Fintech and Techno-Solutionism

Silicon Valley–style technological innovation is ill-suited to address complex problems like financial inclusion and concentrated market power, yet promises abound that “fintech” can fix them. This oversimplified reduction of complex structural problems into technological puzzles has been critiqued as “techno-solutionism,” and it poses real dangers for public policy. When we start with the tech industry’s favored tools and then ask how to solve complex problems using those tools—rather than starting by defining the problem to be solved—it can distract policymakers from supporting real, structural solutions. Techno-solutionism can also deter policymakers from interrogating the limitations, and regulating the harms, of the proffered technological solutions.

This Article argues that not only are many fintech products themselves extremely techno-solutionist, but techno-solutionism is also impeding financial regulation’s ability to protect the public from fintech’s harms. It makes several contributions: First, this Article introduces into the financial regulation literature theories of how the law can perpetuate, and then be stymied by, techno-solutionism. Second, it comprehensively calls out the techno-solutionism inherent in many fintech offerings (particularly crypto), laying bare their harms and demonstrating where they are unable to solve the problems they claim to address. Such harmful nonsolutions do not warrant accommodative regulatory treatment—and yet, some policymakers have sought to give fintech products just that. This Article’s third contribution is a detailed exploration of techno-solutionism’s impact on U.S. financial regulatory policy as it pertains to fintech. This Article also uses this lens to consider how techno-solutionism might impact the regulation of AI in financial services.

 

Introduction

Technology has been an integral part of finance for a long time, but the rise of “fintech” has placed Silicon Valley–style technological innovation front and center in financial services. New technologies and technology-based business models have been developed as putative solutions to the limitations of the financial system, but fintech often fails to address the problems it claims to solve. Instead, fintech tends to create new problems that remain unaddressed because of misguided assumptions that technology can fix any problem—including the ones it causes. This “mistaken belief that we can make great progress on alleviating complex dilemmas, if not remedy them entirely, by reducing their core issues to simpler engineering problems” has been dubbed “techno-solutionism.”1Evan Selinger, The Delusion at the Center of the A.I. Boom, Slate (Mar. 29, 2023, 10:00 AM), https://slate.com/technology/2023/03/chatgpt-artificial-intelligence-solutionism-hype.html [https://perma.cc/4DPC-NF2W]. For more on the history of the term techno-solutionism, see Henrik Skaug Sætra & Evan Selinger, Technological Remedies for Social Problems: Defining and Demarcating Techno-Fixes and Techno-Solutionism, 60 Sci. & Eng’g Ethics 1, 7–13 (2024). It is predicated on a reductionist worldview that sees complex problems flattened into engineering puzzles and neglects their multifaceted history and context.

This Article argues that not only are many fintech products themselves extremely techno-solutionist, but techno-solutionism is also impeding financial regulation’s ability to protect the public from fintech’s harms. Techno-solutionism is often evident in conversations about the financial applications of technologies like artificial intelligence (“AI”), blockchain, cloud computing, and application programming interfaces (“APIs”), which have been promoted as having the power to make the delivery of financial services more inclusive, more efficient, more competitive, and more secure. While there may be promise in some fintech business models, this Article explains why fintech’s ability to solve long-standing, complex problems is often oversold. This Article also explores how techno-solutionist fintech hype can distract from more meaningful solutions to long-standing problems and obscure fintech’s harms.

Fintech marketing has correctly identified many of the pain points in traditional finance, but these pain points are largely structural problems that cannot be addressed by tech-centric business models that disregard economic and political realities. In this regard, fintech solutions are emblematic of a broader techno-solutionist Silicon Valley worldview that disregards context—as Silicon Valley historian Margaret O’Mara describes it, “Why care about history when you were building the future?”2Margaret O’Mara, The Code: Silicon Valley and the Remaking of America 7 (2020). Unfortunately, despite the flimsiness of many fintech promises—and despite the harms that many fintech business models have inflicted on the public—techno-solutionist rhetoric about fintech’s potential has been stubbornly resilient. This rhetoric sets the scene for a “wait-and-see” legal environment designed to allow these technological solutions to flourish without regulatory intervention. This Article argues that such accommodative inaction is unacceptable, given how damaging financial harms (to individuals, and to the broader economy) can be, but unfortunately lawmakers and financial regulators have been encouraged to internalize a techno-solutionist perspective by the fintech businesses and venture capitalists who will profit from such accommodative legal treatment.

Techno-solutionism is not a purely private sector creation, however. Sometimes—whether through the expressive value of their words or the more concrete impacts of their action or inaction—lawmakers and financial regulators perpetuate the very techno-solutionism that will ultimately undermine their ability to protect the public from harm. If financial regulators are convinced or forced to get out of the way so that technological innovation can go ahead and fix things, then that will create a conducive environment for the fintech industry and its funders to arbitrage regulatory requirements and perhaps even harden that arbitrage into durable legal permissions (a strategy known as “regulatory entrepreneurship”).3Elizabeth Pollman & Jordan M. Barry, Regulatory Entrepreneurship, 90 S. Cal. L. Rev. 383, 385, 392–98 (2017). To illustrate these dynamics, this Article will examine examples of legislative proposals and administrative actions that highlight where techno-solutionism seems to be driving policy around fintech, as well as examples of pushback against techno-solutionism. This Article also examines nascent regulatory approaches to AI’s financial applications through this lens.

The primary aim of this Article is to identify and describe the problems that techno-solutionism creates for financial regulatory policy but that of course invites questions about what can be done to remedy the situation. Recognizing that techno-solutionism is a heuristic that probably will not be eliminated without an alternative, this Article argues that financial regulators and lawmakers should instead adopt a posture of contextually informed skepticism that draws on domain knowledge about what can go wrong in finance and is sensitive to the harms that fintech may cause. Of course, there are many structural impediments to such a shift in perspective and it will not be easily accomplished. Right now, the best that we can do may be to simply call out the phenomenon of techno-solutionism where we see it and, in doing so, rob it of some of its power.

The rest of this Article will proceed as follows: Part I will explore the concept of techno-solutionism, emphasizing its dangers for public policy as a general matter. Part I will also provide some insight into techno-solutionism’s relationship with the venture capital industry and with the law. Part II will look more specifically at fintech technologies and business models and expose the techno-solutionism inherent in fintech’s claims to improve financial inclusion, efficiency, competition, and security. Part III will explore the relationship between financial regulation and techno-solutionism, looking at legislative proposals and administrative actions relating to crypto and other fintech. Part III will also consider prospectively how techno-solutionism may impact regulation of the use of AI in financial services. Part IV suggests a posture of contextually informed skepticism as an alternative to techno-solutionism, before the final Part concludes.

I.  Techno-Solutionism

A.  What Is Techno-Solutionism?

In his 2023 Techno-Optimist Manifesto, leading venture capitalist Marc Andreessen stated his belief that “there is no material problem—whether created by nature or by technology—that cannot be solved with more technology.”4Marc Andreessen, The Techno-Optimist Manifesto, Andreessen Horowitz (Oct. 16, 2023), https://a16z.com/the-techno-optimist-manifesto [https://perma.cc/42BC-7JUN]. This techno-optimist sentiment has a long heritage: in his book American Technological Sublime, David Nye recounts that technological achievements, ranging from “the first railroads, suspension bridges, skyscrapers, city skylines” to “atomic explosions, and the rockets of the space program” have been central to the American national identity for centuries.5David E. Nye, American Technological Sublime 282 (1996). While it does not always get as much oxygen, criticism of techno-optimism is not a new phenomenon, either. Critiques of “techno-fixes” date back to the 1960s,6Sætra & Selinger, supra note 1, at 1. and interrogations of “innovation worship” and the “cult of innovation” can be found at least as far back as the 2000s.7See, e.g., Dan Saffer, The Cult of Innovation, Bloomberg (Mar. 5, 2007), https://www.bloomberg.com/news/articles/2007-03-04/the-cult-of-innovation [https://perma.cc/8HT5-LPXK].

In his 2013 book, To Save Everything, Click Here: The Folly of Technological Solutionism, Evgeny Morozov popularized the related critical term “technological solutionism.”8Evgeny Morozov, To Save Everything, Click Here: The Folly of Technological Solutionism 5 (2013). Morozov intends techno-solutionism as a pejorative, one that describes the tendency to “[r]ecast[] all complex social situations either as neatly defined problems with definite, computable solutions or as transparent and self-evident processes that can be easily optimized—if only the right algorithms are in place!”9Id. at 5. In their critique of fintech, Jones and Maynard, Jr. use the related term “technotopian.” Lindsay Sain Jones & Goldburn P. Maynard, Jr., Unfulfilled Promises of the FinTech Revolution, 111 Calif. L. Rev. 801, 804 (2023). Furthermore, Morozov considered techno-solutionist solutions to be “likely to have unexpected consequences that could eventually cause more damage than the problems they seek to address.”10Morozov, supra note 8, at 5.

While solutionism itself is nothing new—people have always sought easy solutions to complex problems—Morozov was particularly interested in the solutionism associated with that nebulous thing we call “the Internet.”11Id. at 17. Morozov argued that the internet allows solutionism to be scaled in a way that was never before possible—as he describes it: “the latest technologies make the fixes easier, cheaper, and harder to resist.”12Id. at xv. In recent years, internet technologies have been coupled with increased computing power, mass data storage capabilities, and automation to make technological solutions even more powerful, cheaper, and harder to resist than in 2013. Morozov’s concern—that the way we conceptualize social problems is skewed by our desire to solve them with increasingly fancy technological silver bullets—is only becoming more relevant.

Techno-solutionism is in many ways de-contextual: it fails to investigate the context of the problem at hand and starts instead with the technological tools available to fix things.13Malcolm Campbell-Verduyn & Marc Lenglet, Imaginary Failure: RegTech in Finance, 28 New Pol. Econ. 468, 471 (2023). This has also been described as an “isolationist approach to technology and technological change.” Henrik Skaug Sætra, Introduction: The Promise and Pitfalls of Techno-Solutionism, in Technology and Sustainable Development: The Promise and Pitfalls of Techno-Solutionism 1, 4 (Henrik Skaug Sætra ed., 2023). Much as too much reliance on mathematical models can cause us to focus on the risk that can be measured rather than the risk that matters,14For a discussion of the dangers of focusing financial models on the risks that can be measured rather than the risks that matter, see James Hackney, Regulating Through Financial Engineering: The Office of Financial Research and Pull of Models, 50 Loy. U. Chi. L.J. 695, 698–700, 703 (2019). techno-solutionism can flatten complex problems into just the elements that lend themselves to easy technological fixes, and ignore the rest.15“[T]he very availability of cheap and diverse digital fixes tells us what needs fixing.” Morozov, supra note 8, at xv. Reducing problems to their technological elements can be very seductive, particularly during times of political dysfunction when solving structural problems through democratic means seems nigh on impossible. But the resulting technological solutions are typically inadequate at best, harmful at worst, because they fail to reckon with both the complexity of the issues they purport to solve and their impacts

on people excluded from the technological development process.16Regarding the “fundamental mismatch between complex social issues and tech solutionism,” see Greta Byrum & Ruha Benjamin, Disrupting the Gospel of Tech Solutionism to Build Tech Justice, Stan. Soc. Innovation Rev. (June 16, 2022), https://ssir.org/articles/entry/disrupting_the_gospel_of_tech_solutionism_to_build_tech_justice [https://perma.cc/M7V8-WJ8S]. Sometimes, we will be better off without the proposed technological solution; at other times, the technological solution may have merit but will be effective only as part of a package of other structural reforms, and may require strong regulation.

As an ideology, techno-solutionism also tends to cast technological development as an inevitability,17Hearing on Oversight of A.I.: Legislating on Artificial Intelligence Before the Subcomm. on Priv., Tech., and the L. of the S. Comm. on the Judiciary, 118th Cong. 11–13 (2023) [hereinafter Hartzog Testimony] (Statement of Woodrow Hartzog, Professor of Law, Boston University). Cohen (disparagingly) describes this orientation as “[i]f innovation is autonomous, then what is produced is what should be produced. Regulators can only get in the way, and when they do we are all worse off, so they should not meddle.” Julie E. Cohen, Between Truth and Power: The Legal Constructions of Informational Capitalism 91 (2019). and those who seek a more textured understanding of problems and technologies as Luddites or cranks standing in the way of progress.18Cohen, supra note 17, at 105, 195. See also Morozov, supra note 8, at xiii, on techno-solutionism’s blunting of our ability to ask questions. As Section I.C will explore in more detail, a techno-solutionist orientation can be weaponized to inhibit regulation of a technology’s associated harms (in particular, the complexity of the underlying technology can be weaponized to deflect oversight and restraint). More subtly, technologies that overpromise but are incomplete solutions to complex structural problems can also be distractions, alleviating political pressure for solutions to the non-technological dimensions of problems.19Techno-solutionism does not envision “fundamental change to the long-existing regulatory perspectives,” and so distracts attention from other approaches to financial regulation. Campbell-Verduyn & Lenglet, supra note 13, at 473. As tech ethicist Elizabeth Renieris has put it, “Our imaginations and resources are once again diverted from fixing or rehabilitating what exists”20Elizabeth M. Renieris, Amid the Hype Over Web3, Informed Skepticism Is Critical, CIGI (Jan. 14, 2022), https://www.cigionline.org/articles/amid-the-hype-over-web3-informed-skepticism-is-critical [https://perma.cc/N94L-C99F].: when the technological solution is pitched as so exceptional, the slow plodding changes of structural reform seem less worthy by comparison.21“The use of technology to transform the lives of these individuals has particular allure when all other policy prescriptions have seemingly failed,” Christopher K. Odinet, Predatory Fintech and the Politics of Banking, 106 Iowa L. Rev. 1739, 1746 (2021); techno-solutionism “promises an affordable, if not cheap, silver bullet in a world with limited resources for tackling many pressing problems,” Selinger, supra note 1. This dynamic is sometimes evident, for example, in policy debates about climate change, where the promise of new technologies has sometimes undercut support for policies to reduce emissions.22Sætra, supra note 13, at 2.

While techno-solutionist solutions will rarely benefit society writ large, fighting techno-solutionism is an uphill battle. Not only is techno-solutionism highly profitable for Silicon Valley and not only does the law help entrench techno-solutionism (as the next Sections will explore), but our brains are also hardwired toward techno-solutionism to some extent. Humans have long sought easy solutions to complex problems,23Scholars have been engaging critically with different kinds of “solutionism” since at least the 1950s. Sætra & Selinger, supra note 1, at 7. “It feels good to believe that in a complicated world, tough challenges can be met easily and straightforwardly.” Selinger, supra note 1. and we are also susceptible to what are known as “automation biases”: tendencies to defer to technologically-generated outputs as more correct and legitimate than human judgments.24For a discussion of automation bias, see Linda J. Skitka, Kathleen Mosier & Mark D. Burdick, Accountability and Automation Bias, 52 Int. J. Hum.-Comput. Stud. 701, 701–05 (2000). If we perceive the output of technology to be inherently accurate and superior to anything a human could produce, we will be dissuaded from asking whether technology offers a true solution to the problem at hand.25“[T]echnological solutionism reinforces optimism about innovation—particularly the technocratic idea that engineering approaches problems to problem-solving are more effective than alternatives that have social and political dimensions.” Selinger, supra note 1.

Even critics of new technologies can fall into the trap of techno-solutionism. By critiquing the hype spun by the technology’s developers rather than critiquing the technology’s reality and limitations, they can unintentionally validate and amplify that hype in the process.26For a discussion of the phenomenon of “criti-hype,” see Lee Vinsel, You’re Doing It Wrong: Notes on Criticism and Technology Hype, Medium (Feb. 1, 2021), https://sts-news.medium.com/youre-doing-it-wrong-notes-on-criticism-and-technology-hype-18b08b4307e5 [https://perma.cc/4XW3-YY4W]. Critics can also entrench techno-solutionism by demanding that these developers fix the technology’s problems with more of their own technology, rather than demanding regulatory or other non-technological solutions.27For a discussion of this issue in the context of children’s online safety, see María P. Angel & danah boyd, Techno-Legal Solutionism: Regulating Children’s Online Safety in the United States, 2024 CS&Law 86, 91, https://dl.acm.org/doi/10.1145/3614407.3643705 [https://perma.cc/G8VU-K64N] (“Policymakers not only argue that social media platforms are the site of the problem; they also frame technology as the site of the fix. As KOSA’s Section 3 makes evident, their rationale appears to go as follows: if design features are the problem, requiring good design can make the harms go away.”).

Take, for example, new developments in AI. There will likely be a variety of harms associated with these developments—for example, some kinds of jobs may be eliminated, and the proliferation of phishing scams, misinformation, and discrimination are all likely to increase.28On AI discrimination, see generally Ziad Obermeyer, Brian Powers, Christine Vogeli & Sendhil Mullainathan, Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations, 366 Sci. 447 (2019). However, many leading figures in the AI industry (including OpenAI founder Sam Altman) have claimed potential harms on a much greater scale, co-signing a statement that reads, “Mitigating the risk of extinction from A.I. should be a global priority alongside other societal-scale risks such as pandemics and nuclear war.”29Kevin Roose, A.I. Poses ‘Risk of Extinction,’ Industry Leaders Warn, N.Y. Times (May 30, 2023) https://www.nytimes.com/2023/05/30/technology/ai-threat-warning.html [https://perma.cc/M6F3-LLZ9]. This invocation of AI-doomerism may be self-serving, however, if it is intended to distract lawmakers and regulators from AI’s near-term harms and to encourage them to put their faith in private sector technological solutions for heading off more cataclysmic potential harms.30As OpenAI CEO Sam Altman said in a Senate Committee hearing, “I think if this technology goes wrong, it can go quite wrong . . . We want to work with the government to prevent that from happening.” Id. It is critical, as the debate about regulating AI (and other technologies) progresses, that critics engage with technology’s present realities and not just its hype—even if that hype is apocalyptic in nature.31Selinger, supra note 1.

B.  Techno-Solutionism and Venture Capital

Techno-solutionism does not just flatten complex problems; it often flattens the concept of technology itself. If we believe that the only solution we need lies in the components of a machine or lines of software code, we miss the “relationship[] between them and people.”32Norman Balabanian, On the Presumed Neutrality of Technology, IEEE Tech. & Soc’y Mag., Winter 2006, at 15, 16. When conceptions of technology are stripped of the human agency involved in developing and using the technology, that gives technology an undeserved veneer of neutrality. It also leads to naïve assumptions that the same technology will have the same results regardless of the time and place in which it is deployed.33Morozov, supra note 8, at 260; Campbell-Verduyn & Lenglet, supra note 13, at 474; see also Meg Leta Jones, Does Technology Drive Law? The Dilemma of Technological Exceptionalism in Cyberlaw, 2018 U. Ill. J.L. Tech. & Pol’y 249, 251 (2018) (“[A] great deal of variation and messiness is found when looking at the same technology in different times and places.”). Such purported neutrality and universality are common talking points: we regularly hear statements like, “Technology is technology. It isn’t criminal. It has no motive. It’s not looking to make more money. It just balances accounts,”34Serj Korj (@SerjKorj), X (Mar. 11, 2023, 11:48 AM), https://twitter.com/SerjKorj/status/1634642595237208067 [https://perma.cc/RLY2-6RXZ] (quoting former U.S. Acting Comptroller of the Currency, Brian Brooks). and “technology is universalist. Technology doesn’t care about your ethnicity, race, religion, national origin, gender, sexuality, political views, height, weight, hair or lack thereof.”35Andreessen, supra note 4. But the reality is that technology is never neutral; it cannot exist or function separate and apart from the human beings who create and deploy it.36“Scholarship in science and technology studies has shown that new technologies do not have predetermined, neutral trajectories, but rather evolve in ways that reflect the particular, situated values and priorities of both their developers and their users.” Cohen, supra note 17, at 3; see also Paul Ohm & Jonathan Frankle, Desirable Inefficiency, 70 Fla. L. Rev. 777, 800 (2018).

Because the development of technology is not a neutral process, it is important to consider the incentives of those who develop and sell it. When technologies are developed by for-profit businesses, those businesses have strong incentives to develop those technologies in the way that will most benefit them financially (even if doing so could inflict harm on society).37For a discussion of misconduct by tech “unicorns” like Theranos, Uber, and Juul that detrimentally impacted non-investor third parties, see Matthew Wansley, Taming Unicorns, 97 Ind. L.J. 1203, 1215–24 (2022). Regarding the political and economic power that may be bound up in a technology, see Jones, supra note 33, at 257. See also Hartzog, supra note 17, at 8 (“[D]angerous, disruptive systems are being released on the world by for-profit companies with scant regard to the potential larger societal effects produced by these systems.”). Some have gone further to argue that the technological solutions produced by Silicon Valley are designed to thwart real solutions to structural problems: “After all, how could those occupying powerful positions in the tech industry—having directly benefited from the racist, sexist, and classist status quo—ever develop tools that would undo those very sources of power?” Byrum & Benjamin, supra note 16. Financial incentives will also impact how startup founders and their tech employees describe their technologies to others, including the venture capital (“VC”) firms they approach for funding.38“[C]omputer scientists and engineers are critical participants in propagating ideas about the nature, purposes, and social significance of their work.” Silvia Semenzin, ‘Blockchain for Good’: Exploring the Notion of Social Good Inside the Blockchain Scene, Big Data & Soc’y, July-December 2023, at 1, 2. VCs display significant herd behavior in choosing which “hot” technologies to fund,39Peter Lee, Enhancing the Innovative Capacity of Venture Capital, 24 Yale J.L. & Tech. 611, 616 (2022). with the result that founders trying to attract capital are likely to start by asking “how can we use [currently favored technology] to solve X?,” rather than “how can we best solve X?”40Molly White, Blockchain Solutionism (Lecture Transcript), Molly White (Sept. 21, 2022), https://blog.mollywhite.net/blockchain-solutionism-lecture [https://perma.cc/W2NG-2CGF].

Compensation for the VCs themselves will depend on the dollar amounts invested in their funds, and on the profits their funds generate by deploying those dollars to fund and then sell startups.41“The [limited partners] compensate the VCs in two ways: an annual management fee of 2% of the fund’s assets and ‘carried interest’ equal to 20% of the fund’s profits.” Matthew T. Wansley & Samuel N. Weinstein, Venture Predation, 48 J. Corp. L. 813, 832 (2023). In order to maximize their own compensation, VCs must therefore find (and develop a reputation for finding) startups that will grow exponentially in the five or six years before they must be sold in order to return profits to the fund’s investors.42Lee, supra note 39, at 668–69. Although venture capital (“VC”) funds typically have a term of ten or twelve years, “[v]etting and selling startups takes time, so VCs only have about five to six years between investment and exit for their startups to grow in value.” Wansley & Weinstein, supra note 41, at 832. For more on the pressures VC faces to exit investments, see Elizabeth Pollman, Startup Governance, 168 U. Penn. L. Rev. 155, 209–16 (2019). Venture capital is not a passive investment strategy: as Wansley and Weinstein put it, “[t]he most successful VCs . . . do not just try to find home runs—they try to build home runs.”43Wansley & Weinstein, supra note 41, at 833. VCs’ compensation therefore tends to depend on their ability to engineer exponential growth for their ventures—through managerial advice, certainly,44Elizabeth Pollman, Adventure Capital, 96 S. Cal. L. Rev. 1341, 1354 (2024). but also by manufacturing hype for industries,45See, e.g., Daren Matsuoka, Eddy Lazzarin, Robert Hackett & Stephanie Zinn, 2023 State of Crypto Report: Introducing the State of Crypto Index, a16zcrypto (Apr. 11, 2023), https://a16zcrypto.com/posts/article/state-of-crypto-report-2023 [https://perma.cc/CZ6E-C2UW]. For further discussion of Andreessen Horowitz’s efforts to hype the crypto industry, see Hilary J. Allen, Interest Rates, Venture Capital, and Financial Stability, U. Ill. L. Rev. (forthcoming 2025) (manuscript at 23–28), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4513037. lobbying,46See, e.g., Eric Lipton, Daisuke Wakabayashi & Ephrat Livni, Big Hires, Big Money and a D.C. Blitz: A Bold Plan to Dominate Crypto, N.Y. Times (Oct. 29, 2021) https://www.nytimes.com/2021/10/29/us/politics/andreessen-horowitz-lobbying-cryptocurrency.html [https://web.archive.org/web/20221226052114/https://www.nytimes.com/2021/10/29/us/politics/andreessen-horowitz-lobbying-cryptocurrency.html]. and engaging in predatory pricing.47Wansley & Weinstein, supra note 41, at 817.

In short, the technological solutions that receive VC funding will not necessarily be the best solutions. Often, society would benefit from more nuanced solutions that would involve non-technological elements and take a lot longer to develop than VCs and their investors would tolerate.48Mariana Mazzucato, The Entrepreneurial State: Debunking Public vs. Private Sector Myths 12 (2011). Furthermore, the VC industry is notoriously white and male, and notoriously funds founders with whom VCs have social connections49Lee, supra note 39, at 650–51.: this limits the perspectives brought to bear on how technology should solve problems, often excluding the possibility of public sector solutions as well as the voices of those who actually experience the problem in question.50Techno-solutionism can “shape our societies in ways unrooted in democratic processes and democratic will.” Sætra, supra note 13, at 6–7. Semenzin discusses “the prevailing cultural values of Silicon Valley, portraying society as classless and devoid of socioeconomic struggles, advocating the idea that technological markets, rather than government intervention, act as the catalyst for improving people’s lives.” Semenzin, supra note 38, at 12. Notwithstanding persistent claims that technological innovation exists to “make the world a better place,”51“Technological innovation in a market system is inherently philanthropic, by a 50:1 ratio.” Andreessen, supra note 4. Silicon Valley historian Margaret O’Mara has observed that “[t]he Valley’s engineering-dominated culture rewarded singular, near-maniacal focus on building great products and growing markets, and as a consequence often paid little attention to the rest of the world.”52O’Mara, supra note 2, at 7. And yet, a techno-solutionist perspective tends to assume that the solutions emerging from Silicon Valley, even if uninformed by domain expertise, are the superior ones.53“The techno-capital machine makes natural selection work for us in the realm of ideas. The best and most productive ideas win and are combined and generate even better ideas.” Andreessen, supra note 4.

This disregard for history and outside perspectives can lead to a disregard for non-technological dimensions of problems, as well as a disregard for technology’s harms. In the absence of any legal requirements to minimize those harms, there is no reason to think that they will be addressed by technologists or their VC funders.54Prominent AI ethicist Dr. Timnit Gebru, for example, has said, “Our recommendations basically say that before you put anything out, you have to understand what’s in your data set and document it thoroughly . . . . But at the end of the day this means taking more time, spending more resources and making less money. Who’s going to do that without legislation?” Emily Bobrow, Timnit Gebru Is Calling Attention to the Pitfalls of AI, Wall St. J. (Feb. 24, 2023) https://www.wsj.com/articles/timnit-gebru-is-calling-attention-to-the-pitfalls-of-ai-8e658a58 [https://web.archive.org/web/20230329183721/https://www.wsj.com/articles/timnit-gebru-is-calling-attention-to-the-pitfalls-of-ai-8e658a58?cx_testId=3&cx_testVariant=cx_170&cx_artPos=7&mod=WTRN]. And yet a techno-solutionist perspective tends to assume that subsequent technological interventions will inevitably fix any problems technology creates, without the need for any government interference.55Jodi L. Short, Reuel Schiller, Susan S. Silbey, Noah Jones, Babak Hemmatian & Leeanna Bowman-Carpio, The Dog That Didn’t Bark: Looking for Techno-Libertarian Ideology in a Decade of Public Discourse About Big Tech Regulation, 19 Ohio St. Tech. L.J. 1, 10 (2022); Andreessen, supra note 4. Indeed, techno-solutionism is often weaponized to discourage government oversight, as the next Section will explore.

C.  Techno-Solutionism and the Law

Technological advances may challenge laws but they do not in and of themselves drive changes in the law—people do.56Jones, supra note 33, at 253. The ways in which people like legislators, regulators, and judges respond to technological advances change how law is applied and developed, and the phenomenon of techno-solutionism can drive law if it impacts these individuals and their responses. Laws and legal institutions that are influenced by techno-solutionism can also nurture and entrench techno-solutionism in a vicious cycle. While a comprehensive discussion of the relationship between techno-solutionism and the law is beyond the scope of this Article, this Section will provide an overview of some of the ways in which the law helps perpetuate the very techno-solutionism that can ultimately co-opt and stymie the law’s harm protection functions.

  1. How Law Perpetuates Techno-Solutionism

The starting point here is to recognize that no technology business is built in a vacuum. Any business is built in an environment constructed by laws, and the laws themselves have been impacted by currents of economic and political power.57Cohen, supra note 17, at 1. Laws and legal institutions engage with technology-based business models from the beginning,58“Not only does law not linearly follow technology, a great deal of legal work shapes technology and the way in which it will be understood in the future.” Jones, supra note 33, at 278; see also Hilary J. Allen, Regulatory Sandboxes, 87 Geo. Wash. L. Rev. 579, 587–88 (2019). and those laws and legal institutions have been “enlisted to help produce the profound economic and sociotechnical transformations that we see all around us.”59Cohen, supra note 17, at 2. If citizens concerned about public harms cede the legal sphere to businesses with vested interests in structures that insulate them from the consequences of perpetrating harms, then the ability of the law to protect the public from harm will be further eroded.60Id. at 9. This is a pervasive political economy problem, but it will be exacerbated by techno-solutionism if public-minded citizens cede their ground because those who stand to profit also have intimidating technological bona fides.

The influence of techno-solutionism can shape laws in ways that can maximize industry profitability at the expense of the public interest. We often hear that technologies can “solve all of our most pressing problems—if only the law, which cannot move at the speed of human thought, will stop undermining technology’s potential and either get with the program or get out of the way.”61Id. at 1. As Jodi Short and her colleagues have observed, “no industry has been more zealous in crafting and championing a regulatory ideology than the tech sector,”62Short et al., supra note 55, at 4. but this regulatory ideology is not a purely private sector creation. Lawmakers and the law have helped perpetuate it.

Many lawmakers helped perpetuate this kind of regulatory ideology in the early years of the internet; for example, Anupam Chander describes Congress, courts, and the Presidential Administration all eagerly checking one another “when they proved less than friendly to Internet innovation.”63Anupam Chander, How Law Made Silicon Valley, 63 Emory L.J. 639, 649 (2014). In many ways, this trend continues today, with lawmakers often responding to technological innovations (if they respond at all) with “half-measures” that are designed to allow the underlying technology to flourish without fully addressing the attendant harms.64Hartzog Testimony, supra note 17, at 1. Support for such half-measures stems in part from understandings of technological innovation as so exceptional that the law should not interfere in the same way it would in other spheres—but technological exceptionalism is ultimately in the eye of the beholder. As Meg Jones puts it, “[n]ew technologies’ distinctions from legacy technologies are as political as they are technical. Novelty is constructed and as construction is performed, the method and politics of this interpretation should not be overlooked.”65Jones, supra note 33, at 256. When lawmakers craft bespoke legal and regulatory regimes for technological solutions, they are communicating their view that those technological solutions are indeed exceptional—superior to other types of solutions that receive no such special legal treatment.

An important point to note here is that law can have a messaging or expressive valence: it “creates a public set of meanings and shared understandings between the state and the public. It clarifies, and draws attention to, the behavior it prohibits. Law’s expressed meaning serves mutually reinforcing purposes. Law educates the public about what is socially harmful.”66Danielle Keats Citron, Law’s Expressive Value in Combating Cyber Gender Harassment, 108 Mich. L. Rev. 373, 407 (2009). While the expressive function of the law is most often discussed in terms of what it prohibits, permissive laws may also change public attitudes about what should not be considered socially harmful—and change behavior accordingly.67“[R]egulators may help generate norms around which market practices may coalesce.” Onnig H. Dombalagian, The Expressive Synergies of the Volcker Rule, 54 B.C. L. Rev. 469, 500 (2013). The literature on expressive laws focuses on the law’s ability to standardize norms,68Id. at 493. and the law can perform a particularly potent standardizing function at a time when a technologically-enabled practice is new and the public is looking for guidance as to what to think about that practice.69Citron, supra note 66, at 410. As a result, laws and rules that emphasize the benefits of a technology and related business models and deprioritize their harms can have a normative consequence in addition to their direct impact, lending legitimacy and encouraging adoption. Once public adoption has been encouraged, it will be all the harder for lawmakers to take protective steps that have the practical impact of limiting public access to, or increasing the cost of, a technology-based business model.70See Arthur E. Wilmarth Jr., Citigroup: A Case Study in Managerial and Regulatory Failures, 47 Ind. L. Rev. 69, 73–74 (2014).

Regulators are often the lawmakers who are on the frontlines of dealing with new technologies.71The judiciary is also often on the front lines, but that is beyond the scope of this Article. While some regulators proactively seek to address problems or harms associated with new technologies, others propose new regulatory structures or dispense waivers that effectively get law out of the way—or simply accommodate the new technologies through their inaction.72Chander describes this dynamic in a more positive fashion, noting that Silicon Valley’s success can be attributed in part to “U.S. authorities (but not those in other technologically advanced states) act[ing] with deliberation to encourage new Internet enterprises by both reducing the legal risks they faced and largely refraining from regulating the new risks they introduced.” Chander, supra note 63, at 645. In a way, these latter approaches are institutionalized versions of Jonathan Zittrain’s procrastination principle: “a propensity to ‘set it and forget it’ without attempting to predict and avert every imaginable problem,” on the assumption that technological advances will be able to fix any problems that do ultimately arise.73Jonathan Zittrain, Fixing the Internet, 362 Sci. Mag. 871, 871 (2018). On the presumed ability of technology to fix its own problems, see Short et al., supra note 55, at 10. When regulators take these accommodative approaches, though, they reinforce the perception that law cannot keep up with technological progress (sometimes referred to as the “pacing problem”),74Jones, supra note 33, at 256. and therefore should yield to technological solutions.

Once something does go wrong and Congress and the public demand a response, regulators will find that their own delays with regard to regulating new technologies have made it harder for them to take action. For example, if technological fixes are needed (for example, to “hardwire principles and values . . . such that violating them is impossible or nearly impossible”),75Raúl Carillo, Seeing Through Money: Democracy, Data Governance, and the Digital Dollar, 57 Ga. L. Rev. 1207, 1238 (2023). regulators will already have forfeited their opportunity to impact the design process. If technological changes are insufficient and regulatory interventions need to take the form of stronger regulation (for example, a preapproval regime),76In a discussion of social media regulation, danah boyd criticizes as overly simplistic the rationale that “if design features are the problem, requiring good design can make the harms go away.” Angel & boyd, supra note 27, at 91. Regarding preapproval regimes in the financial regulatory context, see generally Saule T. Omarova, License to Deal: Mandatory Approval of Complex Financial Products, 90 Wash. U. L. Rev. 63 (2012). implementation also becomes far more challenging once an ecosystem of vested interests has evolved that is resistant to any change. In short, accommodative regulatory approaches can entrench the mistaken notion that regulators have no option other than to wait and see—that the tech genie cannot be put back in the bottle—which can then thwart subsequent regulatory efforts.

Laws can also put a techno-solutionist thumb on the scale in allocating responsibilities among private parties.77Cohen, supra note 17, at 90. In an article titled How Law Made Silicon Valley, Chander argues that:

Silicon Valley’s success in the Internet era has been due to key substantive reforms to American copyright and tort law that dramatically reduced the risks faced by Silicon Valley’s new breed of global traders. Specifically, legal innovations in the 1990s that reduced liability concerns for Internet intermediaries, coupled with low privacy protections, created a legal ecosystem that proved fertile for the new enterprises of what came to be known as Web 2.0.78Chander, supra note 63.

More recently, technology-based businesses have also proactively wielded trade secrecy laws to avoid public scrutiny.79Carillo, supra note 75, at 1230. The result has already been “a constellation of powerful de jure and de facto legal immunities that insulate their architects and operators from accountability for a wide and growing variety of harms.”80Cohen, supra note 17, at 10. Certainly, such a faciliatory approach has helped technological innovation flourish, but context matters (notwithstanding that techno-solutionism encourages us to ignore that context). If the attendant harms of technological innovation are seemingly minor, then an accommodative or faciliatory approach may make sense; such an approach is less justifiable when the associated harms are significant. But by insulating technology’s harms from legal scrutiny, such legal structures shift public attention away from the harms, entrenching techno-solutionist perspectives that focus only on technology’s positives.

Public actions have also perpetuated techno-solutionism by helping to fund Silicon Valley. While the mythology of Silicon Valley tells of innovation born of self-made visionaries, governmental bodies have in fact created significant subsidies for the VC industry, which (together with the liability shields and intellectual property protections already discussed) have allowed Silicon Valley and its techno-solutionism to flourish.81On the mythology and reality of Silicon Valley, see O’Mara, supra note 2, at 5–7. As Peter Lee points out, “[t]he federal government played a critical role in catalyzing the VC industry by funding technologies that attracted private investment.”82Lee, supra note 39, at 627. State legislatures also created the type of business entity known as the limited partnership, allowing limited liability protection for investors while still preserving favorable capital gains taxation associated with traditional unlimited liability partnerships—the VC industry has embraced this type of business entity, and its industry associations have aggressively lobbied over the years to lower capital gains taxation rates.83Id. at 629. The VC industry has also benefitted from other types of favorable tax treatment, outright subsidies, and pension fund regulation that permits such funds to invest in VC84Id. at 629–31. (institutional investment was a particular boon to the VC industry during the prolonged period of low interest rates that ran from the Global Financial Crisis until 2022—interest rate setting can also function as a type of VC subsidy).85Richard Waters, Venture Capital’s Silent Crash: When the Tech Boom Met Reality, Fin. Times (July 31, 2022) https://www.ft.com/content/6395df7e-1bab-4ea1-a7ea-afaa71354fa0 [https://perma.cc/3SFE-TAEW]. See generally Allen, supra note 45.

To be clear, providing incentives and subsidies for private sector innovation will often be good public policy. If public authorities remain mindful of potential harms and deploy incentives and subsidies as part of a portfolio strategy that also considers where direct public investment might be more effective, such an approach is likely to broadly benefit society. Unfortunately, the political landscape in the United States has evolved in such a way that the deck is often stacked against pursuing public sector solutions: Mazzucato attributes this in part to “the emergence of ‘new public management’ theory, which grew out of ‘public choice’ theory in the 1980s,” and “led civil servants to believe that they should take up as little space as possible, fearing that government failures may be even worse than market failures.”86Mazzucato, supra note 48, at xxiii. How to encourage public innovation is an important topic, but it is beyond the scope of this Article. What is relevant to this Article is that the flip side of timidity with regard to public innovation can manifest as credulousness with respect to private sector technological solutions and undeserved acceptance of their harms. While such credulousness is often unwarranted—particularly when the problem that needs solving would never truly be attempted by the private sector because solving it will take too long and primarily generate public goods that venture capitalists cannot profit from87Id. at 12.—the law has helped build this credulousness with its subsidies and waivers for private sector technological innovation.

  1. How Law Can Be Stymied by Techno-Solutionism

Law can therefore help perpetuate techno-solutionism—and then find its harm protection functions stymied by it. We regularly hear that existing law is becoming outdated, that the legislative process is too slow to keep up with the pace of technological change, and that the administrative state is becoming obsolete as regulators of specific industries (for example, banks) can no longer comprehend how those industries carry out their functions in a technologically advanced world. These are sometimes real concerns, but they are sometimes overstated and weaponized by those who would rather not have the existing rules applied to them—even when those rules continue to be fit for purpose. As Julie Cohen puts it, the relationship between technology and law is often framed as “what happens when an irresistible force meets an immovable object.”88Cohen, supra note 17, at 1. If lawmakers accept this framing, they will internalize the position that innovation and legal protections are in tension89Id. at 91. and might undermine legal protections so as to not be the immovable object which impedes technological development. The previous Section helped explain how the law can bolster the narrative that technology is an irresistible force; this Section will give an overview of cognitive capture, regulatory arbitrage, and regulatory entrepreneurship—three interrelated dynamics that techno-solutionists can weaponize to undermine existing applicable laws.

There is a classic techno-solutionist narrative that the industry often deploys when confronted with regulation: “[L]auding tech’s benefits, suggesting that government regulation will kill innovation, and advocating for technology-enabled self-regulation instead.”90Short et al., supra note 55, at 18. This kind of narrative suggests that real and present harms should be disregarded in the face of (often unsubstantiated) excitement about potential benefits.91“[E]xploring a technology’s potential should go beyond its upsides, since there are both existing risks and drawbacks as well as future ones if the sector continues to grow.” Tonantzin Carmona, Debunking the Narratives About Crypto and Financial Inclusion, Brookings (Oct. 26, 2022), https://www.brookings.edu/research/debunking-the-narratives-about-cryptocurrency-and-financial-inclusion [https://perma.cc/5W2Y-9AQK]. Repetition of this narrative can help generate “cognitive capture” that discourages regulators from standing in the way of technological innovation.92“Powerful information-economy actors have worked to craft narratives that make unaccountability for certain types of information harms seem logical, inevitable, and right.” Cohen, supra note 17, at 89. The concept of “cognitive capture” is often distinguished from the more venal forms of regulatory capture prevalent in public choice literature; in both instances, regulators come to prioritize the interests of industry over the public, but cognitive capture arises not because of bribes or other hopes of aggrandizement, but because regulators genuinely come to see the world the way industry does.93Willem H. Buiter, Central Banks and Financial Crises, in Federal Reserve Bank of Kansas City Symposium 495, 601–02 (2008). If that happens, then public and industry interest may appear synonymous to regulators.

Movements to portray government as ineffective have already helped convince many regulators that they have limited capacity to restrain harms, and that they should be afraid of impeding important progress by the private sector.94Jodi L. Short, Regulatory Managerialism as Gaslighting Government, 86 L. & Contemp. Probs. 1, 5 (2023) (“Civil servants have internalized attacks on them in ways that are at best demoralizing and at worst debilitating.”). When it comes to technology, regulators are aware that their actions can impact how technology develops, and they may come to feel that actions which could deprive the public of a particular technological innovation are a public disservice (even if there are harms associated with that technological innovation, and even as the general public evinces growing concerns about the power of Big Tech).95“The utopian narratives that big tech companies (and their lobbyists) tell about themselves do not seem to have captured the public’s imagination.” Short et al., supra note 55, at 5. Technology philosopher Evan Selinger has described how “[s]olutionism is a crucial component of how Big Tech sells its visions of innovation to the public and investors,”96Selinger, supra note 1. but solutionism is also a crucial component of how technological innovation is “sold” to regulators.

Cognitive capture is built in part through relationships,97James Kwak, Cultural Capital and the Financial Crisis, in Preventing Regulatory Capture: Special Interest Influence and How to Limit It 71, 80 (Daniel Carpenter & David A. Moss eds., 2014). and the subsidies and regulatory waivers discussed in the previous Section have helped VC firms to prosper sufficiently to ensure their access to regulators, enabling them to reinforce the techno-solutionist tendencies that benefit them. Cognitive capture can be particularly insidious when regulators are dependent on industry for information about how a technology works, because then regulators’ understanding will have been filtered through and permeated by industry’s perspectives on its creations.98“[I]nputs [from powerful actors] function as information subsidies, supplying policymakers who have limited resources of their own with ready access to a trove of facts, anecdotes, theories, and narrative frameworks from which to draw.” Cohen, supra note 17, at 104. There is also a status aspect to cognitive capture, where “[r]egulators are more likely to adopt positions advanced by people whom they perceive to be of higher status in social, economic, intellectual, or other terms.”99Kwak, supra note 97, at 80. With Silicon Valley’s successes has come an “an almost mythic reputation for meritocracy, innovation, and long-term value creation,” the “political valence” of which can sometimes be hard for regulators to resist.100Lee, supra note 39, at 620.

Such status concerns can be particularly pernicious if they result in regulators (particularly regulators of industries that were not traditionally technologized) undervaluing their own expertise—notwithstanding that their domain knowledge typically far exceeds that of the technologists developing solutions for that domain.101See supra notes 50–53 and accompanying text. In an “Emperor’s New Clothes” type scenario, regulators may feel too intimidated to ask preliminary questions about whether their industry’s problems can, in fact, be solved with the technological tools at hand (or indeed, by technological tools at all). Or regulators might be discouraged from asking questions about the domain-specific harms that technology could inflict. As Jones puts it, “[s]ometimes, a technology is so innovative, we are told that it cannot be proactively regulated, for how are policymakers to understand its technical complexities or know its potential.”102Jones, supra note 33, at 250. If regulators buy into this techno-solutionism, they are likely to adopt a posture of accommodative inaction: viewing even technological solutions that are at best band-aids as plausible solutions that they don’t want to stifle—even if those solutions pose significant social harms.

This environment of techno-solutionist cognitive capture is a highly fertile one in which to deploy strategies of regulatory arbitrage and entrepreneurship. “Regulatory arbitrage” describes industry strategies for exploiting gaps and differences in legal treatment—perhaps by performing activities that are prohibited in one jurisdiction in a more friendly jurisdiction, or by achieving the same outcome as a regulated activity but doing so in a way that was not clearly contemplated by existing regulatory regimes.103For a discussion of regulatory arbitrage, see Elizabeth Pollman, Tech, Regulatory Arbitrage, and Limits, 20. Eur. Bus. Org. L. Rev. 567, 571 (2019). Techno-solutionist narratives can facilitate arbitrage in the latter context, by suggesting that the technology is so novel and so free that it simply cannot be regulated in the same way as existing modes of performing the relevant activities.104Short et al., supra note 55, at 8. If regulators wish to respond to such regulatory arbitrage with new regulations, technological exceptionalism may tempt them to create rules that are very specifically tied to the technology in question—but when regulation is made too specific to a particular technology, it can be very easy for industry to evade that regulation by making small technological tweaks.

Businesses built on regulatory arbitrage may seek to “harden” that arbitrage into a durable legal permission through strategies of regulatory entrepreneurship. As used by legal scholars Elizabeth Pollman and Jordan Barry, the term “regulatory entrepreneurship” is most notably associated with the ride-hailing platform Uber, and refers to a growth strategy utilized particularly by VC-funded enterprises that involves “pursuing a line of business in which changing the law is a significant part of the business plan” even when it can “lead to negative consequences when companies’ interests diverge from the public interest.”105Pollman & Barry, supra note 3, at 383–84. Pollman and Barry have identified

three creative techniques that modern regulatory entrepreneurs have adopted in various combinations: They break the law and take advantage of legal gray areas, real or imagined, asking forgiveness instead of permission. They seek to grow ‘too big to ban’ before regulators can act, sometimes referred to as ‘guerilla growth.’ Perhaps most dramatic, they mobilize their users and stakeholders as a political force.106Id. at 390.

In other words, regulatory entrepreneurs engage in regulatory arbitrage or outright non-compliance until their businesses have become so large and established that they can paint legal changes permanently authorizing their activities as an inevitable necessity—notwithstanding that the business’s public harms will go unchecked as a result.

While the strategy of regulatory entrepreneurship is not exclusive to technology-based businesses,107For example, one could characterize Citigroup’s 1998 acquisition of Traveler’s Insurance—in an (ultimately successful) attempt to end Glass-Steagall’s prohibitions on certain kinds of financial institution affiliations—as regulatory entrepreneurship. For background on this event, see Wilmarth Jr., supra note 70, at 73–74. it is most commonly associated with VC-funded startups.108Pollman & Barry, supra note 3, at 424. Part of the explanation for this lies in the asymmetric incentive structures of VC funders, who face little legal liability for encouraging their portfolio companies to break the law but stand to capture a significant part of any upside from regulatory entrepreneurship strategies.109Allen, supra note 45, at 26. But it is also true that regulatory entrepreneurship is enabled by techno-solutionist narratives that make it particularly difficult for lawmakers and regulators to proactively rein in tech-related legal breaches. Regulatory entrepreneurship capitalizes on the pacing problem, seeking to grow “too big to ban” before the law catches up. But it is not inevitable that the law will fall hopelessly behind technological development. Ultimately, refusing to apply the law to a technology until after it is fully developed and entrenched—and then crafting accommodative laws that treat the extant incarnation of technology-based business models as inevitable—is a choice. That choice, which can stymie the harm-reduction functions of law, is often encouraged by cognitive capture, donations, and lobbying, all of which are part of the regulatory entrepreneurship playbook.110As Pollman and Barry observe,

The regulatory entrepreneur may push social policy away from the optimal outcome. The most direct way this can happen is when the regulatory entrepreneur’s business is built on reversing an efficient regulatory regime. When regulatory entrepreneurs change the law through quiet lobbying, without popular support, their behavior is consistent with a story of regulatory capture or rent-seeking and can produce all of the same negative consequences.

Pollman & Barry, supra note 3, at 443.

II.  Fintech and Techno-Solutionism

The previous Part spoke about techno-solutionism generally; the rest of this Article will focus more specifically on techno-solutionism as it relates to fintech. Because “finance is at the heart of the economy; is social and political; and is composed of non-stationary relationships that exhibit secular change,”111John C. Coates IV, Cost-Benefit Analysis of Financial Regulation: Case Studies and Implications, 124 Yale L.J. 882, 1003 (2015). it should be obvious (but sadly often is not) that solutions that neglect the social and political dimensions of financial problems will be inadequate. When technology is presented as the whole solution to a financial problem, then the best-case scenario will be that it fails to live up to its promises. Worst-case scenarios will arise if the shiny promises of the technology distract us from interrogating the downsides of business models that use that technology or distract us from addressing the root causes of the problem that is purportedly being solved.

In order to critique fintech’s techno-solutionism, we need a framework for thinking about what might need “solving” in finance in the first place. In many ways, the list of potential improvements to financial services and the financial system is infinite, but it is conceptually helpful to start by identifying what finance is supposed to do—at a high level—in order to consider how it could do it better. In the book Principles of Financial Regulation, John Armour and his colleagues identify the following as the key socially beneficial functions of the financial system: facilitating payments; mobilizing capital; selecting projects and monitoring their performance; and managing risk.112John Armour, Dan Awrey, Paul Davies, Luca Enriques, Jeffrey N. Gordon, Colin Mayer & Jennifer Payne, Principles of Financial Regulation 22–23 (2016). These can be collapsed further into three broad categories of functions: transaction processing, capital intermediation, and risk management.113Hilary J. Allen, Driverless Finance: Fintech’s Impact on Financial Stability 14 (2022). If the financial system is not performing these functions inclusively, efficiently, competitively, or securely, there may be a problem that needs to be fixed.

Of course, going back to first principles, we sometimes rely on the private sector financial industry to perform functions that it is ill-equipped to perform; public sector alternatives will often be needed to ensure reasonably-priced and widely-available transaction processing, capital intermediation, and risk management services.114As Adam Levitin notes,

The problem is that the market, left to its own devices, will not produce the desired policy outcome of fair and widely available services absent some form of subsidization. To the extent there is a failure here, then, it is a failure of government to intervene when the market fails to produce the desired policy outcome.

Adam J. Levitin, The Financial Inclusion Trilemma, 41 Yale J. on Regul. 109, 113 (2024). For proposals, see id. at 158–63; Mehrsa Baradaran, Banking on Democracy, 98 Wash. U. L. Rev. 353, 358–59 (2020).
Still, these three goals reflect general understandings of what the private sector financial system is supposed to achieve, and fintech technologies and business models are typically marketed as improving the delivery of these goals. Transaction processing (particularly payments processing) lends itself most obviously to technological improvement, but fintech entrepreneurs have also sought to improve capital intermediation (for example, with fintech lending and algorithmic trading business models) and risk management (for example, with AI-driven robo-advisory services).115Allen, supra note 113, at 83–86 (regarding fintech lending), 86–89 (regarding algorithmic trading), 66–69 (regarding robo-advisory services).

These disparate services all count as fintech. “Fintech” is not really a unified term, and it can be used to describe an assortment of different kinds of firms, technologies, and business models.116Id. at 8. This Article will focus less on fintech as firms and more on the underlying fintech technologies and business models that rely on them. Morozov focused his critique of techno-solutionism on “the Internet,”117Morosov, supra note 8, at 14. but when it comes to fintech, techno-solutionism also extends to other digital technologies like cloud computing, AI, blockchain, and APIs.118Allen, supra note 113, at 11. These technologies are diverse in many ways, but because they are accessed through the Internet, they can all reach significant scale.119Capacity for scaling is not unlimited, though, see infra note 210 and accompanying text. They also tend to rely on Big Data and often share the capacity for automation.120Yesha Yadav, Fintech and International Financial Regulation, 53 Vand. J. Transnat’l L. 1109, 1112 (2020).

