Public Protest and Governmental Immunities

This Article presents the findings of a quantitative and qualitative study of the application of qualified immunity and other governmental immunities in the context of public protest. Relying on three unique datasets of federal court decisions examining First Amendment and Fourth Amendment claims, the Article concludes that public protester plaintiffs face an array of obstacles when suing state, local, and federal officials for constitutional injuries. Quantitative findings show that protesters’ claims are frequently dismissed under qualified immunity doctrines and that plaintiffs also face strict limits on municipal liability, new restrictions on First Amendment retaliation claims, and the possible extinction of monetary actions against federal officials. Qualitatively, the study shows protesters’ rights are underdeveloped in several respects, including recognition of the right to record law enforcement and limits on law enforcement’s use of force. The study lends additional support and new urgency to calls for qualified immunity reform or repeal, as well as reconsideration of other governmental immunities. It also concludes that much more than money damages for injured plaintiffs is at stake. Lack of adequate civil remedies may significantly chill future public protest organizing and participation.

INTRODUCTION

Between January 2020 and June 2021, there were more than thirty thousand public demonstrations in the United States.1See Armed Assembly: Guns, Demonstrations, and Political Violence in America, Everytown for Gun Safety Support Fund (Aug. 23, 2021), https://everytownresearch.org/report/armed-assembly-guns-demonstrations-and-political-violence-in-america [https://perma.cc/25AY-SGR3]. In what were perhaps the largest public protests in American history, an estimated fifteen to twenty-six million protesters gathered in the nation’s public streets after George Floyd’s murder.2Larry Buchanan, Quoctrung Bui & Jugal K. Patel, Black Lives Matter May Be the Largest Movement in U.S. History, N.Y. Times (July 3, 2020), https://www.nytimes.com/interactive/2020/07/03/us/george-floyd-protests-crowd-size.html [https://web.archive.org/web/20200703122637/https://www.nytimes.com/interactive/2020/07/03/us/george-floyd-protests-crowd-size.html]. Although the demonstrations were predominantly peaceful, state and local law enforcement used aggressive policing methods to restrict and suppress them.3See Talia Buford, Lucas Waldron, Moiz Syed & Al Shaw, We Reviewed Police Tactics Seen in Nearly 400 Protest Videos. Here’s What We Found., ProPublica (July 16, 2020), https://projects.propublica.org/protest-police-tactics [https://perma.cc/B72L-F66N] (finding officers punched, pushed, and kicked retreating protesters and used pepper spray, tear gas, and batons against non-combative demonstrators); Kim Barker, Mike Baker & Ali Watkins, In City After City, Police Mishandled Black Lives Matter Protests, N.Y. Times (Mar. 20, 2021), https://www.nytimes.com/2021/03/20/us/protests-policing-george-floyd.html [https://perma.cc/6NCZ-WWEB] (drawing similar conclusions). Officers beat protesters with batons, rammed them with bicycles, used dangerous crowd containment strategies, arrested protesters without probable cause, used tear gas and other “less-lethal” force against peaceful assemblies, and unlawfully arrested legal observers including members of the press.4Mark Berman & Emily Wax-Thibodeaux, Police Keep Using Force Against Peaceful Protesters, Prompting Sustained Criticism About Tactics and Training, Wash. Post (June 4, 2020, 1:02 PM), https://www.washingtonpost.com/national/police-keep-using-force-against-peaceful-protesters-prompting-sustained-criticism-about-tactics-and-training/2020/06/03/5d2f51d4-a5cf-11ea-bb20-ebf0921f3bbd_story.html [https://perma.cc/9QZQ-7VL9]; see Ashley Southall, N.Y. Attorney General Sues N.Y.P.D. Over Protests and Demands Monitor, N.Y. Times (Jan. 14, 2021), https://www.nytimes.com/2021/01/14/nyregion/nypd-police-protest-lawsuit.html [https://perma.cc/2RJG-6FZD] (discussing misconduct allegations against NYPD officers); see also Katelyn Burns, Police Targeted Journalists Covering the George Floyd Protests, Vox (May 31, 2020, 1:10 PM), https://www.vox.com/identities/2020/5/31/21276013/police-targeted-journalists-covering-george-floyd-protests [https://perma.cc/V5G7-PDK6]. In several cities, including Portland and the District of Columbia, federal law enforcement and other agency personnel also engaged in aggressive and violent protest policing.5For a critical account of the federal government’s response to the Black Lives Matter (“BLM”) racial justice protests, see Karen J. Greenberg, Subtle Tools: The Dismantling of American Democracy from the War on Terror to Donald Trump 145–72 (2021). See also Katie Shepherd & Mark Berman, ‘It Was Like Being Preyed Upon’: Portland Protesters Say Federal Officers in Unmarked Vans Are Detaining Them, Wash. Post (July 17, 2020, 8:24 PM), https://www.washingtonpost.com/nation/2020/07/17/portland-protests-federal-arrests [https://perma.cc/8H9N-MNJF]; Alex Ward, The Unmarked Federal Agents Arresting People in Portland, Explained, Vox (July 20, 2020, 6:30 PM), https://www.vox.com/2020/7/20/21328387/portland-protests-unmarked-arrest-trump-world [https://perma.cc/QMW9-7DYE]; Nicole Sganga, Federal Agents Sent to Portland in 2020 Were “Unprepared” to Quell Unrest, Watchdog Finds, CBS News (Apr. 21, 2021, 1:04 PM), https://www.cbsnews.com/news/portland-protests-2020-federal-agents-unprepared [https://perma.cc/4N2Z-NAWS]. Former President Donald Trump told state governors to “dominate” the protesters and send them to jail.6Matt Perez, Trump Tells Governors to ‘Dominate’ Protesters, ‘Put Them in Jail for 10 Years’, Forbes (June 1, 2020, 1:56 PM), https://www.forbes.com/sites/mattperez/2020/06/01/trump-tells-governors-to-dominate-protesters-put-them-in-jail-for-10-years [https://perma.cc/Z3JD-QERX].

Many of these law enforcement actions violated protesters’ First Amendment and Fourth Amendment rights. Protesters can sometimes obtain judicial injunctions preventing law enforcement from using such tactics in future protests.7See Abay v. City of Denver, 445 F. Supp. 3d 1286, 1294 (D. Colo. 2020) (granting a temporary restraining order (“TRO”) against police use of chemical agents and projectiles); Don’t Shoot Portland v. City of Portland, 465 F. Supp. 3d 1150, 1157 (D. Or. 2020) (granting a TRO against police use of tear gas against peaceful protesters); Black Lives Matter Seattle-King Cnty. v. City of Seattle, 466 F. Supp. 3d 1206, 1216 (W.D. Wash. 2020) (granting a TRO against police use of tear gas and pepper spray as crowd control measures); see also Brittnee Bui, Comment, Class Actions as a Check on LAPD: What Has Worked and What Has Not, 67 UCLA L. Rev. 432, 451–59 (2020). Police departments sometimes, though far too infrequently, discipline officers for violating constitutional rights and other misconduct.8See Troy Closson, N.Y.P.D. Should Discipline 145 Officers for Misconduct, Watchdog Says, N.Y. Times (May 11, 2022, 6:37 PM), https://www.nytimes.com/2022/05/11/nyregion/nypd-misconduct-george-floyd.html [https://web.archive.org/web/20220512004251/https://www.nytimes.com/2022/05/11/nyregion/nypd-misconduct-george-floyd.html]. However, injunctive relief and departmental discipline do not compensate for the physical and emotional injuries protesters experience at the hands of aggressive and sometimes violent law enforcement officers. As Joanna Schwartz has observed, “for many people, filing a lawsuit [for damages] is the best available way to punish police when they violate the law and give police reason not to violate the law again.”9Joanna Schwartz, Shielded: How the Police Became Untouchable xiii (2023). In a few instances, 2020 racial justice protesters sued individual officers and their municipal employers for damages and obtained significant monetary settlements or judgments. Daniel Politi, Jury Awards $14 Million to George Floyd Protesters Injured by Cops in Denver, Slate (Mar. 26, 2022, 10:04 AM), https://slate.com/news-and-politics/2022/03/jury-awards-14-million-george-floyd-protesters-denver.html [https://perma.cc/6686-AVEN].

Both 42 U.S.C. § 1983 (“section 1983”)10Section 1983 provides as follows:

Every person who, under color of any statute, ordinance, regulation, custom, or usage, of any State or Territory or the District of Columbia, subjects, or causes to be subjected, any citizen of the United States or other person within the jurisdiction thereof to the deprivation of any rights, privileges, or immunities secured by the Constitution and laws, shall be liable to the party injured in an action at law, suit in equity, or other proper proceeding for redress.

42 U.S.C. § 1983.
—a statute originally passed to assist the government in combating Ku Klux Klan violence in the South after the Civil War—and the Supreme Court’s decision in Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics11Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388 (1971). allow individuals to sue government officials for money damages for constitutional torts (personal injuries stemming from violations of constitutional rights). Section 1983 applies to state and local officials, while Bivens applies to federal officials. However, protesters face a daunting array of obstacles to recovering civil damages under these laws.12See generally Schwartz, supra note 9 (examining the many obstacles to recovery in civil rights lawsuits, including obtaining counsel, pleading rules, and governmental immunities). The constitutional standards that govern protesters’ underlying First Amendment and Fourth Amendment claims may offer less-than-robust substantive protection for protesters’ activities. But even with respect to some egregious violations of protesters’ constitutional rights, governments and government officials possess broad legal immunities that often prevent recovery of civil damages.

Under section 1983, unless officers violate what the Supreme Court has described as “clearly established law,” they cannot sue officials for money damages.13Harlow v. Fitzgerald, 457 U.S. 800, 818 (1982). The doctrine of “qualified immunity” shields “all but the plainly incompetent” law enforcement and other officials from liability.14Malley v. Briggs, 475 U.S. 335, 341 (1986). In general, plaintiffs cannot recover unless they can show that “controlling authority in their jurisdiction” or a “consensus of cases of persuasive authority” have recognized the underlying misconduct as a constitutional violation.15Wilson v. Layne, 526 U.S. 603, 617 (1999); see also Schwartz, supra note 9, at 76 (noting the requirement that plaintiffs point to “a prior case in which that precise conduct had been held unconstitutional”). Municipal employers, who have much deeper financial pockets than individual officers, cannot be held accountable unless plaintiffs can prove they adopted and enforced a “policy or custom” of violating protesters’ constitutional rights.16Monell v. Dep’t of Soc. Servs., 436 U.S. 658, 694–94 (1978). Although this evidence is hard to come by, plaintiffs are required to present it as early as the pleadings stage of a lawsuit.17See Schwartz, supra note 9, at 39–41 (discussing heightened pleading standards).

In recent years, the Supreme Court has further narrowed the circumstances in which local and federal officials can be sued for civil rights violations under section 1983 and Bivens. For example, in Nieves v. Bartlett, a 2019 decision, the Court held that so long as officers have probable cause to arrest protesters for some criminal offense, however minor, they cannot pursue a First Amendment claim that the officer retaliated against them for exercising expressive rights—unless they can prove law enforcement singled them out and treated them unequally.18Nieves v. Bartlett, 587 U.S. 391, 403, 407 (2019). With regard to Bivens suits against federal officials, the Court has assumed such claims can go forward, but has also strongly suggested they are unwarranted extensions of Bivens.19See Wood v. Moss, 572 U.S. 744, 757 (2014) (assuming Bivens extends to First Amendment claims); Reichle v. Howards, 566 U.S. 658, 663 n.4 (2012) (“We have never held that Bivens extends to First Amendment claims”); Bush v. Lucas, 462 U.S. 367, 390 (1983) (declining to extend Bivens to a claim sounding in the First Amendment); see also Egbert v. Boule, 142 S. Ct. 1793, 1807–08 (2022) (rejecting First Amendment “retaliation” claim under Bivens). If these claims are rejected, protesters will be barred from suing National Park Service officials, U.S. Capitol police officers, U.S. Secret Service agents, and other federal defendants for money damages in connection with protest policing.

Protesters whose constitutional rights are violated by law enforcement and other officials deserve to be compensated for their injuries. Further, as the 2020–2021 mass protests demonstrated, officials who violate First Amendment, Fourth Amendment, and other constitutional rights need to be deterred from doing so and held accountable.20See Schwartz, supra note 9, at xiv (“[Q]ualified immunity has come to represent all that is wrong with our system of police accountability.”). To the extent protesters believe officials cannot or will not be held fully accountable for even egregious and abusive constitutional violations, they may be chilled from exercising protest-related rights.

Despite the importance of these remedial and other concerns, there has been no systematic effort to measure the effects governmental immunities have on protesters’ ability to obtain compensation for their constitutional injuries.21One commentator has criticized qualified immunity doctrine as applied in recent protest cases involving claims of excessive force. See generally L. Darnell Weeden, Exploring Protest Rights, Unreasonable Police Conduct, and Qualified Immunity, 45 T. Marshall L. Rev. 167 (2021) (addressing a limited number of recent decisions without any quantitative analysis). To obtain a measure of these effects, this Article presents the findings of a unique quantitative and qualitative study. Unlike prior studies, which focused on qualified immunity across cases and contexts, this study focuses on the fate of First Amendment and Fourth Amendment claims brought by plaintiffs against state, local, and federal officials in public protest cases.22For prior qualified immunity studies, see generally Diana Hassel, Living a Lie: The Cost of Qualified Immunity, 64 Mo. L. Rev. 123 (1999) (studying federal cases over a two-year period); Nancy Leong, The Saucier Qualified Immunity Experiment: An Empirical Analysis, 36 Pepp. L. Rev. 667 (2009) (studying the disposition of qualified immunity defenses in district court cases); Greg Sobolski & Matt Steinberg, An Empirical Analysis of Section 1983 Qualified Immunity Actions and Implications of Pearson v. Callahan, 62 Stan. L. Rev. 523 (2010) (studying appellate decisions). My study focuses on First Amendment and Fourth Amendment claims because they are the primary constitutional rights provisions invoked by protesters in lawsuits against law enforcement and other officials. The study is based on three datasets consisting of more than three hundred federal court decisions and four hundred claims. In addition to qualified immunity in section 1983 cases, the study examines governmental immunities in First Amendment retaliation cases and actions against federal officials. Decisions in each unique dataset were coded to assess defendants’ success in invoking immunities to defeat protesters’ damages claims. Finally, the study provides a qualitative analysis of protesters’ First Amendment and Fourth Amendment rights. This part of the study identifies the types of constitutional claims plaintiffs typically pursued in public protest cases and the substantive “law” as the Supreme Court and lower federal courts have developed it.

The study shows that individual officers had considerable success, particularly at the summary judgment stage, defeating protesters’ section 1983 claims, and municipal defendants had even greater success. Defendants also enjoyed substantial success defeating First Amendment “retaliation” claims under the standard adopted in Nieves, often based on arrests for minor offenses. Owing to the Supreme Court’s recent skeptical pronouncements regarding Bivens claims, the study concludes that defendants are likely to defeat future First Amendment and Fourth Amendment damages claims against federal defendants. While some of the study’s quantitative findings differ from those in prior studies, in general, the results support criticisms of qualified immunity and other immunity doctrines.23See, e.g., Joanna C. Schwartz, How Qualified Immunity Fails, 127 Yale L.J. 2, 10 (2017) (concluding, based on a study of district court dockets, that courts rarely dismissed cases on qualified immunity grounds and granted dispositive summary judgment motions on that basis in just 2.6% of cases). As discussed infra Section III.A., in the decisions examined in this study, courts granted dismissal with respect to about a third of all claims but granted summary judgment on over 60% of all claims. These numbers are somewhat more in line with other studies. See, e.g., Leong, supra note 22, at 691 (finding that district courts denied qualified immunity in 14% to 32% of cases); Sobolski & Steinberg, supra note 22, at 545 (finding that appellate courts denied qualified immunity in 32% of appellate decisions). As applied in public protest cases, qualified immunity does not serve the policy goals the Supreme Court has ascribed to the doctrine, including providing a means of redress for constitutional injuries, deterrence of unlawful conduct, and shielding officers from the burdens of discovery.24See generally Joanna C. Schwartz, The Case Against Qualified Immunity, 93 Notre Dame L. Rev. 1797 (2018) (arguing that qualified immunity doctrines do not serve any of the values the Court and scholars have ascribed to it). Further, the qualitative portions of the study demonstrates the relatively weak rights protester plaintiffs possess and supports the criticism that qualified immunity doctrine has resulted in a lack of development of substantive rights.25See infra Sections III.A.2.iii, A.3.iii. Based on these findings, the study concludes that without repeal or reform of governmental immunities, public protest itself may be significantly imperiled.

From here, the Article proceeds in four parts. Part I describes the First Amendment and Fourth Amendment rights at stake in the public protest context and the governmental immunities that affect recovery of monetary damages for rights violations. Part II describes the study design and elaborates further on the content of the three unique datasets. Part III presents the study’s quantitative and qualitative findings regarding qualified immunity, municipal liability, First Amendment retaliation claims, and lawsuits against federal officials under Bivens. Part IV proposes several reforms and actions to strengthen protesters’ rights and remedies.

I.  PROTESTER INJURIES AND GOVERNMENTAL IMMUNITIES

Protesters who are injured during a public demonstration or other event can bring various legal claims against those responsible for their injuries. The focus in this study is on alleged violations of First Amendment and Fourth Amendment rights by government officials and entities, which are the most common claims pursued by injured protesters. A variety of officials and governmental entities participate in policing public protests. Possible defendants in civil rights lawsuits include state and local law enforcement, U.S. Secret Service, National Park Service, and other federal agency officials, and state or local governments. Each type of defendant can rely on robust governmental immunities. Separately and in combination, these immunities are obstacles for protesters seeking compensation for constitutional injuries.

A.  Protesters’ Rights and Remedies

Protesters can experience a variety of constitutional injuries when they participate in demonstrations and other public events. Although other rights may come into play, the two principal federal constitutional protections available to protesters are the First Amendment, which protects speech and peaceable assembly, and the Fourth Amendment, which generally prohibits unreasonable searches and seizures.26U.S. Const. amends. I, IV.

Protesters may be injured owing to a wide array of First Amendment violations.27For a discussion of First Amendment claims in the study datasets, see infra Part III. For example, officials may unlawfully deny protesters access to “public forums,” including public parks, streets, and sidewalks, where they have recognized rights to speak and assemble.28Huminski v. Corsones, 396 F.3d 53, 90, 92–93 (2d Cir. 2004) (concluding that indefinite exclusion of protester from courthouse grounds violated the First Amendment); see, e.g., Dean v. Byerley, 354 F.3d 540, 558 (6th Cir. 2004) (finding that picketers have a First Amendment right to engage in peaceful residential picketing on public sidewalks). Governments may rely on invalid content-based speech regulations or enforce unlawful speech zones and other regulations that unduly restrict speech and assembly.29See, e.g., Amnesty Int’l v. Battle, 559 F.3d 1170, 1183–84 (11th Cir. 2009) (holding the creation of cordon that rendered protest ineffective violated the First Amendment); Cannon v. City & Cnty. of Denver, 998 F.2d 867, 870–74 (10th Cir. 1993) (holding that arresting abortion protesters based on content of their signs violated the First Amendment). On the use of free speech zones and other uses of space to restrict protest, see generally Timothy Zick, Speech and Spatial Tactics, 84 Tex. L. Rev. 581 (2006). Law enforcement officers may also unlawfully retaliate against protesters for exercising their First Amendment rights, confiscate their signs and displays, prohibit the recording of police officers at public demonstrations, and engage in abusive protest policing methods.30See, e.g., Davidson v. City of Stafford, 848 F.3d 384, 393–94 (5th Cir. 2017) (concluding that arresting a protester without actual or probable cause in retaliation for expression violates the First Amendment); Allen v. Cisneros, 815 F.3d 239, 245 (5th Cir. 2016) (finding that confiscation of shofar and signs at demonstration did not violate the First Amendment); Glik v. Cunniffe, 655 F.3d 78, 84 (1st Cir. 2011) (holding that arresting protesters for filming law enforcement officers in the discharge of their duties in a public space violates the First Amendment); Green v. City of St. Louis, 52 F.4th 734, 740 (8th Cir. 2022) (holding that deploying tear gas against a protester not engaged in illegal activity violated the First Amendment).

Protesters may also suffer physical and other injuries stemming from Fourth Amendment violations.31The type of Fourth Amendment claims commonly pursued in protest cases is discussed in more detail infra Part III. They may be subject to arrest without probable cause or unlawfully detained.32See, e.g., Davidson, 848 F.3d at 393–94 (holding that arrest of anti-abortion protesters without actual or probable cause violated the Fourth Amendment); Barham v. Ramsey, 434 F.3d 565, 572–77 (D.C. Cir. 2006) (finding that the mass arrest of protesters without prior dispersal order violated the Fourth Amendment right not to be subjected to an unlawful arrest). Protesters may also be injured when police officers use excessive force, including physical force used during an arrest, handcuffing and other types of restraints, and use of less-lethal munitions including tear gas, pepper spray, and projectiles.33See Fogarty v. Gallegos, 523 F.3d 1147, 1161–62 (10th Cir. 2008) (concluding that using pepper balls and tear gas against non-resisting protesters constituted excessive force under the Fourth Amendment). These violations may cause physical and psychological injuries.

There are two general types of remedies protesters can pursue when they are the victims of these or other constitutional torts. They can seek injunctive relief against government actions and policies they allege violate the U.S. Constitution (or state constitutional provisions). For example, peaceful protesters expelled from a public park can seek a court order mandating they and others be allowed to protest there in the future. Or protesters could sue for an injunction preventing police from firing tear gas into crowds of peaceful protesters.34See, e.g., Don’t Shoot Portland v. City of Portland, 465 F. Supp. 3d 1150, 1157 (D. Or. 2020) (granting a TRO against police use of tear gas against peaceful protesters).

Enjoining current or future First Amendment or Fourth Amendment violations is an important remedy. However, injunctive relief is forward-looking and declaratory. It does not compensate protesters for physical and other injuries sustained during a demonstration or other protest event because of constitutionally tortious conduct.

The other kind of relief protesters can seek in the event of constitutional violations is an award for monetary damages against individual officials and their government employers. Both section 1983 and the Supreme Court’s decision in Bivens allow individuals to sue government officials for money damages for constitutional torts (personal injuries stemming from violations of constitutional rights).35See supra notes 10–11 and accompanying text. Section 1983 applies to state and local officials, while Bivens applies to federal officials. Both section 1983 and Bivens protect against deprivations of rights secured by the U.S. Constitution. Section 1983 explicitly authorizes such claims, while Bivens implies such claims from constitutional rights provisions.

Civil rights suits for money damages are a critically important means of vindicating constitutional rights. Owing to the infrequency of prosecutions brought against law enforcement for civil rights violations and the reluctance of police departments to investigate and punish their own, a lawsuit for damages may be the only way for a protester who has been injured to obtain some measure of justice.36See Schwartz, supra note 9, at xiii (“[F]or many people, filing a lawsuit is the best available way to punish police when they violate the law and give police reason not to violate the law again.”). Monetary relief compensates injured protesters for physical, economic, and other kinds of tangible harm. It can also have deterrent effects in terms of individual officer actions and municipal policies. As in other legal contexts, damages awarded for constitutional violations are intended to make injured parties whole. The damages include not only monetary and out-of-pocket expenditures, but also recovery for pain, suffering, and emotional distress. When plaintiffs prevail in federal civil rights lawsuits, they are also entitled to recover attorneys’ fees.37See 42 U.S.C. § 1988 (authorizing award of attorney’s fees). As commentators have observed, most damages in civil rights cases are recovered through settlements. Schwartz, supra note 9, at 26. The Supreme Court has upheld settlement agreements that waive attorneys’ fees. Evans v. Jeff D., 475 U.S. 717, 741–43 (1986), superseded by statute, Civil Rights Act of 1991, Pub. L. No. 102-166, 105 Stat. 1071. These types of waivers are now common. As a result, lawyers frequently do not recover any fees when civil rights lawsuits are settled. Schwartz, supra note 9, at 26. Lawyers often view section 1983 cases as contingency fee cases, which affects civil rights plaintiffs’ access to representation. Id. at 27.

Although my study focuses on federal constitutional claims, protesters can sue under state civil rights laws and precedents, which generally adopt similar qualified immunity restrictions in cases involving violation of state constitutional rights. They can also bring state common law personal injury claims including assault, battery, false arrest, damages to property, and infliction of emotional distress.

Protesters’ remedial menu sounds expansive. However, as this study confirms, protesters’ claims for monetary damages against government officials and municipal entities are substantially constrained by an offsetting menu of liability-limiting immunities and related doctrines. As a result, protesters injured while engaged in lawful and peaceful expressive activities often find it difficult or impossible to hold government officials accountable for their actions.

B.  Section 1983 and “Qualified Immunity”

Government officials may be entitled to “qualified immunity” in section 1983 and Bivens lawsuits. Qualified immunity is a judicially created doctrine that shields government officials from being held personally liable for constitutional violations.38See Schwartz, supra note 9, at 73 (“The Supreme Court created qualified immunity out of thin air six years after it recognized the right to sue under Section 1983.”). When government officials are sued, qualified immunity functions as an affirmative defense they can raise, barring damages even if they committed unlawful acts. (Qualified immunity is not, however, a defense to claims for injunctive relief.) As a general matter, officials enjoy broad legal immunity from civil rights claims under this doctrine. As the Supreme Court has observed, qualified immunity “provides ample protection to all but the plainly incompetent or those who knowingly violate the law.”39Malley v. Briggs, 475 U.S. 335, 341 (1986). In most states, civil rights actions are similarly limited by qualified immunity.

Historically, under Supreme Court precedents, whether a defendant was entitled to qualified immunity turned on the subjective “good faith” of the official who committed the alleged violation.40Pierson v. Ray, 386 U.S. 547, 556–58 (1967). In 1982, however, the Supreme Court replaced that subjective standard with a new test framed in “objective terms.”41Harlow v. Fitzgerald, 457 U.S. 800, 819 (1982). Under the new test, officials are personally immune from monetary liability “even if they act in bad faith, so long as there is no prior court decision with nearly identical facts.”42Schwartz, supra note 9, at 74. As the Court has explained, as long as their conduct “does not violate clearly established statutory or constitutional rights of which a reasonable person would have known,” police officers and other officials are not liable for money damages under section 1983.43Harlow, 457 U.S. at 818.

The Court has made clear its new standard is intended to be more protective of government officials than the “good faith” test. At the same time, it has also stated that the standard provides “no license to lawless conduct.”44Id. at 819. According to the Court, “[i]f the law was clearly established, the immunity defense ordinarily should fail, since a reasonably competent public official should know the law governing his conduct.”45Id. at 818–19.

However, as Joanna Schwartz has observed after close examination of section 1983 qualified immunity cases, “the Court’s decisions over the next forty years have created a standard that seems virtually impossible to meet.”46Schwartz, supra note 9, at 75. Since the Court adopted its objective test, it has applied the doctrine in several ways that have made it far more favorable to defendants.

First, the Supreme Court adopted a heightened pleading standard for complaints in civil cases. The new standard requires that to avoid having claims dismissed, plaintiffs must state facts supporting a “plausible” claim for relief.47Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007); Ashcroft v. Iqbal, 556 U.S. 662, 679 (2009). Schwartz has observed that this standard “may be particularly difficult for plaintiffs in civil rights cases to overcome.”48Schwartz, supra note 9, at 43. In some kinds of cases, including those that focus on the intent of government actors or the existence of local government policies or practices, “[a] plaintiff will not likely have any evidence . . . until they get to discovery.”49Id.

Second, to show the law was “clearly established,” the Supreme Court has generally required plaintiffs to point to an already existing authoritative judicial decision (or perhaps multiple decisions), with substantially similar facts. The decisional landscape is narrow. Protester plaintiffs must identify “controlling authority in their jurisdiction” or a “consensus of cases of persuasive authority.”50Wilson v. Layne, 526 U.S. 603, 617 (1999). Unpublished decisions do not count, and courts are reluctant to consider district court decisions.51See, e.g., Ullery v. Bradley, 949 F.3d 1282, 1300 (10th Cir. 2020) (“[W]e decline to consider district court opinions in evaluating the legal landscape for purposes of qualified immunity.”); Evans v. Skolnik, 997 F.3d 1060, 1067 (9th Cir. 2021) (“We have been somewhat hesitant to rely on district court decisions in this context.”). The clearly established standard expands the scope of the qualified immunity defense by requiring that plaintiffs identify Supreme Court or published federal appeals court decisions that are identical, or nearly identical, to the one being litigated.52See Kisela v. Hughes, 584 U.S. 100, 103–04 (2018) (discussing need for factual similarities). For example, plaintiffs’ allegation that officers’ use of a particular protest policing method violated their constitutional rights would have to point to published appeals court precedents establishing that use of this method was a clearly established violation of the First Amendment or Fourth Amendment.

Third, the Court has instructed that in assessing clearly established law, courts should not define the inquiry “at a high level of generality.”53Ashcroft v. al-Kidd, 563 U.S. 731, 742 (2011) (quoting Wilson, 526 U.S. at 617). As a result, “[c]ourts have granted officers qualified immunity even when they have engaged in egregious behavior—not because what the officers did was acceptable, but because there wasn’t a prior case in which that precise conduct had been held unconstitutional.”54Schwartz, supra note 9, at 76.

Fourth, in 2009, the Court altered the way in which courts apply qualified immunity doctrine in a manner that created another significant obstacle for civil rights plaintiffs.55Pearson v. Callahan, 555 U.S. 223, 236 (2009). In an earlier decision, the Court held that when assessing a qualified immunity defense, courts must first determine whether there was a violation of a constitutional right and then address whether the law was clearly established as to that right.56Saucier v. Katz, 533 U.S. 194, 201 (2001). However, the Court’s current approach allows courts to grant qualified immunity based solely on whether the law in question was clearly established—that is, without determining whether there was a constitutional violation.57Pearson, 555 U.S. at 223–24. This creates a catch-22 for civil rights plaintiffs. If courts resolve cases based on the lack of clearly established authority, there will be fewer precedents defining constitutional violations.58See Schwartz, supra note 9, at 78 (making this point). See generally David L. Hudson, Jr., Pearson v. Callahan and Qualified Immunity: Impact on First Amendment Law, 10 First Amend. L. Rev. 125 (2011) (discussing courts’ reliance on step two in assessing First Amendment claims by students, public employees, and prisoners). That situation, in turn, results in decisions concluding that officials are not liable because of a lack of clearly established law.59See Andrew Chung, Lawrence Hurley, Jackie Botts, Andrea Januta & Guillermo Gomez, For Cops Who Kill, Special Supreme Court Protection, Reuters: Investigates (May 8, 2020, 12:00 PM), https://www.reuters.com/investigates/special-report/usa-police-immunity-scotus [https://web.archive.org/web/20230929161412/https://www.reuters.com/investigates/special-report/usa-police-immunity-scotus] (examining 252 cases from 2015–2019). According to critics, it also has the effect of rendering constitutional protections “hollow.”60Mullenix v. Luna, 577 U.S. 7, 26 (2015) (Sotomayor, J., dissenting). By allowing courts to rely on a lack of clearly established law without ruling on the underlying constitutional claim, the Court “perpetuates uncertainty about the contours of the Constitution and sends the message to officers that they may be shielded from damages liability even when they act in bad faith.”61Schwartz, supra note 24, at 1818.

Fifth and finally, the Court’s construct of a “reasonable officer” has shifted over time to grant government officials broader deference. In a 1986 decision, the Court famously wrote that qualified immunity protects “all but the plainly incompetent or those who knowingly violate the law.”62Malley v. Briggs, 475 U.S. 335, 341 (1986). Since then, the Supreme Court has stated that a defendant’s conduct is to be judged on the basis of “any reasonable officer”63Messerschmidt v. Millender, 565 U.S. 535, 556 (2012). or “every reasonable official.”64Scott Michelman, The Branch Best Qualified to Abolish Immunity, 93 Notre Dame L. Rev. 1999, 2004 (2018) (quoting Ashcroft v. al-Kidd, 563 U.S. 731, 741 (2011)). As one scholar observed, this shift implies “that in order for a plaintiff to overcome qualified immunity, the right violated must be so clear that its violation in the plaintiff’s case would have been obvious not just to the average ‘reasonable officer’ but to the least informed, least reasonable ‘reasonable officer.’ ”65Id. (emphasis added).

As Joanna Schwartz has observed, the Court has “[created one additional qualified] immunity hurdle for plaintiffs: defendants’ right to immediately appeal any qualified immunity denial.”66Schwartz, supra note 9, at 79. Under normal procedural rules, a litigant would have to wait until the court enters a final judgment in the case to file an appeal. The special appeals process in qualified immunity cases can add “months or years to the case and dramatically increas[e] the costs of litigation” for plaintiffs.67Id.

The Supreme Court has offered some general justifications for its qualified immunity standards. It has asserted that qualified immunity achieves a “balance” between allowing victims to hold officials accountable and minimizing “social costs” to “society as a whole.”68Harlow v. Fitzgerald, 457 U.S. 800, 814 (1982). Noting that “claims frequently run against the innocent as well as the guilty,” the Court has identified four “social costs.”69Id.

First, the Court has explained that the doctrine aims to avoid “the expenses of litigation” by allowing district courts to dismiss suits against officers at early stages in the litigation—and without making fact-intensive inquiries into a particular officer’s motivations.70Id. Second, and relatedly, the Court expressed concern that requiring officials to respond to such litigation can “diver[t] . . . official energy from pressing public issues.”71Id. Third, the Court worried that the threat of litigation would “deter[] . . . able citizens from acceptance of public office.”72Id. Finally, the Court noted that the threat of lawsuits could chill lawful law enforcement conduct. It posited “there is the danger that fear of being sued will ‘dampen the ardor of all but the most resolute, or the most irresponsible [public officials], in the unflinching discharge of their duties.’ ”73Id. (alteration in original) (quoting Gregoire v. Biddle, 177 F.2d 579, 589 (1949)). Along similar lines, the Court explained that the doctrine of “[q]ualified immunity gives government officials breathing room to make reasonable but mistaken judgments about open legal questions.”74Ashcroft v. al-Kidd, 563 U.S. 731, 743 (2011).

The Court has also defended qualified immunity’s focus on clearly established law on the basis that it would be unfair to hold government officials to constitutional rules they were not aware of at the time of the violation. It first articulated this idea in an early decision, stating that “[a] policeman’s lot is not so unhappy that he must choose between being charged with dereliction of duty if he does not arrest when he has probable cause, and being mulcted in damages if he does.”75Pierson v. Ray, 386 U.S. 547, 555 (1967). Later, the Court explained: “If the law at that time was not clearly established, an official could not reasonably be expected to anticipate subsequent legal developments, nor could he fairly be said to ‘know’ that the law forbade conduct not previously identified as unlawful.”76Harlow, 457 U.S. at 818. As the Court has observed, “the focus” of qualified immunity is “whether the officer had fair notice that her conduct was unlawful.”77Brosseau v. Haugen, 543 U.S. 194, 198 (2004).

Critics have offered strong challenges to these justifications and to qualified immunity generally.78For a statistical rebuttal of many of the Court’s efficiency arguments, see Joanna C. Schwartz, Qualified Immunity’s Boldest Lie, 88 U. Chicago L. Rev. 605 (2021). See also Schwartz, supra note 24, at 1820 (“The Supreme Court’s qualified immunity doctrine is ungrounded in history, unnecessary or ill-suited to serve its intended policy goals, and counter-productive to interests in holding government wrongdoers responsible when they have violated the law.”). Some have attacked qualified immunity as both bad law and bad policy.79See, e.g., William Baude, Is Qualified Immunity Unlawful?, 106 Cal. L. Rev. 45, 48–49 (2018); Michael L. Wells, Qualified Immunity After Ziglar v. Abbasi: The Case for a Categorical Approach, 68 Am. U. L. Rev. 379, 383–86 (2018); Aaron L. Nielson & Christopher J. Walker, The New Qualified Immunity, 89 S. Cal. L. Rev. 1, 6–7 (2015); Schwartz, supra note 23, at 11–12. However, at least for the time being, the Supreme Court appears committed to retaining the doctrine.

C.  Municipal Liability

Qualified immunity doctrine applies to claims against individual government officials. However, protesters can also sue municipalities, counties, and other government bodies under section 1983.

Holding governmental entities liable for constitutional violations is important for several reasons. First, these entities have much deeper pockets than individual law enforcement officers.80Schwartz, supra note 9, at 100. Second, holding employers liable for constitutional violations caused by their actions or policies puts pressure on those employers to change their unconstitutional behavior.81Id. Third, assuming the unconstitutional harm emanated from the employer, it is just to hold it, as opposed to individual officers following the employer’s commands, directly responsible for the violations.82Id.

In Monell v. Department of Social Services, the Supreme Court held that a municipal government can be held liable under section 1983 for constitutionally tortious actions.83Monell v. Dep’t of Soc. Servs. of N.Y., 436 U.S. 658, 663 (1978). However, under Monell and subsequent precedents, the Court has significantly narrowed the path to recovery.84See Schwartz, supra note 9, at 93–94 (noting it is “tremendously difficult to succeed in constitutional challenges to these types of institutional failures”).

Local governments can be held liable under section 1983 for enacting unconstitutional policies.85Id. at 102–03. They can also be held liable if an official with “final policymaking authority” violates the Constitution.86Pembaur v. City of Cincinnati, 475 U.S. 469, 483 (1986). However, these theories are “uncommonly relied upon” because they require plaintiffs demonstrate constitutional wrongdoing “at the highest levels of government.”87Schwartz, supra note 9, at 103. “Final policy makers” such as local police chiefs are rarely directly involved in applying unconstitutional policies.88Id. Moreover, as Schwartz has observed, “local governments do not usually adopt policies that are unconstitutional on their face—a policy requiring officers to use excessive force, for example, or requiring officers to arrest people who exercise their First Amendment free speech rights.”89Id.

Most commonly, to establish Monell liability, plaintiffs must demonstrate a deprivation of a federal right occurred because of a “policy or custom” of the local government’s legislative body or of those local officials whose acts may fairly be said to be those of the municipality.90Monell v. Dep’t of Soc. Servs. of N.Y., 436 U.S. 658, 690–94 (1978). The informal policy or custom alleged to have caused the constitutional injury must be “so persistent and widespread as to practically have the force of law.”91Connick v. Thompson, 563 U.S. 51, 61 (2011). Under the policy or custom theory of section 1983 liability, local governments cannot be held liable for the actions of their employees solely because of their employment status.92Monell, 436 U.S. at 690. Rather, an employee must be acting pursuant to a municipal policy or custom, and the employer can only be held liable if one of their employees has committed an underlying constitutional violation pursuant to the policy or custom.93Id.

One theory or basis of policy or custom municipal liability that is particularly germane to public protest cases is the charge that local governments failed to train and supervise law enforcement and other officers.94See City of Canton v. Harris, 489 U.S. 378, 385 (1989) (recognizing this theory of municipal liability). As with other theories, however, it is very difficult to prevail on this claim. Courts have essentially treated the way a police force chooses to train its officers as a matter of policy not generally subject to judicial second-guessing in civil rights lawsuits. As the Supreme Court has noted, “the inadequacy of police training may serve as the basis for § 1983 liability,” but “only where the failure to train amounts to deliberate indifference to the rights of persons with whom the police come into contact.”95Id. at 388 (emphasis added); e.g., Estate of Jones by Jones v. City of Martinsburg, 961 F.3d 661, 671–72 (4th Cir. 2020) (“If the City’s failure to train reflects such a deliberate or consciously indifferent ‘policy,’ then its failure can fairly be said to be the ‘moving force [behind] the constitutional violation.’ ”).

