeiture laws has not considered the unique situation of tax laws before the courts.[24] In short, the role of judicial deference regimes in tilting the scales toward regulatory taxes and the resulting consequences for individuals and society are underappreciated. This Article is the first to home in on these issues,[25] analyzing them and demonstrating how courts should take them into account to correct for the inadvertent judicial incentive for lawmakers to enact insidious regulatory taxes.

Courts can remove this incentive and head off future insidious regulatory taxes by recognizing the potential for these taxes to exist and placing such taxes under more scrutiny when exposed.[26] This Article builds on scholarly developments in modern tax expenditure analysis—which explores the role of taxes as a tool for achieving regulatory goals[27]—to propose an analytical framework for uncovering insidious regulatory taxes. A comparatively weak tax law passed to take advantage of the privileged judicial scrutiny regime for taxes is an insidious regulatory tax, and, once that tax is uncovered through the proposed analysis, a court should scrutinize the tax as it would a similar direct regulation.

Controlled substance taxes offer a prime example of insidious regulatory taxes and their dangers, but not all regulatory taxes are insidious. Regulatory taxes like carbon taxes that are more effective than their direct regulation counterparts are substantively justified and do not raise the concerns associated with insidious regulatory taxes.[28] However, as regulatory taxes continue to become more prevalent,[29] the proposed framework will become more crucial to aid courts in separating the insidious regulatory taxes in need of heightened scrutiny from the unobjectionable ones.

The Article proceeds in three parts. Part I provides background on controlled substance taxes and the judicial privilege granted to all types of taxes. The resulting allure of regulatory taxes can be too much for lawmakers to ignore, resulting in the enactment of insidious regulatory taxes like controlled substance taxes. Part II then details the dangers of insidious regulatory taxes in more depth, exposing the problems created by the judiciary’s current approach to taxes. Finally, Part III fleshes out the proposed framework for analyzing tax laws to remove the judicially created incentive for insidious regulatory taxes, using the controlled substance taxes as a case study to illustrate the framework’s operation.

          [1].      Michael Hennessey, Inside the North Carolina Law Requiring Drug Dealers to Pay Taxes, myfox8.com (May 10, 2019, 10:21 AM), https://myfox8.com/news/inside-the-north-carolina-law-requiring-drug-dealers-to-pay-taxes [https://perma.cc/DT5B-NDPS].

          [2].      See Jeremy M. Vaida, The Altered State of American Drug Taxes, 68 Tax Law. 761, 787 (2015).

          [3].      See Anne Barnard, In Taxing Illegal Drugs, the Trouble Comes in Collecting, N.Y. Times (Jan. 24, 2008), https://www.nytimes.com/2008/01/24/nyregion/24drugs.html [https://perma.cc/PMS5-YBU
7] (quoting an associate of the Federation of Tax Administrators describing the taxes as hearkening to “the Al Capone model”); Christopher Paul Sorrow, The New Al Capone Laws and the Double Jeopardy Implications of Taxing Illegal Drugs, 4 S. Cal. Interdisc. L.J. 323, 323 (1995); Christina Joyce, Expanding the War Against Drugs: Taxing Marijuana and Controlled Substances, 12 Hamline J. Pub. L. & Pol’y 231, 239 (1991).

          [4].      See N.C. Dep’t of Revenue, Statistical Abstract of North Carolina Taxes 2019 tbl. 15 (2019) (showing tax revenues ranging from approximately $6.5 million to approximately $11.5 million for fiscal years 2005 through 2019 from the state’s controlled substance tax, which includes taxes on illicit liquors in addition to illicit drugs).

          [5].      See infra note 34.

          [6].      See infra Section I.B.

          [7].      See, e.g., Eric Kades, Drawing the Line Between Taxes and Takings: The Continuous Burdens Principle, and Its Broader Application, 97 Nw. U. L. Rev. 189, 192 (2002) (“At times, judges and legal commentators have declared that Congress’ power to tax is beyond constitutional review.”).