Notably, fintech technologies and business models are not the exclusive province of new fintech firms, but have found their way into traditional financial institutions as well.121Chris Brummer & Yesha Yadav, Fintech and the Innovation Trilemma, 107 Geo. L.J. 235, 277 (2019). There are many different drivers of the adoption of these technologies and business models, but it is likely that some of the adoption is being driven by supply-side incentives to profit from the “next new thing,”122Dan Awrey, Complexity, Innovation, and the Regulation of Modern Financial Markets, 2 Harv. Bus. L. Rev. 235, 263–67 (2012). and it is also possible that some adoption is being driven by FOMO (“fear of missing out” on new tech trends).123Ina Bansal, Are Banks Facing FinTech ‘FOMO’?, LinkedIn (Mar. 18, 2016), https://www.linkedin.com/pulse/banks-facing-fin-tech-fomo-ina-bansal [https://perma.cc/429Q-JG5W]. The more commonly articulated narratives around fintech adoption, though, are desires to improve financial inclusion, efficiency, competition, and security.124See infra Sections II.A, B, C, and D. Regarding inclusion specifically, see Baradaran, supra note 114, at 356 (“The language of fintech as financial inclusion is so widespread that one could be forgiven for assuming that increasing access to credit were the sole aim of these companies.”). This Part will evaluate these narratives with a skeptical eye and conclude that while fintech may sometimes form part of the solutions we need, technology cannot provide the entire solution.

A.  Financial Inclusion

As noted above, the financial system provides critical payments and other transaction processing services. Everyday people benefit from these services, and they also benefit from the mobilization of capital: both as savers and investors who profit from returns, and as recipients of credit. Building wealth and diversifying investments can also help people manage the financial risks they may face in their lives. People who are excluded from traditional financial services can be charged significant premiums for transacting, locked out of full participation in the economy, and denied opportunities to manage their financial risks and build wealth.125Levitin, supra note 114, at 117–18, 120–21. Improving access (which is often referred to as “financial inclusion”) is therefore viewed as a critically important social goal.126Id. at 119. See also Baradaran, supra note 114, at 364–82, 399, which advocates for pushing back against the current conceptualization of financial inclusion. However, improving financial inclusion requires an understanding of the reasons why people are currently excluded, and the consequences of that exclusion. These are textured and context-specific, and once we start looking at the relevant context, it soon becomes clear that technology alone cannot solve financial inclusion problems. Unfortunately, though, fintech’s hype can undermine support for the kinds of public-driven solutions (including “hard service mandates, public provision, or taxpayer subsidies”) that could actually improve financial inclusion.127Levitin, supra note 114, at 114, 145.

Whether adults have a bank account or not is often used as a proxy for gauging the level of financial inclusion in a particular country. Research by the World Bank indicates that account ownership often varies by age, by level of education, and by gender (among other things), suggesting that there are structural explanations for financial exclusion.128Asli Demirgüç-Kunt, Leora Klapper, Dorothe Singer & Saniya Ansar, The Global Findex Database 2021: Financial Inclusion, Digital Payments, and Resilience in the Age of COVID-19, World Bank Grp. (2022), https://www.worldbank.org/en/publication/globalfindex/Report [https://perma.cc/8NHC-T3EX]. These structural explanations will vary significantly from place to place,129Jones, supra note 33, at 251. and so visions of universally applicable solutions to global financial inclusion will inevitably prove overly simplistic. This Article will focus more narrowly on fintech’s aspirations to improve financial inclusion within the United States (although we should not ignore the rest of the world: Silicon Valley-funded firms often try out their new tech solutions on populations in developing countries who lack the regulatory protections available in the United States).130For more background, see Olivier Jutel, Blockchain Financialization, Neo-Colonialism, and Binance, 6 Frontiers in Blockchain 2023, at 03 (July 27, 2023); Eileen Guo & Adi Renaldi, Deception, Exploited Workers, and Cash Handouts: How Worldcoin Recruited Its First Half a Million Test Users, MIT Tech. Rev. (Apr. 6, 2022), https://www.technologyreview.com/2022/04/06/1048981/worldcoin-cryptocurrency-biometrics-web3 [https://perma.cc/9JCW-NMQN]; Peter Howson, The Crypto Colonists, in Let Them Eat Crypto: The Blockchain Scam That’s Ruining the World (2023).

There is a striking racial dimension to financial inclusion problems in America.131For examples of scholarly work articulating the persistent structural discrimination that has driven disparate financial situations along racial lines, see Jones & Maynard, Jr., supra note 9; Darrick Hamilton & William Darity, Jr., The Political Economy of Education, Financial Literacy, and the Racial Wealth Gap, 99 Fed. Rsrv. Bank St. Louis Rev. 59, 60 (2017). See generally Mehrsa Baradaran, Jim Crow Credit, 9 U.C. Irvine L. Rev. 887 (2019). A 2021 survey found that while 4.5% of U.S. households overall were “unbanked” (in the sense that “no one in the household had a checking or savings account at a bank or credit union”),132Federal Deposit Insurance Corporation, 2021 FDIC National Survey of Unbanked and Underbanked Households Executive Summary 1 (2022) [hereinafter FDIC Survey], https://www.fdic.gov/analysis/household-survey/2021execsum.pdf [https://perma.cc/57Y3-NMTB]. “[d]ifferences in unbanked rates between Black and White households and between Hispanic and White households in 2021 were present at every income level.”133Id. at 2. As Adam Levitin puts it, “[n]early one in nine Black households and one in eleven Hispanic households lacks a bank account, and nearly one in four Black and Hispanic households are underbanked” (meaning they have bank accounts but still rely on alternative providers like check cashers or payday lenders).134Levitin, supra note 114, at 111. Many who are unbanked or underbanked identify the primary reason as either insufficient wealth to meet minimum balance requirements or lack of trust in banks.135FDIC Survey, supra note 132, at 2.

Fintech services are regularly depicted as a solution to both this lack of trust and underserved populations’ need for reasonably priced financial services: claims to “democratize finance” and “[b]ank the [u]nbanked” abound.136See, e.g., Circle, Serving the Unbanked with USDC, https://www.circle.com/en/stories/serving-the-unbanked-with-usdc [https://perma.cc/BTR2-XTC5] (“How USDC Can Help Bank the Unbanked”); Robinhood, About Us, https://robinhood.com/us/en/about-us [https://perma.cc/6NKK-9NQ9] (“We’re on a mission to democratize finance for all”). “A commonly held belief in the world of finance is that what stands between the current landscape of financial exclusion to full financial inclusion is the right technology or innovation.” Baradaran, supra note 114, at 356. Ultimately, though, technology is not a response to the lack of wealth and trust that creates racial disparities in financial inclusion in the United States. Black Americans in particular tend to distrust traditional financial institutions, often with good historical reason.137Jones & Maynard, Jr., supra note 9, at 822–24. Instead of doing the hard work of repairing that relationship, a techno-solutionist approach to financial inclusion allows new entrants to exploit that lack of distrust, often with even more exploitative results.138See supra notes 156–59 and accompanying text.

While traditional financial institutions have a very mixed track record with regard to underserved populations,139For a discussion of this history, see Mehrsa Baradaran, How the Other Half Banks: Exclusion, Exploitation, and the Threat to Democracy 138–62 (2015). they are at least subject to regulations designed to protect consumers and investors. Fintech business models, however, are often designed to skirt these regulations, often leaving their users (once again) with second-best, more exploitative financial services. Fintech proponents may hope that it will help “close the racial wealth gap,” but the reality is often a markedly less rosy form of predatory inclusion (similar to prior innovations like payday loans and subprime mortgages).140Predatory inclusion “refers to marginalized communities gaining access to goods, services, or opportunities that they were historically excluded from—but this access comes with conditions that undermine its long-term benefits and may reproduce insecurity for these same communities.” Carmona, supra note 91.

Christopher K. Odinet, for example, argues that while some fintech credit providers claim that their online interfaces and machine learning-based credit scoring procedures differentiate them from predatory payday lending models, they often charge rates of interest that are similar to those charged by payday lenders.141Odinet, supra note 21, at 1761–63. In a similar vein, Nakita Cuttino has examined the earned-wage access fintech business model,142These are “internet- and mobile-based platforms that have emerged in recent years to serve as safer alternatives to much-maligned payday loans . . . by facilitating transfers of earned-but-unpaid wages to workers in advance of their standard periodic paydays.” Nakita Q. Cuttino, The Rise of “FringeTech”: Regulatory Risks in Earned-Wage Access, 115 Nw. U. L. Rev. 1505, 1507–08 (2021). which has been described by one proponent as a “revolutionary employee benefit program that offers employees almost instant access to their pay.”143Is Earned Wage Access the Way of the Future? 5 Tips for Employers Seeking to Attract and Retain Talent Through On-Demand Pay, Fisher Phillips (Mar. 30, 2022), https://www.fisherphillips.com/news-insights/earned-wage-access-tips-for-employers-seeking-to-attract-retain-talent.html [https://perma.cc/2T25-JA4Y]. She finds that while this business model does offer some improvements over the prevailing payday lending model, it still has “varying effects that sometimes perpetuate, and in some instances exacerbate, the very risks providers claim to eliminate when displacing short-term creditors like payday lenders.”144Cuttino, supra note 142, at 1516–17.

Notwithstanding their deficiencies, there is consumer demand for these kinds of products, and so the problems associated with fintech lending and earned wage access products should be addressed by robust consumer protection regulation. Fintech lending models have, however, been constructed to avoid certain consumer protections like usury limits and state licensing requirements by engaging in “rent-a-bank” partnerships with banks;145Odinet, supra note 21, at 1776, 1779. earned-wage access programs also currently escape most meaningful consumer protection regulation.146Cuttino, supra note 142, at 1568–69. Odinet notes that the mystique of technology has been strategically weaponized to avoid regulation, observing that “the politics of tech . . . is giving political cover to predatory fintech lenders and clouding what should otherwise be a clear headed and aggressive approach by financial regulators in stamping out these harmful practices.”147Odinet, supra note 21, at 1745.

These fintech lending business models have been billed as “unlock[ing] more credit opportunities” for those who otherwise have bad credit scores or thin credit files,148Jones & Maynard, Jr., supra note 9, at 837–38; see also Carillo, supra note 75, at 1211, 1213. but unfortunately, the kinds of machine learning models used to process non-traditional data sources have often been shown to perpetuate discrimination and bias. Machine learning algorithms are guided by patterns and correlations evident in the data they have been exposed to,149Alicia Solow-Niederman, Information Privacy and the Inference Economy, 117 Nw. U. L. Rev. 1, 5–6 (2022). and so credit scoring algorithms that learn from biased data will perpetuate those biases in their credit-scoring decisions.150Jones & Maynard, Jr., supra note 9, at 837–40; Baradaran, supra note 114, at 371. This biased algorithmic decision-making can be particularly insidious, though, because it is often hidden: “[m]arkers for protected class membership can be inferred with relative ease and near-impunity from other, seemingly neutral data.”151Cohen, supra note 17, at 179. Once again, it is very techno-solutionist to assume that technology alone could winnow out centuries of entrenched biases, but automation biases and narratives of technological neutrality can lend undeserved credibility to such assumptions, impacting access to credit.

The bigger picture problem, of course, is the demand for credit: many Americans are so strapped for cash that they cannot survive from month-to-month without interim payments or loans.152“[F]or many households, borrowing is the only way to survive.” Odinet, supra note 21, at 1800; see also Baradaran, supra note 114, at 398–99. A 2023 survey by the Board of Governors of the Federal Reserve found that

[w]hen faced with a hypothetical expense of $400, 63 percent of all adults in 2023 said they would have covered it exclusively using cash, savings, or a credit card paid off at the next statement (referred to, altogether, as “cash or its equivalent”). The remainder said they would have paid by borrowing or selling something or said they would not have been able to cover the expense.

Bd. Governors Fed. Rsrv. Sys., Economic Well-Being of U.S. Households in 2023, at 31–32 (2024), https://www.federalreserve.gov/publications/files/2023-report-economic-well-being-us-households-202405.pdf [https://perma.cc/38AW-BTS8].
The predatory fintech loans and earned wage access products discussed here can obfuscate and draw attention away from the need to address this deeper, underlying structural problem.153“[T]he increased ability to borrow money, cast as a mechanism of positive social change, may function in some ways as a Trojan horse, wheeling in the unique dangers of indebtedness to the front gates of marginalized communities and threatening their already tenuous socioeconomic existence.” Abbye Atkinson, Borrowing Equality, 120 Colum. L. Rev. 1403, 1405–06 (2020). In their work on fintech, Lindsay Sain Jones and Goldburn Maynard explore one part of this underlying problem—the racial wealth gap. They consider a variety of fintech business models (including “e-trading, robo-advising, alternative credit platforms, neobanks, and decentralized payments”)154Jones & Maynard, Jr., supra note 9, at 808. and demonstrate that many of fintech’s claims about building wealth for traditionally excluded groups do not bear out, and in fact often disguise predatory practices that disproportionately harm vulnerable members of society.155Id.

Consumers may struggle to detect predatory practices because of fintech’s technological complexity: financial literacy is already extremely challenging for most people,156See Lauren E. Willis, Against Financial-Literacy Education, 94 Iowa L. Rev. 197, 201–02, 205 (2008). and fintech often overlays a requirement to be technologically literate too, which puts an even more unrealistic burden on users.157“Computer scientists often adopt a worldview where anyone can become a hacker and access the power of computer networks through coding knowledge gained from a DIY perspective. This perspective often downplays social inequalities related to Internet access and technological knowledge.” Semenzin, supra note 38, at 7. Baradaran has noted that the rhetoric of financial literacy “pathologize[s] the poor—and assume[s] that their poverty was created by individual choices—or treat[s] their state of poverty or financial exclusion as a trait inherent in the excluded borrower.”158Baradaran, supra note 114, at 381. As Darrick Hamilton has observed, if the poor internalize this critique, it fuels their desire not to look foolish for missing out on financial opportunities presented to them, which can make them more vulnerable to predatory practices.159Darrick Hamilton describes the problem as follows:

The characterization of Black people and their position in the United States is often one of ‘they are fools,’ ‘they make bad choices,’ . . . The narrative in America is that you should seize opportunity, make something of yourself, so if you have limited pathways towards traditional ways of wealth building and access to finance, you are particularly vulnerable to not wanting to be left behind.

Americans for Financial Reform, A Conversation with Ben McKenzie hosted by Americans for Financial Reform, YouTube (Sept. 25, 2023), https://www.youtube.com/watch?v=U8d_jws-KfA (starting at 16:50) [https://perma.cc/BXV4-MUP3]. See generally Hamilton & Darity Jr., supra note 131.
If debunking a too-good-to-be-true financial opportunity requires not just financial knowledge, but also understanding how a new technology works, it is not surprising that vulnerable people are sucked in.

This dynamic is particularly evident in the context of the crypto industry. Often described by its critics as “a solution in search of a problem,”160See, e.g., Arvind Narayanan & Sayash Kapoor, AI Snake Oil: What Artificial Intelligence Can Do, What It Can’t, and How to Tell the Difference 235 (2024) (“it has gradually become clear that crypto is a solution looking for a problem”); Adam Lashinsky, Crypto Is a Solution in Search of a Problem, Wash. Post (May 20, 2022), https://www.washingtonpost.com/opinions/2022/05/20/crypto-bitcoin-dogecoin-ethereum-crashing [https://perma.cc/88J4-DJ7U]; White, supra note 40. crypto represents in many ways the apotheosis of fintech and techno-solutionism. Promises have been made that crypto’s underlying blockchain technology can democratize financial services by making them cheaper, more efficient, and more secure—but none of these promises withstand scrutiny. Ultimately, a blockchain is simply a type of database to which entries can only be added, not removed, and which is controlled by multiple nodes instead of relying on centralized intermediaries.161Primavera De Filippi & Aaron Wright, Blockchain and the Law: The Rule of Code 2 (2018). While this technology might be interesting from an academic perspective, according to more than 1,500 independent computer scientists, software engineers, and other technologists who signed a letter to U.S. Congressional leaders in 2022, “[b]y its very design, blockchain technology is poorly suited for just about every purpose currently touted as a present or potential source of public benefit.”162Letter in Support of Responsible Fintech Policy (June 1, 2022), https://concerned.tech [https://perma.cc/467C-ULJK].

It is not the blockchain itself that is offered as an investment opportunity, but the crypto tokens (like Bitcoin) whose ownership is recorded on blockchains. The crypto industry regularly invokes claims of financial inclusion, focusing in particular on reported high uptake of crypto tokens in Black communities in the United States.163See, e.g., Coinbase Presents: Black Americans & Crypto, Coinbase, https://www.coinbase.com/learn/community/black-americans-and-crypto [https://perma.cc/9959-NNC9]. But most of these crypto tokens are not backed by any real-world productive capacity, and are Ponzi-like in their need for significant amounts of new demand and liquidity to support their value.164Allen, supra note 45, at 21–23. A Ponzi scheme exists where “early investors are paid returns from funds provided by new investors, as opposed to being paid from actual returns of a purported investment.” Catherine Carey & John K. Webb, Ponzi Schemes and the Roles of Trust Creation and Maintenance, 24 J. Fin. Crime 589, 589 (2017). Not all Ponzi processes are coordinated manipulative schemes, however: Shiller notes the existence of Ponzi processes where asset prices rise as a result of purchases made by those who have heard positive stories from those who will benefit from further price increases. Robert J. Shiller, Irrational Exuberance 93–94 (Rev. & Expanded 3d ed. 2015). Data analysis by economists at the Bank for International Settlements in 2023 concluded that “a majority of investors have probably lost money on their bitcoin investment,” and that large holders (commonly referred to as “whales”) likely profited at their expense.165Giulio Cornelli, Sebastian Doerr, Jon Frost & Leonardo Gambacorta, Bank for Int’l Settlements Bulletin No. 69: Crypto Shocks and Retail Losses 3–4 (Hyun Song Shin ed., 2023). Some data does indicate that members of Black communities are disproportionately likely to own crypto,166Ariel Invs. & Charles Schwab, 2022 Black Investor Survey: Report of Findings 7 (2022), https://content.schwab.com/web/retail/public/about-schwab/Ariel-Schwab_Black_Investor_Survey_2022_findings.pdf [https://perma.cc/E72H-35HT]. but this will be predatory inclusion if “whales” are using Black communities to provide the liquidity they need to cash out. There is some indication that this is, in fact, the case. Results from a Pew survey conducted in 2023 suggested that Black, Hispanic, and lower-income investors were disproportionately likely to have entered the crypto markets in March 2022 or later, after the market peak at the end of 2021.167Describing the survey’s results, Pew researchers found that

[i]n 2023, Black users (27%) were more likely than White users (12%) to say they first invested in, traded or used cryptocurrency within the previous year. Roughly two-in-ten Hispanic users (21%) said the same. (There were not enough Asian American cryptocurrency users to look at their responses separately.) . . . About three-in-ten users from lower-income households reported first investing in cryptocurrency within the past year, compared with about one-in-ten adults from middle- or upper-income households.

Michelle Faverio, Wyatt Dawson & Olivia Sidoti, Majority of Americans Aren’t Confident in the Safety and Reliability of Cryptocurrency, Pew Rsch. Ctr. (Apr. 10, 2023), https://www.pewresearch.org/short-reads/2023/04/10/majority-of-americans-arent-confident-in-the-safety-and-reliability-of-cryptocurrency [https://perma.cc/SQM3-5TWR].

When assets have no fundamentals and trade entirely on sentiment, traditional checks on fraud (like independent valuations and audits) break down, leaving crypto investors particularly vulnerable to fraudsters.168Regarding the ease with which crypto valuations can be manipulated, see Matt Levine, FTX’s Balance Sheet Was Bad, Bloomberg (Nov. 14, 2022, 10:09 AM), https://www.bloomberg.com/opinion/articles/2022-11-14/ftx-s-balance-sheet-was-bad [https://perma.cc/658Y-3TDB]. Financial disclosures from crypto issuers can reflect these manipulated values and often take the form of “attestations” or “proof of reserves” that have not undergone the scrutiny of an audit. Jonathan Weil, Binance Is Trying to Calm Investors, but Its Finances Remain a Mystery, Wall St. J. (Dec. 10, 2022), https://www.wsj.com/articles/binance-is-trying-to-calm-investors-but-its-finances-remain-a-mystery-11670679351 [https://perma.cc/H544-MH2T]. Crypto is also highly attractive to scammers and hackers because transactions on a blockchain cannot be undone (at least, not without taking drastic steps).169“Undoing a transaction requires either a change in the ledger’s underlying software, or what is known as a “hard fork,” where the ledger is split in two with one version of the ledger not recognizing the problematic transaction.” Allen, supra note 113, at 100. Unsurprisingly, the crypto markets are rife with fraud, hackings, and scams—and crypto users are expected to be able to protect themselves from these.170For a running tally of crypto hacks, scams, and frauds impacting consumers, see Molly White’s website, Web3 is Going Just Great, https://web3isgoinggreat.com [https://perma.cc/S62J-98G2]. As discussed previously, however, self-protection in these circumstances requires unrealistically high levels of both technological and financial literacy.171Jutel, supra note 130, at 07; see also supra notes 156–59 and accompanying text. Even in the absence of frauds, scams, and hackings, blockchain technology struggles to scale,172See infra note 210 and accompanying text. with the result that transactions processed on a blockchain can be subject to unexpected delays and high fluctuating fees at peak times (in addition to the fees users incur converting their crypto into and out of fiat currency on crypto exchanges).173For a discussion of fees, see Levitin, supra note 114, at 144. It is also important to note that these crypto exchanges typically require users to have a bank account in order to open an exchange account, meaning that unbanked customer will not be able to use an exchange to acquire crypto or to cash out of it in order to transact in the real economy.174Baradaran, supra note 114, at 384–85. Bitcoin ATMs, which tend to cluster in the same locations as payday lenders and check cashers, do provide a bank-free alternative for obtaining Bitcoin, but these usually charge extremely high fees, and while they “will accept cash to buy crypto . . . most aren’t equipped to sell crypto and dispense cash.” Dan Mika, High-Fee Crypto ATMs Center Around Low-Income Parts of Kansas City, Kan. City Beacon (Aug. 15, 2023), https://thebeaconnews.org/stories/2023/08/15/high-fee-crypto-atms-center-around-low-income-parts-of-kansas-city/#:~:text=Engagement%20Data%20Economics-,High%2Dfee%20crypto%20ATMs%20center%20around%20low%2Dincome%20parts%20of,targeting%20residents%20with%20extraordinary%20fees [https://perma.cc/PH9Z-PKDA].

This practical need for a bank account to access crypto also undermines industry claims that a type of crypto asset known as a “stablecoin” will bank the unbanked.175For an example of such industry claims, see Circle, supra note 136. Unlike most other crypto assets, stablecoins typically have some reserve of assets backing them and are therefore not as volatile as other kinds of crypto assets. Still, stablecoins remain vulnerable to runs where first movers are made whole while the remaining holders suffer losses.176Gary B. Gorton & Jeffery Y. Zhang, Taming Wildcat Stablecoins, 90 U. Chi. L. Rev. 909, 936–39 (2023). Indeed, some stablecoins have collapsed in recent years, causing their users to lose everything.177Leo Schwartz & Abubakar Idris, From Argentina to Nigeria, People Saw Terra as More Stable Than Local Currency. They Lost Everything, Rest of World (May 26, 2022), https://restofworld.org/2022/argentina-nigeria-terra-crash [https://perma.cc/WXH9-Z53S]. This article references Terra, a particularly risky form of stablecoin known as an algorithmic stablecoin, but as the article observes, “Lots of people lost money they couldn’t lose . . . They don’t care if it’s an algorithmic stablecoin, a collateralized stablecoin, decentralized, or what—their attitude will be, crypto f***ed me, I lost all my money. I won’t come back.” Id. Also, Bank for International Settlements (“BIS”) research on collateralized stablecoins has found that none of them are as stable as they claim, with depegging from the USD$1 price being a reasonably regular occurrence. Anneke Kosse, Marc Glowka, Ilaria Mattei & Tara Rice, Will the Real Stablecoin Please Stand Up? 11 (Bank for Int’l Settlements Papers, No. 141, 2023). As for those that have not collapsed, the World Economic Forum has concluded that stablecoins do not provide any novel payments functionality, noting that “stablecoins as currently deployed would not provide compelling new benefits for financial inclusion beyond those offered by pre-existing options.”178World Econ. F., What Is the Value Proposition of Stablecoins for Financial Inclusion 8 (2021), https://www3.weforum.org/docs/WEF_Value_Proposition_of_Stablecoins_for_Financial_Inclusion_2021.pdf [https://perma.cc/K8AG-6XMC]. Ultimately, stablecoins have little to recommend them as a financial inclusion solution.

Despite these realities, techno-solutionist narratives about crypto’s ability to improve financial inclusion are stubbornly resilient. Brookings’s Tonantzin Carmona has broken down crypto’s financial inclusion narrative into two halves: (1) easy access to transactional services for those previously locked out of the financial system, and (2) a wealth building avenue with low barriers to entry.179Carmona, supra note 91. She thoroughly debunks both halves, demonstrating that cryptocurrencies are poorly suited to perform transactional services, and that the volatility of most crypto assets’ value makes them unsuited to wealth building.180Id. As already mentioned, most crypto exchanges require users to have a bank account to acquire any crypto asset in the first place, so crypto solves little for the unbanked.181Id. This is also true of many other non-crypto fintech products: “[E]lectronic payment systems like PayPal and Venmo allow funds to be transferred among users without requiring a bank account, but the initial loading of funds must either be from a bank account or a credit card or a payment from another user.” Levitin, supra note 114, at 117. Crypto loans typically require overcollateralization before they are extended, so those without wealth (in the form of collateral) will not be able to receive loans.182Sirio Aramonte, Wenqian Huang & Andreas Schrimpf, DeFi Risks and the Decentralisation Illusion, BIS Q. Rev., Dec. 2021, at 21, 27. Rejecting techno-solutionism, Carmona admonishes policymakers to “first clarify the problems they are trying to solve, and more importantly, why they are trying to solve them.”183Carmona, supra note 91.

Unbanked and underbanked individuals in the U.S. would benefit enormously from access to simple, quick, low-cost transactional services.184“[C]ommunities do not need better blockchain design or mobile apps—they need simple access to a checking account and a debit card.” Baradaran, supra note 114, at 410. We already have the technology needed to provide these, though, and it seems to be more a lack of political will that prevents such transactional services from being provided more widely.185Aaron Klein identifies a simple amendment to existing law that would significantly help the underbanked:

The single most impactful thing the federal government could do is to give people access to their own money immediately. This can be done by simply amending the Expedited Funds Availability Act to require immediate access for the first several thousand dollars of a deposit, instead of permitting the lengthy, costly delays that harm people living paycheck to paycheck.

Aaron Klein, Opening Statement of Aaron Klein at Roundtable on America’s Unbanked and Underbanked, Brookings (Dec. 15, 2021), https://www.brookings.edu/opinions/opening-statement-of-aaron-klein-at-roundtable-on-americas-unbanked-and-underbanked [https://perma.cc/4AS7-WHT9]; see also Edmund Schuster, Cloud Crypto Land, 84 Mod. L. Rev. 974, 981 (2020).
Reliance on predatorily priced credit is a thornier problem186For a discussion of why access to credit is a very different problem from access to transaction processing services, see Levitin, supra note 114, at 116.—here, solving the problem of financial inclusion will ultimately require that people have some wealth to begin with, and building that wealth is a complex political and social problem that will require public sector involvement.187“Ultimately, household solvency problems can only be addressed by secular changes in the economy that will result in greater income and lower expenses for households and greater savings rates that can provide cushion against unexpected expenses.” Id. at 162–63. Mehrsa Baradaran, for example, has argued for compensatory policies designed to build home-ownership in geographical areas that have typically been marginalized.188Baradaran, supra note 131, at 946–48. Sain Jones and Maynard have called for infrastructure improvements, tax policy changes, and government wealth transfers—in addition to improvements to financial services and technology oversight.189Jones & Maynard, Jr., supra note 9, at 848–61. Darrick Hamilton and William Darity, Jr., have proposed “baby bonds,” which would allow children in need to build wealth by the time they become adults.190Darrick Hamilton & William Darity, Jr., Can ‘Baby Bonds’ Eliminate the Racial Wealth Gap in Putative Post-Racial America?, 37 Rev. Black Pol. Econ. 207, 215 (2010). While technology might play a minor role in creating the infrastructure for delivering this kind of wealth-building, it will not come close to providing the whole solution. The undeservedly shiny promise of fintech can be weaponized, though, to argue that such meaningful structural solutions are unnecessary.

B.  Efficiency

Another big claim of fintech is that it can make financial services more efficient.191Saule T. Omarova, Technology v. Technocracy: Fintech as a Regulatory Challenge, 6 J. Fin. Regul. 75, 89 (2020). It is particularly common to hear that fintech is more efficient because it eliminates the need for human customer service or brick-and-mortar bank branches.192Levitin, supra note 114, at 142. In many ways, though, this rhetoric is overblown: most fintech payment services and lenders, for example, ultimately depend on traditional bank infrastructure and therefore do not fully eliminate their costs. Still, that promise of increased efficiency remains the front of many financial inclusion claims: the hope is that transaction processing services that are quicker and cheaper can serve more people (including traditionally excluded populations) more effectively.193Odinet, supra note 21, at 1755; Levitin, supra note 114, at 141–42. We have already discussed how these financial inclusion claims are often hollow; many fintech services have, in fact, become profitable by appealing to higher income customers. Still, promises of increased efficiency are also key to how fintech is marketed to these higher income consumers.194Baradaran, supra note 114, at 371–72; Levitin, supra note 114, at 143. But solving for “efficiency” in the abstract is an impossible task. It is critical that we define the precise problem to be solved, instead of simply assuming that some version of increased efficiency will get us where we need to go.

Techno-solutionism is tied to commonly accepted notions that “more efficient” is always an improvement: efficiency has been our mantra for so long, in so many business contexts, that it has come to be perceived as an obvious and neutral goal. But there are many different ways of conceptualizing efficiency that are relevant to fintech policy195Luke Herrine, What Do You Mean by Efficiency? An Opinionated Guide, LPE Project (Oct. 11, 2023), https://lpeproject.org/blog/who-cares-about-efficiency [https://perma.cc/4XDE-6G6A].: There is the colloquial sense of efficiency as avoiding wastefulness.196Id. We must also contend with economic definitions of allocative efficiency (which often hide distributional inequities),197Graham S. Steele, The Tailors of Wall Street, 93 U. Colo. L. Rev. 993, 1035 (2022). “Efficiency, in the Kaldor-Hicksian optimal allocative efficiency sense, is insensitive to distributional inequalities, and so regulation will be acceptably ‘efficient’ as long as someone’s gains offset someone’s harms.” Hilary J. Allen, Regulatory Managerialism and Inaction: A Case Study of Bank Regulation and Climate Change, 86 L. & Contemp. Probs. 71, 77 (2023). and informational efficiency (which relates to how well prices of financial assets reflect available information).198Yesha Yadav, How Algorithmic Trading Undermines Efficiency in Capital Markets, 68 Vand. L. Rev. 1607, 1610 (2015). Or we might take a computer science approach and try to “minimize the consumption of time, energy, space, or cost in satisfying a specification of correctness for a given problem”—although Ohm and Frankle note that there are still many axes of efficiency to be traded off even within this technology-centric definition.199Ohm & Frankle, supra note 36, at 804. There has also been increased recognition within the computer science discipline that computational efficiency is not always the right parameter to maximize, with computer scientists and engineers sometimes “turn[ing] away from efficient solutions when faced with the need to inject complex human values into systems.”200Id. at 838. As the previous Section explored, one of the most challenging human values to inject into financial services is distributional equity.

And so there is no single universal definition of efficiency, but it is true that payments often take too long to clear in the United States, which is a real and persistent problem for the underbanked.201Regarding the desire for faster funds availability among the underbanked, see Levitin, supra note 114, at 121. For more affluent people, such delays are merely an annoyance; for those who live paycheck to paycheck, waiting three days for a payment to clear can result in costly defaults or the need for expensive services like check cashing and payday lending.202Klein, supra note 185. The earned-wage access fintech products discussed in the previous Section aim to make delivery of funds more rapid, but they too can prove costly.203Financial regulators in California found that tip-based earned-wage access companies succeeded in pushing customers to tip their provider 73% of the time: the average APR (representing the total cost of using the service) for these tip-based companies was 334%. Cal. Dep’t Fin. Prot. & Innovation, 2021 Earned Wage Access Data Findings (2023), https://dfpi.ca.gov/wp-content/uploads/sites/337/2023/03/2021-Earned-Wage-Access-Data-Findings-Cited-in-ISOR.pdf [https://perma.cc/55SJ-N7SN].

While slow payments processing may seem at first blush like a technology problem, technologies for faster payments processing by banks already exist, and have been widely used (particularly outside of the United States) for some time.204Real-time transaction processing is common in many other countries. For example:

India had 89.5 billion real-time transactions in 2022 and an annual growth rate of 76%. Brazil was in second place with 30 billion transactions and a 230% annual growth rate in 2022. . . . By comparison, real-time transactions in North America are expected to expand from 3.9 billion in 2022 to 13 billion by 2027.

John Adams, Can FedNow Give U.S. Processors an Edge Over Global Rivals?, Am. Banker (July 31, 2023), https://www.americanbanker.com/payments/news/can-fednow-give-u-s-processors-an-edge-over-global-rivals [https://perma.cc/J2AR-DSE4].
The fact that these kinds of technologies are not widely used in the United States is in large part a political problem, requiring political solutions. Banks, for example, could be required to use readily available technologies to clear and settle payments more speedily by amending the Expedited Funds Availability Act.205Aaron Klein recommends “amending the Expedited Funds Availability Act to require immediate access for the first several thousand dollars of a deposit, instead of permitting the lengthy, costly delays that harm people living paycheck to paycheck.” Klein, supra note 185. The Federal Reserve launched its real-time payments service, FedNow, on July 20, 2023, but uptake by banks has been slow.206Felix Salmon, FedNow Is Live with 35 Banks, Axios (July 20, 2023), https://www.axios.com/2023/07/20/federal-reserve-fednow-payment [https://web.archive.org/web/20240303021335/https://www.axios.com/2023/07/20/federal-reserve-fednow-payment]. Congress could consider mandating that banks join FedNow to ensure that these faster payment rails are available to their customers.

To be clear, these political problems can be very intractable. If fintech providers could provide an end run around these political problems by providing quick and affordable payments processing, then that would be very appealing. Unfortunately, though, fintech payments providers sometimes overclaim regarding the increased efficiencies of their technologies. For example, despite repeated crypto industry assertions of improved efficiency,207Semenzin, supra note 38, at 8. the underlying blockchain technology is inefficient by design.208Ohm & Frankle, supra note 36, at 797. Processing transactions on any decentralized permissionless ledger will always be slower and more cumbersome than available centralized alternatives, because in the absence of costly computations, it would be too easy for a bad actor to take over a technologically decentralized system.209Schuster, supra note 185, at 981. As a result, transaction processing on blockchains is slow and expensive (and the cost and timing of such processing is often unpredictable), and blockchains struggle to scale to process large volumes of transactions.210White, supra note 40.

Since inefficiency is a feature and not a bug of technologically decentralized systems, if blockchain-based businesses are able to increase efficiencies, they are likely to derive from regulatory arbitrage strategies that reduce regulatory compliance costs. Most parties involved in financial transactions are required to engage in “know-your-client” due diligence and other compliance checks to help prevent the financial system from being used for money laundering and sanctions evasion.211These obligations derive from the Bank Secrecy Act, codified at 31 U.S.C. §§ 5311–36 and 12 U.S.C. §§ 1951–60. These checks necessarily add time and expense to transaction processing—time and expense that unregulated members of the crypto industry can avoid by engaging in regulatory arbitrage212“In many ways, the current modus operandi of cryptocurrencies is similar to an old Swiss model of banking where people could set up anonymous accounts and no questions were asked.” Igor Makarov & Antoinette Schoar, Crytpocurrencies and Decentralized Finance (DeFi), Brookings Papers on Econ. Activity, Spring 2022, at 141, 175. (the crypto industry has pushed back on legislative attempts to extend anti-money laundering obligations to entities involved in processing crypto transactions, citing the decentralized nature of the crypto ecosystem and the costs of impeding innovation).213See, e.g., Chamber Digit. Com., Statement on Digital Asset Anti-Money Laundering Act (July 28, 2023), https://digitalchamber.org/statement-on-digital-asset-aml-act [https://perma.cc/K4P4-A2LM].

There are, of course, many technological alternatives to blockchains. Some fintech alternatives may indeed have the potential to improve the speed or cost of payments processing and other financial services. But focusing on these kinds of efficiency to the exclusion of all else can cause problems, too. Faster payments, for example, often enable faster fraud,214“Faster transactions are susceptible to the same social engineering techniques fraudsters have employed to target legacy systems—but with the added twist that funds intercepted via faster payments are often irrecoverable due to their speed.” FIs Look to Advanced Technologies to Protect Faster Payments, PYMNTS (Apr. 12, 2024), https://www.pymnts.com/money-mobility/2024/fis-look-to-advanced-technologies-to-protect-faster-payments [https://perma.cc/X5BH-C4SS]. and are therefore opening up new consumer protection problems that need to be addressed. As we will discuss shortly, increased efficiencies can also increase the susceptibility of the financial system to financial crises, with all the human misery those crises entail.215Allen, supra note 113, at 23–24. Concerns about efficiency-induced fragility have been percolating since highly efficient but brittle supply chains stalled and crumbled during the Covid-19 pandemic. People are now asking whether we have gone too far in maximizing supply chain efficiency, at the expense of overall resilience and robustness.216See generally Rana Foroohar, Homecoming: The Path to Prosperity in a Post-Global World (2022); Kathryn Judge, Direct: The Rise of the Middleman Economy and the Power of Going to the Source (2022). We should ask the same question of technological innovations that are promising to make finance more efficient: What are they doing to the resilience of our financial system? To put the question a little differently, are increases in efficiency delivering diminishing marginal returns that are not commensurate with the increased fragilities they create?217In the context of algorithmic trading, Adair Turner commented that

the benefits of market liquidity must, like the benefits of any market completion, be of declining marginal utility as more market liquidity is attained. The additional benefits deliverable, for instance, by the extra liquidity which derives from flash or algorithmic training, exploiting price divergences present for a fraction of a second, must be of minimal value compared to the benefits from having an equity market which is reasonably liquid on a day-by-day basis.

Adair Turner, Chairman of the Financial Services Authority, Lecture at CASS Business School: What Do Banks Do, What Should They Do and What Public Policies Are Needed to Ensure Best Results for the Real Economy? 27 (Mar. 17, 2010), https://www.bayes.city.ac.uk/__data/assets/pdf_file/0006/77136/Adair-Turner-March-2011.pdf [https://perma.cc/RR4T-764U].

For example, fintech business models designed to make capital intermediation and risk management more efficient (ranging from robo-advisors to high frequency trading) may end up making our financial system more fragile—as well as undermining other kinds of efficiency, like informational efficiency.218Yadav, supra note 198, at 1610. Take the high frequency trading business model. It is facilitated entirely by algorithms designed to trade at speeds and in volumes that humans would not be capable of.219Id.; see also Allen, supra note 113, at 86–87. Proponents of high frequency trading argue that it improves the efficiency of capital intermediation because it increases the volume of trading and by providing more opportunities to transact, increases liquidity and lowers trading costs.220Senior Supervisors Group, Algorithmic Trading Briefing Note 1 (2015), https://www.newyorkfed.org/medialibrary/media/newsevents/news/banking/2015/SSG-algorithmic-trading-2015.pdf [https://perma.cc/Z88L-LZ9C]. But that is only true in normal times. When things are obviously wrong in the market (at least, obvious to a human), the algorithm may continue to trade in a way that generates “flash crashes” of asset prices, which could spark fire sale externalities that threaten the stability of the financial system.221Id. at 1, 3. If the algorithm does recognize that something is really wrong, more often than not its preprogrammed instruction is to simply stop trading, draining liquidity from the system when it is most needed.222“[I]n periods of heightened volatility . . . passive HFT market players, ie those that provide liquidity, typically keep a low profile by deleting trading orders, thereby reducing the supply of liquidity.” High-Frequency Trading Can Amplify Financial Market Volatility, Deutsche Bundesbank (Oct. 25, 2016), https://www.bundesbank.de/Redaktion/EN/Topics/2016/2016_10_25_monthly_report_october_high_frequency_trading.html [https://perma.cc/E4RG-9MGG].

“Tokenization” of real-world assets is another efficiency-driven form of fintech that could make the financial system more vulnerable during unanticipated circumstances.223Bank for Int’l Settlements, Blueprint for the Future Monetary System: Improving the Old, Enabling the New, in BIS Ann. Econ. Rep. 2023, at 85, 85 (2023) [hereinafter BIS Blueprint], https://www.bis.org/publ/arpdf/ar2023e3.pdf [https://perma.cc/UX8E-YXG4]. For further discussion of this issue, see generally Next Generation Infrastructure: How Tokenization of Real-World Assets Will Facilitate Efficient Markets Before the Subcomm. on Digit. Assets, Fin. Tech., & Inclusion of the H. Comm. on Fin. Servs., 118th Cong. (2024) (statement of Hilary J. Allen, Professor of Law, American University Washington College of Law). These tokens are digital representations of real-world assets that can be preprogrammed such that financial transactions will self-execute without human intervention.224BIS Blueprint, supra note 223, at 85. Automating transactions can certainly increase speed and reduce costs225“The projects . . . reportedly seek to improve efficiency . . . [by] embedding features like programmability, and automaticity.” Fin. Stability Oversight Council, Annual Report 2023, at 45 (2023). (tokenization is typically associated with blockchain technologies, but programmable tokens can also be hosted on other kinds of ledgers and so avoid blockchain’s inefficiencies).226BIS Blueprint, supra note 223, at 94. However, the speed of self-execution can cause problems when the world has changed in ways that were not contemplated by the token’s programmers.227Just like legal contracts, computer programs cannot anticipate all future states of the world. For an overview of the literature on incomplete contracts, see Cathy Hwang, Collaborative Intent, 108 Va. L. Rev. 657, 665–67 (2022). During periods of systemic stress (when flexibility is critical to avoiding a crisis),228Katharina Pistor, A Legal Theory of Finance, 41 J. Compar. Econ. 315, 321 (2013). automated transactions will still execute rapidly—even if the parties would otherwise have agreed to negotiate or extend some grace to their counterparties to prevent temporary liquidity problems from metastasizing into something worse.

If we want our financial system to be more robust and resilient overall, we will sometimes need to focus on preserving or adding back inefficiencies, to allow the system to reconfigure when the unexpected happens in order to prevent failure.229J.B. Ruhl, Governing Cascade Failures in Complex Social-Ecological-Technological Systems: Framing Context, Strategies, and Challenges, 22 Vand. J. Ent. & Tech. L. 407, 422 (2020). This may require certain aspects of the financial system to have frictions (like circuit breakers), or to be slower, or to have more redundancies. Obviously, a system that is entirely inefficient would be of no use at all, so the key is to achieve the right balance of efficiency against other system attributes.230Id. We are more likely to achieve the right balance if we reject techno-solutionist exhortations for efficiency qua efficiency. Then we can start interrogating on a case-by-case basis where a type of efficiency will deliver only diminishing marginal returns and is not worth the attendant fragilities, as well as where financial regulation might help compensate for those fragilities.

C.  Competition

Where there is a perceived lack of efficiency in the provision of financial services, innovation-driven competition is often seen as the answer.231Brummer & Yadav, supra note 121, at 275. Fintech proponents often trumpet the disruption and competition fintech creates for the financial industry’s more highly-regulated institutions when it comes to providing capital intermediation (particularly credit), risk management, and transaction processing services.232Id. at 275–77. However, as with efficiency, if the competition benefits associated with fintech are a product of regulatory arbitrage rather than technological superiority, then they may not be worthwhile or desirable from a public policy perspective.

It is true that disrupting incumbents can be challenging in highly regulated industries, like finance, because regulatory compliance can serve as a barrier to entry—arguments have been made for repealing or waiving financial regulations as a result.233Allen, supra note 58, at 587–88. This Article will take up the topic of deregulation in Part III: here, it suffices to say that we’ve already seen that businesses like fintech lenders and crypto intermediaries often find their competitive advantage not by fundamentally changing how financial services are delivered, but by using the veneer of techno-solutionism to justify their regulatory arbitrage.234See supra notes 145–47, 211–13 and accompanying text. This kind of regulatory arbitrage may in some circumstances result in reduced costs for consumers (although predatory pricing exists in some fintech markets, so this is by no means guaranteed).235On the high cost of fintech loans, see Odinet, supra note 21, at 1743. However, where the law being skirted serves an important social purpose—particularly if it exists to protect the public from harm—then this kind of competition may be socially undesirable even if it lowers prices. In a recent article, Saule Omarova and Graham Steele argued that prudential banking regulation, which seeks to ensure that banks are managed in a safe and sound manner, does not in fact inhibit competition but actually restrains incumbents from abusing their existing market power.236Saule T. Omarova & Graham S. Steele, Banking and Antitrust, 133 Yale L.J. 1162, 1171 (2024). They argue that without this regulation, new firms would have to contend with even more firmly entrenched incumbent banks.237Id. They also argue that firms who skirt this regulation can develop market power in an antisocial way where gains are privatized and losses socialized.238Omarova and Steele identify a number of risks of regulatory arbitrage:

Shadow banking in general, and fintech and crypto specifically, are often motivated by a desire to arbitrage around the existing banking rules and regulations, thereby capturing the benefits of banks’ ‘specialness’ while evading the constraints of banking law. As the pre-2008 experience shows, unchecked growth of such alternative markets impairs regulators’ ability to prevent excessive accumulations of risk and leverage in the financial system. More fundamentally, permitting the rampant growth of private forms of money and money substitutes threatens the sovereign public’s ability to control the supply and flow of money and credit in the economy.

Id. at 1245.

Ultimately, whether rent-a-bank partnerships and other business models that use new technologies to arbitrage existing laws are seen as a “solution” to imperfectly competitive markets will depend on how the problem of “competition” is construed. For nearly fifty years, competition law in the United States has focused very narrowly on addressing inefficiencies arising from market power that impact the prices paid by consumers.239Id. at 1177–78. If, however, we embrace a more expansive and nuanced notion of the public harms that can result from excessive economic concentration, and appreciate that “[m]arket power also harms society as a whole by lessening economic growth and productivity and by contributing to our Gilded Age levels of inequality,”240Jonathan B. Baker, Finding Common Ground Among Antitrust Reformers, 84 Antitrust L.J. 705, 707 (2022). then it will become clear that technology cannot resolve these kinds of concerns on its own.

Technology may, in fact, be the source of some of these concerns about market power (or at least, their accelerant). For example, the power of dominant technology platforms to use algorithms to manipulate their users and their competitive environment has been a dominant concern of Lina Khan and other “neo-Brandeisian” antitrust scholars.241Id. at 706.

These scholars have proposed antitrust law reforms to the economic concentration and market power of the giant tech platforms,242Id. but the tech industry prefers its own tech solution in the form of Web3.243Chris Dixon, Read, Write, Own: Building the Next Era of the Internet xix (2024); see also Semenzin, supra note 38, at 1. “Web3” is not so much a reality as it is a marketing term for a more utopian vision of an internet where the use of blockchain technology helps wrest control and ownership away from the existing tech platforms. (By way of background, Web1 describes the read-only internet of the 1990s; Web2 is our current era in which we can read and also create content, but it is all intermediated through large platforms; and Web3 is supposed to let us “read, write, and own” the Internet.)244White, supra note 40. Although this may sound superficially appealing, there are many reasons to be cynical about this techno-solutionist vision (which many consider to be no more than a cynical crypto rebrand).245Id.

First of all, we can look at who is investing in Web3. Andreessen Horowitz, the preeminent VC firm investing in Web3 companies, also has important relationships with Web2 platform companies (like Meta) that Web3 purports to disrupt.246Ephrat Livni, Tales from Crypto: A Billionaire Meme Feud Threatens Industry Unity, N.Y. Times (Jan. 18, 2022), https://www.nytimes.com/2022/01/18/business/dealbook/web3-venture-capital-andreessen.html [https://web.archive.org/web/20220923102005/https://www.nytimes.com/2022/01/18/business/dealbook/web3-venture-capital-andreessen.html]. Meta (née Facebook) itself invested heavily in a Web3-aligned Metaverse that incorporated blockchain technology—although Meta has now largely pivoted away from the Metaverse to AI.247Selinger, supra note 1. For a discussion of the relationship between Web3, the Metaverse, and blockchain technology, see generally Thien Huynh-The, Thippa Reddy Gadekallu, Weizheng Wang, Gokul Yenduri, Pasika Ranaweera, Quoc-Viet Pham, Daniel Benevides da Costa & Madhusanka Liyanage, Blockchain for the Metaverse: A Review, 143 Future Generation Comput. Sys. 401 (2023). Obviously, none of this investment would have happened if the players involved did not see opportunities to profit in Web3—some have surmised that the real vision was for a Web3 where institutional players could use blockchain technology to make a small profit from every interaction that happens online.248“[I]n blockchain discourses, almost every human transaction is conceived in terms of value . . . and every human relationship can be conceptualized in terms of economics.” Semenzin, supra note 38, at 6.

Even if we put aside cynicism about the bona fides of Web3 proponents and take it at face value, though, it is clear that the technology alone will not solve the Internet’s economic concentration problem. Visions of Web3 rely on the same blockchain technology as crypto.249Web3 is the “internet of the metaverse,” and blockchain is considered a critical technology for that metaverse. Huynh-The et al., supra note 247, at 409. Blockchain technology is designed to ensure that no one single node in the system has centralized control over which transactions are added to the blockchain;250De Filippi & Wright, supra note 161, at 2. the tokens and other protocols built on blockchains like Ethereum are designed to decentralize control by distributing ownership among token holders and automating transactions so that no humans are required to execute those transactions. As already discussed, many inefficiencies are incurred in order to achieve this kind of technological decentralization,251See supra notes 207–210 and accompanying text. but even after all that, technological decentralization does not guarantee economic decentralization.252See generally Aramonte et al., supra note 182. A system can have lots of nodes, but if someone controls a lot of those nodes, then they can control the system.

Aspirations notwithstanding, economic power in crypto is often highly concentrated and can be exploited in many ways. When projects are built on blockchains, for example, they often take the form of nominally “decentralized autonomous organizations,” in which participants are given governance tokens that allow them to vote on the direction of the project, which are then preprogrammed using software called a smart contract. However, as economists Makarov and Schoar have documented, “in the majority of crypto projects, developers and early investors choose to keep control of the platform by allocating significant stakes to themselves. In addition, even if developers do not have a large stake, in many cases they managed to maintain de facto significant control over the platform.”253Makarov & Schoar, supra note 212, at 184; see also Tom Barbereau, Reilly Smethurst, Orestis Papageorgiou, Johannes Sedlmeir & Gilbert Fridgen, Decentralised Finance’s Timocratic Governance: The Distribution and Exercise of Tokenised Voting Rights, Tech. Soc’y, May 2023, at 1, 11 (“[M]inority rule is the probable consequence of tradable voting rights . . . and no applicable anti-monopoly or anti-concentration laws.”).

When it comes to the process of validating transactions on the blockchains themselves, again, there are strong economic incentives that have resulted in the concentration of validation power in the hands of just a few groups.254“[T]here are strong implicit incentives for validators to pool their capacity and coinsure their risk of winning a block reward.” Makarov & Schoar, supra note 212, at 147. There is evidence that some concentrated groups of validators process transactions in the order that reflects the wishes of the highest bidder and potentially harms the interests of those whose transactions are processed later (a practice known as maximal (formerly miner) extractable value (“MEV”)).255“[A]s a pending transaction sits in a mempool, miners and validators have found ways to profit from them by including, excluding or reordering transactions in a block. This strategy involves maximal (formerly miner) extractable value, or MEV.” Ekin Genç, What is MEV, aka Maximal Extractable Value?, CoinDesk (Sept. 2, 2022, 7:00 PM), https://www.coindesk.com/learn/what-is-mev-aka-maximal-extractable-value [https://web.archive.org/web/20250112130542/https://www.coindesk.com/learn/what-is-mev-aka-maximal-extractable-value]. We therefore need a solution other than blockchain if we wish to ensure that powerful technology platforms do not inhibit inclusive economic growth. That solution will likely be found in antitrust law, not in technology.