At each stage of litigation, protester plaintiffs face severe challenges in terms of alleging and proving a policy or custom sufficient to hold local governments accountable. At the complaint-drafting stage, plaintiffs often lack access to the facts necessary to allege an informal policy or custom.96Schwartz, supra note 9, at 108. Thus, they may not be able to survive a local government’s motion to dismiss for failure to meet basic pleading requirements. Even at later stages of litigation, plaintiffs are likely to struggle to adduce evidence not just that their constitutional rights were violated, but that any violations were caused by an informal policy or custom. Among other issues, the Supreme Court “has not clarified what can serve as evidence of prior constitutional violations sufficient to put police chiefs on notice that their officers need better training or supervision.”97Id. at 109.

The municipal liability standards have resulted in a complex, stringent, and “nonsensical” standard of municipal liability.98Id. at 102. As one commentator observed, “[the] doctrine of municipal liability is convoluted and can require difficult inquiries into which city officials are ‘policymakers’ under state law on local government, into whether a[n] official was acting in a ‘local’ or ‘state’ capacity, into the extent of departmental ‘custom’ authorizing constitutional violations, into individual cities’ training and hiring processes, and into demanding questions about causation and fault.”99Edward C. Dawson, Replacing Monell Liability with Qualified Immunity for Municipal Defendants in 42 U.S.C. § 1983 Litigation, 86 U. Cin. L. Rev. 483, 486 (2018) (citations omitted).

D.  First Amendment “Retaliation” Claims

In addition to the many challenges posed by general qualified immunity doctrines under section 1983, the Supreme Court has recently adopted new liability limits on a specific type of claim based on retaliation for the exercise of First Amendment rights. The Court has recognized a general defense to such claims based on a finding of probable cause to arrest the speaker for any violation of law.

The First Amendment prohibits government officials from subjecting individuals to retaliatory actions because they engaged in protected speech.100Hartman v. Moore, 547 U.S. 250, 256 (2006). To succeed on a First Amendment retaliation claim, plaintiffs must prove they engaged in a constitutionally protected activity, the defendant’s actions would “chill a person of ordinary firmness” from continuing to engage in the protected activity, and the protected activity was a substantial motivating factor in the defendant’s conduct—i.e., that there was a nexus between the defendant’s actions and the intent to chill speech.101Revels v. Vincenz, 382 F.3d 870, 876 (8th Cir. 2004).

These claims have always been difficult to win. Proving retaliatory motive is difficult, but in any event not sufficient. The speaker must show that the adverse action would not have been taken absent the official’s retaliatory motive.102Hartman, 547 U.S. at 260. For example, suppose participants arrested at a public protest claimed law enforcement restricted or suppressed their speech in retaliation for the message they conveyed. To prevail, plaintiffs must show the officer would not have arrested them or interfered with their protected speech “but for” the retaliatory reason. If the officer can show the protesters were obstructing traffic or there was any other non-retaliatory reason for the arrest, the First Amendment claim would fail.

One long-unsettled question in such cases was whether the existence of probable cause to arrest a speaker precluded a First Amendment retaliation claim brought under section 1983. In Nieves v. Bartlett, the Supreme Court answered this question in the affirmative.103Nieves v. Bartlett, 587 U.S. 391, 402 (2019).

In Nieves, the Court upheld the dismissal of a First Amendment retaliation claim brought by an individual arrested at a festival after he exchanged heated words with officers assigned to police the event. The Court held that when speakers allege officers arrested them in retaliation for the exercise of First Amendment activities, probable cause for the arrest is usually a complete defense.104Id. at 400. Echoing its justifications for adopting the general qualified immunity standards, which were discussed earlier, the Court indicated it was concerned that officers who must often make “split-second” decisions when deciding whether to arrest will sometimes rely on the suspect’s protected speech in doing so.105Id. at 401. The Court also reasoned that determining whether the arrest was in retaliation for the speech in such cases would often be difficult.106Id. Thus, it concluded plaintiffs should be required in retaliation cases to plead and prove the arrest was objectively unreasonable before inquiring into the official’s subjective mental state.107Id. at 403.

The Nieves standard applies in a broad variety of contexts. However, the Court justified it using a protest-related example. The Court was concerned, it said, that “policing certain events like an unruly protest would pose overwhelming litigation risks” for officers who arrest participants.108Id. at 404. “Any inartful turn of phrase or perceived slight during a legitimate arrest,” the Court worried, “could land an officer in years of litigation.”109Id. The Court was concerned officers would be deterred from discharging their duties or “would simply minimize their communication during arrests to avoid having their words scrutinized for hints of improper motive—a result that would leave everyone worse off.”110Id.

The Nieves rule is subject to an exception. The Court concluded “the no-probable-cause rule should not apply when a plaintiff presents objective evidence that he was arrested when otherwise similarly situated individuals not engaged in the same sort of protected speech had not been.”111Id. at 407. If a plaintiff produces this comparative evidence, the burden shifts to the official to show some non-retaliatory basis for the arrest.112See id.

The Nieves rule makes it more difficult for protesters, reporters, and others attending or participating in a public protest to demonstrate they were arrested in retaliation for their communications or other First Amendment–protected activities.113See John S. Clayton, Policing the Press: Retaliatory Arrests of Newsgatherers After Nieves v. Bartlett, 120 Colum. L. Rev. 2275, 2279 (2020); see also Katherine Grace Howard, You Have the Right to Free Speech: Retaliatory Arrests and the Pretext of Probable Cause, 51 Ga. L. Rev. 607, 616–29 (2017). As the data from this study confirm, in most cases it will mean that probable cause to arrest a speaker for any offense, however minor, will negate a First Amendment retaliation claim.114See infra Section III.C.

E.  Damages Claims Against Federal Officials

In Bivens, the Court implied a cause of action for damages against federal officials who violate individuals’ rights under the Constitution.115Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388, 395–97 (1971). The claim in Bivens was based on a violation of the Fourth Amendment’s prohibition on unreasonable searches and seizures.116Id. The Court has also recognized Bivens actions for Fifth Amendment and Eighth Amendment violations.117See Davis v. Passman, 442 U.S. 228, 229 (1979) (recognizing damages action against a federal employer for gender discrimination); Carlson v. Green, 446 U.S. 14, 19 (1980) (recognizing an Eighth Amendment claim for failure to provide adequate medical treatment). However, during the past four decades, the Court has not recognized any additional Bivens claims. It has become increasingly skeptical of Bivens lawsuits in general, and specifically in the context of First Amendment and Fourth Amendment claims.118See infra Section III.D. At this juncture, it is not clear protesters have any right to sue federal officials for damages relating to First Amendment or Fourth Amendment violations.

According to the Court, Bivens and its progeny “were the products of an era when the Court routinely inferred ‘causes of action’ that were ‘not explicit’ in the text of the provision that was allegedly violated.”119Hernandez v. Mesa, 589 U.S. 93, 99 (2020) (quoting Ziglar v. Abbasi, 582 U.S. 120, 132 (2017)). The Court has criticized this “ancien regime,” noting that “[i]n later years, [it] came to appreciate more fully the tension between this practice and the Constitution’s separation of legislative and judicial power.”120Id. Accordingly, the Court noted, “for almost 40 years,” it has “consistently rebuffed requests to add to the claims allowed under Bivens.”121Id. at 102.

In 2017, the Court outlined a two-step framework intended to limit the expansion of Bivens remedies.122Abbasi, 582 U.S. at 138–39. The Court applied the same approach in Hernandez, 589 U.S. at 102. Under this framework, a court must first consider whether a case “arises in a ‘new context’ or involves a ‘new category of defendants.’ ”123Hernandez, 589 U.S. at 94 (quoting Corr. Servs. Corp. v. Malesko, 534 U.S. 61, 68 (2001)). The Court’s “understanding of a new context is broad.”124Id. The standard is whether “the case is different in a meaningful way from previous Bivens cases” decided by the Court.125Abbasi, 582 U.S. at 139. If so, the court must “ask whether there are any ‘special factors that counsel hesitation’ about granting the extension.”126Hernandez, 589 U.S. at 102 (quoting Abbasi, 582 U.S. at 121).

According to the Court, “special factors” are rooted in concerns about the separation of powers among the branches of federal government.127Id. (citing “the risk of interfering with the authority of the other branches”). They include, but are not limited to, the existence of alternative remedies and respect for coordinate branches of government. Thus, a court must “consider the risk of interfering with the authority of the other branches, . . . ask whether ‘there are sound reasons to think Congress might doubt the efficacy or necessity of a damages remedy’ . . . and ‘whether the Judiciary is well suited, absent congressional action or instruction, to consider and weigh the costs and benefits of allowing a damages action to proceed.’ ”128Id. (quoting Abbasi, 582 U.S. at 136, 137). If any factor causes a court to hesitate, the court should “reject the request” to recognize the Bivens claim.129Id. In general, the Court has described the expansion of Bivens as “a disfavored judicial activity.”130Abbasi, 582 U.S. at 121 (quoting Ashcroft v. Iqbal, 556 U.S. 662, 675 (2009)).

Although the Court has assumed First Amendment claims may be brought under Bivens, it has never expressly held as much and has sometimes expressed skepticism regarding such claims.131See Wood v. Moss, 572 U.S. 744, 757 (2014) (assuming Bivens extends to First Amendment claims); Reichle v. Howards, 566 U.S. 658, 663 n.4 (2012) (“We have never held that Bivens extends to First Amendment claims.”); Ashcroft v. Iqbal, 556 U.S. 662, 675 (2009) (assuming, without deciding, that a free exercise claim was available because the issue was not raised on appeal, but noting that the reluctance to extend Bivens “might well have disposed of respondent’s First Amendment claim of religious discrimination” because “we have declined to extend Bivens to a claim sounding in the First Amendment”). See generally Bush v. Lucas, 462 U.S. 367 (1983) (declining to extend Bivens to a claim sounding in the First Amendment). In Egbert v. Boule (2022), the Court ruled that plaintiffs could not sue federal officials for money damages based on First Amendment retaliation and Fourth Amendment excessive force claims.132Egbert v. Boule, 596 U.S. 482, 493–501 (2022). The Court rejected both claims on the grounds that implied actions under Bivens do not extend to “new” contexts and Congress was in a better position to determine whether to recognize any such actions.133Id. at 498. Although Egbert did not arise in the context of a public protest, the Court’s holding that First Amendment retaliation claims and Fourth Amendment excessive force claims are not viable under Bivens bodes ill for similar claims in other contexts.

II.  STUDY DESIGN AND DATASETS

The purpose of this study is to assess how the foregoing governmental immunities have affected plaintiffs’ First Amendment and Fourth Amendment claims against government officials under section 1983 and Bivens for injuries sustained at public demonstrations and other events. The study tracks the disposition of more than 400 constitutional claims in over 300 federal civil rights cases.

Unlike other qualified immunity studies, which examined broad categories of decisions or dockets, my study focuses on a discrete set of activities—“public protest”—that gave rise to section 1983 and Bivens claims.134Other studies have focused on broader sets of qualified immunity decisions or dockets in a range of section 1983 claims. See sources cited supra note 22. The most comprehensive study was conducted by Joanna C. Schwartz, who studied dockets in more than 1,000 cases. See Schwartz, supra notes 23–24. The decision to focus on public protest cases and claims required that the study define and identify “public protest.” For purposes of all three datasets, “public protest” was generally defined as a set of facts in which one or more individuals participated in a public march, rally, demonstration, parade, or other similar activity. Claims involving conduct related to public protest, including leafletting, public displays, and certain kinds of expressive conduct such as flag burning, were also included in the datasets. By contrast, the datasets excluded First Amendment and Fourth Amendment claims in areas including prisoner litigation, employment-related actions, conflicts involving K-12 student speech, and actions filed in connection with ordinary traffic stops or domestic disturbance calls. This definition obviously could be narrower or broader, and the public protest limit necessitated some judgment calls. Not all decisions involved large or mass demonstrations, but many did, and all included claims involving the kind of “out of doors” protest, hand-billing, and related activities typically engaged in during traditional public protest activity.135        See generally Timothy Zick, Speech Out of Doors: Preserving First Amendment Liberties in Public Places (2008).

To conduct the study, I compiled three unique datasets. Each dataset consists of federal district court and appeals courts (including Supreme Court) decisions, which I read and coded. The first dataset, Qualified Immunity, includes 253 district and appellate court decisions, both published and unpublished, in which qualified immunity was raised as a defense to First Amendment or Fourth Amendment claims in the context of public protests.136The decisions were collected using the following Westlaw searches in the Federal Cases database: (“first amendment” (freedom /3 (speech assembly))) /p (demonstration protest protestor protester rally rallies street park sidewalk plaza pavement mall parade walk-out sit-in picket) & “qualified immunity”; (“first amendment” (freedom /3 (speech assembly))) & “qualified immunity” & (public demonstration protest! rally rallies street park highway sidewalk plaza road pavement mall boulevard parade walk-out sit-in picket) & (1983 bivens); “first amendment” /40 “qualified immunity” /p (protest demonstration rally parade); and SY,DI(92k1430 92k1431 92k1529 92k1732 92k1736 92k1744 92k1758 92k1759 92k1760 92k1761 92k1762 92k1764 92k184* 92k185* 92k1864) & (SY,DI(78k1373 78k1374 78k1376 78k1398 78k1407 78k1432 78k1440 170Bk3295 170Bk3323(2) 170Bk3625(2) 393k1472 393k1475 393k1483) “qualified immunity”). Returned results for all searches were then reviewed to isolate claims brought in connection with public protest activities, per the study definition. In combination, these decisions addressed a total of 468 First Amendment and Fourth Amendment claims. The study examined cases from 1982, when the Supreme Court adopted its modern “two-step” qualified immunity approach, to December 2022.137See Harlow v. Fitzgerald, 457 U.S. 800, 815–19 (1982) (rejecting the “good faith” standard and adopting the “clearly established law” standard).

Each of the 253 decisions in the Qualified Immunity dataset was coded for: (1) court; (2) date of decision; (3) whether the decision was published or unpublished; (4) type of constitutional claim (First Amendment or Fourth Amendment); (5) procedural posture in which a qualified immunity defense was raised (Summary Judgment, Motion to Dismiss, or Trial); (6) disposition of the motion to dismiss on qualified immunity grounds (granted or denied); (7) whether denials of summary judgment addressed the merits or were based on the existence of genuine issues of material fact; (8) whether a motion to dismiss or for summary judgment was granted based on Step One, Step Two, or Both steps of the qualified immunity analysis; (9) in appeals, whether the appellate court affirmed or reversed the district court’s qualified immunity disposition; (10) description of the First Amendment or Fourth Amendment claim; and (11) basis for the court’s conclusion on the qualified immunity motion. All decisions in the Qualified Immunity database were also coded for (12) whether plaintiffs pursued a claim for municipal liability under Monell; (13) whether a defense motion to dismiss or for summary judgment on the Monell claim was granted or denied; and (14) general grounds for the court’s disposition of the municipal liability claim.

The other two datasets are more limited in scope. The Nieves Retaliation Claims dataset includes forty-one published and unpublished federal court decisions from 2019 through December 2022.138Westlaw searches in the federal district court and appellate court databases were as follows: (protest demonstration rally picket) /30 retaliation /p nieves and retaliation /20 “First Amendment” /p nieves. The results were then reviewed to isolate claims arising in the context of public protest activity. Several retaliation claims were also collected from the Qualified Immunity dataset, which swept in some post-Nieves retaliation claims. Each decision was coded for (1) procedural posture; (2) disposition of a defense motion to dismiss or for summary judgment based on Nieves; (3) criminal offense(s) charged; (4) whether the decision addressed the Nieves unequal treatment exception and, if so, the court’s disposition of that part of the claim; (5) whether plaintiffs pursued a claim for retaliation against the municipality; and (6) disposition of the retaliation claim.

The Bivens Claims dataset includes twenty-six published and unpublished decisions between 1971 and the end of December 2022 in which courts addressed First Amendment or Fourth Amendment Bivens claims in the context of public protests.139The Westlaw search in the federal district court and appellate court databases was as follows: bivens /p protest or demonstration or rally /p “first amendment” or “fourth amendment” and DA (aft 1971). These results were then reviewed to isolate claims arising in the context of public protest activity. The relatively low number of reported Bivens protest decisions available in Westlaw is not surprising. Westlaw coverage for older unpublished decisions is spotty so the database does not include all Bivens protest-related decisions. Further, state and local officials are far more likely than federal officials to be involved in law enforcement and other activities giving rise to protest-related constitutional claims. Each decision was coded for (1) type of constitutional claim (First Amendment, Fourth Amendment, or both); (2) whether the court recognized a Bivens First Amendment or Fourth Amendment cause of action; and (3) in the event the court did not recognize the Bivens action, its reasoning (for example, claim arises in a “new context,” the presence of “special factors,” and so forth).

All three datasets have statistical and other limitations that narrow the study’s scope and findings. Most empirical qualified immunity studies have relied on decisions available on Westlaw.140See sources cited supra note 22; see also Schwartz, supra note 23, at 20 n.64 (acknowledging that most studies have relied on decisions available on Westlaw). However, as Joanna Schwartz has observed, because Westlaw omits many unpublished opinions as well as lawsuits resolved without any opinion, such studies can “say little about the frequency with which qualified immunity is raised, the manner in which all motions raising qualified immunity are decided, and the impact of qualified immunity on case dispositions.”141Schwartz, supra note 23, at 20–21. However, as Schwartz acknowledges, such studies can “offer insights about the ways . . . courts assess qualified immunity . . . in a written opinion.”142Id. at 21. The study examines opinions accessible to courts when they analyzed qualified immunity and other defenses in protest cases.

There are some quantitative limitations. Since my study is limited to claims brought in “public protest” cases, it is not based on a random or complete sample of all qualified immunity decisions. Thus, quite intentionally, it does not purport to make claims about the dispositions of all qualified immunity motions. Moreover, because my study considers both district court and appeals courts decisions, and primarily claims addressed at both the motion to dismiss and summary judgment stages, it cannot account for all final dispositions of qualified immunity motions in the study.143The study data include a few decisions following bench trials. For example, a qualified immunity motion denied at the motion to dismiss stage could be granted or denied later at summary judgment. Or the case may settle. The Retaliation Claims and Bivens Claims datasets, which are smaller samples, have similar quantitative limitations. In addition, the sample sizes in these two datasets are relatively small. The three datasets provide snapshots of how courts have disposed of qualified immunity and other motions in public protest cases during the relevant time periods.

Even with the foregoing limitations, the study offers a rare glimpse into how courts address qualified immunity in public protests cases. The data also provide information about the most common types of claims protesters pursued and how these different claims fared under qualified immunity, whether defense motions to dismiss or for summary judgment were successful, how courts applied the two-step qualified immunity analysis, whether Monell claims were pursued and sustained, the effect of Nieves on First Amendment retaliation claims, and whether protesters have been able to pursue Bivens actions. In addition, the study’s qualitative analysis helps reveal the extent to which First Amendment and Fourth Amendment law has developed—or failed to develop—in the public protest context and the extent to which courts have left important questions unanswered. In sum, the study offers an in-depth analysis of how qualified immunity has affected constitutional claims brought by protester plaintiffs.

III.  DATA AND FINDINGS

This Part presents the study’s data and principal findings. It begins with a quantitative and qualitative examination of the largest dataset, Qualified Immunity. The Part then turns to the effect of governmental immunities and defenses on municipal liability, First Amendment retaliation claims, and protesters’ Bivens actions.

A.  Section 1983 and Qualified Immunity

This Section presents findings from the Qualified Immunity dataset. It begins with a general overview of the dataset, and then discusses more detailed quantitative findings concerning First Amendment and Fourth Amendment claims. In connection with the discussion of these claims, the Section also presents qualitative assessments of the state of clearly established First Amendment and Fourth Amendment law in public protest cases.

1.  Qualified Immunity Dataset: Overview

Table 1 contains general information about the overall number of cases, whether decisions were published or unpublished, and the distribution of federal district court and courts of appeals decisions in the Qualified Immunity dataset. As indicated, this dataset includes federal district and appellate court public protest decisions from 1982 through the end of 2022 in which defendants sought dismissal or summary judgment based on qualified immunity. It does not include state-level constitutional claims or qualified immunity decisions.

The Qualified Immunity dataset consists of 253 (published and unpublished) federal district court and appellate court decisions. As noted earlier, for purposes of establishing whether there is clearly established law regarding a constitutional right, courts look primarily to published courts of appeal decisions (although some will also look to published district court decisions). There are more than twice as many published (170) as unpublished (83) decisions in the database. In terms of precedents most likely to be considered controlling, there are eighty-six published appeals court decisions—including two decisions from the Supreme Court.144These decisions are the primary basis for the description and analysis of substantive First Amendment and Fourth Amendment rights below. See infra Sections III.A.2–3.

Table 1.  General Case Data
Cases in the Dataset253
Published Cases170
Unpublished Cases83
Appellate Cases (Including Supreme Court)114
District Court Cases139
Published Appellate Cases86

The study of the Qualified Immunity dataset focused primarily on the disposition of First Amendment and Fourth Amendment claims subject to defense motions for dismissal or summary judgment based on qualified immunity. As indicated in Table 2, the dataset includes 468 distinct First Amendment and Fourth Amendment claims as to which defendants filed such motions. A claim was counted just once, even if brought against multiple defendants—unless the court disposed of the claim differently for certain defendants, in which case the claim was counted more than once. In general, courts tended to analyze qualified immunity motions by multiple defendants together.

There were slightly more First Amendment (253) than Fourth Amendment (215) claims in the dataset. More qualified immunity motions concerning these claims were decided by federal district courts (287) than by federal appellate courts (181). In many cases, no appeal appears to have been filed after the district court disposition of defense qualified immunity motions. Although it is possible appeals were filed but not noted on Westlaw, many cases appear to have terminated at the district court level without any interlocutory or other appeals.

The study examines constitutional claims subject to defense qualified immunity motions, again in cases that resulted in a published or unpublished opinion available on Westlaw. If, at the time the study period closed, an appellate decision was not available in Westlaw, then the district court decision was included in the dataset. In all other cases, the highest available appellate decision (Supreme Court or federal court of appeal) was coded instead of the district court opinion.

Table 2.  General Claims Data 
Claims in the Dataset468
First Amendment Claims253
Fourth Amendment Claims215
Claims Considered in District Courts287
Claims Considered in Appellate Courts (Including Supreme Court)181

Like other studies, mine tracks the disposition and analysis of constitutional claims brought by protester plaintiffs.145See, e.g., Leong, supra note 22, at 684–88 (accounting for separate claims in study of district court decisions). A docket study focusing on public protest cases, as defined for purposes of the study, was not feasible. Even if all public protest cases could be identified through a review of court dockets, to get a substantial sample one would need to review complaints filed in a multitude of districts.146See Schwartz, supra note 23, at 19–25 (basing study on a review of dockets for section 1983 claims filed in five districts). Focusing on defendants would provide some information about how many individual officers were sued and how many achieved dismissals, but it would not provide information about why they were sued or how courts analyzed constitutional claims in qualified immunity cases.147There is also the problem of what to do about “Doe” defendants, which appeared in several cases in the Qualified Immunity dataset. Focusing on case-level data, for example, how many cases resulted in dismissal on qualified immunity grounds, would likewise not tell us what kinds of claims protesters typically bring, the dispositions or success rates of defense motions to dismiss or for summary judgment regarding specific claims, and information about substantive First Amendment and Fourth Amendment law. My study focuses primarily on claim-level findings to learn how courts have analyzed motions to dismiss claims based on qualified immunity in the specific context of public protest.

Success rates overall and by claim for defense motions to dismiss or for summary judgment based on qualified immunity are reported in Figure 1. The Qualified Immunity dataset includes only cases in which defendants raised a qualified immunity defense as to one or more constitutional claims and courts explicitly addressed the defense. A defense qualified immunity motion was deemed “successful” if it was granted or dismissal of the claim was upheld on qualified immunity grounds. Motion success was not defined as disposing of all claims in the case, including Monell, state law, and other actions.148Cf. Schwartz, supra note 23, at 45 (finding that qualified immunity resulted in dismissal of all claims in just 0.6% of cases and summary judgment on all claims in 2.6% of cases). Rather, my study focused on the qualified immunity determination with respect to each claim of constitutional wrong.

Figure 1.  Defense Q.I. Motion Success Rates

Although approximately a third of qualified immunity motions succeeded at the pleadings stage (53/152 for all claims), as in other studies defendants were far more likely to prevail at summary judgment.149See Schwartz, supra note 23, at 39 (“[C]ourts were more likely to grant summary judgment motions on qualified immunity grounds than they were to grant motions to dismiss on qualified immunity grounds.”). Examination of qualified immunity decisions in protest-related cases thus adds some support for the claim that the defense does not generally serve the goal of weeding out cases at the earliest stages of litigation and sparing defendants the expenses of discovery.150See id. at 11 (observing that “plaintiffs can often plausibly plead clearly established constitutional violations and thus defeat motions to dismiss”). Defense success rates at the motion to dismiss stage in my study are somewhat higher than those reported in some others, but generally consistent with dismissal findings across studies.151See id. at 39 (finding 26.6% dismissal rate for motions to dismiss). In sum, in most protest cases plaintiffs were able to proceed to discovery on their claims.

As noted, courts were more likely to grant summary judgment on qualified immunity grounds than to dismiss at the pleadings stage. Across all claims, defendants prevailed on 58% (183/313) of their motions. That success rate was consistent across claims, with courts granting 60% (101/168) of defense qualified immunity motions in First Amendment cases and 57% (82/145) of summary judgment motions in Fourth Amendment cases. Again, these numbers are generally consistent with those reported in other studies.152See id. (finding courts granted 39.7% of qualified immunity summary judgment motions); see also sources cited supra note 22 (reporting low denial rates ranging from 14% to 32%).

Courts denied summary judgment as to 130 claims. In 53% of those cases (69/130), the defense motion was denied because there were genuine issues of material fact at issue. In the other 47% (61/130) of summary judgment motions, courts denied the motions on the merits (that is, held that plaintiffs had met their burden of showing a violation of clearly established law).

As shown in Figure 2, appellate courts were more likely than district courts to rule in defendants’ favor on qualified immunity. In published and unpublished decisions available on Westlaw, district courts granted 45% (128/287) of defense motions. Appellate courts ruled in defendants’ favor on 60% (109/181) of plaintiffs’ constitutional claims. These numbers are likely owing in part to defendants’ low rate of success at the pleadings stage, which in many instances were the last results coded. District courts, which faced more defense motions at the pleadings stage, were inclined to allow for some factual development before dismissing plaintiffs’ claims.

Figure 2.  Q.I. Motion Success Rates by Court

Figure 3 shows that appellate court success rates were similar if one considers only the eighty-six published decisions. Courts granted or upheld defense qualified immunity defenses with respect to 57% (77/135) of all constitutional claims. In published appellate decisions, the rate of success for defendants was still lower (48% or 15/31) at the motion to dismiss stage than when the case had reached the summary judgment stage (60% or 62/103). However, in published decisions appellate courts ruled in defendants’ favor at the pleadings stage at a somewhat higher rate than did all courts at that stage.153See supra Figure 1 (finding dismissal rate of 35% for all claims). Appellate courts may have been responding to the Supreme Court’s directive that non-meritorious cases should be dismissed at an earlier stage, or they may simply have been convinced that plaintiffs had not adequately pleaded a clearly established violation under applicable pleading rules.

Figure 3.  Q.I. Motion Success Rates in Published Appellate Decisions

As discussed earlier, under qualified immunity doctrine, courts can dismiss or grant summary judgment for defendants if the plaintiff has not demonstrated a constitutional violation occurred (“Step One”) or if, despite the occurrence of a constitutional violation, the law was not “clearly established” at the time the violation occurred (“Step Two”).154See supra notes 55–61 and accompanying text. Prior to 2009, the Supreme Court instructed lower courts to address these two steps in order.155Saucier v. Katz, 533 U.S. 194, 200–07 (2001), overruled by Pearson v. Callahan, 555 U.S. 223 (2009). In 2009, the Court held the sequence was not mandatory; thus, courts could skip Step One and base decisions solely on analysis at Step Two.156Pearson, 555 U.S. at 236.

Grants of defense qualified immunity motions were coded for sequencing. If a claim was dismissed or defendants prevailed on summary judgment, the disposition was coded “Step One” when the basis for granting or upholding qualified immunity was the absence of a constitutional violation, “Step Two” if the sole basis for granting or upholding qualified immunity was the court’s conclusion that the law was not “clearly established,” and “Both” if the court granted or upheld qualified immunity on the basis that there was a constitutional violation but the law was not “clearly established” at the time. The few instances in which the court’s decision was unclear regarding which Step it was relying on were also coded as “Both.”

Figure 4.  Sequencing and Success Rate

As indicated in Figure 4, when courts ruled in defendants’ favor in public protest cases, they did so at Step One 57% of the time (133/235). For Fourth Amendment claims, courts granted qualified immunity at Step One 63% (67/107) of the time. That percentage dropped to 52% (66/128) for First Amendment claims. The higher rate for Fourth Amendment claims may be attributable to the lenient probable cause and excessive force standards applied in Fourth Amendment cases, which make it more likely courts will conclude there was no constitutional violation. Of course, the higher success rates for defense motions may also be attributable to the relative weakness of the plaintiffs’ Fourth Amendment claims. Although not included in Figure 4, the number of overall Step One dispositions was somewhat higher (65% or 50/77) if one looks only at the eighty-six published appellate court decisions in the dataset.

Scholars have raised the concern that if courts proceed directly to Step Two there will be fewer opportunities to develop “clearly established” law, thus making it more difficult for plaintiffs to prevail in qualified immunity cases.157See, e.g., Schwartz, supra note 23, at 76 (discussing the adverse effect sequencing can have on the development of constitutional law). There is also a related concern that constitutional law will stagnate or fail to develop if courts do not rule on the constitutional question at Step One.158See Schwartz, supra note 24, at 1814–20 (discussing concerns that qualified immunity results in courts failing to define the contours of constitutional rights).

My data do not indicate courts are engaged in widespread avoidance of constitutional issues in public protest cases. But again, the findings may be driven in part by the constitutional standards courts are called upon to apply to First Amendment and Fourth Amendment claims. Those standards call for, among other things, consideration of context and assessment of the “reasonableness” of governmental actions. The constitutional doctrine may make it easier for courts to dispose of claims by concluding no violation has occurred, that plaintiffs have not satisfied their burden of providing evidence of a constitutional violation, or that the law is not sufficiently clear.

The data show that in a significant percentage of instances, 35% overall (82/235), courts relied on the Step Two conclusion that the law was not “clearly established.”159The data did not produce a large enough sample size to assess whether the Court’s decision in Pearson, which allowed courts to address Step Two first in qualified immunity cases, had any effect on the sequencing. In these instances, courts did not address the substance of the constitutional claims. As discussed later, judicial reliance on a lack of clearly established law in public protest cases has probably limited development of substantive constitutional law regarding First Amendment and Fourth Amendment rights.160See infra Sections III.B–C. Consider that in 42% (54/128) of rulings in defendants’ favor on First Amendment claims, courts relied on the absence of clearly established law regarding issues ranging from the constitutionality of exclusions of protesters from public properties to the right to record law enforcement. Those rulings make it more difficult for plaintiffs in future cases to prove a violation or show the law is clearly established.161See Schwartz, supra note 24, at 1815 (noting the Court’s qualified immunity decisions have created a “vicious cycle”). Courts also avoided the constitutional question in motions addressing a quarter of Fourth Amendment claims.

Some commentators have suggested that qualified immunity doctrine allows for development of substantive law because it permits courts to find a constitutional violation at Step One but still hold the law was not clearly established at Step Two.162See, e.g., John C. Jeffries, Jr., The Right-Remedy Gap in Constitutional Law, 109 Yale L.J. 87, 99–100 (1999) (arguing that qualified immunity standards allow for judicial innovation). My data show little evidence of such innovative judicial practice. Only 6% (8/129) of First Amendment claims were disposed of in this way, with a slightly higher percentage of Fourth Amendment claims (11% or 12/108). Again, these percentages track other studies’ findings.163See Nielson & Walker, supra note 79, at 37 (discussing studies finding that in only 2.5–7.9% of claims did courts find there was a constitutional violation but upheld qualified immunity).

Finally, my data show that appellate reversal or affirmance rates in protest-related qualified immunity cases were very low. Overall, appeals courts reversed lower court decisions on qualified immunity only 33% (59/181) of the time. For First Amendment claims, the reversal rate was 33% (36/108) and for Fourth Amendment claims it was 32% (23/73). These reversal rates are generally consistent with those reported in other qualified immunity studies.164See Schwartz, supra note 23, at 41 (finding an affirmance rate of 65.4%). A closer look at these data demonstrates that appellate courts reversed district courts 40% of the time (25/62) when they denied a qualified immunity motion, but only 26% of the time (30/114) when they granted a qualified immunity motion. This finding is consistent with the data in Figure 2, which show appellate courts were more likely to rule in favor of qualified immunity across a range of claims.

2.  First Amendment Claims

In addition to the general claims data discussed above, the Qualified Immunity dataset includes more specific information about First Amendment claims. The data include the types of claims protesters pursued, the success rates for qualified immunity motions respecting different types of claims, and the substantive law as it pertains to the First Amendment rights of public protesters.

i.  Types of Claims

There are 253 First Amendment claims in the Qualified Immunity dataset. Figure 5 shows the distribution and frequency of the six most common types of First Amendment claims.

Figure 5.  Types of First Amendment Claims

Retaliation claims were the most frequently litigated type of First Amendment claim. Law enforcement or other government officials violate the First Amendment when they arrest, use force against, or otherwise restrict expressive activity in retaliation for the exercise of First Amendment rights.165Hartman v. Moore, 547 U.S. 250, 256 (2006). To prevail on a retaliation claim, “the plaintiffs must show that they engaged in protected activity, that the defendants’ actions caused an injury to the plaintiffs that would chill a person of ordinary firmness from continuing to engage in the activity, and that a causal connection exists between the retaliatory animus and the injury.”166Bernini v. City of St. Paul, 665 F.3d 997, 1007 (8th Cir. 2012); see also Baribeau v. City of Minneapolis, 596 F.3d 465, 481 (8th Cir. 2010).

As discussed earlier, in Nieves v. Bartlett (2019), the Supreme Court modified the law with respect to retaliation claims.167See Nieves v. Bartlett, 587 U.S. 391, 400 (2019) (holding that probable cause to arrest generally negates a First Amendment retaliation claim). The Qualified Immunity dataset includes decisions addressing seventy-eight retaliation claims subject to the standards that applied prior to Nieves.168Post-Nieves retaliation claims were collected in a separate dataset and are discussed infra Section III.C.

Nearly half (124/253 or 49%) of the First Amendment claims pertained to protesters’ rights to access public properties and the doctrines that apply to speech and assembly in those places. Individuals and groups have a First Amendment right to speak and assemble in certain public properties, including public streets, parks, and sidewalks.169See Perry Educ. Ass’n v. Perry Local Educators’ Ass’n, 460 U.S. 37, 45 (1983) (explaining modern public forum doctrine). While governments can impose content-neutral time, place, and manner restrictions on speech and assembly in these “quintessential” public fora, they generally cannot restrict expression based on its content or prohibit access altogether.170Id. Under the First Amendment, regulations of speech based on subject matter or viewpoint receive strict judicial scrutiny and must be narrowly tailored to further compelling governmental interests.171See Reed v. Town of Gilbert, 576 U.S. 155, 170 (2015) (explaining that content-based speech regulations are subject to strict scrutiny). Thirty-seven First Amendment claims asserted that government regulated speech based on its content. Time, place, or manner regulations are subject to a lower degree of judicial scrutiny. They must be content-neutral, supported by important governmental interests, narrowly tailored to burden no more speech than necessary, and must leave available alternative channels of communication.172Ward v. Rock Against Racism, 491 U.S. 781, 791 (1989). Fifty-three First Amendment claims involved application of this standard.

Under the First Amendment, protesters and other speakers also have a right to access other public forums, primarily depending on the extent to which governments intend to allow expressive activities in these places and the extent to which such activities would affect their ordinary functioning.173See Perry, 460 U.S. at 45. In places generally open to the public for expressive purposes, or so-called designated public fora, governments can impose content-neutral time, place, and manner regulations.174Id. at 45–46. In “non-public” or “limited” public forums, regulations need only be viewpoint-neutral and reasonable.175Cornelius v. NAACP Legal Def. & Educ. Fund, 473 U.S. 788, 799–800 (1985). Thirty-four First Amendment claims concerned government restrictions on access to various public properties.

Rounding out the First Amendment claims, protesters brought thirty-two claims challenging a variety of policing methods—for example, use of tear gas, herding or “kettling” of protesters, and surveillance of protest groups. Protesters claimed these actions chilled or prohibited expression. Plaintiffs also pursued a dozen claims relating to arrests or other adverse actions taken against protesters who were recording law enforcement at public demonstrations. As discussed below, whether there is a First Amendment right to record police is an issue on which courts remain somewhat divided.176See infra notes 225–27 and accompanying text; see also Karen M. Blum, Qualified Immunity: Time to Change the Message, 93 Notre Dame L. Rev. 1887, 1897 (2018) (discussing the circuit split on the right to record).

ii.  Claims Disposition Data

Figure 6 shows the success rates for qualified immunity motions respecting the five most common types of First Amendment claims.177Since the dataset included only twelve “right to record” claims, the sample size was considered too small to produce any meaningful conclusions. Significant findings relate to the procedural posture of qualified immunity dispositions and the disparate success rates for qualified immunity motions challenging certain claims.

Figure 6.  Q.I. Motion Success Rates by First Amendment Claim

Although some of the sample sizes are small, the data generally show that plaintiffs were able to keep claims alive at the pleadings stage. The success rate percentages for retaliation, content-based speech regulations, and access to forum claims were in line with the overall pleadings stage dismissal percentages reported earlier.178See supra Section II.A.1.

Two claims produced unanticipated results. In qualified immunity motions respecting challenges to time, place, and manner regulations, defendants prevailed 63% (10/16) of the time. The judicial balancing that applies to time, place, and manner regulations generally requires consideration of factual context not typically available at the pleadings stage. The high success rate may reflect the deferential standard applicable to content-neutral time, place, and manner regulations, the uncertain state of the law as it pertains to application of the standard, the relative strength or weakness of the claims in the dataset, or some combination of these factors.

The other unexpected finding is that only 7% (1/14) of motions to dismiss First Amendment challenges to protest policing methods were successful. However, several of these claims relied on allegations that police had used aggressive policing methods against compliant and peaceful protesters or dispersed assemblies without cause or warning.179See Green v. City of St. Louis, 52 F.4th 734, 740 (8th Cir. 2022) (concluding that deploying tear gas against protesters who were not engaging in illegal activity violated clearly established First Amendment rights); cf. Quraishi v. St. Charles County, 986 F.3d 831, 838 (8th Cir. 2021) (holding that using tear gas or other law enforcement tactics to interfere with reporting activity violated clearly established First Amendment rights). Taking those allegations as true, courts concluded they stated a clear violation of the First Amendment.