          [8].      See Nat’l Fed’n of Indep. Bus. v. Sebelius, 567 U.S. 519, 531-32 (2012) (“We do not consider whether the Act embodies sound policies. That judgment is entrusted to the Nation’s elected leaders.”). As Justice Felix Frankfurter articulated,

[Governments] need the amplest scope for energy and individuality in dealing with the myriad problems created by our complex industrial civilization. They need wide latitude in devising ways and means for paying the bills of society and in using taxation as an instrument of social policy. Taxation is never palatable, and its exercise should not be subjected to finicky or pedantic arguments based on abstractions.

Felix Frankfurter, The Public and Its Government 48-49 (1930).

          [9].      See infra note 30.

        [10].      See infra Section I.B.

        [11].      See, e.g., Alice G. Abreu & Richard K. Greenstein, Tax: Different, Not Exceptional, 71 Admin. L. Rev. 663, 663-64 (2019) (surveying tax exceptionalism scholarship and arguing that tax is not different in kind from other types of law and should not be analyzed as though it were); Paul L. Caron, Tax Myopia, or Mamas Don’t Let Your Babies Grow Up to Be Tax Lawyers, 13 Va. Tax Rev. 517, 518-31 (1994) (highlighting and criticizing the perception that tax law is different from other areas of law).

        [12].      See, e.g., Gillian E. Metzger, To Tax, to Spend, to Regulate, 126 Harv. L. Rev. 83, 90 (2012). Part of the opinion from Department of Revenue of Montana v. Kurth Ranch illuminates this claim. While observing that taxes are subject to constitutional constraints, as are criminal fines and civil penalties, the Court notes demanding constraints for criminal sanctions and relatively trivial constraints for taxes, even if those taxes fall on the same criminal activities as the criminal sanctions do. Dep’t of Revenue of Mont. v. Kurth Ranch, 511 U.S. 767, 778 (1994).

        [13].      See infra Section I.B.

        [14].      See Michael S. Kirsch, Alternative Sanctions and the Federal Tax Law: Symbols, Shaming, and Social Norm Management as a Substitute for Effective Tax Policy, 89 Iowa L. Rev. 863, 865–66 (2004) (describing how federal tax laws are used for regulatory goals); Stanley S. Surrey & Paul R. McDaniel, The Tax Expenditure Concept: Current Developments and Emerging Issues, 20 B.C. L. Rev. 225, 247 (1979) (describing how taxes have been used when direct regulations might be unconstitutional or difficult to enact). See generally R.A. Lee, A History of Regulatory Taxation (1973). Lee examines a number of federal taxes with regulatory effects in his work. In describing the historical context and creation of each tax, Lee uncovers the statements of many members of Congress demonstrating their understanding that they could achieve their goals in a less constitutionally suspect manner by using the taxes instead of direct regulations. For example, in detailing a proposed federal tax on grain futures in 1921, Lee describes a discussion in which Congressman Marvin Jones opined that “if that approach [of direct regulation] were used . . . ‘a constitutional question might arise’ but the Supreme Court had ‘allowed us to go a long ways in the taxing power,’ so he believed this was the ‘wiser method.’ ” Id. at 73. In a later passage, Lee describes a 1937 House Ways and Means Committee Report as finding that “ ‘the law is well settled’ that a regulatory tax, although controlling a subject reserved to state jurisdiction, would be valid ‘if it appears on its face to be a revenue measure.’ ” Id. at 182.

        [15].      See infra Part II.

        [16].      See infra notes 117-22 and accompanying text.