D.  Security

The concentration of validation power in the hands of just a few groups will also create security vulnerabilities for blockchains. In 2022, cybersecurity researchers found that just four pools of Bitcoin validators working in concert could subvert the Bitcoin blockchain.256Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir & Sonya Schriner, Trail of Bits, Are Blockchains Decentralized?: Unintended Centralities in Distributed Ledgers 4 (2022), https://apps.dtic.mil/sti/pdfs/AD1172417.pdf [https://perma.cc/7ZED-3CZW]. There are also security vulnerabilities associated with the fact that no person or entity is designated accountable for ensuring that a blockchain’s software is maintained and kept secure from cyberattacks.257Angela Walch, The Bitcoin Blockchain as Financial Market Infrastructure: A Consideration of Operational Risk, 18 N.Y.U. J. Legis. & Pub. Pol’y 837, 870 (2015). In 2024, for example, the Department of Justice indicted two MIT graduate brothers for attacking the protocols of the Ethereum blockchain and stealing approximately $25 million of Ethereum cryptocurrency in 12 seconds.258Press Release, U.S. Dep’t of Just. Off. of Pub. Affs., Two Brothers Arrested for Attacking Ethereum Blockchain and Stealing $25M in Cryptocurrency (May 15, 2024), https://www.justice.gov/opa/pr/two-brothers-arrested-attacking-ethereum-blockchain-and-stealing-25m-cryptocurrency [https://perma.cc/6YWX-EZ9S]. It is not realistic to think all of a blockchain’s users will protect and maintain the blockchain’s software by way of a collective effort,259“Everyone involved in a blockchain ecosystem benefits from the existence of a rock-solid protocol and high-quality software, but everyone is also better off free riding on someone else’s work to develop them.” James Grimmelmann & A. Jason Windawi, Blockchains as Infrastructure and Semicommons, 64 Wm. & Mary L. Rev. 1097, 1120 (2023). and so blockchain security tends to depend on informal groups of core software developers with no legal responsibilities.260Walch, supra note 257, at 870. This is in stark contrast with regulated financial infrastructure providers like the Depositary Trust & Clearing Corporation, who must comply with the internationally accepted Principles for Financial Market Infrastructure. These Principles require, among other things, that financial infrastructure providers have a clear legal basis and governance structure, and policy and procedures around the management of risks (including security risks).261See generally Comm. on Payment & Settlement Sys., Bank for Int’l Settlements, & Tech. Comm. of the Int’l Org. of Sec. Comm’ns, Principles for Financial Market Infrastructures (2012), https://www.bis.org/cpmi/publ/d101a.pdf [https://perma.cc/F9MG-VRRF]. No such requirements are currently applied to blockchains.

Blockchains are not the only new fintech infrastructure that has generated new security vulnerabilities. Consider, for example, the push for open banking, which has been described as “the sharing and leveraging of customer-permissioned data by banks with third party developers and firms to build applications and services, such as those that provide real-time payments, greater financial transparency options for account holders, and marketing and cross-selling opportunities.”262Basel Comm. on Banking Supervision, Bank for Int’l Settlements, Report on Open Banking and Application Programming Interfaces 19 (2019), https://www.bis.org/bcbs/publ/d486.pdf [https://perma.cc/8K9Y-VSSN]. Application programming interfaces (“APIs”) are computer programs that allow different technology systems to speak directly to one another, and they form the backbone of many open banking initiatives.263Dan Awrey & Joshua Macey, The Promise & Perils of Open Finance, 40 Yale J. on Regul. 1, 3–4 (2023). However, API development is often outsourced to third-party software developers,264Id. at 42. and there can be quality control issues with regard to the maintenance and security of API software: it has been documented in the healthcare context, for example, that APIs are often the “weakest link” in cybersecurity protections.265Steve Alder, 100% of Tested mHealth Apps Vulnerable to API Attacks, HIPAA J. (Feb. 16, 2021), https://www.hipaajournal.com/100-of-tested-mhealth-apps-vulnerable-to-api-attacks [https://web.archive.org/web/20240629000000*/https://www.hipaajournal.com/100-of-tested-mhealth-apps-vulnerable-to-api-attacks/].

Even when APIs work well, their efficiencies may cause new security vulnerabilities, in the vein of the efficiency-induced fragilities discussed in Section II.B. One use case for APIs is to increase the speed of payments processing by making it easier for different systems to share payments data.266Basel Comm. on Banking Supervision, supra note 262, at 16. However, APIs are not just more efficient at passing desired data between systems—they may potentially be very efficient at passing along problems as well. It is underappreciated that APIs may work as channels that transmit operational problems from one institution to another.267Hilary J. Allen, Reinventing Operational Risk Regulation for a World of Climate Change, Cyberattacks, and Tech Glitches, 49 J. Corp. L. 727, 759 (2024). If, by linking all the players in a financial system, we improve efficiencies in normal times but increase the chance that the players will all fail together if something goes wrong, then that will undermine financial stability. The same could be said of a financial system where just a few cloud computing providers efficiently store critical data for all of the world’s financial institutions.268Id. at 757–58; U.S. Dep’t of Treasury, The Financial Services Sector’s Adoption of Cloud Services 57 (2023), https://home.treasury.gov/system/files/136/Treasury-Cloud-Report.pdf [https://perma.cc/6VMQ-XD2Q].

The broader idea behind open banking is to use APIs to make it easier for bank customers to share their data with, and thus obtain services from, other fintech providers. While pitched as a solution to some of the barriers to competition discussed in Section II.C, the rise of open banking implicates important questions about information security that we need to grapple with. Most obviously, using insecure APIs to transmit data creates opportunities for data breaches, fraud, and identity theft (fintech lending business models that assemble extensive non-traditional data profiles to address the creditworthiness of their users will also be attractive targets for such practices).269The information economy has given rise to a “seemingly continuous stream of major data breaches and epidemic levels of fraud and identity theft” where “vulnerability is a given, and eventual loss seems only a matter of time.” Cohen, supra note 17, at 101. But the sharing of data contemplated by open banking will also generate more subtle threats to our informational security, in the form of increased surveillance by an increased number of parties who can then use that data to manipulate us and others like us.

Raul Carillo has noted that fintech firms, like other technology companies, “reconstitute people into ‘data doubles,’ which can then be sorted, stored, scored, shared, and sold.”270Carillo, supra note 75, at 1210. The increased sophistication of machine learning technology is only making this kind of data more valuable.271Solow-Niederman, supra note 149, at 6. Data about consumers’ payments are particularly valuable, because those data yield rich, detailed, and unvarnished insights into how individuals behave and what they value.272Carillo, supra note 75, at 1211. On the value of unmediated data, see Cohen, supra note 17, at 84. Individuals will often fail to understand how their payments data might be used or what it communicates about them,273Solow-Niederman, supra note 149, at 1. but this kind of data can be used to surveil and then manipulate them.274Carillo, supra note 75, at 1222. For example, Consumer Finance Protection Bureau (“CFPB”) Director Rohit Chopra raised concerns that “Big Tech firms can use detailed payments data to develop personalized pricing algorithms for e-commerce or increase engagement with behavioral advertising.”275Rohit Chopra, CFPB Director, Remarks at the Global Financial Innovation Network’s Annual General Meeting (Nov. 8, 2023), https://www.consumerfinance.gov/about-us/newsroom/prepared-remarks-of-cfpb-director-rohit-chopra-at-the-global-financial-innovation-networks-annual-general-meeting [https://perma.cc/6CFW-UGXU]. Alicia Solow-Niederman has emphasized that machine learning technology can now be deployed to “use available data collected from individuals to generate further information about both those individuals and about other people,” and these inferences can then be used to predict people’s behavior, manipulate them, and color reputations.276Solow-Niederman, supra note 149, at 5; see also Cohen, supra note 17, at 76. Payments platforms may even use the data they collect about their users to deplatform them, censoring people’s ability to engage in financial transactions.277“PayPal updated its regulations to give itself the power to levy fines and take other punitive actions, including deplatforming, against users engaged in conduct that would not otherwise violate federal law. (PayPal withdrew the regulation.)” Rohit Chopra, CFPB Director, Remarks at the Brookings Institution Event on Payments in a Digital Century (Oct. 6, 2023), https://www.consumerfinance.gov/about-us/newsroom/prepared-remarks-of-cfpb-director-rohit-chopra-at-the-brookings-institution-event-on-payments-in-a-digital-century [https://perma.cc/VC3C-VTPS]. These kinds of harms are not distributed equally, and often the most vulnerable groups will be surveilled the most as well as suffer the most from this surveillance: “[M]any lower-income users rely exclusively on mobile platforms that are less versatile, less amenable to user customization and control, and designed to maximize data sensing and harvesting.”278Cohen, supra note 17, at 177.

The subtle and not-so-subtle harms associated with payments data collection prompt a need to minimize the collection of payments data in the first place.279Carillo, supra note 75, at 1227–28. Fintech once again proposes a techno-solutionist solution to this problem, in the form of the pseudonymous blockchain. However, the blockchain does not minimize the production of data—it still records every transaction on the blockchain, although it cloaks them in pseudonymity.280Id. at 1240. Blockchains make all transactions associated with a public key visible to everyone—meaning that once someone (law enforcement, an intimate partner, a stalker) knows someone’s public key, they can easily identify all of their transactions.281Anna P. Kambhampaty, Alisha Haridasani Gupta & Valeriya Safronova, Crypto Joins the Abortion Conversation, N.Y. Times (May 14, 2022), https://www.nytimes.com/2022/05/14/style/abortion-crypto-donations.html [https://web.archive.org/web/20241201161402/https://www.nytimes.com/2022/05/14/style/abortion-crypto-donations.html]. This reality exposes the folly of techno-solutionist proposals to use crypto to assist women seeking abortions in the United States, for example.282Id. As one New York Times article put it, “though many crypto enthusiasts dangle the lure of anonymity . . . because of the precision with which the blockchain traces transactions, paying for abortions using crypto could potentially have the opposite effect: exposing both the women getting abortions and the people paying for them.”283Id. And not only is the blockchain itself highly legible, but those who use blockchain-based financial services typically also rely on a number of intermediaries who can also collect user data.284Carillo, supra note 75, at 1245. For a discussion of the different kinds of crypto intermediaries who may collect data, see Hilary J. Allen, DeFi: Shadow Banking 2.0?, 64 Wm. & Mary L. Rev. 919, 924 (2023).

If we truly wish to minimize the production of payments data, the most simple solution does not require any technology—lawmakers could take steps to preserve physical cash infrastructure, as cash transactions do not generate any data (there are also financial inclusion and resilience justifications for ensuring that cash continues to be accepted).285Brett Scott, Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets 191–92, 200 (2022); Hilary J. Allen, Payments Failure, 62 B.C. L. Rev. 453, 513 (2021). As a supplement to physical cash, Carillo proposes a “Postal Cash Card” that can store value and facilitate transactions in a way that emulates debit cards but does not generate any data about the holder.286Carillo, supra note 75, at 1295–99. Carillo’s proposal is an illustration of the principle that rejecting techno-solutionism does not necessarily mean rejecting technology: he has proposed a technological innovation (the card), but also provided a detailed proposal about the institutional context in which it will be offered (non-profit, at the post office), in a way that is responsive to expressed privacy concerns and pushes back against the tide of “data-vacuuming” in for-profit technological development. Carillo’s proposal also supplies another illustration of the point that when it comes to technological innovation, incentives matter, and so a technology developed by a public entity for a non-profit purpose is more likely to avoid the siren song of mass data collection than a private sector payments technology.

III.  Financial Regulation and Techno-Solutionism

The previous Parts have described what techno-solutionism is and how it manifests in the context of fintech. As part of that discussion, Part II identified a panoply of fintech harms in need of regulation, but the law’s ability to rein in such harms is often stymied by techno-solutionism that it helps perpetuate. We certainly should not assume that the law is the only thing at work here—techno-solutionism is itself a complex phenomenon with many causes.287See supra notes 24–26 and accompanying text. However, illuminating financial regulation’s relationship with techno-solutionism is an important precondition to addressing the negative impacts of fintech.

A.  Quick Primer on Financial Regulation

This Article has already observed that technology businesses are constructed in part by law; as Katharina Pistor has explained, the same is true for finance.288Pistor, supra note 228, at 321. Financial regulation is a constitutive part of fintech’s evolution, but the law as applied to fintech has sometimes had an unhealthy relationship with techno-solutionism. One problem with techno-solutionism is that it downplays the value of non-technological domain area expertise,289See supra notes 50–53 and accompanying text. but the history and context for why we regulate finance are critical parts of any discussion of how the law should address fintech. This Section therefore provides some background on financial regulation more generally, before the next Section demonstrates how financial regulation can both facilitate and be inhibited by techno-solutionism.

We have already explored techno-solutionism’s false neutrality.290See supra notes 32–36 and accompanying text. More specifically to fintech, Omarova observes that “even the most advanced technology is merely a tool. How to use it—for what purposes, and to what effect—is a choice.” Omarova, supra note 191, at 76. Along with this false neutrality often comes a false equivalence where different applications of technologies are painted as equally transformative and equally worthy of pursuit, notwithstanding that the benefits and costs of different applications will inevitably vary. We often hear fintech services analogized to other internet services—“send money around the world as easily as you can send an email”291See, e.g., Decentralized Finance (DeFi), Ethereum, https://ethereum.org/en/defi [https://perma.cc/J8H6-SVB9] (“Ethereum makes sending money around the world as easy as sending an email.”).—but losing money is much more consequential than losing an email (certainly for the person involved, and potentially also for confidence in financial institutions and the broader financial system). Because the stakes are so high, and because we have so many historical examples of things going badly wrong in the financial system, finance has long been heavily regulated—in a way that couriered letters never were. Techno-solutionists ignore that history at their (or rather, our) peril.

Financial regulatory agencies are typically given mandates to pursue one or more of the following “menu” of financial regulatory goals: financial stability, consumer protection, investor protection, market efficiency, competition, and preventing financial crime.292Armour et al., supra note 112, at 61–69. It should be noted that the Commodity Futures Trading Commission’s (“CFTC”) mandate to pursue market integrity does not fit easily into this menu but relates most closely to missions to promote market efficiency. Notably, no U.S. financial regulatory agency has an express statutory mandate to promote innovation. Instead, the banking agencies (the Federal Deposit Insurance Corporation (“FDIC”), Office of the Comptroller of Currency (“OCC”), and the Federal Reserve) were all formed in response to episodes of financial instability, and all have some form of “safety and soundness” mandate oriented toward ensuring the stability of the financial system293Hilary J. Allen, Regulating Fintech: A Harm Focused Approach, 52 Comput. L. & Sec. Rev. 1, 2–3 (2024). (a council of these and other regulatory agencies known as the Financial Stability Oversight Council has an explicit mandate to promote financial stability).294Dodd-Frank Wall Street Reform and Consumer Protection Act, Pub. L. No 111-203, § 112(a), 124 Stat. 1394–96 (2010) (codified at 15 U.S.C. § 5322). Financial stability regulation can have microprudential and macroprudential orientations: a microprudential approach seeks to ensure the solvency of individual financial institutions, whereas a more macroprudential approach seeks to protect the financial system as a whole by understanding and responding to how those financial institutions are interconnected, and to other market dynamics.295Jeremy C. Kress & Jeffery Y. Zhang, The Macroprudential Myth, 112 Geo. L.J. 569, 578 (2024). Regardless of orientation, the ultimate goal of financial stability regulation is to ensure that the financial system can continue to supply the credit and transactional services on which the broader economy depends for growth.296When a financial system is stable, it is “able to withstand shocks without giving way to cumulative processes which impair the allocation of savings to investment opportunities and the processing of payments in the economy.” Tommaso Padoa-Schioppa, Central Banks and Financial Stability: Exploring a Land in Between 20 (Second ECB Cent. Banking Conf., Policy Panel Introductory Paper, 2002), http://www.ecb.de/events/pdf/conferences/tps.pdf [https://perma.cc/8ZJH-3EQC].

Market regulators like the Securities and Exchange Commission (“SEC”), Commodity Futures Trading Commission (“CFTC”), and CFPB were also formed in response to specific episodes of public harm. The SEC was created as an investor protection body in the wake of the stock market crash of 1929 and ensuing Great Depression (later, in 1996, the SEC was given additional mandates to promote efficiency and capital formation).297National Securities Markets Improvement Act of 1996, Pub. L. No. 104-290, § 106, 110 Stat. 3424–25 (1996). The CFTC was created in 1974 in response to concerns about excessive speculation and manipulation in agricultural futures markets.298In 1973, “[g]rain and soybean futures prices reach record highs. This is blamed in part on excessive speculation and there are allegations of manipulation. Congress begins to consider revising the Federal regulatory scheme for commodities.” History of the CFTC: US Futures Trading and Regulation Before the Creation of the CFTC, CFTC, https://www.cftc.gov/About/HistoryoftheCFTC/history_precftc.html [https://web.archive.org/web/20241225012428/https://www.cftc.gov/About/HistoryoftheCFTC/history_precftc.html]. The CFPB was formed in 2010 as a response to the consumer protection failures that contributed to the 2008 financial crisis,299Leonard J. Kennedy, Patricia A. McCoy & Ethan Bernstein, The Consumer Financial Protection Bureau: Financial Regulation for the Twenty-First Century, 97 Cornell L. Rev. 1141, 1144–45 (2012). and has mandates to protect consumers and promote competition.300“The Bureau shall seek to implement and, where applicable, enforce Federal consumer financial law consistently for the purpose of ensuring that all consumers have access to markets for consumer financial products and services and that markets for consumer financial products and services are fair, transparent, and competitive.” 12 U.S.C. § 5511. In 2023, some Republican lawmakers sought to give the SEC an additional mandate to promote innovation, but the provision was eventually struck from the proposed legislation (had such a provision been enacted, it would no doubt have served as a weapon for those seeking to invalidate the SEC’s investor protection rules on the grounds that they stifled innovation).301Hilary J. Allen, The SEC Should Not Sacrifice Citizens on the Altar of Private Sector Innovation, The Hill (July 18, 2023, 9:00 AM), https://thehill.com/opinion/finance/4101392-the-sec-cannot-sacrifice-citizens-on-the-altar-of-private-sector-innovation [https://web.archive.org/web/20231106022916/https://thehill.com/opinion/finance/4101392-the-sec-cannot-sacrifice-citizens-on-the-altar-of-private-sector-innovation]. In the absence of any express innovation mandates, efficiency and competition mandates are the ones typically invoked to justify innovation-friendly regulatory policies.

While it is possible to interpret efficiency and competition mandates as complementary to the goals of investor and consumer protection and financial stability,302For example,

[i]f the genesis of financial regulation was the desire to force the financial industry to internalize the costs of the harm it creates for others, then it would be more consistent with that harm reduction function to interpret the efficiency criterion in a distributionally sensitive way and consider what would be more efficient from the perspective of society more broadly.

Allen, supra note 293, at 5 (emphasis omitted).
efficiency and competition mandates are often framed in ways that conflict with those other goals (for example, as Part II explored, fintech that has been touted as promoting efficiency and competition can come at the price of exposing consumers and investors to predatory inclusion). If it is assumed that technology is the best, easiest, or only way to improve efficiency and competition, this techno-solutionist framing will lend itself to accommodative regulatory strategies that sacrifice investor, consumer, and financial stability protection goals. This is not just an issue for regulators: lawmakers in Congress have also sometimes been swayed by techno-solutionism. The next Section will consider whether fintech-specific legislative and regulatory proposals have helped perpetuate techno-solutionism in a way that undermines financial regulation’s ability to protect the public from harm.

B.  Financial Regulation and Techno-Solutionism

Fintech poses many challenges for the enterprise of financial regulation: as Saule Omarova has observed, fintech disrupts financial regulation’s “basic normative thrust, its hierarchy of goals, its procedural mechanisms and tools, and its practical efficacy.”303Omarova, supra note 191, at 77. For further discussion of the challenges that fintech poses for financial regulation, see Allen, supra note 113, at 135–62. Furthermore, there are some truly novel privacy-type harms arising from the movement toward an economy “oriented principally toward the production, accumulation, and processing of information,” and existing financial regulation is not up to protecting against these kinds of harms.304Cohen, supra note 17, at 6. For example, existing financial privacy statutes (like the Gramm-Leach-Bliley Act) are simply not up to the task of responding to the types of privacy concerns explored in Section II.D,305Carillo, supra note 75, at 1224. and existing financial regulation would similarly struggle to address the harms that would arise from the integration of large tech platforms and finance.306Section 4 of the Bank Holding Company Act (“BHC Act”) enforces a separation between deposit-taking banks and other commercial enterprises but does nothing to separate commercial enterprises from lending or payments activities. 12 U.S.C. 1843. There are also loopholes in the BHC Act’s definition of “bank” for things like industrial loan companies that tech platforms may seek to exploit. See infra note 332. With all that said, though, existing financial regulation can still force a reckoning with many of the negative consequences of fintech innovation and require them to be remedied. We have decades of experience with many of the kinds of harms that fintech is inflicting, and many of the problems raised in Part II have solutions based in existing legal remedies. The fact that new technologies have come to play an increasingly important role in delivering financial services has sometimes been weaponized (through cognitive capture and related strategies) to obscure the applicability of existing law, but we should not unquestioningly accept the premise that all previous grants of regulatory authority (and the rules implementing them) are hopelessly outmoded and obsolete as a result of technological change.

This Section will look at fintech-specific legislative proposals and administrative actions that illustrate how techno-solutionism is impacting the creation of new financial regulation, and the implementation of existing financial regulation (this is not a comprehensive survey of all fintech-related financial regulation to date, but instead a series of illustrative examples). The Section will finish by looking at a developing area of financial regulatory practice: regulation of the financial industry’s use of AI.

  1. Legislative Proposals

As of the date of writing, the United States Congress has not enacted any fintech-specific legislation. However, a number of fintech-related bills have been introduced, and in a context where norms about how to respond to fintech and its harms are still developing, these bills can have an expressive valence. Some of these bills express the standard techno-solutionist message that

government regulation will stifle innovation in the dynamic tech sector, that it is unnecessary because market forces and the tech companies’ own benevolence will prevent social harms, and that, where regulation is called for, self-regulation is the only effective way to order the behavior of companies in this complex industry.307Short et al., supra note 55, at 4.

Other proposed bills have sought to address the harms associated with fintech business models and serve as something of a counterbalance to the formation of techno-solutionist norms.

In particular, a number of crypto-related bills have been introduced into Congress. Some of these bills are targeted narrowly at the harms associated with using crypto for money laundering and sanctions evasion, consistent with the regulatory goal of preventing financial crime.308See, e.g., Digital Asset Anti-Money Laundering Act, S. 2669, 118th Cong. (2023). The more far-reaching bills, however, (like the Lummis-Gillibrand Responsible Financial Innovation Act,309S. 4356, 117th Cong. (2022). the Digital Commodities Consumer Protection Act,310S. 4760, 117th Cong. (2022). and the Financial Innovation and Technology for the 21st Century Act311H.R. 4763, 118th Cong. (2023). passed by the House of Representatives in May 2024) are widely regarded to have been driven by the crypto industry and their VC funders.312“Crypto lobbyists pushed heavily for [the Financial Innovation and Technology for the 21st Century Act] on Capitol Hill, and the bill was publicly supported by leading voices in the industry including Coinbase, The Block, and Digital Currency Group.” Sophia Kielar & Samidh Guha, The Future of Crypto Regulation: What is FIT 21?, Thomson Reuters (Sept. 20, 2024), https://www.thomsonreuters.com/en-us/posts/government/crypto-regulation-fit-21 [https://perma.cc/A95J-KMEE]; see also Cheyenne Ligon, The ‘SBF Bill’: What’s in the Crypto Legislation Backed by FTX’s Founder, CoinDesk (Nov. 15, 2022, 3:05 PM), https://www.coindesk.com/policy/2022/11/15/the-sbf-bill-whats-in-the-crypto-legislation-backed-by-ftx-founder [https://perma.cc/8LUN-ULC4]. The same dynamic is playing out at the state level. See Eric Lipton & David Yaffe-Bellany, Crypto Industry Helps Write, and Pass, Its Own Agenda in State Capitols, N.Y. Times (Apr. 10, 2022), https://www.nytimes.com/2022/04/10/us/politics/crypto-industry-states-legislation.html [https://web.archive.org/web/20240907152718/https://www.nytimes.com/2022/04/10/us/politics/crypto-industry-states-legislation.html]. Given their genesis, these bills are unsurprisingly deeply techno-solutionist in orientation, ignoring the history and context that led to the development of existing financial regulatory structures in their bid to allow the crypto industry to innovate outside of these structures: House Financial Services Committee leadership described its bill as “facilitating a regulatory environment that allows this technology to flourish in the United States.”313Press Release, Patrick McHenry, Chairman, House Fin. Servs. Comm., McHenry Delivers Opening Remarks at Historic Markup of Comprehensive Digital Asset Market Structure Legislation (July 26, 2023), https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=408928 [https://perma.cc/FBQ9-QCW4].

Among other problems, these bills seek to remove the vast majority of crypto assets from the investor protection oversight of the SEC and give jurisdiction to the CFTC—a regulatory body that has significantly fewer resources than the SEC, lacks a statutory investor protection mandate or culture of protecting retail investors, and also allows exchanges to self-certify the assets they list.314For elaboration on these types of concerns, see Letter from Dennis M. Kelleher to House Agricultural and Financial Services Committee Leadership Regarding Concerns About Provisions in the Digital Asset Market Structure Discussion Draft (July 11, 2023) [hereinafter Kelleher Letter], https://bettermarkets.org/wp-content/uploads/2023/07/Final-Ltr-to-FSCAG-re-cryptocurrency-.pdf [https://perma.cc/TRN5-T7WE]. For more on the CFTC and self-certification, see Lee Reiners, Bitcoin Futures: From Self-Certification to Systemic Risk, 23 N.C. Banking Inst. 61, 90–92 (2019). Doing so would deprive investors of the protections afforded by the SEC’s registration and disclosure regime for public offers and sales of securities, as well as the protections of securities broker/dealer and exchange registration requirements that would help mitigate the conflicts of interest inherent in the crypto exchange business model.315Kelleher Letter, supra note 314, at 2–5. As I testified in 2022, these kinds of bills “are designed to offer fewer investor protections than the existing securities laws, and they were intentionally designed in this way in order to facilitate crypto innovation.”316Hearing on Crypto Crash: Why the FTX Bubble Burst and the Harm to Consumers Before the S. Comm. on Banking, Hous., & Urb. Affs., 117th Cong. (2022) [hereinafter Allen Testimony] (statement of Hilary J. Allen, Professor of Law, American University Washington College of Law), https://www.banking.senate.gov/imo/media/doc/Allen%20Testimony%2012-14-22.pdf [https://perma.cc/EV9C-NR2K]. They would also lend legitimacy and credibility to crypto assets in the eyes of both retail and institutional investors, expanding a market for such assets that the industry has struggled to sustain in the absence of government endorsement.317Faverio, Dawson & Sidoti, supra note 167. Furthermore, these bills would create regulatory arbitrage opportunities outside of the crypto industry: while crypto advocates have described these bills as bespoke regimes for crypto, issuers of other types of securities would also have incentives to migrate into the new, lighter-touch regime (which would seemingly be accessible to them if they simply recorded ownership of their securities on a blockchain). Finally, these bills often suffer from trying to tie law too specifically to crypto technology and business models at a particular moment in time, ensuring that technological innovation could be used to arbitrage any such law that is enacted, quickly rendering the investor protections that are included in the bill obsolete.

There have also been crypto bills introduced that would undermine the financial stability regulation implemented by the federal banking agencies by creating new lighter-touch regulatory regimes for stablecoins.318In commenting on the Lummis-Gillibrand bill, Wilmarth notes that it includes

excessively lenient chartering criteria and dangerously weak capital standards for stablecoin issuers, woefully inadequate supervisory powers over stablecoin issuers and entities controlling those issuers, nonexistent stabilizing measures (like federal deposit insurance) to reduce the risks of contagion from failures of stablecoin issuers, misguided opportunities for stablecoin issuers to engage in risky derivatives activities, and a disturbing lack of regulatory controls over stablecoin transactions occurring on crypto exchanges and other crypto trading venues.

Arthur E. Wilmarth, Jr., Policy Brief: Congress Should Reject the Lummis-Gillibrand Stablecoin Bill Because It Would Endanger Consumers, Investors, and Our Financial System 1 (Apr. 30, 2024) (unpublished manuscript), https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2989&context=faculty_publications [https://perma.cc/76SB-YGUS].
The stated aim of these bills is to support stablecoins as “an exciting technological development that could transform money and payments,”319Toomey Introduces Legislation to Guide Future Stablecoin Regulation, U.S. S. Comm. on Banking, Hous. & Urb. Affs. (Dec. 21, 2022), https://www.banking.senate.gov/newsroom/minority/toomey-introduces-legislation-to-guide-future-stablecoin-regulation [https://perma.cc/ZJU8-GALP]. notwithstanding that from a technological perspective, stablecoins are extremely ill-suited to large-scale payments processing.320Regarding the costs and delays associated with processing transactions on a blockchain, see White, supra note 40; Levitin, supra note 114, at 144. As I previously testified regarding the Stablecoin TRUST Act introduced by then-Senator Toomey, the Lummis-Gillibrand Responsible Financial Innovation Act, and a draft House Financial Services Committee stablecoin bill:

If any of these bills were enacted, they would authorize banks to issue stablecoins, making it highly probable that the Federal Reserve would feel compelled to bail out a failing stablecoin (which would operate as an indirect bailout of the crypto speculation the stablecoins are used for). Even more problematic, those bills would also authorize non-banks to issue stablecoins, yet be subject to lighter-touch regulation ex ante than traditional banks.321Allen Testimony, supra note 316.

This critique applies equally to a later iteration of the House Financial Services Committee stablecoin bill that was voted out of committee in July 2023.322Clarity for Payment Stablecoins Act, H.R. 4766, 118th Cong. (2023).

The techno-solutionism inherent in these crypto bills is all the more striking because crypto inverts the typical dynamic where the benefits of innovation are immediately obvious, but the harms take longer to manifest. As Federal Reserve Vice Chair for Supervision Michael Barr has observed, people often “assume too quickly that they know how the new products work, and novel products can appear both safe and lucrative, particularly if they have not been tested through bouts of market stress.”323Michael S. Barr, Vice Chair for Supervision, Bd. of Governors of the Fed. Rsrv. Sys., Remarks at the Peterson Institute for International Economics, Supporting Innovation with Guardrails: The Federal Reserve’s Approach to Supervision and Regulation of Banks’ Crypto-Related Activities (Mar. 9, 2023), https://www.federalreserve.gov/newsevents/speech/barr20230309a.htm [https://perma.cc/Q2TN-ZSVE]. This kind of dynamic can unsurprisingly make lawmakers loath to crack down on new technologies with evident benefits, but with crypto, harms have been evident for some time, while the industry still struggles to articulate concrete use cases after fifteen years.324Regarding use cases (and lack thereof), see White, supra note 40. Regarding harms, for a running tally of crypto hacks, scams, and frauds impacting consumers, see Web3 is Going Just Great, supra note 170. For a discussion of the environmental toll of crypto that relies on proof-of-work blockchains, see Sanaz Chamanara, S. Arman Ghaffarizadeh & Kaveh Madani, The Environmental Footprint of Bitcoin Mining Across the Globe: Call for Urgent Action, 11 Earth’s Future 1, 2 (2023). For a discussion of the use of crypto for money laundering, ransomware attacks, and sanctions evasion, see generally Hearing on Understanding the Role of Digital Assets in Illicit Finance Before the S. Comm. on Banking, Hous., & Urb. Affs., 117th Cong. (2022) [hereinafter Stansbury Testimony] (statement of Shane T. Stansbury, Professor of Law, Duke University School of Law), https://www.banking.senate.gov/imo/media/doc/Stansbury%20Corrected%20Statement%203-17-22.pdf [https://perma.cc/RV92-3R58]. As explored in Part II, there are strong impediments to crypto-related innovation ever delivering on its promises of financial inclusion, efficiency, competition, and privacy: it is a testament to the rhetorical power of techno-solutionism that facilitating this “solution in search of a problem” remains a defensible goal for many Members of Congress.

Of course, techno-solutionism is not the only force at work here. When it came time to vote on the Financial Innovation and Technology for the 21st Century Act, Members of Congress facing tough reelection campaigns were loath to draw the ire of the crypto industry (the pro-crypto Fairshake Political Action Committee amassed an unprecedented $114 million war chest from the crypto industry and prominent venture capitalists to spend in the 2024 election cycle).325Rick Claypool, Big Crypto, Big Spending: Crypto Corporations Spend an Unprecedented $119 Million Influencing Elections, Pub. Citizen (Aug. 21, 2024), https://www.citizen.org/article/big-crypto-big-spending-2024 [https://perma.cc/LEJ5-6DKL]. But still, techno-solutionism was used as window dressing. When that bill was passed by the House of Representatives with bipartisan support, House Financial Services Committee Chair Patrick McHenry made the following statement:

FIT21 provides the regulatory clarity and robust consumer protections necessary for the digital asset ecosystem to thrive in the United States. The bill also ensures America leads the financial system of the future and remains a hub for technological innovation.326Press Release, Financial Services Committee, House Passes Financial Innovation and Technology for the 21st Century Act with Overwhelming Bipartisan Support (May 22, 2024), https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=409277 [https://perma.cc/8477-6U7E].

Some other non-crypto fintech bills have evinced a less techno-solutionist approach to fintech business models, though. For example, Congressman Jesus García introduced a “Close the ILC Loophole Act,”327H.R. 5912, 117th Cong. (2022). designed to prevent technology platform companies from exploiting a loophole in the Bank Holding Company Act that could allow those companies to acquire banks without being regulated by the Federal Reserve (which would essentially allow them to avoid financial stability regulation).328Senator Sherrod Brown introduced similar legislation in 2023 titled Close the Shadow Banking Loophole Act, S. 3538, 118th Cong. (2023). Congressman Lynch also introduced an “ECASH Act”329Electronic Currency and Secure Hardware (ECASH) Act, H.R. 7231, 117th Cong. (2022). that proposed to direct the Treasury Department to develop and issue “an electronic version of the U.S. Dollar for use by the American public.”330Press Release, Stephen F. Lynch, U.S. Representative (MA-08), Rep. Lynch Introduces Legislation to Develop Electronic Version of U.S. Dollar (Mar. 28, 2022), https://lynch.house.gov/2022/3/rep-lynch-introduces-legislation-to-develop-electronic-version-of-u-s-dollar [https://perma.cc/48X5-M5GE]. This bill is an example of technology-focused public policy that is not techno-solutionist: it is focused on developing technology to solve financial inclusion concerns, but is sensitive to non-technological context. In particular, in response to the kinds of consumer protection and privacy concerns raised in Section II.D, the proposal for ECASH is intended to “preserve a role in our financial system for smaller anonymous cash-like transactions which are currently transacted in physical dollars, and which have seen a rapid decline in use.”331Id.

  1. Administrative Action

While this discussion has focused so far on Congress, the federal financial regulatory agencies are on the front lines of dealing with fintech in the United States (state regulation is also relevant but largely beyond the scope of this Article).332For a discussion of states’ regulatory treatment of crypto, see Arthur E. Wilmarth, Jr., We Must Protect Investors and Our Banking System from the Crypto Industry, 101 Wash. U. L. Rev. 235, 269–71 (2023); Lipton & Yaffe-Bellamy, supra note 312. For a discussion of state regulation of fintech lending, see generally Odinet, supra note 21. Unlike unpassed legislation, the actions taken by regulatory agencies can have more than just normative valence. We will now examine a sample of the fintech-related rulemaking, monitoring, and enforcement activities of financial regulators and consider whether they are perpetuating, or being stymied by, techno-solutionism.

Acting Comptroller of the Currency Michael Hsu identified a dichotomy between regulators “taming” and “accommodating” financial innovation. Taming forces the technology to “conform to regulatory standards,” whereas an accommodative stance that dictates that “regulation should adjust to . . . and accept the new technology and possibilities for what they are” is much more techno-solutionist.333Michael J. Hsu, Acting Comptroller of the Currency, Remarks to the Harvard Law School and Program on International Financial Systems Roundtable on Institutional Investors and Crypto Assets: “Don’t Chase,” 3 (Oct. 11, 2022), https://www.occ.gov/news-issuances/speeches/2022/pub-speech-2022-126.pdf [https://perma.cc/XUR3-8DNS]. Accommodative regulators may take steps to actively loosen regulatory requirements, but often, accommodation takes the form of inaction with regulators simply refraining from exercising their jurisdiction when new technologies are involved. Either way, an overly accommodative stance will subordinate regulatory goals to the claimed promise of the technology, neglecting the reality that sometimes the negative consequences of a technology are such that accommodating that technology is bad policy (particularly if the technology itself is considered by independent experts to have limited utility).334See, e.g., note 162 and accompanying text.

Another framing that financial regulators often use when discussing fintech regulation is “tech neutrality,”335Janet L. Yellen, Secretary of the Treasury, Remarks from Secretary of the Treasury Janet L. Yellen on Digital Assets (Apr. 7, 2022), https://home.treasury.gov/news/press-releases/jy0706 [https://perma.cc/5F9L-SGJ8]. or “same activity, same risk, same rules.”336Wilmarth, Jr., supra note 332, at 314. This is often a good starting point for taming fintech, because it recognizes that regulatory arbitrage should not be allowed simply because a new kind of technology is involved: techno-solutionism may otherwise lull us into believing that new technologies are doing the disrupting, when in reality the only disruption may be lawyers devising new regulatory arbitrage strategies that can be “sold” to lawmakers using techno-solutionist rhetoric. However, a posture of technological neutrality can turn out to be accommodative in practice if regulators are too amenable to the fintech industry’s own techno-solutionist descriptions of activities and risks as novel, or if regulators assume that the technology is just another way of discharging an existing economic function and won’t pose any sui generis risks of its own.

Regulators should dig beneath the techno-solutionism to ask fundamental preliminary questions about whether a technology actually performs the activity its purveyors say it performs—otherwise regulators may mistakenly apply the wrong regulatory regime. They also need to ask whether changes in technological delivery mechanisms are creating new kinds of risks (for example, new technology-related operational risks). Although existing regulatory approaches will often be useful, sometimes new methods will need to be devised in order to discharge existing mandates in a financial system populated by new technologies. Regulators should not be deterred from developing these new methods by a desire to be perceived as technology neutral.

Unfortunately, reality does not always meet these ideals. This is no doubt due, in part, to cognitive capture. The financial industry has long weaponized complexity to deflect regulatory scrutiny,337Awrey, supra note 122, at 275–76. but with the rise of fintech, that financial complexity is being overlaid with technological complexity. Many financial regulatory agencies are primarily staffed with lawyers, economists, and accountants who may need to rely on the fintech industry to help them understand how a particular technology works,338Omarova, supra note 191, at 101. and this can be a fertile environment for cognitive capture to develop. Of course, individual agency personnel are just that—individuals. It is often remarked that “personnel is policy,”339See, e.g., Jeff Hauser & David Segal, Personnel Is Policy, Democracy J. (Feb. 6, 2020, 3:43 PM), https://democracyjournal.org/magazine/personnel-is-policy [https://perma.cc/DB7D-VK8E]. and those with some technological expertise may feel more empowered to push back against techno-solutionism.

An individual regulator’s susceptibility to techno-solutionism may also be impacted by their political ideology. Techno-solutionism is often aligned with libertarianism,340See Short et al., supra note 55, at 4. and those dispositionally opposed to government involvement will, all things being equal, probably be more supportive of agency policies that accommodate private sector innovation. The following discussion of fintech-related administrative actions sometimes demonstrates whipsaws in an agency’s fintech policy that can be partially explained by changes in the political orientation of agency leadership. This dynamic has been most obvious with the CFPB; at the other end of the spectrum, the SEC has been quite consistent in its fintech policy across administrations.341Gary Gensler, Chairman of the SEC, Speech: Kennedy and Crypto (Sept. 8, 2022), https://www.sec.gov/news/speech/gensler-sec-speaks-090822 [https://perma.cc/WT8J-5NMP].

i.  Rulemaking and Guidance

There have been some proposals for formal fintech-specific administrative rulemakings, but federal financial regulatory agencies have often preferred to issue informal guidance when it comes to fintech. The formal rulemaking process has sometimes struggled to address rapid technological change in a timely manner,342See Tim Wu, Agency Threats, 60 Duke L.J. 1841, 1841–43 (2011). and the Supreme Court’s embrace of the major questions doctrine has created greater uncertainty about courts’ willingness to invalidate rulemakings pertaining to new technologies.343Daniel T. Deacon & Leah M. Litman, The New Major Questions Doctrine, 109 Va. L. Rev. 109, 1087–88 (2023). Regarding the application of the major questions doctrine to crypto, see Chris Brummer, Yesha Yadav & David Zaring, Regulation by Enforcement, 96 S. Cal. L. Rev. 1297, 1328–29 (2024). In June of 2024, the Supreme Court also overruled the longstanding Chevron precedent that had previously directed courts to defer to reasonable agency interpretations of statutory provisions.344Loper Bright Enters. v. Raimondo, 144 S. Ct. 2244, 2273 (2024). Given these challenges, it is unsurprising that regulators of all stripes have often preferred to rely on more nimble informal guidance when it comes to fintech.

Like the legislative proposals discussed above, fintech-related informal guidance and proposed rulemakings have been a mixed bag with some embracing, and some rejecting, techno-solutionist approaches. Notably accommodative administrative actions include the OCC’s 2018 announcement of a nonbank fintech charter and the CFPB’s 2019 proposal for a fintech regulatory sandbox. Both of these had a techno-solutionist orientation, although neither were ultimately successful in their accommodations. The OCC’s proposed fintech charter was a response to concerns that nonbank fintech firms had to comply with consumer protection regulations in every state where they did business.345Recent Policy Statement, Office of the Comptroller of the Currency, Policy Statement on Financial Technology Companies’ Eligibility to Apply for National Bank Charters, 132 Harv. L. Rev. 1361, 1361 (2019) (citing Office of the Comptroller of the Currency, Policy Statement on Financial Technology Companies’ Eligibility to Apply for National Bank Charters 1 (2018), https://www.occ.gov/publications/publications-by-type/other-publications-reports/pub-other-occ-policy-statement-fintech.pdf [https://perma.cc/KS3S-JTQC]). A national special purpose charter from the OCC would have preempted many of these state consumer protection regulations—and the OCC justified the proposal on the assumption that it would facilitate technological innovation that would further financial inclusion.346Id. at 1363. Ultimately, however, this proposal was mired in legal challenges and industry largely eschewed the fintech charter.347Id. at 1366–68.

The CFPB’s proposed “Compliance Assistance Sandbox” also sought to preempt the enforcement of state consumer protection laws but was ultimately abandoned for failing to advance its “stated objective of facilitating consumer-beneficial innovation.”348CFPB, Statement on Competition and Innovation (Sept. 30, 2022), https://public-inspection.federalregister.gov/2022-20896.pdf [https://perma.cc/5GN3-2MFG]. Before it was abandoned, though, this sandbox had a very techno-solutionist orientation. For example, in a policy document that was incorporated by reference into the Compliance Assistance Sandbox policy, the CFPB expressly rejected a consumer group’s contention that a sandbox was unnecessary because fintech products rarely raised “novel questions of law and policy.”349CFPB, Policy on No Action Letters 5–6 (Sept. 10, 2019), https://files.consumerfinance.gov/f/documents/cfpb_final-policy-on-no-action-letters.pdf [https://perma.cc/C44L-YMDF]. The policy document also stated the techno-solutionist position that “the Bureau’s statutory mission of protecting consumers is not limited to vigorously enforcing the law. It includes facilitating innovation in markets for consumer financial products and services, as innovation drives competition, which in turn lowers prices and promotes access to more and better products and services.”350Id. at 2.

Regulatory sandboxes have been adopted elsewhere (both internationally and at the state level in the United States) and are generally techno-solutionist in orientation: they loosen financial regulations and use scarce regulatory resources for the primary purpose of promoting private-sector fintech innovation.351Allen, supra note 58, at 580. This implicitly positions “regulation” as the problem that needs to be solved, and if regulators fixate on the private-sector innovation they hope their sandboxes will generate, that may be a distraction from the public goods that regulation was adopted to create and the social harms that regulation was adopted to protect against. Regulatory sandboxes also put regulators in the unusual position of championing participating private sector firms to help them succeed in the marketplace—likely a recipe for cognitive capture.352Id. at 635–36.

Following the appointment of Rohit Chopra as Director of the CFPB in 2021, the CFPB evinced a far less techno-solutionist stance in its informal guidance and proposed rules. In September 2023, the CFPB responded to concerns about algorithmic discrimination by issuing guidance that made clear “that lenders must be able to accurately inform consumers as to why an adverse credit decision was made and explain specifically what factors led to the decision,” emphasizing that the use of AI is not a get-out-of-jail-free card when it comes to compliance with laws like the Equal Credit Opportunity Act.353Chopra, supra note 277. In October 2024, the CFPB finalized a Personal Financial Data Rights rule to implement the previously dormant Section 1033 of the Dodd-Frank Act.354Required Rulemaking on Personal Financial Data Rights, CFPB (Oct. 22, 2024), https://www.consumerfinance.gov/personal-financial-data-rights [https://perma.cc/LB7G-KTLN]. This was an attempt to address a true lacuna in financial regulation and speaks to new kinds of privacy harms and the market power associated with financial data.355Id. In November 2023, the CFPB proposed a rule designed to crack down on regulatory arbitrage by nonbank payments providers, which will be discussed in more detail below.356CFPB Proposes New Federal Oversight of Big Tech Companies and Other Providers of Digital Wallets and Payment App, CFPB (Nov. 7, 2023), https://www.consumerfinance.gov/about-us/newsroom/cfpb-proposes-new-federal-oversight-of-big-tech-companies-and-other-providers-of-digital-wallets-and-payment-apps [https://perma.cc/Z9RA-YH4N]. For further discussion, see text accompanying notes 378–80, infra. It is worth noting that the CFPB is itself a creation of the digital era: launched in 2011 with an intentional technological bent, the agency has been praised for its technological savvy, and that savvy may have equipped the agency to push back against techno-solutionist claims.357Rory Van Loo, Technology Regulation by Default: Platforms, Privacy, and the CFPB, 2 Geo. L. Tech. Rev. 531, 531 (2018).

Turning to crypto, regulators have not promulgated any formal rules, but they have issued a significant amount of informal guidance. In June 2018, then-SEC Corporate Finance Director Bill Hinman delivered what has come to be known as the “Hinman speech” in which he expressed his excitement about blockchain’s potential for decentralization, and he suggested that tokens might not be considered securities “[i]f the network on which the token or coin is to function is sufficiently decentralized.”358William Hinman, Director, Division of Corp. Fin., SEC, Digital Asset Transactions: When Howey Met Gary (Plastic) (June 14, 2018), https://www.sec.gov/news/speech/speech-hinman-061418 [https://perma.cc/9N6R-RAUU]. This speech uncritically accepted the crypto industry’s decentralization rhetoric, neglecting the fact that blockchain’s technological decentralization does nothing to prevent the economic centralization that the SEC is concerned with.359See supra notes 251–55 and accompanying text. Overall, however, the SEC has generally looked beyond that rhetoric and concluded that crypto tokens are subject to the securities laws—as SEC Chair Gary Gensler stated in 2022:

Of the nearly 10,000 tokens in the crypto market, I believe the vast majority are securities. Offers and sales of these thousands of crypto security tokens are covered under the securities laws. . . . For the past five years . . . the Commission has spoken with a pretty clear voice here: through the DAO Report, the Munchee Order, and dozens of Enforcement actions, all voted on by the Commission. Chairman Clayton often spoke to the applicability of the securities laws in the crypto space.360Gensler, supra note 341 (internal citations omitted).

As for the banking regulators, the OCC initially took a somewhat accommodative position on crypto, issuing a number of documents authorizing banks to hold crypto assets in custody for their customers and to hold reserves for stablecoins.361Wilmarth, Jr., supra note 332, at 268. These documents sometimes evince an unquestioning acceptance of crypto’s claims to be a wealth-building and payments technology; for example, the letter authorizing banks to hold stablecoin reserves starts from the premise that “[r]eports suggest stablecoins have various applications, including the potential to enhance payments on a broad scale, and are increasingly in demand.”362Off. of the Comptroller of the Currency, OCC Chief Counsel’s Interpretation on National Bank and Federal Savings Association Authority to Hold Stablecoin Reserves, OCC Interpretive Letter No. 1172, at 1 (Sept. 21, 2020), https://www.occ.gov/topics/charters-and-licensing/interpretations-and-actions/2020/int1172.pdf [https://perma.cc/5DTF-NBQB]. This premise lacks a strong foundation, however, given blockchain technology’s inability to scale to the level needed to compete with traditional payments providers.363White, supra note 40.

More recently, guidance from banking regulators has paid less heed to unsubstantiated promises of crypto’s technological innovation. Most notably, in January 2023, the Federal Reserve, FDIC, and OCC jointly issued strong guidance indicating their expectations that banks would remain separated from crypto, in order to ensure the continuing stability of the banking system.364See generally Bd. of Governors of the Fed. Rsrv. Sys., Fed. Deposit Ins. Corp. & Off. of the Comptroller of the Currency, Joint Statement on Crypto-Asset Risks to Business Organizations (2023), https://www.federalreserve.gov/newsevents/pressreleases/files/bcreg20230103a1.pdf [https://perma.cc/QK4N-QXPS]. In that statement, the agencies articulated the following non-techno-solutionist position:

Given the significant risks highlighted by recent failures of several large crypto-asset companies, the agencies continue to take a careful and cautious approach related to current or proposed crypto-asset-related activities and exposures at each banking organization.365Id. at 2.

ii.  Monitoring

Once regulatory bodies have promulgated rules or informal guidance, they must then engage in supervision, examination, or other monitoring to ensure compliance. It can be difficult to interrogate how these processes are being discharged, as they are often confidential, performed away from the public eye.366Peter Conti-Brown & Sean Vanatta, Focus on Bank Supervision, Not Just Bank Regulation, Brookings (Nov. 2, 2021), https://www.brookings.edu/research/we-must-focus-on-bank-supervision [https://perma.cc/CT8H-LR25]. Sometimes information about these processes is made public, however, and Art Wilmarth has used publicly available sources to document many of the entanglements between banking and crypto that banking supervisors have permitted.367Wilmarth, Jr., supra note 332, at 271–78. Although it seems unlikely that these entanglements could presently threaten the stability of the overall financial system—particularly because regulators have not authorized any U.S. bank to invest directly in crypto assets or accept them as collateral—such entanglements did help bring down Signature Bank and Silvergate Bank, which relied heavily on the crypto industry for deposits and fee income.368Id. at 278–88. The failure of these banks exacerbated a broader regional banking crisis in 2023, and in its report on that crisis, the FDIC conceded that “in retrospect, the FDIC could have acted sooner and more forcefully to compel the bank’s management and its board to address these [AML and risk management] deficiencies more quickly and more thoroughly.”369FDIC, FDIC’s Supervision of Signature Bank 16 (Apr. 28, 2023), https://www.fdic.gov/news/press-releases/2023/pr23033a.pdf [https://perma.cc/T3UR-BPZ4]. Nothing was said in the report, though, about whether regulators had accommodative attitudes toward crypto business models and technologies that helped induce their inaction.

Of course, there is a preliminary question when it comes to fintech supervision, which is whether financial regulators even believe they have supervisory jurisdiction over fintech business models in the first place.370“With any novel financial product, the threshold question is always that of its legal and regulatory status as a security, banking product, commodity, insurance contract, and so on.” Omarova, supra note 191, at 82. If industry actors can successfully convince regulators that their technology is too new to fit into existing regulatory structures, then they will avoid supervision, examination, or other monitoring. James Kwak observed that in the lead-up to the 2008 crisis, “[t]he financial sector . . . seems to have gained the cooperation of the federal regulatory agencies . . . [in part] by convincing them that financial deregulation was in the public interest.”371Kwak, supra note 97, at 77–78. Techno-solutionist narratives make these same claims about advancing the public interest by getting law out of the way so that technological solutions can flourish.