At summary judgment, defendants substantially prevailed on their qualified immunity motions, winning 72% (26/36) of time, place, and manner claims, 62% (33/53) of retaliation claims, and 55% (11/18) of claims challenging protest policing methods. Again, there were a couple of exceptions. Defendants were granted qualified immunity as to only 44% (11/25) of claims involving content-based speech regulations and won only 50% (10/20) of motions relating to claims involving access to public property. This may reflect the fact that the law in both areas is longstanding and relatively clear. As discussed, under the First Amendment, laws or regulations based on content face a heavy presumption of invalidity. Similarly, protesters have a presumptive right to access certain public properties including public parks, streets, and sidewalks.

iii.  First Amendment Law and Protesters’ Rights

The numbers paint an important, if only partial, picture when it comes to application of qualified immunity doctrine in First Amendment cases. The study was also designed to identify and critically analyze the substantive law that has developed—or failed to develop—during application of qualified immunity doctrine. The law that matters most is controlling authority in a specific jurisdiction. However, using a qualitative assessment, we can get a more general sense of the development of substantive standards concerning protesters’ First Amendment rights. The assessment that follows relies primarily on published appellate court decisions but, when useful in terms of filling some gaps, also considers published district court decisions.

Although retaliation claims were the most common in the Qualified Immunity dataset, the core First Amendment rights of protesters relate to access to public properties and the application of content neutrality standards there. Protesters rely on access to public forums such as public streets, parks, and sidewalks, as well as other public properties, to organize and participate in public demonstrations, rallies, and other events.

In public forum qualified immunity cases, several courts treated arbitrary, broad, and effective denials of access to public fora as First Amendment violations.180See Collins v. Jordan, 110 F.3d 1363, 1371 (9th Cir. 1996) (holding that dispersing protesters absent evidence they are unlawful, violent, pose a clear and present danger of imminent violence, or violate some law violated the First Amendment); Dean v. Byerley, 354 F.3d 540, 559 (6th Cir. 2004) (holding that picketer has a First Amendment right to engage in peaceful targeted residential picketing); Dietrich v. John Ascuaga’s Nugget, 548 F.3d 892, 898 (9th Cir. 2008) (concluding that the complete exclusion of plaintiffs from a public sidewalk violated the First Amendment); Huminski v. Corsones, 396 F.3d 53, 92–93 (2d Cir. 2004) (finding that although the right was not clearly established, issuance of trespass notices indefinitely excluding a protester from state courthouses and lands violated the First Amendment); McGlone v. Bell, 681 F.3d 718, 733–35 (6th Cir. 2012) (holding that a state university’s fourteen business day advance notice requirement in policy requiring nonaffiliated individuals and groups to obtain permission before speaking on certain parts of its campus was an unconstitutional restriction on free speech); Occupy Columbia v. Haley, 738 F.3d 107, 125 (4th Cir. 2013) (holding that arresting protestors for their presence and protests on state house grounds after a certain time of day violated their First Amendment rights). They also held that precedents clearly established protesters’ rights to distribute pamphlets and have access to an audience in a public forum,181See Amnesty Int’l, USA v. Battle, 559 F.3d 1170, 1185 (11th Cir. 2009) (observing that while none of the cases “are on all fours with the instant case, and do not clearly elucidate the fact-specific rule that police may not create a police cordon that makes a protest rally totally ineffective,” prior cases “need not be ‘materially similar’ to the present circumstances so long as the right is ‘sufficiently clear that a reasonable official would understand that what he is doing violates that right’ ” and “[t]here need not . . . be a prior case wherein ‘the very action in question has previously been held unlawful’ ”). The court concluded the defendants “had fair warning that Amnesty had a clearly established right to assemble, to protest, and to be heard while doing so.” Id. engage in peaceful residential picketing,182Dean, 354 F.3d at 559. protest on private property with the owner’s consent,183Jones v. Parmley, 465 F.3d 46, 58–59 (2d Cir. 2006). be present on State House grounds after 6:00 p.m.,184Occupy Columbia, 738 F.3d at 125. and engage in non-disruptive activity on a public sidewalk adjacent to a public school.185People for the Ethical Treatment of Animals v. Rasmussen, 298 F.3d 1198, 1204 (10th Cir. 2002).

However, appellate courts upheld several bans on protest in government properties other than public streets, parks, and sidewalks.186See Braun v. Baldwin, 346 F.3d 761, 765–66 (7th Cir. 2003) (finding that it was not a First Amendment violation to arrest a speaker for disorderly conduct when he distributed pro-jury nullification pamphlets inside a courthouse and refused to desist when ordered to do so); Oberwetter v. Hilliard, 639 F.3d 545, 554 (D.C. Cir. 2011) (concluding that arresting a protester for staging an unlawful performance inside the Jefferson Memorial did not violate a clearly established First Amendment right); Paff v. Kaltenbach, 204 F.3d 425, 433–34 (3d Cir. 2000) (holding that it was not a violation of the First Amendment to arrest political party activists for criminal trespass while they were leafleting on the sidewalk outside a U.S. Post Office on income tax day). In addition, they concluded the following actions did not violate clearly established First Amendment rights to access public properties:

  • Enforcing an invalid permit ordinance that violated the First Amendment, on the ground that the officer was entitled to rely on the ordinance;187Grossman v. City of Portland, 33 F.3d 1200, 1210 (9th Cir. 1994).
  • Excluding a protester from state courthouse grounds and lands, because the “right of access to judicial proceedings” was not clearly established at the time;188Huminski v. Corsones, 396 F.3d 53, 68 (2d Cir. 2005).
  • Arresting a protester for refusing to move a rally from the sidewalk adjacent to Liberty Bell Center in Independence National Historic Park, because it was not clearly established at the time that the sidewalk was a public forum;189Marcavage v. Nat’l Park Serv., 666 F.3d 856, 859 (3d Cir. 2012).
  • Promulgating and enforcing a curfew, since protestors did not have a clearly established right under the First Amendment to continuously occupy a plaza on state capitol grounds for an indefinite time;190Occupy Nashville v. Haslam, 769 F.3d 434, 445–46 (6th Cir. 2014). and
  • Denying a state university student’s request to set up a table in the patio area outside the student union, since the right to access such space was not clearly established.191Turning Point USA at Ark. State Univ. v. Rhodes, 973 F.3d 868, 880 (8th Cir. 2020).

As one might expect based on qualified immunity doctrine, the forum access precedents allow protesters to hold officials liable for egregious restrictions, including flat bans on access to traditional or quintessential public fora. However, they also permit officials to enforce otherwise unconstitutional permit requirements and exclude protesters from important venues on the ground that there is insufficient controlling authority addressing access to those places or no reasonable official would know this violated the First Amendment.

According to the decisions, it is difficult for protesters to prove a clearly established right to access a property unless that same property has been previously declared a public forum for First Amendment purposes. But when courts rely on the absence of controlling authority with respect to a public place, they fail to develop forum law. This is part of qualified immunity’s “vicious cycle.”192Schwartz, supra note 24, at 1815.

Protesters also rely on courts to enforce content neutrality rules in public places. The data suggest they have done so unevenly and inconsistently. The Supreme Court has admonished lower courts not to define constitutional issues at a high level of generality but to rely only on controlling precedent.193White v. Pauly, 580 U.S. 73, 78–79 (2017). Nevertheless, in some contexts, courts applied general doctrinal rules to deny qualified immunity. In these instances, failure to follow the Court’s instructions benefitted protester plaintiffs.

For example, courts relied on the general principle that content-based regulations of expression violate the First Amendment. Based on that principle, they held that forcing abortion protesters to vacate a public sidewalk based on the content of their signs or arresting someone for, without more, burning an American flag violated clearly established First Amendment rights.194See Cannon v. City and Cnty. of Denver, 998 F.2d 867, 878–79 (10th Cir. 1993) (holding arrest of anti-abortion protesters for carrying signs reading “the killing place” on public sidewalk violated the First Amendment); Logsdon v. Hains, 492 F.3d 334, 346 (6th Cir. 2007) (holding police officers who allegedly removed anti-abortion protester from public sidewalk based on the content of his expression were not entitled to qualified immunity); Snider v. City of Cape Girardeau, 752 F.3d 1149, 1158–59 (8th Cir. 2014) (concluding the First Amendment prohibits the arrest and prosecution of an individual for, without more, burning the American flag to express an opinion). They also concluded, again based on general standards forbidding content-based speech regulations, that public university officials cannot prohibit student protests because of the content of their message and law enforcement officers violated the First Amendment when they made no serious effort to quell hecklers before shutting down a public protest.195See Crue v. Aiken, 370 F.3d 668, 680–81 (7th Cir. 2004) (holding it is clearly established that the First Amendment protects the rights of students and faculty to address student athletes on the issue of the racist nature of mascot); Bible Believers v. Wayne County, 805 F.3d 228, 256 (6th Cir. 2015) (concluding that imposing content-based heckler’s veto violated clearly established First Amendment rights; crowd’s violence was not substantial, evangelists were peaceful, and officers made no serious attempt to quell hecklers). Similarly, appellate courts held that it is clearly established that protesters cannot be arrested for communicating protected profanity.196See Sandul v. Larion, 119 F.3d 1250, 1256 (6th Cir. 1997) (concluding that well-established Supreme Court precedents demonstrate that saying “f—k you” to abortion protesters is constitutionally protected speech). Finally, one appeals court held that protesters cannot be arrested for engaging in an unusual form of dissent, on the ground that the First Amendment “protects bizarre behavior.”197See Tobey v. Jones, 706 F.3d 379, 388 (4th Cir. 2013) (concluding the First Amendment “protects bizarre behavior,” including airline passenger’s right to display peaceful non-disruptive message in protest of government policy).

By contrast, when courts followed qualified immunity law to the letter, they frequently upheld government actions that violated content neutrality rules. In several cases courts concluded defendants were entitled to qualified immunity even though they adopted or enforced content-based regulations. For example, courts held that the following actions and regulations did not violate clearly established First Amendment law:

  • Ordering anti-abortion activists displaying fetuses near a middle school to disperse under a law prohibiting disruptive presence at schools;198Ctr. for Bio-Ethical Reform v. L.A. Cnty. Sheriff Dep’t., 533 F.3d 780, 794 (9th Cir. 2008).
  • Arresting protesters for demonstrating publicly in thong underwear;199Egolf v. Witmer, 526 F.3d 104, 111 (3d Cir. 2008).
  • Arresting the driver of a truck who painted words on the side of his truck indicating he was “a fucking suicide bomber communist terrorist!” with “W.O.M.D. on Board”;200Fogel v. Collins, 531 F.3d 824, 827 (9th Cir. 2008).
  • Excluding a protester from a welcoming ceremony authorized by U.S. Senate resolution for carrying a sign objecting to the intended disposition of Olympic dormitories for correctional purposes;201Kroll v. U.S. Capitol Police, 847 F.2d 899, 904 (D.C. Cir. 1988).
  • Preventing a journalist from engaging with a counter-protester, under threat of arrest, at a public library children’s book reading event called “Drag Queen Story Hour”;202Saved Mag. v. Spokane Police Dep’t., 19 F.4th 1193, 1195 (9th Cir. 2021). and
  • Excluding protesters from an official speech on private property because of the viewpoint of a message displayed on a bumper sticker on their car.203Weise v. Casper, 593 F.3d 1163, 1169 (10th Cir. 2010).

In these instances, courts did not apply general content neutrality principles. Instead, they required that protesters identify controlling authority with facts similar or identical to those in the case under review—a case (or two) involving protesters in thong underwear or messages on bumper stickers, for example. With respect to novel claims, or at least claims courts viewed as such, they were quite strict about application of qualified immunity standards. To be fair to lower courts, even the Supreme Court has sometimes equivocated on the content neutrality point in the context of protests. The Court held in one case that it was not clearly established that Secret Service agents bore a responsibility to ensure that protest groups with different viewpoints had access to comparable locations during a presidential visit.204Wood v. Moss, 572 U.S. 744, 759–60 (2014). Even so, looking for precedential twins and dead ringers in highly context-specific protest cases led courts to uphold qualified immunity.

Protesters’ speech and assembly rights are substantially affected by the enforcement of time, place, and manner regulations. Here, too, the data show very mixed success for protester plaintiffs. In several cases challenging time, place, and manner restrictions, courts concluded protesters had either not alleged or adduced evidence of a First Amendment violation.205See Frye v. Kansas City Missouri Police Dep’t., 375 F.3d 785, 790 (8th Cir. 2004) (holding officers did not violate the First Amendment when they ordered anti-abortion protesters to relocate signs depicting aborted fetuses, which were distracting to drivers); Hartman v. Thompson, 931 F.3d 471, 480–81 (6th Cir. 2019) (holding it did not violate the First Amendment to move protesters to a speech zone at a state fair); Kass v. City of New York, 864 F.3d 200, 209 (2d Cir. 2017) (concluding that ordering person obstructing sidewalk to move along or use protest zone did not violate the First Amendment); Marcavage v. City of Chicago, 659 F.3d 626, 631 (7th Cir. 2011) (city police officers did not violate the First Amendment free speech rights of religious organization’s members by refusing to permit them to stand on sidewalks leading to homosexual athletic and cultural events in order to conduct outreach activities, despite members’ contention that alternative venues were inadequate); Marcavage v. City of New York, 689 F.3d 98, 109 (2d Cir. 2012) (holding city’s restrictions on expressive activity on a public sidewalk during a national political convention did not violate protestors’ First Amendment rights; city had significant interest in keeping the sidewalk across from an arena in which the convention was being held clear for pedestrians and in maintaining security, and even though there were no specific threats of violence, where area was generally crowded, the sidewalk next to the arena had been closed to pedestrian traffic, fifty thousand attendees were expected for the convention itself, and the President, Vice President, and other government officials were attending the convention); Pahls v. Thomas, 718 F.3d 1210, 1234–35 (10th Cir. 2013) (holding enforcing viewpoint-neutral policy to move protesters to the south side of a road while opponents were allowed to stay in a more favorable location on private property did not violate the First Amendment); Ross v. Early, 746 F.3d 546, 558 (4th Cir. 2014) (enforcement of a free speech zone against demonstrator who was arrested for leafleting outside of designated area near arena did not violate the First Amendment). In others, courts concluded that the applicable law concerning time, place, and manner was not clearly established:

  • The Fourth Circuit held that a reasonable officer could have believed, in 2005, that prohibiting an abortion protester from displaying large, graphic signs depicting aborted fetuses at a major intersection was lawful because case law from the Fourth Circuit and Supreme Court was ambiguous on that issue.206Lefemine v. Wideman, 672 F.3d 292, 300–01 (4th Cir. 2012), vacated, 568 U.S. 1 (2012).
  • The Ninth Circuit concluded that denial of protestors’ application for a march permit without a promise on protestors’ part not to engage in civil disobedience was unlawful, but the condition did not violate clearly established First Amendment rights under controlling circuit and Supreme Court precedent.207Galvin v. Hay, 374 F.3d 739, 746–47 (9th Cir. 2004).
  • The D.C. Circuit held that a reasonable police officer could have believed that, given its proximity to the Capitol, a protest on the East Front sidewalk of the U.S. Capitol was subject to different First Amendment standards than apply in similar public properties.208Lederman v. United States, 291 F.3d 36, 47–48 (D.C. Cir. 2002). The court also agreed with the government’s assertion that because narrow tailoring is “ ‘not an exact science,’ a reasonable officer should not be expected to perform that analysis prior to arresting an individual for violating a time, place, and manner restriction governing expressive activity in a public forum.”209Id. at 47.

As critics of qualified immunity doctrine have complained, in determining whether the law of time, place, and manner was clearly established, some courts engaged in factual parsing and line-drawing. For example, the Ninth Circuit concluded that relegation of a public prayer event to a “First Amendment area” burdened the plaintiffs’ speech to a substantially greater degree than necessary to achieve the government’s purposes.210Galvin, 374 F.3d at 755. However, the court held officials were entitled to qualified immunity because the relevant case law indicated that time, place, and manner doctrine, in particular the narrow tailoring requirement, distinguished between claims that an audience is essential to the message being conveyed and claims that location was essential for that purpose.211Id. at 757. Since plaintiffs were challenging the regulation based on locational as opposed to audience proximity, the court reasoned, a reasonable official would not have had sufficiently clear legal guidance to avoid violating the plaintiffs’ First Amendment rights.212Id. The Ninth Circuit’s “narrow tailoring” analysis highlights a central challenge plaintiffs face in terms of identifying clearly established law.

Protesters also brought First Amendment challenges to various protest policing methods, including issuance of unlawful dispersal orders, use of less-lethal weapons during protest events, and surveillance of protest groups. The Eleventh Circuit held that using cordons or barriers that prevent protesters from being seen or heard by anyone violates the First Amendment.213See Amnesty Int’l, USA v. Battle, 559 F.3d 1170, 1184–85 (11th Cir. 2009) (holding that the creation of a cordon that rendered a protest ineffective by preventing protesters from being seen or heard by anyone violated First Amendment rights). Several courts held that arbitrary dispersals of otherwise lawful public protests violate clearly established First Amendment law.214See Collins v. Jordan, 110 F.3d 1363, 1371–73 (9th Cir. 1996) (explaining that it is clearly established law that protests cannot be dispersed on ground they are unlawful unless they are violent or pose a clear and present danger of imminent violence or they are violating some other law in the process; a reasonable officer could not have believed that violent protests that occurred in the wake of a verdict in a highly publicized criminal trial in another city justified a ban on all public demonstrations the following evening); Davidson v. City of Stafford, Texas, 848 F.3d 384, 393–94 (5th Cir. 2017) (holding that arresting an anti-abortion protester while he was protesting outside an abortion clinic, without actual or arguable probable cause to support arrest, violated clearly established First Amendment rights). Courts also concluded that deploying tear gas and other less-lethal munitions against protesters who are not engaging in any illegal activity is unconstitutional.215See Green v. City of St. Louis, 52 F.4th 734, 740 (8th Cir. 2022) (concluding that deploying tear gas against protesters who were not engaging in illegal activity violated clearly established First Amendment rights); cf. Quraishi v. St. Charles Cnty., 986 F.3d 831, 839 (8th Cir. 2021) (explaining that it was clearly established that using tear gas or other law enforcement tactics to interfere with reporting activity violated First Amendment). Finally, the Ninth Circuit held that government officials violated clearly established First Amendment law when they conducted an eight-month investigation into a vocal, but entirely peaceful group.216White v. Lee, 227 F.3d 1214, 1239 (9th Cir. 2000).

However, results changed dramatically if courts discerned even an inkling of disruption or potential for violence at a public protest. In that event, they were far more likely to give law enforcement the benefit of the doubt in terms of protest-policing methods. For example, courts held that confiscating signs at demonstrations, using tear gas against protesters blocking egress from an industrial plant, arresting protesters who refused law enforcement directives to use a “free speech zone,” and making preemptive arrests did not violate the First Amendment or did not violate clearly established law.217See Allen v. Cisneros, 815 F.3d 239, 245 (5th Cir. 2015) (concluding that confiscation of shofar and signs at a demonstration did not violate the plaintiff’s first amendment rights); Ellsworth v. City of Lansing, No. 99-1045, 2000 U.S. App. LEXIS 2049, at *8 (6th Cir. Feb. 10, 2000) (concluding that use of tear gas against picketers blocking egress from industrial plant did not violate the First Amendment); Marcavage v. City of New York, 689 F.3d 98, 110 (2d Cir. 2012) (holding that probable cause supported protestors’ warrantless arrests for obstruction of governmental administration, where protestors rejected seventeen directives by three officers to leave no-demonstration zone, insisting on their constitutional right to demonstrate where they stood); Cross v. Mokwa, 547 F.3d 890, 897 (8th Cir. 2008) (explaining that it was not clearly established that a police officer could be liable on a prior restraint theory for conducting a search and making arrests supported by probable cause when occupants of condemned buildings were there illegally). In sum, while peaceful and compliant protesters were successful in pursuing challenges to protest policing methods, evidence or even allegations of disruption or potential for violence made success far less likely.

As noted earlier, the most frequently pursued First Amendment claim was that officials unlawfully retaliated against protesters for engaging in protected speech and assembly.218Hartman v. Moore, 547 U.S. 250, 256 (2006). Lower federal court decisions in the Qualified Immunity dataset did not produce much law concerning First Amendment retaliation claims. Retaliation claims often turn on the motive of the defendant, thus making them poor vehicles for establishing bright line rules.219See, e.g., Brown v. City of St. Louis, No. 18 CV 1676, 2022 U.S. Dist. LEXIS 85588, at *13 (E.D. Mo. May 12, 2022) (explaining that protesters’ retaliation claim failed because they did not show officers were aware of their presence, that they objected in any way to their presence or activities, or that they intentionally directed the pepper spray at them because of their First Amendment activities). They are also fact-dependent in other ways.

In a typical case, the Eighth Circuit held that when protesters moved toward officers “in a threatening manner” and blocked traffic, “[a] reasonable officer could conclude that this conduct violated Minnesota law and was not protected speech.”220Bernini v. City of St. Paul, 665 F.3d 997, 1007 (8th Cir. 2012). Further, the court concluded that since there was no evidence the protesters had been singled out while other similarly situated speakers had not been arrested, “[t]he only reasonable inference supported by the record is that the group’s unlawful conduct, not the protected speech, motivated the officers’ actions.”221Id.

Nevertheless, a few retaliation decisions produced intriguing results. In one case, a district court held that retaliating against protesters for their speech by surveilling them and pointing a red laser from a sniper rifle at a group member during a speech violated the First Amendment.222Black Lives Matter v. Town of Clarkstown, 354 F. Supp. 3d 313, 327 (S.D.N.Y. 2018). In an unpublished decision, the Ninth Circuit concluded that a reasonable official would know that directing a train into the path of demonstrators, one of whom lost his legs as a result, to stop a protest violated the First Amendment.223Willson v. Hubbard, No. 88-15671, 1990 WL 43011, at *2 (9th Cir. Apr. 6, 1990). In these decisions, at least, the courts did not point to any prior precedent with similar facts. Perhaps when the facts are so egregious, courts are willing to bend the clearly established standard.

Finally, courts addressed claims that officers violated the First Amendment when they interfered with or prevented the recording of officers as they engaged in protest policing. As Joanna Schwartz has observed, “[c]oncerns that the Court’s qualified immunity jurisprudence renders the Constitution hollow are even more acute for constitutional claims involving new technologies and techniques.”224Schwartz, supra note 24, at 1817. Several courts have held that there is a First Amendment right to record police at a public protest and that right is clearly established.225See Smith v. City of Cumming, 212 F.3d 1332, 1333 (11th Cir. 2000) (holding that there is a First Amendment right to record the police at a public protest, but that plaintiffs did not demonstrate the right had been violated); Gericke v. Begin, 753 F.3d 1, 10 (1st Cir. 2014) (holding that arresting person for attempting to film officer in a public place and in the absence of any order to stop filming violated the plaintiff’s First Amendment rights); Glik v. Cunniffe, 655 F.3d 78, 85 (1st Cir. 2011) (concluding that arresting citizens for filming law enforcement officers in the discharge of their duties in a public space violates the First Amendment). However, other courts have held that at the time of the alleged violation, the right to record was not clearly established or not apparent to all reasonable officers.226See Fields v. City of Philadelphia, 862 F.3d 353, 361–62 (3d Cir. 2017) (explaining that there is a First Amendment right to record police, but it wasn’t clear that the law gave fair warning so that every reasonable officer knew that, absent some sort of expressive intent, recording police activity at a public protest was constitutionally protected; there was “no robust consensus” concerning the right to record police in public places); Fordyce v. City of Seattle, 55 F.3d 436, 439–40 (9th Cir. 1995) (concluding that all individual police officers were entitled to qualified immunity with respect to plaintiff’s section 1983 damages claims relating to his arrest under a Washington statute prohibiting the recording of private conversations; at time of arrest, whether and under what circumstances conversations in public streets could be deemed private within the meaning of the privacy statute was not yet settled under state law and under the facts, a reasonable officer could have believed the plaintiff was recording private conversations in violation of the statute); see also Blum, supra note 176, at 1895 (noting the circuit split on the right to record). Courts have also observed that the right is not unlimited, and that arresting protesters for recording officers in ways that interfere with their duties does not violate clearly established law.227See, e.g., Fleck v. Trs. of Univ. of Pa., 995 F. Supp. 2d 390, 398, 408 (E.D. Pa. 2014) (concluding that a preacher engaging in disruptive behavior in a mosque entryway did not have a clearly established right to continue to record a police officer while holding camera close to the officer’s face after the officer requested that the preacher stop recording).

In sum, First Amendment decisions in the Qualified Immunity dataset demonstrate many of the pathologies of qualified immunity doctrine. While courts have held that egregious forms of governmental abuse can be the basis for a claim under section 1983, they have also upheld qualified immunity in cases involving denial of access to public fora, content discrimination, and questionable time, place, and manner regulations. Courts have applied the doctrine inconsistently, sometimes relying on general principles and in other instances demanding precise controlling authority.

We also learned that although wholly peaceful and compliant protesters can pursue claims for damages, at the first sign of disruption or potential violence, courts deferred to officers’ choice to use aggressive protest policing methods. In terms of retaliation, government actors probably cannot mow down demonstrators with a train—although the only opinion on this matter is unpublished and is not controlling authority concerning other types of conveyances. Again, in instances in which the facts are truly egregious, courts may apply the qualified immunity standard more flexibly. Finally, the cases indicate that not all appellate courts have concluded that there is a clearly established First Amendment right to record police at demonstrations.

3.  Fourth Amendment Claims

The Qualified Immunity dataset includes court decisions in which 215 Fourth Amendment claims were the subject of defense qualified immunity motions. Although the data support some clear limitations on governmental actions under the Fourth Amendment in the protest context, they also demonstrate an overall lack of substantive development.

i.  Types of Claims

Figure 7 shows the most common Fourth Amendment claims plaintiffs pursued in the cases in the Qualified Immunity dataset. The general standards governing these 215 Fourth Amendment claims are well-established.

Figure 7.  Types of Fourth Amendment Claims

The Fourth Amendment protects the “right of the people to be secure in their persons . . . against unreasonable searches and seizures.”228U.S. Const. amend. IV. To prevail on a claim for false arrest, a plaintiff must demonstrate that officers lacked probable cause to make the arrest. Probable cause to arrest exists when the officers have knowledge or reasonably trustworthy information of facts and circumstances that are sufficient to warrant a person of reasonable caution in the belief that the person to be arrested has committed or is committing a crime.229Dunaway v. New York, 442 U.S. 200, 208 n.9 (1979). The existence of probable cause to arrest, even for a very minor offense, is a complete defense to a Fourth Amendment false arrest claim.230See Atwater v. City of Lago Vista, 532 U.S. 318, 354 (2001) (“If an officer has probable cause to believe that an individual has committed even a very minor criminal offense in his presence, he may, without violating the Fourth Amendment, arrest the offender.”).

In an excessive force claim, a plaintiff must show that the use of force was excessive under the facts and circumstances presented.231Graham v. Connor, 490 U.S. 386, 396 (1989). In making this determination, the Supreme Court has instructed lower courts to pay “careful attention” to factors such as “the severity of the crime at issue, whether the suspect poses an immediate threat to the safety of the officers or others, and whether he is actively resisting arrest or attempting to evade arrest by flight.”232Id. As the Court has emphasized, “[t]he ‘reasonableness’ of a particular use of force must be judged from the perspective of a reasonable officer on the scene, rather than with the 20/20 vision of hindsight.”233Id.

Finally, a seizure of the person occurs “when there is a governmental termination of freedom of movement through means intentionally applied.”234Brower v. Cnty. of Inyo, 489 U.S. 593, 597 (1989); see Torres v. Madrid, 141 S. Ct. 989, 998 (2021). To be valid under the Fourth Amendment, a seizure or detention must be reasonable under the circumstances. Under the Fourth Amendment, an officer may seize an individual’s property from a public area “only if Fourth Amendment standards are satisfied—for example, if the items are evidence of a crime or contraband.”235Soldal v. Cook Cnty., 506 U.S. 56, 68 (1992). Officers may also conduct searches incident to arrest when they have reasonable suspicion contraband is present.236Terry v. Ohio, 392 U.S. 1, 30 (1968).

ii.  Claims Disposition Data

The success rates for defense motions to dismiss or for summary judgment based on qualified immunity are shown in Figure 8. The same caveats that applied to determining successful disposition of defense motions respecting First Amendment claims apply to Fourth Amendment claims. The findings count granted motions to dismiss and for summary judgment, and appellate court rulings upholding those grants as successful whether or not plaintiffs amended their complaints or their claims were considered on remand after appeal. The success rates are, as indicated, snapshots of dispositions in reported decisions available on Westlaw.

Figure 8 shows that, like the First Amendment claims in the dataset, two-thirds or more of Fourth Amendment claims survived defense motions to dismiss. By contrast, at summary judgment, courts were much more inclined to grant or uphold qualified immunity for defendants for false arrest (61% or 48/79 claims) and unlawful search or seizure (71% or 15/21 claims).

Figure 8.  Q.I. Motion Success Rates by Fourth Amendment Claim

As discussed earlier in the general data findings, when addressing qualified immunity respecting Fourth Amendment claims, courts were more likely to grant immunity at Step One. In those instances, courts held that no violation had occurred, instead of concluding that there was a lack of clearly established law at Step Two.237See supra Section III.A.1. As we have seen, courts were overall likely to grant defense motions for summary judgment. But the high rate of summary judgment for false arrest and unlawful search and seizure claims likely also reflects the deferential probable cause and reasonableness standards that apply to such claims.

The exception was defense motions for summary judgment on excessive force claims, which succeeded only 42% (19/45) of the time. As discussed below, several courts held that law enforcement uses of force against peaceful assemblies or compliant protesters constituted clear Fourth Amendment violations.238See infra notes 252–54 and accompanying text. In other cases, courts concluded that the degree or amount of force used against protesters violated clearly established Fourth Amendment standards.239See infra notes 252–54 and accompanying text. These decisions account for the lower defense success rates regarding excessive force claims at summary judgment.

iii.  Fourth Amendment Law and Protesters’ Rights

Substantive Fourth Amendment law in the context of public protest has developed slowly in lower courts. Like the discussion of First Amendment law, the following analysis focuses primarily on published federal courts of appeals decisions to assess what substantive Fourth Amendment law has been established. However, it also considers district court decisions that apply circuit precedents in Fourth Amendment qualified immunity determinations.

Appellate courts consistently held that arresting protesters without actual or arguable probable cause violated clearly established Fourth Amendment law.240See Davidson v. City of Stafford, 848 F.3d 384, 393–94 (5th Cir. 2017) (concluding that the arrest of an anti-abortion protester without probable cause violated clearly established Fourth Amendment law). They also concluded that it is a clear violation of the Fourth Amendment to arrest protesters without first issuing a dispersal order (although one district court held that officers are under no obligation to determine whether the order is lawful prior to enforcing it).241See Barham v. Ramsey, 434 F.3d 565, 573 (D.C. Cir. 2006) (holding that arresting protesters without first providing a dispersal order violated clearly established Fourth Amendment rights); Bidwell v. Cnty. of San Diego, 607 F. Supp. 3d 1084, 1099–100 (S.D. Cal. 2022) (finding no violation of clearly established Fourth Amendment law when officers failed to engage in an “individualized inquiry” regarding validity of dispersal order). Notwithstanding these limits, courts applied a flexible probable cause standard and upheld arrests for various offenses, some very minor—using noise amplification near an abortion clinic,242Duhe v. City of Little Rock, 902 F.3d 858, 861–63 (8th Cir. 2018). falling asleep in a zipped tent in a public park,243Williamson v. Cox, 952 F. Supp. 2d 176, 184 (D.D.C. 2013). openly carrying firearms on a public fishing pier,244Fla. Carry, Inc. v. City of Mia. Beach, 564 F. Supp. 3d 1213, 1233 (S.D. Fla. 2021). burning the Mexican flag in public without a permit,245Bohmfalk v. City of San Antonio, No. SA-09-CV-0497, 2009 U.S. Dist. LEXIS 109710, at *11 (W.D. Tex. 2009). and unfurling a banner outside a designated “speech zone.”246Asprey v. N. Wyo. Cmty. Coll. Dist., 823 F. App’x. 627, 633–34 (10th Cir. 2020).

Fourth Amendment law is unsettled when it comes to the validity of protesters’ arrests for engaging in protected expression. The Eighth Circuit held that arresting protesters solely for engaging in protected speech violates clearly established Fourth Amendment rights.247See Baribeau v. City of Minneapolis, 596 F.3d 465, 478–79 (8th Cir. 2010) (concluding that the arrest of protesters for playing music, broadcasting statements, dressing as zombies, and walking erratically violated clearly established Fourth Amendment rights). Similarly, the Sixth Circuit held that the law was clearly established that a county fair patron could not be arrested for disorderly conduct based on his spewing profanities at police and a fairgrounds executive director when he was being escorted off the fairgrounds (apparently for wearing a shirt stating “Fuck the Police”).248Wood v. Eubanks, 25 F.4th 414, 425–27 (6th Cir. 2022).

However, a federal district court applying circuit law concluded that officers who arrested a protester for anonymous comments made by others on his livestream after he posted the Chief of Police’s address did not violate clearly established Fourth Amendment law.249Zinter v. Salvaggio, 610 F. Supp. 3d 919, 939–40 (W.D. Tex. 2022) (observing that the speaker had not identified any case law indicating that arrest based on others’ anonymous comments was unlawful). Another district court held that officers did not act recklessly, negligently, or unreasonably in relying on a fellow officer’s determination that probable cause existed to arrest a protester for walking along the public sidewalks displaying “a gigantic Styrofoam middle finger emblazoned with the letters ‘Fuck cops.’ ”250Brandt v. City of Westminster, 300 F.Supp.3d 1259, 1264, 1273 (D. Colo. 2018). A district court also held that officers did not violate clearly established Fourth Amendment law when they arrested a protester for “interference” when he refused to relinquish a camera—something he otherwise had a right to possess under the circumstances—when ordered to do so.251Zinter, 610 F. Supp. 3d at 941.

As these decisions demonstrate, probable cause reasonableness standards make it difficult for courts to develop clearly established law concerning false arrest. As in other areas, egregious mass arrests and other actions not supported by any probable cause have been condemned as violating clearly established Fourth Amendment law. However, precedents show that even arrests closely related to, if not directly based on protected expression, have been the basis for qualified immunity for Fourth Amendment claims. The absence of precedents addressing similar or nearly identical circumstances has prevented courts from recognizing some clear constitutional violations.

In terms of excessive force claims, courts have consistently held that using less-lethal force, such as pepper spray and tear gas, against compliant and peaceful protesters violates clearly established Fourth Amendment law.252See Buck v. City of Albuquerque, 549 F.3d 1269, 1291 (10th Cir. 2008) (concluding that the law was clearly established that the use of force against nonviolent antiwar protestors facing misdemeanor charges, who did not flee or actively resist arrest, was excessive); Fogarty v. Gallegos, 523 F.3d 1147, 1163 (10th Cir. 2008) (concluding that the law was clearly established that the use of pepper balls and tear gas against non-resisting protesters constitutes excessive force under the Fourth Amendment); Headwaters Forest Def. v. Cnty. of Humboldt, 276 F.3d 1125, 1130–31 (9th Cir. 2002) (concluding that the use of pepper spray on a gathering of fewer than ten protesters when they already had control of the crowd and could have used more peaceful methods of maintaining public order violated clearly established law concerning excessive force); Johnson v. City of San Jose, 591 F. Supp. 3d 649, 662–63 (N.D. Cal. 2022) (holding that it was clearly established at the time that a police officer shot a protester with a foam projectile as the protester attempted to leave the scene of the protest that firing a less lethal projectile that risked causing serious harm at an individual who was not an imminent threat to officers in the midst of an allegedly unlawful assembly, resulting in an injury restricting the movement of that individual, amounted to a seizure and an excessive use of force); Laird v. City of St. Louis, 564 F. Supp. 3d 788, 800–01 (E.D. Mo. 2021) (holding it was unreasonable to use pepper spray against a protestor, throw him against the wall, kick and choke him while he was handcuffed, and dragged another protestor across pavement, when the protesters were nonviolent misdemeanants who did not flee or actively resist arrest and posed no threat to the security of the officers or the public); Lamb v. City of Decatur, 947 F. Supp. 1261, 1264–65 (C.D. Ill. 1996) (concluding that pepper spraying peaceful and non-resisting demonstrators violates the Fourth Amendment’s ban on the use of unnecessary force). The same goes for using other types of force when arresting or subduing a compliant protester.253See Zinter, 610 F. Supp. 3d at 955 (holding that Fifth Circuit precedents clearly established that “once a suspect has been handcuffed and subdued, and is no longer resisting, an officer’s subsequent use of force is excessive”) (quoting Carroll v. Ellington, 800 F.3d 154, 177 (5th Cir. 2015)); Jones v. City of St. Louis, 599 F. Supp. 3d 806, 821 (E.D. Mo. 2022) (holding that “[u]nder Eighth Circuit precedent, it was ‘clearly established’ . . . that the ‘gratuitous’ use of force ‘against a suspect who is handcuffed, not resisting, and fully subdued [was] objectively unreasonable under the Fourth Amendment’ ”) (quoting Krout v. Goemmer, 583 F.3d 557, 566 (8th Cir. 2009)). Driving a train into a crowd of peaceful demonstrators may constitute excessive force, although the only decision reaching that conclusion is unpublished.254Willson v. Hubbard, No. 88-15671, 1990 WL 43011, at *2 (9th Cir. Apr. 6, 1990).

However, as was true of some First Amendment claims, excessive force results sometimes hinged on whether the protest was wholly peaceful and non-disruptive. Courts held that the use of less-lethal munitions to disperse violent or unruly protests, tasing protesters in the context of “hostile” protest environments, and even kicking or choking protesters who refused to comply with officers’ commands did not constitute excessive force under the Fourth Amendment.255See Bernini v. City of St. Paul, 665 F.3d 997, 1006 (8th Cir. 2012) (concluding that the use of non-lethal munitions to disperse a violent crowd did not amount to the use of excessive force under the Fourth Amendment); Lash v. Lemke, 786 F.3d 1, 10 (D.C. Cir. 2015) (holding that tasing a protester in the context of a hostile protest environment does not constitute use of excessive force in violation of the Fourth Amendment); Laird, 564 F. Supp. 3d at 800–01 (concluding that it was not clearly established that herding protestors to an intersection where officers deployed pepper spray against one protestor, threw him against the wall, kicked and choked him while he was handcuffed, and dragged another protestor across pavement, or that kettling detainees or applying zip cuffs too tightly rose to the level of excessive force); Poemoceah v. Morton Cnty., No. 20-cv-00053, 2020 U.S. Dist. LEXIS 249116, at *23–24 (D.N.D. Dec. 29, 2020) (concluding that tackling a protester did not violate clearly established Fourth Amendment law); Abdur-Rahim v. City of Columbus, 825 F. App’x. 284, 288 (6th Cir. 2020) (finding that pepper spraying a protester after repeated orders to disperse did not violate a clearly established Fourth Amendment right).