        [17].      See, e.g., Barnard, supra note 3 (reporting comments of a tax administrator recognizing the potential for the taxes to impose punishment when criminal sanctions cannot); Robert E. Tomasson, 21 States Imposing Drug Tax and Then Fining the Evaders, N.Y. Times (Dec. 23, 1990), https://www.
nytimes.com/1990/12/23/us/21-states-imposing-drug-tax-and-then-fining-the-evaders.html [https://per
ma.cc/VD68-HAJF] (reporting on controlled substance taxes as effective tools in combatting illegal drug sales because of their ability to avoid the protections afforded to criminal defendants).

        [18].      See authorities cited infra note 125.

        [19].      Indeed, the taxes are often enforced only against individuals charged with violations of criminal controlled substance laws. See authorities cited infra note 57.

        [20].      See infra Section II.B.

        [21].      See infra Section III.A.2.

        [22].      See infra Section II.C.

        [23].      See, e.g., Stanley S. Surrey, Pathways to Tax Reform: The Concept of Tax Expenditures 148-54 (1973) (discussing tax expenditures and the choice between taxation and spending programs); Surrey & McDaniel, supra note 14, at 227-28 (same); David A. Weisbach & Jacob Nussim, The Integration of Tax and Spending Programs, 113 Yale L.J. 955, 959-64 (2004) (same); Eric J. Toder, Tax Cuts or Spending—Does It Make a Difference?, 53 Nat’l Tax J. 361, 361-63 (2000) (same); Edward A. Zelinsky, James Madison and Public Choice at Gucci Gulch: A Procedural Defense of Tax Expenditures and Tax Institutions, 102 Yale L.J. 1165, 1165-67 (1993) (same); Eric M. Zolt, Deterrence Via Taxation: A Critical Analysis of Tax Penalty Provisions, 37 UCLA L. Rev. 343, 348 (1989) (same).

        [24].      See, e.g., Ariel Jurow Kleiman, Nonmarket Criminal Justice Fees, 72 Hastings L.J. 517, 520 (2021) (detailing similar issues surrounding criminal fees); Beth A. Colgan, Fines, Fees, and Forfeitures, 18 Criminology, Crim. Just., L. & Soc’y 22, 28 (2017) (detailing the use of fines, fees, and forfeitures as sanctions for criminalized activities); Suellen M. Wolfe, Recovery from Halper: The Pain from Additions to Tax Is Not the Sting of Punishment, 25 Hofstra L. Rev. 161, 197 (1996) (detailing similar issues surrounding civil forfeiture laws); Kenneth Mann, Punitive Civil Sanctions: The Middleground Between Criminal and Civil Law, 101 Yale L.J. 1795, 1799-1800, 1802, 1870 (1992) (observing the harms of failing to provide protections for individuals subject to civil state sanctions); Marc B. Stahl, Asset Forfeiture, Burdens of Proof and the War on Drugs, 83 J. Crim. L. & Criminology 274, 274-79 (1992) (critiquing civil forfeiture laws).

        [25].      As far back as 1979, Stanley Surrey, former Assistant Secretary of the Treasury for Tax Policy, predicted that “Congress, by inserting spending programs in the tax law, essentially has forced the courts to apply to tax law the legal provisions hitherto imposed on direct spending.” Stanley S. Surrey, Tax Expenditure Analysis: The Concept and Its Uses, 1 Can. Tax’n 3, 9 (1979) [hereinafter Surrey, Tax Expenditure Analysis]; see also Surrey, supra note 23, at 46-47; Surrey & McDaniel, supra note 14, at 246. Though this prediction seemed based on Surrey’s conclusion that “tax expenditures”—the normatively unnecessary provisions of tax law designed to achieve regulatory results—should not be entitled to the privilege given to revenue-raising tax provisions, Surrey and others since have not fully analyzed the issue of judicial scrutiny of regulatory taxes and its implications. This Article fills that void.