With regard to fintech lending, for example, Chris Odinet has spelled out the arbitrage strategies that have allowed these businesses to operate largely outside of the supervisory powers of the CFPB and federal banking agencies.372Odinet, supra note 21, at 1774 (noting that state regulators often have jurisdiction here, but “occupy an interesting position because they are in theory very powerful but can often be very weak in practice”). Odinet argues that this regulatory arbitrage is the main point of the fintech lending business model: to seek an end-run around both state usury laws and bank capital regulations by having fintech providers partner with or “rent” a bank in a way that avoids both types of rules.373Banks have preferential treatment that allows them to export favorable usury laws in their home jurisdiction so that they can make high-cost loans throughout the country, even in states with more restrictive usury rules—nonbank fintech firms cannot do this. Odinet, supra note 21, at 1775–76, 1778. Fintech lenders (and their associated banks), however, describe these business models as driven by superior technological interfaces and credit scoring systems—this allows them to tap into the positive political valence of technological innovation to facilitate cognitive capture.374“The partnership is, in essence, a regulatory arbitrage scheme meant to allow high-cost predatory lending to proliferate online, all while enjoying the political cover accorded by being labeled a ‘fintech.’ ” Odinet, supra note 21, at 1765. When regulators are persuaded into inaction by such rhetoric, then consumer harm can be perpetuated without oversight.

Many fintech payments providers also engage in regulatory arbitrage. To use Venmo as an example, federal banking regulation would apply to balances in Venmo accounts if they were construed as deposits, but Venmo has entered into carefully crafted relationships with regulated banks to avoid such characterization.375John L. Douglas, New Wine into Old Bottles: Fintech Meets the Bank Regulatory World, 20 N.C. Banking Inst. 17, 25–36 (2016). However, nonbank payments providers can pose consumer protection and financial stability concerns. Awrey and Zwieten have explained that some Venmo customers store funds in Venmo accounts and assume that those funds will remain available for transactions, notwithstanding that Venmo may have used the funds elsewhere or that the funds may be commingled in a Venmo bankruptcy.376Dan Awrey & Kristin van Zwieten, The Shadow Payment System, 43 J. Corp. L. 775, 806 (2018). Venmo customers may not appreciate these vulnerabilities now, but if concerns develop about Venmo and the way it holds customer funds, customers may pull their funds out in something that closely resembles a bank run.377Id.

Different nonbank payments providers pose different permutations of these prudential and consumer protection concerns, but have generally escaped the types of stringent regulation that apply to banks and other insured deposit–taking institutions.378CFPB, supra note 356. The CFPB expressed a willingness to help level this playing field, however, by exercising existing authorities over firms that serve as service providers for banks,379Chopra, supra note 277. and by proposing a rule that would establish an examination program for larger nonbank digital consumer payment companies.380CFPB, supra note 356. In so doing, the CFPB rejected the contention that technology companies should be treated differently from legacy financial institutions when they provide equivalent services.

iii.  Enforcement

When regulatory agencies bring enforcement actions against firms deploying fintech business models and technologies, those enforcement actions tend to signal a rejection of techno-solutionism. The mere fact that an enforcement action was brought tends to suggest a willingness on the part of a regulatory body to look behind the techno-solutionist rhetoric and conclude that new technologies are being used to perpetuate familiar harms for which there are legal consequences.

To be clear, enforcement may be made more challenging by increasing technological sophistication. For example, when it comes to the CFPB seeking to address discrimination in the provision of credit, enforcement is “increasingly difficult when decisions . . . are made via criteria deeply embedded in complex algorithms used to detect patterns in masses of data.”381Cohen, supra note 17, at 179. As the Financial Stability Oversight Council (“FSOC”) has noted, “[m]any AI approaches present ‘explainability’ challenges that make it difficult to assess the suitability and reliability of AI models and to assess the accuracy and potential bias of AI output.”382Fin. Stability Oversight Council, supra note 225, at 9. But the harm identified here (discrimination in the provision of credit) is familiar, and the CFPB’s necessary legal authority (pursuant to the Equal Credit Opportunity Act) holds up, despite the technological innovation. The CFPB confirmed that it will enforce the law “regardless of the technology being used” and that arguing that “the technology used to make a credit decision is too complex, opaque, or new is not a defense for violating these laws.”383Rohit Chopra, CFPB, Kristen Clarke, U.S. Just. Dep’t, C.R. Div., Charlotte A. Burrows, EEOC & Lina M. Khan, FTC, Joint Statement on Enforcement Efforts Against Discrimination and Bias in Automated Systems 2 (2023), https://files.consumerfinance.gov/f/documents/cfpb_joint-statement-enforcement-against-discrimination-bias-automated-systems_2023-04.pdf [https://perma.cc/Y5VD-CQ74].

A techno-solutionist approach to enforcement, on the other hand, is likely to manifest in accommodative inaction. Financial regulators who are cognitively captured by techno-solutionist rhetoric may come to believe that technological solutions are exceptional and therefore both need and deserve special treatment under the law—and so they refrain from enforcing existing laws. Ryan Calo has argued that technology is exceptional “when its introduction into the mainstream requires a systematic change to the law or legal institutions in order to reproduce, or if necessary displace, an existing balance of values.”384Ryan Calo, Robotics and the Lessons of Cyberlaw, 103 Calif. L. Rev. 513, 552 (2015). This is the kind of argument the crypto industry makes as to why blockchain-hosted assets should not be subject to the long-standing, technology-neutral “Howey test” for determining whether something is an investment contract regulated by the SEC.385The seminal Supreme Court case interpreting the term “investment contract” does so in a way that “embodies a flexible rather than a static principle, one that is capable of adaptation to meet the countless and variable schemes devised by those who seek the use of the money of others on the promise of profits.” SEC v. W.J. Howey Co., 328 U.S. 293, 299 (1946). Another well-worn trope of techno-solutionism is the belief that technology can solve its own problems: this trope, coupled with exceptionalist arguments that technological change is too rapid and complex for the law to effectively address, is often invoked in support of calls for self-regulation.386Short et al., supra note 55, at 17–18. The crypto industry has made repeated arguments that it should regulate itself.387See, e.g., Joe Light, The Crypto Industry’s Solution for Regulation: We’ll Handle It, Bloomberg (Nov. 19, 2021), https://www.bloomberg.com/news/articles/2021-11-19/crypto-industry-s-solution-to-regulation-is-self-regulation [https://perma.cc/QDT4-6WRT].

Fortunately, many regulatory personnel have not been swayed by these kinds of techno-solutionist arguments. In particular, the SEC has been quite aggressive about enforcing the securities laws against the crypto industry;388For a comprehensive listing of the SEC’s crypto enforcement actions, see Crypto Assets and Cyber Enforcement Actions, U.S. SEC, https://www.sec.gov/spotlight/cybersecurity-enforcement-actions [https://web.archive.org/web/20241227170034/https://www.sec.gov/securities-topics/crypto-assets]. in so doing, it is challenging techno-solutionist claims that the use of decentralized technology changes the economic realities of securities investments.389See supra notes 358–359 and accompanying text. These claims are the latest in a long line of tech industry arguments that decentralization defies regulation,390Short et al., supra note 55, at 8–10. but as of the time of writing, courts have largely agreed with the SEC’s anti-techno-solutionist approach (with one notable partial exception).391See, e.g., SEC v. Telegram Grp. Inc., 448 F.Supp. 3d 352, 352 (S.D.N.Y. 2020); SEC v. Kik Interactive Inc., 492 F.Supp. 3d 169, 169 (S.D.N.Y. 2020); SEC v. LBRY, Inc., 639 F.Supp. 3d 211, 220–21 (D.N.H. 2022); SEC v. Terraform Labs. Pte. Ltd., 708 F.Supp. 3d 450, 471–74 (S.D.N.Y. 2023). The notable partial exception was SEC v. Ripple Labs, Inc., 682 F.Supp. 3d 308, 328–30 (S.D.N.Y. 2023), in which Judge Torres concurred with the SEC’s allegations that a security had been sold to institutional investors, but found against the SEC with respect to “programmatic” sales of the XRP token to retail investors. Judge Torres’s reasoning has been expressly rejected by other SDNY judges, including in SEC v. Terraform Labs. Pte. Ltd., 684 F.Supp. 3d 170, 197 (S.D.N.Y. 2023), and in SDNY Judge Failla’s denial of Coinbase’s motion to dismiss the SEC’s enforcement action. SEC v. Coinbase, Inc., 726 F.Supp. 3d 260, 268, 288–89 (S.D.N.Y. 2024). A district court also upheld the CFTC’s determination that the Ooki DAO, a blockchain-hosted decentralized autonomous organization, was a “person” within the meaning of the Commodity Exchange Act and could therefore be held liable for violations of that law.392Press Release, CFTC, Statement of CFTC Division of Enforcement Director Ian McGinley on the Ooki DAO Litigation Victory (June 9, 2023), https://www.cftc.gov/PressRoom/PressReleases/8715-23 [https://web.archive.org/web/20241214222114/https://www.cftc.gov/PressRoom/PressReleases/8715-23].

Cryptocurrencies have also come to play an important role in funding criminal activities and in sanctions evasion.393Stansbury Testimony, supra note 324, at 2. While Section II.D emphasized the legibility of transactions recorded on a blockchain, sophisticated criminals use tools like mixers and tumblers to make it much harder for authorities to trace funds394“One well-known technique is the use of “mixing” or “tumbling” services, which allow for the commingling of legitimate cryptocurrency transmissions with those involving illicit payments, thereby making the criminal activity harder to trace.” Id. at 3.—in response, the Office of Foreign Assets Control (“OFAC”) has sanctioned virtual currency mixers like Tornado Cash, Blender, and Sinbad.395Press Release, U.S. Treasury Dept., Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency (Nov. 29, 2023), https://home.treasury.gov/news/press-releases/jy1933 [https://perma.cc/DCL8-N5XW]. Another high profile enforcement action in this area was brought by the Department of Justice (working in conjunction with OFAC, Financial Crimes Enforcement Network (“FinCEN”), and the CFTC) against the Binance cryptocurrency exchange for failing to comply with anti-money laundering and other laws. Using decidedly non-techno-solutionist rhetoric, Attorney General Merrick Garland announced the charges by saying “using new technology to break the law does not make you a disruptor, it makes you a criminal.”396Press Release, U.S. Dept. of Justice Off. of Pub. Affs., Binance and CEO Plead Guilty to Federal Charges in $4B Resolution (Nov. 21, 2023), https://www.justice.gov/opa/pr/binance-and-ceo-plead-guilty-federal-charges-4b-resolution [https://perma.cc/X4CY-3J7Q].

Many of these enforcement actions have been criticized by the crypto industry (and sometimes by crypto industry–supportive Members of Congress) for impeding fintech innovation.397See, e.g., Marisa T. Coppel, How OFAC’s Tornado Cash Sanctions Violate U.S. Citizens’ Constitutional Rights, CoinDesk (Apr. 18, 2023, 3:06 PM), https://www.coindesk.com/opinion/2023/04/18/how-ofacs-tornado-cash-sanctions-violate-us-citizens-constitutional-rights [https://perma.cc/EN8S-L3S6]; Paul Kiernan, Republicans Pummel SEC’s Gary Gensler Over Crypto Crackdown, Wall St. J. (Apr. 18, 2023), https://www.wsj.com/articles/sec-chair-gensler-to-defend-climate-crypto-plans-before-gop-led-panel-2e3a6ade [https://web.archive.org/web/20231204050108/https://www.wsj.com/articles/sec-chair-gensler-to-defend-climate-crypto-plans-before-gop-led-panel-2e3a6ade]; David Dayen, Congressmembers Tried to Stop the SEC’s Inquiry into FTX, Am. Prospect (Nov. 23, 2022), https://prospect.org/power/congressmembers-tried-to-stop-secs-inquiry-into-ftx [https://perma.cc/43EX-R8YB]. The crypto industry has in particular decried the “regulatory uncertainty” created by such enforcement actions and court decisions, arguing that such uncertainty has undermined the crypto industry’s ability to thrive.398See, e.g., Chris Prentice & Hannah Lang, Coinbase Rejects U.S. Regulator’s Claim It Broke Rules on Crypto, Reuters (Apr. 27, 2023, 1:00 PM), https://www.reuters.com/markets/currencies/coinbase-does-not-list-securities-company-tells-us-regulator-2023-04-27 [https://web.archive.org/web/20230503124643/https://www.reuters.com/markets/currencies/coinbase-does-not-list-securities-company-tells-us-regulator-2023-04-27/]. However, the SEC has been largely unequivocal in its communications that the vast majority of crypto tokens are securities: as Chair Gensler has said, “not liking the message is not the same thing as not receiving it.”399Gensler, supra note 341. In any event, few areas of the law provide perfect certainty, and as the Supreme Court implicitly recognized in formulating the Howey test, preserving a degree of flexibility often proves quite useful in “future-proofing” the law.400The Supreme Court noted that Congress had chosen to include “investment contracts” within the definition of “security” as it “embodies a flexible rather than a static principle, one that is capable of adaptation to meet the countless and variable schemes devised by those who seek the use of the money of others on the promise of profits.” SEC v. W.J. Howey Co., 328 U.S. 293, 299 (1946). Experience with the legal innovation of the limited liability company also makes it clear that perfect certainty under the securities laws is not necessary for something to thrive: courts have refused to lay down bright-line rules for when interests in limited liability companies will be considered investment contracts under the Howey test,401See, e.g., United States v. Leonard, 529 F.3d 83, 89 (2d Cir. 2008) (“[A]n interest in an LLC is the sort of instrument that requires ‘case-by-case analysis’ into the ‘economic realities’ of the underlying transaction.”). but limited liability companies have nonetheless experienced exponential growth in popularity since they were first created.402“LLCs are far and away the most popular legal entity form for new businesses.” Eric H. Franklin, A Rational Approach to Business Entity Choice, 64 Kan. L. Rev. 573, 586 (2016). Given all of this, crypto industry complaints about the uncertain application of existing laws often seem like a pretext for an unwillingness to comply.

It may be that running a legally compliant business is not economically viable for some crypto industry participants, but without techno-solutionism to cloud our vision, we may be glad to see the end of businesses that have little to recommend them other than regulatory arbitrage. While Brummer, Yadav, and Zaring have argued that regulatory agencies “risk being viewed as less technocratic and expert and driven more by selfish, rather than public interests” when they bring crypto enforcement actions,403Brummer, Yadav & Zaring, supra note 343, at 1302. this assumes a techno-solutionist public interest in seeing the crypto industry and its innovation flourish. While enforcement actions may indeed lessen the legitimacy of regulators in the eyes of the crypto industry and some crypto users, those same enforcement actions may very well bolster the legitimacy of regulators in the eyes of other members of the public (the vast majority of whom are distrustful of crypto).404Faverio, Dawson & Sidoti, supra note 167. And of course, once something goes wrong, the public will always ask, “[w]here were the regulators?” Techno-solutionist accommodative inaction can be very damaging to the legitimacy of a regulatory agency in retrospect.

  1. Looking Forward: Financial Regulation and AI

AI is currently the “buzziest” technology both within and outside of the financial industry. In the wake of OpenAI’s launch of ChatGPT, much of the hype, fervor, and VC funding pertaining to crypto shifted to AI-related technologies.405Hannah Miller, Tech Investors Bet on AI, Leaving Crypto Behind, Bloomberg (July 11, 2023, 11:01 AM), https://www.bloomberg.com/news/articles/2023-07-11/startup-investors-are-betting-on-ai-and-leaving-crypto-behind [https://perma.cc/FFB8-UR7X]. These AI technologies can be applied in any number of different fields,406For an indication of the many policy areas affected by AI, see FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence, White House (Oct. 30, 2023), https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/?utm_source=substack&utm_medium=email [https://perma.cc/782F-CNBZ]. but this Section’s discussion will focus primarily on whether financial regulation will be stymied by techno-solutionism associated with the application of AI-related technologies to financial services.

As a starting point, it’s worth noting that AI-related technologies are particularly likely to invite techno-solutionism because they are especially effective in obscuring the reality of human agency and incentives: the very name “artificial intelligence” connotes autonomy and superiority to human flaws and imperfections. The technologies we call “artificial intelligence” do not currently display characteristics of real human intelligence, though—they lack the ability to reflect on or engage with their existence in a world where others exist too.407For an overview of the debate on what is meant by “intelligence” in the context of AI, see generally Christopher Newfield, How to Make “AI” Intelligent; or, The Question of Epistemic Equality, Critical AI , October 2023, at 1. Some have suggested that the term “applied statistics” is therefore a more accurate description of these technologies, but the “AI” label has stuck.408Madhumita Murgia, Sci-fi Writer Ted Chiang: “The Machines We Have Now Are Not Conscious,” Fin. Times (June 2, 2023), https://www.ft.com/content/c1f6d948-3dde-405f-924c-09cc0dcf8c84 [https://perma.cc/CCE7-RVR8]. This label can serve to distract people from the important role that human computer scientists play in programming the software that will “learn” from the data presented to it, and the role that data scientists can play in selecting and curating that data.409While we may hear that “there are no bad AI systems, only bad AI system users” and “there is nothing value-neutral about any information technology, including AI systems.” Hartzog Testimony, supra note 17, at 8–9. The term “learn” is in quotation marks because AI does not learn in the same way a human does. AI does not seek to establish causality or engage in formal reasoning but instead looks for correlations (even weak correlations) in data and uses these to formulate decision-making rules that will guide it in performing an assigned task410Solow-Niederman, supra note 149, at 25. (hence the moniker “applied statistics”).

This explanation of AI encompasses “generative AI” like ChatGPT, as well as earlier generations of machine learning technology that were used in financial services prior to the development of generative AI. The primary difference is that unlike previous iterations of AI, generative AI can generate uniquely constructed content of its own in the form of things like text, images, and code.411Linklaters, AI in Financial Services 3.0: Managing Machines in an Evolving Legal Landscape 5 (2023), https://www.linklaters.com/insights/thought-leadership/fintech/artificial-intelligence-in-financial-services [https://perma.cc/Z2FP-XZWW]. Despite the developments in Generative AI, most AI-driven financial services applications currently rely on machine learning technologies that were available before the advent of ChatGPT, particularly in risk management and portfolio construction contexts.412Id. at 4–5. There is, however, interest in using Generative AI to improve consumer-facing chatbots and for report summarization; some financial services firms have also expressed interest in using generative AI in regtech tools (for example, fraud detection and AML compliance tools, as well as automated reporting).413Id.

There is a particular interest in the efficiency gains that generative AI can make414Fin. Stability Oversight Council, supra note 225, at 91. “The purpose of AI, the source of its value, is its capacity to increase productivity, which is to say, it should allow workers to do more, which will allow their bosses to fire some of them, or get each one to do more work in the same time, or both.” Cory Doctorow, Cory Doctorow: What Kind of Bubble Is AI?, Locus (Dec. 18, 2023), https://locusmag.com/2023/12/commentary-cory-doctorow-what-kind-of-bubble-is-ai [https://perma.cc/AJ56-H5JE].—but those claims to efficiency are quite techno-solutionist. The large language models (“LLMs”) used for generative AI are extremely expensive to create, and after those sunk costs have been incurred, they will continue to be extremely expensive to maintain and run—at the most basic level, they require significant amounts of electricity and water415Doctorow, supra note 414. See generally Shaolei Ren, Pangfei Li, Jianyi Yang & Mohammad A. Islam, Making AI Less “Thirsty”: Uncovering and Addressing the Secret Water Footprint of AI Models (Mar. 26, 2025) (unpublished manuscript), https://arxiv.org/pdf/2304.03271.pdf [https://perma.cc/B8NE-QAJE]. (as with blockchains, we should not forget the environmental costs of these technologies). Efficiency gains therefore depend on LLMs eliminating the cost of human oversight, but LLMs can “hallucinate” incorrect answers, often informed by specious correlations drawn from lackluster data.416What Are AI Hallucinations?, IBM (Sept. 1, 2023), https://www.ibm.com/topics/ai-hallucinations [https://perma.cc/6WB9-H8XK]. More generally, AI is poorly suited to predicting low-probability but high-stakes events, and widespread reliance on such AI tools could result in more homogenous behavior that ends up undermining assumptions in the data that the tools were trained on.417Allen, supra note 113, at 55–56, 64–65; see also Juan Luis Perez, How AI Will Change Investment and Research, Fin. Times (Nov. 29, 2023), https://ft.com/content/2390e8f3-88ba-40a0-b684-7fb6fada9bde. Because of these limitations, humans who are highly skilled in domain expertise should be kept in the loop to check the output of AI tools if that output is to be used in a high stakes risk management or portfolio construction situations (individuals without this domain expertise are more likely to fall prey to automation biases and defer to the model’s output unquestioningly).418On the importance of domain knowledge experts scrutinizing AI output, see Perez, supra note 417; Doctorow, supra note 414. A combination of AI and human intelligence will often produce the most accurate answers, but that increased accuracy will be very expensive.419Doctorow, supra note 414.

To reduce costs, some in the financial industry may seek to automate their risk management and portfolio construction practices while limiting or dispensing with the use of domain experts—this could ultimately threaten the stability of our financial system.420Allen, supra note 113, at 55–58. AI may also be used to arbitrage regulation. For example, banks could potentially arbitrage an important kind of microprudential regulation known as capital requirements by using “machine learning-capable risk management models” and “selectively exposing those models to data sets that neglect tail risks.”421Id. at 157–58. If tacitly permitted, this kind of arbitrage could result in lower bank capital levels (undermining a cornerstone of financial stability regulation), and could even harden into a regulatory entrepreneurship strategy if industry participants “pressure regulators to certify that the output of a particular . . . tool constitutes sufficient compliance.”422Id.

This arbitrage is a problem of degree, not an entirely new problem. Financial institutions were attempting complex regulatory arbitrage and entrepreneurship strategies with regard to capital requirements long before machine learning came along.423The complexity of regulatory capital requirements “provides near-limitless scope for arbitrage.” Andrew G. Haldane, Executive Director, & Vasileios Madouros, Economist, Bank of England, Speech at the Federal Reserve Bank of Kansas City’s 366th Economic Policy Symposium, “The Changing Policy Landscape”: The Dog and the Frisbee 8 (Aug. 31, 2012), https://www.bis.org/review/r120905a.pdf [https://perma.cc/JN45-MH6L]. In many ways, these old problems have simply been amped up by the inscrutability of AI. Long-standing calls for capital regulation to be simplified would also be quite effective in making capital regulation more robust to AI-facilitated arbitrage.424See id. at 14–19 for one of the most prominent such proposals. Unless and until such reforms are adopted, though, it is true that banking regulators will need increased technological sophistication to scrutinize algorithms and data sets in order to detect AI-enabled arbitrage of regulatory capital requirements.

The use of AI could also amplify consumer protection problems, like those associated with discrimination in the provision of credit.425See supra notes 148–151 and accompanying text. Once again, we have existing regulatory frameworks within which to respond to many of these issues so long as regulators are not too dazzled or cowed by the technology, and the CFPB has indicated its willingness to continue enforcing its anti-discrimination laws when AI tools have been used.426See supra notes 381–83 and accompanying text. In one speech, CFPB Director Chopra noted that

AI certainly poses new risks, or at least exacerbates old ones. While many new approaches may be necessary, it is clear we must all make use of existing laws and regulations on the books. In the United States . . . there is no ‘fancy new technology’ carveout to existing laws. Even if firms are using a complex new algorithm or AI model, they must follow the law.427Chopra, supra note 275.

This is a promising start. Chopra recognizes that many of the problems likely to be caused by the use of AI in finance are familiar ones that should not be accommodated but instead should be addressed with existing regulatory tools. He also remains humble about truly new problems that could emerge from the use of AI and new regulatory tools that may be needed to address them.428Hartzog has recommended the continued application of time-tested legal doctrines like fiduciary duties and consumer protection laws to activities carried out using AI, and—where harms are significant—licensing regimes or even bans. Hartzog Testimony, supra note 17, at 4–6, 11. The question is—given that “personnel is policy”—will other financial regulators and lawmakers follow suit?

The VC industry has invested heavily in AI and has strong incentives to deploy cognitive capture, regulatory arbitrage, and regulatory entrepreneurship strategies in order to make those investments more profitable.429See supra note 405. Andreessen Horowitz has been particularly aggressive in deploying techno-solutionist rhetoric in lobbying for favorable legal and regulatory treatment for crypto430Lipton, Wakabayashi & Livni, supra note 46. and has made it clear that it plans to deploy a similar strategy for AI. In a December 2023 blog post, Andreessen Horowitz’s co-founder Ben Horowitz announced:

We are non-partisan, one issue voters: If a candidate supports an optimistic technology-enabled future, we are for them. If they want to choke off important technologies, we are against them. Specifically, we believe . . . Artificial Intelligence has the potential to uplift all of humanity to an unprecedented quality of living and must not be choked off in its infancy . . . Every penny we donate will go to support like-minded candidates and oppose candidates who aim to kill America’s advanced technological future.431Ben Horowitz, Politics and the Future, Andreessen Horowitz (Dec. 14, 2023), https://a16z.com/politics-and-the-future [https://perma.cc/6NU2-ZMTE].

To give you an example of the kind of “optimistic technology-enabled future” that Horowitz will lobby fiercely to protect from regulation, Andreessen Horowitz has funded a startup at the intersection of AI and crypto known as Worldcoin.432Guo & Renaldi, supra note 130. Co-founded by Open AI-CEO Sam Altman, Worldcoin is using a device known as “The Orb” to collect millions of retinal scans in the developing world in exchange for a crypto asset that has no real value at present, “but someday, Worldcoin says, it’ll form the basis of a new economic system and maybe will also provide a universal basic income stream for the world’s poor.”433Max Chafkin, Don’t Scan Your Eyeballs for Worldcoin’s Magic Beans, Bloomberg (Aug. 7, 2023, 9:30 AM), https://www.bloomberg.com/news/newsletters/2023-08-07/what-s-the-purpose-of-worldcoin-orb-eye-scanning-crypto-token-project [https://perma.cc/5R9K-4DE4]. This is an exquisite example of techno-solutionism: Worldcoin has been designed to respond to problems that do not yet exist, but that Worldcoin’s founder expects his other technology to cause (i.e., the lack of income opportunities that will be available if AI renders many jobs obsolete). If AI does indeed end up eliminating lots of jobs, we will need policy solutions that take into account the dignity of work as well as people’s need for income.434Daron Acemoglu & Simon Johnson, Power and Progress: Our 1000-Year Struggle Over Technology & Prosperity 416–17 (2023). Worldcoin, however, offers (at best) an oversimplified solution to such a complex problem—a potential method for paying people to watch their screens once they no longer have jobs. And Worldcoin downplays the privacy concerns associated with training its models on the biometric data of vulnerable people and the predatory aspects of paying those people for their biometric data with a potentially worthless crypto asset.435Guo & Renaldi, supra note 130.

It remains to be seen how lawmakers and regulators will respond to Silicon Valley’s techno-solutionist appeals to allow this and other kinds of AI-related innovation to flourish.

IV.  A Possible Antidote to Techno-Solutionism

The primary goal of this Article has been to identify the techno-solutionism rife in the fintech industry and to explore how this techno-solutionism has both stymied and been facilitated by financial regulation. Techno-solutionist narratives gain some of their power through unchallenged repetition,436Cohen, supra note 17, at 104. and so this very act of calling out fintech’s techno-solutionist narratives will hopefully go some small way toward inoculating lawmakers, regulators, and the public against fintech’s most outlandish claims.437Campbell-Verduyn & Lenglet, supra note 13, at 469 (stressing “the value added for political economy of scrutinising how the visions and materialisation of technology fail”). As Morozov notes in the postscript to his book, we cannot eliminate solutionism, but we can “ridicule” it,438Morozov, supra note 8, at 355. hopefully depriving it of some of its power.

Right now, there may not be much more that can be done to diminish techno-solutionism and its detrimental impacts on regulatory regimes designed to protect the public from harm. Techno-solutionism is entrenched in our society in many ways: by corporate political expenditures (including expenditures by venture capitalists, as already discussed);439See supra notes 325, 430–31, and accompanying text. by the lack of political access for the very communities impacted by the problems to be solved;440Byrum & Benjamin, supra note 16. by challenges in inducing skilled technologists to work for government agencies;441Hilary J. Allen, Resurrecting the OFR, 47 J. Corp. L. 1, 31 (2021). by tech industry funding of academic research on technology and its impacts;442Joseph Menn & Naomi Nix, Big Tech Funds the Very People Who Are Supposed to Hold It Accountable, Wash. Post (Dec. 7, 2023), https://www.washingtonpost.com/technology/2023/12/06/academic-research-meta-google-university-influence [https://perma.cc/TR6V-33PK]. by limited public support for public sector innovation (which could stand as a counterfactual techno-solutionist narrative);443Mazzucato, supra note 48, at 12–15. by computer science pedagogy that fails to teach students how to conceptualize or contextualize the problem to be solved;444Ohm & Frankle, supra note 36, at 779. and surely much more. This Article has consistently rejected techno-solutionism’s silver bullet solutions, and there are also no silver bullet solutions for addressing techno-solutionism itself.

Still, as this Article has emphasized, personnel is policy, and we have already seen examples of policymakers who are predisposed toward pushing back against fintech’s harms—these kinds of policymakers can be empowered by the articulation of an alternative to techno-solutionism. As a heuristic, techno-solutionism will default to permitting technological innovation, regardless of potential harms: it becomes easy to “simply assume the rightful existence of [technologies] and go straight to building guardrails so they can flourish.”445Hartzog Testimony, supra note 17, at 12. When it comes to assessing fintech’s claims to improve financial inclusion, efficiency, competition, and security, what is needed is a fundamental shift in rhetoric and perspective away from techno-solutionism and toward contextually-informed skepticism regarding technological solutions.

Adopting a posture of contextually informed skepticism is precautionary to a degree but does not require the embrace of an overly strong “precautionary principle” where activities have to be proven riskless before they can proceed. Contextually informed skepticism is therefore not incompatible with innovation; instead, it sets up incentives for the kind of innovation that is mindful of harms and consequences.446Cohen, supra note 17, at 90, 92. It is, however, likely that contextually informed skepticism from regulators will impede some innovation in the name of protecting the public from harm—which will inevitably invite intense criticism from the tech industry.447In his manifesto, Andreessen decries precautionary approaches as preventing “virtually all progress since man first harnessed fire,” as well as calling them “our enemy,” “evil,” and “deeply immoral.” Andreessen, supra note 4. However, a posture of contextually informed skepticism can embolden policymakers to take this industry criticism with a grain of salt, because contextually informed skepticism recognizes that not all innovation is socially beneficial and that the tech industry’s appreciation of potential public harm will often be skewed by financial incentives and lack of domain expertise.448Ford has also stressed that “[r]egulatory staffers . . . need sufficient confidence in their own judgment and a healthy degree of skepticism about industry.” Cristie Ford, New Governance in the Teeth of Human Frailty: Lessons from Financial Regulation, 2010 Wis. L. Rev. 441, 474 (2010). This kind of perspective shift is desperately needed with regard to crypto, for example, where the harms are many, the benefits few, and yet a bipartisan group of lawmakers has shown itself willing to support industry-favored deregulation designed to encourage more crypto innovation.449See supra notes 325–26 and accompanying text.

This is by no means a call for fintech innovators to stand down—society often benefits from techno-optimists’ efforts to push frontiers.450For a discussion of the socially valuable residue of the dot.com bubble, see Doctorow, supra note 414. But when the stakes are high, this yin of techno-optimism needs to be balanced by the yang of contextually-informed skepticism from regulators or else history and domain expertise will be ignored and harms will proliferate unchecked. This Article has already explored why finance is an arena in which the potential harms are too significant for unfettered technological experimentation.451See supra notes 291–300; see also Allen, supra note 113, at 23–24. Finance might also be different in another respect: the potential benefits of technological innovation may prove to be structurally limited in finance. Often, with technology, it is the users who unlock truly unexpected innovative use cases through their experimentation.452“[T]he public has a huge range of intentions and desires and often brings far more imagination to new technologies than those who first market [or design] them.” David E. Nye, Technological Prediction: A Promethean Problem, in Technological Visions: The Hopes and Fears That Shape New Technologies 159, 170 (Marita Sturken et al. eds., 2004). In the financial industry, though, much of the innovation that has occurred has been driven by the supply-side, rather than consumer demand.453Awrey, supra note 122, at 263–67. It may be that where money is at stake, industry (including the crypto industry, which tends towards economic centralization)454Aramonte et al., supra note 182, at 27–29; Allen, supra note 284, at 924. will afford users limited ability to actively construct how they receive their financial services. If this is the case, then unexpected uses of technology will have limited opportunities to emerge—and if technological experimentation is primarily benefitting the supplier rather than the users, then there is far less reason for policymakers to accommodate it.

Conclusion

Further research on how to disrupt techno-solutionism is welcome, because if fintech is to serve as a force for good in society, it needs to be severed from techno-solutionism. We need to recognize that if new technology is adopted without addressing the broader context in which it operates, then discrimination, distributional inequalities, concentrations of power, privacy incursions, and other harms will continue to proliferate. When it comes to fixing finance, technological innovation will not obviate the need for the hard slog of structural reform. Furthermore, where technological tools do have a role to play in addressing complex structural problems, they may be tarnished by “techlash” unless we can find a way to address techno-solutionism.455One meta analysis of public discourse between 2010–2020 found that discussion of big tech is dominated not by solutionist appeals for self-regulation but instead by “calls to regulate big tech, growing critiques of technology’s influence in society, and declining discussion of the tech sector as a driver of economic growth.” Short et al., supra note 55, at 6; see also Shira Ovide, Big Tech’s Backlash Is Just Starting, N.Y. Times (July 30, 2020), https://www.nytimes.com/2020/07/30/technology/big-tech-backlash.html [https://web.archive.org/web/20231029031307/https://www.nytimes.com/2020/07/30/technology/big-tech-backlash.html]; Edward Ongweso Jr., The Incredible Temper Tantrum Venture Capitalists Threw Over Silicon Valley Bank, Slate (Mar. 13, 2023, 11:24 AM), https://slate.com/technology/2023/03/silicon-valley-bank-rescue-venture-capital-calacanis-sacks-ackman-tantrum.html [https://perma.cc/3DC4-WPU3].

Financial regulators need to adopt a posture of contextually informed skepticism instead of techno-solutionism, keeping firmly in mind that they have express statutory mandates to protect the American public from harm—and no express mandates to facilitate technological innovation. If financial regulators can resist cognitive capture and enforce existing laws such that regulatory arbitrage and regulatory entrepreneurship are not profitable strategies, then technology is more likely to deliver benefits without serious social harms. Where technologies pose genuinely new problems, then Congressional action will be needed, and that action should also proceed from a position of contextually informed skepticism. To slightly adapt testimony from AI and privacy expert Woody Hartzog, “[l]awmakers will make little progress until they accept that the toothpaste is never out of the tube when it comes to questioning and curtailing the design and deployment of [technology] for the betterment of society.”456Hartzog Testimony, supra note 17, at 11.

 

98 S. Cal. L. Rev. 761

Download

* Professor of Law, American University Washington College of Law. Many thanks to Tonantzin Carmona, Julie Cohen, Jeremy Kress, Pat McCoy, Chris Odinet, Art Wilmarth, and Jeff Zhang for reading and providing feedback on earlier drafts. This paper also benefitted enormously from comments and conversations during workshops at the University of Florida, the Reserve Bank of New Zealand, the IMF’s Internal Fintech Forum, and the meeting of the Technology Section at the Academy of Legal Studies in Business Conference. Information regarding the status of technologies, regulation, and legislation is current as of October 2024, but these are used to illustrate broader themes that will remain relevant as new technologies and regulatory and legislative approaches evolve.

Fair Use and Fair Price

In this Article, we present and develop a new justification for the fair use doctrine. The accepted lore among copyright law scholars is that fair use is a means for overcoming a market failure in the form of high transaction costs. According to this view, the doctrine sanctions unauthorized use of copyrighted works in cases where transaction costs hinder voluntary, mutually beneficial exchanges.

Departing from conventional wisdom, we argue that the fair use doctrine serves as an important empowerment even in fully functional markets. Fair use enables users to secure more favorable licensing terms from copyright owners by endowing users with a threat point in their negotiations. Without fair use, users would have to pay the price demanded by copyright owners or not use the work. With fair use, many users can credibly assert that their intended use of copyrighted content is privileged by the fair use doctrine and thus they can use the desired content without authorization. The fair use doctrine, therefore, gives users leverage in their negotiations with copyright owners.

We illustrate our thesis by applying it to the landmark fair use decisions of the Supreme Court, including the recent ruling in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith, that determined the bargaining standpoint of users for decades to come. We demonstrate the distributive effects of the Supreme Court’s fair use jurisprudence and explain how the Court must act to preserve and augment the empowering effect of fair use. The theory presented in this Article proves that the reach of fair use goes well beyond market failures and that the impact of the doctrine is much more significant than previously thought.

INTRODUCTION

Considered by many as the most important doctrine in our copyright law system,1See, e.g., Eldred v. Ashcroft, 537 U.S. 186, 219–20 (2003) (ascribing the fair use doctrine a Constitutional role); Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 555–60 (1985) (same); Neil Weinstock Netanel, First Amendment Constraints on Copyright After Golan v. Holder, 60 UCLA L. Rev. 1082, 1128 (2013) (contending that significant restrictions on fair use are forbidden under the First Amendment). fair use sanctions certain unauthorized uses of copyrighted works that would otherwise constitute a copyright infringement. Under the fair use doctrine, when a use is considered fair, the user is relieved of liability and need not pay compensation to the copyright owner whose content they used. Therefore, fair use may be conceptualized as a doctrine that confers upon deserving users a private taking power over copyrighted content that can be exercised at a zero price.2See Abraham Bell & Gideon Parchomovsky, Pliability Rules, 101 Mich. L. Rev. 1, 51 (2002) (“Essentially, the fair use privilege entitles third parties to take the intellectual property of others without paying any compensation to the property owners.”).

 Since its inception in the English common law and equity courts, the fair use doctrine has never ceased to fascinate theorists and students.3Abraham Bell & Gideon Parchomovsky, The Dual-Grant Theory of Fair Use, 83 U. Chi. L. Rev. 1051, 1053 (2016) (“Fair use is one of modern law’s most fascinating . . . doctrines.”). The existence of the doctrine raised two critical challenges for scholars. First, under what circumstances should a use be considered fair? Second, why should fair users be fully relieved of the duty to compensate copyright owners?

The answer to both these questions has been provided by Professor Wendy Gordon. In a pathbreaking article authored almost forty years ago, Gordon conceptualized fair use as a means for overcoming a market failure in the form of high transaction costs.4See generally Wendy J. Gordon, Fair Use as Market Failure: A Structural and Economic Analysis of the Betamax Case and Its Predecessors, 82 Colum. L. Rev. 1600 (1982) (demonstrating that fair use enhances social welfare when transaction costs prevent users from acquiring authorization). Gordon persuasively argued that courts should recognize fair use when three cumulative conditions obtain: first, high transaction costs prevent voluntary market exchange between copyright owners and users; second, the allegedly fair use is socially beneficial; and, third, a fair use finding would not unduly undermine incentives to create.5Id. at 1614–22. Gordon’s key insight was that when transaction costs are prohibitive, there will be no voluntary trade between copyright owners and users. In this scenario, allowing users to use copyright content for free benefits the user without harming copyright owners, for the latter would not be able to collect payments from users as transaction costs bar voluntary exchanges. Gordon correctly submitted that under these circumstances, allowing users to use copyright content for free, by classifying their use as fair, is welfare enhancing.

By tying fair use to the level of transaction costs, Gordon, at once, provided a cogent defense of the fair use doctrine and exposed its vulnerability. Professor Tom Bell and other scholars pointed out that in an interconnected world, where technological advancements constantly lower transaction costs, there may no longer be a need for fair use, and at a minimum, courts’ willingness to recognize fair uses should diminish.6See, e.g., Tom W. Bell, Fair Use vs. Fared Use: The Impact of Automated Rights Management on Copyright’s Fair Use Doctrine, 76 N.C. L. Rev. 557, 579–600 (1998) (advocating the abrogation of the fair use doctrine in the presence of advanced technology that facilitates effective licensing negotiations); Paul Goldstein, Copyright’s Highway: From Gutenberg to the Celestial Jukebox 165–96 (1994) (same); see also Jay Dratler, Jr., Distilling the Witches’ Brew of Fair Use in Copyright Law, 43 U. Mia. L. Rev. 233, 294 (1988) (“It makes no sense to provide a fair use subsidy to a user when a license could be efficiently negotiated.”). Importantly, this skeptical view of fair use has not been universally endorsed by other scholars, who advanced other utilitarian and non-utilitarian justifications for fair use.7See infra Section I.B.

In this Article, we develop a new justification for fair use that is radically different from prior theorizing. Our theory seeks to complement and reinvigorate the theories of scholars who view fair use as an essential component of our copyright system. Yet, our outlook places fair use on a very different ground from past scholarship. We contend that fair use’s most significant yet overlooked role is to facilitate bargaining between copyright owners and users, even when transaction costs are low. We argue that fair use helps users not only in those unrepresentative and rare cases where transaction costs prevent consensual transactions between copyright owners and users, but also in the more common case where transaction costs are low or nonexistent. Fair use does this by improving the bargaining power of users and giving them leverage or a threat point vis-à-vis copyright owners.

Although fair use has been traditionally considered an open-ended and unpredictable doctrine,8Infra Section III.D. two recent developments have infused a certain level of predictability into this area of the law. First, a close reading of fair use cases uncovers, what we call, two fair use clusters: transformative uses and uses that yield a substantive public benefit.9Infra Section I.A; see Justin Hughes, The Sub Rosa Rules of Copyright Fair Use, 64 Ariz. L. Rev. 1, 35–48 (2022). Second, an empirical study by Professor Barton Beebe established a meaningful positive correlation between two of the statutory factors that courts are instructed to weigh in making fair use determinations—the purpose of the use and the effect of the use on the market for the copyrighted work.10See generally Barton Beebe, An Empirical Study of U.S. Copyright Fair Use Opinions, 1978–2005, 156 U. Pa. L. Rev. 549 (2008). This emergence of clusters of uses or activities that have a legitimate claim for fair use is a welcome development for users, as it manifests in increased licensing leverage.

Consider transformativeness. Transformativeness covers a wide range of uses. While the level of transformativeness varies among uses, all users who engage in transformative uses of copyrighted works have a colorable fair use claim. Obviously, not all of them would win a fair use ruling in court, but each can credibly argue in negotiations with copyright owners that their use would be found fair with a certain probability. Since transformativeness, as recently established by the Supreme Court, “is a matter of degree,”11Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 598 U.S. 508, 529 (2023). the level of transformativeness can be represented on a unit interval, essentially reflecting its probability of enjoying a fair use defense. This probability, in turn, immediately translates into licensing leverage when negotiating with a monopolistic rightsholder.

To illustrate, imagine that Anne plans to make a transformative use of a photograph in which Bob owns a copyright. Assume that there is 0.5 probability that Anne’s use would be found fair if she uses Bob’s photograph without his permission and a lawsuit ensues. Assume further that Bob typically demands $100 per license from users who wish to use his photograph. Anne, however, owing to her potential fair use claim, should be able to secure a license for $50—a price that reflects the strength of her fair use claim.

Now consider a different user, Carol, whose planned use of Bob’s work is slightly less transformative than Anne’s. The probability of Carol’s use being fair is only 0.3. Yet, all things being equal, she, too, should be able to receive a license from Bob for a lower price than his original asking price—$70, instead of $100. As we shall demonstrate throughout this Article, these examples are representative.

The same is true for a host of other transformative users—users who can claim that their derivative works bestow a significant benefit on the public, and users who appropriate only a small portion from copyrighted works. All of them have a certain individual probability of succeeding on a fair use claim when sued by the copyright owner. The license price each would be able to negotiate depends on the strength of their fair use claim, as well as on their bargaining power. But critically, each should be able to negotiate a license for a price lower than the asking price of the copyright owner. We use a formal model to demonstrate this result and identify its robustness over a wide range of scenarios. As we will show, even a small probability of obtaining a fair use ruling may well change the bargaining outcome between users and copyright owners.

The Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith decision that was recently issued by the Supreme Court provides a powerful example of our theory.12See generally id. (addressing the role of transformativeness in fair use determination). In this case, the Supreme Court had to determine whether fourteen unauthorized silkscreens and two unauthorized pencil drawings that were produced based on a Lynn Goldsmith photograph qualify as fair uses of the photograph.13Id.at 514–25. At the heart of the matter lies the definition of the term “transformativeness.” In rejecting the foundation’s fair use claim, the Court held that a transformative work must have a fundamentally different and new artistic purpose and character.14Id. at 550. This definition is clearly narrower than that endorsed by the Supreme Court in Campbell v. Acuff-Rose Music, Inc., according to which a transformative work is one that has a different purpose or conveys new message or meaning.15See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994). The Supreme Court’s adherence to a rather narrow interpretation of transformativeness will carry far-reaching implications not only for the parties to the case, but also for a multitude of users who negotiate with copyright owners.

It bears emphasis that negotiation is often a prelude to litigation. In fact, many of the celebrated fair use cases, including Google LLC v. Oracle America, Inc.,16Google LLC v. Oracle Am., Inc., 593 U.S. 1 (2021). Authors Guild, Inc. v. Google Inc.,17Authors Guild, Inc. v. Google Inc., 954 F. Supp. 2d 282 (S.D.N.Y. 2013). and Campbell,18Campbell, 510 U.S. 569. were filed only after the parties tried, and failed, to negotiate a consensual agreement. Furthermore, even after a case is brought to court, the litigating parties attempt to negotiate a settlement while the case is pending. Indeed, such was the case in Oracle and Authors Guild. Naturally, not all negotiations result in a successful outcome, and some copyright disputes will inevitably end up in court. But it should be underscored that in any regular case, in which the existence of transaction costs does not hinder trade, the rightsholder-user negotiation becomes the primary apparatus for allocating use of copyrighted content; litigation is nothing but a complementary mechanism. This understanding implies that fair use theory must account for the doctrine’s impact on the negotiation process.

Our analysis shows that irrespective of its actual invocation in court, the fair use doctrine provides considerable benefits to users by improving their bargaining position. In economic parlance, the theory advanced by this Article views fair use as empowering significant categories of users by improving what negotiation theorists call the “best alternative to a negotiated agreement” (“BATNA”).19See, e.g., Jenny Roberts & Ronald F. Wright, Training for Bargaining, 57 Wm. & Mary L. Rev. 1445, 1479 (2016) (“To determine whether a deal is worth taking, a negotiator must figure out what would happen if the parties do not reach agreement. [BATNA] is a concept that gives a negotiator a reference point for knowing when to walk away from the negotiating table.”); see also infra Section II.A. By diminishing the BATNA of copyright holders and bolstering that of users, the fair use doctrine redesigns the licensor-licensee relationship to promote the use and distribution of copyrighted content.

The present Article thus conceptualizes fair use not as a mechanism that overcomes transaction-costs-related market failures, but rather, as a doctrine that rests the foundations for just and efficient bargaining framework. In this regard, we analyze the behavior of relevant economic actors that operate “in the shadow” of the fair use doctrine.20For the general “shadow” outlook, see generally Robert H. Mnookin & Lewis Kornhauser, Bargaining in the Shadow of the Law: The Case of Divorce, 88 Yale L.J. 950 (1979).

We develop our argument in accordance with the following structure. In Part I, we explain the fair use doctrine and discuss the theories that have been developed to justify it. In Part II, we introduce a new theory of fair use and explicate how it differs from the extant literature. In Part III, we present the normative attractiveness of our theory by highlighting its positive welfare and distributive implications. A short Conclusion ensues.

I.  Fair Use: Law and Theory

A.  The Fair Use Doctrine

The fair use doctrine made its first appearance in the U.S. in the 1841 case of Folsom v. Marsh.21Folsom v. Marsh, 9 F. Cas. 342 (C.C.D. Mass., 1841). According to scholars, however, its origins are far more ancient. Professor Matthew Sag, for example, suggests that the fair use doctrine “predate[d] Folsom v. Marsh by at least 100 years.”22Matthew Sag, The Prehistory of Fair Use, 76 Brook. L. Rev. 1371, 1387–93 (2011). Professor William Patry went even further and dated the doctrine back to the year 1710 when the Statute of Anne was enacted.23See William Patry, How to Fix Copyright 215 (2011). Other researchers trace the roots of the fair use doctrine to the common law and natural rights conceptions.24See generally Benjamin G. Damstedt, Limiting Locke: A Natural Law Justification for the Fair Use Doctrine, 112 Yale L.J. 1179 (2003); L. Ray Patterson, Understanding Fair Use, 55 L. & Contemp. Probs. 249 (1992).

In 1976, the fair use doctrine was codified and became part of the Copyright Act. 17 U.S.C. § 107 (“section 107”), in which the fair use doctrine is enshrined, opens with a preamble that offers a non-exhaustive list of presumptively fair uses, including, “criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research.”2517 U.S.C. § 107. Then, it proceeds to enumerate four factors that courts ought to consider when making fair use determinations: “(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; [and] (4) the effect of the use upon the potential market for or value of the copyrighted work.”26Id.

It is important to note that the codification of the fair use doctrine did not purport to change its nature as an equitable doctrine. In the accompanying House Report, Congress referred to the fair use doctrine as “an equitable rule of reason.”27H.R. Rep. No. 94-1476, at 65 (1976). The statutory formulation of the doctrine, therefore, preserved the flexibility and open-endedness that have become the hallmark of the fair use doctrine. As Judge Pierre Leval wrote in his 1990 classic article on fair use:

What is most curious about this doctrine is that neither the decisions that have applied it for nearly 300 years, nor its eventual statutory formulation, undertook to define or explain its contours or objectives. . . . [They] furnish little guidance on how to recognize fair use. The statute, for example, directs us to examine the “purpose and character” of the secondary use as well as “the nature of the copyrighted work.”28Pierre N. Leval, Toward a Fair Use Standard, 103 Harv. L. Rev. 1105, 1105–06 (1990); see also David Nimmer, “Fairest of Them All” and Other Fairy Tales of Fair Use, 66 L. & Contemp. Probs. 263, 287 (2003) (“[R]eliance on the four statutory factors to reach fair use decisions often seems naught but a fairy tale.”).

Even more remarkable was Judge Leval’s admission that although “courts have treated the definition of the doctrine as assumed common ground[, t]he assumption of common ground is mistaken. Judges do not dineshare a consensus on the meaning of fair use.”29Leval, supra note 28, at 1106. Indeed, the courts’ inability to converge on a common understanding of fair use has frustrated copyright scholars, leading Professor Larry Lessig to conclude that the fair use doctrine amounts to nothing other than “the right to hire a lawyer to defend your right to create.”30Lawrence Lessig, Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity 187 (2004).

While scholars have bemoaned the uncertainty that shrouds the fair use doctrine31See, e.g., Michael J. Madison, A Pattern-Oriented Approach to Fair Use, 45 Wm. & Mary L. Rev. 1525, 1666 (2004) (criticizing the unpredictability of fair use and referring to it as “a lottery argument”); Thomas F. Cotter, Fair Use and Copyright Overenforcement, 93 Iowa L. Rev. 1271, 1273–74 (2008) (highlighting the “often complex, fact-specific, and hence relatively unpredictable nature” of the standards that govern fair use); James Gibson, Once and Future Copyright, 81 Notre Dame L. Rev. 167, 192 (2005) (“[C]lear precedent on fair use is a rare thing in the fast-changing world of digital technology, and thus in many cases the uncertainty of the outcome would undoubtedly have a chilling effect on socially beneficial behavior.”); Peter S. Menell & Ben Depoorter, Using Fee Shifting to Promote Fair Use and Fair Licensing, 102 Cal. L. Rev. 53, 57 (2014) (“[I]t is exceedingly difficult for many cumulative creators to predict whether a use will qualify as fair use.”). and, over the years, have advanced various proposals in order to cabin the unpredictability of fair use,32See generally Gideon Parchomovsky & Kevin A. Goldman, Fair Use Harbors, 93 Va. L. Rev. 1483 (2007) (calling for the formalization of clear fair use harbors); Jason Mazzone, Administering Fair Use, 51 Wm. & Mary L. Rev. 395 (2009) (proposing the establishment of fair use tribunals); Michael W. Carroll, Fixing Fair Use, 85 N.C. L. Rev. 1087 (2007) (advocating the establishment of a regulatory agency that issues administrative rulings on fair use as a conceptual analogue to SEC and IRS decisions). in this Article, we take a different tack. We argue, contrary to conventional wisdom, that the inherent uncertainty of the fair use doctrine might actually help, rather than harm, users. The possibly virtuous effect of uncertainty has been overlooked by theorists as they have focused exclusively on the litigation arena. We, by contrast, are interested in the effect of fair use outside of the courtroom, in negotiations between copyright owners and users. We develop this argument fully in Part II of this Article, as part of our transactional model of fair use. But before elaborating on the potential virtues of uncertainty, it behooves us to complete our discussion of the development of the fair use doctrine and highlight some critical recent developments.