Several district courts also rejected excessive force claims concerning the use of handcuffs or zip ties so tight they caused physical injuries to protesters. In some cases, courts reasoned that under circuit precedent, only force sufficient to break a person’s wrist violated clearly established Fourth Amendment law.256See Robertson v. City of St. Louis, No. 18-CV-01570, 2021 U.S. Dist. LEXIS 186855, at *22 (E.D. Mo. Sept. 29, 2021) (concluding that the use of zip ties to detain arrested protesters did not violate clearly established Fourth Amendment law concerning excessive force because it has not been clearly established that anything less than force that breaks the person’s wrist constitutes excessive force); Thomas v. City of St. Louis, No. 18-CV-01566, 2021 U.S. Dist. LEXIS 193964, at *23 (E.D. Mo. Oct. 7, 2021) (explaining that it is not clearly established that applying zip ties too tightly violates the Fourth Amendment); Zinter v. Salvaggio, 610 F. Supp. 3d 919, 953 (W.D. Tex. 2022) (explaining that in the Fifth Circuit, tight handcuffing that causes acute contusions of the wrist is insufficient to demonstrate excessive force). The handcuffing/zip tie decisions demonstrate how the requirement that plaintiffs identify controlling precedent with the same facts undermines constitutional rights and prevents plaintiffs from being compensated for injuries. Absent a particular circuit court or Supreme Court decision (or perhaps more than one) holding that inflicting pain through bindings short of breaking the person’s wrist violates the Fourth Amendment, a protester plaintiff cannot recover even for serious injuries.

Several decisions in the Qualified Immunity dataset addressed the law as it relates to seizures under the Fourth Amendment. Some courts have held that warrantless seizures of protesters’ signs and other possessions violated the Fourth Amendment.257See Menotti v. City of Seattle, 409 F.3d 1113, 1154 (9th Cir. 2005) (concluding that the seizure of a protester’s sign without an arrest and without exigency offended the Fourth Amendment); Bloem v. Unknown Dep’t of the Interior Emps., 920 F. Supp. 2d 154, 166 (D.D.C. 2013) (concluding that the seizure of expressive materials from a park absent probable cause constitutes a Fourth Amendment violation). By contrast, when officers had probable cause to believe the item was unlawful, or reasonable suspicion it could be dangerous, courts have upheld seizures of items including shofars and firearms.258See Allen v. Cisneros, 815 F.3d 239, 245 (5th Cir. 2016) (concluding that the confiscation of a shofar and signs carried at a protest in violation of law restricting size of items did not violate the plaintiff’s Fourth Amendment rights); Torossian v. Hayo, 45 F. Supp. 2d 63, 68 (D.D.C. 1999) (upholding the confiscation of protest signs and the cursory search of protesters when the counter-demonstration was unlawful); Zinter, 610 F. Supp. 3d at 948 (concluding that the temporary seizure of a protester’s openly carried firearm and recording devices did not violate the Fourth Amendment). The fact that a shofar could “reasonably” be considered dangerous highlights the deference officers enjoy under Fourth Amendment cause and suspicion standards.

District courts applying circuit precedents disagreed concerning whether law enforcement uses of less-lethal weapons such as tear gas, pepper spray, and projectiles constituted “seizures” under the Fourth Amendment.259Compare De Mian v. City of St. Louis, 625 F. Supp. 3d 864, 873 (E.D. Mo. 2022) (explaining that it was not clearly established at the time police officers allegedly deployed pepper spray against a protestor at a protest that deploying pepper spray on a person who was free to leave constituted a seizure for the purposes of an excessive force claim under the Fourth Amendment), Dundon v. Kirchmeier, 577 F. Supp. 3d 1007, 1036–37, 1040 (D.N.D. 2021) (concluding that law enforcement officers’ use of less-lethal force, including water cannons, tear gas, and flash-bang grenades, against protestors of oil pipeline construction did not constitute a Fourth Amendment “seizure” supporting an excessive force claim, even though some protestors were subject to force while moving away from officers, since force was used to disperse protestors, not detain them, officers remained behind a blockade on the north side of a bridge, officers did not march toward protestors in an attempt to detain them, herd them into a certain location in such a way that protestors were unable to get away, or encircle them without a way out, and all protestors were free to leave to the south and disengage law enforcement contact), Brown v. City of St. Louis, No. 18 CV 1676, 2022 U.S. Dist. LEXIS 85588, at *14 (E.D. Mo. May 12, 2022) (concluding that pepper spraying protesters does not constitute a “seizure” under the Fourth Amendment; there is no evidence that the officer detained or arrested the protesters or directed them to stop or stay in place, nor were there any barriers to her leaving the scene), and Molina v. City of St. Louis, No. 17-CV-2498, 2021 U.S. Dist. LEXIS 62677 at *32 (E.D. Mo. Mar. 31, 2021) (concluding that protesters were not seized within the meaning of the Fourth Amendment when they merely felt the effects of tear gas without suffering any corporal impact), with Johnson v. City of San Jose, 591 F. Supp. 3d 649, 659 (N.D. Cal. 2022) (concluding that shooting a protester with a foam projectile as the protester attempted to leave the scene of the protest amounted to a seizure and an excessive use of force), and Jennings v. City of Miami, No. 07-23008-CIV, 2009 U.S. Dist. LEXIS 5430, at *22 (S.D. Fla. Jan. 27, 2009) (noting that the protesters alleged a seizure under the Fourth Amendment from the use of pepper spray, tear gas and other devices and holding it is a violation of the Fourth Amendment to use these methods of “herding” peaceful protesters). Some decisions suggested that the answer turns on whether the protester’s movement was otherwise constrained, which implies that the use of less-lethal munitions by itself does not constitute a “seizure.”260Dundon, 577 F. Supp. 3d at 1034–35. Other courts expressly held that the use of tear gas and other munitions can constitute a “seizure.”261Johnson, 591 F. Supp. 3d at 662–63. At present, there is a lack of consensus or appellate authority on this important issue.262See Shawn E. Fields, Protest Policing and the Fourth Amendment, 55 U.C. Davis L. Rev. 347, 352–58 (2021) (arguing that courts should treat the use of tear gas against protesters as a “seizure”).

Courts have also upheld brief detentions and searches incident to detention during public protests.263See, e.g., Marcavage v. City of Philadelphia, 481 F. App’x. 742, 749–50 (3d Cir. 2012) (holding that police officers’ brief detention of a counter-protester at a gay pride march was reasonable when officers had reasonable articulable suspicion that one of the counter-protester’s group members was involved in a physical altercation with a march participant, the counter-protester approached a group that was with a member and started arguing with officers, the seizure did not last for much more than one minute and the force applied was reasonable, and the detention ended once the situation with the counter-protester, his group, the crowd, and officers was stabilized); Zinter, 610 F. Supp. 3d at 948 (W.D. Tex. 2022) (noting the lack of clearly established law that an officer violates the Fourth Amendment by stopping a potential witness for several minutes and demanding his recording devices). They considered such actions justified as means of maintaining public safety and order. In some decisions, courts again relied on narrow factual distinctions relating to the detentions in determining whether they violated clearly established law. For example, although prior precedents in a circuit had established that a two-hour detention in which the plaintiff was handcuffed and detained in the back of a police cruiser was an unlawful seizure, a district court observed that in the case before it, protesters were not handcuffed, were not placed in the back of police vehicles, and were released after approximately one hour.264Zinter, 610 F. Supp. 3d at 946. Thus, the district court held, circuit precedents did not make clear to “every reasonable official” that detaining witnesses to a crime, without handcuffs and without moving them to a police vehicle, violated the Fourth Amendment.265Id.

Fourth Amendment qualified immunity decisions exhibited some of the same pathologies as First Amendment decisions. While courts condemned some egregious law enforcement practices, they declined to recognize others as violations of clearly established law. Courts relied on narrow factual distinctions and the absence of controlling authority. Together the decisions have resulted in a largely under-developed law of public protest in the Fourth Amendment area.

B.  Municipal Liability – Monell Claims

The Qualified Immunity dataset also collected information about plaintiffs’ claims against municipal defendants. Recall that to successfully hold a municipal defendant liable under section 1983, plaintiffs must demonstrate that the municipality directly violated their constitutional rights by, among other things, adopting and enforcing an unconstitutional “policy or custom.”266Monell v. Dep’t of Soc. Servs., 436 U.S. 658, 690–91 (1978). In order to sue the municipality, plaintiffs must demonstrate that an official has violated their constitutional rights because of the municipal policy or custom.267Id. at 690.

As shown in Figure 9, defendants were not successful at the motion to dismiss stage, as courts granted or upheld only eighteen of seventy-five (24%) dismissal motions. However, once cases reached the summary judgment stage, defendants were remarkably successful: 78% (113 out of 145) of municipal defendants’ motions for summary judgment were granted or upheld on appeal. Thus, although courts were inclined to allow plaintiffs to pursue discovery on Monell claims, they were overwhelmingly rejected at summary judgment.

Figure 9.  Defense Motion Success Rates for Monell Claims

The data show that in most instances, municipal liability was rejected, owing to a lack of evidence of a “policy or custom.” Courts also frequently relied on a lack of underlying constitutional violation and plaintiffs’ failure to identify a policymaking official who acted in a manner that violated their constitutional rights.

Although municipalities represent deep financial pockets and are responsible for making law enforcement and other policies, the data confirm that Monell claims are among the most difficult for plaintiffs to pursue. Defendants’ efforts to defeat these claims were largely successful.

C.  First Amendment Retaliation Claims

As discussed earlier, in Nieves, the Supreme Court adopted a probable cause standard for determining whether plaintiffs could bring a First Amendment retaliation claim.268Nieves v. Bartlett, 587 U.S. 391, 400–01 (2019); see supra notes 103–14 and accompanying text. It also recognized a narrow exception for plaintiffs who could demonstrate they had been subject to unequal treatment. Concurring and dissenting Justices sounded various alarms about the Court’s reliance on probable cause. In general, the Retaliation Claim dataset, which includes all public protest retaliation claims subject to the Nieves standard, supports the dissenters’ objections and concerns.

A significant concern is that law enforcement officers possess broad discretion to charge protesters with even minor public disorder offenses. Under Nieves, an officer who can show a protester’s arrest for disorderly conduct, breach of peace, or other minor crimes is likely to have a complete defense to a First Amendment retaliatory arrest claim. As Justice Gorsuch observed in his partial dissent:

History shows that governments sometimes seek to regulate our lives finely, acutely, thoroughly, and exhaustively. In our own time and place, criminal laws have grown so exuberantly and come to cover so much previously innocent conduct that almost anyone can be arrested for something. If the state could use these laws not for their intended purposes but to silence those who voice unpopular ideas, little would be left of our First Amendment liberties, and little would separate us from the tyrannies of the past or the malignant fiefdoms of our own age. The freedom to speak without risking arrest is ‘one of the principal characteristics by which we distinguish a free nation.’269Nieves, 587 U.S. at 412–13 (Gorsuch, J., concurring in part and dissenting in part) (quoting Houston v. Hill, 482 U.S. 451, 463 (1987)).

Justice Gorsuch noted an additional shortcoming of the majority’s approach. When it folded the free speech claim into the unreasonable arrest inquiry, he asserted, the Court made a category error. As Justice Gorsuch explained, “the First Amendment operates independently of the Fourth and provides different protections. It seeks not to ensure lawful authority to arrest but to protect the freedom of speech.”270Id. at 414. By hanging so much on probable cause to arrest protesters and other speakers, the Court elided important free speech claims and interests.

In her dissent, Justice Sotomayor took aim at the exception to the Nieves rule, which requires protesters to produce “objective evidence that [they were] arrested when otherwise similarly situated individuals not engaged in the same sort of protected speech had not been.”271Id. at 424 (Sotomayor, J., dissenting). She characterized the exception as unclear and irrational and argued it will lead to perverse results. Which protesters, she asked, are “otherwise similarly situated” to the plaintiff, and who is engaged in the “same sort of protected speech”?272Id. Further, under the Court’s approach, protesters who have more direct evidence of retaliatory motive, including officers’ own statements, cannot rely on that evidence, but must instead produce hard-to-come-by comparison-based evidence.273Id. at 425–26.

Justice Sotomayor surmised that plaintiffs who can satisfy the Nieves exception “predominantly will be arrestees singled out at protests or other large public gatherings, where a robust pool of potential comparators happens to be within earshot, eyeshot, or camera-shot.”274Id. at 430. However, she failed to consider that even those plaintiffs would be hard-pressed to gather such evidence in chaotic mass protest environments. Among other complications, during mass protests, ideological and other affiliations can be difficult to discern. Moreover, the exception incentivizes protest policing activities that data show to be already prevalent, including “herding” or “kettling” all participants regardless of specific offense, using tear gas and other force indiscriminately, and engaging in mass arrests. No officer can be accused of singling anyone out if everyone is subject to the same dragnets and other abuses. For a few reasons, there will, as Justice Sotomayor warned, be “little daylight between the comparison-based standard the Court adopts and the absolute bar it ostensibly rejects.”275Id. at 432.

Finally, Justice Sotomayor worried that the majority’s approach would “breed opportunities for the rare ill-intentioned officer to violate the First Amendment without consequence—and, in some cases, openly and unabashedly.”276Id. at 427. For example, “a particularly brazen officer could arrest on transparently speech-based grounds and check the statute books later for a potential justification.”277Id. at 431. She and the other dissenters might also have raised the possibility that racial disparities in protester arrests might affect First Amendment retaliation claims.278See, e.g., Christian Davenport, Sarah A. Soule & David A. Armstrong II, Protesting While Black?: The Differential Policing of American Activism, 1960 to 1990, 76 Am. Socio. Rev. 152, 166 (2011).

The Retaliation Claim dataset confirms many of the dissenters’ objections and concerns. Counting Nieves itself, there have been forty-one federal court decisions that applied the probable cause defense in protest-related cases. In twenty-seven of those decisions, or more than 65%, courts granted defendants’ motions to dismiss or for summary judgment with respect to First Amendment retaliation claims. An “absolute bar” may not have materialized. However, thus far, post-Nieves retaliation claims have not fared well at all in reported decisions. Courts granted or upheld dismissal at the pleading stage 56% of the time (10/18) and granted summary judgment to defendants 74% (17/23) of the time.

Table 3.  Defense Motions in Post-Nieves Retaliation Cases
PostureMotion GrantedMotion DeniedTotal
MTD10 (56%)8 (44%)18
SJ17 (74%)6 (26%)23

The nature of the charges underlying dismissal or summary judgment substantiates Justice Gorsuch’s concern that “criminal laws have grown so exuberantly and come to cover so much previously innocent conduct that almost anyone can be arrested for something.”279Nieves, 587 U.S. at 412 (Gorsuch, J., concurring in part and dissenting in part) (quoting Houston v. Hill, 482 U.S. 451, 463 (1987)). The criminal charges that ultimately defeated First Amendment retaliation claims included disorderly conduct (6), trespass (5), failure to disperse (4), disturbing the peace (3), violation of a curfew order (2), obstructing vehicular or pedestrian traffic (3), obstructing government functions (1), and jaywalking (1). As Justice Gorsuch predicted, probable cause to arrest protesters for even very minor or trivial offenses was enough to defeat the retaliation claims.

What about the exception based on evidence of unequal treatment? Courts addressed the exception on the merits in only 24% (10/41) of cases. In six of those decisions (60%), courts concluded there was insufficient evidence of unequal treatment or that the plaintiff was not “similarly situated” to the comparator class. In three decisions, courts concluded there were sufficient allegations or evidence of disparate treatment to defeat defendants’ motions to dismiss or for summary judgment. In one decision, the court concluded that the plaintiff had produced evidence that “similarly situated” speakers had not been arrested under the narrow exception Nieves recognized.280Id. at 393. In that case, plaintiffs demonstrated that no one had ever been arrested for the offense (chalking public property).281Ballentine v. Las Vegas Metro. Police Dep’t, 480 F. Supp. 3d 1110, 1116 (D. Nev. 2020).

The post-Nieves results suggest courts are engaging in a wooden application of the probable cause standard, rather than a “commonsensical[]” analysis.282Nieves, 587 U.S. at 432 (Sotomayor, J., dissenting). They have generally been willing to accept officers’ claims that arrests for minor offenses were reasonable under the circumstances, a conclusion that in most cases defeated protesters’ First Amendment retaliation claims.

Review of post-Nieves decisions also supports other criticisms. Justice Gorsuch criticized the majority opinion in Nieves for failing to recognize the First Amendment and Fourth Amendment as independent sources of rights.283Id. at 414–15 (Gorsuch, J., concurring in part and dissenting in part). As he predicted, Nieves has encouraged lower courts to focus on the legitimacy of the arrest to the exclusion of free speech, press, and assembly concerns.284See Michael G. Mills, The Death of Retaliatory Arrest Claims: The Supreme Court’s Attempt to Kill Retaliatory Arrest Claims in Nieves v. Bartlett, 105 Cornell L. Rev. 2059, 2083–84 (2020). While courts have been hyper-focused on probable cause to arrest, they have had little to say about the effects of the arrests on collecting petition signatures, public preaching and singing, videorecording protest arrests, and participation in protests involving LGBTQ rights, Occupy Wall Street, the Dakota Access Pipeline, Black Lives Matter, Juneteenth, and the removal of Confederate monuments.

The data do not provide a basis for assessing Justice Sotomayor’s concern about rogue officers suppressing speech. However, post-Nieves decisions have dismissed retaliation claims in which protesters were arrested while singing anti-LGBT songs, confronting public officials at public events, and videotaping protest policing. In these and other cases, there is at least the possibility that officers have targeted or suppressed speech based on its content.

Finally, commentators have warned that Nieves may have negative effects on newsgatherers.285See generally Clayton, supra note 113. Even if reporters have a First Amendment right to record government officials at public demonstrations, the decisions show that probable cause to arrest reporters for some minor offense may effectively negate press rights by allowing officials to target newsgatherers.

Prior to Nieves, the Supreme Court recognized another possible exception to the probable cause requirement. If a municipality adopts an official policy of retaliation against a speaker or group, the Court held, it may be held liable even if there is probable cause to arrest the speaker.286Lozman v. City of Riviera Beach, 585 U.S. 87, 99–101 (2018). Assuming this exception survives Nieves, it applies only in exceptional situations when a governmental body adopts a policy of retaliating against an individual or group for protected expressive activities.287See id. at 100 (alleging “that the City, through its legislators, formed a premeditated plan to intimidate [the plaintiff] in retaliation for his criticisms of city officials and his open-meetings lawsuit”).

The Retaliation Claims dataset suggests plaintiffs are not likely to pursue this type of claim. Only five of the forty-one decisions (12%) addressed such a claim. Three claims were dismissed for failure to allege or provide sufficient evidence of a policy or custom of retaliation or failure to establish an underlying constitutional violation.288See Blake v. Hong, No. 21-CV-0138, 2022 U.S. Dist. LEXIS 70194, at *11–12 (D. Colo. Mar. 30, 2022) (finding insufficient allegations of a “policy or practice” of retaliation); Fenn v. City of Truth or Consequences, 983 F.3d 1143, 1150 (10th Cir. 2020) (finding that a supervisory liability claim failed for lack of an underlying constitutional violation); Packard v. City of New York, No. 15-CV-07130, 2019 U.S. Dist. LEXIS 38791, at *22–23 (S.D.N.Y. Mar. 8, 2019) (finding no evidence of a “policy or custom” of retaliation). One district court concluded that the plaintiff had alleged sufficient facts in the complaint to demonstrate a policy or custom of retaliation or harassment.289Goodwin v. Dist. of Columbia, 579 F. Supp. 3d 159, 170–71 (D.D.C. 2022). Another district court concluded genuine issues of material fact concerning whether a defendant had final policymaking authority precluded summary judgment on the municipal retaliation claim.290Bledsoe v. Ferry Cnty., 499 F. Supp. 3d 856, 879 (E.D. Wash. 2020).

Lower courts have not had much time to adjust to and apply the Nieves standard. However, evidence indicates that concerns about how the probable cause and other aspects of the decision will be applied have already surfaced in early cases.

D.  Claims Against Federal Officials

As discussed, the Supreme Court has never formally recognized a First Amendment claim under Bivens for monetary damages against federal officials.291See supra notes 115–33 and accompanying text. Recent decisions have expressed general skepticism concerning Bivens claims and rejected certain types of claims under the First Amendment and the Fourth Amendment.292Reichle v. Howards, 566 U.S. 658, 663 n.4 (“We have never held that Bivens extends to First Amendment claims.”); Egbert v. Boule, 142 S. Ct. 1793, 1807 (2022) (holding that the plaintiff could not sue federal border patrol agents for First Amendment retaliation or Fourth Amendment excessive force violations). The twenty-six decisions included in the Bivens Claims dataset suggest that while lower courts have long recognized protest-related claims against federal officials, the Supreme Court’s recent decisions have placed such claims in jeopardy.

The data show that lower courts have long recognized protesters’ ability to pursue First Amendment and Fourth Amendment Bivens claims. Courts recognized a cause of action for First Amendment or Fourth Amendment violations against federal defendants under Bivens in 81% (21/26) of protest-related decisions.

However, twelve, or nearly half, of these decisions are from the D.C. Circuit and D.C. district courts. The D.C. Circuit first recognized a First Amendment protest-related Bivens claim in Dellums v. Powell, which was decided in 1977.293Dellums v. Powell, 566 F.2d 167, 195 (D.C. Cir. 1977). The District of Columbia is the site of iconic protest venues, including the grounds near the U.S. Capitol and Lafayette Park near the White House. National Park Service, U.S. Marshals officials, U.S. Capitol Police, Secret Service, and other federal officials are involved in policing and managing mass and other protest events in the District.

In addition to the D.C. Circuit, the Third, Fourth, Eighth, Ninth, and Tenth Circuits have also recognized First Amendment and Fourth Amendment Bivens claims in protest-related cases.294See Marcavage v. Nat’l Park Serv., 666 F.3d 856, 858 (3d Cir. 2012); Tobey v. Jones, 706 F.3d 379, 386 (4th Cir. 2013); Galvin v. Hay, 374 F.3d 739, 757 (9th Cir. 2004); Pahls v. Thomas, 718 F.3d 1210, 1225–26 (10th Cir. 2013). Constitutional claims in these cases have run the gamut from violation of protesters’ right to speak and assemble in a public forum under the First Amendment to allegations of excessive force, false arrest, and unreasonable seizure under the Fourth Amendment. One might assume decisions recognizing these Bivens claims long predated the Court’s recent turn against expanding Bivens. However, ten out of fifteen lower court decisions (67%) recognizing such claims or assuming they are viable were decided during the last decade, when the Court was expressing increasing skepticism about them.

There is some evidence that the Court’s Bivens negativity is starting to affect lower court decisions in protest cases. In the four most recent decisions, including one by the D.C. Circuit regarding the clearing of Lafayette Park during the 2020 Black Lives Matter protests, courts expressly rejected protesters’ First Amendment and Fourth Amendment Bivens claims.295See Clark v. Wolf, No. 20-CV-01436, 2022 U.S. Dist. LEXIS 20027, at *20 (D. Or. Feb. 3, 2022) (Fourth Amendment claim); Kristiansen v. Russell, No. 21-CV-00546, 2022 U.S. Dist. LEXIS 99459, at *3 (D. Or. June 2, 2022) (Fourth Amendment claim); Ferguson v. Owen, No. 21-02512, 2022 U.S. Dist. LEXIS 120281, at *33 (D.D.C. July 8, 2022) (First Amendment claim); Black Lives Matter D.C. v. Trump, 544 F. Supp. 3d 15, 34 (D.D.C. 2021) (First Amendment and Fourth Amendment claims), aff’d sub nom Buchanan v. Barr, 71 F.4th 1003 (D.C. Cir. 2023). The courts emphasized the Supreme Court’s admonition not to expand Bivens into “new” contexts and to apply a “special factors” analysis to prevent expansion of Bivens claims. Applying those standards, only one recent federal district court decision has upheld a protest-related Fourth Amendment claim and none have recognized a First Amendment claim.296Applying the Supreme Court’s recently adopted standards, one district court recognized a Fourth Amendment Bivens claim brought by protesters. See Graber v. Dales, No. 18-3168, 2019 U.S. Dist. LEXIS 169594, at *4–6 (E.D. Pa. Sept. 30, 2019).

The loss of a Bivens remedy would leave protesters without full recourse against federal officials who violate their First Amendment or Fourth Amendment rights. Officials with the National Park Service, Secret Service, and other federal agencies would be immunized from damages claims. As the 2020 racial justice protests demonstrated, holding federal officials liable for protest policing that violates individuals’ constitutional rights remains critically important.

IV.  STRENGTHENING PROTESTER RIGHTS AND REMEDIES

This study confirms that protesters face steep obstacles in terms of holding government officials accountable for constitutional injuries. If protesters cannot be made whole in the event of serious injuries, they may be deterred from organizing and participating in public demonstrations. Thus, what is at stake is not just the important compensation owed to injured protesters but also broader injuries to our culture of public dissent. This final Part offers five proposals to strengthen protesters’ rights and remedies.297The proposals focus on federal laws and institutions. However, states and localities can also take steps to strengthen civil rights claims. See Emma Tucker, States Tackling ‘Qualified Immunity’ for Police as Congress Squabbles Over the Issue, CNN (Apr. 23, 2021, 7:45 AM), https://www.cnn.com/2021/04/23/politics/qualified-immunity-police-reform/index.html [https://perma.cc/WP46-YTCZ]; Jeffery C. Mays & Ashley Southall, It May Soon Be Easier to Sue the N.Y.P.D. for Misconduct, N.Y. Times (Mar. 25, 2021), https://www.nytimes.com/2021/03/25/nyregion/nyc-qualified-immunity-police-reform.html [https://web.archive.org/web/20220305142403/https://www.nytimes.com/2021/03/25/nyregion/nyc-qualified-immunity-police-reform.html].

First, as other scholars have advocated, qualified immunity should be abandoned or reformed.298See, e.g., Schwartz, supra note 24; see also sources cited supra note 79. This study confirms that courts are disposing of a significant percentage (approximately 60% at summary judgment) of protesters’ First Amendment and Fourth Amendment claims based on qualified immunity. The data also show that qualified immunity shields officials from liability in all but the most egregious cases (and even in some egregious cases), is based on an impossibly narrow standard of controlling authority and reduces opportunities for courts to innovate and develop substantive law. The Court or Congress should abolish qualified immunity or reform it by, for example, changing the liability standard or doing away with the “clearly established law” requirement.299See Schwartz, supra note 24, at 1833–35 (proposing various qualified immunity reforms). Protesters and others would then be better able to recover for patently unconstitutional content-based regulations, abusive uses of force, invalid arrests, and other unconstitutional behavior.

Second, also in the realm of qualified immunity reform, the Supreme Court or Congress should revisit Nieves v. Bartlett. This study shows that First Amendment retaliation claims are frequently pursued in protest cases. Early lower court applications of Nieves’s probable cause rule confirm the objections raised by Justices Gorsuch and Sotomayor. The Supreme Court should at least clarify that probable cause is not an absolute bar to retaliation claims. Some commentators have also urged Congress to overturn Nieves.300See Clayton, supra note 113, at 2315; Mills, supra note 284, at 2063. If neither institution is willing to act, civil rights lawyers will need to focus on collecting the necessary evidence of disparate treatment to defeat the probable cause bar. As Justice Sotomayor has urged, lower courts can also adopt a “commonsensical[]” interpretation of the standard.301Nieves v. Bartlett, 587 U.S. 391, 431 (2019) (Sotomayor, J., dissenting).

Third, as this study confirms, courts need to strengthen constitutional protections under the First Amendment and Fourth Amendment. The lack of strong First Amendment and Fourth Amendment rights reduces and undermines protesters’ constitutional protections. Applications of qualified immunity doctrine show that First Amendment doctrines allow officials to exclude protesters from public properties, enforce restrictive speech zones, and significantly displace demonstrations. Joanna Schwartz has criticized substantive Fourth Amendment law, specifically the “reasonableness” standard that allows officers to “stop, arrest, beat, shoot, or kill people who have done nothing wrong without violating their constitutional rights.”302Schwartz, supra note 9, at 52. Similarly, she argues, the Court’s “excessive force” doctrine has “left officers with few limits on their power.”303Id. The First Amendment and Fourth Amendment doctrines addressed in this study are longstanding. However, the Supreme Court should more clearly establish the limits they place on government officials when they regulate protest activity and lower courts should apply these limits in ways that better protect the rights of protesters.

Fourth, and relatedly, courts must publish more decisions elaborating on applications of First Amendment and Fourth Amendment rights. Figure 10 shows the number of published qualified immunity protest-related decisions over time available on Westlaw. The Qualified Immunity dataset covers four decades but includes only eighty-six published federal appellate court decisions. To be sure, there are likely more such decisions; but if they are not accessible, they cannot be used to analyze qualified immunity. If published appellate decisions are to be the primary sources of clearly established law, it is obvious that litigants and courts need significantly more guidance. The uptick in published decisions during the last five years is encouraging, even if it may partially be related to the 2020–2021 mass street protests. More published decisions should produce more clearly established limits on protest policing and other activities. The Supreme Court could also take steps such as loosening the requirement of controlling circuit precedent and allowing courts to consult other decisions or to rely on general principles, rather than requiring plaintiffs to identify in-circuit cases involving the same or similar factual circumstances.

Figure 10.  Published Qualified Immunity Protest Decisions over Time

Fifth, and finally, governmental immunity doctrines must allow injured plaintiffs to hold all parties that cause injuries accountable. This means reducing or repealing municipal immunities and allowing injured protesters to sue federal officials under Bivens for First Amendment and Fourth Amendment violations. In my study, although plaintiffs frequently sued municipalities, nearly 80% of their Monell claims failed at summary judgment.304See discussion supra Section III.B. As Joanna Schwartz has argued, “[o]ne way to make sure that people are paid what they are owed is to do away with Monell standards and hold cities legally responsible for the constitutional violations of their officers—just as private companies are held vicariously liable for the acts of their employees.”305Schwartz, supra note 9, at 230. Some have urged plaintiffs to pursue “failure to supervise” claims, which have been recognized in some federal appellate court decisions. See Nancy Leong, Municipal Failures, 108 Cornell L. Rev. 345, 371–72 (2023). However, the liability standard for these claims, “deliberate indifference,” is difficult to meet. Connick v. Thompson, 563 U.S. 51, 61 (2011) (quoting Bd. of the Cnty. Comm’rs v. Brown, 520 U.S. 397, 410 (1997)). In the Qualified Immunity dataset, protester plaintiffs brought seventy-five “failure to train” claims, which are subject to the same standard. Municipal defendants successfully moved to dismiss fifty-two of those claims, or 75%. Protester plaintiffs must also have the opportunity to hold Secret Service, National Park Service, and employees of other federal agencies accountable. Lower courts have traditionally perceived no impediment to recognizing and adjudicating such claims.306See, e.g., Dellums v. Powell, 566 F.2d 167, 194–95 (1977) (recognizing a Bivens action in the context of a protest at the U.S. Capitol). As some recent decisions demonstrate, the Supreme Court’s negativity regarding Bivens threatens to undermine the fundamental right to express political dissent.307See, e.g., Black Lives Matter D.C. v. Trump, 544 F. Supp. 3d 15, 31–32 (D.D.C. 2021) (rejecting a Bivens claim brought by racial justice protesters). Although the Supreme Court has not expressly rejected protest-related First Amendment claims against federal officials, it has crept ever closer to doing so. As the Court itself has urged, Congress should codify Bivens by creating civil damages claims against federal officials who violate First Amendment, Fourth Amendment, and other constitutional rights.

CONCLUSION

Governmental immunities have had a profoundly negative effect on public protesters’ ability to obtain compensation for constitutional harms. This study’s quantitative analysis shows defendants’ significant success using qualified immunity to defeat a variety of First Amendment and Fourth Amendment claims. Its qualitative analysis illustrates how application of qualified immunity and other doctrines have defeated protesters’ claims, even when defendants have engaged in egregious constitutional violations.

The study lends additional support to general criticisms of qualified immunity and related doctrines. More broadly, it shows that failure to reform or abolish governmental immunities will affect the right to protest peacefully, safely, and with high confidence that officials who regulate and police protests will respect constitutional rights.

This Article offers several proposals for strengthening protesters’ remedies or at least limiting obstacles to monetary recovery. These include judicial or legislative repeal of qualified immunity, developing stronger substantive First Amendment and Fourth Amendment protections, abandoning municipal liability restrictions, and retaining civil liability for federal officials. Without serious reform, in most cases protesters will continue to be un- or under-compensated, public officials will continue to escape liability, and traditionally valued public protest activity will be encumbered and chilled.

97 S. Cal. L. Rev. 1583

Download

* John Marshall Professor of Government and Citizenship, William & Mary Law School. I would like to thank Paul Hellyer for his outstanding assistance with the study design and the research supporting this Article. Special thanks also to Rebecca Roberts for her help updating the study databases. Any errors are, of course, my own.

Filtered Dragnets and the Anti-Authoritarian Fourth Amendment

Filtered dragnets are digital searches that identify a suspect based on the details of a crime. They can be designed to withhold information from law enforcement unless and until there is a very high probability that the individual has committed the offense. Examples today include DNA matching, facial recognition from photographs or video of a crime, automated child sexual abuse material detection, and reverse geolocation (geofence) searches. More are sure to come, and their wide-scale use will be irresistible to improve the low rates of criminal detection that currently afflict many communities.

However, filtered dragnets imperil society precisely because they detect crime too well. Sudden increases in the detection of criminal conduct will intensify the pathologies of American criminal justice: namely, that too many marginally harmful acts are criminalized, crimes are punished too harshly, and police and prosecutors have too much discretion. If nearly everybody commits some technical violation of criminal law that can be easily detected and harshly punished, all Americans will be at the mercy of the constable’s pity.

These threats are not well constrained by current Fourth Amendment jurisprudence, based on privacy rights, because filtered dragnets detect crime without revealing irrelevant details. Thus, Fourth Amendment theory and doctrine must strengthen the anti-authoritarian objectives endowed in its roots. A search conducted with a filtered dragnet should be considered reasonable only if it is administered in an evenhanded manner, and a subsequent seizure of a person is reasonable only when the misconduct is abhorrent enough to justify arrest and imprisonment.

INTRODUCTION

Nearly forty years ago, Justice Brennan asked his colleagues, who had just given a constitutional stamp of approval to the drug-sniffing dog, to imagine a device “that, when aimed at a person, would detect instantaneously whether the person is carrying cocaine.”1United States v. Jacobsen, 466 U.S. 109, 138 (1984) (Brennan, J., dissenting). Justice Brennan went on to criticize the majority for ignoring not only the privacy interest that is intruded upon, but also the accuracy of the technique (or lack thereof) and “whether the surveillance technique is employed randomly or selectively.” Id. at 140. If the device could detect the presence of cocaine inside a building, “there would be no constitutional obstacle to the police cruising through a residential neighborhood and using the device to identify all homes in which the drug is present.”2Id. at 138. For a thoughtful discussion of this dissenting opinion, see Kiel Brennan-Marquez, Big Data Policing and the Redistribution of Anxiety, 15 Ohio State J. Crim. L. 487, 491–92 (2018). He believed the prospect of police having a tool of near-perfect detection presented a catastrophic threat that the courts have a duty to stop.

We are not too far off from this scenario anymore,3With the exception of conduct that takes place on the Internet and the geolocation of smart devices, the vast majority of human affairs still occurs outside the realm of digitized documentation. That said, sensor technologies, facial recognition, and biometric surveillance are beginning to convert more offline activities into tracked or trackable affairs. Perhaps the technology in development that is most analogous to Justice Brennan’s cocaine device are quantum magnetometry sensors that are sensitive enough to detect materials through walls and underground. See Chris Jay Hoofnagle & Simson L. Garfinkel, Law and Policy for the Quantum Age 31–76 (2022). and some strategies already in use by law enforcement and intelligence agencies are similar to Brennan’s machine. Examples include DNA matching, facial recognition from photographs or video of a crime when it was in progress, automated child sexual abuse material detection, and reverse digital searches (where police use information known about the crime, such as location, timing, or special instrumentalities, to cross-check against service provider data in order to identify a suspect). Many more of these investigative techniques are sure to come, especially if or when the Internet of Things reaches its potential by placing increasingly powerful sensors on nearly every machine.

Twenty-first century policing will increasingly use data collected from tracking and sensing technologies to conduct investigations that work backwards. Law enforcement will use the particulars of a crime as a “fingerprint,” so to speak, to determine who should belong in the pool of suspects. Unlike the standard dragnet, which permits law enforcement to observe large amounts of data and to choose their targets, filtered dragnets force investigations to focus on the evidence of a crime. Computers will automatically scan through data without exposing it and will make a disclosure only when there is probable cause to believe that a person’s data matches the signature of the crime. Moreover, even when data is disclosed, filtered dragnet programs can be designed so that the only data revealed is potentially relevant data; extraneous details can be withheld.

When surveillance technologies meet all these benchmarks—that is, when (1) they are used to find an individual related to a crime (rather than to find a crime related to an individual), (2) when they report details from an otherwise private database only after meeting a high threshold of confidence (e.g., probable cause or higher), and (3) when they withhold details that are ex ante unlikely to be relevant to the current criminal investigation, the nature of that surveillance is different from other types of police work. Filtered dragnets, as I will call them, are structured to avoid many problems traditionally associated with mass surveillance.

Fourth Amendment theory and reasoning is just starting to find its legs in digital search cases,4See Carpenter v. United States, 138 S. Ct. 2206, 2209 (2018) (accessing several days’ worth of geolocation data constitutes a search that will ordinarily require a warrant); United States v. Jones, 565 U.S. 400, 413–15 (2012) (Sotomayor, J., concurring) (arguing that GPS tracking should be a search irrespective of whether a tracking device has physically intruded into a protected area). but filtered dragnets will destabilize criminal procedure law again. They will whittle down most of the privacy rationales for Fourth Amendment protection. Mounting a Fourth Amendment defense will require a litigant to convincingly argue that even though the defendant very likely committed a crime, and even though the police did not see or have discretionary access to data for any other persons and did not even have irrelevant data about the defendant for that matter, the search was nevertheless unreasonable. That sort of privacy über alles argument might work for crimes of questionable legitimacy—drug possession, for example—but it won’t work in the context of universally reviled conduct like murder.