                   As an aside, Surrey’s prediction may have come true in some cases regarding special tax breaks offered in lieu of direct spending. See, e.g., Espinoza v. Mont. Dep’t of Revenue, 140 S. Ct. 2246, 2260-61 (2020) (holding tax credits for education to the same level of scrutiny under the Free Exercise Clause as direct spending measures); Mueller v. Allen, 463 U.S. 388, 393-404 (1983) (holding tax breaks to the same level of scrutiny under the Establishment Clause as direct spending measures). However, surely Surrey would be surprised to find that his prediction has largely failed to materialize in the case of tax laws used in lieu of direct regulations. Rather, courts have continued to privilege tax laws regardless of the regulatory effects those taxes might have.

        [26].      See infra Section III.A.4.

        [27].      See generally Weisbach & Nussim, supra note 23 (laying the foundation for modern tax expenditure analysis, which focuses on the comparative institutional competencies of taxes and direct spending measures); see also infra notes 151-62 and accompanying text.

        [28].      See generally Shi-Ling Hsu, The Case for a Carbon Tax: Getting past Our Hang-Ups to Effective Climate Policy (2011) (comparing economic, social, administrative, and political merits of carbon taxes versus direct regulations and concluding that a tax would be the most effective policy); Reuven S. Avi-Yonah & David M. Uhlmann, Combating Global Climate Change: Why a Carbon Tax Is a Better Response to Global Warming than Cap and Trade, 28 Stan. Envtl. L.J. 3, 6-8 (2009) (similar).

        [29].      See, e.g., Lucy Dadayan, Tax Pol’y Ctr., Are States Betting on Sin? The Murky Future of State Taxation 3-4 (2019), https://www.taxpolicycenter.org/publications/are-states-betting-sin-murky-future-state-taxation/full [https://perma.cc/K6AX-5D4C] (reporting upward trends in the imposition of “sin taxes” on unwanted behaviors); Rachelle Holmes Perkins, Salience and Sin: Designing Taxes in the New Sin Era, 2014 BYU L. Rev. 143, 145 (2014) (describing increasing use of sin taxes).

*      Associate Professor, University of Richmond School of Law. For their helpful thoughts and comments, I would like to thank my outstanding colleagues at the University of Richmond and the participants in the 2019 Junior Tax Scholars Workshop, the 2019 Junior Faculty Forum, and the 2021 AALS New Voices in Taxation program. I owe specific thanks to Aravind Boddupalli, Beth Colgan, Erin Collins, Jim Gibson, Ari Glogower, Mary Heen, Dick Kaplan, Ariel Jurow Kleiman, Corinna Lain, Sarah Lawsky, Ruth Mason, Lukely Norris, Tracey Roberts, Erin Scharff, and Allison Tait. I am indebted to Chris Marple, Tyler Moses, and Whitney Nelson for their excellent assistance with research.     

Civil vs. Criminal Legal Aid

The past few decades have highlighted the insidious effects of poverty, particularly for poor people who lack access to legal representation. Accordingly, there have been longstanding calls for “Civil Gideon,” which refers to a right to counsel in civil cases that would address issues tied to housing, public benefits, family issues, and various areas of law that poor people are often disadvantaged by due to their lack of attorneys. This civil right to counsel would complement the analogous criminal right that has been constitutionalized. Notwithstanding the persuasive arguments made for and against Civil Gideon, it is less clear why there is such a sharp distinction between civil and criminal legal aid. This Article re-examines longstanding assumptions about the civil-criminal legal aid divide and highlights some underexamined explanations: the legal profession’s historical implication in this division; courts’ unwillingness to use their inherent powers to appoint counsel; and courts’ enduringly narrow understandings of when poor people should be provided with lawyers. These insights prompt alternative reflections on how to best deliver legal services to poor people.