Four years after Judge Leval’s 1990 portrayal of fair use as a helplessly underminable doctrine, the fair use landscape was reshaped. The turning point was the Supreme Court’s 1994 decision in Campbell v. Acuff-Rose Music, Inc.. In finding 2 Live Crew’s version of Roy Orbison’s and Bill Dees’s copyrighted song “Oh Pretty Woman” a fair use, the Court stated that “the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use.”33Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994). As we will show, lower courts were quick to follow the language and spirit of the Campbell opinion. Since Campbell, transformativeness has become the currency of the fair use realm.34See, e.g., Bell & Parchomovsky, supra note 3, at 1067 (“Following Campbell, recent fair use decisions appear to focus on the transformativeness of the defendants’ works . . . as the key factor in fair use cases.”); Neil Weinstock Netanel, Making Sense of Fair Use, 15 Lewis & Clark L. Rev. 715, 736 (2011) (attesting that transformativeness “overwhelmingly dominate[s]” contemporary fair use doctrine); Rebecca Tushnet, Copy This Essay: How Fair Use Doctrine Harms Free Speech and How Copying Serves It, 114 Yale L.J. 535, 550 (2004) (“[F]air use increasingly requires transformation, that is, the addition of new material or a new, critical perspective.”).

The importance of transformativeness to fair use determinations was highlighted by Judge Leval in his classic article.35See generally Leval, supra note 28. Yet, it was the Supreme Court’s endorsement of transformativeness in Campbell that officially conferred upon it an elevated status.36Campbell, 510 U.S. at 579. Subsequent cases have substantially increased the weight granted to transformativeness in fair use determinations. Among others, courts held that a challenged work is worthy of protection whenever it “contains significant transformative elements,”37Comedy III Prods., Inc. v. Gary Saderup, Inc., 21 P.3d 797, 808 (Cal. 2001). is “sufficiently transformative,”38Mattel Inc. v. Walking Mountain Prods., 353 F.3d 792, 800 (9th Cir. 2003). or is endowed with a “patently transformative character.”39Mattel, Inc. v. Pitt, 229 F. Supp. 2d 315, 322 (S.D.N.Y. 2002). It has been further emphasized that a central purpose of fair use investigations is to establish “whether and to what extent the new work is ‘transformative.’ ”40On Davis v. Gap, Inc., 246 F.3d 152, 174 (2d Cir. 2001) (citing Campbell, 510 U.S. at 579). In other instances, courts submitted that copyright infringement, notwithstanding the commercial character of the work in question, may not be determined given that the original work is “used for a transformative purpose.”41Bill Graham Archives v. Dorling Kindersley Ltd., 448 F.3d 605, 612 (2d Cir. 2006).

The effect of the rise of transformativeness can be best seen in the context of fair use cases involving appropriation art. Appropriation art is an art form predicated on the use of existing objects with subtle modifications.42See, e.g., William M. Landes, Copyright, Borrowed Images, and Appropriation Art: An Economic Approach, 9 Geo. Mason L. Rev. 1, 1 (2000) (describing appropriation art as an area wherein an “artist’s technical skills are less important than his conceptual ability to place images in different settings and, thereby, change their meaning”). Cases on appropriation art include the Second Circuit’s famous Blanch v. Koons43Blanch v. Koons, 467 F.3d 244 (2d Cir. 2006). and Cariou v. Prince.44Cariou v. Prince, 714 F.3d 694 (2d Cir. 2013). In both cases, the court was persuaded of the sufficient transformation that the process of appropriation can embed. In Blanch, the court explained that Jeff Koons’s appropriation of Blanch’s photograph “was intended to be—and appears to be—‘transformative.’ ”45Blanch, 467 F.3d at 256. In Cariou, the court was more hesitant but nonetheless concluded that Richard Prince’s appropriating work “could be transformative even without commenting on Cariou’s work or on culture, and even without Prince’s stated intention to do so.”46Cariou, 714 F.3d at 707.

A closely related development in fair use jurisprudence that can also be traced back to Campbell involves parodies. A parody is defined as a derivative work whose purpose is to criticize or comment on a preexisting copyrighted work.47Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 580–81 (1994) (“Parody needs to mimic an original to make its point, and so has some claim to use the creation of its victim’s (or collective victims’) imagination, whereas satire can stand on its own two feet and so requires justification for the very act of borrowing.”). After classifying 2 Live Crew’s unauthorized rendition of “Oh Pretty Woman” as a parody, the Court likewise ruled that parodic uses are especially transformative and therefore have an especially strong claim for fair use.48Id. at 579 (“[A] parody has an obvious claim to transformative value . . . .”). The Court added that copyright owners are unlikely to authorize parodies that are of unflattering commentary or mockery to their works,49Id. at 592 (“[T]he unlikelihood that creators of imaginative works will license critical reviews or lampoons of their own productions removes such uses from the very notion of a potential licensing market.”). But see Jeanne C. Fromer, Market Effects Bearing on Fair Use, 90 Wash. L. Rev. 615, 645 (2015) (“Campbell’s specific conclusion about the unlikelihood of licensing markets in criticism is empirically dubious.”). and thus, the production of parodies critically depends on fair use.

The Supreme Court’s ruling in Campbell has been understood by lower courts and commentators to create something of a safe harbor for parodies.50See, e.g., Pamela Samuelson, Possible Futures of Fair Use, 90 Wash L. Rev. 815, 821 (2015) (“Although the Court in Campbell expressly declined to adopt a presumption that parodies of copyrighted works were fair uses, the parody case law after Campbell has resulted in many fair use rulings. . . . [This trend suggests] that parodies are de facto presumptively fair.”) (citations omitted); Bell & Parchomvsky, supra note 3, at 1101 (“[T]he Court effectively created a ‘safe harbor’ for parodies within fair use . . . .”). As Professor Pamela Samuelson observed, “[n]otwithstanding the Court’s unwillingness in Campbell to presume that parodies are fair, every subsequent parody case has been adjudged a fair use.”51Pamela Samuelson, Unbundling Fair Uses, 77 Fordham L. Rev. 2537, 2550 (2009). For example, in Suntrust Bank v. Houghton Mifflin Co., the Eleventh Circuit ruled that Alice Randall’s “The Wind Done Gone,” a critical literary account of Margaret Mitchell’s “Gone With the Wind,” was a parody of the original and was therefore a fair use of it.52Suntrust Bank v. Houghton Mifflin Co., 268 F.3d 1257, 1279–80 (11th Cir. 2001). Likewise, in Burnett v. Twentieth Century Fox Film Corp., the Court ruled that an audiovisual work produced by the creators of Family Guy, which poked fun at the figure of Carol Burnett, constituted a fair use on account of its parodic nature.53Burnett v. Twentieth Century Fox Film Corp., 491 F. Supp. 2d 962, 969 (C.D. Cal. 2007). Similarly, in Brownmark Films, LLC v. Comedy Partners, the Seventh Circuit held that a music video by the creators of South Park which parodied the plaintiff’s music video has “obvious transformative value.”54Brownmark Films, LLC v. Comedy Partners, 682 F.3d 687, 693 (7th Cir. 2012). Recently, the Second Circuit openly acknowledged that in the aftermath of Campbell, “parody, which ‘needs to mimic an original to make its point,’ . . . is routinely held transformative.”55Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 992 F.3d 99, 110 (2d Cir. 2021) (quoting Campbell v. Acuff-Rose Music, Inc., 518 U.S. 569, 580–81 (1994)).

Another line of cases, beginning with Kelly v. Arriba Soft Corp.,56Kelly v. Arriba Soft Corp., 336 F.3d. 811 (9th Cir. 2003). highlighted another key determinant of fair use: social benefit. Importantly, this category, too, grew out of the Supreme Court’s Campbell decision, with its emphasis on transformativeness. In Campbell, the Court suggested that a “parody has an obvious claim to transformative value” because “it can provide social benefit, by shedding light on an earlier work, and, in the process, creating a new one.”57Campbell, 518 U.S. at 579. The fair use cases that thrust public benefit to the forefront of the fair use analysis predominantly involved users from the technology sector. In Kelly, the Ninth Circuit ruled that the public display of photographs in the form of thumbnails as part of the operation of a visual search engine constituted fair use.58See generally Kelly, 336 F.3d. In reaching this conclusion, the court mentioned the benefit conferred on the public by the appellee’s search engine.59Id. at 820. Approximately four years later, in 2007, in Perfect 10, Inc. v. Amazon.com, Inc., the Ninth Circuit was asked to revisit the issue, when an adult content company sued Google, alleging that its authorized display of its copyrighted photos as thumbnails in response to users’ searches constituted copyright infringement.60See generally, Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146 (9th Cir. 2007). Finding that Google’s use was fair, the Ninth Circuit emphasized the “significant public benefit” of Google’s search system, explaining:

[A] search engine provides social benefit by incorporating an original work into a new work, namely, an electronic reference tool. Indeed, a search engine may be more transformative than a parody because a search engine provides an entirely new use for the original work, while a parody typically has the same entertainment purpose as the original work.61Id. at 1165.

The social benefit factor quickly found its way to the decisions of other circuits.62See, e.g., A.V. v. iParadigms, LLC, 562 F.3d 630 (4th Cir. 2009) (holding that the use of plaintiffs’ papers in defendant’s “Turnitin Plagiarism Detection Service” was fair). It played an important role in the Second Circuit’s ruling in Authors Guild v. Google, Inc..63See generally Authors Guild v. Google, Inc., 804 F.3d 202 (2d Cir. 2015). The case was brought after Google decided to establish a large, searchable digital repository of literary works by scanning the books in several libraries around the world, including the libraries of Harvard University, The University of California, Stanford University, The University of Michigan, Columbia University, Princeton University and the New York Public Library.64Id. at 208 n.3. The goal was to allow users to search the content of the books, yet the content of books could not be copied and only snippets from books were displayed to users in response to their searches.65Id. at 207. Nonetheless, after prolonged negotiations between the parties failed to yield a settlement, the Authors Guild sued Google for copious copyright infringements.66Id. at 211. In reaching the conclusion that Google’s use was fair, the district court dedicated a full section of its decision to a discussion of the myriad public benefits arising from Google’s use.67Authors Guild, Inc. v. Google Inc., 954 F. Supp. 2d 282, 291 (S.D.N.Y. 2013). On appeal, the Second Circuit affirmed the district court’s decision, awarding Google an important legal victory, but toned down the importance of the public benefits provided by Google.68See generally Authors Guild, 804 F.3d 202.

The final imprimatur of public benefit as a key determinant of fair use was given by the Supreme Court in its 2021 decision in Google LLC v. Oracle America, Inc.69Google LLC v. Oracle Am., Inc., 593 U.S. 1 (2021). In a 6-2 decision, the Supreme Court ruled that Google’s unauthorized appropriation of 11,500 lines of Oracle’s Java Application Programming Interface (“API”) for the Android operating system constitutes fair use.70See generally id. Writing for the majority, Justice Breyer noted the added value created by Google’s use for third parties:

Here Google’s use of the Sun Java API seeks to create new products. It seeks to expand the use and usefulness of Android-based smartphones. Its new product offers programmers a highly creative and innovative tool for a smartphone environment. To the extent that Google used parts of the Sun Java API to create a new platform that could be readily used by programmers, its use was consistent with that creative “progress” that is the basic constitutional objective of copyright itself.71Id. at 30. For criticism, see Terry Hart, Breyer’s Flawed Fourth Fair Use Factor in Google v. Oracle, Copyhype (June 1, 2021) https://www.copyhype.com/2021/06/breyers-flawed-fourth-fair-use-factor-in-google-v-oracle [https://perma.cc/6H78-PMKK] (“From a legal standpoint, I think Breyer is wrong to suggest that courts should consider the public benefits of copying as part of the fourth factor analysis.”).

Importantly, it was not only the courts that helped dispel some of the doctrinal mist that enveloped the fair use doctrine for centuries. Academics, too, have managed to point to overarching principles that affect fair use determinations. Two such efforts are worthy of special note.

In two separate projects, the first published in 200872See generally Beebe, supra note 10. and the second in 2020,73See generally Barton Beebe, An Empirical Study of U.S. Copyright Fair Use Opinions Updated, 1978–2019, 10 N.Y.U. J. Intell. Prop. & Ent. L. 1 (2020). Professor Barton Beebe empirically examined fair use case law to find correlations between various fair use factors and case results. His method allowed him to pierce the judicial rhetoric and examine which statutory factors are outcome determinative in fair use cases. In his 2008 article, which surveyed the opinions from all fair use cases issued between 1978 and 2005, Beebe noted that “[i]t appears . . . that courts and commentators have exaggerated the influence of transformativeness doctrine on our fair use case law.”74Beebe, supra note 10, at 604. However, in his 2020 article that analyzed the opinions from all fair use cases issued between 2005 and 2019, Beebe reports that “while the transformativeness test appeared to be waning in influence by 2005, it has since recovered its previous level of influence, even in the lower-profile, workaday fair use opinions that make up the majority of the data.”75Beebe, supra note 73, at 5. Along similar lines, Clark Asay, Arielle Sloan and Dean Sobczak have empirically established that if courts perceive a certain use as transformative, it would almost invariably qualify for fair use protection, which implies that transformativeness is essentially a sufficient condition for enjoying the fair use defense.76Clark D. Asay, Arielle Sloan & Dean Sobczak, Is Transformative Use Eating the World?, 61 B.C. L. Rev. 905, 941–42 (2020). These recent findings suggest an important confluence between judicial rhetoric and reality.

The Supreme Court’s recent decision in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith77Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 598 U.S. 508, 529 (2023). unfolded the most recent development in fair use jurisprudence. Issued in May 2023, the ruling is the first application of fair use in the arts and entertainment industry since the 1994 Campbell ruling. The Warhol case involves a series of Prince’s photos taken by photographer Lynn Goldsmith in 1981 to accompany a Vanity Fair article concerning Prince.78Id. at 515–16. Unbeknownst to Goldsmith, the magazine solicited Andy Warhol to create a stylized painted version of the photograph that became known as the “Orange Prince” silkscreen.79Id. at 516–17. Vanity Fair published the Orange Prince portrait in its November 1984 edition, and Goldsmith was co-credited for this work.80Id. at 517. Orange Prince, however, was only one of sixteen painted versions created by Warhol, collectively known as Warhol’s “Prince Series.”81Id. at 518–19. Pursuant to its completion, the Prince Series has been routinely displayed in museums and galleries.82Id. at 519 n.2. After Prince’s passing in 2016, Condé Nast, the official publisher of Vanity Fair, published a commemorative magazine entitled “The Genius of Prince,” with the Orange Prince portrait embellishing its cover.83Id. at 519–20. Alleging copyright infringement, Goldsmith argued that notwithstanding her initial 1984 licensing agreement with Condé Nast to use her photo one time as an “artistic reference,” she was unaware of the Orange Prince silkscreen—as well as of the Prince Series at large—until its reintroduction as part of the commemorative 2016 edition.84Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 992 F.3d 99, 106–08 (2d Cir. 2021).

Once Goldsmith learned of the aforementioned facts, she brought an infringement suit against the foundation. The Southern District of New York granted the foundation’s motion for a preliminary ruling that Warhol’s work, though it incorporated Goldsmith’s photograph, was sufficiently transformative to qualify as a fair use.85See Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 382 F. Supp. 3d 312, 326 (S.D.N.Y. 2019) (“[Warhol’s] alterations result in an aesthetic and character different from the original. The Prince Series works can reasonably be perceived to have transformed Prince from a vulnerable, uncomfortable person to an iconic, larger-than-life figure. The humanity Prince embodies in Goldsmith’s photograph is gone. Moreover, each Prince Series work is immediately recognizable as a ‘Warhol’ rather than as a photograph of Prince—in the same way that Warhol’s famous representations of Marilyn Monroe and Mao are recognizable as ‘Warhols,’ not as realistic photographs of those persons.”). The ruling was then overturned by the Second Circuit.86See generally Warhol, 992 F.3d 99. Finding that Warhol’s portrait incorporated no significant addition or alteration upon Goldsmith’s original photograph, the court concluded that the portrait was infringing.87Id. at 114–15 (“[T]he district judge should not assume the role of art critic and seek to ascertain the intent behind or meaning of the works at issue. . . . Warhol created the series chiefly by removing certain elements from the Goldsmith Photograph, such as depth and contrast, and embellishing the flattened images with ‘loud, unnatural colors.’ . . . Crucially, the Prince Series retains the essential elements of the Goldsmith Photograph without significantly adding to or altering those elements.”) (quoting Warhol, 382 F. Supp. 3d at 326). In a 7-2 decision, the Supreme Court elected to affirm the Second Circuit’s conservative interpretation of transformativeness, thus rejecting the appeal and siding with Goldsmith.88See generally Warhol, 992 F.3d 99. The Warhol case thus marks a potential deviation from status quo interpretation of the fair use doctrine. We analyze the implications of the rulings to our theory in Part II, below.

The preceding discussion teaches that the Supreme Court’s approach to fair use has interjected a certain degree of certainty and predictability into the doctrine. This is not to say that fair use has become a clear doctrine—far from it—but it can be generally stated that in the aftermath of Campbell, parodic uses, sufficiently transformative uses, and uses that produce significant public benefits are likely to be found fair. As we will explain in Part II, the creation of these fair use clusters, or silos, is of vital importance to our theory of fair use. But before introducing our own theory of fair use, we must give credit to prior theorists and discuss their contributions. It is to this task that we next turn.

B.  Theoretical Justifications of the Fair Use Doctrine

As befits a doctrine of its significance, scholars have advanced several theories to justify fair use. In this Section, we review the leading theoretical justifications of fair use. It should be emphasized at the outset that our goal is not to discredit other theories or even criticize them. As we will show, our theory of fair use complements existing theories by elucidating a central function of fair use that has hitherto evaded other scholars. The goal of the proceeding discussion is twofold: first, we wish to map the theoretical landscape of fair use, so we can precisely locate our own theory within it. Second, we seek to show how our justification of fair use interacts with the extant theoretic literature.

The most dominant theory has been put forth by Wendy Gordon.89Gordon, supra note 4. In an immensely influential article, Gordon argued that the fair use doctrine is a mechanism for allowing the use of copyrighted content when voluntary transactions between copyright owners and users are barred by high transaction costs.90See generally id. Specifically, Gordon postulated that fair use should be recognized when three cumulative conditions are met: (1) high transaction costs prevent consensual bargaining between copyright owners and users; (2) the unauthorized use is socially desirable; and (3) legitimizing the disputed use would not undermine incentives to create.91Id. at 1601.

To illustrate the operation of Gordon’s theory, imagine a student who wishes to quote a copyrighted manuscript. Assume that the author of the manuscript charges $20 for the requested use and that is also the maximum price that the student is willing to pay. However, transaction costs—defined as the cost of identifying the counterparty to the transaction, negotiating and formalizing an agreement with them, and enforcing the agreement—would bar the exchange from taking place. Under these circumstances, allowing the student to quote the manuscript without permission would make them (and society at large) better off without harming the author. The author, in our example, could not receive payment from the student, not because they refused to pay, but rather owing to the fact that the level of transaction costs made payment impossible. Hence, the author stands to lose nothing if the student’s use is considered fair and the student receives a benefit of $20. Society, too, is benefitted by the award of fair use to the student since the realm of creativity is enriched, while incentives to create future works are not harmed.

Gordon’s approach grounded fair use in economic theory, proving that the doctrine can be welfare enhancing when applied properly. However, the tie Gordon created between fair use and high transaction costs has proven to be a double-edged sword. As the title of her article, Fair Use as a Market Failure suggests, Gordon justified fair use as a means of overcoming a market failure in the form of high transaction costs. This was a great strength of Gordon’s theory, but also a potential weakness. Critically, Gordon’s theory established a direct correlation between the level of transaction costs and the cases in which fair use should be recognized. The problem is that improvements in telecommunications and computer technologies have dramatically lowered transaction costs since Gordon published her article in 1982, putting a lot of strain on Gordon’s theory. Critics of Gordon’s theory suggested that in an interconnected world, fair use has outlived its “raison d’être” and all uses must be secured via payment.92See, e.g., Bell, supra note 6, at 579–600. It bears emphasis that Gordon responded to her critics by broadening and sharpening the role of market failure in her account. Yet, Gordon’s account remains inextricably related to the concept of market failure, and it conceives fair use as a mechanism that operates in non-transactional settings, i.e., settings in which voluntary transactions are vitiated.93It should be noted that in a later article with Daniel Bahls, Gordon clarified that the presence of high transaction costs constitutes only a prima facie reason to recognize fair use and that fair use should also be recognized in the following cases: patterns of creative production that are not consistent with bureaucratic behaviors; anticommons, hold-out and bilateral monopoly problems; distributional inequities; positive externalities; use of another’s work not as expression but as a fact; use of another’s expression as a means to access the public domain; and critical, nonmonetizable or “priceless” uses of copyrighted works. See Wendy J. Gordon & Daniel Bahls, The Public’s Right to Fair Use: Amending Section 107 to Avoid the ‘Fared Use’ Fallacy, 2007 Utah L. Rev. 619, 623–24.

A slightly different justification of fair use that complements Gordon’s original justification has been offered by Ben Depoorter and Francesco Parisi. Depoorter and Parisi correctly pointed out that technological advancements do not lower all transaction costs.94Ben Depoorter & Francesco Parisi, Fair Use and Copyright Protection: A Price Theory Explanation, 21 Int’l Rev. L. & Econ. 453, 453 (2002). The problem of strategic holdouts remains, even in the face of technological advancements. The holdout problem is especially acute for users, such as creators of documentary works, who need to secure permission from multiple copyright owners. In such cases, each copyright owner possesses veto power over the planned use and may strategically exercise it to the detriment of users. The fair use doctrine allows users to carry out their creative projects despite strategic attempts by copyright owners to hamper the enterprise.95Id. at 459 (“In the absence of a fair-use defense, a third party who wishes to utilize [copyrighted content] needs to obtain the consent of all copyright holders.”) (emphasis added). Depoorter’s and Parisi’s account is both persuasive and elegant, but “it potentially limits the usefulness of the market-failure theory to only cases in which a user must clear multiple rights and has no other alternatives.”96Bell & Parchomovsky, supra note 3, at 1064.

Two additional justifications of fair use focus on allocative efficiency. The first, associated with William Fisher, calls on courts to use fair use to promote the goals of copyright protections.97See generally William W. Fisher III, Reconstructing the Fair Use Doctrine, 101 Harv. L. Rev. 1659 (1988). To this end, Fisher asks courts to think of all possible uses of copyrighted works. Then, for each use, he calls on courts to design what can be called an “efficiency ratio,” with the numerator representing the profit an author could realize if fair use is denied and the denominator representing the loss to society if the copyright owner refuses to license the work.98Id. at 1707. A high efficiency ratio suggests, per Fisher, that the use is probably unfair, while a low one indicates that the use is fair.99Id. Fisher sets the cutoff at the use with the highest marginal aggregate social gain (gain to society from creation minus loss to society from monopoly control over uses).100Id. at 1717. As Fisher himself admits, his approach to analyzing fair use, at least with respect to some sorts of works, “is nearly coterminus [sic] with economic analysis of the copyright system as a whole.”101Id. at 1704–05. Fisher likewise acknowledges that his approach is probably impractical in light of the informational burden it imposes on judges.102Id. at 1739.

A different allocative justification, termed the “dual-grant theory” of fair use, was constructed by Professor Abraham Bell together with one of this article’s authors.103See generally Bell & Parchomovsky, supra note 3. The dual-grant theory maintains that in designing our copyright system, Congress created two blocs of uses, allocating one to authors and the other to the public. Each group was given the uses which it values most. Accordingly, authors received “standard commercial uses,” while the public received “uses of highly dispersed social value,”104Id. at 1058. such as political speech, and uses that promote the pursuit of science, knowledge and truth.105Id. By contrast to Fisher’s theory of fair use, which requires courts to make individual case-by-case determinations of fair use, the dual-grant theory calls on courts to make fair use determinations based on the category of uses to which the challenged use belongs. This, in turn, renders the approach a lot more practical but less precise compared to Fisher’s framework of analysis.

II.  Fair Use as Licensing Leverage

As our discussion in Part I demonstrates, extant theories of fair use perceive it as a mechanism for bypassing the market and a substitute to owner-user bargaining. Importantly for the purpose of our analysis, all existing justifications of fair use focus exclusively on the courts. The underlying assumption in all four accounts is that fair use serves users exclusively in litigation or as a tool for overcoming negotiation breakdowns or high transaction costs that prevent negotiations from occurring ab initio.

The justification we develop in this Part focuses on the effect of fair use on enabling voluntary transactions between copyright owners and users. By contrast to prior justifications of fair use, we show that the main function of fair use is to facilitate bargaining, rather than replace it. We call this effect “the hidden function of fair use.” As we demonstrate, the fair use doctrine allows users to secure more favorable licensing terms from copyright owners. Importantly, our theory does not compete with any of the prior theories. Rather, it complements all four of them. This complementarity suggests that the effect of fair use is broader and deeper than previously believed.

A.  The Theory

In their acclaimed bestseller on negotiation theory, Getting to Yes, Professors Roger Fisher and William Ury famously stress that “the relative negotiating power of two parties depends primarily upon how attractive to each is the option of not reaching agreement.”106Roger Fisher & William Ury, Getting to Yes: Negotiating Agreement Without Giving In 102 (Bruce Patton, ed., 2d ed. 1991) (emphasis added). They therefore submit that a sine qua non107There are, of course, other factors of relevance, most prominently the information structure that the bargaining environment features. Information asymmetry with respect to private valuations may inhibit welfare-enhancing trade. See, e.g., Jennifer Gerarda Brown & Ian Ayres, Economic Rationales for Mediation, 80 Va. L. Rev. 323, 333 (1994) (“When the parties have private knowledge of their own [BATNAs], sellers will have an incentive to overstate their valuations in order to negotiate a higher price and buyers will have an incentive to understate their valuations in order to negotiate a lower price.”). for A’s bargaining advantage is that their benefit from a state of disagreement exceeds B’s, since, in such case, B would be willing to sacrifice more in order to reach an agreement, which diverts the terms of agreement formation in A’s favor. Normally, the party with the upper hand in a bargaining setting is the one who possesses a stronger BATNA.108Fisher & Ury, supra note 106, at 102 (“The better your BATNA, the greater your power.”); Leigh L. Thompson, Jiunwen Wang & Brian C. Gunia, Negotiation, 61 Ann. Rev. Psych. 491, 494 (2010) (“A negotiator’s BATNA has become the primary indicator of a negotiator’s relative power in negotiation.”). To exemplify, suppose that A is interested in selling B a used car, which B values at $10,000. Realizing this, A can require up to $10,000 to secure an agreement between the two. Assume now that C offers a similar car for sale, in exchange for only $5,000. C’s entry affects the negotiations between A and B: the maximum price that B would be willing to pay for A’s car now drops to $5,000. C’s entry, by providing B with an alternative to negotiating with A, enhances B’s BATNA.

The fair use doctrine has a similar effect to that of C’s entry in the previous example: it elevates users’ BATNA and thereby confers upon them significant leverage in negotiations with copyright owners. A helpful way to see this effect of fair use is to think of it as a call option the law gives to users over copyrighted content with a strike price of zero if their use is found fair. Recall that a fair use finding means that a user is not only free to use copyrighted content without permission, but also that they are allowed to do so free of charge.

To illustrate, suppose that Ella, an artist, is interested in using Francine’s copyrighted work for a transformative purpose and contacts her to acquire authorization. Assume that Ella values Francine’s work at $8,000 and is willing to pay Francine up to this sum in order to secure authorization. If Ella were to use Francine’s work without permission, she would be sued for copyright infringement and a court would order her to pay Francine $10,000 in damages.109For the sake of simplicity, assume that litigation costs for both parties are embedded in this amount.

To see the effect of fair use on negotiation dynamics, consider first a world without fair use. In this world, users can only use copyrighted content permissively. Any attempt at bypassing the market would be remedied by damages, an injunction, or both. Under a legal regime that does not recognize fair uses, Ella has no feasible alternative to negotiating with Francine. Using the work without authorization is not a viable option from Ella’s perspective, as it represents a negative net value (-$2,000): while Ella would receive a benefit of $8,000 from her use, she ought to pay $10,000 in damages. Therefore, in economic parlance, Ella has no credible threat of using without authorization: both parties know that if negotiations fail, Ella will just have to forgo her planned use. Consequently, Ella is willing to pay any price up to $8,000 (her valuation of Francine’s work), eliciting a positive benefit, instead of zero. Francine, in turn, would take advantage of her monopolistic status as an exclusive rightsholder and accord by setting up an asking price of $8,000—the maximum Ella is willing to pay.110The maximum price that users are willing to pay is also termed by the relevant literature as their reservation price—a quantitative representation of their BATNA, such that lower reservation price implies an increased BATNA. See, e.g., Ian Ayres, Further Evidence of Discrimination in New Car Negotiations and Estimates of Its Cause, 94 Mich. L. Rev. 109, 111 n.8 (1995) (“Dispute resolution theorists alternatively refer to a reservation price as a person’s ‘BATNA’ . . . .”); Ian Ayres & Barry J. Nalebuff, Common Knowledge as a Barrier to Negotiation, 44 UCLA L. Rev. 1631, 1642 (1997) (“[E]conomists tend to use the term ‘reservation price’ [to represent BATNA].”); Howard Raiffa, The Art & Science of Negotiation 45 (1982) (“The buyer has some reservation price . . . that represents the very maximum she will settle for . . . .”); Thompson et al., supra note 108, at 495 (“[Reservation points] are the quantification of a negotiator’s BATNA . . . .”). In such a world, therefore, Ella confronts an asking price of $8,000, which means that Francine gets to pocket the entire bargaining surplus.

Now consider a world with fair use. Assume that, given the high transformativeness of Ella’s intended use, there is a 0.5 probability that a court will find the use fair. This means that if negotiations fail, Ella is better off using Francine’s work without authorization than with forgoing the use: using the work without permission provides her with a benefit of $8,000 while the expected costs are only $5,000 (0.5 × $10,000 = $5,000). Critically, the introduction of fair use changes the expected value of unauthorized use from -$2,000 to $3,000 ($8,000 – $5,000). The existence of the fair use doctrine, thus, dramatically empowers users vis-à-vis copyright owners. This implies that Ella’s threat of using Francine’s work without permission becomes credible: if Francine’s asking price would exceed $5,000, Ella would walk off the negotiation table and use the work without authorization. This is because any asking price that crosses this threshold makes her benefit from authorization less than $3,000, which should lead her to refuse to pay this amount and, instead, use the work without authorization. In such a world, therefore, Ella confronts an asking price of $5,000.111For simplicity, we likewise assume that both Ella and Francine are risk neutral. We summarize the results of our examples in Table 1, below.

 

Table 1.  The Effect of Fair Use on Users’ Licensing Leverage

World

Ella’s Benefit from Using

Expected Cost of Unauthorized Use

Expected Value of Unauthorized Use

Ella’s Value of Not Using

Ella’s BATNA

Francine’s Asking Price

Without Fair Use

$8,000

$10,000

-$2,000

0

Non-existent

$8,000

With Fair Use

$8,000

$5,000

$3,000

0

Increased

$5,000

 

Assume next that Ella’s desired use is not only highly transformative, but a clear parody, thus representing a 0.8 probability of a fair use finding by a court. In that case, there is only a 0.2 probability that a court will find Ella liable for copyright infringement and award Francine damages. This, in turn, renders the expected value of unauthorized use for Ella even higher: $8,000 – 0.2 × $10,000 = $6,000. In light of this fact, Ella will never accept any asking price that surpasses $2,000. Realizing this, Francine would agree to license the work to Ella for $2,000. The results are summarized in Table 2.

 

Table 2.  The Effect of Increased Fair Use on Users’ Licensing Leverage

World

Ella’s Benefit from Using

Expected Cost of Unauthorized Use

Expected Value of Unauthorized Use

Ella’s Value of Not Using

Ella’s BATNA

Francine’s Asking Price

With Increased Fair Use Probability

$8,000

$2,000

$6,000

0

Further increased

$2,000

 

The logic that underlies this finding is as follows. When facing a copyrighted work, any user entertains a trichotomous choice: (1) they may pay a licensing fee and use the work unhinderedly; (2) they may avoid using it altogether; or (3) they may refrain from licensing, use the work without acquiring authorization, and face the expected costs of a copyright infringement lawsuit. Users’ BATNA essentially depends on the feasibility of the third alternative. Herein lies the significance of fair use. Fair use bestows upon users the power to credibly threat to use copyrighted content without authorization and thereby leads rightsholders to adjust their asking price downwards. A world without fair use, by contrast, would allow any rightsholder to prevail in an infringement suit against any unauthorized user, which obviates the user’s third alternative. In such a world, users are left with options (1) and (2): they can either pay copyright owners the licensing fees they post or refrain from using the work altogether.

The fair use doctrine not only engenders alternative (3) but also makes it viable. As in the example discussed above, knowing that Ella reaps a positive expected value of $3,000 from unauthorized use, Francine realizes that for any asking price that exceeds $5,000 (leaving Ella with a benefit of less than $3,000), Ella has a credible threat of not taking the deal and using the work without permission.

B.  The Model

Our theory can be generalized in a simple formal fashion. Let v denote a given user’s valuation of a given copyrighted work. Let A denote the owner’s asking price. A is the maximum licensing fee that the user finds attractive, i.e., the maximum price under which the user does not have a credible threat to engage in unauthorized use as a substitute for acquiring authorization. Denote by p the probability that a court will find that the user’s unauthorized use is protected by the fair use doctrine, and denote by D the damages the court is expected to award the rightsholder if fair use protection is not granted.

The owner’s asking price is given either by the user’s valuation of the work, v, or, if the user obtains a positive expected value from an unauthorized use (namely, if v – (1 –p)D > 0), by deducting this sum from v:

Note that in a world without fair use, p = 0. This means that if v < D, namely, as long as the court is expected to award damages that exceed the user’s valuation of the copyrighted work, unauthorized use is never a worthwhile alternative to licensing. The user thus possesses no leverage vis-à-vis the owner, and the latter will therefore require payment of v, the user’s valuation of the work, in order to grant authorization.

The fair use doctrine invariably increases the expected value of unauthorized use: raising the value of p from p = 0 to p > 0, which results in a higher p – (1 –p)D. Furthermore, for some threshold values of  and , it increases v – (1 –p)Dto satisfy v – (1 –p)D > 0, and in such case, the existence of the fair use doctrine results in positive expected value from unauthorized use. From the user’s perspective, this means that v > (v – (1 –p)D), and thus A, their negotiated authorization price, decreases. Figure 1 exemplifies the relationship between A, the asking price, and p, the probability of fair use, for given values of v and D that uphold D > v.

Figure 1.  The Effect of Fair Use on Copyright Pricing

This stylized model unfolds the technical bargaining mechanism that underlies our theory. Thus far, the accepted lore perceived fair use as offering users an effective bypass from licensing negotiations—but this statement can be confidently made only when fair use is granted with certainty (p = 1), which is hardly the regular case. The model emphasizes that even under the conventional setting where a fair use ruling is uncertain, the doctrine plays a critical role in the market for copyrighted content—the uncertainty translates into decreased asking price by monopolistic rightsholders, hence advantaging users’ bargaining standpoint.

We now turn to introduce evidence from licensing practices that supports our theory, and then we discuss the normative implications.

C.  Illustrations

Our theoretical exposition of the hidden function of fair use finds support in real world cases. In this Section, we provide various examples that substantiate our theoretical predictions. These cases show that users are aware of the bargaining leverage they can get from the fair use doctrine and take advantage of its more favorable licensing terms.

  1. Oracle and the Future of Licensing in Technologies

As noted, our theory likewise applies to providers of technological applications that generate a benefit to the public. A case in point can be found in Justice Thomas’s dissenting opinion in Google LLC v. Oracle America, Inc..112Google LLC v. Oracle Am., Inc., 593 U.S. 1, 42–60 (2021) (Thomas, J., dissenting). In support of his view that Google’s use of Oracle’s code was not fair, he noted that Google’s use created a reality where “device manufacturers no longer saw much reason to pay to embed the Java platform.”113Id. at 53. Justice Thomas proceeded to emphasize that:

[B]efore Google released Android, Amazon paid for a license to embed the Java platform in Kindle devices. But after Google released Android, Amazon used the cost-free availability of Android to negotiate a 97.5% discount on its license fee with Oracle. Evidence at trial similarly showed that right after Google released Android, Samsung’s contract with Oracle dropped from $40 million to about $1 million.114Id. (emphasis added).

The sharp decline in Oracle’s revenues from licensing its Java code provides a powerful illustration of the impact of fair use on market transactions. As the figures show, the bargaining leverage of Oracle in all of its licensing transactions critically depended on the licensees’ assessment of the strength of Google’s actual fair use claim and their own hypothetical fair use claims. For although Google was at the forefront of this legal battle, many other technology companies were similarly situated to Google insofar as their status as fair users.115See Gideon Parchomovsky & Alex Stein, Intellectual Property Defenses, 113 Colum. L. Rev. 1483, 1486 (2013) (characterizing fair use as a “class defense,” in that “it sets up a categorical bar against certain infringement claims, thereby protecting a specified class of defendants”). As the sentiment that Google would prevail gained purchase among technology companies, the revenues of Oracle sharply decreased, precisely as our theory predicts.

In analyzing the Supreme Court’s decision, commentators have noted that “[i]n the future, this decision may prompt more disrupters to use fair use as a shield in releasing new products or services that build off of older functional technologies, or otherwise influence negotiations as some potential licensees may find the value of certain functional code to be devalued by the Oracle.”116Sandra A. Crawshaw-Sparks, David A. Munkittrick, Jeffrey D. Neuburger & Anisha Shenai-Khatkhate, Landmark Fair Use Victory at the Supreme Court in Software Case, Nat’l L. Rev. (Apr. 9, 2021), https://www.natlawreview.com/article/landmark-fair-use-victory-supreme-court-software-case [https://perma.cc/HV93-6NEY].

  1. Documentary Filmmakers

Copyright scholars tend to refer to the documentary filmmakers’ population as a primary beneficiary of fair use. Documentary filmmakers must incorporate prior works, many of which are subject to copyright protection. Hence, the fair use doctrine is critical to the operation of the industry. It may come as no surprise, therefore, that documentary filmmakers are cognizant of their ability to leverage on fair use in negotiations with copyright owners. A 2020 study by the Center for Media and Social Impact (“CMSI”) concerning the state of the documentary field117See generally Caty Borum Chattoo & William Harder, 2020 Study of Documentary Professionals: Complete Data for Global and U.S. Respondents (2021), https://cmsimpact.org/report/the-state-of-the-documentary-field-2020-study-of-u-s-documentary-professionals [https://perma.cc/7SX9-DG64]. indicates that 76% of all participating U.S. documentary directors and producers have utilized or leveraged the fair use doctrine in the making of their most recent film.118Id. at 135. This corresponds to other surveys, wherein 70% of the filmmakers have rated their understanding of fair use as “good or excellent,”119See Patricia Aufderheide & Aram Sinnreich, Documentarians, Fair Use, and Free Expression: Changes in Copyright Attitudes and Actions with Access to Best Practices, 19 Info. Commc’n. & Soc’y 178, 182 (2016). while 73% of those with more than a decade of experience found fair use a “very useful” doctrine.120Id. at 184. Likewise, an elaborate manual published by the Archive Valley company, which provides archival services for documentarists, introduces the underlying strands of fair use by explaining to authors that “if you meet the fair use guidelines . . . you can use footage for free,” but complements this straightforward statement by informing authors that “[e]ven if you know that you do want to license footage, knowing your rights about fair use can put you in a stronger negotiating position.”121Fair Use Explained: Our Expert Guide for Documentary Filmmakers, Archive Valley, https://web.archive.org/web/20230204193557/https://archivevalley.com/blog/fair-use-explained-our-expert-guide-for-documentary-filmmakers [https://perma.cc/3G8S-YFP7].

Finally, it seems that the leverage fair use bestows upon filmmakers changes the boundaries of the bilateral owner-user bargaining. Crucially, a strong fair use claim appears to pave authors’ way to efficiently negotiate with relevant third parties, too. In this regard, 95% of filmmakers have reported to persuade broadcasters regarding the applicability of fair use to their case when equipped with a lawyer’s letter.122Aufderheide & Sinnreich, supra note 119, at 182. 99% responded identically when asked about negotiations with insurers.123Id. This means that fair use not only leverages users when bargaining with rightsholders, but, as importantly, alleviates the entire chain of negotiations necessary for pursuing one’s artistic vision.

  1. Parodies and Satires

The story of the musician “Weird Al” Yankovic, who is known for his humoristic commercial adaptations of popular music, provides yet another real-world example of the effect of ambiguity on broadening the population of users that can enjoy increased licensing leverage in light of fair use. Whether Yankovic’s spoof songs are in fact parodies124See, e.g., Carroll, supra note 32, at 1108 (describing Yankovic’s practice as “record[ing] parodies of popular songs along with some original compositions”); Rebecca Tushnet, Payment in Credit: Copyright Law and Subcultural Creativity, 70 L. & Contemp. Probs. 135, 161 (2007) (describing Yankovic’s “This Song Is Just Six Words Long” as a parody for mocking the original “I Got My Mind Set on You”). or satires125See, e.g., Charles J. Sanders & Steven R. Gordon, Stranger in Parodies: Weird Al and the Law of Musical Satire, 1 Fordham Ent. Media & Intell. Prop. L.F. 11, 35 (1990) (“Mr. Yankovic’s ability to rely on the fair use doctrine to excuse the unlicensed uses of the songs and music videos he parodies is extremely doubtful.”). is a controversy that has never been, and probably never will be, settled, as Yankovic always acquires authorization from the owners of the rights to the original songs126Frequently Asked Questions, “Weird Al” Yankovic, https://www.weirdal.com/archives/faq [https://perma.cc/6KU7-CUWA] (“Al does get permission from the original writers of the songs that he parodies. While the law supports his ability to parody without permission, he feels it’s important to maintain the relationships that he’s built with artists and writers over the years. Plus, Al wants to make sure that he gets his songwriter credit (as writer of new lyrics) as well as his rightful share of the royalties.”).—be it because of industry norms127See Mark A. Lemley, Should a Licensing Market Require Licensing?, 70 L. & Contemp. Probs. 185, 191 n.35 (2007) (noting that Yankovic may acquire licensing “for reasons related to social norms in Hollywood rather than legal compulsion.”). or in order to be on the “safe side” of copyright law. Interestingly, however, Yankovic’s practice has been described as “[l]icensing [w]ith [l]everage.”128Sanders & Gordon, supra note 125, at 34.

Yankovic, whose parodic use adjoins satire, bargains for authorization under a fairly reasonable possibility of fair use protection. And Yankovic is not alone. Other artists who produce adaptations of copyrighted works have the same leverage that he does: they possess a colorable fair use claim.

It should be underscored that this broadening effect is not limited to musical adaptations. Rather, it applies to copyrighted subject matter categories, from videoclips to literary works. As importantly, the effect is not confined to adaptations that straddle the line separating parodies and satires. In the case of transformative uses, the effect is much broader. Consider, for example, the case of Gregg Gillis, better known as the popular D.J. Girl Talk, whose foremost artistic contribution has been described as “mak[ing] danceable musical collages out of short clips from other people’s songs.”129Robert Levine, Steal This Hook? D.J. Skirts Copyright Law, N.Y. Times (Aug. 6, 2008), https://www.nytimes.com/2008/08/07/arts/music/07girl.html [https://web.archive.org/web/20250000000000*/https://www.nytimes.com/2008/08/07/arts/music/07girl.html]. Gillis insists that his sampling work is protected by the fair use doctrine, and therefore, as opposed to Yankovic, he consistently refuses to solicit authorization from rightsholders to the original works.130Id. Markedly, while many have accused Gillis of infringing upon their exclusive rights, a lawsuit has yet to be filed.131Id. In short, thus, it appears that both Gillis and his accusers believe that the musician enjoys a solid case, garnering a sufficiently high fair use probability that in turn nullifies the credibility of threats to sue. This translates into a reservation price of zero.

  1. Warhol and the Future of Transformativeness

Another exemplification of the utilization of the transformativeness threshold into licensing leverage can be driven from Cariou v. Prince, in which the Second Circuit defined transformativeness as any alteration of the original’s “expression, meaning, or message,” finding that even appropriation art can be considered fair use.132Cariou v. Prince, 714 F.3d 694, 706 (2d. Cir. 2013) (citing Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994)). Under this expansive definition of fair use, any user who adapts a work can raise a fair use defense. Obviously, not every adaptation would be ruled fair. Similarly, not every appropriation artist will meet the same faith as Richard Prince. But every transformative user has bargaining leverage thanks to this broad definition.

 As noted, however, the Supreme Court’s recent decision in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith diverges from preceding rulings on transformativeness that advantaged users, and it seems to reallocate bargaining power between users and rightsholders.133Andy Warhol Found. for the Visual Arts, Inc. v. Goldsmith, 598 U.S. 508, 540–41 (2023). Owing to Warhol, we might confront a shift toward a new era that introduces a new equilibrium in the market for copyrighted content.

Notwithstanding their absence from both popular discourse and academic scholarship on fair use, the Justices—both members of the majority and dissenters—were far from oblivious to this outcome. First, this understanding manifests in Justice Sotomayor’s articulation of the majority opinion. Justice Sotomayor first warns us that the broad interpretation of transformativeness would favor users with utterly disproportionate leverage over the original rightsholder. Upon recognizing that transformativeness “is a matter of degree,”134Id. at 510. Justice Sotomayor maintains that:

[Holding for the Plaintiff] would potentially authorize a range of commercial copying of photographs, to be used for purposes that are substantially the same as those of the originals. As long as the user somehow portrays the subject of the photograph differently, he could make modest alterations to the original . . . and claim transformative use.135Id. at 546.

Justice Sotomayor’s words implicitly capture our theory, acknowledging the simple fact that the degree of transformativeness that suffices for the Court to bestow a fair use defense would shape market interactions between owners and users. Determining that changes reminiscent to those made by Andy Warhol are not significant enough to meet this threshold, particularly when the use is of commercial nature, Justice Sotomayor precludes users from leveraging a fair use claim and consequently—when viewed via an economic lens—submitting that their intended use does not deserve a reduced licensing fee.

More explicit are the statements made in Justice Kagan’s dissenting opinion. Justice Kagan distinctly highlights the pivotal role of the Supreme Court in allocating bargaining surplus between owners and users, noting that by refusing to side with Warhol’s deeds, the Court would frustrate users’ ability to license under favorable terms:

Still more troubling are the consequences of today’s ruling for other artists. If Warhol does not get credit for transformative copying, who will? And when artists less famous than Warhol cannot benefit from fair use, it will matter even more. . . . [A]s our precedents show, licensors sometimes place stringent limits on follow-on uses, especially to prevent kinds of expression they disapprove. And licensors may charge fees that prevent many or most artists from gaining access to original works.136Id. at 593 (Kagan, J., dissenting).

The transactional role of the fair use doctrine and its effect on licensing negotiations has been properly identified and adequately considered. Despite that, the Court has upset the longstanding understanding of market actors, potentially requiring the market to form a new equilibrium that is less favorable to users. This leads us to conclude that the reallocation of bargaining power that we expect to witness in the near future—together with the inevitable increase of copyright pricing—is the Court’s fully conscious decision, rather than an unforeseen economic side effect.

III.  Normative Implications

In this Part, we explain how the licensing leverage created by fair use ameliorates the efficiency losses and inequities associated with copyright protection. In particular, we demonstrate the doctrine’s ability to increase the number of voluntary transactions between copyright owners and users and to redistribute wealth from rightsholders to users.

A.  Countervailing Allocative Inefficiencies

Being quintessential public goods, intellectual works cannot be supplied efficiently by the free market.137See, e.g., Bell & Parchomovsky, supra note 3, at 1057 (“[E]xpressive works are nonrivalrous in their consumption. . . . [T]he use of an expressive work by any particular consumer does not diminish in any way the ability of another user to consume it.”); Mark A. Lemley, Ex Ante Versus Ex Post Justifications for Intellectual Property, 71 U. Chi. L. Rev. 129, 129 (2004) (“Ideas are public goods: they can be copied freely and used by anyone who is aware of them without depriving others of their use.”). But see Christopher S. Yoo, Copyright and Public Good Economics: A Misunderstood Relation, 155 U. Penn. L. Rev. 635, 671–75 (2007) (disputing the customary perception of copyrighted contents as pure public goods). In the absence of a legal prohibition on copying, users would be able to copy expressive works with impunity. In such a world, the market price of copyrighted works would rapidly drop to zero, and so would the incentives to create and supply intellectual goods. Unable to recoup their initial investment in the creation of original content, authors may well decide to put their creative skills to rest. The need to maintain authors’ incentives to create warrants legal intervention that would grant them exclusive control over the distribution of their works.138See, e.g., Abraham Bell & Gideon Parchomovsky, Reinventing Copyright and Patent, 113 Mich. L. Rev. 231, 240–41 (2014) (“Copyright protection confers upon authors a bundle of exclusive rights in order to motivate them to produce original expressive content.”); Sara K. Stadler, Incentive and Expectation in Copyright, 58 Hastings L.J. 433, 433 (2007) (“Nothing is more fundamental to copyright law than the concept of incentives.”). But see Diane Leenheer Zimmerman, Copyrights as Incentives: Did We Just Imagine That?, 12 Theoretical Inquiries L. 29, 29 (2011) (suggesting that creation is driven by intrinsic and expressive motives, rather than by monetary rewards).

 Yet, the legal exclusivity copyright law bestows upon authors creates several costs. Chief among them is monopolistic pricing.139See Bell & Parchomovsky, supra note 138, at 239 (“Inventors and authors sell rights to their inventions and works at prices reflecting a monopolistic rather than a competitive market.”); Adi Libson & Gideon Parchomovsky, Toward the Personalization of Copyright Law, 86 U. Chi. L. Rev. 527, 528 (2019) (“The grant of legal exclusivity to authors introduces the problem of supracompetitive (or monopolistic) pricing.”). Two major effects are customarily attributed to monopolistic pricing: allocative inefficiency and distributional inequity.