What is more, filtered dragnets may reduce privacy intrusions on net, as compared with current investigation techniques, because they can remove many people from the scope of suspicion who would otherwise become targets of investigation. In other words, filtered dragnets break the privacy-security trade-off because they simultaneously increase criminal detection and privacy. As Bennet Capers has explained, they may be a useful tool to simultaneously tackle under-protection and over-policing problems.5I. Bennett Capers, Techno-Policing, 15 Ohio State J. Crim. L. 495, 496 (2018) (“The task is to reimagine Big Brother so that he not only watches us; he also watches over us—to reimagine Big Brother as protective, and as someone who will be there to tell our side of the story.”); I. Bennett Capers, Crime, Surveillance, and Communities, 40 Fordham Urb. L.J. 959, 989 (2013). For a discussion of the moral injuries when police cause indignities and abuse, see Eric J. Miller, The Moral Burdens of Police Wrongdoing, 97 Res Philosophica (2020). Outright bans of these technologies, as have been advocated in many corners,6See, e.g., Antoaneta Roussi, Resisting the Rise of Facial Recognition, 587 Nature 350, 352 (2020) (quoting Woodrow Hartzog, who described facial recognition technology as the “most dangerous ever to be invented”); Kate Conger, Richard Fausset & Serge F. Kovaleski, San Francisco Bans Facial Recognition Technology, N.Y. Times (May 14, 2019), https://www.nytimes.com/2019/05/14/us/facial-recognition-ban-sanfrancisco [https://perma.cc/858W-&M6N] (quoting ACLU attorney Matt Cagle, praising the ban as “forward-looking and looks to prevent the unleashing of this dangerous technology against the public”); Matthew Guariglia, Geofence Warrants and Reverse Keyword Warrants Are So Invasive, Even Big Tech Wants to Ban Them, Elec. Frontier Found. (May 13, 2022), https://www.eff.org/deeplinks/2022/05/geofence-warrants-and-reverse-keyword-warrants-are-so-invasive-even-big-tech-wants [https://perma.cc/VG22-ENMH]. would be irresponsible.7Undeterred crime is oppressive and unequal, too. James Forman Jr., Locking Up Our Own: Crime and Punishment in Black America 96­­–99 (2018); Alexandra Natapoff, Underenforcement, 75 Fordham L. Rev. 1715, 1715 (2006).

Nevertheless, even if filtered dragnets detect crime and nothing else, they pose serious social risks that Fourth Amendment law and scholarship are ill equipped to handle: What happens to Fourth Amendment theory and the practice of criminal justice if nearly every crime could be detected?

In the late 1990s, Larry Lessig asked this very question.8Lawrence Lessig, Code and Other Laws of Cyberspace 18 (1999) (“This difference complicates the constitutional question. The [technology’s] behavior is like a generalized search in that it is a search without suspicion, but it is unlike the paradigm case of a generalized search in that it creates no disruption of ordinary life and finds only contraband. . . . Is [it] constitutional? That depends on your conception of what the Fourth Amendment protects. . . . The paradigm case cited by the framers does not distinguish between these two very different protections. It is we, instead, who must choose.”). He anticipated that digital technologies may create a wedge between the privacy and anti-authoritarian rationales for criminal procedure. But most Fourth Amendment scholars do not even recognize a schism between privacy and anti-authoritarian goals. Instead, they continue to focus on privacy as the key constraint on any police activity that leverages large amounts of personal data. The scholars who have recognized liberty and anti-authoritarianism as a Fourth Amendment lodestar have insisted that all technology-assisted surveillance is a tool of abusive state power per se.9Paul Ohm, The Fourth Amendment in a World Without Privacy, 81 Miss. L. J. 1309, 1334–38, 1346 (declaring that considerations of power seem to be “the amendment’s essence, not merely a proxy for something deeper,” but then equating abuses of state power with the ability to solve crimes faster); David Alan Sklansky, Too Much Information: How Not to Think About Privacy and the Fourth Amendment, 102 Calif. L. Rev. 1069, 1120 (2014) (advocating for Fourth Amendment protection against any electronic surveillance that fails to leave a sphere of refuge or autonomy for the individual); Andrew Guthrie Ferguson, Surveillance and the Tyrant Test, 110 Georgetown L. J. 205, 266 (2021). But see Richard M. Re, Imagining Perfect Surveillance, 64 UCLA L. Rev. Discourse 264, 274–276, 281–285 (2016). Re’s essay, set in the year 2026 and describing a fictitious tool of perfect surveillance and crime reporting, anticipates the need for courts to shift the focus of Fourth Amendment law to the substance of criminal law. As a result, Fourth Amendment scholars lump filtered dragnets with all other surveillance and advocate for the strictest access controls, guaranteeing the continuation of a low rate of criminal detection.

This is the wrong course. The threat from filtered dragnets is tyranny, and the Fourth Amendment will be more effective and coherent if we recognize that. Filtered dragnets will dramatically increase the detection of crime, and this will intensify existing pathologies in American criminal justice that have little to do with privacy. Namely, we have too many crimes, too much punishment, and too much police and prosecutorial discretion. These problems jointly produce the risk of authoritarian power. An overly expansive criminal code paired with harsh penalties ensures that nearly everybody could be subjected to incarceration.10Glenn Harlan Reynolds, Ham Sandwich Nation: Due Process When Everything Is a Crime, 113 Colum. L. Rev. Sidebar 102, 103–04 (2013). See generally Harvey A. Silvergate, Three Felonies a Day: How the Feds Target the Innocent (2011). When the state also has unchecked power to choose where and when to investigate within the ocean of criminal-but-typically-ignored conduct, the populace is at the mercy of the state’s will.11Filtered dragnets, like any tool that cheaply and accurately finds evidence of crime, will not necessarily cause the state to abuse its power, but it will certainly give legislatures, police, and prosecutors a mechanism to abuse power more efficiently if they so choose.

Today, the criminal justice equilibrium rests on an unspoken compromise. The state has broad substantive law, harsh punishment, and unchecked discretion, it is true, but the populace has privacy rights that nearly guarantee low detection, even when police are highly motivated. When filtered dragnets give police near-perfect detection, the bargain has to be renegotiated.

This Article proposes a new grand bargain for Fourth Amendment law: the Supreme Court should recognize filtered dragnets as a legitimate and even desirable tool for criminal investigations. But constitutional rules should guarantee that the substance of American criminal law will be limited to conduct that is commonly recognized as heinous, that the severity of the punishment fits the reprehensibility of the crime, and that the enforcement of criminal laws is equitable and nonarbitrary.12In other words, as described in detail infra Part III, reversing Smith v. Maryland, 442 U.S. 735 (1979) and the third party doctrine will be of minimal relevance to the just use of filtered dragnets. Instead, cases that permit carceral arrest for minor misconduct (Atwater v. City of Lago Vista, 532 U.S. 318 (2001)) and that give police unfettered discretion in investigation and enforcement decisions (Whren v. United States, 517 U.S. 806 (1996)) are of much greater consequence. See infra Part V. Without these civil rights, if the substance of criminal law is left as broad and vague as it is today,13On vagueness and overbreadth, see Silvergate, supra note 10, at XI–XVI. See generally Risa Goluboff, Vagrant Nation (2016); Kiel Brennan-Marquez, Extremely Broad Laws, 61 Ariz. L. Rev. 641 (2019). and if penalties and the impact of prison are as debilitating as they are now, filtered dragnets would give the government the means of exercising tyrannical control through the omnipresent threat of criminal enforcement and the power of discretionary clemency.

This Article proceeds as follows: Part I describes some filtered dragnets that are already in use and lays out the essential features that distinguish them from other investigation tools.

Part II describes the potential social benefits that can be gained from the responsible use of filtered dragnets.

Part III describes the scholarship and caselaw challenging the constitutionality of filtered dragnets on privacy grounds and disagrees with it. By most common-sense meanings of privacy, filtered dragnets are in fact much more private than the sorts of investigations that routinely occur.

Part IV shows that the threat of filtered dragnets comes not in the form of privacy but in the form of tyranny. Perfect detection of crime in a system where criminal statutes are sprawling and criminal penalties are harsh will either create a country of convicts or will give government too much power to engage in selective leniency.

Part V reinterprets the Fourth Amendment prohibition of unreasonable searches and seizures to fit the criminal justice problems that emerging surveillance technologies will cause. The reasonableness of a seizure should depend on whether the defendant’s conduct truly warrants criminal liability and penalties. The reasonableness of a search should depend on both expectations of privacy and on evenhanded investigation practices.

Part VI explains why the Constitution, and the Fourth Amendment in particular, are well suited to carry out this shift even though it would mark a departure from twentieth century precedent.

The agenda laid out in this Article is ambitious—almost embarrassingly so. What I propose here would require a seismic shift in Fourth Amendment principles that would cross the procedural/substantive divide.14Other scholars have advocated for a Fourth Amendment theoretical inquiry that breaks out of a purely procedural lane. Morgan Cloud, Pragmatism, Positivism, and Principles in Fourth Amendment Theory, 41 UCLA L. Rev. 199, 200 (1993) (“The fragmentation of constitutional theory in law school curricula and academic scholarship is nowhere more evident than in the isolation of the fourth amendment from broad currents of contemporary jurisprudence. . . . This isolation has impoverished both fourth amendment theory and general constitutional theory alike.”); William J. Stuntz, The Substantive Origins of Criminal Procedure, 105 Yale L.J. 393, 393–411 (1995). Given that, I take comfort in the fact that I am not painting on blank canvas. This project is a remix of themes developed by Bill Stuntz,15William J. Stuntz, The Collapse of American Criminal Justice (2011). Bennett Capers,16Capers, supra note 5. Elizabeth Joh,17Elizabeth E. Joh, Discretionless Policing: Technology and the Fourth Amendment, 95 Calif. L. Rev. 199 (2007). Bernard Harcourt and Tracey Meares,18Bernard E. Harcourt & Tracey L. Meares, Randomization and the Fourth Amendment, 78 U. Chi. L. Rev. 809 (2011). Chris Slobogin,19Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. Chi. L. Rev. 317 (2008). Mark Kleiman,20Mark A. R. Kleiman, When Brute Force Fails (2009). and many others. Even so, it is awfully presumptuous to suggest courts might start invalidating criminal laws or sentencing rules using a new-fangled conception of the Fourth Amendment. But I will suggest it anyway because it is the only desirable and realistic option. The criminal justice system needs to be transformed in a manner that accepts much greater levels of detection in exchange for many fewer criminal prohibitions and punishments. It is a trade that has to be executed simultaneously in order to avoid disastrous consequences.21Criminal liability and sentencing cannot be reduced unless and until the detection of serious crimes is improved. Otherwise, the inevitable crime wave will turn on the backlash machinery of increased sentences and bloated criminal codes. On the other hand, unleashing filtered dragnet technologies without fixing existing statutes and sentences will expose many more people to criminal liability than is justified and will create too many opportunities for biased or opportunistic enforcement. See infra Part V. No legislative or local government process could pull off a massive rights horse trade of the sort that is required. It can only be accomplished through the style of landmark constitutional cases that, every generation or so, help realign Fourth Amendment operational rules with the ultimate purpose of Fourth Amendment protection.22I am referring here to the transition the Fourth Amendment made from a protection of property interests to a protection of privacy following Katz v. United States, 389 U.S. 347 (1967). See discussion infra Part V.

I.  WHAT ARE FILTERED DRAGNETS?

The progenitors of filtered dragnets have been around for a while. Fingerprinting analysis is a well-known and time-honored method of backwards investigation where the facts from the scene of a crime (the fingerprint markings) are cross-checked against a large stockpile of information in order to make a fairly confident match to a particular suspect.23Davis v. Mississippi, 394 U.S. 721, 727 (1969). Police dogs are another example.24Illinois v. Caballes, 543 U.S. 405, 409 (2005). We know that the mind-boggling sensitivity of a dog’s nose is such that, if it could talk, it could reveal vast amounts of information about a person—what is inside their bag, how their health is, whether they’ve been in recent contact with other people—that are unobservable to we mere humans. In some sense, the mind of a police dog is a treasure trove of personal information that remains inaccessible to police most of the time. But when they are trained to alert to contraband or to specific scents sampled from a crime scene, the dog and the training combine to create a “binary search”—a mechanism that tells the police nothing unless there is probable cause that a crime is being committed.25Jane Bambauer, Defending the Dog, 91 Ore. L. Rev. 1203, 1203 (2013).

These crime-driven, quasi-filtered investigations are the outliers in a system of police investigation that relies much more heavily on witnesses, confessions, and physical searches.26Throughout this article, I will distinguish suspect-driven investigations from crime-driven searches. See Slobogin, supra note 19, at 322–23 (using the term “event-driven”); Jane Bambauer, Other People’s Papers, 94 Tex. L. Rev. 205, 208 (2015) (using the term “crime-out”). But we can expect the practice to rapidly expand because of the greater amounts and variability of data available for cross-checking the facts of a crime against data from the population of potential suspects.

This Part lays out the two required features of filtered dragnets that will cause an unprecedented shock to Fourth Amendment theory. We will then visit examples of techniques that are already in use that either already satisfy the definition of filtered dragnets or soon will.

A.  Required Elements to Qualify as a Filtered Dragnet

Filtered dragnets provide a suspect’s data to police only if (a) their data matches uniquely criminal details such that there is a high probability they have engaged in criminal conduct; and (b) their data has been pared down to provide only relevant details about the suspected crime to the police. When combined, these features make filtered dragnets a qualitatively different style of police investigation.27Jack Balkin bristles when scholars describe “essential features” of a technology. Jack B. Balkin, The Path of Robotics Law, 6 Calif. L. Rev. Cir. 45, 45 (2015). Suffice it to say that I am defining here a techno-social application of data collection and processing. The same technology can be used in other ways, of course, but then those uses would not meet my definition of a “filtered dragnet.”

1.  Automated Matching of Uniquely Criminal Details

Filtered dragnet investigations will trawl through and process large amounts of data. There is no doubt that they are a dragnet. But to qualify as a filtered dragnet, the filter of the dragnet must constrain the system’s ability to leak information. A filtered dragnet must be programmed to alert police only if an individual’s data matches a unique fingerprint of a crime.28David H. Kaye, Identification, Individualization and Uniqueness: What’s the Difference?, 8 L. Probability & Risk 85, 92 (2009). In other words, the system blinds the police until at least probable cause (and hopefully more suspicion) is established.

Filtered dragnets are a subset of the category of investigations that Christopher Slobogin calls “suspectless searches.”29Christopher Slobogin, Suspectless Searches, 83 Ohio State L.J. 953, 954 (2022) [hereinafter Slobogin, Suspectless Searches]; see Christopher Slobogin, Virtual Searches 127–48 (2022) [hereinafter Slobogin, Virtual Searches]. Slobogin describes many of the same techniques that I do here, but his analysis has less futurism and is more interested in the way the Fourth Amendment should handle suspectless searches right now, when many cannot or do not match to uniquely criminal profiles. But they are a narrow subset. Very few of the suspectless searches that Slobogin analyzes (many of which I describe below) have the potential to become filtered dragnets. As they are practiced today, they will not meet the heightened standards for filtered dragnets because they do not use unique signatures of criminal behavior. For example, geofencing and familial DNA-matching procedures often allow police today to access data about a handful of individuals, all but one of whom are necessarily innocent, in order to help the police create leads for traditional follow-up investigation. To find the Golden State Killer, the FBI found a genetic match to a family member, and then used traditional genealogy to trace from that family member to the suspect.30Paige St. John, The Untold Story of How the Golden State Killer Was Found: A Covert Operation and Private DNA, L.A. Times (Dec. 8, 2020), https://www.latimes.com/california/story/2020-12-08/man-in-the-window [https://perma.cc/7LZU-9JGQ]. The revelation of that family member’s identity would not qualify as matching to “uniquely criminal detail.”

Slobogin argues that even when a small number of people, some of whom are guaranteed not to be the perpetrator (such as somebody whose DNA only partially matches that of the sample from a crime scene), are identified to the police, the intrusion into privacy is fairly minimal and should be handled through Fourth Amendment doctrines that allow for warrantless searches and seizures, like checkpoints.31Slobogin, Suspectless Searches, supra note 29, at 955–56. I agree with nearly all of Slobogin’s proposals about how courts should interpret the Fourth Amendment with respect to these examples. But they still do not meet the criteria I am setting—criteria that, when met, challenge the most basic conceptions of Fourth Amendment privacy. To meet the definition of a filtered dragnet for my purposes, police will remain ignorant to details and identities until there is a high probability that the information identifies and pertains to the perpetrators and no one else.

2.  Nondisclosure of Irrelevant Details

The first requirement on its own ensures that filtered dragnets are analogous to “binary searches” like drug-sniffing dogs—the sort that alert only if there is probable cause of a crime. But there is an additional affordance that should be exploited: filtered dragnets must refine the information that is ultimately disclosed to police by filtering out personal, irrelevant details even about a suspect. This is equivalent to a drug-sniffing dog that could magically produce a suspect’s drugs without any of the rifling through cars and pockets that are necessary today. Thus, the suspect will retain privacy over details that are not relevant to the criminal investigation at hand.

To be clear, neither of these requirements are meant to be absolute guarantees. All systems have error, and even if police are able to set very demanding thresholds for false positives, police will occasionally access licit, irrelevant details when a filtered dragnet falsely identifies a suspect who is then subjected to an arrest or probable cause–based search. But the requirements for disclosure in a filtered dragnet system can be calibrated to fit societal needs and expectations: the chance of false accusation error can be driven down to practically zero if we would like, if we are willing to tolerate the consequences that there will be more false negatives (more crimes that are not detected) or that police departments will need to access more data in order to maintain the same level of detection.

A.  Examples

Next, we will visit a set of backwards investigation techniques that are in use today. These use the particularities of a crime to lead police to a suspect. While most cannot meet the demanding definition of “filtered dragnet” formalized above, with time and additional data resources, they will surely get there.

1.  DNA Matching

DNA-matching investigations use parts (non-revelatory portions) of a DNA sequence produced from a sample collected at a crime scene or from a crime victim in order to identify a suspect using DNA databases. They are an obvious extension of fingerprinting analyses with some souped-up features. First, DNA matching can set a very high threshold of statistical probability of true match (or, in other words, a very low probability of a false match) because each DNA sequence has a large amount of data.32With enough of a sequence for matching, the investigator can have extremely high confidence that the combination of DNA markers will be unique to a single individual. Fingerprint analysis, by contrast, contains a natural limit on how confident an analyst can be that the patterns from prints left at a crime scene would be produced by just one person. Nevertheless, there are still opportunities for DNA matching to produce erroneous results. Erin E. Murphy, Inside the Cell: The Dark Side of Forensic DNA 29–83 (2015). Second, they can make use of popular commercial and ancestry databases for cross-checking and are therefore not limited to identifying individuals who have a history with the criminal justice system.

Third, familial or partial DNA matches are very useful for police investigations in a way that partial fingerprint matching is not. In familial DNA-matching investigations, such as the one that eventually led to the arrest of the Golden State Killer, police departments recover the identity not of the suspect but of one or more of the suspect’s genetic relatives.33David Lazer & Michelle N. Meyer, DNA and the Criminal Justice System: Consensus and Debate, in DNA and the Criminal Justice System: The Technology of Justice 907–08 (David Lazer ed., 2004) (describing “low-stringency” searches on DNA databases that will return results of individuals who are likely to be related to the person whose DNA was sequenced for the crime scene sample). This raises privacy concerns for the relatives whose identities are revealed to law enforcement in the course of finding the perpetrator.34Natalie Ram, Fortuity and Forensic Familial Identification, 63 Stan. L. Rev. 751, 791 (2011). So, as practiced today, familial DNA searches do not fit the definition of a filtered dragnet. They fail the second element (filtering out innocent and irrelevant details) by revealing identities and information about family members who are definitely not the perpetrator of the crime.35One might think these are relatively minor privacy intrusions (equivalent to a witness saying “the murderer was Moe’s cousin”). However, it is conceivable that in the future, if multiple databases are able to be accessed and triangulated, familial DNA matching can be part of a filtered dragnet system that automatically finds a familial match, trawls other data sources in order to identify the correct relative of familial match (based on, e.g., age, location, or personal history of the relatives), and discloses the identity of the suspect and the relevant details only when and if there is sufficient confidence that the correct suspect has been identified.36This is not far-fetched: police already use statistical packages like a service called “What Are the Odds” in order to understand the closeness of the blood relationship between the suspect and the person whose DNA created a familial match, and then they use traditional methods of genealogy research (e.g., cross-checking with Census records and other public records) to find the suspect. Ellen M. Greytak, CeCe Moore & Steven L. Armentrout, Genetic Genealogy for Cold Case and Active Investigations, 299 Forensic Sci. Int’l. 103, 103–04, 107 (2019). All of this can be automated.

DNA evidence holds an esteemed place in criminal justice and public perception. DNA evidence is durable (as long as it is handled properly) and judges and juries can justifiably place a high degree of confidence in the reliability of DNA-matching investigations.37Lazer & Meyer, supra note 33, at 880–81. Other types of data beyond DNA can have these qualities, too, but they provoke much more suspicion and dissent. Distinguishing them from DNA matching will become increasingly untenable.

2.  Facial Recognition

Facial recognition uses large databases of identified photographs (often scraped from the public Internet) to discover the identity of a person who would otherwise be anonymous.38The procedure works by converting images of faces into “face prints”—maps of the contours of an individual’s face—and then cross-checking the maps against each other. Natasha Singer, Never Forgetting a Face, N.Y. Times (May 18, 2014), https://www.nytimes.com/2014/05/18/technology/never-forgetting-a-face [https://perma.cc/L2PZ-DWL3]. The technology can be used as a filtered dragnet when police departments deploy facial recognition on photographic evidence from the scene of the crime.39Facial recognition can also be used when police have already sought and received a warrant for a person’s arrest based on probable cause from other sources and are attempting to locate the suspect. This would also constitute a filtered dragnet. For example, law enforcement has used facial recognition to pin identities to individuals who appeared in surveillance footage from the Capitol on January 6, 2021, as well as to robberies and street crimes.40Kashmir Hill, Your Face Is Not Your Own, N.Y. Times Mag. (Mar. 18, 2021), https://www.nytimes.com/interactive/2021/03/18/magazine/facial-recognition-clearview-ai [https://perma.cc/A2CC-GXGG]. Although facial recognition algorithms are less accurate for female and non-white faces,41Patrick Grother, Mei Ngan & Kayee Hanaoka, Nat’l Inst. of Standards and Tech., NISTIR 8280, Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects 48 (2019). industry members claim this is not the case for top-performing algorithms in active use.42Jake Parker & David Ray, What Science Really Says About Facial Recognition Accuracy and Bias Concerns, Sec. Indus. Ass’n (July 23, 2022), https://www.securityindustry.org/2022/07/23/what-science-really-says-about-facial-recognition-accuracy-and-bias-concerns [https://perma.cc/Z2Z2-ZZN6]; Hoan Ton-That, The Myth of Facial Recognition Bias, Clearview AI (Nov 28, 2022), https://www.clearview.ai/post/the-myth-of-facial-recognition-bias [https://perma.cc/4WXT-65Y6].

3.  Automated CSAM Detection

Last year, Apple unveiled a program that would automatically scan iPhoto images and cross-check them against a library of known child pornography when the images were uploaded to the iCloud. Apple had planned to use a hashing technique to check all files sent from Apple devices to be stored on iCloud servers. Essentially, every image received by an Apple phone is converted to a code that corresponds to the visual image.43The hash is a 1:1 transform, meaning that the hash function would convert an image into just one particular string of numbers, and conversely a single code (or string of numbers) would translate into one particular image. This allows Apple to check the hash of every image against a library of hashes that represent known child sexual abuse material (“CSAM”) in order to detect child pornography. However, those who traffic in CSAM would be alert to this and could make minor changes to the image to avoid exact matches. To prevent circumvention, Apple uses a form of perceptual hashing (called NeuralHash) that uses fuzzy matching to detect and alert to images that do not match exactly but are very likely depicting the same image. Apple, CSAM Detection: Technical Summary 4 (2021). When a person’s iPhoto images produce ten matches, Apple employees would automatically be alerted and would share the information with authorities. Thus, while every image would be hashed and cross-checked against child pornography, only the images that matched could lead to a disclosure to law enforcement. Apple has since abandoned its plans in response to criticism,44Lily Hay Newman, Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next, Wired (Dec. 7, 2022, 11:11 PM) https://www.wired.com/story/apple-photo-scanning-csam-communication-safety-messages [https://perma.cc/G8SL-RE53]. but the technological capability still exists.

4.  Geofences and Other Reverse Searches

In 2019, a spate of arsons involving vehicles parked in commercial lots was committed in short succession.45In re Search Warrant Application for Geofence Location Data Stored at Google Concerning an Arson Investigation, 497 F. Supp. 3d 345, 351 (N.D. Ill. 2020). Based on the locations, surveillance footage, and similar modi operandi, police had reason to believe that a single set of co-conspirators was involved in all six arsons. When federal investigators requested that the court issue a warrant requiring Google to search its time-logged geolocation records for cellphones that were at or near the scenes of the arsons during the times that they were committed, a U.S. magistrate judge complied.46Id. at 364. This type of process—where police start with the location, approximate time, and other details of a crime and ask service-providers to find a matching account—is known as a “geofence warrant,” and magistrate judges have issued orders authorizing their use under certain conditions. Judges have refused to issue warrants (without deciding whether warrants are actually necessary) when the request cast too wide a net—that is, if too many devices are likely to be identified as matching the search criteria.47E.g., In re Matter of Search of Info. Stored at Premises Controlled by Google, 481 F. Supp. 3d 730, 733 (N.D. Ill. 2020). For example, if police are investigating a crime that took place during a Beyoncé concert, even a geofence with a small radius, during a fairly precise window of time, will draw in too many false matches—too many phones of innocent bystanders. But this concern falls away if police can use multiple details or the intersection of several geofences in order to create a search criteria that will be unique to the perpetrator.48The arson case would have been an ideal investigation to use intersecting geofences. Unfortunately, the government did not request records in that way, and the court did not address the difference between the union and intersection of geofences in its opinion. In re Search Warrant Application, 497 F. Supp. 3d at 345. For example, in one recent case, a perpetrator who was suspected to have cased the location of a murder on the day before he committed it was identified using overlapping geofences from the day before and the day of the murder.49Slobogin, Suspectless Searches, supra note 29, at 954 (citing Tyler Dukes, To Find Suspects, Raleigh Police Quietly Turn to Google, WRAL NEWS (July 13, 2018, 11:07 AM), https://www.wral.com/to-find-suspects-police-quietly-turn-to-google/17377435 [https://perma.cc/BU4W-2Z4Q]). License plate readers, drone footage, Internet of Things data, and satellite surveillance imaging could also be sources of geolocation information in the likely circumstance that criminals begin to leave their devices at home.50Id. at 954–55; Eldar Haber, The Wiretapping of Things, 53 UC Davis L. Rev. 733, 736 (2019).

Geolocation data can be combined with other types of information, too, to form a signature of crime that is more likely to be unique. As an illustration, US intelligence agencies located Osama bin Laden in part by looking for locations where they would expect to find Internet and cell service but in fact found none.51Peter Bergen, Did Torture Help Lead to Bin Laden?, CNN (Dec. 10, 2014, 12:26 PM), https://www.cnn.com/2014/12/10/opinion/bergen-torture-path-to-bin-laden/index.html [https://perma.cc/EJV6-FV6W]. There are data sources outside of location data that can create a signature for reverse searching. For example, while investigating an arson case, the Denver police department sought and received a “keyword warrant”—a court order requiring Google to reveal the account information of users who had recently searched for the address of the arson during a fifteen-day period leading up to the crime.52Celes Keene, Reverse Keyword Searches and Crime, Lexology (Aug. 11, 2022), https://www.lexology.com/library/detail.aspx?g=de2f5b21-a9b1-4650-a911-31dd1f39e671 [https://perma.cc/T8HH-RREJ]. Cyberstalking, child pornography, and many other online crimes have used forms of reverse searches in order to identify the accounts associated with IP addresses that were used to engage in those crimes.53See, e.g., United States v. Forrester, 512 F.3d 500, 505 (9th Cir. 2008); United States v. Hood, 920 F.3d 87, 89 (1st Cir. 2019); United States v. Contreras, 905 F.3d 853, 855–56 (5th Cir. 2018).

5.  Scanners, Sensors, Cameras, and Microphones

Red light cameras were one of the first ventures into automated policing and were also much despised.54Erin Mulvaney & Dug Begley, Opposition Putting a Stop to Red Light Cameras, Hous. Chron. (Apr. 25, 2013, 9:19 AM), https://www.houstonchronicle.com/news/houston-texas/houston/article/opposition-putting-a-stop-to-red-light-cameras-4461447.php [https://web.archive.org/web/20220708020423/https://www.houstonchronicle.com/news/houston-texas/houston/article/Opposition-putting-a-stop-to-red-light-cameras-4461447.php]. These systems used sensors to detect if a car entered an intersection after the light had turned red, took a photograph of the car, and later used the image of the car (and its license plate) to track down the owner and mail a ticket. These systems are not dragnets per se (they do not make use of pre-existing collections of data), but they set the stage for Automatic License Plate Readers that do capture an abundant amount of data in case some particular parts of it are useful later, as when police are searching for a stolen vehicle.55Slobogin, Suspectless Searches, supra note 29, at 955. Similarly, short-range communications technologies can reveal a car’s speed. Joh, supra note 17, at 200.

Patterns that are highly suggestive of crime can also be automatically detected using recording devices with cameras, microphones, or sensors that operate in “always on” mode.56Haber, supra note 50, at 735. One example in use today is ShotSpotter microphones that are constantly “listening” in a public setting but alert the police and save data long term only when the noises captured by the shot-spotter match the sounds of gunshots.57ShotSpotter, ShotSpotter Frequently Asked Questions (2018), https://www.shotspotter.com/system/content-uploads/SST_FAQ_January_2018.pdf [https://perma.cc/3SD4-B2JU]. In theory, Alexa, which also constantly records to respond to watchwords like “Hey Alexa,”58Amazon, How Alexa Works: Wake Word (last visited Feb. 25, 2024), https://www.amazon.com/b?ie=UTF8&node=23608571011 [https://perma.cc/JXB3-246D]. could be designed to detect sounds that are particular to domestic violence or home invasion and automatically alert the authorities.

Other sensitive devices like terahertz scanners can detect when naturally occurring radiation is blocked by metal objects. When the blocking metal objects are gun shaped, the scanners can be programmed to alert.59I. Bennett Capers, Race, Policing, and Technology, 95 N.C. L. Rev. 1241, 1275–77 (2017) (arguing that these tools can lead us to “real reasonable suspicion”). But this is nothing compared to what quantum magnetometry will be able to do in the near future.60Dmitry Budker & Michael Romalis, Optical Magnetometry, 3 Nature Physics 227, 227 (2007). Quantum sensing is so sensitive to minute differences in magnetic fields that the sensors will be able to detect trace amounts of chemicals, even when they are concealed behind walls. So, Justice Brennan’s nightmare scenario is here: we will soon have contraband detection devices.

This survey of suspicionless searches and backwards investigations demonstrates that there is increasing viability and interest in using these types of techniques. The practices currently in use do not usually meet the two formal requirements for “filtered dragnets,” but it is useful to assume they eventually will. By assuming investigations will eventually meet the demanding definition of filtered dragnets, we will be able to state with more rigor precisely why it is we are nervous about these law enforcement technologies, and what the policy or constitutional response should be.

II.  THE ADVANTAGES OF FILTERED DRAGNETS

This Article will eventually explain why filtered dragnets impose serious risks on society that are not adequately (or even nominally) addressed in Fourth Amendment theory. But first, we will explore reasons to embrace, rather than resist, the integration of filtered dragnets into policing.

Filtered dragnets offer several advantages over the investigation practices in common use.61A police investigation strategy cannot be judged without comparison to its next best alternatives. See Tal Z. Zarsky, Governmental Data Mining and Its Alternatives, 116 Penn. St. L. Rev. 285 (2011). These include decreased exposure of innocent details, increased accuracy and efficacy of criminal investigations, increased detection and deterrence of crime, decreased discretion for suspect selection, and decreased risk to witnesses and victims. In combination, these advantages contribute such compelling benefits to society that courts and attorneys should feel a moral obligation to harness their powers as much as possible.

A.  Decreased Exposure of Innocent and Irrelevant Details

Filtered dragnets protect the privacy of innocent individuals, as well as the innocent-and-irrelevant details of a suspect. They protect innocent individuals whose data is scanned in the process by allowing police and courts to set a high standard for false match error. That is, filtered dragnets can be programmed to alert and reveal personal information only when the statistical probability that the person has engaged in crime is greater than 50%, or 80%, or 99%. This would ensure that the number of innocent individuals who are initially approached and investigated will be only a fraction of the number of criminals who are found.62I have called this “hassle”—the imposition of searches, seizures, or even the stress of becoming a person-of-interest, experienced by an innocent person who is targeted based on probable cause. Jane Bambauer, Hassle, 113 Mich. L. Rev. 461, 461 (2015).

Moreover, filtered dragnets limit the type of information that is revealed even about the proper subjects of investigation who have committed a crime. This is a game-changer. If police could have searched a house or a car in a manner that blinded them to everything except contraband or criminal evidence, the text and interpretation of the Constitution would probably differ from what we have today. The closest analogy we have to filtered dragnets, as I have mentioned before, are drug-sniffing dogs. Police dogs are allowed to sniff and alert based on the (mostly defensible) assumption that they will be trained well enough to have a low error rate.63Florida v. Harris, 568 U.S. 237, 238 (2013). The dog sniff and subsequent alert are, controversially, treated as a non-search in Fourth Amendment law unless the dog has trespassed into the home or curtilage of a resident.64Florida v. Jardines, 569 U.S. 1, 6–7 (2013). But once the dog alerts, the police have probable cause to perform an entire human-conducted unfiltered search of a person’s vehicle, home, or effects, thereby revealing intimate and innocent details while they look for contraband. Filtered surveillance is more privacy-protective than drug-sniffing dogs because it can restrict the sort of data that is revealed even as police are verifying that the alert is accurate.

I do not mean to suggest that filtered dragnets avoid all revelations about innocent people or activities. Relevant data disclosed to police as a result of a high probability match will frequently, maybe even usually, reveal information that is not directly tied to wrongdoing. For example, if in the future the police used a system that combines familial DNA matching with other records to identify a sexual assault offender, police may see and use the identity of the family member in order to confirm that the identification is sound and to show how the case was solved to a jury. This could reveal the identity of estranged parents or children of the suspect or could uncover paternity that was not previously known.65Neil Richards, Why Privacy Matters 99 (2021). But this is a consequence of the fact that all successful investigations impose some irreducible privacy costs on the innocent. Even using traditional strategies, police will occasionally and appropriately question a spouse in a manner that reveals the suspect is having an affair or may make other similar sensitive revelations. If the revelations are in service of pursuing a probable cause–backed  investigation, these will be innocent-but-relevant details.66Thus, I disagree with scholars like Neil Richards who suggest that familial DNA matching inevitably presents a risk of a free-for-all where police will routinely learn about paternity or about the genetic propensity for disease. See id. The advantage I describe here pertains to the shielding of innocent-and-irrelevant information.

B.  Increased Accuracy

By definition, filtered dragnets identify suspects and reveal information only when there is a high probability of crime. This is a form of increased accuracy—a reduction in false positive error. (In the next subsection, I will discuss the other form of increased accuracy—the reduction in false negative error—which would allow filtered dragnets, if deployed consistently, to solve more crimes and increase clearance rates.)

If filtered dragnets are held to higher probability standards than standard investigation techniques, they will cause proportionally fewer false starts and erroneous arrests and searches along the way.67Ram, supra note 34, at 788 (identifying the potential for exoneration as a reason to adopt familial DNA matching). Similarly, a more accurate criminal justice system also reduces the potential for abuse, too, because it denies state agents the ability to credibly threaten the innocent. Dhammika Dharmapala, Nuno Garoupa & Richard H. McAdams, Punitive Police? Agency Costs, Law Enforcement, and Criminal Procedure, 45 J. Leg. Stud. 105, 111 (2016) (citing Keith N. Hylton & Vikramaditya S. Khanna, A Public Choice Theory of Criminal Procedure, 15 Sup. Ct. Econ. Rev. 61 (2007)). In time, a shift toward filtered dragnets should decrease the dangers and anxiety that come from false suspicion and conviction at every stage of criminal investigation. Indeed, facial recognition systems that identify a suspect based on photographs or surveillance footage from a crime already outperform the accuracy rates of average eyewitnesses and PC-based warranted searches by a large margin.68False match error rates for facial recognition algorithms are now under 1% in ideal conditions and under 10% when used in the field, and facial recognition services recommend law enforcement use a threshold of 95% confidence. William Crumpler, How Accurate Are Facial Recognition Systems—and Why Does It Matter?, Ctr. Strategic & Int’l Stud. (Apr. 14, 2020), https://www.csis.org/blogs/strategic-technologies-blog/how-accurate-are-facial-recognition-systems-and-why-does-it [https://perma.cc/3YQS-UM7C]. By comparison, eyewitness identification during a lineup has error rates of 20% or more. Gary L. Wells & John W. Turtle, Eyewitness Identification: The Importance of Lineup Models, 99 Psych. Bulletin 320, 320 (1986). The same is true for racial differences in error rates: while some facial recognition technologies were, at least for a time, more likely to produce false matches for photographs of Black faces, the gap in false match error has already been reduced. Stewart Baker, The Flawed Claims About Bias in Facial Recognition, Lawfare (Feb. 2, 2022, 12:57 PM), https://www.lawfaremedia.org/article/flawed-claims-about-bias-facial-recognition [https://perma.cc/E8TC-HV8A]. In any event, even if gaps persist, those gaps may be less bad than the differences in false match error from human systems of suspect identification. And unlike traditional policing methods, facial recognition technology can be calibrated to only produce a match when the risk of a false match is below a certain threshold regardless of the target’s constraining alerts, in other words, to ensure equal false positive rates by race. Setting the false match rate to be equal is equivalent to ensuring that “probable cause” for Black suspects means the same thing it does for whites. For a full articulation of race-conscious analyses of error, see Sandra G. Mayson, Bias In, Bias Out, 128 Yale L.J. 2218 (2019).

Skeptics will have at least two critiques of my optimistic prediction: all systems have some error, and the sort of error that comes from a highly technical and data-driven system might be particularly worrisome since a falsely accused defendant will have to go up against a trusted and more accurate system.69See Andrea Roth, Trial by Machine, 104 Geo. L.J. 1245, 1281 (2016) (describing the “seduction of quantification” in machine processes).

It is true that no investigation tool is free from error, and it is also possible that police, prosecutors, and juries could be at risk of reflexively trusting the results of a filtered dragnet system because they are so reliable. But the premise of the critique might be plain wrong. When a filtered dragnet produces a spurious result, the error could very well be easier to catch than when an informant or witness makes a spurious identification. For example, when a man named Michael Usry was the target of an investigation based on his father’s partial genetic match to crime scene DNA, Usry was cleared as soon as his own DNA sample was collected and analyzed because it did not match the sample collected at the scene of the crime.70Jim Mustian, New Orleans Filmmaker Cleared in Cold-Case Murder; False Positive Highlights Limitations of Familial DNA Searching, NOLA.com (Mar. 12, 2015), https://www.nola.com/article_d58a3d17-c89b-543f-8365-a2619719f6f0.html?mode=comments [https://perma.cc/S3GZ-59DY]; Natalie Ram, Christi J. Guerrini & Amy L. McGuire, Genealogy Databases and the Future of Criminal Investigations: The Police Can Access Your Online Family-Tree Search and Use It to Investigate Your Relatives, 360 Science 1078, 1078 (2018). This should generalize: the more independent sources of data there are, the more protection there should be for innocent.71See Joshua A.T. Fairfield & Erik Luna, Digital Innocence, 99 Cornell L. Rev. 981 (2014). A person wrongly identified by facial recognition is more likely to have a credible digital alibi (e.g., geolocation data that puts them in an entirely different state at the time of a crime) than a wrongly identified person who was accused by a confidential informant.