*                Presidential Assistant Professor of Law, University of Pennsylvania Law School. J.D., University of California, Berkeley, School of Law; Ph.D., University of California, Berkeley; M.L.A., University of Pennsylvania; B.S. Northwestern University. This Article benefitted from feedback and conversations with Guy-Uriel Charles, Scott Cummings, Anne Fleming, Trevor Gardner, Myriam Gilles, Helen Hershkoff, Olati Johnson, Steve Koh, Seth Kreimer, Serena Mayeri, K-Sue Park, Clare Pastore, Portia Pedro, Dave Pozen, Dan Richman, Louis Rulli, Kathryn Sabbeth, Matt Shapiro, Emily Stolzenberg, and Catherine Struve. Special thanks to Megan Russo and Madeline Verniero for editorial support and Alexa Nakamura, Amy Lutfi, and the Southern California Law Review staff for their overall assistance with the Article. All errors are mine.

Prosecutors and Mass Incarceration by

Article | Criminal Law
Prosecutors and Mass Incarceration
by Shima Baradaran Baughman* & Megan S. Wright†

From Vol. 94, No. 5 (2020)
94 S. Cal. L. Rev. 1123 (2020)

Keywords: Prosecutor Discretion, Charging

 

It has long been postulated that America’s mass incarceration phenomenon is driven by increased drug arrests, draconian sentencing, and the growth of the prison industry. Yet among the major players—legislators, judges, police, and prosecutors—one of these is shrouded in mystery. While laws on the books, judicial sentencing, and police arrests are all public and transparent, prosecutorial charging decisions are made behind closed doors with little oversight or public accountability. Indeed, without notice by commentators, during the last ten years or more, crime has fallen, and police have cut arrests accordingly, but prosecutors have actually increased the ratio of criminal court filings per arrest. Why? This Article presents quantitative and qualitative data from the first randomized controlled experiment studying how prosecutors nationally decide whether to charge a defendant. We find rampant variation and multiple charges for a single crime along with the lowest rates of declination in a national study. Crosscutting this empirical analysis is an exploration of Supreme Court and prosecutor standards that help guide prosecutorial decisions. This novel approach makes important discoveries about prosecutorial charging that are critical to understanding mass incarceration.

 

 

          *     Associate Dean of Faculty Research and Development, Presidential Scholar and Professor of Law, University of Utah College of Law. We thank the Yale University Institution for Social and Policy Studies for their support of this project (Yale ISPS ID P20-001). Christopher Robertson was critical to the underlying empirical work discussed in this Article. We appreciate the feedback received at the Annual Center for Empirical Legal Studies Conference hosted at the University of Michigan. Special thanks to John Rappaport, Sonja Starr, Rachel Barkow, Carissa Hessick, Darryl Brown, Sim Gill, Andrew Ferguson, Jeffrey Bellin, L. Song Richardson, Cathy Hwang, Andy Hessick, Christopher Griffin, Ron Wright, and John Pfaff. We appreciate the comments of the Rocky Mountain Junior Conference, and the University of Utah faculty research grant for making this research possible. I am grateful for research assistance from Jacqueline Rosen, Alyssa Campbell, Amylia Brown, Carley Herrick, Tyler Hubbard, Emily Mabey, Olivia Ortiz, Haden Gobel, Hope Collins, Rebekah Watts, Melissa Bernstein, Alicia Brillon, Kerry Lohmeier and Ross McPhail. I am grateful for the careful editing from the Southern California Law Review staff and editors, especially Caleb Downs, Tia Kerkhof, Mindy Vo, and Samuel Clark-Clough. I am especially thankful for empirical support from Jessica Morrill. We are thankful to all of the prosecutors who nationally participated in this experiment. IRB 69654 (University of Utah).

   †        Assistant Professor of Law, Medicine, and Sociology, Penn State Law and Penn State College of Medicine; Adjunct Assistant Professor of Medical Ethics in Medicine at Weill Cornell Medical College. Thanks to Laureen O’Brien, Ellen Hill, Leann Jones, Danielle Curtin, and Joseph Radochonski for research assistance during data collection. Thanks to Veronica Rosenberger for assistance with qualitative data analysis.

 

 

View Full PDF