The allocative inefficiency arising from exclusivity is well established.140See, e.g., Michael Abramowicz, A Theory of Copyright’s Derivative Right and Related Doctrines, 90 Minn. L. Rev. 317, 325–32 (2005); Shyamkrishna Balganesh, Foreseeability and Copyright Incentives, 122 Harv. L. Rev. 1569, 1578 (2009); Bell & Parchomovsly, supra note 138, at 239–43; Yochai Benkler, The Wealth of Networks: How Social Production Transforms Markets and Freedom 35–37 (2006); Niva Elkin-Koren, Copyright Policy and the Limits of Freedom of Contract, 12 Berkeley Tech. L.J. 93, 99–100 (1997); Fisher, supra note 97, at 1702; Libson & Parchomovsy, supra note 139, at 542–43; Gideon Parchomovsky & Alex Stein, Originality, 95 Va. L. Rev. 1505, 1518–19 (2009); Giovanni B. Ramello, Copyright and Antitrust Issues, in The Economics of Copyright 118, 124 (Wendy J. Gordon & Richard Watt eds., 2003); Christopher Sprigman, Reform(aliz)ing Copyright, 57 Stan. L. Rev. 485, 524 (2004). Others, however, have perceived copyright law’s grant of exclusivity as establishing monopolistic competition—a market wherein each manufacturer supplies a unique product, yet all products are close substitutes. See Michael Abramowicz, An Industrial Organization Approach to Copyright Law, 46 Wm. & Mary L. Rev. 33, 35–39 (2004); Christopher S. Yoo, Copyright and Product Differentiation, 79 N.Y.U. L. Rev. 212, 241 (2004). Even in such cases, the exclusivity conferred upon authors by copyright law erodes the efficient allocation of resources. See Bell & Parchomovsky, supra note 138, at 241. Monopolistic pricing invariably creates a deadweight loss.141Bell & Parchomovsky, supra note 138, at 240. This loss emanates from the fact that some consumers who were willing to pay the competitive price for the good or service would not be able to pay the higher, monopolistic price, and would simply forgo the good or service. As a result, certain welfare-enhancing transactions that would have occurred in a competitive market would not take place under monopolistic pricing.142Id.; see also Libson & Parchomovsky, supra note 139, at 542 (“Copyright protection . . . invariably gives rise to a deadweight loss, represented by the loss of those users who would have purchased the content at the competitive price but not at the supracompetitive price.”). To illustrate, suppose that a good is offered by a monopolistic manufacturer for $20. Assume, however, that had the production process been perfectly competitive, the same good would have been offered for a price of $12. In this example, the deadweight loss is represented by the foregone transactions of the buyers who value the good at more than $12 but less than $20. As economist William McEachern points out, this phenomenon “is called the deadweight loss of monopoly because it is a loss to consumers but a gain to nobody.”143William A. McEachern, Economics: A Contemporary Introduction 209 (11th ed. 2017) (emphasis omitted).

Perhaps even more worrisome than its adverse effect on allocative efficiency is the distributional inequities imposed by monopolistic pricing. Since the monopolistic price is higher than the competitive price, it works to transfer wealth from consumers to the monopolist. Monopolistic pricing, in other words, allows monopolists to capture consumer surplus.144Id. (“[T]he monopolist’s economic profit comes entirely from what was consumer surplus under perfect competition.”); Bell & Parchomovsky, supra note 138, at 240 (“[T]he monopolist becomes richer than she would be in a competitive market and the [consumer] becomes poorer.”). To see this, let’s return to the above example, and consider a consumer who values the good at $22. Recall that the monopolist sets the price at $20, whereas in a competitive market, the price of the good would be $12. Under perfect competition the consumer would have paid $12 for the good, thus deriving a surplus of $10 ($22 – $12) from the transaction. Under monopolistic pricing the surplus of the consumer shrinks to $2 ($22 – $20), with the $8 lost to the consumer being transferred to the monopolist—all relative to a competitive market.

To understand how fair use remedies the allocative inefficiencies resulting from the exclusivity granted by copyright protection, consider a copyright owner who offers their work for a fixed license fee, which represents the profit-maximizing amount for them. As opposed to the general analysis unfolded in Part II, we now assume that, for whatever reason, price differentiation is impracticable from the rightsholder’s perspective.145If price differentiation were possible, the rightsholders would have been considered a discriminating monopolist, who accords each user an asking price equal to the maximum amount they are willing to pay for authorization. Under such price differentiation, each user manages to acquire authorization, hence no allocative inefficiencies are imposed on account of copyright monopoly. Nevertheless, price differentiation imposes severe distributional inequities, as the copyright owner captures the user’s entire bargaining surplus. See, e.g., Yoo, supra note 140, at 230 (“Perfect price discrimination (i.e., if authors were able to charge each consumer the maximum amount she would be willing to pay) would eliminate deadweight loss . . . . The problem is that perfect price discrimination is never possible . . . .”). Our theory submits that under such circumstances, the mere existence of fair use for certain users creates a positive externality for other users who have no fair use claim.146For the analysis of externalities by copyrighted content, see generally Brett M. Frischmann & Mark A. Lemley, Spillovers, 107 Colum. L. Rev. 257 (2007). In this respect, the number of voluntary transactions may increase, decline, or remain unchanged, but what bears emphasis is that fair use avails the entire universe of users, including those users who would never persuade the court that their use is considered fair.

To see this counterintuitive outcome, suppose that the relevant users are five parodists and two satirists. For this example, assume that the parodists’ valuation of using the work is $10,000, while the satirists’ valuation is, say, $6,000.147We consider it reasonable to posit that, typically, the valuation satirists ascribe to a given work is lower than the one that parodists do. This hinges on the distinction set forth in Campbell. Since parodic use targets the particular work in question, parodists have no feasible alternative to using the work for actualizing their artistic vision. Satirists, on the other hand, use the work as a means to the end of tackling a certain social phenomenon, and may therefore convey their message by using other works as well. The existence of feasible alternatives to using the particular work or lack thereof, affects the valuation of a given user. For simplicity’s sake, assume that the damages in case of infringement are likewise $10,000. It is easy to see that if the monopolist has to determine a fixed, undifferentiated asking price, this price will be either $10,000 (thus authorizing only parodists) or $6,000 (thus authorizing all users, satirists included). The profit-maximizing price in that case is $10,000, since 5 × $10,000 > 7 × $6,000. Therefore, only parodists manage to obtain authorization from the owner, while satirists are precluded from using the work in light of their unwillingness to pay $10,000, neither as licensing fees nor as damage awards.

Things change dramatically, however, in a world with fair use. To begin, suppose any parodist holds 0.5 probability of obtaining a fair use ruling in their favor, whereas satirists have no chance of convincing the court that they are entitled to a fair use ruling. But note, while satirists will rarely enjoy a fair use ruling in their favor, they in fact manage to obtain user authorization in a world in which the fair use doctrine exists. In this world, the owner can never sell at $10,000: if they were to stick to this asking price, all parodists are incentivized to use the work without permission, as the expected value of using without authorization is $5,000 (0.5 probability multiplied by $10,000 in damages). Therefore, the two relevant pricing schemes are either $6,000 (authorizing only satirists) or $5,000 (authorizing all users). The

rightsholder is expected to set an asking price of $5,000 since 7 × $5,000 > 2 × $6,000.148A caveat is in order here. It should be noted that the rightsholder may nonetheless prefer to set the asking price at $6,000, and, in parallel, pursue a copyright infringement lawsuit against the five parodists. This allows them to secure $25,000 (five lawsuits, each representing $5,000 in expected damages) and an additional $12,000 in revenue from licensing satirists. Yet, in such case, litigation essentially serves as a means of monopolistic price discrimination. Since this Section studies the effect of fair use on copyright pricing in a market without the rightsholder’s ability to engage in price discrimination, we assume that the asking price is $5,000. Either way, what this example aims to demonstrate is that satirists enjoy an increased licensing leverage on account of fair use, despite having no chance of enjoying this defense in court.

If, on the other hand, any parodist holds 0.9 probability of obtaining fair use, this increased probability simply results in the rightsholder focusing exclusively on negotiations with satirists, setting an asking price of $6,000 as 7 × $1,000 < 2 × $6,000.

Interestingly enough, this example illustrates not our primary argument that fair use bolsters users’ bargaining power, but rather, that if rightsholders are subject to a fixed licensing fee, the doctrine may avail even users with zero probability of obtaining fair use protection. The hitherto undiscussed impact of fair use on copyright pricing allows them to enjoy copyrighted content they would not have in a world without fair use.

It should be noted that while parodists in the latter example will not be willing to pay the fixed price required by the rightsholder for authorization, they will manage to reach a favorable settlement if the copyright owner decides to sue them for infringement. Due to their enhanced probability of enjoying a fair use ruling, a settlement agreement is expected to feature extremely low payment on their behalf.149See, e.g., Angel Siegfried Diaz, Fair Use & Mass Digitization: The Future of Copy-Dependent Technologies After Authors Guild v. HathiTrust, 28 Berkeley Tech. L.J. 683, 685 (2013) (discussing the impact of the fair use ruling in Authors Guild v. HathiTrust on other actors’ willingness to settle with Google).

B.  Redistributing Bargaining Surplus

In addition to improving allocative efficiency by increasing the number of users who enjoy owner authorization, fair use also has the effect of ameliorating the distributive distortions arising from copyright protection. As already noted, without fair use, rightsholders are positioned to capture the lion’s share of the users’ bargaining surplus by setting up prices that approximate users’ maximal valuations. In our previous example, even the five parodists who are willing to pay $10,000 for the right to use a work would have to fork over to the copyright owner—who sets an asking price of $10,000—all of their bargaining surplus.

This unfortunate outcome exemplifies monopolistic holdout. More specifically, monopolistic rightsholders manage to extract increased payments particularly from those users who consider the work extremely valuable. Pertinent examples include young technological entrepreneurs who are in need of particular copyrighted software in order to advance their startup initiative, or documentary filmmakers at the dawn of their career who are required to negotiate with a myriad of rightsholders in order to actualize their cinematic vision.

These users, and others, confront a significant barrier erected by copyright owners, who strategically hold out to extract exorbitant licensing fees. On our theory, the fair use doctrine counterbalances such strategic behavior. In addition to improving licensing terms for all users who possess a fair use claim (and, as exemplified earlier, even for those who do not), the doctrine helps reduce monopolistic holdouts in negotiations. This insight is not merely theoretical. It can be seen at work in the aftermath of the Supreme Court’s recent decision in Google LLC v. Oracle America, Inc..150Google LLC v. Oracle Am., Inc., 593 U.S. 1 (2021). The ruling has won commentators’ accolades for lowering entry barriers for smaller startup initiatives: consistent with our analysis, the ruling eroded the strategic incentive of powerful software owners to prevent smaller competitors, seeking interoperability with industry standards, from entering the market.151See, e.g., Daniel Howley, Google’s Supreme Court Victory over Oracle Hailed as ‘Fantastic’ for Small Companies, Yahoo Finance (Apr. 5, 2021), https://finance.yahoo.com/news/google-victory-over-oracle-fantastic-for-small-companies-190748155.html [https://perma.cc/VTP8-G7SE]; Shira Ovide, Google Won. So Did Tech., N.Y. Times (Apr. 6, 2021), https://www.nytimes.com/2021/04/06/technology/google-oracle-supreme-court.html [https://perma.cc/Q9TB-KKTV]. Smaller developers can currently draw on the Google decision to acquire what is needed from a preexisting application programing interface, to provide consumers an innovative, transformative technological program.152Google, 593 U.S. at 34–35.

The Warhol decision withheld the user-advantaging trend that bestows fair use protection even on mildly transformative users. Ample criticism has been directed against the Court since the decision was handed, primarily spotlighting the confinement of artistic freedom inevitably imposed by their ruling.153See, e.g., Amy Adler, The Supreme Court’s Warhol Decision Just Changed the Future of Art, Art in Am. (May 26, 2023), https://www.artnews.com/art-in-america/columns/supreme-court-andy-warhol-decision-appropriation-artists-impact-1234669718 [https://perma.cc/BW93-XXSW] (“[T]he Court’s Warhol decision will significantly limit the amount of borrowing from and building on previous works that artists can engage in.”); Blake Gopnik, Ruling Against Warhol Shouldn’t Hurt Artists. But It Might., N.Y. Times (May 19, 2023) https://www.nytimes.com/2023/05/19/arts/design/warhol-prince-supreme-court-copyright.html [https://perma.cc/2SHM-EUQ9] (“All of a sudden Goldsmith would have close to a veto over someone else’s artistic expression, or at the very least its media reproduction.”). But one crucial aspect keeps eluding the commentators. As our analysis shows, the Court’s decision not only restricts artistic expression, but also diminishes the bargaining power of users in negotiations with rightsholders and thereby increases the price of copyrighted content. A narrow view of fair use makes one miss this aspect.

C.  The Role of Damage Awards

To equip users with the full force of fair use, it is imperative to ensure that other copyright law doctrines may chill the effect this Article identifies. In particular, exaggerated damage awards may undesirably offset the economic virtues of the fair use doctrine. This is an especially grave concern in the copyright domain, as copyright owners typically sue for statutory damages. As Ben Depoorter noted, “[o]nce infringement has been established, a plaintiff may elect a statutory damage award. In doing so, 17 U.S.C. § 504(c) of the 1976 Copyright Act relieves the copyright holder from the burden of providing any evidence whatsoever of actual harm. Among developed Western democracies, the U.S. copyright statutory framework is exceptional.”154Ben Depoorter, Copyright Enforcement in the Digital Age: When the Remedy Is the Wrong, 66 UCLA L. Rev. 400, 409 (2019). Indeed, under the current regime, statutory damages for watching an illegal livestream may amount to $150,000.15517 U.S.C. § 504(c)(2) (“In a case where the copyright owner sustains the burden of proving, and the court finds, that infringement was committed willfully, the court in its discretion may increase the award of statutory damages to a sum of not more than $150,000.”). Oren Bracha and Talha Syed have similarly pointed out that “[t]he most troubling [aspects of statutory damages] are those cases in which massive supracompensatory damages are inflicted on ordinary individuals who are unable to spread the impact of such awards through limited liability or dispersed ownership.”156Oren Bracha & Talha Syed, The Wrongs of Copyright’s Statutory Damages, 98 Tex. L. Rev. 1219, 1220 (2020); see also Pamela Samuelson & Tara Wheatland, Statutory Damages in Copyright Law: A Remedy in Need of Reform, 51 Wm. & Mary L. Rev. 439, 443 (2009) (“In the modern world in which the average person in her day-to-day life interacts with many copyrighted works in a way that may implicate copyright law, the dangers posed by the lack of meaningful constraints on statutory damage awards are acute. Even a defendant who presents a plausible fair use defense at trial may find itself subject to large statutory damage awards.”). As an alternative to statutory damages, rightsholders may choose the path of receiving actual damages based on their lost profits, potentially coupling them with disgorgement of infringers’ profits and thus securing supra-compensatory payment. See generally Roy Baharad, The Uneasy Case for Copyright Disgorgement, 77 Fla. L. Rev. (forthcoming 2025) (criticizing the use of disgorgement as a remedy for copyright infringement), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5088325.

Apart from the usual pitfalls scholars associate with excessive copyright damages—namely, overdeterrence and suboptimal use of copyrighted works—we wish to emphasize its adverse impact on the licensing leverage that fair use provides to users. To see this, return to the main example on which we draw to convey our conception of fair use. Assume that rather than $10,000, Francine is expected to enjoy $50,000 in damages if she prevails in court. In this scenario, as in the case in a world without fair use, Ella is devoid of any feasible alternative to negotiations: the value of unauthorized use to her is 0.5 × (-$50,000) + $8,000 = -$17,000, which means that even in a world with fair use, she has no credible threat of using Francine’s work without authorization. Under these circumstances, the fair use doctrine does not bestow upon Ella a credible threat (and licensing leverage thereof) as long as her probability of prevailing in court falls short of 0.84.

By the same token, courts’ commitment to relatively modest awards is expected to significantly enhance the impact of fair use on users’ bargaining standpoint. Modest awards imply that even a user with a low probability of persuading the court of their entitlement to fair use will enjoy licensing leverage in negotiations with copyright owners. Taking this idea to the extreme, suppose that Francine is expected to be awarded $5,000 if she prevails in court. Recall that Ella values the use of Francine’s work at $8,000. In this case, Francine’s a-priori asking price is reduced irrespective of fair use: even without the doctrine, Ella will not be willing to pay any licensing fee that surpasses $5,000, since this would make unauthorized use more beneficial. Under the fair use doctrine, this price will drop even further.

Excessive damage awards imply that even users with a strong fair use claim might rationally refrain from an unauthorized use to avoid the insurmountable expected loss in future copyright litigation. We, therefore, call upon judges and legislators to determine damages in copyright cases when accounting for the possible erosion of users’ negotiation standpoint. In other words, we submit that by exhibiting restraint in the determination of damages, decisionmakers can bolster the hidden function of fair use; yet, by superfluously awarding damages to rightsholders, they might nullify this function in its entirety.

D.  The Latent Virtue of Ambiguity

Our theory of fair use also puts ambiguity in a different light. A recurring criticism of the fair use jurisprudence concerns its uncertainty. The ambiguity of the fair use doctrine has been accused of overdeterring individuals from using copyrighted content. As James Gibson argued, even users with a strong fair use claim may rationally elect to license copyrighted content or refrain from using it altogether in order to avoid the inherent uncertainty that attends the fair use doctrine.157See generally James Gibson, Risk Aversion and Rights Accretion in Intellectual Property Law, 116 Yale L.J. 882 (2007). Losing on a fair use claim comes at a high price: a court may order the unlucky defendant to pay high statutory damages. Anticipating this, users may rationally choose not to assert their fair use claim in court, and instead, buy a license from the copyright owner. Gibson termed this dynamic “rights accretion.”158Id. at 886. Furthermore, he described it as an ongoing process by which copyright holders broaden the scope of their protection.159Id. at 884 (“[T]he practice of licensing within gray areas eventually makes those areas less gray, as the licensing itself becomes the proof that the entitlement covers the use. Over time, public privilege recedes, and the reach of copyright expands . . . .”).

Our theory points to a potentially countervailing effect. The uncertainty that characterizes the fair use doctrine may actually help users in negotiations with copyright owners. This is because the inherent ambiguity embedded in the fair use doctrine enhances the licensing leverage of users, relative to a bright-line-rule fair use doctrine. To demonstrate the argument, we first provide a brief description of the ambiguity inherent in extant fair use jurisprudence, and then we point out its advantages compared to a world in which the fair use ambiguity does not exist.

In its current form, the fair use doctrine is an open-ended standard, rather than a rule.160See generally Louis Kaplow, Rules Versus Standards: An Economic Analysis, 42 Duke L.J. 557 (1992); Duncan Kennedy, Form and Substance in Private Law Adjudication, 89 Harv. L. Rev. 1685 (1976); Pierre Schlag, Rules and Standards, 33 UCLA L. Rev. 379 (1985). But see Hughes, supra note 9 (demonstrating that fair use jurisprudence sets up certain rule-like legal norms that facilitate stability and predictability). As the time-honored distinction suggests, rules are well-defined legal commands that offer a precise definition of a proscribed action or conduct. Conversely, standards are legal provisions that employ a more general, obscure description, thus subjecting the lawfulness of a particular behavior to judicial discretion ex post. While standards allow the legal system to function with greater flexibility, rules provide actors with a greater degree of clarity and certainty. As has been noted before:

[T]he ex post guidance provided by courts is often confined to the specifics of the case at hand and does little to clarify the realm of legitimate behavior for other actors. The unpredictability associated with standards affects not only wrongdoers, but also law-abiding citizens who wish to act in accordance with the law but cannot readily discern what acts are permissible.161Gideon Parchomovsky & Alex Stein, Catalogs, 115 Colum. L. Rev. 165, 167 (2015).

As noted above, fair use is a prototypical standard.162See, e.g., Dan L. Burk, Algorithmic Fair Use, 86 U. Chi. L. Rev. 283, 287 (2019) (“Copyright’s multifactor fair use balancing test . . . presents a classic example of what has been dubbed a legal standard.”); Niva Elkin-Koren & Orit Fischman-Afori, Rulifying Fair Use, 59 Ariz, L. Rev. 161, 165–66 (2017) (“Congress designed the fair-use standard to ensure that courts could adjust the law to accommodate future developments that may be unpredictable to the legislature.”); Parchomovsky & Goldman, supra note 32, at 1486 (referring to fair use as a standard). Fair use jurisprudence is ridden with terms that may purport to be synonymous to fair use, but in fact provide little or no ex ante clarity with respect to their applicability to a given case. Parodic use, for example, was tautologically defined by the Supreme Court as anything that may be reasonably perceived as a parody.163Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 582 (1994) (“The threshold question when fair use is raised in defense of parody is whether a parodic character may reasonably be perceived.”). The concept of transformative use has likewise eluded any consistent definition,164See, e.g., Gideon Parchomovsky & Philip J. Weiser, Beyond Fair Use, 96 Cornell L. Rev. 91, 100 (2010) (noting that despite the attempt to confine the open-ended definition of fair use and structure it on grounds of transformativeness, the doctrine has remained ambiguous and unpredictable). and the “public benefit” test, to which courts increasingly reference, is inherently uninformative.165See Google LLC v. Oracle Am., Inc, 593 U.S. 1, 35–36 (2021). All of this implies that even when the user possesses a strong claim, fair use protection is hardly guaranteed. Nor can it be completely ruled out even in the presence of users with relatively weak claims. In its current conception as a quintessential standard, therefore, the user and the owner confront a given probability that fair use will be recognized. But as noted earlier, this probability—created by the malleable, open-ended environment in which fair use determinations are being made—may render a user’s threat of resorting to unauthorized use credible, which in turn creates a favorable bargaining framework that allows them to secure authorization with reduced licensing fees.

To see this, compare the current fair use regime with an alternative hypothetical regime in which fair use is governed by rules, namely, all permitted uses are well-defined on an ex ante basis. This alternative design leaves no room for uncertainty as to the defense’s applicability: the probability that fair use will be recognized in a given case is either zero or one. While allowing clarity and complete reliance, we wish to stress the adverse effect that such dichotomy carries on parties’ bargaining. Begin with cases wherein fair use will be conferred upon users with complete certainty. It is evident that whenever a fair use ruling is guaranteed, users are unwilling to pay for licensing, and negotiations will never take place. On the other hand, if there is no chance for a user to enjoy a fair use judgment, they are essentially confronting a world without fair use, hence the doctrine fails to bestow licensing leverage upon them.

This comparison of a standard-based versus rule-based fair use illuminates the surprising virtue of the current design of the fair use doctrine. To be sure, each user individually, if asked, would say they prefer to obtain fair use with certainty, but the actual comparison that needs to be considered here is whether, behind a veil of ignorance, the right to use copyrighted content without permission should be allocated with certainty to a distinct, small class of users, or with uncertainty to a class of a broader scope. Users may reasonably subscribe to the latter. As noted earlier, a well-defined fair use doctrine not only allows fewer users to invoke the right in court, but more importantly, it also deprives all the rest from the licensing leverage they would have enjoyed under uncertain fair use, thereby subjecting them to the choice of paying the monopolistic asking price or avoid using.

Indeed, the current design of fair use facilitates a bargaining framework in which users enjoy discounts in asking prices on account of the possibility of a future fair use judgment in their favor. Conversely, a clearly and fully specified fair use doctrine will have no effect on owner-user bargaining: it advances fair use as a mere substitute to negotiations, rather than a complement. If parties foresee a fair use ruling with probability 1, bargaining will not take place; if a fair use judgment is not feasible, then parties essentially reside in a world without fair use, and the doctrine does not therefore impact their negotiated licensing terms. Either way, predicating the fair use doctrine as a system of well-defined bright line rules precludes its function in assisting users.

This insight corresponds to a handful of scholarly works that have stressed the merit of standards, compared to rules, at facilitating trade. The 1995 works of Jason Scott Johnston,166See generally Jason Scott Johnston, Bargaining Under Rules Versus Standards, 11 J.L. Econ. & Org. 256 (1995). and Ian Ayres and Eric Talley,167See generally Ian Ayres & Eric Talley, Solomonic Bargaining: Dividing a Legal Entitlement to Facilitate Coasean Trade, 104 Yale L.J. 1027 (1995). have independently demonstrated that when it comes to bargaining over an entitlement, uncertainty is bliss. Both articles showed that standards have the effect of splitting entitlements between parties, which thereby enhance bargaining and negotiations. When entitlements are split, each party can buy or sell their share of the entitlement to the other.168Id. at 1034 (“Legal uncertainty or ambiguity about who owns property can constitute a probabilistic division in that more than one person has a contingent claim to the enjoyment of the underlying right or privilege.”). For further economic analysis of split entitlements in an asset, see generally Peter Cramton, Robert Gibbons & Paul Klemperer, Dissolving a Partnership Efficiently, 55 Econometrica 615 (1987). The same is true of fair use. Fair use has the effect of splitting rights in expressive content between rightsholders and potential fair users.169See, e.g., Bell & Parchomovsky, supra note 2, at 51–52; cf. Dan L. Burk, Muddy Rules for Cyberspace, 21 Cardozo L. Rev. 121, 140 (1999) (“[F]air use allows courts to reallocate what the market cannot.”). Accordingly, in negotiations between them, the copyright owner sells to the potential fair user the right to use the work while the potential fair user sells away their privilege to assert fair use.

Interestingly, fair use’s ambiguity not only aids users with a strong fair use claim, but it also broadens the scope of user population that enjoys licensing leverage. To see this, consider the widely accepted distinction between parodies and satires, which prevails since Campbell.170Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994). Traditionally, it has been argued that this distinction favors parodists by exempting them from any authorization requirements, while disadvantaging satirists who enjoy no similar privilege.171See generally Roger L. Zissu, Expanding Fair Use: The Trouble with Parody, the Case for Satire, 64 J. Copyright Soc’y U.S.A. 165 (2017). But this argument, too, overlooks the hidden benefit that users at large—parodists and satirists alike—can reap from fair use. To see this, it is necessary to take a step back and picture a world without fair use protection granted to parodies. In such a world, the author of the original work holds the upper hand by exercising complete control over the licensing process and can exclusively decide which subsequent works to authorize. The vestment of fair use privileges on parodies spills over to hybrid works that combine critical commentary on the original work as well as more general statements that amount to satire.172See Dr. Seuss Enters., L.P. v. Penguin Books USA, Inc., 109 F.3d. 1394, 1400 (9th Cir. 1997). This, in turn, means that satirists, too, reap some benefit from fair use. The effect of fair use on satirists is never zero. Because there is no clear distinction between parodies and satires, the fair use doctrine—on account of this very ambiguity—bestows bargaining leverage not only on parodists, but also on satirists.

Conclusion

In this Article, we uncovered a crucial, yet overlooked, function of the fair use doctrine: the empowerment of users in negotiations with copyright owners. The fair use doctrine endows users with a credible threat to leave the negotiation table and use the work without permission. This credible threat allows users to force copyright owners to lower their licensing fees, thus enhancing the total number of uses and increasing the share of the bargaining surplus kept by users. Our theory maintains that the principal effect of fair use is to facilitate market transactions involving copyrighted content, and not to bypass them as other theorists have suggested. Our analysis thus shows that the impact of fair use in the copyright domain is far greater than previously thought. Importantly, our theory of fair use is fully consistent with preexisting scholarly contributions; it complements them, not competes them. The addition of our theory to the existing literature on fair use demonstrates the full prowess of fair use in protecting users interests and needs in the copyright world.

98 S. Cal. L. Rev. 761

Download

* Doctoral Candidate, University of Chicago Law School.

Robert G. Fuller, Jr. Professor of Law, University of Pennsylvania Law School; Edward Silver Professor, Faculty of Law, The Hebrew University of Jerusalem. We thank Shiri Alon, Clark Asay, Ian Ayres, Shyamkrishna Balganesh, Oren Bar-Gill, Stefan Bechtold, Abraham Bell, Bari Britvan, Mala Chatterjee, Melissa Eckhause, Shira Ephron, Kristelia Garcia, Yehonatan Givati, Ehud Guttel, Thomas Haley, Lital Helman, Laura Heymann, Justin Hughes, Adi Libson, Peter Menell, David Nimmer, Shmuel Nitzan, Sarah Polcz, Matthew Sag, Peter Siegelman, Christopher Sprigman, Alex Stein, Alfred Yen, Eyal Zamir, and participants at the American Law and Economics Association Annual Conference and at the Seventh Copyright Scholarship Roundtable at Columbia Law School, for valuable comments and suggestions. We are especially indebted to Joseph Fishman for his enlightening remarks. For excellent research assistance, we thank Ron Bechar, Guy Cohen, Rachel Hujsa, Ruoyu Ji, Noam Kozlov, Ariel Melitz, Jeremy Rapaport-Stein, Ido Schlesinger, Yoav Stoler, Jude Taragin, Amir Tzur and Miriam Weinstock. Parchomovsky thanks the Israel Science Foundation for research support.

Mind the Gap(s): Mitigating Harassment in a Post-#METOO Workplace

In a post-#MeToo workplace, harassment remains pervasive, and harassment law still fails to provide protection for the harms experienced by many workers—particularly those in the most vulnerable jobs. Even when reform efforts are introduced through legislation, courts, and agency guidance, it often does not provide greater power, autonomy, and dignity to women in ways that would more meaningfully protect them from workplace abuse. We are the first to create a database of state legislation, including over three thousand bills, that allows us to empirically analyze the extent to which lawmakers comprehensively address harassment following the rise of the #MeToo movement. We assess comprehensiveness by examining how responsive legislation is to existing gaps in legal protection during the five years following the 2017 tweet that took #MeToo activism global, relative to the 2016 baseline period. We found that states introduced a wide breadth of reforms to combat harassment and gender inequality, including some changes that address longstanding gaps in legal protection. Gaps persist, however, and in some cases worsened post #MeToo. Going forward, reform efforts by state legislaturesand all legal stakeholderswill prove most effective if they move away from narrow conceptions of sexual harassment and follow the voice of workers, pursuing a broad, multi-layered agenda around gender equity that is responsive to the realities of our evolving workplace and society. This is especially true in 2025 as the Trump administration redirects the EEOC’s resources towards attacking diversity, equity and inclusion measures.

Introduction

Tarana Burke coined the phrase “Me Too” in 2006 in support of Black women and girls of color who had survived sexual violence, encouraging them to share their stories despite the many pressures they faced to remain silent.1Jamillah Bowman Williams, Lisa Singh & Naomi Mezey, #MeToo as Catalyst: A Glimpse into 21st Century Activism, 2019 U. Chi. Legal F. 371, 374 (2019). Social media galvanized the movement in 2017 after Alyssa Milano took to Twitter, posting: “If you’ve been sexually harassed or assaulted write ‘me too’ as a reply to this tweet . . . ‘we might give people a sense of the magnitude of the problem.’ ”2Alyssa Milano (@Alyssa_Milano), X (Oct. 15, 2017, 1:21 PM), https://x.com/Alyssa_Milano/status/919659438700670976 [http://web.archive.org/web/20180403154601/https://twitter.com/Alyssa_Milano/status/919659438700670976]. The #MeToo3Williams et al., supra note 1. hashtag was used 19 million times between 2017 and 2018.4Id. at 375. Sustained digital participation increased the movement’s visibility and maintained its momentum beyond the boom and bust trend typically observed on social media.5Id. at 380. Online engagement surrounding the #MeToo movement also served as a catalyst for offline action, evolving into highly publicized protests, employee walkouts, and historic strikes.6Id. at 383. For example, in 2018, McDonald’s employees organized a historic multi-state strike against the company’s sexual harassment policies.7Jamillah Bowman Williams, Maximizing #MeToo: Intersectionality & the Movement, 62 B.C. L. Rev. 1797, 1849 (2021). Protesting workers wrote “#MeToo” on signs and covered their mouths with tape, bridging the gap between social media activism and traditional means of protest.8Id. After union-led campaigns and employee-staged walkouts, prominent companies in industries from technology to hospitality changed existing workplace policies such as mandatory arbitration.9Id. at 1847, 1850.

Subsequently, the hashtag #TimesUp, referencing the TIME’S UP Legal Defense Fund (“TULDF”), was created to solve the issues #MeToo revealed.10Williams et al., supra note 1, at 380, 384. TULDF sought to support women of color and low-wage women in the workplace, raising over $24 million to connect these women to attorneys and media specialists.11Id. at 384. The movement also brought an increase in enforcement activity at the Equal Employment Opportunity Commission (“EEOC”), the government agency responsible for enforcing workplace discrimination law. In 2018, the EEOC reported that sexual harassment charges were up nationwide—the first increase observed in a decade.12Id. at 385. In 2018, the EEOC received 7,609 sexual harassment charges compared with the 6,696 charges received in 2017.13U.S. Equal Emp. Opportunity Comm’n, EEOC Data Highlight: Sexual Harassment in Our Nation’s Workplaces 2 (2022), https://www.eeoc.gov/sites/default/files/2022-04/Sexual%20Harassment%20Awareness%20Month%202022%20Data%20Highlight.pdf [https://perma.cc/RZ29-WP66]. The EEOC recovered almost $104 million more for those with sexual harassment claims between 2018 and 2021 than between 2014 and 2017.14Id. at 4. The agency capitalized on #MeToo momentum by increasing lawsuits to enforce sexual harassment law and holding more employers accountable.15Id. at 3; Williams et al., supra note 1, at 385.

This widespread activism also influenced legislatures. In the five years after #MeToo went viral, thousands of bills were introduced—mainly at the state level. These bills covered a wide range of topics related to gender equity in the workplace, including harassment training, nondisclosure agreements, forced arbitration for harassment claims, pay equity, and leave law. This surge of legislative activity was aimed at eliminating harassment and addressing gender equity in the workplace.16Williams et al., supra note 1, at 386.

While it was clear that legislatures were becoming more attentive to gender equity following the increased activism, it remained unclear whether the new reforms were getting to the root of the issues that cause harassment and addressing the legal gaps that allow harassment to persist. #MeToo media coverage tended to focus on certain victims—namely, the white women in the entertainment industry and the nondisclosure agreements (“NDAs”) that kept them silent.17Merve Hannah O’Keefe, The Impact of the Me Too Movement’s Journalism, Yale J. Int’l Affs. (2021), https://www.yalejournal.org/publications/the-impact-of-the-me-too-movements-journalism [https://perma.cc/3P2W-US58]. We argue that a more holistic approach is required both for progress over time and for reaching a broader range of working women. This is not unlike the “Swiss Cheese Model” adapted for use to control the spread of infection during the COVID-19 pandemic.18Jamillah Bowman Williams & Elizabeth Tippett, Five Years On, Here’s What #MeToo Has Changed, Politico (Oct. 14, 2022, 11:16 AM), https://www.politico.com/newsletters/women-rule/2022/10/14/five-years-on-heres-what-metoo-has-changed-00061853 [https://web.archive.org/web/20241212022142/https://www.politico.com/newsletters/women-rule/2022/10/14/five-years-on-heres-what-metoo-has-changed-00061853]; see also Preventing COVID-19 Using the Swiss Cheese Model, CoxHealth (Feb. 22, 2022), https://www.coxhealth.com/blog/preventing-covid-19-using-swiss-cheese-model [https://perma.cc/LL6F-AKKJ]. The Swiss Cheese Model of risk reduction, developed by James Reason in the 1990s, visually demonstrates how a variety of strategies and actors can work together to reduce risk of harm.19James Reason, Erik Hollnagel & Jean Paries, Eurocontrol Experimental Centre, Revisiting the «Swiss Cheese» Model of Accidents 4–10 (2006). In the context of harassment, no single intervention such as restricting NDAs or increasing training can prevent all harassment, but multiple interventions can make a lasting difference. This is particularly true when the approach aims to reduce gendered power dynamics that make harassment more likely.20See infra Figure 1.

To empirically analyze the extent to which lawmakers were comprehensively addressing harassment and gender equity following #MeToo, our team of researchers and lawyers at Georgetown University collected and coded over 3,000 federal and state bills introduced from 2016 to 2022, some of which passed into law. We also analyzed how timing, geography, and political factors shaped the legal activity following #MeToo, relative to the 2016 baseline period. Our dataset is defined broadly and includes all harassment-specific legislation, as well as legislation addressing other gender equity issues including: pay equity, expanded coverage under Title VII of the Civil Rights Act of 1964 (“Title VII”), leave and accommodation, and occupational protections that address intersectional subordination. We found that the variety of legislation introduced by state legislators was consistent with the Swiss Cheese Model of risk reduction; however, there was wide variation across states.

 

Figure 1.  Swiss Cheese Model for Reducing Harassment

This Article focuses primarily on state legislation because virtually all reform activity during the sample period occurred at the state level. Harassment law and gender-based reforms more broadly tend to follow a similar pattern of state-led rights protection and enhancement due to the gradual trend of federal courts contracting civil rights in the workplace among other venues. Federal lower courts, in particular, have increasingly issued employer-friendly Title VII and Americans with Disabilities Act (“ADA”) decisions that have been both formally and informally codified into law.21Ann C. McGinley, Laboratories of Democracy: State Law as a Partial Solution to Workplace Harassment, 30 Am. U. J. Gender Soc. Pol’y & L. 245, 246–47 (2022) [hereinafter McGinley, Laboratories of Democracy]; Ann C. McGinley, Introduction: A Symposium on Enhancing Civil and Constitutional Rights Through State and Local Action, 22 Nev. L.J. 895, 897 (2022); Ann C. McGinley, Credulous Courts and the Tortured Trilogy: The Improper Use of Summary Judgment in Title VII and ADEA Cases, 34 B.C. L. Rev. 203, 206–07 (1993). Congressional gridlock has also led to a standstill with respect to anti-harassment legislation.22McGinley, Laboratories of Democracy, supra note 21, at 251. Moreover, extreme partisanship in both Congress and the judiciary diminishes the likelihood of relying on Congress to act as a check when courts roll back rights, as they have in the past.23Id. Only six federal reforms related to harassment and workplace gender equity passed during the five years following #MeToo; of those, only two had system-wide effects: the Ending Forced Arbitration of Sexual Assault and Sexual Harassment Act of 2021 and the Speak Out Act of 2022. By contrast, states have been a hotbed of legislative activity.24See infra Part III.B.

State legislation continues to play a central role in law reform, particularly under a second Trump administration that has signaled its hostility to transgender rights and diversity and inclusion programs. For example, Trump’s Executive Order 14168 declared that “ ‘sex’ is not a synonym for and does not include the concept of ‘gender identity.’ ”25Exec. Order No. 14,168, 90 Fed. Reg. 8615 (Jan. 20, 2025). Although the Order does not supersede the Supreme Court’s 2022 Bostock v. Clayton County decision recognizing sexual orientation and gender identity as sex discrimination under Title VII,26Bostock v. Clayton County, 590 U.S. 644, 682–83 (2020). the Executive Order attempts to rescind the EEOC’s 2024 harassment guidance regarding gender identity.27Exec. Order No. 14,168, 90 Fed. Reg. 8615 (Jan. 20, 2025); U.S. Equal Emp. Opportunity Comm’n, Enforcement Guidance on Harassment in the Workplace, (Apr. 29, 2024), https://www.eeoc.gov/laws/guidance/enforcement-guidance-harassment-workplace [https://perma.cc/2685-QVM5]. The EEOC has taken the position that the 2024 guidance remains in effect and that the acting Chair lacks the power to unilaterally rescind guidance that was issued pursuant to a majority vote of the Commissioners. In this context, the Trump administration seems more likely to roll back available civil rights coverage and enforcement than engage in meaningful reform.

Thus, states now, more than ever, remain important “laboratories of democracy,” a term Justice Brandeis coined in 1932, for achieving nationwide rights’ protection.28Id. at 255. A close look at state legislative activity reveals the state-specific innovation and experimentation apparent in the variety of bills introduced. Nevertheless, the path from state-specific legislative innovation to systemic federal reform is not linear. Rather, broader effects depend on state-specific efforts influencing a combination of players from different arenas, including state courts, state agencies, federal courts, executive action, and even voluntary action by private entities.

We hypothesized that post #MeToo, the most significant activity at the state level would focus on harassment training and NDAs, which were scrutinized in the extensive media coverage. While high-profile support for these kinds of reforms did catch the attention of state legislators, with many bills introduced and passed, state legislators also introduced and passed many bills addressing systemic issues such as pay equity, leave law, and reforms to fill gaps in protection left in the legal landscape prior to #MeToo.

Although media coverage of the #MeToo movement may have overlooked many of the biggest and more systemic obstacles to workplace gender equity—such as lack of coverage under anti-discrimination law, employer retaliation, Title VII interpretation, and underenforcement—many states began to tackle these issues. We argue that states must continue this momentum not only to mitigate harassment more broadly, but also to address intersectional issues of economic precarity and racism that make harassment more frequent and particularly harmful to low-wage workers, who are disproportionately women of color.29Williams & Tippett, supra note 18. For example, while women of color face higher rates of harassment due to compounding systems of subordination, most of the legislation proposed only strengthens protection for claims of sexual harassment or assault, and not intersectional subordination based on sex and race that is a common experience for women of color.30Andrea Johnson, Samone Ijoma & Da Hae Kim, Nat’l Women’s L. Ctr., #MeToo Five Years Later: Progress & Pitfalls in State Workplace Anti-Harassment Laws 9 (2022), https://nwlc.org/wp-content/uploads/2022/10/final_2022_nwlcMeToo_Report.pdf [https://perma.cc/LN39-Z2XG]. As a result, those experiencing intersectional harassment or discrimination based on multiple protected characteristics, including race, ethnicity, or national origin, are left vulnerable.31Id. Legal remedies that fail to consider experiences unique to women of color or other groups with multiple marginalized identities will ultimately fail to root out discrimination and harassment for those individuals, leading to underenforcement.

Nonetheless, our data reveals a broad array of state bills over a sustained period of time, which is a promising development. Complex social problems like harassment have numerous causes, and no single reform will prevent all instances of harassment, encourage employers to respond appropriately, or ensure a just legal remedy for the harm. We expect the net effect of the legislation, along with the social and attitudinal changes resulting from the #MeToo movement, to be positive and lasting. Not all legislation, however, had an equal chance of success to reduce broader trends of harassment. A close examination of the proposed and enacted legislation presents a mixed picture, which we discuss in depth in the empirical analysis that follows.

This Article is organized as follows: Part I explains how and why harassment persists today by looking at its historical origins, the current landscape, and how harassment relates to a growing trend of workplace violence. In Part II, we will discuss the specific gaps in legal protection that allow harassment and gender disparities to persist. In Part III, we offer original empirical analysis that illustrates trends in the anti-harassment and gender equity legislation that emerged during the five years post #MeToo. Finally in Part IV, we discuss the implications of our data for courts, lawmakers, and agencies, including what is still needed to mitigate workplace harassment post #MeToo.

I.  The Persistent Nature of Workplace Harassment

This Part provides an overview of the underlying social determinants that yield high rates of workplace harassment over time.

A.  The Historical Origins of Harassment

As various scholars have argued, harassment is not principally about sexual desire, but rather a reflection of the distribution of power within the particular workplace and society more broadly.32See Catharine A. MacKinnon, Sexual Harassment of Working Women: A Case of Sex Discrimination 18 (1979) (characterizing harassment as an outgrowth of women’s limited opportunities and confinement to certain sex-segregated occupations, arguing that, “if part of the reason the woman is hired is to be pleasing to a male boss, whose notion of a qualified worker merges with a sexist notion of the proper role of women, it is hardly surprising that sexual intimacy, forced when necessary, would be considered part of her duties and his privileges”); see also Vicki Schultz, Understanding Sexual Harassment Law in Action: What Has Gone Wrong and What We Can Do About It, 29 T. Jefferson L. Rev. 1, 5 (2006) (criticizing that “the prevailing conception of harassment defines it first and foremost as an abuse of women’s sexuality”); Elizabeth Tippett, Harassment Trainings: A Content Analysis, 39 Berkeley J. Emp. & Lab. L. 481, 485 (2018) (critiquing overemphasis on sexual conduct in harassment training). It is a form of social behavior that reflects the dominant group’s—in this case men’s—ability to exclude, marginalize, or dominate less powerful individuals within the workplace.33Schultz, supra note 32, at 24. It can often function to undermine the competence and confidence of marginalized groups and interfere with work performance, while also setting the norm of what is accepted or acceptable behavior.34Id. at 20. Even harassment that is motivated in whole or in part by sexual desire reflects the perpetrator’s power to impose his demands and desires on others who are poorly positioned to rebuff those demands without consequence.35MacKinnon, supra note 32, at 18, 25.

Harassment therefore serves as a mirror for systemic hierarchy, within the microcosm of the workplace and within the culture and larger historical context of a nation. The subordination of women was a central feature of nineteenth and twentieth century law and work arrangements. Women lost their legal personhood upon marriage through a principle known as coverture, wherein they could only acquire property or sign contracts through the legal personhood of their husbands.36Amy Dru Stanley, From Bondage to Contract: Wage Labor, Marriage, and the Market in the Age of Slave Emancipation 9 (1998). Women did not secure the constitutional right to vote until 1920.37U.S. Const. amend. XIX. Many factories in the early decades of the twentieth century were explicitly segregated by gender, with women and men working in separate departments at separate pay rates, eating in separate cafeterias, and even entering and exiting from different entrances or on separate schedules.38See, e.g., Gerald Zahavi, Workers, Managers, and Welfare Capitalism: The Shoeworkers and Tanners of Endicott Johnson, 1890–1950 82–84 (1988) (describing a female-only stitching room); Samuel Crowther, John H. Patterson: Pioneer in Industrial Welfare 210–11 (1924) (referencing separate women’s and men’s cafeterias); William Howe Tolman, Industrial Betterment 6 (Herbert B. Adams & Richard Waterman Jr. eds., 1900) (referencing staggered shifts). Until 1974, banks could deny loans and credit cards to married women unless their husbands co-signed the application.39Equal Credit Opportunity Act, 15 U.S.C. §§ 1691–91f. The legal and social foundation of the United States is one where men have power over women, are superior in status, and are free to control them.

America’s history of slavery, segregation, and white supremacy is also inextricably intertwined with the history of work, which shapes the experiences of Black and other racialized women.40Nell Irvin Painter, Southern History Across the Color Line 21 (2002) (“Historians already realize that including enslaved workers as part of the American working classes recasts the labor history of the United States . . . .”). Slavery was in part a workplace hierarchy predicated on violence and white supremacy.41Id. at 6 (“[S]lavery rested on the threat and the abundant use of physical violence.”); Edward E. Baptist, The Half Has Never Been Told: Slavery and the Making of American Capitalism 130 (2016) (describing the role of “calibrate[d] torture” in control of work on plantations); Caitlin Rosenthal, Accounting for Slavery: Masters and Management 101 (2018). Black women were chattel assets, whose purpose in the economy and social order was to labor and serve white slave masters and their families.42            Nell Irvin Painter, Creating Black Americans: African-American History and its Meanings, 1619 to the Present 85–86 (2006); Caitlin Rosenthal, Slavery’s Scientific Management: Masters and Managers, in Slavery’s Capitalism: A New History of American Economic Development 62, 75–76 (Sven Beckert & Seth Rockman eds., 2016) (“A ‘prime field hand’ was an enslaved man or woman whose productivity was among the maximum that could be expected from a single individual. All other slaves were measured against this ideal, their value denominated in fractions of a hand . . . . . Planters’ calculations rendered slaves not as individuals but as abstract, commoditized units of labor. . . .”). White slave masters frequently raped them, bred them to produce more workers, and subjected them to physical and psychological terror to maintain control.43         Nell Irvin Painter, Southern History Across the Color Line 94 (2002); Rosenthal, Slavery’s Scientific Management, supra note 42, at 76 (quoting a journal kept by an enslaver referring to “his” enslaved women as “uncommonly good breeders”); Edward E. Baptist, Toward a Political Economy of Slave Labor: Hands, Whipping-Machines, and Modern Power, in Slavery’s Capitalism: A New History of American Economic Development 31, 48 (Sven Beckert & Seth Rockman eds., 2016) (“A system of measurement, accounting, and torture was used to coerce enslaved people to pick large amounts of cotton. People who were enslaved reported it again and again.”). After slaves were emancipated, segregation became a workplace reality, with Black women being relegated to the most menial and low-wage jobs.44See, e.g., Griggs v. Duke Power Co., 401 U.S. 424, 430 (1971) (case involving a formerly segregated power plant); Kevin Stainback & Donald Tomaskovic-Devey, Documenting Desegregation: Racial and Gender Segregation in Private Sector Employment Since the Civil Rights Act 60 (2012) (quantifying rates of racial work segregation over several decades). See generally Harry Hudson, Working for Equality: The Narrative of Harry Hudson (Randall L. Patton ed., 2015) (describing his experience working at a previously segregated Lockheed Martin plant); Randall L. Patton, Lockheed, Atlanta, and the Struggle for Racial Integration (2019) (describing the history of employment practices at Lockheed Martin). Title VII offered reform, but it did not fully dismantle job segregation and workplace hierarchies predicated on white privilege.45Stainback & Tomaskovic-Devey, supra note 44, at 147, 168.

Immigrant workers in the United States have also faced shifting, yet persistent, forms of discrimination. Although immigrants in the nineteenth and early twentieth century received privileged treatment compared with Black workers,46For example, European immigrants at the start of the 19th century could be bound to indentured labor—a contract-based, term-limited form of service—but were not enslaved. Robert J. Steinfeld, The Invention of Free Labor: The Employment Relation in English & American Law and Culture, 1350–1870 139 (Thomas A. Green ed., 1991) (describing indentured servitude); see also Lea VanderVelde, The Last Legally Beaten Servant in America: From Compulsion to Coercion in the American Workplace, 39 Seattle Univ. L. Rev. 727, 758 (2016) (describing the racial hierarchy of workplace violence). there is a long history of discrimination and subordination of immigrant populations, particularly Latino and Asian Americans. These include, for example, the Chinese Exclusion Act47Chinese Exclusion Act, ch. 126, 22 Stat. 58 (1882) (repealed 1943). and the internment of Japanese Americans during World War II, which kept Asian women workers excluded, marginalized, and exploited.48Exec. Order No. 9066, 28 C.F.R. § 74.3 (Feb. 19, 1942); Korematsu v. United States, 323 U.S. 214 (1944). Continued subordination of both Black and immigrant women is also evidenced by the exclusion of domestic and agricultural workers from the 1938 Fair Labor Standards Act and the 1935 National Labor Relations Act.49Juan F. Perea, The Echoes of Slavery: Recognizing the Racist Origins of the Agricultural and Domestic Worker Exclusion from the National Labor Relations Act, 72 Ohio St. L.J. 95, 96 (2011); Kate Andrias, An American Approach to Social Democracy: The Forgotten Promise of the Fair Labor Standards Act, 128 Yale L.J. 616, 637 (2019); Marc Linder, Farm Workers and the Fair Labor Standards Act: Racial Discrimination in the New Deal, 65 Tex. L. Rev. 1335, 1336 (1987); Ellen Mutari, Brothers and Breadwinners: Legislating Living Wages in the Fair Labor Standards Act of 1938, 62 Rev. Soc. Econ. 129, 133 (2004); Suzanne B. Mettler, Federalism, Gender, & the Fair Labor Standards Act of 1938, 26 Polity 635, 643 (1994). These positions are overwhelmingly occupied by immigrant women and Black women, and many are still excluded from these legal protections today, making them more vulnerable to discrimination and abuse. Further, while Title VII prohibits discrimination on the basis of national origin, employers are permitted to discriminate against workers on the basis of immigration status.508 U.S.C. § 1324a; Hoffman Plastic Compounds v. Nat’l Lab. Rels. Bd., 535 U.S. 137, 147–48 (2002).

Workers who belong to more than one subordinated group—such as Black women, immigrant women of color, or Black immigrant women—face compounded marginalization, as Kimberlé Crenshaw originally argued in her landmark article on intersectionality.51See generally Kimberlé Crenshaw, Mapping the Margins: Intersectionality, Identity Politics, and Violence Against Women of Color, 43 Stan. L. Rev. 1241 (1991) (introducing the concept of intersectionality, which examines how various social identities like race, gender, and class combine and create unique experiences of discrimination). Such discrimination is also replete within the historical record, in which a combination of race and sex-based discrimination operated in tandem. For example, the legislative history of Title VII suggests “sex” was included as a protected category based in part on arguments that protecting race, but not sex, would give Black women an advantage over White women.52Robert C. Bird, More Than a Congressional Joke: A Fresh Look at the Legislative History of Sex Discrimination of the 1964 Civil Rights Act, 3 Wm. & Mary J. Women & L. 137, 156 (1997). Likewise, during debates in the 1970s over whether to finally include domestic workers in the federal minimum wage law, opponents painted the work itself—performed primarily by women of color—as undeserving of minimum wage, while the White housewives who employed them were depicted as unqualified to calculate wages and hours.53Premilla Nadasen, Citizenship Rights, Domestic Work, and the Fair Labor Standards Act, 24 J. Pol’y Hist. 74, 81–82 (2012).