The facts of United States v. Chatrie72United States v. Chatrie, 590 F. Supp. 3d 901 (E.D. Va. 2022). illustrate the propensity for the erroneous targets of filtered dragnets to be cleared earlier and easier than erroneous targets in traditional investigations. In that case, police used a geofence warrant to access the deidentified location data of individuals who were near the scene of a bank robbery during the hour that the crime took place.73Id. at 917–22. The geofence produced the deidentified location records of nineteen individuals, only one of whom was the perpetrator.74Id. at 920–21. These facts do not fit the requirements of a filtered dragnet because law enforcement accessed and manually examined information related to the eighteen individuals who were not the perpetrator, but we can think of these eighteen as stand-ins for those who are wrongly targeted by filtered dragnet. One hour of anonymous geolocation data conclusively ruled out sixteen of them, and an additional hour ruled out the other two. None of the eighteen were identified (by name or other direct identifier) to the police, and none were questioned.75Id. at 921. By contrast, consider the experiences of two individuals who were briefly implicated in the investigation before the FBI used geofence technologies. Using traditional policing methods, the FBI first investigated the ex-boyfriend of a woman who saw news reports about the bank robbery and called the police to offer a false tip. They also investigated somebody who owned the same kind of car that was used as the getaway vehicle when a bank employee reported the possible tip, but that, too, was a dead end.76Id. at 917. It is not clear from the opinion what sorts of encounters and information-gathering the police used to rule out these two, but I suspect the anxiety and privacy burden absorbed by them was greater, by almost any measure, than the burden to the eighteen individuals whose approximate movements in public during one to two hours were disclosed in deidentified form. If this case is representative, the geofence warrant process should be a method of first resort, rather than last resort, because it is likely to lead more quickly to both the identification of the right suspect and the elimination of wrong ones.

A second skeptical critique is that I am describing the positive qualities of filtered dragnets under the assumption that the systems will be deployed as intended and will not be manipulated or tampered with. This is a legitimate concern to which the long history of flaws in forensic labs can attest.77Murphy, supra note 32, at 29–83; John Solomon, More Wrongdoing Found at FBI Crime Lab, Midland Daily News (Apr. 14, 2013), https://www.ourmidland.com/news/article/More-Wrongdoing-Found-at-FBI-Crime-Lab-7133820.php [https://perma.cc/D43V-8T9L]. The FBI has acknowledged that flawed forensics have affected dozens of death penalty cases. FBI Admits Flawed Forensic Testimony Affected at Least 32 Death Penalty Cases, Equal Just. Initiative (Apr. 29, 2015), https://eji.org/news/fbi-admits-flawed-forensic-testimony-in-32-death-penalty-cases/#:~:text=These%20FBI%20examiners%20trained%20500,those%20defendants%20have%20been%20executed [https://perma.cc/RNX9-KZTH]. But as a comparative matter, data-driven techniques of this sort might be more accountable and auditable than old-school forms of criminal investigation. When the same level of scrutiny and doubt is applied to traditional investigations that would have to continue in the absence of new technologies—the risks of error and manipulation present in eyewitness testimonies, suspect interrogation, or warrant affidavits78Lazer & Meyer, supra note 33, at 917. The Innocence Project found that half of the cases that they selected as being likely to be a false conviction did indeed lead to exoneration once DNA evidence was tested. How did they select these cases? By looking for convictions that were based on the traditional (and highly faulty) forms of evidence that are noisy signals of guilt: testimony from jailhouse snitches and eyewitnesses, the defendants’ confessions, and pseudo-scientific evidence (e.g., hair analysis). Id. at 898–99. Other factors include incompetent defense counsel and police or prosecutorial misconduct.—the prediction that filtered dragnets will be more corrupt and error-prone is hard to believe.79For example, one study found that more than 25% of sexual assault suspects are exonerated when DNA re-analysis becomes available. Peter Neufeld & Barry C. Scheck, Convicted by Juries, Exonerated by Science: Case Studies in the Use of DNA Evidence to Establish Innocence After Trial xxviii (1996). If this sample is typical, the findings imply that the quality of traditional police investigations leading to investigation, arrest, and conviction is rather shoddy.

C.  Increased Detection and Deterrence

The accuracy and efficiency of filtered dragnets can help tackle longstanding social problems of chronically unsolved crime, assuming filtered dragnets are used regularly.80Ram, supra note 34, at 788 (describing increased crime solving as an argument in favor of familial DNA searching). About twenty-five million Americans—8% of the population—suffer from a violent felony or a felony-level theft each year.81Alexandra Thompson & Susannah N. Tapp, U.S. Dep’t. of Just., NCJ 305101, Criminal Victimization, 2021 2–3 (2022). These events are of course disproportionately likely to beset low-income households. While violent crime rates today are still down compared to the high-water marks in the 1980s and early 1990s,82In the U.S., crime rates are quite low in historical terms. Violent crimes have dropped by at least half since the early 1990s, and property crimes have dropped even more dramatically. John Gramlich, What the Data Says (and Doesn’t Say) About Crime in the United States, Pew Rsch. Ctr. (Nov. 20, 2020), https://www.pewresearch.org/short-reads/2020/11/20/facts-about-crime-in-the-u-s [https://perma.cc/R9A8-SDUH]; Rachel E. Morgan & Barbara A. Oudekerk, U.S. Dep’t. of Just., NCJ 253043, Criminal Victimization, 2018 1 (2019). Although crimes of all sorts (particularly murder) have skyrocketed during the COVID-19 pandemic, the pandemic-related stress on social and economic wellbeing make the recent data difficult to interpret. Compare Paul G. Cassell, Explaining the Recent Homicide Spikes in U.S. Cities: The “Minneapolis Effect” and the Decline in Proactive Policing, 33 Fed. Sent’g Rep. 83 (2020) (finding under-policing and under-deterrence as a main cause), with Jeffrey Fagan & Daniel Richman, Understanding Recent Spikes and Longer Trends in American Murders, 117 Colum. L. Rev. 1235 (2017), and German Lopez, The Rise in Murders in the U.S., Explained, Vox (Dec. 2, 2020, 10:35 AM), https://www.vox.com/2020/8/3/21334149/murders-crime-shootings-protests-riots-trump-biden [https://perma.cc/9NZR-HBHC] (suggesting pandemic-related shocks are the primary driver of higher homicide rates). the statistics are still grim, particularly for communities of color. In the U.S., about five people in every 100,000 are murdered each year.83FBI Uniform Crime Report, Crime in the United States 2013, Expanded Homicide Data Table 6, U.S. Dep’t Just., Fed. Bureau Investigation (2013), https://ucr.fbi.gov/crime-in-the-u.s/2013/crime-in-the-u.s.-2013/offenses-known-to-law-enforcement/expanded-homicide/expanded_homicide_data_table_6_murder_race_and_sex_of_vicitm_by_race_and_sex_of_offender_2013.xls [https://perma.cc/W9H4-64BB]. For African-Americans, the rate is above six per 100,000.84Id. (By comparison, the rates in France and Italy are 1.28 and 0.52 per 100,000, respectively.)85Id. The United States, even in its lowest crime period, is still far more crime-ridden than other developed nations. For example, 5.4 out of every 100,000 Americans were killed by homicide in 2016, whereas in France the rate was 1.4 out of every 100,000. See Victims of Intentional Homicide, 1990–2018, United Nations Off. on Drugs and Crime, https://dataunodc.un.org/content/data/homicide/homicide-rate [https://perma.cc/NLL4-FNLL]. In addition to the trauma and losses to crime victims, society also absorbs a range of economic costs and psychological distress in the course of guarding against crime.86See, e.g., David Anderson, The Aggregate Burden of Crime, 42 J.L. & Econ 611, 629–30 (1999); Aaron Chalfin & Justin McCrary, Are U.S. Cities Under-Policed? Theory and Evidence, 100 Rev. Econ. & Stat. 167, 167 (2018); Kathryn E. McCollister, Michael T. French & Hai Fang, The Cost of Crime to Society: New Crime-Specific Estimates for Policy and Program Evaluation, 108 Drug & Alcohol Depend. 98, 98 (2010). It is all too easy for scholars, lawmakers, and others who live in safe neighborhoods to forget: serious crime is just awful.

Crime clearance rates (that is, the proportion of crimes actually reported to the police that have led to an arrest or otherwise been considered solved) for violent crime is 42%, and the rate is under 15% for property crimes.87Crime Clearance Rate in the United States in 2020, by Type, Statista, https://www.statista.com/statistics/194213/crime-clearance-rate-by-type-in-the-us [https://perma.cc/XT5F-EHCQ]; Most Violent and Property Crimes in the U.S. Go Unsolved, Pew Rsch. Ctr. (2017) [hereinafter Pew Property Crimes], https://www.pewresearch.org/fact-tank/2017/03/01/most-violent-and-property-crimes-in-the-u-s-go-unsolved [https://perma.cc/XG8E-6FQ8]; What the Data Says (and Doesn’t Say) About Crime in the United States, Pew Rsch. Ctr. (2020), https://www.pewresearch.org/fact-tank/2020/11/20/facts-about-crime-in-the-u-s [https://perma.cc/92VY-8CGL]. Only about half of violent crimes and one-third of property crimes are ever reported to the police, and many arrests and convictions are erroneous. The low likelihood of reporting a crime, the low clearance rates, and the somewhat sizable chance of false arrest altogether mean that the probability a criminal will be prosecuted for any particular violent crime is probably under 20%.88Statista, supra note 87. The figure for property crime is 7%. Pew Property Crimes, supra note 87.

Clearance rates in black neighborhoods are even worse. The events over the last decade validate Bill Stuntz’s observation that “poor black neighborhoods see too little of the kinds of policing and criminal punishment that do the most good, and too much of the kinds that do the most harm.”89Stuntz, supra note 15, at 497; see also Randall Kennedy, Race, Crime, and the Law 19, 158–60 (1997). Dampening crime in lower income black communities is a civil rights goal of longstanding stature.90Forman, supra note 7, at 11 (“African Americans have always viewed the protection of black lives as a civil rights issue, whether the threat comes from police officers or street criminals.”), 61 (recounting the editorials in journals that served black D.C. neighborhoods that demanded more law enforcement to ensure that black neighborhoods stay peaceful), 128. Bennett Capers described underenforcement as the criminal justice problem that gets short shrift,91Capers, Techno-Policing, supra note 5, at 497. and that was before George Floyd’s murder made police violence and over-policing problems an issue of pressing global salience. There is some squeamishness today in discussing crime in black neighborhoods (and certainly in referring to that crime as “black on black”), but it is foolish to expect criminal justice reform to be lasting and meaningful if it does not tackle both of the scourges of inner-city policing: harsh policing and civilian violence.

The most obvious and natural way to curb future violent crime is to increase the detection of very serious crimes today.92Mark Kleiman’s work catalogued a set of “dynamic concentration” probation and drug treatment programs that were unusually successful at recidivism reduction. Kleiman, supra note 20, at 34–65. They depended on good detection. Id. at 164. Kleiman pointed out that predatory crimes—those that terrorize and corrupt communities the most—are also the hardest to observe. Id. at 165. I am suggesting here that technology may give us the opportunity to run Kleiman-style compassionate crime control programs at a much more ambitious scale. Some scholars, Tom Tyler chief among them, have made the case that in the long run, law-abiding behavior has less to do with criminal law enforcement tactics than with cultural, economic, community, and norms-based factors.93Tom Tyler, Why People Obey the Law 171 (2006). Occasionally, this insight has been oversimplified and distorted to leave the impression that law enforcement detection rates have nothing to do with crime rates.94Shaila Dewan, Refund the Police? Why It Might Not Reduce Crime, N.Y. Times (Nov. 8, 2021), https://www.nytimes.com/2021/11/08/us/police-crime.html [https://perma.cc/U56T-8EPP]. This is a mischaracterization of the evidence.95Even Tyler’s work demonstrates that belief that lawbreakers will be caught and punished has a sizable and statistically significant impact on behavior. Tyler, supra note 93, at 59. While there are multiple “root causes” of crime,96Crime rates are the result of many social and economic factors that fall outside the realm of criminal law enforcement, such as population demographics (when the population is disproportionately young, there is more crime), fluctuations in the black market for drugs and other vices, environmental toxins (some criminologists have associated lead poisoning to impulsive and criminal behavior), and changes in the access to guns. Forman, supra note 7, at 50. data and common sense confirm that holding other factors steady, criminal behavior is sensitive to the probability of law enforcement detection. The relevant criminology studies consistently find evidence that detection reduces the incidence of future crime.97See, e.g., Aaron Chalfin & Justin McCrary, Criminal Deterrence: A Review of the Literature, 55 J. Econ. Lit. 5, 13–15, 23–29 (2017) (finding abundant evidence that crime is reduced when police manpower and redeployments increase, and much less consensus in the literature on severe punishment); Steven N. Durlauf & Daniel S. Nagin, Imprisonment and Crime: Can Both Be Reduced?, 10 Crim. & Pub. Pol’y 9, 17 (2011); Daniel S. Nagin, Deterrence in the Twenty-First Century, 42 Crime & Just. 199, 201 (2013); Daniel S. Nagin, Deterrence: A Review of the Evidence by a Criminologist for Economists, 5 Ann. Rev. Econ. 83, 88 (2013); Jeffrey Grogger, Certainty vs. Severity of Punishment, 29 Econ. Inquiry 297, 307–09 (1991); Kleiman, supra note 20, at 74–78; Jennifer L. Doleac, How Do State Crime Policies Affect Other States? The Externalities of State DNA Database Laws 1–3 (Dec. 2016) (unpublished manuscript), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2892046 [https://perma.cc/2KP5-7FHJ]. There is also some evidence that the swiftness of enforcement—the “celerity”—makes a difference.98Chalfin & McCrary, supra note 97, at 10.

Increased detection of crime not only reduces crime rates, but also improves other measures of social mobility and security as well. Greater crime detection increases the likelihood that offenders will seek and find employment, enroll in education, and live in a stable family environment, and it reduces school absenteeism in the community.99Anne Sofie Tegner Anker, Jennifer L. Doleac & Rasmus Landersø, The Effects of DNA Databases on the Deterrence and Detection of Offenders, 13 Am. Econ. J. Applied Econ. 194, 195 (2021). Indeed, given how dramatic the impact of detection is on increasing pro-social behavior, it is not at all clear that law enforcement should even be distinguished from the so-called “root causes” of crime. Fear that crime will not be well controlled is a root of many of the root causes of crime.100“Safe streets are a necessary platform for neighborhood growth and prosperity. . . . [T]he notion that poverty is the mother of crime has been turned on its head.” Philip J. Cook, Assessing Urban Crime and Its Control: An Overview 3 (Nat’l Bureau of Econ. Rsch., Working Paper No. 13781, 2008). To be clear, there are plenty of independent reasons to endorse or adopt the rehabilitative programs that criminologists and criminal justice scholars propose. See, e.g., Rachel Elise Barkow, Prisoners of Politics 76–77 (2019), for an example of an argument in favor of focusing on rehabilitative programs. But scholars like Barkow do not discuss the possibility that greater detection of crime can reduce crime rates and reduce net punishment.

So, an enduring and well-documented fact is that an increased likelihood of detection and enforcement drives crime rates down. This is much less true, and possibly not true at all, for the severity of punishment, where increasing the length of prison sentences is found to have no impact or even criminogenic effects.101Chalfin & McCrary, supra note 97, at 23–29. Thus, the state’s essential duty to protect its constituents from the violence and exploitation of others is well served by good detection. Unfortunately, crime rates are currently under the management of the American criminal justice system’s haphazard style of enforcement: occasional, error-prone, and harsh.102This critique, it should be noted, dates back to the eighteenth-century work of Jeremy Bentham and Cesare Beccaria. See generally Raymond Paternoster, How Much Do We Really Know About Criminal Deterrence?, 100 J. Crim. L. & Criminology 765 (2010).

D.  Decreased Discretion for Suspect Selection

Filtered dragnets are crime-driven rather than suspect-driven. In suspect-driven investigations, police have developed suspicion—or a hunch—around a particular individual and focus their observations in an attempt to develop a case.103Slobogin, supra note 19, at 322–23. Even Big Data–assisted suspect-driven investigations appear to perform poorly in identifying criminals who may have committed a crime. John S. Hollywood, Kenneth N. McKay, Dulani Woods & Denis Agniel, RAND Corp., Real-Time Crime Centers in Chicago: Evaluation of the Chicago Police Department’s Strategic Decision Support Centers 36 (2019). Suspect-driven investigations are propelled by the theories of police officers and proceed within their discretionary control. Police also have some control over filtered dragnet investigations (e.g., over where and when to deploy them), but once they are put into service, police lose control over the results. If facial recognition or reverse searches identify a wealthy or politically connected individual as the suspect of a crime, it will be much more difficult for police and prosecutors to avoid pursuing investigation and prosecution, as compared to cases where police use informants or witnesses as the main source of identification.

In later Parts, this Article describes the ways in which police can still exercise too much discretion by, for instance, using a filtered dragnet tool preferentially to solve some crimes and not using it on others that are substantially similar. But we should not lose sight of the ways filtered dragnets do constrain discretion. One of the greatest risks from mass surveillance (that is, dragnets) is its potential to create a resource for selecting the suspect first and then finding a crime, or for using legal but sensitive information to discredit political enemies and personal foes.104For example, the NSA’s strategy of revealing the pornography viewing habits of religious radical critics of the U.S. government. Conor Fridersdorf, The NSA’s Porn-Surveillance Program: Not Safe for Democracy, The Atlantic (Nov. 27, 2013), https://theatlantic.com/politics/archive/2013/11/the-nsas-porn-surveillance-program-not-safe-for-democracy/281914 [http://web.archive.org/web/20230323142324/https://www.theatlantic.com/politics/archive/2013/11/the-nsas-porn-surveillance-program-not-safe-for-democracy/281914]. Police cannot exert this type of control over filtered dragnets.105At least, they cannot exert control so easily. In Section IV.B, I will discuss how police units could still tamper with the process through the selection of crimes to solve or by avoiding or removing the analysis of a subset of constituents’ data.

The Supreme Court caselaw that has found fault with Big Data policing has involved digital searches in which the police first selected their target and then accessed long histories of their target’s whereabouts without a warrant.106Carpenter v. United States, 138 S. Ct. 2206, 2212 (2018) (accessing several days’ worth of geolocation data of a specific target); United States v. Jones, 565 U.S. 400, 403 (2012) (involving GPS tracking of a specific target). The Court is right to constrain investigations that permit police to access sensitive and detailed information without any justification or checking mechanism. Even when police have developed suspicion against a target, the low-tech factors that go into building up suspicion about a particular individual (e.g., testimony from an informant or presence in a “high crime neighborhood”) can impose an indirect racial tax on innocent minorities that could mostly be avoided with filtered surveillance programs that have very low error.107Kennedy, supra note 89, at 159; Ian Ayres & Jonathan Borowsky, ACLU of So. Cal., A Study of Racially Disparate Outcomes in the Los Angeles Police Department 27 (Oct. 2008), https://www.aclusocal.org/sites/default/files/wp-content/uploads/2015/09/11837125-LAPD-Racial-Profiling-Report-ACLU.pdf [https://perma.cc/U9GK-7BTU]; Floyd v. City of New York, 959 F. Supp. 2d 540, 556, 584 (S.D.N.Y. 2013). NYPD data showed that a substantial portion of the Terry stops (a.k.a. “stop-and-frisk”) had a predictably low chance of actually leading to the discovery of contraband based on the factors the police claimed were present. Sharad Goel, Maya Perelman, Ravi Shroff & David Alan Sklansky, Combatting Police Discrimination in the Age of Big Data, 20 New Crim. L. Rev. 181, 213 (2017).

Not all agree with this assessment. Kiel Brennan-Marquez has argued that “nothing about the logic or practice of data-driven law enforcement makes [] redistributive impulses necessary. On the contrary, they will be hard fought—and particularly in our current political climate, unlikely.”108Brennan-Marquez, supra note 2, at 490. I share a certain degree of Brennan-Marquez’s cynicism (I have wondered, for example, if law enforcement’s sloth-like speed in adopting crime-driven investigation practices rather than suspect-based practices are related to the loss of control over defining the pool of suspects),109Police use most of these tools as a last resort, perhaps because self-preservation of police discretionary power and popular (if ill-conceived) public resentment toward big data policing happen to push in the same direction. but he goes too far. There already is some evidence that data-driven policing has redistributed the costs of law enforcement and will continue to do so. DNA-based exonerations, for example, have proven the innocence of disproportionately more minority convicts than whites.110Edwin Grimsley, What Wrongful Convictions Teach Us About Racial Inequality, Innocence Project (Sept. 26, 2012), https://innocenceproject.org/what-wrongful-convictions-teach-us-about-racial-inequality [https://perma.cc/V3U6-R4FQ]. This suggests that, going forward, DNA-based investigations will shift police focus not only toward the guilty, but also away from wrongfully accused Black and minority suspects.

E.  Decreased Risk to Victims, Witnesses, and Suspects

Police investigations cause a range of problems that are not captured in the variables I have discussed so far—privacy intrusions, erroneous arrest, et cetera. When police have to rely on old school methods of case investigation, the system necessarily puts victims, witnesses, and suspects at risk of physical or economic harm.

Let us start with crime victims and witnesses. Cooperating with the government is a perilous activity for these individuals, as captured by the saying “snitches get stitches.”111Stuntz, supra note 15, at 4, 79–80. Drug and gun charges, by contrast, can be proven using physical evidence without any cooperating witnesses. On “snitches get stitches,” see Snitches Get Stitches—Meaning, Origin and Usage, English Grammar Lessons (Dec. 12, 2021), https://english-grammar-lessons.com/snitches-get-stitches-meaning [https://perma.cc/C242-MRDN]. By one theory, clearance rates for serious crimes are low in the U.S. because proving homicide or robbery cases requires victims and witnesses to testify and put themselves at risk.112In Washington, D.C., residents reported gunshots to 911 or police only 12% of the time as compared with the gunfire incidents detected by ShotSpotter technologies. The study found that crime is disproportionately underreported, and thus under-investigated, in minority and low-income neighborhoods. Jillian B. Carr & Jennifer L. Doleac, Brookings Inst., The Geography, Incidence, and Underreporting of Gun Violence: New Evidence Using ShotSpotter Data 2 (Apr. 2016), https://www.brookings.edu/wp-content/uploads/2016/07/Carr_Doleac_gunfire_underreporting.pdf [https://perma.cc/G7P6-3JBU]. Bill Stuntz hypothesized that police forces increased their focus on drug and gun possession charges because these crimes were “self-proving” once contraband was discovered, and therefore did not necessitate the cooperation of a victim or witness.113Stuntz, supra note 15, at 4. As a result, more serious crimes were harder to clear than low-level crimes. But, of course, those are the crimes that are more damaging to the community. If reverse searches, facial recognition, and other filtered dragnets could allow police to prove cases independently, without exposing victims and witnesses to the risk of social stigma and retaliation, they would contribute benefits to society that are not accounted for in the usual privacy-versus-security debates.

As for the suspects, the manner in which traditional policing builds up cases leave much to be desired. Police stops and searches are often vectors for bias and disrespect where swearing, insults, unwarranted accusations and suspicion, and unjustified physical contact lead to demoralization and distrust.114Capers, supra note 59, at 1243–44 (referring to “hard surveillance” and distinguishing it from soft forms); Forman, supra note 7, at 171. Traditional investigations are costly in terms of time, fear, property damage, and general unpleasantness. A person who is pulled over for a secondary inspection when a police dog alerts to her car may very well have no recourse when the police slash open the seats of her car to try to find drugs. Home searches and interrogations cause additional physical, emotional, and economic strain to suspects, irrespective of what sorts of private information is revealed. These costs will become more obvious and more salient when technology obviates the need for a government agent to tear open the upholstery of a suspect’s car, dishevel a dresser, and “grope[] and grab[] our children” at the airport.115As Senator Ron Paul colorfully puts it. Capers, supra note 59, at 1286.

***

In combination, these factors show that filtered dragnets should be part of any responsible law enforcement program. They extend the “pareto frontier” by allowing privacy and crime detection to increase at the same time.116As Part IV argues, the fact that filtered dragnets can rapidly increase crime detection is also the source of its risk. It would be counterproductive for law to prohibit their use based on a formalistic or expansive notion of Fourth Amendment protection. And yet, as the next Part shows, there is some risk that courts and lawmakers may do just that.

III.  FILTERED DRAGNETS AND PRIVACY

Most of the courts, scholars, and civil society organizations that have considered the societal impact of filtered dragnets such as geofencing and reverse keyword searches have concluded that they pose serious threats to privacy.117See, e.g., Guariglia, supra note 6. Putting aside for a moment whether filtered dragnets are consistent with the full set of Fourth Amendment principles, this Part argues that filtered dragnets pose almost no threat to Fourth Amendment privacy. What I mean is, among all of the meanings and purposes that the right to privacy is meant to capture, the only ones that are meaningfully violated by filtered dragnets are related to abuses of power. The privacy expectations of the non-offender, which are the ones that predominate Fourth Amendment analysis, suffer at most a technical violation. If we separate out the anti-authoritarian goals of privacy, nothing is left of the privacy critique of filtered dragnets.

This does not mean that filtered dragnets are harmless—to the contrary, as Part V will argue, they pose significant dangers to civil liberties. But by ruling out privacy as the vector of abuse, courts can harvest the benefits of analytical precision and adjust Fourth Amendment law to better match the problems. This Part describes how courts and scholars have responded to filtered dragnets so far and then explains why Fourth Amendment principles are so poorly suited to address the negative reactions.

A.  Judicial Reactions to Filtered Dragnets

Courts are not prepared for the challenges that filtered surveillance pose to Fourth Amendment jurisprudence. Indeed, they are struggling as it is to find principled limits in more common and straightforward digital dragnet cases.118For example, Carpenter v. United States, 138 S. Ct. 2206 (2018), wherein the Supreme Court considered the government’s access to seven days’ worth of cell site geolocation data and reached a holding without a rule. The access to records constituted a search requiring a warrant and probable cause, but the Court refused to say whether accessing data for a more limited amount of time would also be treated as a search. Id. at *11 n.3.

So far, lower court opinions are surprisingly unfriendly to technologies and practices that will be the predicates to filtered dragnets. For example, Baltimore tried to set up a program called Aerial Investigation Research (“AIR”) in which its police department collected and retained 45 days’ worth of aerial surveillance footage, but would not be allowed to access the footage unless a violent crime occurred and was likely to be caught on camera.119Slobogin, Suspectless Searches, supra note 29, at 962. Civil liberties organizations successfully challenged the program, arguing that the Fourth Amendment should constrain the government from amassing data that can be used for longitudinal location tracking no matter how constrained the Baltimore Police Department’s access and use of the data might be.120Leaders of a Beautiful Struggle v. City of Baltimore, 2 F.4th 330, 346 (4th Cir. 2021). The Fourth Circuit used the theoretical possibility of government access to information as a sufficient reason to find that a Fourth Amendment search on all Baltimore residents took place, regardless of the design, practice, and risk of abuse for the program.121Id. If this reasoning is adopted throughout the judiciary, law enforcement will not be able to collect their own information for filtered dragnets and will have to rely on data that is collected and held by private industry.

Many courts have expressed similar reservations when the government asks a private company like Google to trawl through its data to conduct reverse searches, too.122United States v. Chatrie, 590 F. Supp. 3d 901, 927 (E.D. Va. 2022). But these opinions suggest that a warrant process that is sufficiently narrow and “particularized” so as to avoid disclosing data of innocent bystanders to the police would satisfy Fourth Amendment requirements.123Id. at 927–32. This leaves an opening for filtered surveillance. It suggests that the automated scan that Google or another third party would perform of all its data in the process of identifying responsive records would not be a search in and of itself. In other words, the focus of the courts that have analyzed geofence warrants is not on the data that is scanned at all, but on the data that is ultimately revealed to police.

Courts might begin to clamp down on third-party scanning for law enforcement purposes following the logic of the Fourth Circuit’s decision in the Baltimore AIR case. Many scholars are advocating for this, as I describe next. But it is still not clear that filtered dragnets will be understood to be a search at all given that they are designed to alert only when probable cause of a crime has been established. Even if police use computing technologies to automatically scan through large amounts of personal data, the constitutionally relevant event is the revelation and use of information to the government agents who are making decisions.124It is tempting to think the aggregation and accumulation of data for potential eventual use is itself a form of risk or harm. This is the reasoning behind the “mosaic theory,” which captured the attention of some courts and scholars. United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2011); Priscilla J. Smith, Nabiha Syed, David Thaw & Albert Wong, When Machines Are Watching: How Warrantless Use of GPS Surveillance Technology Violates the Fourth Amendment Right Against Unreasonable Searches, 121 Yale L.J. Online 177, 201 (2011). Orin Kerr, who coined the term, is skeptical that courts can make it work. Orin Kerr, The Mosaic Theory of the Fourth Amendment, 111 Mich. L. Rev. 311, 346–47 (2012). It is worth noting that this theory does not comport with the attitudes of Americans. Matthew B. Kubler & Lior Jacob Strahilevitz, Actual Expectations of Privacy, Fourth Amendment Doctrine, and the Mosaic Theory, 6 Sup. Ct. Rev. 205, 248 (2016).

This is best captured by the binary search doctrine—the rule establishing that, for example, a drug dog’s alert is not a search under the Fourth Amendment because it reveals only the presence of contraband and criminal wrong-doing. There is little reason to believe the Supreme Court will backpedal. The Court has found that a universal fingerprinting database, possibly even one that requires involuntary contributions of fingerprints by individuals who are not yet in the database, could be justified, given that fingerprinting is an “inherently more reliable and effective crime-solving tool than eyewitness identification or confessions.”125Davis v. Mississippi, 394 U.S. 721, 727–28 (1969). More recently, in Maryland v. King, the Supreme Court found that police can forcibly swab an arrestee and cross-check his DNA against the database of DNA samples from unsolved crimes.126Maryland v. King, 569 U.S. 435, 465 (2012). The opinion focused almost entirely on the physical act of swabbing and took for granted that the cross-checking of a DNA sample to a crime database will not be a search because it reveals either nothing at all or reveals only a high-confidence match to a crime.127See id. at 445, 461–62.

That said, some of the Supreme Court decisions in the last ten years written by Justice Scalia incorporated a strong property-based formalism. In United States v. Jones, the use of a GPS device was a search not because of the sensitivity of the information gathered, but because of the touching of the suspect’s car.128United States v. Jones, 565 U.S. 400, 403 (2012). And in Florida v. Jardines, use of a drug-sniffing dog on a front porch was a violation of the Fourth Amendment because the practice involved a trespass with information gathering.129Florida v. Jardines, 569 U.S. 1, 5–6 (2013). The fact that the information gathering was in the form of a binary search did not alleviate the flaw, according to the majority.130Id. at 10–11. If Scalia’s formalism for real and tangible property is extended to personal data, filtered dragnets could be considered a search of all individuals whose data is mechanically scanned in the process, irrespective of how trivial the invasion to them may be.

Even if courts come to agree that mechanically processing data is a Fourth Amendment search, this would still not guarantee the death of the filtered dragnet. They might be reasonable searches under the special needs or checkpoints doctrines.131See Mich. Dep’t of State Police v. Sitz, 496 U.S. 444, 449–50 (1990); Illinois v. Lidster, 540 U.S. 419, 426–27 (2004). In the context of checkpoints, bulk searches, and other dragnets, the Supreme Court has articulated the factors that it would use to determine whether the searches are “reasonable” despite a lack of individualized suspicion. These factors include the intrusiveness of the search, the public and government interest that is served by the dragnet, and the degree of oversight or limitations on discretion that are involved.132See Christopher Slobogin, Government Dragnets, 73 Law & Contemp. Probs. 107, 107–08, 127 (2010). The Court focused on constraints over agents’ ad hoc discretion in United States v. Martinez-Fuerte, 428 U.S. 543, 559 (1976) (with respect to the location of a border and customs checkpoint). Justice Brennan, in dissent, pointed out that there remained a lot of agent discretion with respect to whom to focus on during the primary and secondary inspections, further emphasizing the importance of agent discretion. See id. at 576 (Brennan, J., dissenting).

Thus, judicial reasoning seems to be on a collision course between (a) cases that are eager to expand the recognition of privacy rights to cover all data subjects in large databases whose information is theoretically accessible to police and (b) cases that find highly probative “binary searches” are outside the ambit of Fourth Amendment prohibition.

B.  Scholarly Reactions to Filtered Dragnets

Lawrence Lessig saw this train wreck coming. In Code, he pointed out that the Internet and digital information technologies will allow police to identify a perpetrator with high confidence while remaining blind, by design, to the intimate details of the innocent. He explained that this will cause the privacy rationale for Fourth Amendment protection to lose relevance, at least when filtered dragnet investigations are possible. He expected these technologies would force a wedge between privacy and anti-authoritarian justifications for criminal procedure, when in the past, the two types of arguments traveled together.

Fourth Amendment scholars have doubled down on privacy.133See generally Sklansky, supra note 9; Ohm, supra note 9 (each arguing for strong and more capacious conceptions of privacy under Fourth Amendment law that will limit access to information no matter how or why it is sought). Even scholars like Andrew Ferguson and Neil Richards, who have focused on tyranny and power, have used those terms synonymously with surveillance capability. Ferguson, supra note 9, at 262–63, 266. They have lumped filtered dragnets together with all other digital surveillance in order to hinder police access. Dragnets of every sort, including the filtered sort, still suffer from analytical chaos because of value judgments and predictions that too often stay latent in the scholarship.134Christopher Slobogin took stock of the “analytical extremism” over a decade ago, and not much has changed. Slobogin, supra note 132, at 109. As a result, scholars are all over the map in terms of the proper treatment of digital dragnets, and none have focused on the right factors.

A few examples. Daphna Renan has argued that the collection, retention, and theoretical capability for law enforcement to access data is alone sufficient to constitute a privacy harm. Consent or a warrant should be required before the government collects any privately held data, and even before they access or request machine scanning of that data by third parties, irrespective of how limited and careful the readout is.135Daphna Renan, The Fourth Amendment as Administrative Governance, 68 Stan. L. Rev. 1039, 1042, 1054–55 (2016). Natalie Ram has approvingly held up Maryland’s law prohibiting law enforcement from using genomic databases to solve crimes unless they have received consent from all individuals whose data is in the genomic dataset.136Ram et al., supra note 70, at 1078–79. She has argued that Americans have a constitutional right, under the Carpenter decision, to the privacy of the genomic data held by a private third-party company and that unless consent to a law enforcement search is exhibited in some way, the police should not be able to ask or force the company to identify a match to a criminal sample. Natalie Ram, Genetic Privacy After Carpenter, 105 Va. L. Rev. 1357, 1366–67 (2019). More generally, this brand of scholars use access to data, rather than how it is used, as the sine qua non for Fourth Amendment analysis and ask why anybody should be under “lifetime surveillance.”137Lazer & Meyer, supra note 33, at 904 (summarizing what other scholars have asked with respect to including juveniles in DNA databases).

Scott Sundby and Nadine Strossen take the more moderate position that dragnets (of any sort) should be used only as a last resort,138Scott E. Sundby, A Return to Fourth Amendment Basics: Undoing the Mischief of Camara and Terry, 72 Minn. L. Rev. 383, 446 (1988); Nadine Strossen, The Fourth Amendment in the Balance: Accurately Setting the Scales Through the Least Intrusive Alternative Analysis, 63 N.Y.U. L. Rev. 1173, 1176, 1197 (1988) (suggesting a challenged investigation should be invalid if there is a less intrusive option, and finding mass searches are more intrusive than individualized ones). though it is not clear they would apply their conclusions to filtered dragnets in particular. Eldar Haber, in considering how the Internet of Things can become a rich source of police investigatory data for reverse searches, advocates for a warrant requirement that goes beyond the “super-warrant” requirements of the current Wiretap Act to create an “ultra-warrant” requirement.139Haber, supra note 50, at 785. Since the super warrant requires police to exhaust all other means of investigating before securing a wiretap warrant, the effect and objective of Haber’s recommendation is similar to Sundby’s and Strossen’s—to ensure that the criminal justice system strongly disfavors use of Internet of Things data in investigation.14018 U.S.C. § 2518. Haber’s reasoning is also consistent with Justice O’Connor’s reasoning in a dissenting opinion, in which she argued suspicionless inspections should only be permitted when law enforcement would not be effective using traditional police tactics that build up reasonable suspicion or probable cause before a search takes place. See Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 674 (1995) (O’Connor, J., dissenting).

Continuing down the spectrum, some scholars appreciate the potential benefits of filtered dragnets and have advocated for a style of restraint that differs from prohibition or PC-based warrant requirements. Stephen Henderson and Kiel Brennan-Marquez argue that police departments should have a budget for searches and seizures (including digital investigations that, at least right now, operate outside the formal definition of a Fourth Amendment search) so that they are incentivized to use the most efficacious practices rather than the most expedient ones.141Keil Brennan-Marquez & Stephen Henderson, Search and Seizure Budgets, 13 U.C. Irvine L. Rev. 389, 396–97 (2023). In my opinion, it would make more sense to limit government power by imposing a “prison budget” so that the state is forced to reserve incarceration resources for their most effective uses. See Kleiman, supra note 20, at 785. Christopher Slobogin has explicitly called for a more nuanced understanding of dragnets and suspicionless surveillance. He would allow dragnets that meet a standard of “generalized reasonable suspicion” where their efficacy outweigh the privacy intrusion enough to merit their use in criminal investigations.142Slobogin, supra note 132, at 139–40. Slobogin measures efficacy using the hit rate—the chance that an investigative technique will reveal relevant criminal evidence. Id. at 139. However, it is not entirely clear what he uses as the denominator in a hit rate. If courts are supposed to ask whether a person whose data is disclosed to police by a filtered dragnet is highly likely to be guilty of the investigated crime, filtered dragnets will always have high efficacy because they are defined to meet this standard. If the denominator is comprised of all individuals whose data is mechanically processed to find matches to the “fingerprint” of a crime, none of the filtered dragnets will meet the standard. Jeffrey Bellin recommends locating the Fourth Amendment interest in databases with the owner or holder of data, rather than the subject of the data searches, which would give a company the right to either consent to a search or to demand a warrant.143Jeffrey Bellin, Fourth Amendment Textualism, 118 Mich. L. Rev. 233, 270–72 (2019) (articulating an openness to considering some types of data and documents as personal to the consumer rather than owned and controlled by the third-party service provider, so context would play a role in edge cases under his proposal). Andrew Ferguson would allow the use of dragnets as long as the legislative branch explicitly authorizes their use.144Ferguson, supra note 9, at 272.

Reaching the other end of the spectrum, some scholars (myself included), see the use of filtered dragnets as a move toward justice rather than away from it.145See generally Bambauer, supra note 26. The prohibition of a highly reliable investigation tool is unethical when the prohibition would push police toward more invasive and less accurate investigation techniques and when serious crime would too often go undeterred. David Kaye and Michael Smith have made this argument with respect to DNA matching.146D.H. Kaye & Michael E. Smith, DNA Identification Databases: Legality, Legitimacy, and the Case for Population-Wide Coverage, 2003 Wis. L. Rev. 413 (2003).

Where does this leave us? Hopefully with an open mind and a hunger for reasoning from first principles.

C.  The Pointlessness of Fourth Amendment Privacy

Filtered dragnets will disrupt the equilibrium between the government, criminals, victims, and bystanders. That is obvious enough. Orin Kerr has made the descriptive and normative claim that courts intuitively adjust Fourth Amendment rules to strike a new balance between privacy and security whenever the government gains a significant new surveillance capability.147Orin S. Kerr, An Equilibrium-Adjustment Theory of the Fourth Amendment, 125 Harv. L. Rev. 476, 488–89 (2011). Filtered dragnets implicate only a few Fourth Amendment interests, and those few are not well served by the reasonable expectations of privacy test, by the warrant requirement, or even by intuitive adjustments. We are in new terrain in which a technology increases both privacy and crime control.

1.  Theoretical Dimensions of Fourth Amendment Privacy

Borrowing from a rich literature that catalogues and elucidates the concept of privacy,148Some attempts to organize the privacy discourse uses different stages of the information life cycle. See generally, e.g., Daniel J. Solove, A Taxonomy of Privacy, 154 U. Penn. L. Rev. 477 (2006); Jane Bambauer, The New Intrusion, 88 Notre Dame L. Rev. 205 (2012). For the purposes of this article, I have focused more heavily on articles that discuss the various types of risks and harms that occur when privacy is violated. the following arise most frequently in the context of government intrusions and surveillance:

i.  Freedom from Embarrassing Revelations, Social Dislocation, and Harassment

Perhaps the most common and robust form of privacy is the recognition that everybody has some legitimate, pro-social reason to want to keep licit details about their lives away from at least a subset of people.149Sklansky, supra note 9, at 1107–10 (using the concept of refuge). They want the freedom that comes from relative obscurity,150See generally Woodrow Hartzog & Evan Selinger, Surveillance as Loss of Obscurity, 72 Wash. & Lee L. Rev. 1343 (2015). where their decisions and behavior are not under the scrutiny and judgment of others.151Julie E. Cohen, Examined Lives: Informational Privacy and the Subject as Object, 52 Stan. L. Rev. 1373, 1377 (2000); Danielle Keats Citron & Daniel J. Solove, Privacy Harms, 102 B.U. L. Rev. 793, 854 (2022); see also Jane Bambauer & Tal Zarsky, The Algorithm Game, 94 Notre Dame L. Rev. 1, 23 (2018); Danielle Keats Citron, The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age 55–57 (2022) (describing how governments around the world have used details about licit-but-scandalous love affairs or other sexual secrets to suppress dissent). Everybody deserves to be shielded, at least to some degree, from embarrassment over the things they have said or done that did not cause any lasting harm to others and that can be misunderstood.152See Citron & Solove, supra note 151, at 837 (discussing reputational harms).

The scope of this interest ranges from trivial embarrassments (the regrettable hairstyle, the piece of toilet paper stuck to a shoe) to the truly life-changing (the ostracism of an HIV diagnosis, the physical attack carried out with the help of location information).153See Richards, supra note 65, at 146–51, 157–62. Much of the time, the sensitivity of a piece of information will depend greatly on context,154See generally Helen Nissenbaum, Privacy in Context (2010). but the point is that “everyone has facts about themselves that they don’t want shared, disclosed, or broadcast indiscriminately.”155Richards, supra note 65, at 73. When information is permitted to leap from one context to another and to be used in unexpected ways, it will cause harm.156See Solove, supra note 148, at 487–88; Cohen, supra note 151, at 1377; Richards, supra note 65, at 134, 142–45.

Filtered dragnets relieve, rather than exacerbate, these concerns. By shielding data from police (and everyone else) unless and until they match the fingerprint of a crime, filtered dragnets keep as much information private as practically possible.157Relatedly, filtered dragnets, when used as designed, will mitigate problems related to the dissolving boundaries between the state, private industry, and society by greatly limiting disclosure and use by law enforcement. For a description of dissolving boundaries, see Bernard E. Harcourt, Exposed 187–216 (2015). Indeed, if more police investigations were conducted through filtered dragnets, members of the community would be much more obscure and unknown vis-à-vis the state as compared with programs that involve heavy use of interviews, street patrols, traffic stops, and home searches.

ii.  Freedom from Manipulation

An actor can exploit access to another person’s data by discovering their vulnerabilities or gaps in rationality and then using those to persuade, cajole, or threaten the data subject into doing something.158See Richards, supra note 65, at 151; Citron & Solove, supra note 151, at 846. Again, as with freedom from embarrassment, filtered dragnets present a lower, rather than higher, risk of this sort because law enforcement and other government actors are blinded from nonrelevant information. The only use to which the dragnet data are put involves solving a crime.

iii.  Freedom from Indignity

The privacy literature prizes at least two forms of dignity that are not captured in other concepts on this list. First, privacy intrusions sometimes bring about an indignity from being singled out for suspicion.159One reason that courts have concluded that roadblock-style DUI checkpoints are reasonable under the Fourth Amendment is that all people are treated with equal indignity. This is borne out in public opinion surveys, where checkpoints and roadblocks are consistently rated as being a relatively low intrusion compared with other investigation techniques. See Christopher Slobogin & Joseph Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at ‘Understandings Recognized and Permitted by Society’, 42 Duke L.J. 727, 738 (1993). Dragnets, whatever their faults, do not have this intrusion. Nearly everybody suffers the same indignity when bulk data is scanned, just as they do at TSA checkpoints and DUI roadblocks.160This may explain why survey research finds that respondents generally do not find roadblocks intrusive; only 24% believed that they violate a reasonable expectation of privacy. James W. Hazel & Christopher Slobogin, ‘A World of Difference’? Law Enforcement, Genetic Data, and the Fourth Amendment, 70 Duke L.J. 705, 745 (2021). Another form of dignity concerns being treated as a human rather than being processed as a faceless line of data. This has some overlap with the concept of “individualized suspicion,” which I will discuss below, and which (in my opinion) filtered dragnets more than adequately should meet. Nonetheless, it is undeniable that filtered dragnets are entirely mechanical up until the point when a limited set of information is disclosed to police. Whether this should make a difference in the moral and legal status of filtered dragnets, though, is debatable.161See generally Frederick Schauer, Profiles, Probabilities, and Stereotypes (2006) (raising doubts about the differences between mechanical profiling and individualized consideration).

iv.  Freedom from Anxiety

A common theme throughout the discourse revolves around the idea of loss of control and the uncertainty and anxiety that arises from it.162See, e.g., Citron & Solove, supra note 151, at 841–42. When the government has personal information about a subject, the subject is uncertain how the information could be used and fears that it may be used against them. This fear is, in and of itself, a social cost. Kiel Brennan-Marquez has argued that new data-gathering technologies create, and to some extent have already created, an omnipresent low-level form of anxiety similar to the feeling one gets when seeing a patrol car in the rear-view mirror and “feeling your pulse quicken; awareness heightened and senses alert, as you try not to break any traffic rules.”163Brennan-Marquez, supra note 2, at 488.

A natural follow-up question is: What havoc can the government cause with data?164Although some would quibble, most privacy scholars at least implicitly recognize (and sometimes explicitly state) that privacy has primarily an instrumental value rather than an intrinsic one. See Richards, supra note 65, at 6. Richards later claims that “privacy is like other social goods, like public health or the environment,” id. at 97, but this seems incorrect to me. Personal and environmental health are both intrinsic goods—more of it is an end in itself, and there is no such thing as too much. The greatest risk posed by filtered dragnets is to offenders, and it is the risk that their offense (and nothing more) will be detected. Thus, for filtered dragnets, freedom from anxiety calls for a freedom from law enforcement itself. It vindicates the rights of the supposedly “guilty” rather than the innocent. Fourth Amendment privacy recognizes no such interest.

2.  Routine Compliance with Reasonable Expectations of Privacy

Data-driven policing has inspired a series of gloomy articles that predict the Fourth Amendment’s reasonable expectations of privacy test has become irrelevant.165See, e.g., Ohm, supra note 9, at 1320; Kimberly N. Brown, Outsourcing, Data Insourcing, and the Irrelevant Constitution, 49 Ga. L. Rev. 607, 659–63 (2015). As long as the third-party doctrine stands, permitting police to access data held by third-party companies without justification or oversight, privacy will be insufficiently protected. I agree with these scholars.166Bambauer, supra note 26, at 209. But courts are already addressing this problem. Cases like Carpenter v. United States—in which the Supreme Court found that police access to several days’ worth of geolocation data constitutes a search that would require a warrant or appropriate warrant exception—have proven that for suspect-driven searches, Fourth Amendment privacy is not yet irrelevant and is becoming more powerful by the day.167Carpenter v. United States, 138 S. Ct. 2206, 2209 (2018).

Nevertheless, the reasonable expectations of privacy test is very unlikely to impede the adoption of filtered dragnets. That test has repeatedly been interpreted to deny privacy interests of the guilty. “[A]ny interest in possessing contraband cannot be deemed ‘legitimate,’ and thus government conduct that only reveals the possession of contraband ‘compromises no legitimate privacy interest.’ ”168Illinois v. Caballes, 543 U.S. 405, 408 (2005). Jed Rubenfeld’s synthesis of Fourth Amendment caselaw seems to get it right: the Fourth Amendment aspires to support “a justified belief that if we do not break the law, our personal lives will remain our own.”169Jed Rubenfeld, The End of Privacy, 61 Stan. L. Rev. 101, 129 (2008) (differentiating the Fourth Amendment’s guarantee to security from a right to privacy). Filtered dragnets pass this test.170For binary searches, the reasonable expectations of privacy test adopts the “nothing to hide” attitude that privacy scholars very often condemn. See Richards, supra note 65, at 134. See generally Daniel J. Solove, Nothing to Hide: The False Trade-Off Between Privacy and Security (2011). Despite the scholarly criticism, it is an attitude that the general public shares with the Court. Public opinion surveys demonstrate that Americans’ taste for privacy is strongly influenced by whether they believe the person being searched has committed a crime or not. See Slobogin & Schumacher, supra note 159, at 759.

To be clear, there are reasons, independent of privacy, to protect law-violators-as-violators. These arguments, which I describe in depth in the next Part, are critical for understanding the threat from filtered dragnets. But they are only loosely related to “privacy” as the term is typically used, and they will not be incorporated into the reasonable expectations of privacy unless that test is changed beyond all recognition.

3.  The Irrelevance of the Warrant Requirement

In U.S. v. Chatrie, the geofence case described earlier, the court suggested it would approve a geofence warrant process if a magistrate or court got to make a probable cause determination before the geolocation data of a target were de-anonymized.171United States v. Chatrie, 590 F. Supp. 3d 901, 927 (E.D. Va. 2022). Generalizing to other filtered dragnets, law enforcement would seek a warrant after the filtered dragnet system alerts, but before any identifying data is revealed.

This process might be a good component for accountability and oversight, and to ensure that filtered dragnets are performing at or above the expected “hit rate,” but it is hard to imagine why a warrant could ever be denied. A warrant is valid as long as it is issued by a neutral judge or magistrate, is based on probable cause, and states with sufficient particularity what is to be searched or seized.172California v. Acevedo, 500 U.S. 565, 569–72 (1991); Illinois v. Gates, 462 U.S. 213, 230 (1983). The standards for both probable cause and particularization will be met—more than met—given that the definition of filtered dragnets I am using requires them to withhold information until the probability that the target has engaged in the investigated crime meets a high standard. As for particularization, because the filtered dragnet procedure begins with the signatures of a crime and works backwards to find the perpetrator, the profile for matching (what I have been calling the “fingerprint” of the crime) is as particularized to a crime as it can be.173Emily Berman argues that one of the purposes of the individualization requirement of the Fourth Amendment is to provide an opportunity for a suspect to challenge the evidence and beliefs of a police officer who thought they had probable cause to make the stop or search. Emily Berman, Individualized Suspicion in the Age of Big Data, 105 Iowa L. Rev. 463, 467 (2020). In this example, the non-privacy goal can be reconciled and adapted to filtered dragnets by requiring law enforcement to review and understand the data that connect the suspect to a crime.

Privacy advocacy groups have argued that warrants issued for reverse searches are tantamount to general warrants because they do not identify (or even anticipate) a particular suspect before they are issued.174Guariglia, supra note 6. But the only similarity that geofence warrants have to general warrants from the Colonial Era is the lack of a named suspect. In every other way, geofence warrants restrict the information that is revealed to that which is closely linked to a particular crime. By comparison, general warrants authorized agents of the colonial government to look for stolen or untaxed goods anywhere the agent “[should] think convenient to search.”175Brennan-Marquez & Henderson, supra note 141, at 402 (citing William J. Cuddihy, The Fourth Amendment: Origins and Original Meaning 233 (2009)). The only manner in which the geofence warrant is unconstrained—by allowing police to discover who the suspect is rather than requiring police to come with a suspect in mind—is a feature of geofence warrants that should be praised, as it limits the discretion of the police to select their targets in advance. This is the critical distinction between filtered dragnets like geofence warrants or DNA searches and suspect-driven searches—one that scholars and commentators too frequently gloss over.176See generally, e.g., Ram, supra note 136 (comparing the suspect-driven search in Carpenter to the crime-driven searches in the DNA forensic setting without recognizing the categorical differences between the two).

Thus, a warrant requirement is irrelevant to the adoption of filtered dragnets, apart from the time, resources, and general system friction involved, because they should routinely be granted.

***

Privacy scholars are courting disaster by lumping filtered dragnet techniques in with other types of dragnets and digital searches. Even if there are court victories in the short term, they will be pyrrhic. The very concept of “privacy” will become increasingly vulnerable to the “I have nothing to hide” argument that is loathed by the field (and rightly so).177See generally Solove, supra note 170. Courts might fail to sufficiently constrain unfiltered dragnets and suspect-driven investigations because of the utility and low harm of filtered dragnet techniques that happen to share the same Fourth Amendment bucket.

Arguments against mass surveillance often start with the observation that surveillance fundamentally shifts power from the surveilled to the surveillor.178“Privacy is about more than just keeping human information unknown or unknowable. . . . Put simply, privacy is about power.” Richards, supra note 65, at 3. Richards goes on to say, “we need to craft reasonable rules and protections so that we can maximize the good things about these technologies and minimize the bad things.” Id. at 5. This is true as far as it goes, but if the surveillor is constrained and can only see evidence of a crime, that power shift will often be a desirable one. In fact, assuming that the law is legitimate, the enforcement of a law is one of the most legitimate acts the government can do. The burden is therefore on surveillance scholars to explain why those who have violated the law may have justified interests in being protected from state detention and prosecution, even when their law-abiding conduct remains private. There are answers to this challenge, but they sound in tyranny rather than invasions of privacy. There is a virtue to being precise about the problems of filtered dragnets without reliance on capacious notions of privacy that would implicate nearly every law enforcement function.

IV.  FILTERED DRAGNETS AND TYRANNY

Filtered dragnets will provide a highly concentrated dose of criminal detection. Even though, in theory, the whole point of having law enforcement departments is to detect and prosecute crime, a drastic increase in criminal detection can have toxic effects on society. The dynamics and interaction of other criminal justice factors have come of age in a time of low detection and only make sense if detection continues to be difficult.

This Part begins by revisiting the interests that privacy scholars have identified that would be affected by filtered dragnets. Each of them is really an anti-tyranny concern garbed in the language of privacy. If we are more explicit about the goals and analyze the risks of authoritarianism that filtered dragnets may drag along with them, the problems (and, therefore, the remedies) become much more obvious.

The true threats from filtered dragnets are that: (1) many Americans will confront a real risk of criminal liability based on our overbroad criminal codes; (2) prosecutions of those crimes could lead to life-altering detentions in our inhumane prison systems; and (3) without the shield of abysmally low detection rates, the only protection is lenity, which is no protection at all from a government that attempts to exert authoritarian power.

A.  Privacy as a Stalking Horse for Anti-Authoritarianism

Neil Richards claims that privacy is a necessary bulwark “if we want political freedom against the power of the state.”179Richards, supra note 65, at 7. But privacy is inadequate on its own to protect the broad range of liberty and equality interests that arise with abuse of power. Filtered dragnets prove it. They can be used to trample liberties and to serve the public unequally even though the government will not know any irrelevant details about licit activities.

Instead of trying to expand the meaning of “privacy” to tackle every possible state abuse, courts and criminal justice scholars alike should seize the moment and force constitutional theory to shift its focus from privacy to anti-authoritarian constraint. To be sure, courts should continue to refine the conception of Fourth Amendment privacy interests to address unfiltered digital dragnets. But if we have any hope of harnessing the great potential of filtered dragnets without creating a despot’s playground, the Supreme Court will need to simultaneously cultivate an anti-authoritarian strand of Fourth Amendment rules.

When surveillance scholars use the concept of privacy to curb abuses of power, they are concerned about unnecessary social control and abuses of discretion.180They are also concerned about illegal use of a tool by rogue agents. See, e.g., Lazer & Meyer, supra note 33, at 906 (misusing DNA databases to extract phenotypes). There is always a risk that the government will use surveillance tools in violation of constitutional rules, statutory restrictions, or their own internal policies, but compared to opportunities of individual officers to abuse warrant or investigation practices in real space, filtered dragnets are more likely to be auditable.

1.  Unnecessary Social Control

Law enforcement serves the obvious and highly valued function of social control. As Kiel Brennan-Marquez explains, “we want people to worry about breaking the rules”181Brennan-Marquez, supra note 2, at 489.—at least, when the rules are good rules, and when the consequences for breaking rules are proportional and fair. However, Brennan-Marquez is concerned that data-driven policing tools will leave the police “awash in probable cause,” allowing them to stop, search, or arrest nearly anybody.182Id. at 491. This concern gets to the heart of the matter. But it is ultimately a critique of the substance of criminal law and the discretion of criminal justice decisionmakers. These are the same themes that Bill Stuntz repeatedly raised when he critiqued Fourth Amendment cases and scholars for allowing privacy to be a distraction from more pressing threats.183See generally Stuntz, supra note 15.

Let us return for a minute to Brennan-Marquez’s metaphorical driver who has just discovered a patrol car in the rearview mirror. If the government had done a massive purge of its penal codes and the only crimes left on the books were murder, rape, arson, armed robbery, and aggravated assault, and if false positive police error was vanishingly small, would the driver feel anxiety? For a time after the change, yes of course. There will be a short-term period of distrust and adjustment when technologies or rules change suddenly and dramatically.184People used to feel nervous about Caller ID, and at the advent of electricity, wealthy homeowners used to hire servants to turn on lights. Adam Thierer, Permissionless Innovation 70 (2016). But in the long run, anxiety will ebb under the pressure of persistent feedback of non-events and the absence of harm.

Public opinion surveys find that attitudes about privacy are mediated through attitudes about the substantive criminal law that is being enforced: a dog that is sniffing for bombs is perceived as less privacy-invasive than a dog that sniffs for drugs even though the experience is identical for the investigation target (at least, up until the moment that the dog alerts, that is).185Bambauer, supra note 25, at 1205. See also Slobogin & Schumacher, supra note 159, at 767 (speculating that the dangerousness of the investigated crime could explain some of their survey results). If assessments of privacy change not because of the revelations or techniques that are used but because of the crimes that are prosecuted, the concept of privacy is standing in for objections to the substance of the law.

The concern about unnecessary social control is better addressed by defining, as best we can, which types of antisocial conduct rise to the level of being worthy of criminal punishment and which do not. And the concern raises important questions about whether criminal violators are treated too harshly. Privacy is a blunt instrument for these purposes. It draws lines that have only a vague relationship to the distinctions we mean to draw.

2.  Selective Attention

Another serious concern is that police might make use of a system of surveillance to rifle around for something to use against a specific person or group.186Dan Markel, Against Mercy, 88 Minn. L. Rev. 1421, 1476–77 (2003); Joh, supra note 17, at 200; Brennan-Marquez, supra note 2, at 490–92. Motivations could range from political persecution to racism to personal vengeance to simply wanting to make a quota or appear well in performance metrics within a bureaucratized police department.

As with unjustified social control, the problem of discretion and selective attention is only indirectly related to privacy. Indeed, it is not even clear that privacy has any positive influence on police discretion. Privacy steers police toward information sources that disproportionately expose low-income and minority groups: if police cannot bring a drug-sniffing dog to a house, they will bring it to apartments and cars.187Bambauer, supra note 26, at 246. If police cannot search the full set of government and commercial DNA databases for a match to a crime scene sample, they will just use the government’s database of arrestee DNA data.188Ram et al., supra note 70, at 1078. At the same time, police can also engage in selective inattention by avoiding leads that could cause problems for friends or powerful people and by failing to give crimes perpetrated against low-status victims the same attention as the ones inflicted on high-status victims. When communities are under-protected, it is a form of too much privacy vis-à-vis the government.

The policy antidote to government discretion and bias is to directly limit discretion and bias. Filtered dragnets already do this, to some extent, because once they are employed, police lose control over who will ultimately be identified as a suspect. But law enforcement can still deploy filtered dragnets unfairly when selecting the neighborhoods or cases in which filtered dragnets will be deployed.189This is why Henderson’s and Brennan-Marquez’s proposal of search and seizure budgets seem inadequate to me: the concept of a budget does not guarantee that the budget will be spent wisely. See generally Brennan-Marquez & Henderson, supra note 141.

Thus, in the context of filtered dragnets, “privacy” concerns are attempting to capture and curb something bigger: too much social control at the discretion of the government.

B.  Filtered Dragnets and the Risks of Tyranny

An authoritarian regime thrives when it has unlimited discretion to issue stiff punishment based on criminal behavior that has negligible negative consequences (and possibly even positive consequences) to society. This threat is blunted if the state lacks the means to acquire evidence of criminal behavior, but with reliable surveillance mechanisms, law enforcement officials will be able to exert as much social control as they please, because nearly every person can be charged with a crime.190Kleiman, supra note 20, at 172–73.

Thus, filtered dragnets present risks that run along three vectors: (1) overbreadth of criminal law; (2) overly harsh punishment of criminals; and (3) overly discretionary investigations and enforcement. If these three forces remain unchecked, filtered dragnets could cause more harm than good. In the wrong hands, filtered dragnets could cause catastrophic risks of the sort that the Constitution is meant to prevent.

1.  Overbreadth of Criminal Law

A government that has the capacity to detect criminal behavior at very high rates must come under heightened standards of care when it promulgates or maintains its criminal laws. If we wince at the thought that everybody who commits a minor offense will get caught and will be prosecuted if they do not seem to qualify for a privilege or defense, this is a sign that the conduct is a poor fit for criminal law, and legislators must consider alternatives (e.g., warnings, civil fines, or positive incentives for pro-social conduct) instead.191Social stigma also provides a significant source of deterrence and self-control, often better than fear of punishment. Stuntz, supra note 15, at 52–53 (citing Daniel S. Nagin, Criminal Deterrence at the Outset of the Twenty-First Century, 23 Crime & Just. 1, 4–5 (1998)).

Right now, constitutional case law does very little to constrain the creation of criminal laws. Outside criminal statutes that would intrude upon specific individual liberties recognized in the Bill of Rights, the courts hold legislatures to very low standards of care (the rational basis test).192See generally Jeffrey D. Jackson, Classical Rational Basis and the Right to Be Free of Arbitrary Legislation, 14 Geo. J.L. & Pub. Pol’y 493 (2016). This latitude on substance has a curious relationship with the procedural restrictions imposed by the Fourth Amendment: as long as police have probable cause to believe that a person is violating or has violated a criminal law, police can make an arrest or initiate a search, no matter how trivial the offense. Thus, in Atwater v. Largo Vista, the Supreme Court found that the government acted within the bounds of the constitution when a police officer arrested a woman who was driving with two small children for the violation of a seatbelt law.193Atwater v. Largo Vista, 532 U.S. 318, 323–24 (2001).

Even if the Court is reluctant to interfere with legislators’ management of criminal codes, common sense dictates that some crimes are much worse than others. The state’s attention should focus on conduct that causes serious harm to others. There is a reason, for example, that the states that have regulated familial DNA-matching programs have allowed their use only for serious offenses like murder and rape,194Ram, supra note 34, at 781. and Baltimore’s Aerial Investigation Research (“AIR”) system, before it was dismantled, was restricted to use in investigating a limited set of very serious crimes.195Slobogin, Suspectless Searches, supra note 29, at 962. It is the same reason that the federal Wiretap Act permits courts to issue wiretap orders only when there is probable cause to investigate one of the explicitly listed serious criminal offenses.19618 U.S.C. § 2516. The same impulse explains why there is scholarly criticism and public outrage when a surveillance system adopted for the purpose of detecting one set of serious criminal violations (like smuggling or terrorism) is simultaneously used to detect violations of drug laws.197Renan, supra note 135, at 1060–63 (describing slippage between “silos” of law enforcement). The unstated assumption is that some crimes should be detected as well as possible (terrorism, for instance) and some should not.198Craig Lerner, The Reasonableness of Probable Cause, 81 Tex. L. Rev. 951, 1019–22 (2003).

The fact that state and federal criminal law has dramatically expanded in quantity and complexity is not in dispute.199Silvergate, supra note 10, at 268. “All of this is to say, of course, that many of those prosecuted are not real criminals who engaged in real crimes defined by clear and reasonable laws.” Id. And yet, curiously, responses to the problem tend to focus on procedural rather than substantive limits.200See, e.g., Reynolds, supra note 10 (advocating for due process constraints on charging decisions). The unchecked growth of substantive criminal law ironically creates a problem for public safety because the fear of prosecution prompts a demand for privacy and law enforcement obstruction.201This is, in a nutshell, the reason that Paul Ohm and other privacy scholars use law enforcement efficiency as a measure of Fourth Amendment violations. Ohm, supra note 9, at 1346. As Mark Kleiman put it, “improved enforcement of a law that should not have been passed in the first place can be a loss rather than a gain.” Kleiman, supra note 20, at 172.

The first and most obvious reason to place limits on criminal liability is to reduce the opportunity for unnecessary social control. The relationship between the government and the governed changes profoundly when a crime has been committed. The defendant in Atwater should have put a seatbelt on her children, and the government has an interest in encouraging, even requiring, that behavior. But not through criminal law.202Josh Bowers has criticized the Atwater decision, arguing that the reasonableness requirement of a Fourth Amendment seizure should protect individuals from “pointless indignities.” Josh Bowers, Probable Cause, Constitutional Reasonableness, and the Unrecognized Point of a ‘Pointless Dignity’, 66 Stan. L. Rev. 987, 1010 (2014). Every arrest is an indignity, of course, so the power of Bowers’ observation is the pointlessness of Atwater’s arrest. A second reason to constrain the substance of criminal law is to increase compliance with the rules we care about most.203Bloated criminal codes reduce law-abiding conduct because they cause what Murat Mungan calls “stigma dilution.” Murat Mungan, Stigma Dillution and Over-Criminalization, 18 Am. L. & Econ Rev. 88, 88 (2016). If functional and productive members of society are regularly engaged in violations of the criminal laws, the fact that a person has committed a crime (or has been convicted of it) loses its negative status signal. Overstuffed criminal codes also bleed into the problems of law enforcement discretion (discussed at greater length below) because the government has too much power to decide which members in the nation of criminals to send to prison.

Consider two examples that illuminate the problem through opposite ideological lenses. First, abortion will be criminalized in many states in light of Dobbs v. Jackson Women’s Health Organization.204Dobbs v. Jackson Women’s Health Org., 597 U.S. 215 (2022). Some states are considering criminal liability for women who seek out an abortion.205Andy Rose, Alabama Attorney General Says He Has Right to Prosecute People Who Facilitate Travel for Out-of-State Abortions, CNN (Aug. 31, 2023, 7:39 AM), https://www.cnn.com/2023/08/31/politics/alabama-attorney-general-abortion-prosecute [https://perma.cc/B7RP-ANNL]. For liberals and progressives, criminal liability for abortion-seekers represents an intolerable overreach of the state. To combat the substance of these laws, organizations such as the ACLU have already issued warnings about the risk that geofence searches could facilitate arrests and prosecutions of a law that a sizable portion of the state’s constituents believe is unjust.206Chad Marlow & Jennifer Stisa Granick, Celebrating an Important Victory in the Ongoing Fight Against Reverse Warrants, ACLU (Jan. 29, 2024), https://www.aclu.org/news/privacy-technology/fight-against-reverse-warrants-victory [https://perma.cc/C2PB-NGKH].

By contrast, conservatives might be concerned about overzealous enforcement of gun restrictions.207Several credit card networks now flag gun transactions automatically. Landon Mion, Visa Joins Mastercard, AmEx in Specifically Labeling Gun Store Sales, N.Y. Post (Sept. 11, 2022), https://nypost.com/2022/09/11/visa-joins-mastercard-amex-in-specifically-labeling-gun-store-sales [https://perma.cc/M554-C4L9]. Geolocation and credit card transaction data could be used to create a filtered dragnet that finds individuals without a gun license who cross state lines, attend a gun show, make a sizable purchase, and immediately return to their state.

In both cases, perceived flaws in the substance of the law would not be so troubling if the laws carried only modest punishments—warnings or fines, for example, rather than the incarceration and downstream labor and housing problems that inevitably follow conviction.208See generally James B. Jacobs, The Eternal Criminal Record (2015). But given the breadth and severity of criminal law, plus the mostly unchecked discretion that police departments have when deciding which among an ocean of technical criminal violations to investigate, the prospect of near-perfect detection takes on a more sinister character. Thus, when people have reservations about, for example, Alexa devices being used to detect the sounds of domestic violence, the reservations stem not from the specific use case but the general capabilities. They wonder, for good reason, what mischief can be made from such a technology when the set of conduct that is forbidden and harshly punished is sprawling and unevenly enforced.209Jessica Bulman-Pozen & David E. Pozen, Uncivil Obedience, 115 Colum. L. Rev. 809 (2015) (illustrating that the set of legal rules operating on U.S. residents is often so unrealistic that fastidious obedience to them can annoy and frustrate law enforcement agents).

Criminal codes are often expanded when the state has not gotten a handle on crimes of violence and property theft. The criminalization of vice (alcohol and drugs) was supported by the community not necessarily out of concerns that the drugs themselves cause to users but because of the “unconscionable violence” that came along with trafficking and addiction.210Forman, supra note 7, at 129 (quoting Carl T. Rowan, Locking Up Thugs Is Not Vindictive, Washington Star (Apr. 23, 1976)). In other words, substantive criminal law is expanded to compensate for deficiencies in the detection and prosecution of crimes that were already on the books so that police could arrest for lower level crimes and (stochastically) reduce the incidence of more serious crimes.211K. Jack Riley, Nancy Rodriguez, Greg Ridgeway, Dionne Barnes-Proby, Terry Fain, Nell Griffith Forge, Vincent Webb & Linda J. Demaine, Just Cause or Just Because?: Prosecution and Plea-Bargaining Resulting in Prison Sentences on Low-Level Drug Charges in California and Arizona 76 (2005). If detection of the serious crimes were more functional, this should relieve the need for sprawling criminal codes.

Hence the dilemma: better crime detection could help stop the pattern of an upward ratchet, but as long as the criminal codes are already sprawling, there will be resistance to increasing detection.

2.  Overly Harsh Punishment

On severity of punishment, the United States stands out among developed nations. We use incarceration intensively. In France and the U.K., a criminal who punches a person in the nose would be sentenced to less than six months in jail.212U.K. Parliament, Comparative Prison Sentences in the EU, House of Commons Library (2015), https://commonslibrary.parliament.uk/research-briefings/cbp-7218 [https://web.archive.org/web/20240510064827/https://commonslibrary.parliament.uk/research-briefings/cbp-7218/. The same conduct in the U.S. would result in a sentence of about three years.213U.S. Sentencing Commission, Sourcebook of Federal Sentencing Statistics Table 15 (2020), https://www.ussc.gov/sites/default/files/pdf/research-and-publications/annual-reports-and-sourcebooks/2020/Table15.pdf [https://perma.cc/33WN-APC8]. Note, though, that the differences for non-violent offenses like theft appear to be smaller (fewer than 6 months in U.K. compared to a median of 8 months in the U.S.). Id. Moreover, no outsider would mistake our prisons for institutions of rehabilitation: the entire sentence is usually carried out in a facility that is punishing, with drab quarters, humiliating toilet and bathroom facilities, and rancid food.214Craig Haney, Criminality in Context 335–44 (2020). Once released, the negative consequences continue as the housing and labor markets penalize criminal convicts.215Forman, supra note 7, at 219. See generally Michelle Alexander, The New Jim Crow: Mass Incarceration in the Age of Colorblindness (2012). Long sentences also create risks of abuse by giving police officers and other state agents leverage to extract bribes, pleas, and false confessions.216Dharmapala et al., supra note 67, at 111 (citing David Friedman, Why Not Hang Them All?: The Virtues of Inefficient Punishment, 107 J. Pol. Econ. S259 (1999)).

The harshness of our sentences is the byproduct of a low detection rate. Communities that at various times have been disfigured from crime waves tend to demand more and harsher criminal penalties.217James Forman Jr.’s book Locking Up Our Own documents the set of factors and conditions that led communities of color to make entirely understandable demands for greater punishment, even though the result of those efforts have not had their intended effects. Forman, supra note 7, at 124. The intuitive appeal of using long prison sentences to make up for low detection rates became the explicit policy of federal and local governments following the landmark work of Gary Becker. Becker modeled crime with a simple formula determined by the probability of conviction and the severity of punishment.218Gary S. Becker, Crime and Punishment: An Economic Approach, 76 J. Polit. Econ. 169, 170 (1968). See also A. Mitchell Polinsky & Steven Shavell, The Theory of Public Enforcement of Law, in Handbook of Law and Economics 421 (2007). Because it is much easier and cheaper for the state to ratchet up punishment than to catch more perpetrators, his work persuaded many politicians to manage crime through tough sentencing.219Cass R. Sunstein, David Schkade & Daniel Kahneman, Do People Want Optimal Deterrence?, 29 J. Legal Studs. 237 (2000).

The sparseness of Becker’s model for crime rates leaves much to be desired for anybody looking for a comprehensive explanation for crime—crime, of course, has a range of social and economic causes220These are the levers most directly under the control of a politically accountable legislators, mayors, police departments, and prosecutors, but there are of course other factors. See generally Stephen J. Schoenthaler & Ian D. Bier, The Effect of Vitamin-Mineral Supplementation on Juvenile Delinquency Among American Schoolchildren: A Randomized, Double-Blind Placebo-Controlled Trial, 6 J. Alt. & Complementary Med. 7 (2000) (discussing malnutrition as a factor in crime); Civic Research Institute, The Science, Treatment, and Prevention of Antisocial Behaviors (Diana H. Fishbein ed., 1999) (reviewing evidence of the impact of alcoholism, drug use, sexual abuse, cognitive and genetic factors, and family/gender role factors); Clifford R. Shaw & Henry D. McKay, Juvenile Delinquency and Urban Areas (1942) (discussing the effect of weakened or disorganized social institutions on crime; this work planted the roots of what would become the “broken windows” theory).—but as Part II explained, there is little doubt that detection has a significant influence over the amount of crime in a given community.221Executive Office of the President, Economic Perspectives on Incarceration and the Criminal Justice System 36–40 (2016) (citing to the empirical literature finding that increased incarceration reduces crime, but less effectively than equivalent increased spending on police); Andrew von Hirsch, Doing Justice: The Choice of Punishments 62–65 (1976). See generally Raymond Paternoster, The Deterrent Effect of the Perceived Certainty and Severity of Punishment: A Review of the Evidence and Issues, 42 Just. Q. 173 (1987); Beau Kilmer, Nancy Nicosia, Paul Heaton & Greg Midgette, Efficacy of Frequent Monitoring with Swift, Certain, and Modest Sanctions for Violations: Insights from South Dakota’s 24/7 Sobriety Project, 103 Am. J. Pub. Health e37 (2013); Lawrence W. Sherman, Police Crackdowns: Initial and Residual Deterrence, 12 Crime & Just. 1 (1990). Punishment, by contrast, seems to have a U-shaped relationship to recidivism, where no punishment and long, harsh punishment both tend to increase the odds that a perpetrator will recidivate.222Amanda Y. Agan, Jennifer L. Doleac & Anna Harvey, Misdemeanor Prosecution (Nat’l Bureau Econ. Rsch., Working Paper No. 28600, 2021).

I do not want to overstate the case for reducing prison time. Roughly half of the inmates in prison are individuals with such consistent sociopathic and antisocial behaviors that for those inmates, long-term incapacitation has positive externalities. Not only does incapacitation prevent these particular individuals from committing additional crimes (specific deterrence), but their families and particularly children may benefit from having less, rather than more, exposure to them.223See generally Samuel Norris, Matthew Pecenco & Jeffrey Weaver, The Effects of Parental and Sibling Incarceration: Evidence from Ohio, 111 Am. Econ. Rev. 2926 (2021); Sara R. Jaffee, Terrie E. Moffitt, Avshalom Caspi & Alan Taylor, Life with (or Without) Father: The Benefits of Living with Two Biological Parents Depends on the Father’s Antisocial Behavior, 74 Child Dev. 109 (2003). Nevertheless, the social costs of harsh punishment do not seem to serve deterrence or otherwise be justified outside the context of heinous or repeated criminal activity.

Over-punishment and criminal detection are inextricably connected. We cannot expect to find a political will to reduce punishment unless the police have—and use—new means to detect and root out crime. Filtered dragnets can jolt and resettle the criminal justice system in a new equilibrium where detection, rather than harsh punishment, is the key mechanism for crime control.