Throughout United States history, women and people of color have also been vastly underrepresented in Congress, as well as within state legislatures.54Government officials are the ultimate form of leadership in our country, and the sexual harassment allegations that came out in 2017 against a multitude of public officials did not occur overnight. Rather, they were the result of years of government leaders setting a workplace status quo in which holding offenders accountable was not the norm, nor even necessarily possible. Jamillah Bowman Williams, #MeToo and Public Officials: A Post-Election Snapshot of Allegations and Consequences, Geo. L. 1, 8 (2018), https://www.law.georgetown.edu/wp-content/uploads/2018/11/MeToo-and-Public-Officials.pdf [https://web.archive.org/web/20200930125954/https://www.law.georgetown.edu/wp-content/uploads/2018/11/MeToo-and-Public-Officials.pdf]. Underrepresentation of these groups as lawmakers—both now and historically—reinforce hierarchies and subordination over time, by affecting which types of bills get introduced and passed, and which end up on the cutting room floor. Representation can shape values, priorities, and debate around who is deemed worthy of protection, in what ways, and whether legal interventions are needed to reduce inequality. Men—specifically White men—are also markedly overrepresented in the judiciary, where the laws are enforced.55Laura Moyer, Allison P. Harris & Rorie Spill Solberg, “Better Too Much Than Not Enough”: The Nomination of Women of Color to the Federal Bench, 43 J. Women, Pol. & Pol’y 363, 364 (2022). The life experiences and perspectives of the judiciary affects their approach to cases and the parties with whom they identify. Biases influenced by one’s social position can then get baked into precedent, which later constrains and influences subsequent rulings.56Sandra F. Sperino & Suja A. Thomas, Unequal: How America’s Courts Undermine Discrimination Law 133 (2017). Thus, lack of representation in both legislatures and courts can facilitate and exacerbate gaps in the law, ultimately failing to provide accountability and leaving women workers vulnerable to exploitation and abuse.

B.  The Current Landscape of Workplace Harassment

Current national statistics reflect the continued influence of these historical patterns of subordination. Hispanic women earn fifty-seven cents for every dollar earned by White, non-Hispanic men.57Robin Bleiweis, Jocelyn Frye & Rose Khattar, Women of Color and the Wage Gap, Ctr. for Am. Progress (Nov 17, 2021), https://www.americanprogress.org/article/women-of-color-and-the-wage-gap [https://web.archive.org/web/20250114113707/https://www.americanprogress.org/article/women-of-color-and-the-wage-gap/?__cf_chl_rt_tk=81mCwvcSVGPqXClh841ErfkiPP_kM3d_qdUK8YBG..M-1736854627-1.0.1.1-AZC1vUkU01_eXWQI8u1kifKKkVk0.DpWPHFjVmuSSzM]. In 2020, Black women earned sixty-four cents for every dollar earned by White, non-Hispanic men.58Id.; see also Ariane Hegewisch & Chandra Childers, Black Women to Reach Equal Pay with White Men in 2130, Inst. for Women’s Pol’y Rsch. (Aug. 13, 2020), https://iwpr.org/black-women-to-reach-equal-pay-with-white-white-men-in-2130 [https://perma.cc/74DK-M556]. Over time, this gap fuels income and wealth disparities; Black women are estimated to lose nearly one million dollars over the course of their careers.59Bleiweis et al., supra note 57.

Relatedly, broad societal hierarchies and unevenly distributed power within organizations also affect workplace culture, behavior, and policies.60Research shows that the strength with which leaders prevent and respond to harassment in the workplace corresponds to how frequently harassment occurs in that workplace. Junghyun Lee, Passive Leadership and Sexual Harassment: Roles of Observed Hostility and Workplace Gender Ratio, 47 Pers. Rev. 594, 594 (2018). Power can take many forms; however, economic power or lack thereof tends to be at the foundation. Thus, when one’s labor is devalued—as occurs most substantially with Black and Hispanic women wage gaps compared with White, non-Hispanic men—this fundamentally affects the bargaining power one has with respect to protecting themselves from harassment at work.61Marissa Ditkowsky, #UsToo: The Disparate Impact of and Ineffective Response to Sexual Harassment of Low-Wage Workers, 26 UCLA Women’s L.J. 78, 98–99, 117, 134 (2019). Economic disparities in bargaining power are compounded by continuing racism and sexism in low-wage industries where women of color are overrepresented.62Id. at 73; Amanda Rossie, Jasmine Tucker & Kayla Patrick, Nat’l Women’s L. Ctr., Out of the Shadows: An Analysis of Sexual Harassment Charges Filed by Working Women 9 (2018).

The EEOC has published a list of workplace conditions that increase the likelihood of harassment. The vast majority of the conditions noted are common features of low-wage industries.63Sarah Crawford & Sharyn Tejani, Nat’l Women’s L. Ctr., What Works at Work: Promising Practices to Prevent and Respond to Sexual Harassment in Low-Paid Jobs 2–4 (2020). For example, low-wage and precarious industries such as hospitality, food service, modeling, agriculture, construction, and custodial work often: (1) lack effective policies and procedures; (2) have minimal to no oversight; (3) require working in isolation; and (4) prioritize customer and client well-being over the worker.64Id. It is thus unsurprising that the women working in these industries experience the highest rates of harassment, among other forms of workplace violence.65Angela Onwuachi-Willig, What About #UsToo?: The Invisibility of Race in the #MeToo Movement, 128 Yale L.J.F. 105, 107 (2018). For example, surveys have found that 65% of casino workers reported unwanted touching by guests, while over half of restaurant workers reported sexual harassment as occurring on a weekly basis.66Crawford & Tejani, supra note 63, at 3. One casino worker described how the harassment was intertwined with her wages, stating that a guest wanted to “put the tip on [her] ass” and took back the tip when she refused.67Ditkowsky, supra note 61, at 72. Another worker, this time at a hotel, described having to jump over the beds to escape the room of a guest who exposed themselves to her while requesting shampoo.68Id. COVID-19 has only worsened these rates; one nationwide study found that 78% of surveyed restaurant workers reported an increase in hostility and harassment as they enforced COVID-19-related policies.69Catharine A. Mackinnon & Louise Fitzgerald, One Fair Wage, U.C. Berkeley Food Lab. Rsch. Ctr., Barry Commoner Ctr. for Health and Env’t, Take Off Your Mask So I Know How Much to Tip You 24 (Time’s Up Found. ed., 2020), https://static1.squarespace.com/static/6374f6bf33b7675afa750d48/t/6478b65bde58f3000319f012/1685632603986/OFW_COVID_WorkerExp-1.pdf [https://perma.cc/J32T-VRQP]; See also One Fair Wage & U.C. Berkeley Food Lab. Rsch. Ctr., No Rights, Low Wages, No Service (2021), https://uhclthesignal.com/files/wp-content/uploads/2021/09/ofw_nationalwagetheft.pdf [https://perma.cc/6MKE-MLAT].

Harrowing accounts of harassment are also extremely prevalent among domestic workers and farmworkers, who are among the least protected due to the working conditions and the historical factors discussed above. Studies have found that 48% of domestic workers have had clients expose themselves, while 80% of farmworkers have experienced some form of sexual violence while at work.70Crawford & Tejani, supra note 63, at 3. In many of these cases, low-wage workers’ bargaining power is further diminished by language barriers or distrust of government agencies due to immigration status.71Id. at 4.

Gender and racial hierarchies also shape who has access to leadership positions that hold power in the workplace and in government. For example, women and people of color remain vastly underrepresented within business leadership ranks.72Kimberly A. Houser & Jamillah Bowman Williams, Board Gender Diversity: A Path to Achieving Substantive Equality in the United States, 63 Wm. & Mary L. Rev. 497, 501–02, 508–09 (2021). These statistics remain stubbornly sticky despite nearly sixty years of anti-discrimination law under Title VII. Reviewing decades of national employment data, sociologists Kevin Stainback and Donald Tomaskovic-Devey found that Black men and women, as well as White women, made far fewer gains in managerial jobs than in professional jobs.73Stainback & Tomaskovic-Devey, supra note 44, at 31, 35. White men retained a disproportionate share of managerial jobs, which these authors attributed to continued White male advantage that led them to be “pushed up in organizational hierarchies.”74Id. at xxii.

Women also face gender-based harassment even when they break social and historical norms and move up to the top of the power hierarchy. In these cases, social and historical hierarchies are disrupted, and men resist and engage in demeaning behaviors to restore the status quo. Sociologist Raewyn Connell might characterize the problem in terms of “hegemonic masculinity”—“practice[s] . . . that allowed men’s dominance over women to continue,” that “embod[y] the currently most honored way of being a man” and “requir[e] all other men to position themselves in relation to it,” and that “ideologically legitimat[e] the global subordination of women to men.”75R. W. Connell & James W. Messerschmidt, Hegemonic Masculinity: Rethinking the Concept, 19 Gender & Soc’y 829, 832 (2005). This type of harassment is not necessarily sexual in nature and can consist of taunting, insubordination, and use of demeaning slurs and images. This is less discussed than the harassment that is driven by sexual desire and targets low-status women. However, at its core, it is driven by systemic power hierarchies that exploit women or justify their differential treatment, similar to other types of harassment.76Schultz, supra note 32, at 18–20.

A poignant example are the numerous accounts of workplace harassment in law enforcement and the military. In 2018, it was reported that almost 25% of women in active-duty military experienced sexual harassment while in the military.77Rachel A. Breslin, Samantha Daniel & Kimberly Hylton, Black Women in the Military: Prevalence, Characteristics, and Correlates of Sexual Harassment, 82 Pub. Admin. Rev. 410, 411 (2022). For women veterans, the percentage who reported experiencing sexual harassment rises to 80%, suggesting underreporting may be a significant problem for the military.78Renée Burbank, Stigmatizing Narratives in Military Sexual Trauma Cases, XXXI Kan. J.L. & Pub. Pol’y 185, 186–87 (2023). One particularly horrifying example comes from a female Navy lieutenant. In 1992, she went public with a personal story of being sexually assaulted by “the gauntlet,” which was described as a “nightly, coordinated, and systematic sexual assault of women who found themselves on the third floor of the hotel.”79Id. at 190–91. High rates of harassment are also commonplace in law enforcement. One nationally representative survey of law enforcement officers found that 71% of female law enforcement officers have experienced sexual harassment or sexual violence in the workplace.80Bruce G. Taylor, Poulami Maitra, Elizabeth Mumford & Weiwei Liu, Sexual Harassment of Law Enforcement Officers: Findings from a Nationally Representative Survey, 37 J. Interpersonal Violence NP8454, NP8466 (2022). These male-dominated environments are high-risk, as women are devalued and targeted for breaking gender stereotypes and hierarchies of power.

C.  Harassment as a Workplace Hazard

Based on historical and current social realities, we argue that harassment is a workplace hazard that is disproportionately distributed to women—particularly low-wage workers and women of color—creating a health and safety issue with civil rights and economic justice issues at the core. As such, harassment is best suited to be addressed by a multi-layered hazard prevention model, such as the Swiss Cheese Model we proposed above.81See infra Figure 1.

Harassment is a significant hazard to workers’ mental, physical, and economic safety following historical trends of gendered and racialized subordination. Studies show workplace harassment is associated with increased rates of (1) stress, (2) anxiety and depression, and (3) post-traumatic stress disorder (“PTSD”).82Kathleen M. Rospenda, Judith A. Richman, Jennifer L.Z. Ehmke & Kenneth W. Zlatoper, Is Workplace Harassment Hazardous to Your Health?, 20 J. Bus. & Psych. 95, 95–96 (2005). This effect may be particularly pronounced for women of color as they are vulnerable to harassment on the basis of both race and gender.83Michelle M. Vance, Jeannette M. Wade, Mervin Brandy Jr. & Aiyana Rice Webster, Contextualizing Black Women’s Mental Health in the Twenty-First Century: Gendered Racism and Suicide-Related Behavior, 10 J. Racial & Ethnic Health Disparities 83, 86 (2023). All three of these mental health effects are risk factors for increased rates of suicidal ideation, which also links workplace harassment to increased rates of suicide.84Id.; Linda L. Magnusson Hanson, Anna Nyberg, Ellenor Mittendorfer-Rutz, Fredrik Bondestam & Ida E. H. Madsen, Work Related Sexual Harassment and Risk of Suicide and Suicide Attempts: Prospective Cohort Study, BMJ, Sept. 2020, at 1.

Workplace harassment frequently occurs with, and may even precipitate, other forms of workplace violence.85Rospenda et al., supra note 82, at 98. Physical violence can occur in any workplace and among any type of worker, even women in leadership; but the risk for fatal violence is highest among sales, protective service, and transportation workers, while the risk for nonfatal violence resulting in days away from work is greatest for healthcare and social assistance workers.86About Workplace Violence, Ctrs. for Disease Control & Prevention: Nat’l Inst. for Occupational Safety & Health (December 3, 2024), https://www.cdc.gov/niosh/violence/about/index.html [https://perma.cc/GM9D-BXKB]. For women working in low-wage industries, the economic harms associated with workplace harassment can be particularly devastating. Economic violence can take many forms such as constructive discharge or retaliation for reporting or opposing workplace harassment, and can occur via termination, demotion, pay cuts, wage theft, or detrimental changes to job terms and conditions such as scheduling.

The detrimental effects of harassment are dangerously cyclical, leaving victims at risk of remaining stuck in these cycles. Like other health and safety hazards, preventing harassment demand multifaceted interventions, and many gaps remain. In Section II, we identify these gaps before turning to our data, which we analyze to examine the effectiveness of the overall policy response post #MeToo.

II.  Legal Constraints Fail to Provide Accountability

Title VII contains no reference to the word “harassment.” Harassment law is instead a product of regulatory and judicial interpretation of the statutory language stating it is unlawful for an employer “to discriminate . . . with respect to . . . conditions, or privileges of employment.”87Meritor Sav. Bank, FSB v. Vinson, 477 U.S. 57, 63 (1986). Lower courts began to recognize racial, religious and sex-based harassment claims in the 1970s,88Rogers v. EEOC, 454 F.2d 234, 240–41 (5th Cir. 1971) (involving a race-based harassment claim with a Latina employee assigned exclusively to Latino patients); Compston v. Borden, Inc., 424 F. Supp. 157, 160 (S.D. Ohio 1976) (involving religious harassment); Williams v. Saxbe, 413 F. Supp. 654, 657–61 (D.D.C. 1976), vacated, Williams v. Bell, 587 F.2d 1240, 1242 (D.C. Cir. 1978), remanded to Williams v. Civiletti, 487 F. Supp. 1387, 1389 (D.D.C. 1980) (involving sex-based harassment); see also Rhonda M. Reaves, One of These Things is Not Like the Other: Analogizing Ageism to Racism in Employment Discrimination Cases, 38 U. Rich. L. Rev. 839, 889 (2004). while the EEOC recognized sexual harassment as a form of discrimination in 1980.8945 Fed. Reg. 74676 (Nov. 10, 1980) (codified in 29 C.F.R. § 1604.11). The Supreme Court first solidified the cause of action in the 1986 decision, Meritor Savings Bank v. Vinson.90Meritor Sav. Bank, FSB v. Vinson, 477 U.S. 57 (1986). The foundation set forth in Meritor would be elaborated in subsequent Supreme Court rulings.91For example, in Meritor Savings Bank v. Vinson, the Supreme Court held that workplace sexual harassment is sex-based discrimination that violates Title VII of the Civil Rights Act of 1964 (“Title VII”).

In this Part, we discuss ten major limitations of harassment doctrine, which leave significant gaps and fail to protect many women who are subjected to harassment at work. If the laws are ineffective, this leaves many victims without remedy, while also failing to deter future harassment due to the lack of accountability, weak enforcement of existing law, and restricted access to justice. In Part III, we examine whether the flurry of state reforms during the height of the #MeToo movement began to acknowledge and address these gaps to meaningfully improve protection for working women. In the absence of federal reform, state reform serves as both a laboratory of innovation as well as a way to gauge bipartisan support.

A.  The Individuation of Harassment Evidence

As early as 1986 in Meritor v. Vinson, the Supreme Court imposed a compartmentalized frame on harassment cases, treating it as a matter of individual offenders and targeted victims as opposed to broader systemic harms in an organization. Meritor v. Vinson was brought by a Black woman, Mechelle Vinson, against her bank employer. Vinson was subject to sexual advances and repeated demands for sexual favors, fondled in front of other workers, followed to the restroom, and forcibly raped on several occasions by the bank vice president.92Meritor, 477 U.S. at 60. The bank had a grievance procedure, but it would have required Vinson to report the misconduct to her supervisor—the perpetrator of the harassment.93Id.

From the outset, the Court failed to assess Vinson’s story comprehensively. It treated her harassment as an isolated circumstance and refused to consider the evidence of harassment other women at the bank were experiencing alongside Vinson as relevant to the question of whether the harasser cultivated an environment that violates Title VII.94Tristin K. Green, Was Sexual Harassment Law a Mistake?, 128 Yale L.J.F. 152, 160 (2018). This was despite the lower court’s holding that even where a woman is not the object of harassment herself, there may be a valid Title VII claim if the atmosphere fostered pervasive harassment. Instead, Justice Rehnquist concluded that the District Court did not allow the presentation of a “wholesale evidence of a pattern and practice relating to sexual advances to other female employees in her case in chief.”95Meritor, 477 U.S. at 61.

This blinkered view of harassment is at odds with the concept of a hostile work environment, which can pervade and impact the workplace beyond one individual victim. The Court’s individualized approach also represents a marked departure from other claims available under Title VII. As early as the 1971 case of Griggs v. Dukes, the Court acknowledged that discrimination can operate systemically within a workplace and therefore permitted a wide variety of evidence from multiple sources.96Griggs v. Duke Power Co., 401 U.S. 424, 430 (1971). In these Title VII discrimination cases, including “disparate impact,” “pattern or practice,” or “systemic” cases, the law acknowledges group offenses, even if individual experiences of discrimination vary and are effectuated by multiple actors and systems within an organization.97Systemic Enforcement at the EEOC, U.S. Equal Emp. Opportunity Comm’n, https://www.eeoc.gov/systemic-enforcement-eeoc [https://perma.cc/QW4G-S8HG]. Consequently, the Court does not begin from the presumption that discrimination is limited to a single bad actor within the organization who has engaged in misconduct targeting a single individual.

Courts further compound the individuation of harassment claims through the routine enforcement of settlement and severance agreements containing non-disclosure provisions.98See Abigail Stephens, Contracting Away the First Amendment?: When Courts Should Intervene in Nondisclosure Agreements, 28 Wm. & Mary Bill Rts. J. 541, 542 (2019) (“[C]ourts regularly enforce even those contracts that require parties to waive their constitutional rights.”). Such non-disclosure provisions conceal harassment, making it difficult to detect and root out patterns of abuse.99Taishi Duchicela, Rethinking Nondisclosure Agreements in Sexual Misconduct Cases, 20 Loy. J. Pub. Int. L. 53, 64–65 (2018); Ditkowsky, supra note 61, at 96, 100. Settlement agreements commonly include non-disclosure provisions, and employers and their counsel often refuse to settle a case without some form of confidentiality provision. While some victims may want confidentiality,100Mutual non-disclosure can be a preferred approach for everyone involved—women of all backgrounds can be fearful of unwanted disclosure by their employer or the perpetrator. this requirement often pressures victims to sign and remain silent in order to achieve some type of closure. This manner in which non-disclosure provisions are included in settlement agreements serves to limit collective grievances, opportunities to negotiate, and accountability for repeat perpetrators and organizations that foster hostile work environments.

B.  Mandatory Arbitration Provisions

Access to legal justice under Title VII has also historically been barred for many workers by mandatory arbitration provisions. Approximately 56% of non-union private sector workers are required to sign mandatory private arbitration agreements,101Alexander J.S. Colvin, Econ. Pol’y Inst., The Growing Use of Mandatory Arbitration 9 (2017), https://files.epi.org/pdf/135056.pdf [https://perma.cc/NH6Y-8VYS]; Cynthia Estlund, The Black Hole of Mandatory Arbitration, 96 N.C. L. Rev. 679, 696 (2018) (estimating arbitration agreements had suppressed between 315,000 and 722,000 employment claims over the course of ten years). which represents roughly sixty million American workers.102Colvin, supra note 101, at 10. Of those, 30% have signed agreements that include class-action waivers.103Id. at 11. Arbitration agreements have become particularly prevalent since the 2011 Supreme Court ruling, AT&T v. Concepcion, which enabled companies to enforce class and collective action waivers through arbitration.104AT&T Mobility LLC v. Concepcion, 563 U.S. 333, 333–34 (2011); Am. Express Co. v. Italian Colors Rest., 570 U.S. 228, 228–29 (2013). Arbitration agreements divert claims from the public court system to private arbitration, in which neither the filings, rulings, nor proceedings are open to the public.105Jean R. Sternlight, Mandatory Arbitration Stymies Progress Towards Justice in Employment Law: Where To, #MeToo?, 54 Harv. C.R.-C.L. L. Rev. 155, 156–57, 175, 190 (2019); Duchicela, supra note 99, at 70–71 (“If an employee has signed an arbitration agreement, before or during their employment, their sexual misconduct claim will be preempted by the FAA.”). Even if the arbitration agreement does not require the victim to maintain the secrecy of the proceedings, arbitration is to a much greater extent shielded from public view, including media coverage and scholarly research.

Arbitration often offers poor remedies for the plaintiffs. When the arbitration agreement includes a class action waiver, the employee cannot file a collective claim in court or in arbitration, forcing them to bring an individual claim no matter the fact pattern.106Sternlight, supra note 105, at 177. Arbitration also offers few avenues for appeal, leaving workers little recourse if the arbitrator issues a bad ruling. Arbitration can further inhibit access to justice because claimants then have difficulty finding a lawyer willing to file a claim in arbitration when the deck is so heavily stacked against them. Research shows women of color are more likely to be denied access to courts than White women, due to mandatory arbitration.107Williams, supra note 7, at 1819. This is because of the particular prevalence of these clauses in low-wage industries where women of color are overrepresented.108Sidney A. Shapiro, Michael Duff, Tom McGarity & M. Isabelle Chaudry, Ctr. for Progressive Ref., Private Courts, Biased Outcomes: The Adverse Impact of Forced Arbitration on People of Color, Women, Low-Income Americans, and Nursing Home Residents 16–17 (2022), https://progressivereform.org/publications/private-courts-biased-outcomes-forced-arbitration-rpt [https://perma.cc/9UDC-RXL9]; see also M. Isabelle Chaudry & Jamillah Bowman Williams, Banning Workers from Suing Their Employer Hurts People of Color and Women Most, The Hill (Feb. 21, 2022, 4:30 PM), https://thehill.com/opinion/civil-rights/595208-banning-workers-from-suing-their-employer-hurts-people-of-color-and [https://web.archive.org/web/20250117234629/https://thehill.com/opinion/civil-rights/595208-banning-workers-from-suing-their-employer-hurts-people-of-color-and]. Thus, low-wage workers, who are already uniquely vulnerable to workplace violations including harassment and retaliation, suffer the most from contracts restricting their ability to access a court of law.

C.  Coverage Gaps Constrain Workers’ Access to Courts

Many workers are not covered by key antidiscrimination and labor law statutes, leaving them with no legal recourse regardless of the merits of the claim. Title VII only covers claims against “employers,” and by extension claims brought by “employees.”109Civil Rights Act of 1964, 42 U.S.C. § 2000e(b) (defining an “employer” as covered by the Act to be person with “fifteen or more employees”). This coverage restriction means that independent contractors lack any form of protection under Title VII. Independent contractors make up over a third of the nation’s workforce,110Williams, supra note 7, at 1817. and almost half of these unprotected independent contractors are women.111Id. Many of these are low-paid jobs in industries such as personal services, transportation, and educational services.112Id. Interns and student trainees also tend to be excluded from coverage as non-employees, even though their low status on the office hierarchy makes them easy targets for exploitation and poorly positioned to complain internally about their treatment. Women of color frequently land in these jobs due to the low barriers to entry, discrimination in other parts of the labor market, and the need for supplemental income.113Id. Research has shown that women and people of color are also overrepresented in most industries that tend to misclassify their workers as independent contractors.114Id. at 1818.

Title VII also largely excludes the most physically vulnerable low-wage workers from protection—often immigrants and women of color. For example, domestic workers who serve as housekeepers, nannies, babysitters, or home health care aides are often excluded from coverage if they are employed directly by individuals rather than agencies, as those individuals generally do not employ more than fifteen employees.115Id. at 1815–16. This means that women like live-in worker, Etelbina Hauser, report having nowhere to turn for legal protection despite being “consistently groped” and pressured for “sexual services.”116Ditkowsky, supra note 61, at 126. Domestic workers are often physically isolated from other workers, which further removes sources of social support and solidarity that might otherwise facilitate internal complaints and remediation. The physical isolation of private homes also tends to limit transparency and oversight of workplace practices. Thus, it is no surprise that studies indicate one-third of domestic workers face gender, race, language, or immigration-based abuse.117Terri Nilliasca, Some Women’s Work: Domestic Work, Class, Race, Heteropatriarchy, and the Limits of Legal Reform, 16 Mich. J. Race & L. 377, 403 (2011) (citing Domestic Workers United & DataCenter, Home Is Where the Work Is: Inside New York’s Domestic Work Industry 20 (2006), https://search.issuelab-dev.org/resources/2985/2985.pdf [https://perma.cc/MK43-NJLG]).

Undocumented workers are nominally covered by Title VII,118See Rios v. Enter. Ass’n Steamfitters Loc. Union 638 of U.A., 860 F.2d 1168, 1173 (2d Cir. 1988) (holding that Title VII must apply to undocumented workers, at least to the extent that those protections do not conflict with immigration laws); see also EEOC v. Tortilleria “La Mejor”, 758 F. Supp. 585, 590–91 (E.D. Cal. 1991) (finding Title VII applies to undocumented aliens). but the law does not prohibit workers from being fired—or deported—for their immigration status.119See Egbuna v. Time-Life Librs., Inc.,153 F.3d 184, 188 (4th Cir. 1998) (finding an employer cannot be held liable for refusing to hire someone who is not authorized to work in the United States); see also Cortezano v. Salin Bank & Tr. Co., 680 F.3d 936, 937 (7th Cir. 2012) (upholding summary judgment in favor of an employer where the plaintiff claimed under Title VII she was discharged because of her marriage to a Mexican immigrant). These workers are also unlikely to be awarded back pay due to their immigration status, which reduces the legal risk for employers.120Hoffman Plastic Compounds, Inc. v. Nat’l Lab. Rels. Bd., 535 U.S. 137, 151 (2002) (finding the NLRB did not have the authority to award back pay to undocumented workers who were illegally fired for engaging in protected labor organizing activity because they were not legally present in the United States). Immigrant workers make up a majority of the workforce in specific industries, including agricultural work.121Labor-Intensive Industries, New Am. Econ., https://www.newamericaneconomy.org/issues/labor-intensive-industries [https://perma.cc/38F7-T9DN]. In these cases, the threat of termination or deportation largely cuts off any meaningful access to justice and makes them particularly vulnerable targets for harassment.

Coverage gaps that predominantly affect women of color and immigrants are no historical accident.122See infra Part II.A.1. As previously discussed, occupations in which women of color and immigrants predominated were intentionally excluded from landmark federal employment legislation in the twentieth century.123Williams, supra note 7, at 1814–15. Employers have continued to treat women of color both as invisible and as their labor to control. Roles like nannies and maids are disproportionately held by immigrant women of color, traditionally employed in private homes of the mostly White middle- and upper-class, where a lack of transparency and adequate oversight gives employers the liberty to take advantage of these workers.124Heidi Shierholz, Econ. Pol’y Inst., Low Wages And Scant Benefits Leave Many In-Home Workers Unable To Make Ends Meet 2–3 (2013), https://www.epi.org/publication/in-home-workers [https://perma.cc/AB9T-79TF].

D.  Retaliation Law and Its Effect on Underreporting

The legal standard for Title VII retaliation claims, which requires the plaintiffs to show that the retaliatory conduct was “materially adverse,” fails to deter low-level and informal retaliation.125Burlington Northern v. White, 548 U.S. 53, 68 (2006); Civil Rights Act of 1964, 42 U.S.C. §§ 2000e–00e-17; Daiquiri J. Steele, Protecting Protected Activity, 95 Wash. L. Rev. 1891, 1893, 1897 (2020); Daiquiri J. Steele, Enforcing Equity, 118 Nw. U. L. Rev. 577, 581–82 (2023). Most courts find neither ostracizing nor harassing conduct to rise to the level of an adverse employment action for purposes of a retaliation claim under Title VII.126It is possible that the Supreme Court’s recent decision in Muldrow v. City of St. Louis, Missouri, which lowered the standard for adversity in proving a discrimination claim, may influence the standard of adversity required to prove a retaliation claim. 601 U.S. 346, 359, 977 (2024). They construe the harm as not significant enough to deter someone from filing a charge.127Nicole Buonocore Porter, Ending Harassment by Starting with Retaliation, 71 Stan. L. Rev. Online 49, 54 (2018). Courts have even held that a negative performance review is not sufficiently “material” to support a retaliation claim.128Id. And, as previously noted, judges with lifetime or fixed-term appointments may not recognize the threat that would deter a reasonable worker who lacks such security. One study, for example, revealed that many of the employment actions courts have held not “materially adverse” would actually dissuade participants from reporting.129Id. at 55.

The threat of retaliation can be a particularly powerful deterrent for marginalized populations.130Daiquiri J. Steele, Enduring Exclusion, 120 Mich. L. Rev. 1667, 1670–71 (2022). Underrepresented groups within a particular workplace—such as women in non-traditional occupations, or women of color in majority White occupations—have less access to internal social networks and political capital within the workplace, which both increases the likelihood and the detrimental effect of informal social sanctions. The fear of job loss and unemployment for a low-wage worker can be so economically threatening to the employee’s livelihood that it deters them from reporting even extreme misconduct. Concerns about retaliatory deportation can weigh even more heavily on an employee’s decision-making. Moreover, even where actual retaliation is absent, workplace culture that fosters the threat of retaliation alone can deter victims from reporting.

Fears about retaliation for at-will employees who complain about harassment are particularly well-founded, despite whatever assurances human resources may provide about the company’s policy regarding retaliation. Even though retaliation for speaking up against harassment and discrimination is prohibited by law, it is a common workplace reality.131Daiquiri J. Steele, Rationing Retaliation Claims, 13 U.C. Irvine L. Rev. 993, 995 (2023). Complainants may face formal action, such as termination, demotion, or pay cuts, as well as informal social sanctions. These repercussions originate not only from the perpetrator, but also from co-workers or supervisors who side with the perpetrator or perceive the complaint as disruptive. Studies have demonstrated that these negative consequences, such as being ostracized by coworkers, more often than not follow harassment reports.

E.  Rigid Administrative Exhaustion Requirements Block Access to Justice

Title VII’s administrative filing requirement imposes a notably short time window—less than a year—for the plaintiffs to bring a harassment claim. Before Title VII claimants can file a lawsuit against an employer, they must file an administrative claim with the EEOC within 180 days of the last occurrence of harassment.132Civil Rights Act of 1964, 42 U.S.C. § 2000e-5(e)(1); Nat’l R.R. Passenger Corp. v. Morgan, 536 U.S. 101, 117 (2002) (“It does not matter, for purposes of the statute, that some of the component acts of the hostile work environment fall outside the statutory time period. Provided that an act contributing to the claim occurs within the filing period, the entire time period of the hostile environment may be considered by a court for the purposes of determining liability.”). State discrimination laws generally do not offer substantially more lenient administrative filings deadlines. Many set the deadline at 180 days; some at 300 days. Even the most generous states do not exceed one year. Any lawsuit brought by an employee that has failed to timely file an administrative claim will be dismissed for failing to exhaust administrative remedies. This aggressive window can be unrealistic for traumatized workers who may be afraid to speak up about harassment or who may not recognize that the workplace harms they suffered qualified as unlawful harassment until years later. The narrow administrative filing window can be particularly detrimental for the vulnerable workers previously described, who may be concerned about retaliation and job loss.

These workers might reasonably choose job security over the possibility of a lawsuit, such that they may not be ready to file a legal claim until they have secured adequate support or alternate employment. Moreover, gaps in access to legal services and information often preclude workers from even knowing about the administrative filing requirement.

F.  Severe or Pervasive Requirement Excludes Strong Claims

To prove harassment under Title VII, the plaintiffs must show that they were subject to unwelcome comments or conduct on the basis of a protected category (race, sex, religion, color, or national origin) that was so “severe or pervasive” as to alter the conditions of the plaintiffs’ employment and create a “hostile or abusive work environment.”133Meritor Sav. Bank, FSB v. Vinson, 477 U.S. 57, 66–68 (1986). The “severe or pervasive” language originated in Meritor, although the court did not initially define the term.134Id. In a subsequent 1993 ruling, Harris v. Forklift, the Supreme Court elaborated on the meaning of the phrase by listing several non-exhaustive factors that affect whether conduct is deemed severe or persuasive: (1) the frequency of the conduct; (2) the severity of the conduct; (3) whether is the conduct is physically threatening, humiliating, or “a mere offensive utterance”; and (4) whether the conduct unreasonably interferes with work performance.135Harris v. Forklift Sys., Inc., 510 U.S. 17, 17 (1993).

As several commentators have observed, the “severe or pervasive” requirement has evolved to impose a very high burden of proof on the victim.136Judith J. Johnson, License to Harass Women: Requiring Hostile Environment Sexual Harassment to Be “Severe or Pervasive” Discriminates Among “Terms and Conditions” of Employment, 62 Md. L. Rev. 85, 85–86 (2003); Sandra F. Sperino & Suja A. Thomas, Boss Grab Your Breasts? That’s Not (Legally) Harassment, N.Y. Times (Nov. 29, 2017), https://www.nytimes.com/2017/11/29/opinion/harassment-employees-laws-.html; Sandra F. Sperino & Suja A. Thomas, Unequal: How America’s Courts Undermine Discrimination Law 30–52 (David Kairys & David McBride eds., 2017). For example, lower courts have inconsistently and often improperly interpreted the type of conduct necessary for a violation. In some courts, the standard has been deemed so high that it may reject claims for conduct that may be egregious, offensive, and in some cases even criminal.137Johnson, supra note 136, at 86. This significantly impacts outcomes of cases, as the “severe or pervasive” requirement has become a common basis on which courts grant summary judgment against the plaintiffs. Judges have ruled that things like indecent exposure, being threatened and referred to as a Black bi[***], and being offered pornography by one’s boss, are not sufficiently severe or pervasive, thus dismissing the cases on summary judgement.138Williams, supra note 7, at 1823. This leaves the plaintiff demoralized and without remedy and allows the employer to shield itself from accountability.139Sperino & Thomas, supra note 136, at 30–52. Summary judgment rulings, as Sandra Sperino has observed, are particularly problematic in employment contexts, in which a predominantly White male judiciary substitutes its own experiences, perspectives, and biases for those of a jury, whose experiences more closely reflect that of the various parties involved in the litigation.

Other lower courts have misinterpreted the Harris v. Forklift opinion to require that conduct be “severe, frequent and physically threatening,” effectively requiring severe and pervasive conduct that is also physical in nature.140Williams, supra note 7, at 1826. In McGraw v. Wyeth-Ayerst Laboratories, for example, the court held that repeated propositions, yelling, and non-consensual kissing by a supervisor was neither severe nor pervasive.141Id. Extreme lower court rulings can have a lasting effect, as courts later rely on those fact patterns and judicial interpretations to justify outcomes in favor of employers in subsequent cases.142Sperino & Thomas, supra note 136, at 37.

G.  The “Objectively” Hostile or Abusive Standard is Out of Touch

Closely related to the “severe or pervasive” requirement is the requirement that the working environment be both “subjectively” and “objectively” hostile or abusive. This means that the plaintiff perceived the conduct as hostile or abusive, and that a “reasonable person” in that situation would have found it hostile or abusive.143Harris v. Forklift Sys., Inc., 510 U.S. 17, 21–22 (1993).

Defining reasonableness has proven difficult as courts appear to lack a clear standard.144Danielle A. Bernstein, Reasonableness in Hostile Work Environment Cases After #MeToo, 28 Mich. J. Gender & L. 119, 124 (2021); see also Danielle Bernstein, #MeToo Has Changed the World—Except in Court, The Atl. (Aug. 13, 2021), https://www.theatlantic.com/ideas/archive/2021/08/metoo-courts/619732 [https://perma.cc/FWL2-V6G3]. In a 1998 case, Oncale v. Sundowner Offshore Services, Inc., the Court further noted that ensuring whether or not something is objectively hostile or abusive is crucial to “ensure that courts and juries do not mistake ordinary socializing in the workplace . . . for discriminatory ‘conditions of employment.’ ”145Oncale v. Sundowner Offshore Servs., Inc., 523 U.S. 75, 81 (1998). Here, the Supreme Court clarified that determining severity “requires careful consideration of the social context in which particular behavior occurs.”146Id.; see Michael J. Frank, The Social Context Variable in Hostile Environment Litigation, 77 Notre Dame L. Rev. 437, 437 (2002); Melissa K. Hughes, Through the Looking Glass: Racial Jokes, Social Context, and the Reasonable Person in Hostile Work Environment Analysis, 76 S. Cal. L. Rev. 1437, 1439 (2003).

The “objective” component of the hostile or abusive standard has also proven problematic. In the summary judgment context, judges superimpose or extrapolate from their own experiences when deciding what a “reasonable person” would consider hostile and abusive.147Hughes, supra note 146, at 1480. Yet, the judge’s own assumptions about tolerable behavior can be tainted by white and male privilege in ways they may not recognize. As previously discussed, the pervasive influence of hegemonic masculinity can lead judges to discount hostile aspects of the work environment simply because they are commonplace or fit within traditional workplace norms.148Id. at 1476–77.

For example, in Oncale, Justice Scalia recounted a variety of workplace behaviors that he considered inoffensive, such as a football player being smacked on the buttocks by his coach—which very well could be experienced as hostile.149Oncale, 523 U.S. at 82. However, when courts—and juries—are instructed to ignore the plaintiff’s actual (subjective) experience and focus on what a hypothesized “reasonable” (objective) other would consider harassment, it is an implicit invitation to default to a framework wherein workplace culture is largely defined by and governed by White men.150Onwuachi-Willig, supra note 65, at 110; see also Hughes, supra note 146, at 1472–73.

Broader representation in the judiciary may begin to address this bias. In other research, we have found that there is a significant disconnect between judges’ assessments of what is “objectively” abusive and hostile and a layperson’s assessment, which may mean that judges are disconnected from social realities and evolving social norms.151Elizabeth C. Tippett & Jamillah B. Williams, Misjudging a Reasonable Jury: Evidence that Courts Dismiss Meritorious Harassment Claims (forthcoming Conn. L.J. 2025). However, bias does not only impact judges. Racialized and sex stereotypes can also color perceptions of witnesses, fact finders, and others, clouding their view whether the plaintiff contributed to the harassment, the extent to which they feel the plaintiff is harmed by the perpetrator, and whether enduring the conduct is deemed acceptable and within the realm of their role as worker.152Onwuachi-Willig, supra note 65; see also Hughes, supra note 146, at 1439–40.

H.  The Standard for Vicarious Liability

As a general matter, when an employee commits a Title VII violation, the law imposes strict liability.153Meritor, 477 U.S. at 70–71; Faragher v. City of Boca Raton, 524 U.S. 775, 791 (1998). For example, when an employee engages in sex-based discrimination or retaliates against an employee for speaking out about it, courts do not inquire whether the employer should be held vicariously liable for the conduct. Employers are simply liable for the violation. Harassment, however, is the exception. In Meritor, the Supreme Court first raised the question of whether there might be some circumstances in which employers might not be held vicariously liable for harassment.154Id. at 69–72. This question was settled in two 1998 cases decided together, Burlington Industries v. Ellerth and Faragher v. City of Boca Raton (“Faragher/Ellerth”).155Burlington Indus., Inc. v. Ellerth, 524 U.S. 742 (1998); Faragher, 524 U.S. at 775. In these two cases, the Supreme Court imported tort principles into the employment discrimination context. The majority opinions held that employers would only be held strictly liable for harassment committed by a supervisor when the plaintiff experienced a tangible employment action, such as a demotion, firing, or pay cut.156Burlington Indus., 524 U.S. at 745; Faragher, 524 U.S. at 777–78. The Court also imposed a negligence standard when coworkers were responsible for harassment. Under this rule, employers would only be held liable for harassment that they knew or should have known about, and they failed to take action to correct it.157Burlington Indus., 524 U.S. at 744–45; Faragher, 524 U.S. at 799–800.

In cases involving supervisory harassment, in which the plaintiff suffered no tangible employment action, the Court created a new affirmative defense for employers. Even when a plaintiff proves a successful harassment case—which is an uphill battle due to the constraints discussed in this section—the employer can assert an affirmative defense to evade liability. Joanna Grossman argued that the defense effectively insulates employers from liability following an initial complaint about harassment.158Joanna L. Grossman, The First Bite Is Free: Employer Liability for Sexual Harassment, 61 U. Pitt. L. Rev. 671, 705 (2000); Elizabeth C. Tippett, The Legal Implications of the MeToo Movement, 103 Minn. L. Rev. 229, 240 (2018). To assert the defense, an employer must show that it “exercised reasonable care to prevent and correct promptly any sexually harassing behavior, and that the plaintiff employee unreasonably failed to take advantage of any preventive or corrective opportunities provided by the employer or to avoid harm otherwise” (the “Faragher/Ellerth defense”).159Burlington Indus., 524 U.S. at 765; Faragher, 524 U.S. at 807.

Beyond the exceptional nature of the Court’s departure from a strict liability framework, courts have also interpreted the Faragher/Ellerth defense in an expansive manner, favoring employers. In many cases, courts merely require employers to maintain anti-harassment and complaint policies, without inquiring into the effectiveness or reviewing the culture broadly.160Lauren B. Edelman, Christopher Uggen & Howard S. Erlanger, The Endogeneity of Legal Regulation: Grievance Procedures as Rational Myth, 105 Am. J. Socio. 406, 448–49 (1999); see also Lauren B. Edelman & Jessica Cabrera, Sex-Based Harassment and Symbolic Compliance, 16 Ann. Rev. L. & Soc. Sci. 361, 372–77 (2020) (identifying several cases in which courts applied the Faragher/Ellerth defense despite evidence that the employer’s complaint process was flawed). This trend of “judicial deference” is largely why anti-harassment policies and practices have proliferated in the workplace, many of which have been found to be ineffective at curbing harassment.161Lauren B. Edelman, Working Law: Courts, Corporations, and Symbolic Civil Rights, 173–74, 184–88 (John M. Conley & Lynn Mather eds., Univ. Chi. Press 2016) (arguing that judicial deference to internal employer systems significantly reduces the incentive for employers to ensure that they offer fair or just outcomes to employees who make use of those systems); Lauren B. Edelman, Linda H. Krieger, Scott R. Eliason, Catherine R. Albiston & Virginia Mellema, When Organizations Rule: Judicial Deference to Institutionalized Employment Structures, 117 Am. J. Socio. 888, 891 (2011); Susan Bisom-Rapp, Fixing Watches with Sledgehammers: The Questionable Embrace of Employee Sexual Harassment Training by the Legal Profession, 24 T. Jefferson L. Rev. 125, 145 (2002); Frank Dobbin & Alexandra Kalev, The Promise and Peril of Sexual Harassment Programs, 116 Proc. Nat’l Acad. Scis. 12255, 12258–60 (2019).

Likewise, the Faragher/Ellerth defense directs the blame for a hostile work environment on a plaintiff who was slow or reluctant to complain internally, rather than on the perpetrator or the employer. However, high rates of retaliation give many employees a valid reason to pause when reporting harassment or otherwise using grievance procedures.162At the summary judgment stage, judges are invited to apply their own professional experiences and biases as to whether they would feel comfortable reporting inappropriate behavior, a perspective that is likely very different from a female plaintiff, especially a woman of color, immigrant, or low-wage worker. See also Edelman, supra note 161, at 173–74, 184–88; Dobbin & Kalev, supra note 161, at 12255, 12258–59. Only one in four women subjected to sex-based harassment reported it using an internal grievance procedure; even fewer filed a charge with the EEOC.163Dobbin & Kalev, supra note 161, at 12255. At present, it is possible for a plaintiff to file a hostile work environment claim, and, despite evidence to her benefit, lose merely because she herself failed to utilize the internal grievance procedures created by the employer.164Green, supra note 94, at 164.

I.  Damage Caps Fail to Remedy Harms

The remedies available in Title VII cases include injunctive relief, reinstatement,165Front pay is available as an equitable remedy where reinstatement is infeasible or inappropriate. Pollard v. E. I. du Pont de Nemours & Co., 532 U.S. 843, 843 (2001). back pay, compensatory damages, punitive damages, and attorneys’ fees and costs.166Civil Rights Act of 1964, 42 U.S.C. § 2000e-5(g); 42 U.S.C. § 1981 (1991 Amendment to Title VII that provided for compensatory damages and punitive damages; punitive damages available for discrimination “with malice or with reckless indifference to the federally protected rights of an aggrieved individual”); Albemarle Paper Co. v. Moody, 422 U.S. 405, 405–06 (1975) (affirming that backpay may be available as a remedy for Title VII claims based on practices occurring after the effective date of Title VII, July 2, 1965); Kolstad v. Am. Dental Ass’n, 527 U.S. 526, 534 (1999) (interpreting “malice” and “reckless indifference” standard for purposes of punitive damages). Compensatory damages—that is, damages for pain and suffering—are subject to a statutory cap according to employer size.16742 U.S.C. § 1981(a), (b)(3). For employers with fewer than one hundred employees, compensatory and punitive damages cannot exceed $50 thousand; for two hundred or fewer employees, the cap is $100 thousand; for five hundred or fewer, the cap is $200 thousand; and for five hundred employees or more, the cap is $300 thousand.168Id.

Damage caps for compensatory and punitive damages can be particularly harmful in harassment cases when devastating psychological effects are common.169Mamoona Mushtaq, Safia Sultana & Iqra Imtiaz, The Trauma of Sexual Harassment and Its Mental Health Consequences Among Nurses, 25 J. Coll. Physicians & Surgeons Pak. 675, 676 (2015). Such effects can include suffering from depression, anxiety, stress, post-traumatic stress disorder, suicidal ideations, and adjustment disorders, among others.170Id. at 675. One study found that nurses who experience sexual harassment are three to eight times more likely to suffer from depression than women who were not harassed.171Id. These negative mental health outcomes have also been shown to have profound impact on long-term job-related outcomes, including lack of initiative, lower job satisfaction, increased propensity to leave, and financial problems.172Id. at 675–76.

In addition, other forms of available relief may not be especially meaningful in harassment cases. Although some employees quit or are fired in connection with workplace harassment, many harassment victims continue to work throughout the abuse, making them ineligible for back pay. Ironically, staying longer and enduring more prolonged harassment and abuse may end up resulting in lower damages. This is particularly problematic for low-wage workers who are economically vulnerable and cannot afford to quit their jobs. Conversely, if the employee was terminated, reinstatement may not be a useful remedy, as the plaintiff may be reluctant to return to an abusive workplace. Compensatory and punitive damages, along with attorneys’ fees and costs, may be the most important forms of relief available to harassment claimants. Yet, damage caps force courts and juries to limit relief to the plaintiffs to whom they might have made a much larger award to compensate for pain and suffering and to punish the employer for maintaining a hostile work environment.17342 U.S.C. § 1981a(b)(3).

Damage caps also limit access to justice. Because many plaintiff-side lawyers operate on contingency fees, a harassment claimant suing a small or even mid-size employer may have difficulty finding a lawyer willing to sue when the maximum recovery is less than $100 thousand. The effect of damage caps can be especially pronounced for low-wage workers, women of color, and immigrant workers engaged in domestic work or agricultural labor. When the size of recoverable wages is low due to a low base wage, plaintiffs are even more reliant on compensatory and punitive damages to attract the interest of a potential lawyer. Domestic workers, agricultural workers, and even restaurant and food-service workers may find themselves on the low end of the damage caps because they work for smaller operations. In such cases, a worker’s ability to find legal representation may ultimately depend on whether they can allege a separate tort or statutory claim not subject to the damage caps or whether they live in a state that offers more generous discrimination remedies under state law.

Damage caps also reduce deterrent effects on delinquent employers.174Section 1981 claims, for example, are not subject to damage caps, but can only be brought on the basis of race. Id. § 1981; see Saint Francis Coll. v. Al-Khazraji, 481 U.S. 604, 610 (1987); Shaare Tefila Congregation v. Cobb, 481 U.S. 615, 617 (1987). With minimal penalties, many employers are disincentivized to improve their responses to sexual misconduct in the workplace or to change workplace culture. Once again, vulnerable workers are doubly cursed—their employers know that their workers may not be covered by the statute, and even if they are covered, they may not find an attorney or recover very much. Facing little prospect of a big-ticket lawsuit, employers in these industries can turn a blind eye to harassment with little fear of accountability.

J.  Implied Hierarchy of Harassment Claims

Even prior to the #MeToo movement, the dominant narrative surrounding workplace harassment involved a subordinate White woman subjected to unwelcome sexual conduct or requests for sexual favors by a high-ranking White man. This scenario, for example, commonly appeared in early harassment training from the 1980s and 1990s.175Tippett, supra note 32, at 485. It was also, to some extent, reflected in the earliest EEOC regulations, which defined harassment in terms of sexual conduct and specifically referenced “quid pro quo” harassment, in which a supervisor requests sexual favors in exchange for some workplace benefit or the avoidance of harm.176MacKinnon, supra at 32, at 32–40; U.S. Equal Emp. Opportunity Comm’n, EEOC-CVG-1990-5, Policy Guidance on Employer Liability Under Title VII for Sexual Favoritism (1990) (superseded by U.S. Equal Emp. Opportunity Comm’n, EEOC-CVG-2024-1, Enforcement Guidance on Harassment in the Workplace (2024)).

This frame was not, however, compelled by the case law,177The earliest lower court rulings to recognize harassment claims involved a Latina dental assistant who was aggrieved by her employer’s decision to segregate its dental patients, and a religious harassment claim, which involved a Jewish employee subject to numerous derogatory epithets. Rogers v. EEOC, 454 F.2d 234, 236 (5th Cir. 1971); Compston v. Borden, Inc., 424 F. Supp. 157, 160 (S.D. Ohio 1976). As previously noted, the first Supreme Court case to recognize harassment, Meritor, was brought by a Black woman. Subsequent Supreme Court jurisprudence involved a variety of plaintiffs and fact patterns, including: a White woman subjected to denigrating sexual and gender-based comments by her supervisor (Harris v. Forklift), White female lifeguards subject to sexual conduct by their supervisors and ignored by human resources (Faragher), a White man subjected to humiliating and violent conduct by his male coworkers (Oncale), and a Black woman subject to racial slurs and taunting by a White woman (Vance v. Ball State). Harris v. Forklift Sys., Inc., 510 U.S. 17, 19 (1993); Faragher, 524 U.S. at 775–83; Oncale, 523 U.S. at 75; Vance v. Ball State Univ., 570 U.S. 421, 421–25 (2013). and it operates to the disadvantage of all other harassment claims that do not involve sexual conduct or that are brought on the basis of other protected classes. Intersectional claims brought on the basis of more than one protected category—often women of color experiencing racism and sexism—are at particular disadvantage.

Nowhere in the case law does the Supreme Court assert that sexual conduct forms a necessary part of a harassment claim or that certain protected classes are more deserving of relief than others.178Oncale, 523 U.S. at 79. The EEOC filing statistics also dispute the implicit narrative that sexual harassment claims predominate over other types of harassment claims. Nevertheless, the narrative of harassment as primarily a problem of sexual misconduct toward White women has had a measurable effect on lower court jurisprudence over time. This effect is well-documented in scholarly literature. Indeed, Pat Chew and Robert Kelly’s empirical study of harassment claims concluded that judges tend to discount race-based harassment claims.179Pat K. Chew & Robert E. Kelley, Myth of the Color-Blind Judge: An Empirical Analysis of Racial Harassment Cases, 86 Wash. U. L. Rev. 1117, 11660–63 (2009). Women of color pursuing litigation are further marginalized due to the courts’ pressure to separate out experiences of harassment into the false dichotomy of “Because of Race” or “Because of Sex,” when these are commonly intertwined.180Jamillah Bowman Williams, Beyond Sex-Plus: Acknowledging Black Women in Employment Law and Policy, 25 Emp. Rts. & Emp. Pol’y J. 13, 18–19 (2021). Empirical research has found that plaintiffs bringing intersectional claims are less than half as likely as plaintiffs bringing single claims to win their cases.181Williams, supra note 7, at 1822. Even within those statistics, Black women are more likely to lose their cases than Black men who bring intersectional claims, such as those based on both race and age.182Id.

In summary, harassment law is subject to a variety of gaps that enabled workplace harassment to continue in the decades leading up to the #MeToo movement. Next, we turn to the question of whether the many legislative reforms wrought by the #MeToo movement addressed these gaps.