3.  Discretionary Application

Once the police have committed to investigating a particular crime, filtered dragnets take discretion away from the police to drive the investigation. But there are other points in time before and after a filtered dragnet may be used when government agents can exert control over the process:

i.  Selective Protection

When it comes to serious crimes of violence and theft, American police forces have a troubling history of systematically ignoring the suffering of minority communities. Police once actively conspired to deprive former slaves of their right to protection by joining the murderous mobs.224Stuntz, supra note 15, at 104–05. Over the subsequent century, police started to exhibit a more passive form of selection by simply not investigating and pursuing crimes committed against African-Americans as zealously as crimes committed against whites.225This trend can be seen in studies finding that models predicting enforcement and sentencing often include a large and statistically significant effect for the race of the victim (with white victims receiving better protection). John J. Donohue III, An Empirical Evaluation of the Connecticut Death Penalty System Since 1973: Are There Unlawful Racial, Gender, and Geographic Disparities?, 11 J. Empirical Legal Studs. 637, 640 (2014). This is a form of inequality that is not adequately addressed in constitutional caselaw.226In fact, in the context of capital sentencing, the Supreme Court has explicitly said that there is not a constitutional guarantee that would prevent discretionary leniency to be executed arbitrarily. McCleskey v. Kemp, 481 U.S. 279, 292 (1987). Thus, courts must prevent police from using filtered dragnets to solve crimes committed against one set of privileged crime victims while failing to use the same tools to solve comparable (and comparably detectable) crimes committed against others.

ii.  Selective Crackdowns

Police also decide which crimes to target,227Mila Sohoni, Crackdowns, 103 Va. L. Rev. 31, 33–34 (2017). and when and where to focus their resources.228See generally Jeffrey Fagan, Garth Davies & Adam Carlis, Race and Selective Enforcement in Public Housing, 9 J. Empirical Legal Studs. 697 (2012) (describing selective enforcement of criminal trespass by race or public housing status). For example, police will decide which crime scene images should be subjected to facial recognition. There is no guarantee that they will pursue arrest and prosecution of violent or destructive participants at Black Lives Matter protests or at a pro-Trump rallies with the same vigor.

iii.  Controlling the Data

Whether police use government-held data or data held by private companies to operate a filtered dragnet, they can exert some influence over the process if they are allowed to use a subset of available information to run through the filtered dragnet.229Indeed, this is one counterintuitive reason it may be better to have police access data from third-party companies rather than collecting it themselves, so that private industry may serve as a source of public information and whistle blowing. Farhang Heydari, Hoover Inst., Aegis Series Paper No. 2106, Understanding Police Reliance on Private Data 6 (2021). For example, if the government were able to limit DNA-matching to the data collected from ex-convicts only, or if a geofence warrant could direct a service provider to look for matching records only among customers who live in a certain precinct, the police could do an end run around the discretion-reducing function of filtered dragnets.

iv.  Downstream Decisions

After a suspect is identified by a filtered dragnet, police and prosecutors still have unchecked power to use leniency and to simply not pursue the leads that they do not like.230Discretion among judges at the point of sentencing seems to reduce racial disparities or, at least, make them no worse. See Drug Arrests Stayed High Even as Imprisonment Fell From 2009 to 2019, Pew Charitable Trs. (Feb. 15, 2022) https://www.pewtrusts.org/en/research-and-analysis/issue-briefs/2022/02/drug-arrests-stayed-high-even-as-imprisonment-fell-from-2009-to-2019 [https://perma.cc/Z65C-26JF]. It is possible that institutional and cultural influences downstream have started to change the risks of disparate racial impact over time. See generally Joshua B. Fischman & Max M. Schanzenbach, Racial Disparities Under the Federal Sentencing Guidelines: The Role of Judicial Discretion and Mandatory Minimums, 9 J. Empirical Legal Studs. 729 (2012).

The unifying theme across these decision-making practices is that the Supreme Court has avoided interfering with law enforcement discretion any time it has a plausible connection to judgment about the best use of resources. In Whren v. United States, the Supreme Court rejected a constitutional challenge by a criminal defendant who was pulled over for making an illegal U-turn. The defendant argued that the police would not have pulled over a white person, or any person about whom the police did not have a pre-existing “hunch,” under similar circumstances.231Whren v. United States, 517 U.S. 806, 809 (1996). The court believed that the defendant’s theory of unequal enforcement of minor traffic infractions was irrelevant and unworkable.232Id. at 815. At the time it probably was.233In individual cases, it would have been difficult to prove that race was a but-for cause of a police officer’s decision to conduct a seizure. However, even at the time, some argued that the fact that race clearly played a role systemically should have been sufficient for the Court to decide that pretextual stops violated the Fourth Amendment. See Tracey Maclin, Race and the Fourth Amendment, 51 Vand. L. Rev. 333, 375 (1998). But it is not anymore and will be even less so in the future. Today, a defendant bringing a case like Whren might have the data, thanks to GPS tracking of police and civilian cars, to demonstrate that police pull over only a small fraction of the illegal U-turns and other traffic infractions that they observe, and that the enforcement disproportionately targets minority drivers (if this is so).234Christopher Slobogin has characterized law enforcement use of pretextual stops as a species of general warrant. Slobogin, Virtual Searches, supra note 29 at 102.

If police are able to use filtered surveillance to solve crimes at minimal expense, there will be even less need for discretion. So, if police have a filtered dragnet, courts must make sure they have an acceptable response to the question: “Why did you enforce the criminal law here and not there?”235See generally Harcourt & Meares, supra note 18 (recommending that the degree of suspicion and the evenhandedness of a search program should be of utmost Fourth Amendment importance).

In summary, a government that has the capacity to detect criminal behavior at very high rates must come under heightened standards of care with respect to the promulgation of criminal laws, the use of incarceration and punishment, and the application of detection tools.

V.  THE ANTI-AUTHORITARIAN FOURTH AMENDMENT

Anti-authoritarianism, rather than privacy, should be the benchmark for the Fourth Amendment when police develop cases using filtered dragnets. What makes facial recognition or a geofence or some other form of filtered dragnet “reasonable” is not that the privacy of the innocent is protected—they will all do that. Rather, an “unreasonable” use of these technologies means the state is misusing its power to punish and control.

The current trajectory of Fourth Amendment caselaw suggests that we are headed for one of two suboptimal endpoints: either the state will be able to use filtered dragnets with little to protect its citizens from the perils of broad criminal laws, harsh criminal sentences, and selective enforcement, or the state will effectively be prohibited from using filtered dragnets, leaving a criminal justice status quo that nobody would devise and few would defend.236Barkow, supra note 100, at 5 (“One could say our approach to crime is a failed government program on an epic scale, except for the fact it is not a program at all. It is the cumulative effect of many isolated decisions to pursue tough policies without analyzing them to consider whether they work or, even worse, are harmful.”). But if the courts start to take seriously the fundamental differences between filtered dragnets and other investigation techniques—if they recognize that technology can explode longstanding assumptions about the nature of risk when police increase the detection of crime—courts can harness the disruptive technology and help society land in a better equilibrium.

Thus, the Fourth Amendment must evolve to demand “reasonableness” when detection is easy. The thrust of my proposal is that the phrase “reasonable searches and seizures” should be understood as a more expansive and robust guarantee of reasonableness.237To some extent, this builds on the constitutional case law and scholarship that give the “reasonableness” phrase pride of place in Fourth Amendment interpretation. See Akhil Reed Amar, The Constitution and Criminal Procedure: First Principles 35 (1997); Miriam H. Baer, Law Enforcement’s Lochner, 105 Minn. L. Rev. 1667, 1730 (2021); Renan, supra note 135, at 1044, 1081–82. Specifically, the requirement of “reasonable” seizures should guarantee that the consequences of a seizure (e.g., carceral arrest and a possible prison sentence) are fitting and proportionate to the gravity of the suspected crime. The requirement of “reasonable” searches should guarantee not only that the search is conducted based on probable cause and in line with established warrant requirements, but also that the decision to search or not search is reasonable and non-arbitrary. The former ensures that the criminal law being enforced is serious enough to justify the loss of rights that comes along with an arrest or a long sentence. The latter ensures that criminal detection tools are used in an even-handed manner.

A.  Reasonable Seizing—Restricting the Substantive Criminal Law

The prospect of near-perfect detection requires more care in defining a reasonable seizure. In order for a carceral seizure of a person to be reasonable, state uses of force and coercion involved must be justified by the harm that the arrestee has imposed on society. “Freedom from unreasonable . . . seizures” should be interpreted to protect the interests of individuals who have engaged in conduct that is technically illegal but not morally reprehensible.238See generally Robert M. Cover, Violence and the Word, 95 Yale L.J. 1601, 1608 (1986) (reminding readers that all prison sentences are backed by the credible threat of state violence). Again, my argument is similar to Bill Stuntz’s work suggesting the physical intrusion and coercion of the policing process to be the main source of trouble. William J. Stuntz, Privacy’s Problem and the Law of Criminal Procedure, 93 Mich. L. Rev. 1016, 1026 (1995). Thomas Jefferson’s unfinished vision laid out in the Declaration of the Rights of Man and of the Citizen provides the blueprint. Article 4 states, “Liberty consists in the power to do anything that does not injure others”; Article 5 states, “The law has the right to forbid only such actions as are injurious to society”; and Article 8 states, “The law ought to establish only penalties that are strictly and obviously necessary.”239Declaration of the Rights of Man and of the Citizen (France 1789), https://avalon.law.yale.edu/18th_century/rightsof.asp [https://perma.cc/VZF7-CZ6G].

A seizure should only be reasonable if the underlying criminal conduct and the resulting punishment are also reasonable. While substantive due process rights and the Eighth Amendment provide some absolute constitutional limits against unreasonable criminal codes or punishments, these rights must be bolstered in the face of near-perfect detection. An analysis of reasonable seizures in light of filtered dragnets has two aspects to it: (1) whether the behavior is sufficiently blameworthy to belong in the criminal code at all, and (2) if so, whether the punishment fits the risks and harms of the crime.

Is the conduct crime-worthy? The first inquiry asks whether the suspect’s conduct is bad enough to justify arrest and incarceration at all.240Given the public interest in having the state intermediate misdemeanor and civil infractions as well, non-carceral short-term seizures should not require judicial scrutiny of the substance of the law. See Rachel A. Harmon, Why Arrest?, 115 Mich. L. Rev. 307, 359 (2016). This is a threshold issue. Criminal conviction needs to be blameworthy and stigmatizing. Defining what sort of conduct is “blameworthy” raises deep philosophical questions, but there is an aspect of the question that is empirical: it needs to be rare. If the conduct captured by the scope of the criminal codes is commonplace, the actor’s community evidently has not incorporated restraint deeply into its moral fabric.241A useful methodology may be the sort of surveys of past behavior that Tom Tyler relied on in his seminal work, Why People Obey the Law. One survey of Chicago residents suggested that there might be a natural breakpoint between minor traffic violations and neighborhood infractions, where survey respondents sometimes engaged in the activity (even if rarely), and the conduct for which over 90% of respondents state they have never engaged in (e.g., theft). Tyler, supra note 93, at 41. In those cases, government intervention short of criminal liability (including expressive law, civil fines, or positive reinforcement for its opposite) should be used.242To increase cultural legitimacy, punishment should rely more on reputation and relationship consequences than on punishment. Stuntz, supra note 15, at 30–31. One broad category of criminal laws that may deserve constitutional scrutiny are laws that criminalize the possession or sale of contraband items to adults. These are acts that are transactional. Kleiman, supra note 20, at 154–55.

This is at odds with cases like Atwater, where the court refused to second-guess a local government’s decision to criminalize a minor driving infraction,243Atwater v. Largo Vista, 532 U.S. 318, 323–24 (2001). but Fourth Amendment case law does occasionally break rank with Atwater and peeks at the substance of the criminal violation in order to gauge the reasonableness of a procedure. For example, when analyzing whether a warrantless traffic checkpoint is constitutional as a reasonable warrantless seizure, the Supreme Court explicitly considers “the gravity of the public concerns served by the seizure” as one of the factors.244Illinois v. Lidster, 540 U.S. 419, 427 (2004) (quoting Brown v. Texas, 443 U.S. 47, 51 (1979)). And the Court has refused to allow exigent circumstances to excuse the failure to secure a warrant for a home search and arrest when the underlying crime is a minor offense.245Welsh v. Wisconsin, 466 U.S. 740, 750 (1984) (citing McDonald v. United States, 335 U.S. 451, 459–60 (Jackson, J., concurring)). And Atwater is ahistorical: a quick tour of the notorious cases the Crown directed against colonists that inspired the Bill of Rights are offensive, in large part, because of the substance of the crimes. These included crimes such as writing or publishing “gross and scandalous reflections and invectives upon his majesty’s government” or the crimes of illegal trade and inadequate record-keeping.246Laura K. Donohue, The Original Fourth Amendment, 83 U. Chi. L. Rev. 1181, 1197 (quoting Entick v. Carrington, 19 Howell’s State Trials 1029, 1034 (CP 1765)), 1199 (publishing criticism), 1243 (illegal trade and recordkeeping), 1247 (same) (2016). Moreover, Donohue describes the limits in eighteenth century England to the meaning of the term “felon” or “felony,” which included only the most morally reprehensible crimes such as murder, theft, suicide, rape, and arson. Id. at 1222–23.

Is the punishment too harsh? If the suspect’s conduct is reprehensible enough to pass the initial threshold test, a post-conviction seizure could still be unreasonable if the quality and length of detention is disproportionately harsh.247Andrew von Hirsch, Doing Justice: The Choice of Punishments 66–83 (1976). The sentences of many crimes, even violent crimes, could probably be reduced to weeks or days, or even converted to non-carceral forms of punishment (like public service or surveillance-enabled supervised release) without increasing crime rates if detection rates were much higher than they currently are. Long-term prison sentences can be reserved for murder, treason, severe sexual assault, severe child abuse, and for the incapacitation of repeat criminals.248See generally Eric Helland & Alexander Tabarrok, Does Three Strikes Deter?: A Nonparametric Estimation, 42 J. Hum. Res. 309 (2007) (finding significant deterrent effect, and not just incapacitation effect, from three strikes laws). For other crimes, detection through filtered dragnets, rather than a small chance of very harsh punishment, can be the door jamb that stops the metaphorical revolving door of recidivism.

B.  Reasonable Searching—Minimizing Discretion

A police department’s use of filtered dragnets will be fair if it avoids gaps in the protection from crime as well as gaps in leniency from enforcement.

1.  Duty to Search

All cases of reported or otherwise known crimes that are equally suitable for filtered dragnets should be investigated.249At the very least, they should be investigated randomly rather than haphazardly. See Harcourt & Meares, supra note 18, at 851–54. For example, if a police department can use filtered dragnets to detect gun violence or robberies, and it fails to investigate daytime violence and robberies taking place near low-income schools even though it investigates every daytime robbery or assault that takes place near high-income schools,250Forman, supra note 7, at 125. the uneven use of filtered dragnets would render it an unreasonable search. As a practical matter, while it would make more sense for a constitutional challenge to come in the form of a § 1983 claim brought by a resident who is harmed by a detectable or deterrable crime, the challenge is more likely to emerge when a criminal defendant brings a claim similar to the claim brought in Whren (arguing that although they committed an offense, the crime is unequally enforced).251Whren v. United States, 517 U.S. 806, 810 (1996). Courts should be open to a claim and evidentiary proof of this sort.

2.  Duty to Cast a Large Dragnet

Law enforcement should not have undue control defining the search pool that will be used by a filtered dragnet. The database that will be used to cross-check against the facts of a crime should include everyone possible whose data is accessible and whose participation in the crime would not be an impossibility. This reduces the risk of arbitrariness or bias that could result if police search for potential leads and matches in one population while ignoring another.

By this standard, facial recognition systems like Clearview AI are more legitimate (in the sense of being less susceptible to bias or discretion, at least) when they match surveillance footage at a crime scene against the largest possible set of publicly available portraits on the open web. Contrast this with DNA filtered dragnets: it is increasingly common and popular to restrict local law enforcement who are running DNA searches to CODIS, the federally maintained database of arrestee or convict DNA samples.252Kaye & Smith, supra note 146, at 414–15; Ram, supra note 34, at 789 (it is not fair to subject relatives of people who are in the CODIS database to more police scrutiny than relatives of those who are not). Local police departments have expanded their DNA databases by choosing to include “exclusion samples” (that is, DNA samples collected from suspects or victims) and juvenile defendants. Lazer & Meyer, supra note 33, at 904. Whatever rationale might justify subjecting convicts to greater likelihood of being caught in their own future crimes, the logic does not follow to arrestees or to individuals whose crimes are detected through familial DNA.253Lazer & Meyer, supra note 33, at 909–11. Commentators have noted the race disparities in likelihood of detection that result from using arrestee DNA only. Ram, supra note 34, at 789.

The principle of evenhanded enforcement is consonant with what Bennett Capers meant when he argued that equitable policing may require “redistributing privacy.”254Bennett Capers, supra note 59, at 1243–45 (“In exchange for a reduction in hard surveillance of people of color, it will require an increase in soft surveillance of everyone.”). But it may require courts to enforce subpoenas or issue warrants in order to pierce through corporate policies that resist law enforcement access.255See generally Yan Fang, Internet Technology Companies as Evidence Intermediaries, 110 Va. L. Rev. (forthcoming 2024). These policies are already in place at some companies.256Ancestry, Ancestry Privacy Statement (Aug. 11, 2020), https://www.ancestry.com/c/legal/privacystatement_2020_8_11#:~:text=In%20the%20interest%20of%20transparency,data%20across%20all%20our%20sites.&text=We%20may%20share%20your%20Personal,(e.g.%2C%20subpoenas%2C%20warrants)%3B [https://perma.cc/Y8NN-FSXJ]. Of course, there may be times when law enforcement resources really are constrained so that investigating every trackable crime or casting the widest possible dragnet will not be possible, but the police should be able to offer some reasonable explanation. And an explanation that would not be reasonable is that too many individuals would be caught: if the availability of filtered dragnets forces law enforcement to confront the problem that there are too many criminal acts, the proper government response is to revisit and narrow or purge some of the substantive criminal laws.

C.  Police Culture: The Era of the Nerdy Police Force

The adoption of filtered dragnets will require law enforcement agencies to become more technocratic. Much of the initial investigation work is likely to be centralized, in upper management working at desks, and their compliance with Fourth Amendment restrictions will require competence, if not expertise, in statistical methods and data auditing procedures. To some extent, this change in operations is already happening with the gradual introduction of DNA forensic labs, facial recognition, and now, reverse searches. With clear Fourth Amendment guidance for filtered dragnets, police forces could rapidly adopt filtered dragnets and divest somewhat from traditional techniques. Police operations would shift away from self-initiated patrols and field-based investigation toward data-driven initiation and investigation. This will change who is qualified for and attracted to a policing job. Police investigators who are used to solving cases through interrogations and informants will begin to feel like the baseball scouts who still visit high school and college teams looking for “good legs” while their younger, nerdier, and (eventually) better paid colleagues use Bill James-style statistics to prioritize the team’s recruiting efforts.257See generally Michael Lewis, Moneyball (2003).

This may prove to be a feature—a way to achieve the reform of police culture by working backwards from shared ends that are appealing to both suburban families and Black Lives Matter activists (lowering crime, reducing false convictions, and achieving even-handed enforcement). The cultural shift can provide counterpressure to a problem that currently plagues police recruitment—that the people most interested in working for law enforcement have stronger-than-average preferences for meting out punishment.258Dharmapala et al., supra note 67, at 107. All the more reason civil liberties organizations should reconsider their instinctive negative reactions to filtered dragnets.

The criminal defense bar may get transformed, too. Andrew Ferguson has made the case that law enforcement data-collection and data-mining practices can be inverted to discover negligent or abusive practices within police departments.259Andrew Guthrie Ferguson, The Exclusionary Rule in the Age of Blue Data, 72 Vand. L. Rev. 561, 600–08 (2019). Defendants can make use of “blue data” to prove their cases that, for example, law enforcement had used an unreasonably narrow dragnet.260Id. To be fully effective, blue data investigations may require increased transparency and access to police programs. See generally Hannah Bloch-Wehba, Visible Policing: Technology, Transparency, and Democratic Control, 109 Calif. L. Rev. 917 (2021). This may offend a police department’s sense of agency and self-determination, but this is a reasonable price to pay for the power and efficiency of filtered dragnets.261Some will no doubt be concerned that filtered dragnets are a progression of the sort of bureaucratization of policing that has already caused dysfunction—the Compstat meetings, bulk, assembly-line adjudication, et cetera. Stuntz, supra note 15, at 57. But it is not clear that there are viable alternatives to a bureaucratic police force.

VI.  ADDRESSING FRIENDLY OBJECTIONS

Some readers will no doubt disagree with my description of the looming opportunities and problems that will arise with filtered dragnets, and as a result will reject the policy solutions offered in Part V. I addressed doubts about the upsides of filtered surveillance or the downsides of near-perfect detection as best I can in those earlier Parts. Whatever disagreements about the policy implications remain will have to be aired in other fora. Here, I address some objections that will be raised even by readers who agree that the policies advanced in this Article are sound.

“Friendly” critics will wonder why it is necessary to constitutionalize these policies rather than advocating for a legislative response. The answer, in brief, is that constitutional protections are the only viable tools when several criminal justice rules must be changed at the same time.

Friendly critics may also wonder why the Fourth Amendment is the right vehicle for course correction even if all agree that constitutional law must be pressed into service. On this question, I am more neutral. If the Eighth Amendment and Due Process clauses can be interpreted to reach the same anti-authoritarian objectives, there is little reason to insist on the Fourth Amendment as the primary source of these rights. But since filtered dragnets will inevitably cause seismic activity in Fourth Amendment law, and since highly efficient searches are the reason that the threat of government tyranny will become more pronounced, it is at least fair to say that the Fourth Amendment could be the right constitutional source for the anti-authoritarian rights described in Part V.

A.  Why the Courts? (Or, Why Not the Legislature?)

Not every problem in law enforcement needs to be solved through the constitution, but this one does. The political process is exceedingly unlikely to get us out of our criminal justice rut, where low detection rates are messily compensated through criminal liability for minor infractions. Political winds bob from too much lenity to authoritarian severity,262Stuntz, supra note 15, at 34–35. and as a result, surveillance restrictions and decriminalization usually rise and fall together depending on whether the mood is pro-rights or anti-crime. Political institutions do not have the tools to break surveillance and substantive criminal law apart and to work out a criminal justice horse trade. But a horse trade is what we need: we simultaneously need the police to detect more violent crime while also ensuring that no person who is caught with a $10 baggie of drugs could ever be in a position to go to prison for the rest of their life.263Forman, supra note 7, at 121 (describing a former client in this position). Even the more probable outcome—a five-year sentence, say, id. at 122, is vastly over-punitive compared to the risk of harm posed to the community. See generally Jane Bambauer & Andrea Roth, From Damage Caps to Decarceration: Extending Tort Law Safeguards to Criminal Sentencing, 101 B.U. L. Rev. 1667 (2021).

This trade—reduced criminal liability in exchange for greater detection—can only be accomplished through constitutional adjustment. If criminal liability and punishment are reduced without a simultaneous increase in detection, crime rates will rise and the ballot box consequences for political actors will be harsh. If detection capacity is increased without any change to the criminal codes, the political actors’ constituents will be justifiably nervous about how the newfound power of detection will be used. But if the two reforms happen at the same time—if the state is constrained by constitutional interpretation from detaining or imprisoning individuals based on minor infractions, or from levying long sentences for anything other than the most serious and violent offenses—surveillance is defanged because the threat of unjust prosecution is reduced.264See generally Bambauer & Roth, supra note 263 (using a new empirical approach to measure just sentences and finding that criminal sentences are disproportionate to the social harm the crimes caused).

Put another way, the political pressure to limit or ban surveillance tools might make sense as a second-best solution if decriminalization and reduced sentencing is politically infeasible, but the risk is that the strategy can lock out the first best solution—the low penalty/high detection solution. Indeed, in the wake of rising murder rates, the decriminalization and police reform movements are already more politically controversial than they were just a couple years ago. If crime rates continue to rise while detection is capped or suppressed through new legal constraints on technology, politically accountable decisionmakers will continue to use mass incarceration to manage crime.

To be fair, many luminaries in the field of criminal justice have seen roughly the same patterns of dysfunction and technological disruption that I have recounted and have recommended solutions in the form of legislation, administrative regulation, and restoring the role of local government. Bill Stuntz, for example, argued that many of the abuses of power in the criminal justice system would be avoided if local governments (rather than states) were the primary promulgators of criminal law and if juries (rather than prosecutors) were the decisionmakers who most often determined whether a defendant should be convicted or serve time.265Stuntz, supra note 15, at 8, 39. See generally Wayne A. Logan, Fourth Amendment Localism, 93 Ind. L.J. 369 (2018). Chris Slobogin, Barry Friedman, Maria Ponomarenko, Catherine Crump, and Andrew Ferguson have argued that legislatures and regulatory agencies should be more active in structuring how (non-filtered) dragnet and surveillance technologies should and should not be used in the field.266Ferguson, supra note 9, at 272. See generally Christopher Slobogin, Panvasive Surveillance, Political Process Theory, and the Nondelegation Doctrine, 102 Geo. L.J. 1721 (2014); Barry Friedman & Maria Ponomarenko, Democratic Policing, 90 N.Y.U. L. Rev. 1827 (2015); Catherine Crump, Surveillance Policy Making by Procurement, 91 Wash. L. Rev. 1595 (2016). But they also acknowledge that politically accountable bodies always run the risk that their decisions will disproportionately benefit the politically powerful and will be relatively indifferent to problems of under-protection and prejudiced enforcement.267Slobogin, supra note 132, at 134.

Daphna Renan has argued, convincingly in my opinion, that political processes alone cannot be expected to produce the sort of basic rights and counter-majoritarian protections that the Constitution should guarantee.268See generally Renan, supra note 135. Our agreement ends there, though, because Renan advocates for a Fourth Amendment superstructure, or set of principles, that would set requirements and boundaries on administrative agencies (such as the Privacy and Civil Liberties Oversight Board) tasked with creating law enforcement surveillance programs.269Id. at 1108–25. Again, Renan is primarily (though not exclusively) analyzing surveillance technologies that are not crime-driven filtered types of tools that I focus on here. But no board, no matter how independent, could actually make the grand maneuver that I’m asking readers to consider here—where filtered dragnets are permitted, but in exchange for protection from bad laws, harsh punishment, and discretionary application. Renan’s proposal may be a good second-best solution, but a dramatic reorientation of constitutional priorities can only be done by the Supreme Court. It is time for constitutional renewal in search of a better equilibrium.270Jack M. Balkin, The Cycles of Constitutional Time 44–65 (2020) (describing cycles of constitutional “rot,” where the accretion of rules and exceptions have permitted authoritarian practices to fester, and “renewal,” where constitutional theory and courts correct course).

B.  Why the Fourth Amendment?

The harder question, and I confess this is where I am on shakier ground, is why the anti-authoritarian principles that I claim are so important during this inflection point are the responsibility of the Fourth Amendment to solve rather than other parts of the Bill of Rights or notions of substantive due process.271Christopher Slobogin, A Defense of Privacy as the Central Value Protected by the Fourth Amendment’s Prohibition on Unreasonable Searches, 48 Tex. Tech. L. Rev. 143, 155 (2015). The case is somewhat easier for the principle that reasonable searching requires evenhandedness. At the founding, the Fourth and Fifth Amendments were meant to prevent the government from being able to rummage through a disfavored target’s things looking for evidence of a crime, so equal and non-arbitrary treatment was always a goal.272Stuntz, supra note 15, at 72.

The case for using the Fourth Amendment to put constraints on substantive criminal law and sentencing is a bit harder. After all, the Supreme Court has repeatedly authorized law enforcement agencies to execute stops, searches, and arrests, no matter how trivial the law-violating behavior may be to overall public safety.273See discussion of Atwater and Whren, supra Part V. As early as Boyd v. United States, decided in 1886, the Court found that Fourth Amendment protections do not apply to those who have committed a public offense, and courts have declined to second-guess whether the public offense was valid in the course of a Fourth Amendment analysis.274Boyd v. United States, 116 U.S. 616, 630 (1886). The Fourth Amendment protects rights that have “never been forfeited by his conviction of some public offence.” Id. And one may reasonably think that if courts are going to invalidate an overly harsh prison sentence on constitutional grounds, as I argue they should under the guise of protecting against unreasonable seizures, they would have already imposed these limits under the Eighth Amendment’s cruel and unusual punishment clause.275Harmelin v. Michigan, 501 U.S. 957, 997 (1991) (while the Eighth Amendment prohibits “grossly disproportionate” mandatory sentences, noncapital sentences would almost never be found to be grossly disproportionate).

Perhaps it would make as much sense to make Eighth Amendment or Due Process protections more robust to ensure that criminal liability is not overbroad and sentences aren’t overlong.276Note, though, that the Court has already stated a reluctance to expand substantive due process if other parts of the Bill of Rights are relevant to the claim. Sacramento v. Lewis, 523 U.S. 833, 842 (1998). But a long view of the Fourth Amendment can support a shift from the protection of the property, privacy, and autonomy of non-offenders to the protection of those same interests of those who are innocent in the more platonic sense.

In many ways, the history of Fourth Amendment caselaw shows a faltering and incoherent attempt to get to the main point: to make sure the state does not have too much power to enforce silly crimes and scare its constituents into submission.277Cloud, supra note 14, at 202. Cloud also notes that early Fourth Amendment case law was designed to constrain discretion (or “autonomy”) of law enforcement and the judiciary. Id. at 276–284. Silly crimes have been at the center of the original construction of the Fourth Amendment and each of its major reforms. Shortly after the American Revolution, sedition laws motivated creative lawyers like Alexander Hamilton to use procedure in order to correct flaws in the substantive criminal law that were not, at that time, adequately constrained by the First Amendment.278Stuntz, supra note 15, at 71–72. It is particularly strange that the attack required procedural rather than substantive challenges because prosecutions for the crime of seditious libel conducted by the British Crown was a major motivating force behind the Bill of Rights. Thomas P. Crocker, The Political Fourth Amendment, 88 Wash. U. L. Rev. 303, 309, 346 (2010). In the context of that time, when states had nearly full rein to search for physical evidence and when prosecutions were proved primarily using witnesses, the thought that constitutional protections could get in the way of convicting rapists and murderers would have been preposterous.279Tracey Maclin, The Supreme Court and the Fourth Amendment’s Exclusionary Rule 83–100 (2013); Stuntz, supra note 15, at 71–72. After all, the founders did not expect the Fourth Amendment to constrain how local law enforcement investigated crimes, and group searches executed without particularized warrants were tolerated.280Slobogin, Virtual Searches, supra note 29 at 103. Prior to the 1960s, state courts interpreted their constitutional guarantees of freedom from unreasonable searches and seizures to be very permissive. The investigation strategies that police departments adopted were generally considered reasonable. Stuntz, supra note 15 at 68–69. Thus, at that time, the buildup of procedure to help protect against crimes of belief and thought had little cost to the control of more conventional crimes.

Courts again increased Fourth Amendment procedural protections during two subsequent periods when the substance of criminal law was directed at questionable, arguably victimless vice crimes like gambling, alcohol (during prohibition), obscenity, and recreational drugs.281Stuntz, supra note 15, at 110. In the twentieth century, new information technologies changed the nature of police investigation by enabling wiretapping and forms of long-term tracking of suspects without reliance on trespass or witness cooperation. The standard story is that these technologies unsettled the balance between conflicting societal goals related to police investigations, which is true enough. But another important factor is that the test cases involved the detection and enforcement of gambling, bootlegging, and drug distribution crimes. Katz v. United States, the Fourth Amendment case that developed the reasonable expectations of privacy test, involved bugging a phone a bookmaker was using.282Katz v. United States, 389 U.S. 347, 348 (1967). And it followed the logic of Justice Brandeis’s dissent in an earlier case, Olmstead v. United States,283Olmstead v. United States, 277 U.S. 438, 471 (1928) (Brandeis, J., dissenting). which involved the wiretapping of a bootlegger.284Katz, 389 U.S. at 361 (Harlan, J., concurring). Katz marked the end of a primarily property-based conception of Fourth Amendment rights and ushered in the privacy phase. When test facts making their way to the Supreme Court involved more serious crimes, like stalking, the Supreme Court avoided finding a privacy violation.285Smith v. Maryland, 442 U.S. 735, 745–46 (1979). Bill Stuntz critiqued the privacy turn, noting that Fourth Amendment litigation became much too focused on privacy and failed to ameliorate problems of physical security (especially bodily security) when suspects were routinely frisked and thrown to the ground. Stuntz, supra note 15, at 37. See also Michael Klarman, Rethinking the Civil Rights and Civil Liberties Revolutions, 82 Va. L. Rev. 1 (1996).

To be clear, there are other reasons, separate from the substance of the criminal law being enforced, that justify a focus on privacy. Twentieth century surveillance capabilities certainly left Americans—criminals and the innocent alike—at greater risk of unwanted observation of licit activities. But there is also a clear pattern: courts have used criminal procedure to frustrate the enforcement of controversial criminal statutes that cover activities in which a sizable proportion of Americans willingly participate.286The converse is also true: when crime rates spike among the crimes that are most important to a well-functioning society, such as crimes of violence, Fourth Amendment procedural protections are tuned down. Yale Kamisar, The Warren Court and Criminal Justice: A Quarter-Century Retrospective, 31 Tulsa L.J. 1, 2–3 (1995). Once privacy posed a significant obstacle to police investigations, procedural rights became the default defense against a tyrannical state. There was less pressing need to press the Constitution into service to challenge whether conduct should even be considered criminal in the first place or whether the police are protecting communities fairly. For better or worse, the Fourth Amendment privacy rule created a tractor beam for public defenders and civil liberties organizations to concentrate their anti-authoritarian efforts.

Scholars have occasionally attempted to refocus the Fourth Amendment on a more general purpose to create a constraint on power.287Or to create a “constraint on the power of the sovereign, not merely on some of its agents” Arizona v. Evans, 514 U.S. 1, 18 (1995) (Stevens, J., dissenting). With gratitude to Tom Crocker for highlighting this passage. Crocker, supra note 278, at 335 n.188. Bill Stuntz faulted Fourth Amendment’s turn to privacy because it “tend[ed] to obscure more serious harms that attend police misconduct.”288William J. Stuntz, Privacy’s Problem and the Law of Criminal Procedure, 93 Mich. L. Rev. 1016, 1020 (1995). More recently, Thomas Crocker has argued that the Fourth Amendment should be understood as a substantive right, not just a procedural one, that follows in the vision of the First, Second, and Ninth Amendments.289As well as the Fifth Amendment’s takings clause. Crocker, supra note 278, at 309–10, 343. But ultimately, Crocker advocates for the use of this substantive right to argue for a more thorough protection against surveillance.290Id. at 311. Naturally, I think this misses the point. A citizen whose government makes nearly all conduct and action illegal will never feel secure no matter how many restrictions on surveillance are in place. And conversely, a government that is rigidly constrained from expanding its criminal laws beyond the conduct that is nearly universally reviled will be limited in its ability to threaten a citizen’s sense of liberty no matter how much surveillance is in place.

The happenstance of technology provides another reason to prefer the Fourth Amendment over other constitutional sources to redress the problems of overcriminalization and uneven protection. The privacy of the innocent was mediating the clash between American values in freedom and security. Increasing use of filtered dragnets will make this arrangement untenable. If we expect the role of the Fourth Amendment to be meaningful—to be something other than a brief paperwork requirement in the process of securing warrants for filtered dragnets—it is both necessary and appropriate that Fourth Amendment caselaw starts to look for its root function and embrace its substantive as well as procedural dimensions.

CONCLUSION

In 1967, Alan Westin, a leading light among privacy scholars, said that “the modern totalitarian state relies on secrecy for the regime, but high surveillance and disclosure for all other groups.”291Alan Westin, Privacy and Freedom 23 (1967). This is probably a true statement, but highly incomplete. Surveillance is a necessary condition for authoritarian control, but not sufficient on its own. Indeed, all modern states need surveillance. Modern systems of taxation, public benefits distribution, medical services, and public health could not function without copious amounts of personal data. Thus, surveillance is necessary for all states, not just despotic ones. Moreover, surveillance is no more unique to totalitarianism than are weapons, prisons, and other tools the state must use to carry out the most basic obligations to support social order and security.

The tools that live exclusively in the toolbox of despots are repressive substantive criminal laws, harsh punishment, and discretion to choose when to enforce the law. Even in George Orwell’s dark depiction Nineteen Eighty-Four, Big Brother was oppressive partly because of the substance of the law: the wrong thought could land a person in jail.292See generally, George Orwell, Nineteen Eighty-Four (1949).

Against this threat of uncontrolled surveillance, many privacy scholars recommend the dismantling of the surveillance apparatus. This Article focused instead on the “uncontrolled” quality of uncontrolled surveillance. Filtered dragnets are a highly controlled dragnet that reveal only criminal violations. Thus, they are only as threatening to society as the criminal statutes that they enforce and the discretion of the government agents who use them. With the right alignment of Fourth Amendment rules to authoritarian threats, the state can be made to heel—to detect crimes fairly without burdening any communities with under-protection or over-punishment. This will require some intrusion of the traditionally procedural domain of the Fourth Amendment into the substantive realm of criminal law and punishment. If the state can suddenly detect every violation, prison must be reserved for truly awful behavior, and law enforcement should have less latitude to seek out or avoid the investigations of members of certain groups.

These are radical proposals. They go well beyond the privacy framework that has dominated Fourth Amendment theory for over half a century. But they respond to a radical tool that will shock a criminal justice system that is already in crisis and deserves rescue.

97 S. Cal. L. Rev. 571

Download

* University of Arizona James E. Rogers College of Law. The author is grateful for the advice and invaluable feedback from Jordan Blair Woods, Tracey Maclin, Farhang Heydari, Toni Massaro, Tammi Walker, John Villasenor, Andrew Woods, Lilla Montagnani, Kiel Brennan-Marquez, Jeffrey Fagan, Christopher Slobogin, Derek Bambauer, Mark Verstraete, Xiaoqian Hu, Andrew Coan, Niva Elkin-Koren, Uri Hcohen, and Tal Zarsky.

Familial Searches, the Fourth Amendment, and Genomic Control

In recent years, police have increasingly made use of consumer genomic databases to solve a variety of crimes, from long-cold serial killings to assaults. They do so frequently without judicial oversight per the Fourth Amendment’s warrant requirement by using consumer genomic platforms, which store hundreds of thousands or millions of user genomic profiles and enable law enforcement to infer the identity of distant genomic relatives who may be criminal suspects. This Essay puts this practice into context given recent legal and technological developments. As for the law, the Supreme Court in United States v. Carpenter has suggested that technologically driven and expansive datasets may be entitled to the full suite of Fourth Amendment protections. As for technology, we describe here the development of a novel technology that allows users to engage in genomic analysis in a secured environment without making such information available to a third party. Taken together, we present a possible technological solution to ensuring Fourth Amendment protections for direct-to-consumer genomic data.

Download

Get a Warrant: A Bright-Line Rule for Digital Searches Under the Private-Search Doctrine – Note by Dylan Bonfigli

From Volume 90, Number 2 (January 2017)
DOWNLOAD PDF

 

A girlfriend hacks her boyfriend’s computer and discovers evidence of tax evasion. She contacts a local law enforcement officer who arrives at her house and looks at the files she found. Without a warrant, the officer opens other files in the same folder the girlfriend had searched. The officer notices another folder labeled “xxx.” He opens the folder and discovers child pornography. The officer seizes the computer based on what he found. The boyfriend is indicted for possession of child pornography and tax evasion. Before trial, the boyfriend moves to suppress all evidence obtained pursuant to the officer’s warrantless search of the computer. What evidence should the judge suppress?

The answer turns on the Fourth Amendment’s private-search exception. Under this exception, a government agent may recreate a search conducted by a private individual so long as the agent does not “exceed the scope” of the prior private search. The question under the existing framework is: at what point did the officer exceed the scope of the prior search—if at all? Was it when he viewed files the girlfriend had not viewed, when he opened files in a different folder, or did he stay within the scope of the girlfriend’s search by only searching the computer’s hard drive? This is what I will refer to as the denominator problem, which asks what courts should use as the unit of analysis to measure the scope of a digital search.

There are at least four competing approaches to the denominator problem, discussed in Part II, and the Supreme Court has provided little guidance on how the private-search doctrine applies to digital searches, resulting in a circuit split. Until this issue is resolved, law enforcement has little guidance on when to obtain a warrant following a private search and can unknowingly subject individuals to unreasonable invasions of privacy, which may result in suppression of relevant evidence. One recent example is United States v. Lichtenberger.


 

90_307