III.  An Empirical Analysis of State and Federal Gender Equity Legislative Activity, 2016–2022

In previous scholarship, we discussed the ability of social movements to promote legal change.183Jamillah Bowman Williams, Naomi Mezey & Lisa Singh, #BlackLivesMatter—Getting from Contemporary Social Movements to Structural Change, 12 Calif. L. Rev. Online 1, 1 (2021) [hereinafter Williams et al., #BlackLivesMatter: Getting from Contemporary Social Movements]; Jamillah Bowman Williams, Naomi Mezey & Lisa Singh, #BlackLivesMatter: From Protest to Policy, 28 Wm. & Mary J. Race, Gender & Soc. Just. 103, 104 (2021) [hereinafter Williams et al., #BlackLivesMatter: From Protest to Policy]. While the window of opportunity may be small, #MeToo, like the mass Black Lives Matter protests during the summer of 2020, has the potential to generate staying power and remain influential on legal policy.184Williams et al., #BlackLivesMatter: From Protest to Policy, supra note 183, at 105. This is especially true if lawmakers, courts, and agencies follow the lead of workers who have been organizing for harassment-free workplaces long before #MeToo.185Id.; see also Steele, supra note 130, at 1667. Doing so will provide stakeholders an appropriate goalpost that they can measure their efforts against as they attempt to mitigate workplace harassment.

This Article builds on prior work that has begun to investigate the legal implications of #MeToo, but does so with an emphasis on empirical analysis.186See generally Tippett, supra note 158 (discussing the various legal issues raised by the #MeToo Movement); Williams et al., supra note 1 (analyzing the #MeToo movement as a form of social media activism, examining its impact on public discourse regarding sexual harassment and assault, and exploring its potential to effect lasting social, legal, and political change). The questions we explore include: (1) Has #MeToo effectively shifted the law forward in addition to raising awareness and sparking debate? (2) What topics were centered in bills versus introduced as secondary topics within proposed legislation? (3) To what extent did political factors such as state party lines and representation of women lawmakers influence the volume of bills introduced and passed? (4) To what extent did legislators take a comprehensive versus a narrow approach to workplace harassment?

A.  Methodology

To examine the actual and potential policy changes following #MeToo, our research team collected a corpus of 3,916 state bills187The search covered all fifty states plus the District of Columbia. and 255 federal bills relating to workplace gender equity, discrimination, and harassment that were introduced between 2016 and 2022. The corpus was collected through a legislative search of Legiscan, NexisUni, and Westlaw using seventy-five different search terms intended to identify relevant legislation.188See infra Appendix A. We collected data from these three databases as they are the most prevalent legislative databases and likely to collectively contain the most relevant data.

The search terms were generated to identify a broad range of workplace gender equity legislation rather than more narrowly-focused harassment bills for several reasons. As articulated in Part II, harassment is a complex systemic problem stemming from a variety of social, political, and cultural factors. To the extent legislation helps to address the underlying inequity—such as pay equity—the intervention may ultimately help to reduce harassment indirectly over time.189See infra at Section II.F. We therefore sought to capture the full range of legislative interventions to enable us to evaluate them collectively. Taking a broader approach to harassment reform also allows us to identify patterns in and across legislative bills, including the extent to which the bills are: (a) individualized, offering siloed remedies for individual cases; (b) institutionalized, delegating responsibility to employer training, policy or practices; or (c) systemic, which are broader in scope and affecting many workers across industries.

The initial corpus contained a substantial number of duplicative bills, typically as a result of near-identical legislation that was introduced separately in both the House of Representatives and the Senate of a particular state legislature. Potential duplicates were flagged manually based on similar or identical bill names, numbers, or descriptions. The textual similarity of potential duplicates were then assessed using the “compare” function in Adobe Acrobat Pro, which counts and highlights all textual differences. Pairs of bills where 80% or more of the text was identical were deemed duplicates, and one copy of the duplicate bill was discarded for the substantive coding and quantitative analysis. The final corpus analyzed herein contained 3,012 state bills and 255 federal bills (“Legislative Corpus”).

We then coded for the substantive topic of the bills pulled into our dataset through the criteria listed in Table 1.190This variable captures what the researchers believe to be the Primary topic. When bills cover two or more topics, the additional topics are coded as Secondary topics. Bills fell into one of eleven topic groups, as defined below.

 

Table 1.  State Legislative Topics

Topic

Definition

Transparency

Bills that implement new reporting or recordkeeping on employers regarding harassment or assault, or that restrict the use of non-disclosure provisions in employment contracts or settlement agreements.

Government Officials & Contracts

Bills that regulate the conduct of government officials, lobbyists or government contractors, such as requirements that legislatures adopt harassment policies for members; prohibiting public funds from being used to settle harassment claims; or requiring state contractors to adopt certain employment practices.

Anti-Harassment Practices

Bills that require some or all employers to adopt anti-harassment practices, such as training, policies, notices, or procedures to investigate harassment. Also includes bills that extend unemployment benefits to employees who quit due to harassment.

Anti-Discrimination Law

Bills that extend or expand anti-discrimination protections, such as expanding coverage or adding new protected categories such as sexual orientation, family status, marital status, or victims of domestic violence.

Leave

Bills that mandate paid or unpaid leave or that provide for accommodation for pregnant or nursing mothers.

Pay Equity

Bills that alter legal rules, hiring practices, or compensation practices relating to pay disparities or withholding of promotion or opportunities on the basis of sex, such as equal pay laws, prohibitions on requesting salary history, protection for pay discussions in the workplace, or mandatory pay disclosures.

Occupational

Bills that expand or create legal protections for sectors or occupations that predominantly employ women such as domestic work, hospitality, hotels, and janitorial services.

 

Enforcement

Bills that alter or expand legal rules or remedies relating to harassment, discrimination, leave/accommodation, equal pay, non-disclosure agreements, private arbitration, or workplace bullying.

Mandatory Arbitration

Bills that attempt to alter the enforceability of private arbitration provisions in employment contracts.

Equal Rights Amendment

Bills that ratify or pass the Equal Rights Amendment.

Othera

Bills that do not fit into the above categories, many of which are symbolic in nature, such as designating “Equal Pay Day,” establishing commissions or reports. Also includes laws regarding vocational training in non-traditional occupations, and gender diversity in boards of directors.

Note:  a The bulk of the “Other” category consists of bills that engage with harassment or gender equity symbolically rather than substantively. Examples include bills that create Days or Months to honor gender inequities that other bills in the dataset are seeking to redress. Other bills considered symbolic are those that commission Task Forces or Studies on harassment or gender equity reform more broadly. The rest of the “Other” category were outliers such as grants or vocational training for women in “High-Wage, High-Demand” jobs, regulation on law enforcement and military, and bills requiring the appointment and disclosure of women on boards.

 

Each bill summary was reviewed and coded by a member of our five-person research team, which included four researchers with a J.D. and an economics Ph.D. fellow. Where the summary was not sufficient to code the bill into one of the above-listed categories, the researcher reviewed the full text of the bill. Bills that fell outside the scope of the study—such as laws relating to cyberbullying, rape kits, or “street harassment”—were removed from the Legislative Corpus.

Many of the bills in the Legislative Corpus were “bundled,” that is, they sometimes included a variety of separate measures.191See infra Table 2. Where a given bill covered more than one of the relevant topics, it was coded using a “primary” topic and any additional topics received a “secondary” classification. For example in 2019, the Connecticut legislature introduced a bill that would amend multiple statutes to establish “economic equality for women,” including by requiring equal pay for equal work, increasing the minimum wage, requiring paid family and medical leave, and requiring annual anti-harassment training for companies with fewer than twenty employees among others.192S.B. 68, Gen. Assemb. (Conn. 2019). Thus, while this bill was coded primarily as a Pay Equity bill, it also was secondarily classified under Anti-Harassment Practices, Leave, and others.

Where bills presented a close case regarding the applicable category, members of the team discussed the bill and made a final decision. Coding decisions were also cross-checked using keyword searches within the Legislative Corpus specific to each subcategory.193See infra Appendix B. Keyword searches within the corpus were performed using the Quanteda package in R. See Kenneth Benoit, Kohei Watanabe, Haiyan Wang, Paul Nulty, Adam Obeng, Stefan Müller, Akitaka Matsuo, William Lowe & Eur. Rsch. Council, Quanteda: Quantitative Analysis of Textual Data, quanteda, https://quanteda.io [https://perma.cc/T78F-63TZ]. Keyword searches within the Legislative Corpus were also used to populate subcategories of bills within the “Enforcement” category relating to harassment law reforms.194These subcategories are illustrated in Table 1, infra, under the “Enforcement” category.

B.  Volume of Gender Equity Legislation Post #MeToo

  1. Federal Reforms

The #MeToo movement produced few legislative successes at the federal level between 2016 and 2022. Although many bills were introduced, few of them passed. By contrast, there has been a massive wave of #MeToo-related legislation at the state level. This flurry of legislative activity took place in statehouses across the country and continued for a sustained period—extending throughout 2022.

In the U.S. Congress, from 2016 to 2022, 255 bills were introduced relating to sexual harassment, sexual assault, and gender equity in employment.195See infra Figure 2. There was a sharp rise in bills between 2016 and 2017, from twenty to fifty-nine. Congress continued to introduce legislation at a high rate in 2018 and 2019—reaching thirty-eight bills in 2019. Proposed legislation then dropped sharply in 2020, with five bills introduced that year.

Figure 2.  Federal Gender Equity Bills (2016–2022)

At the federal level, only six #MeToo related bills passed during the sample period, and three of those bills are very limited in scope. The most wide-reaching bill was the Ending Force Arbitration of Sexual Assault and Sexual Harassment Act of 2021, discussed in greater detail in Part V.E.196Pub. L. No. 117-90, 136 Stat. 26 (2022) (codified at 9 U.S.C. §§ 401–02). In 2022, Congress also passed the Speak Out Act of 2022, which limits the enforceability of non-disclosure and non-disparagement clauses relating to sexual harassment and assault.197Pub. L. No. 117-224, 136 Stat. 2290 (2022) (codified at 42 U.S.C. §§ 19401–04). Another substantive change came from the National Defense Authorization Act for Fiscal Year 2022, which created additional reporting requirements for sexual harassment in the military—an industry at high risk of workplace harassment, among other forms of workplace violence.198Pub. L. No. 117-81, 135 Stat. 1541 (2021). 

The remaining laws that passed at the federal level were quite limited in scope. Two such bills related to lawmakers themselves: one mandates anti-harassment training for Senators and Senate employees199S. Res. 330, 115th Cong. (2017) (enacted). and the other makes lawmakers financially liable for harassment settlements.200Congressional Accountability Act of 1995 Reform Act, Pub. L. No. 115-397, 132 Stat. 5927 (2018) (codified at 2 U.S.C. §§ 1301–02, 1311–17, 1331, 1341, 1351, 1361, 1371, 1371, 1381–85, 1401–16, 1431–38). A third

bill was symbolic in nature, designating April as National Sexual Assault Awareness and Prevention Month.201S. Res. 603, 117th Cong. (2022) (enacted).

  1. State Reforms

As aforementioned, the vast majority of harassment and gender equity legislation was introduced and passed by state legislatures rather than Congress. We will begin the state legislation analysis by looking at state-specific and political trends in introduction and passage rates of gender equity bills between 2016 and 2022. We will then take a closer look at the potential for bipartisan support of gender equity bills before moving to topical analysis; there, our goal is primarily to examine how well legislation has been able to fill the gaps in legal protection that leave so many workers vulnerable to harassment and other gender-based workplace harm.

i.  General Trends

Broadly speaking, states introduced—and passed—a large number of #MeToo related bills between 2016 and 2022. Since 2016, states introduced approximately 3,000 such bills, of which 382 passed—a passage rate of 12.7%. As Figure 3 illustrates, some amount of gender-related legislative activity predated the viral spread of the #MeToo movement in 2017, with 244 relevant bills introduced in 2016, though only 19 such bills passed. The volume of #MeToo related legislation nearly doubled between 2016 and 2017, with 427 bills introduced, of which 42 passed. Legislative activity continued to rise year over year even after the extensive media coverage faded, peaking in 2019 at 715 bills introduced, of which 96 passed. Legislative activity was somewhat lower between 2020 and 2022 but remained above the 2016 baseline level. These trends suggest that the legislative momentum of the #MeToo movement continued for several years.

Figure 3.  State Gender Equity Bills (2016–2022)

There was substantial variation between states in the volume of legislation introduced, as illustrated in Figure 4. The most active state legislatures were New York (340 bills), followed by New Jersey (208 bills), Mississippi (151 bills), California (113 bills), Illinois (112 bills), and West Virginia (112 bills). Other states with a relatively high volumes of legislative activity were not confined to consistently Democratic “blue” states,202Nathaniel Rakich, How Red or Blue Is Your State?, FiveThirtyEight (May 27, 2021, 6:00 AM), https://fivethirtyeight.com/features/how-red-or-blue-is-your-state-your-congressional-district [https://perma.cc/NUR9-PVA6]. and included “swing”203We used the FiveThirtyEight “partisan lean” index to classify states as “swing,” “blue,” or “red.” “Swing” states refer to states with a partisan lead in favor of either party within a five-percentage point margin. “Blue” refers to states with a partisan lead in favor of the Democratic Party exceeding five percentage points. And “red” refers to states with a partisan lead in favor of the Republican Party exceeding five percentage points. and Republican leading states, including Virginia, Michigan, Minnesota, Pennsylvania, Texas, Hawaii, and Missouri.

However, the states with very little legislative activity—those that introduced ten or fewer #MeToo related bills between 2016 and 2022—were “red” states: Arkansas (four bills), South Dakota (six bills), North Dakota (seven bills), Montana (seven bills), Idaho (nine bills), and Wyoming (ten bills). Nevertheless, the sustained engagement of most states in #MeToo legislation suggests that there was more sustained legislative interest and energy around #MeToo-related gender equity reform than the partisan gridlock in Congress would suggest.

Figure 4 also highlights the years in which bills were introduced in each state, indicated by color within each bar. Although each state had more legislative activity in some years than others, they generally depict some legislative activity during each year in the sample period. This further suggests sustained legislative activity over time, not just across states writ large, but within each state.

The states that passed the most #MeToo related bills were similar—but not identical—to those that introduced the most #MeToo related legislation, with California in the lead (seventy-three bills), followed by Illinois (thirty-one bills), New York (twenty-seven bills), Washington (twenty-five bills), New Jersey (seventeen bills), Virginia and Maryland (fifteen bills each), Nevada (thirteen bills), then Louisiana, Oregon, and Maine (twelve bills each).204See infra Figure 4.

Although blue states dominate the list, the most prolific bill-passing states also included a solidly red state (Louisiana), and two swing states (Nevada and Virginia). The group of states that passed between five and ten bills also included a handful of swing or red states, including Pennsylvania, Texas, Arizona, Tennessee, and Kentucky, each of which passed five bills. Ten states failed to pass any #MeToo bills. Of these, seven were red states, and three were swing states.205The red states were Missouri, Ohio, Iowa, Alaska, Montana, North Dakota, and Arkansas. The swing states were Minnesota, North Carolina, and Wisconsin. In other words, the volume of bills passed in any given state is somewhat more reflective of the partisan divides between red states and blue states than the volume of bills introduced.

Figure 4.  Bills Introduced by State (2016–2022)a

Note:  a Only states with at least 20 introduced bills were included in Figure 4. 

 

Figure 5.  Bills Passed by State (2016–2022)a

Note a Only states that passed at least one bill were included Figure 5.

C.  Political Trends in Gender Equity Legislation Post #MeToo

Now that we have a sense of the general landscape with respect to state legislation post #MeToo, we can take a closer look at the political trends. While all states introduced some harassment and gender equity reform legislation, there are trends in region, party, and even representation of women in legislatures, that provide information about who is leading the charge with respect to introducing and passing legislation that produces effective change.

  1. Political Party

Figure 6 presents a more direct breakdown of the relationship between partisanship and #MeToo legislation. Throughout much of the sample period, more #MeToo-related bills were introduced in Republican-led legislatures, relative to Democrat-led legislatures.206 However, Democratic legislatures passed far more bills than Republican-led legislatures by a margin of 3.6 to 1. These results suggest that there was substantial legislative interest in #MeToo related topics in both Republican and Democratic state legislatures—and perhaps even a greater level of experimentation in Republican legislatures—but far less momentum to pass those bills in Republican states.

 

Figure 6.  Bills Introduced and Passed by Party Majority and Year

a. Introduced bills

 

b. Passed bills

 

Note:  This figure does not include seven laws introduced in Alaska that had “N/A” for party majority

  1. Representation of Women Lawmakers

Part I discussed the historical exclusion and underrepresentation of women and racialized minorities in the lawmaking process. From 2016 to 2021, as the conversation around #MeToo and gender equity broadened, the percentage of women in state legislatures grew to record numbers in many states.207Carl Smith, The Rise of Women in State Legislatures: A State-by-State Map, Governing (March 10, 2021), https://www.governing.com/now/the-rise-of-women-in-state-legislatures-a-state-by-state-map.html [https://perma.cc/4FX3-TDVM]; see infra Figure 7.

Figure 7.  Percent of State Legislators Who Are Women, 2012–2021

We next analyzed the relationship between the average representation of women in each state legislature from 2016 to 2022, and the volume of gender equity legislation the state passed during that same period. The results suggest that states with more women lawmakers tended to pass more gender equity legislation in the years following #MeToo than states with fewer women lawmakers.208See infra Figure 8. One exception was California, which was an outlier in that it had dramatically higher bill passage rate. Because this skewed the data drastically, it was removed from the scatterplot.

Most states tended to cluster together along party lines. For example, traditionally red states including West Virginia, Wyoming, Alabama, and South Carolina had state legislatures with less than 20% of women lawmakers and also passed less than ten gender equity bills between 2016 and 2022. By contrast, Democratic strongholds such as Illinois, New York, and Washington had legislatures with between 30% and 40% women lawmakers, as well as over twenty gender equity bills passed in each of these states between 2016 and 2022. This suggests that Democratic states may be leading the way with respect to maximizing anti-discrimination legislation put forth—in line with the Swiss Cheese Model of risk reduction. However, the substance of the bills passed is another critical part of the analysis.

 

Figure 8.  Frequency of Gender Equity Legislation Passed, by Mean % Women Lawmakers, 2016–2022

D.  Topical Analysis of Gender Equity Legislation Post #MeToo

This Section takes a closer look at the types of bill topics introduced or passed and examines whether the activity was responsive to the gaps in protection previously identified in Parts I and II. We found that states attempted to pass a variety of legislative measures on a number of topics related to gender equity and workplace harassment. The breadth of introduced bill topics is promising, as it suggests legislators are open to taking a multi-layered approach to increasing protection and minimizing harassment—especially in industries at particular risk.

Figures 9 and 10 display the introduced and passed bills according to the topic of the legislation. As Figure 9 illustrates, pay equity was the most common topic of proposed legislation, with more than 700 bills introduced. Leave laws were the second most common topic, with 582 bills proposed. Enforcement bills—which included a variety of reforms to strengthen protections by changing legal rules and remedies—were the third most prevalent, with 376 bills. Laws mandating changes to employer practices and policies (“Anti-Harassment Practices”), such as harassment training and grievance procedures, came in fourth, with 332 bills.

The topics most commonly passed in the legislature did not correspond to the topics that were most frequently introduced. The most commonly passed topic was “Other,” which predominantly consisted of symbolic legislation, such as designating an “Equal Pay Day,” expressing a policy position, or establishing a task force. The second most commonly passed topic was laws relating to Anti-Harassment Practices, closely followed by laws relating to Pay Equity.

 

Figure 9.  Number of State Gender Equity Bills, By Primary Topic

The volume of bills introduced on specific topics could ultimately be viewed as a proxy for broad legislative interest in a topic, with pay equity and leave garnering the most interest. Legislative volume may also be an indicator of legislative creativity and innovation around a particular topic. Pay Equity bills in particular produced a wide variety of proposals to address the underlying problem, ranging from pay disclosure rules, protection from retaliation, new forms of equal pay mandates, or restrictions on the types of information employers can use to calculate pay rates. Republican led states were often as creative in this regard as Democratic ones.

For example, West Virginia introduced a bill entitled the “Katherine Johnson Fair Pay Act of 2019” in honor of Katherine Coleman Johnson, an African American mathematician born and educated in West Virginia.209S.B. 412, Reg. Sess. (W. Va. 2019). She was awarded the Presidential Medal of Freedom despite facing segregation and wage discrimination along with the rest of her Black female crew. The bill would prohibit an employer from (1) banning pay discussion in the workplace formally through waiver or informally and (2) inquiring about prospective employees’ wage or salary history.210Id. Utah and Wyoming also took steps to bolster equal pay protections; in 2016 and 2019, respectively, both states passed legislation increasing fines for employers and legal remedies for victims of wage discrimination.211S.B. 185, Gen. Sess. (Utah 2016) (enacted); H.R. 71, 65th Leg., Gen. Sess. (Wyo. 2019) (enacted).

Many states also used a bundling approach, by adding in additional topics that were “secondary” to a primary bill topic.212See discussion on page 136. Once secondary topics are included, the “Other” category remains the most commonly passed topic. However, other types of reforms received a substantial boost by including “secondary” topic codes, particularly the “Enforcement” category, which rises to second place when secondary topics are included. Likewise, anti-discrimination law reforms were much more frequent when adding analysis of secondary topics. This suggests that legislators are strategizing—proposing a bill on a primary topic, such as pay equity, that may garner wider support, and then in the same bill, adding other protections that are less likely to be presented and supported in standalone bills.

These secondary “hidden” topics are of note because they tend to add substance to bills that may otherwise lack the ability to promote effective change. We measure the effectiveness of a bill by assessing its ability to fill at least one of the many gaps identified in harassment and anti-discrimination law. The ability to fill these “holes,” to use the Swiss Cheese Model analogy, indicates an appropriate focus on how harassment and other gender inequities in the workplace are actually experienced by today’s most vulnerable workers. For example, many of the workers most vulnerable to harassment also have extremely limited economic bargaining power due to various factors including the racial and gender pay gap. To bolster these workers’ ability to fight existing wage discrimination, many state legislators added a cause of action into pay equity reform bills that would have otherwise lacked an enforcement mechanism that allowed workers to take their claims in court.

 

Figure 10. Total Number of State Gender Equity Bills Passed, By Topic

Secondary topics were a common feature of the dataset: almost 40% of bills had one or more secondary topics.213See infra Table 2. The most common topic bundle combined Pay Equity and Enforcement (307 bills), followed by Leave and Enforcement (200 bills). This bundle tended to reflect that new leave or pay equity laws were typically more substantive in nature and drafted with some sort of enforcement remedy beyond fines for employer violations—thereby increasing workers’ access to courts. For example, in 2016, even before the #MeToo activism, California passed an Equal Pay for Equal Work bill that was both systemic and substantive and included a bundle of enhanced protections.214A.B. 1676, 2015–2016 Gen. Assemb., Reg. Sess. (Cal. 2016) (enacted). This new law prohibits wage discrimination, creates a cause of action for employees aggrieved by wage discrimination, and prohibits retaliation against employees seeking enforcement of the law.215Id.

Table 2 also reveals less intuitive combinations, such as bundling Anti-Discrimination Law along with other bill topics. One example of this strategy comes from New York, where the 2020 legislature introduced an extensive bill that bolstered discrimination and harassment enforcement remedies and expanded protected classes to include individuals experiencing these harms on the basis of their sexual orientation and gender identity, marital status, familial status, and more.216S.B. 3817, 242nd State Assemb., Reg. Sess. (N.Y. 2019) (enacted). This strategy was also adopted in many Leave laws, which were frequently accompanied by reforms to Anti-Discrimination Law (seventy-five bills). Pay Equity was also commonly paired with reforms to Anti-Discrimination Law (forty-one bills). This bundled approach may have served as an effective strategy to effect systemic broadening of statutory protection without attracting undue attention and opposition.

Indeed, it appears that strategically “bundling” topics increased the ability of legislatures to pass reforms that either (1) create or strengthen a variety of enforcement mechanisms for harassment and other gender equity claims, or (2) broaden coverage under anti-discrimination statutes. Although standalone bills involving these reforms had less success, legislators appear to have successfully tacked them on to bills involving other subjects.

 

Table 2.  Common Bundles of Workplace Gender Equity Topics

 

Primary topic

Secondary topic

 

Anti-Discrimination Law

Anti-Harassment Practices

Enforcement

Anti-Discrimination Law

Anti-Harassment Practices

Mandatory Arbitration

Anti-Discrimination Law

Anti-Harassment Practices

Pay Equity

Anti-Discrimination Law

 

Anti-Discrim. Law

 

5

60

21

10

 

1

2

3

1

 

Anti-Harassment Practices

25

 

29

11

2

4

9

13

 

37

 

Enforcement

25

12

 

5

12

 

3

4

6

9

 

Govt. Officials and Contracts

8

58

11

 

1

 

 

1

1

19

 

Leave

75

 

200

 

 

 

18

6

2

27

 

Mandatory Arbitration

2

3

20

10

 

 

 

1

 

12

 

Occupational

1

12

12

 

3

 

 

 

1

5

 

Other

7

8

3

1

7

 

 

16

 

8

Pay Equity

41

1

307

47

17

 

22

51

 

54

 

Transparency

6

10

36

28

1

14

8

2

1

 

 

 

Reform initiatives that aim to strengthen enforcement mechanisms and broaden coverage under Title VII to protect more workers are essential because they increase access to the courts. Reform will not reduce the prevalence of harassment and other gender inequities if impacted workers are unable have their claim addressed by the court system. It is also true, however, that the judiciary needs reform itself, particularly with respect to its interpretation of the severe or pervasive standard, the objectively hostile standard, the Faragher/Ellerth defense, and retaliation. Until the judiciary is more in touch with the realities of the workplace, it is unclear how well this new wave of workers with access to the courts will fare.

Progressive coastal states such as California and New York provide examples of legislative agendas that substantially shift how workplace harassment is conceptualized by courts.217Johnson et al., supra note 30, at 8. This legislation attempts to remedy some of the shortcomings in harassment jurisprudence discussed in Part II.218Post #MeToo, New York lowered the severe or pervasive standard, eliminated the Faragher/Ellerth affirmative defense, and instituted training requirements. S. 6577, 242nd Gen. Assemb. (N.Y. 2019) (enacted). Both of these states also amended laws to expand protections for harassment and discrimination to include more protected categories as well.219Johnson et al., supra note 30, at 5.

Some states also improve enforcement by extending the administrative filing period of harassment and discrimination claims. Five states (California, Connecticut, Maryland, New York, and Oregon) extended the administrative filing deadline.220Four of these five states extended the filing period for harassment and discrimination claims. New York extended the administrative filing period for “sexual harassment” only. A.B. 9, 2019–2020 Reg. Sess., (Cal. 2019) (enacted);; S.B. 3, 2019 Reg. Sess., (Conn. 2019) (enacted); S.B. 451, 2022 Leg., (Md. 2022) (enacted); A.B. A8421, 2019–2020 Gen. Assemb., (N.Y. 2019) (enacted); S.B. 479, 2019 Reg. Sess. (Or. 2019) (enacted). Of these, three states extended the deadline for all discrimination claims.221A.B. 9, 2019–2020 Gen. Assemb., Reg. Sess. (Cal. 2019) (enacted); S.B 726, 80th Leg., Reg. Sess. (Or. 2019) (enacted); H. 729, Gen. Assemb., Reg. Sess. (Vt. 2022) (enacted). This is particularly important for low-wage workers, for whom inadequate filing deadlines exacerbate existing pressure to use limited time and resources to at once both find a job and seek legal recourse for harm suffered.

A relatively small number of bills sought to increase the damages available in harassment claims. These bills were also somewhat successful, with four states—Virginia, Nevada, New York, and Connecticut—increasing available damages. Many—but not all—who passed bills did so by (1) allowing the discrimination plaintiffs to recover both compensatory and punitive damages and (2) removing damage caps for victims of discrimination based on employer size. In some states—such as Nevada—damage caps remain, limiting the impact of recent increases in available damages.222S.B 177, 80th Leg. (Nev. 2019) (enacted).

IV.  Discussion & Implications

When analyzing the legislative activity over time, we found that proposed bills began to address a wider range of systemic gender equity issues over the time period;223Council B. B24-0649, 24th Council (D.C. 2023) (enacted); H.R. 1, 149th Gen. Assemb. (Del. 2017) (enacted); S. 2986, 218th Leg. (N.J. 2019) (enacted); S.B. 5258, 66th Leg., Reg. Sess. (Wash. 2019) (enacted). however, as with many movements, reform efforts gradually fizzled out over time. Importantly, however, they never returned below the 2016 baseline activity. These empirical results suggest that while the #MeToo movement may have sustained some of its initial impact on harassment and gender equity reform over the past five years, progress may be stagnating. Avoiding further stagnation requires legal stakeholders to offer workers consistent harassment and gender equity reform that are responsive to the changing realities of the current workplace. This includes acting swiftly to respond to the 2025 Trump administration’s attempts to reverse harassment-related protections for transgender workers under Title VII.224Exec. Order No. 14,168, 90 Fed. Reg. 8615 (Jan. 20, 2025).

A.  Did States Fill Any Gaps?

State legislation partially filled gaps left by federal law. While state legislators took a broad approach to introducing harassment and gender equity reform, they took a narrower approach to amending harassment law. While we did see efforts to combat noted gaps in protection such as mandatory arbitration at both the state–and even federal level–these efforts are typically limited to banning mandatory arbitration of sexual harassment claims—leaving harassment on other bases, as well as other discrimination claims, unprotected. This creates challenges for the plaintiffs experiencing harassment based on multiple categories or those experiencing both discrimination and harassment, which often occur together.

At the same time, state legislatures seriously attempted—and, in many cases, succeeded—in expanding the list of protected classes protected by anti-discrimination law. For example, some states have expanded protections to cover workers excluded from Title VII coverage, such as those working for small employers, independent contractors, and unpaid interns, among many others.225Ramit Mizrahi, Sexual Harassment Law After #MeToo: Looking to California as a Model, 128 Yale L.J.F. 121, 126–28 (2018). Some have also expanded liability and remedies for harassment by removing Title VII’s affirmative defense against harassment as well as its caps on compensatory and punitive damages for victims of harassment.226Id. at 130.

The most unexpected finding came from the Enforcement bill category. Enforcement was the third most introduced bill topic, suggesting stronger legislative support than expected. Moreover, when we considered secondary topics, the number of Enforcement bills nearly doubled. This suggests a strategy among state legislators to increase access to the courts and to strengthen relief available for harassment and gender equity issues, including pay equity, leave and accommodation, and anti-discrimination law. As a result, there will likely be an influx of the new plaintiffs who are able to have their day in state court. While this is generally good news, it also highlights the continuing and glaring failure of the judiciary to remedy the harassment that is experienced and brought before the courts. Expanding coverage to additional workers and increasing their access to the courts will only work if they are encountering a judiciary that is responsive to power hierarchies and realities of the workplace, while also being serious about curtailing harassment. It is clear that there is still work to be done in this respect, and we look forward to conducting further research examining the topical granularity of the Enforcement bills in our database and how future clams fare in court.

On the federal level, several bills failed in their attempt to remedy the judicially created harassment doctrine outlined in Part II. House Bill 8698, for example, introduced in October 2020, sought to amend Title VII to overturn Supreme Court jurisprudence that is unfavorable to victims of harassment, including Alexander v. Sandoval,227Overturning the Supreme Court’s decision in Alexander v. Sandoval, would allow a private right of action under Title VII Section 703 based on evidence of disparate impact. The Sandoval decision has prohibited private individuals from challenging specific types of disparate impact discrimination, state regulations with the effect of discriminating against classes of individuals. Alexander v. Sandoval, 532 U.S. 275, 293 (2001). Vance v. Ball State,228Vance v. Ball State Univ., 570 U.S. 421, 450 (2013). and Faragher/Ellerth.229Faragher v. City of Boca Raton, 524 U.S. 775, 807 (1998); Burlington Indus., Inc. v. Ellerth, 524 U.S. 742, 765 (1998). This bill would enhance enforcement by allowing the plaintiffs to sue under Title VII based on evidence of disparate impact, strengthening the plaintiff’s ability to sue under a theory of vicarious liability, and reducing the likelihood of judicial deference to employer anti-harassment policies and procedures, despite ineffectiveness.230H.R. 8698, 116th Cong., 2d Sess. (2020). The bill also created a broader exception to the Federal Arbitration Act for all employment-related rights and remedies under federal and state law, not just sexual harassment.231Id. at § 8. It would also have expanded available remedies by allowing the plaintiffs to collect pre-trial attorney’s fees.232Id. at § 4. House Bill 8698 would prohibit employment discrimination on the basis of sexual orientation and gender identity,233Id. at § 2. a proposal that was ultimately rendered moot by the Supreme Court’s 2020 decision in Bostock v. Clayton.234Bostock v. Clayton County., 590 U.S. 644, 1754 (2020).

Knowing the effect of the #MeToo movement on legislative agendas and bill passage rates is important for those who wish to maintain and expand the momentum that was fueled and, in some cases, created by these movements. More specifically, legislators and other legal decisionmakers, including the courts and government agencies, should make workers’ voices central to their work. Following the lead of worker organizers whose anti-harassment advocacy efforts predated the groundswell of attention brought by the #MeToo movement will not only bring consistency, but also timeliness and specificity to the anti-harassment agendas set by various legal stakeholders. Below, we outline four specific issues that we believe should be central to advocacy efforts in particular, due to their deleterious effects on workers most vulnerable to workplace harassment.

B.  Legal Gaps in Need of Greater Attention

While the past five years following the #MeToo movement have seen reforms that were more systemic and bipartisan than anticipated, major gaps persist, allowing harassment to remain a threat. Harassment and gender equity reform is particularly in need of (1) more systemic changes with greater oversight, transparency, and accountability, (2) greater focus on intersectional harms, (3) well-informed enforcement efforts by judges, attorneys, and agencies alike, and (4) more creative strategies to deal with retaliation.

  1. Symbolic Action and Individuation of Harassment Continues, and Even Worsens?

Our analysis revealed a substantial number of reforms that were symbolic in nature, which encourages institutional “window dressing,” to merely signal enhanced rights, but without effective policies or cultural shifts.235One prominent category we coded as symbolic were bills ratifying the Equal Rights Amendment to the United States Constitution; however, the Equal Rights amendments that apply to state constitutions may potentially be meaningful at the state level, to the extent they serve to protect reproductive rights following the Dobbs decision. See generally Dobbs v. Jackson Women’s Health Organization, 597 U. S. 215 (2022). Equal Rights Amendments (ERAs) are of questionable efficacy at the federal level, as the original ERA contained a seven-year deadline, and the Senate has not passed a House resolution lifting the deadline. Nevertheless, state legislators introduced sixty-nine bills relating to the ERA and passed five. Some states created days of honor or remembrance, without adding substance of additional protections or enforcement, which we do not expect to make a meaningful difference beyond raising public awareness about harassment and other gender equity issues. Others condoned behavior of a government official or stated policy support for an issue, without actually making changes that change circumstances for women on the ground. Many states also created task forces and commissions to study issues of harassment and gender equity, but subsequent legislation would be needed to effectuate any changes proposed by these groups. Symbolic reforms may even be counterproductive to the extent they “check the box” by passing a related bill, creating the appearance of having addressed the problem. This can provide political cover while failing to implement more meaningful systemic reform.

Even more troubling is the continuing popularity of bills imposing harassment training requirements. While these bills can have substantive impact, research has shown that unless certain conditions—such as transformative leadership or bystander-specific training—are met, trainings are likely to be ineffective at promoting changes in workplace behavior. Moreover, training requirements can even be counterproductive. Legal stakeholders, thus, need to be aware of how training requirements tend to individuate harassment, making it about individual perpetrators rather than broader shifts in workplace culture, power dynamics, and worker dignity that are required. Training, grievance procedures, and investigations that focus on damage control may obscure the systemic patterns so often present in harassment and discrimination cases. In the current landscape, given the central role of the Faragher/Ellerth defense, these employer practices and procedures do more to insulate the employer from liability than they do to mitigate workers’ risk of harassment or other gender-based harms.

  1. Greater Focus on Intersectional Harms

Congress and state legislatures can, and should, also introduce more legislation protecting specific industries where women of color are overrepresented. This includes not only domestic workers, but also independent contractors, farmworkers, healthcare, hospitality, retail, and restaurant workers.236Elyse Shaw, Ariane Hegewisch, Emma Williams-Baron & Barbara Gault, Inst. for Women’s Pol’y Rsch., Undervalued and Underpaid in America: Women in Low-Wage, Female-Dominated Jobs 26–30 (2016), https://iwpr.org/wp-content/uploads/2020/09/D508-Undervalued-and-Underpaid.pdf [https://perma.cc/6B3L-EXZJ]; Clare Malone, Will Women in Low-Wage Jobs Get Their #MeToo Moment?, FiveThirtyEight (Dec. 14, 2017), https://fivethirtyeight.com/features/the-metoo-moment-hasnt-reached-women-in-low-wage-jobs-will-it [https://perma.cc/5LTR-FRPT]. In 2017, California passed a bill that added a section to the California Labor Code pertaining to farm labor contractors’ requirement to provide sexual harassment trainings to employees. See S.B. 295, Assemb., Reg. Sess. (Cal. 2017). Although state legislatures have stepped up to fill substantial federal gaps in coverage post #MeToo, barriers to enforcement remain and limit potential impact. To be effective, more systemic reform efforts are required that go beyond harassment law to also broaden protections across legal doctrines to the benefit of all women workers. This means, in particular, supporting state and federal legislative agendas that close gaps for the most vulnerable women workers, including low-wage workers, women of color, workers with disabilities, and LGBTQIA+ workers.

 Importantly, this requires moving away from the narrow interpretation of sexual harassment by judicial precedent and envisioning a new legal agenda around gender equity reform that is responsive to the reality of our evolving workplace and society. Doing so will require not only our policymakers, but also agencies and courts, to internalize gender inequity—rather than sexual desire—as the foundation of workplace harassment, highlight how it is exacerbated by low-wage employment, and acknowledge how its impact, in many cases, compounds for women with additional protected characteristics, in precarious work, segregated working conditions, and occupationally isolating jobs.237Vicki Schultz, Open Statement on Sexual Harassment from Employment Discrimination Law Scholars, 71 Stan. L. Rev. Online 17, 18–19 (2018).

  1. Navigating an Employer-Friendly Judiciary

As aforementioned, our legislative analysis suggests that plaintiffs will have greater access to the courts in the near future; however, we must further question and examine what that means if the judiciary continues to constrain harassment law and gender equity doctrine. This is a key moment for employment and civil rights lawyers to advocate effectively for their clients and in doing so, set new precedents, for the court. Doctrinal areas in need of innovation include the “severe and pervasive” requirement, the “objectively” hostile or abusive standard, and the Faragher/Ellerth affirmative defense.

  1. Dealing with Retaliation is Required for Reforms to Work

Strengthening judicial enforcement is also important in the context of retaliation, which continues to go hand in hand with harassment. Despite high rates of retaliation and its role in deterring victims from speaking up and using existing protections, state legislative agendas failed to pass measures that would more effectively deal with this issue. Solving the problem of retaliation requires more than changes to anti-retaliation laws; it also requires stronger enforcement that would incentivize systemic changes to workplace culture. In addition to legislation strengthening anti-retaliation protections generally, more bills should focus on identifying and mandating what specific behaviors are considered retaliatory. These reforms could include retaliatory actions such as substantive changes to terms of employment, disclosing personnel files, contacting immigration authorities, or threatening to report an employee’s immigration status.238Id. Doing so would signal the legislature’s recognition that retaliation is rooted in systemic power imbalances and is particularly threatening for workers in low-wage industries or workers with intersectional identities including race and national origin.

Conclusion

Considerable legislative progress has been made in the first five years after #MeToo went viral. Overall, more harassment and gender equity reform has occurred than expected, and through a more varied and comprehensive approach than first predicted. This is particularly true at the state level where new laws also offer greater coverage and enforcement remedies under civil rights statutes regardless of worker classification and with consideration for their occupational hazards and intersectional vulnerabilities.

While it is clear that the #MeToo movement moved the law forward with respect to harassment and gender equity, more work needs to be done, particularly with respect to centering the interests of workers most vulnerable to harassment. Various institutions–including judges, lawmakers, and agencies–contributed to the dissonance between the legal enforcement of, and the realized experience of, workplace harassment. This dissonance is then distributed widely via media, leading to public apathy and confusion about the current landscape of workplace harassment and related gender equity issues. These legal stakeholders thus have a responsibility to ensure that access to justice is equitably and consistently distributed to all workers, especially those most vulnerable. Fulfilling this responsibility grows more

urgent everyday under an increasingly hostile second-term Trump administration.

This does not mean, however, that effective and responsive reform efforts are out of reach. Legislators and regulators alike should consult anti-harassment worker organizers in crafting future reform. Doing so will enable legal branches to establish greater consistency in their treatment of harassment and remain more up to date with the rapidly changing realities of workplace harassment. This, in turn, will have the desired effect of closing the gaps between how harassment is enforced on the books, how it is enforced in the workplace, and how it is experienced by working women.

Federal actors should also make fruitful use of state-level innovation to ensure that state-level successes achieve a broader impact. Now that states have provided evidence of bipartisan support for these issues, Congress and federal agencies including the EEOC, the Department of Health and Human Services, and even the Occupation Safety and Health Administration, should step in and offer a more systemic approach that covers the multitude of gender equity issues that contribute to harassment.

Lastly, our goal is for our dataset to be used as a public resource, from which further research can be developed with the hope of providing concrete findings regarding the effectiveness of state-specific harassment and gender equity legislation. In turn, this research can be used to bolster the advocacy efforts by worker organizers. Doing so will enable legal stakeholders to remain in conversation with those best situated to determine the needs of a given workplace with respect to preventing harassment: the workers themselves.

 

Appendix A.  Search Terms Used to Identify #MeToo Related Legislation

Abusive Work Environment

Gender

Pay Parity

Sexual Orientation

anti-SLAPP

Gender Expression

Predispute Arbitration

Sexual penetration

Antidiscrimination

Gender Identity

Pregnant Workers

Sexual Violence

Compensation History

Gender Representation

Public Right to Know

Sodomy

Confidentiality Agreement

Gratuities

Rape

Stalking

Confidentiality Clause

Harassment

Retaliation

Statute of Limitations

Confidentiality Provision

Harassment Complaints

Salary Experience

Statutory Right

Cyberbullying

Harassment Prevention

Salary History

Unauthorized Disclosure

Denim Day

NDA

Sex

Wage Disclosure

Discrimination

Non-biased Compensation

Sexual Abuse

Wage Discrimination

Discrimination Complaints

Non-consensual

Sexual Arousal

Wage Disparities

Domestic Violence

Nonconsensual dissemination

Sexual Assault

Wage Disparity

Equal Pay

Nondisclosure Agreement

Sexual Assault Awareness

Wage History

Equal Rights

Nondisparagement Agreement

Sexual battery

Wage Secrecy

Equal Rights

Paid Family Leave

Sexual Discrimination

Workplace Bullying

Equal Rights Amendment

Panic Button

Sexual Gratification

Workplace Climate

Ethics Violation

Panic Device

Sexual Harassment

Workplace Misconduct

Family Leave

Pay Disparity

Sexual Intimidation

Workplace Protections

Forced Arbitration

Pay Equity

Sexual Misconduct

 

 

 

 

Appendix B.  Search Terms Used on Bill Corpus to Verify Topic Coding

Topic

Search Terms

Anti-Discrimination

“gender identity” “gender expression” “sexual orientation” “pregnan” “famil* status” “marital status” “famil* responsibility”

Equal Rights Amendment

“equal rights amendment” “ratification”

Harassment Training/Policies/Procedures

“sexual harassment training” “sexual harassment prevention” “complaint process” and “complaint procedure”

Leave/Accommodation

“paid family leave” “safe” “paid sick leave” “domestic violence” “accommodation” “pregnan*” “adoption” and “foster”

Mandatory Arbitration

“mandatory arbitration” “forced arbitration” “arbitration agreement”

Occupational Protections

“domestic” “hotel” “farm” “janitor” “artist” “panic” “bill of rights” “entertainment” “gratuit*”

Pay Equity

“wage discrimination” “pay dispar” “equal pay for equal work” “equal pay” “salary history” “wage history” and “pay equity”

Enforcement

“severe” “pervasive” “statute of limitations” “punitive damages” “compensatory damages” “damages” and “tort”

Regulates Government Officials/Lobbyists/State Contractors

“lobbyist” “state contract” “legislator” “members of the legislature” “legislative staff” “public officials” and “expel”

Transparency/NDAs

“disclosure” “employment history” “non-disclosure agreement” and “nondisclosure agreement”

Other

“task force” “study” “high-wage, high-demand” “law enforcement” and “boards”

 

 

 

98 S. Cal. L. Rev. 761

Download

* Professor of Law & Faculty Director, Workers’ Rights Institute, Georgetown University Law Center; B.S. 2003, Georgetown University McDonough School of Business; M.A. 2005, University of Michigan; Ph.D. 2013, Stanford University; J.D. 2011, Stanford Law School. Thank you to Angelica Sanchez Diaz, Nick Gonzales, Keniece Gray, and Lolade Akintunde for research support. Thank you to participants at the Lutie Lytle Workshop for providing valuable feedback.

Professor of Law & James O. & Alfred T. Goodwin Senior Fellow, University of Oregon School of Law; B.A., 2002, Harvard College; J.D. 2006, Harvard Law School.

Research Fellow, Georgetown University Law Center; B.A. 2018, University of Miami; J.D. 2022, University of California, Berkeley School of Law.

Familial DNA and Due Process for Innocents

Ever since genealogical DNA unmasked the Golden State Killer in 2018, the use of this new forensic science has been ubiquitous. Police have solved several hundred cold cases by uploading unidentified crime scene DNA samples to consumer genealogical databases and, with expert assistance, building out family trees from the resulting matches to identify suspects. This practice has raised significant concerns among privacy scholars due to the intimate nature of DNA information and the lack of consent by the parties ultimately identified through their relatives’ choice to upload data. Critics argue that the Fourth Amendment bars law enforcement from running warrantless familial DNA searches using consumer databases, even among users who have given their consent. Several states have also passed legislation banning or severely restricting such searches.

This Article argues that the current debate around familial DNA has neglected the due process rights of another person: the innocent third party who is potentially convicted in the absence of accurate, exculpatory DNA evidence. Both the Compulsory Process and Due Process Clauses give a defendant the right to obtain exculpatory evidence in their defense through judicial subpoena and from the government itself under Brady doctrine. In close cases, the respective scopes of competing constitutional rights should be defined so as to not excessively burden one another. On that basis, this Article argues against any ban on, or categorical constitutional or statutory rule requiring, probable cause for law enforcement to conduct familial DNA searches. The privacy interests raised by critics are legitimate; yet the functional inability for law enforcement to identify unknown suspects due to the lack of probable cause disproportionately burdens defendants whose Compulsory Process and Due Process rights are already limited by existing materiality requirements and inadequate resources. For many innocent defendants, the State itself is the best and only source of investigative resources and potentially exonerating evidence.

Introduction

In 2019, after Christopher Tapp had served nearly twenty years of a sentence for the rape and murder of his eighteen-year-old friend Angie Dodge, his conviction was vacated.1Ken Otterbourg, Christopher Tapp, Innocence Project, https://innocenceproject.org/cases/christopher-tapp [https://perma.cc/4YNU-MQM6]. An Idaho jury convicted him in 1998 largely due to a series of interrogations during which the police attempted to get him to implicate various friends, including through the offer of an immunity deal, which was later withdrawn when it was discovered that one friend had an alibi.2Id. During questioning, police—including a former guidance counselor of Tapp’s, whom he personally trusted—threatened him with the death penalty and told him that he could not remember the murder because he was repressing it.3Id. Tapp was convicted despite DNA tests that had excluded both him and the initially-targeted friend as the source of semen found at the scene of the crime.4Id.

A decade after the conviction, the Idaho Innocence Project took up Tapp’s case and requested DNA testing on hairs found on the victim’s body, which had only been visually inspected previously.5Id. The FBI lab found that the DNA on the hair was consistent with that of the semen, meaning that the hair also excluded Tapp. In rejecting Tapp’s lawyers’ requests for further testing, an appeals judge found that “while DNA testing may be relevant in identifying one of the assailants, such does not make it more probable that Tapp is innocent.”6Id.

Ultimately, the Idaho Falls police—now with the public support of the victim’s mother—worked with the Innocence Project and the private company Parabon Nanolabs to identify the source of the DNA sample.7Id.  Parabon created a genetic profile from the sample and compared it with profiles submitted to various consumer ancestry databases.8Id. Starting with profiles in the database, Parabon was able to use other records to build a family tree that turned out to include a man named Brian Dripps, who had lived across the street from the victim and had even been questioned during the early investigation.9Id. Using a discarded cigarette butt collected by the Idaho Falls police, Parabon compared Dripps’s DNA with the sample from the crime scene and was able to identify Dripps as the source of the DNA.10Id. Dripps confessed to the murder and rape, saying that he had acted alone and did not even know Tapp.11Id. Christopher Tapp’s two-decade nightmare was over.

Tapp’s case was at the vanguard of the latest development in forensic science: law enforcement use of familial DNA mapping to identify crime scene samples against the profiles voluntarily uploaded by perpetrators’ relatives to direct-to-consumer (“DTC”) genealogical sites. Starting with the apprehension of California’s infamous Golden State Killer in 2018, familial DNA has been responsible for the police solving a series of high-profile crimes in recent years, including the 1981 New Hampshire murder of Laura Kempton by Ronney James Lee; the 1984 murder of fourteen-year-old Wendy Jerome by Timothy Williams in Rochester, New York; and Sherri Papini’s false claims of kidnapping and sex trafficking by fictitious Latina women in Shasta County, California in 2016.12Aaron Katersky & Meredith Deliso, Decades-Old New Hampshire Cold Case Murder Solved Through Genetic Genealogy, Officials Say, ABC News (July 20, 2023, 11:46 AM), https://abcnews.go.com/US/decades-new-hampshire-cold-case-murder-solved-genetic/story?id=101525486 [https://perma.cc/5KU6-FH2L]; Steven Pappas, Landmark Conviction: Familial DNA Testing Resolves 1984 Murder Cold Case, A First in NYS, 13 WHAM (Mar. 8, 2024, 10:35 PM), https://13wham.com/news/local/landmark-conviction-familial-dna-testing-resolves-1984-murder-cold-case-a-first-in-nys [https://perma.cc/FVS6-UF42]; Brittany Johnson, ‘That Was Absolutely the Breaking Point’: Prosecutor Discusses How DNA Evidence Helped Solve Papini’s Case, KCRA 3 (Sept. 19, 2022, 9:40 PM), https://www.kcra.com/article/prosecutor-says-dna-helped-solve-sherri-papini-case/41287016 [https://perma.cc/QH89-7MB9].

While law enforcement use of DTC databases has brought resolution to many cases, it has also been the source of significant consternation among privacy advocates and scholars. At the start of the DTC revolution, users were not necessarily aware that law enforcement might be able to access their DNA profiles.13Paige St. John, The Untold Story of How the Golden State Killer Was Found: A Covert Operation and Private DNA, L.A. Times (Dec. 8, 2020, 5:00 AM), https://www.latimes.com/california/story/2020-12-08/man-in-the-window [https://perma.cc/4D25-B9YQ]. In the current moment, even the most law-enforcement-friendly DTC companies explicitly allow users to “opt in” or “opt out” of sharing their information with police.14See GEDmatch & Community Safety, GEDmatch, https://www.gedmatch.com/community-safety/#:~:text=Just%20like%20any%20other%20user,with%20the%20law%20enforcement%20profile [https://perma.cc/KDE8-LFTV]; IGGM Frequently Asked Questions, FamilyTreeDNA, https://help.familytreedna.com/hc/en-us/articles/4413980686863-IGGM-Frequently-Asked-Questions [https://perma.cc/FGJ4-2NGU]. Even so, many argue that such consent should not include third-party relatives eventually identified through genetic genealogy because these relatives have no control over whether their family members have uploaded their own DNA to a DTC site.15See Natalie Ram, Investigative Genetic Genealogy and the Problem of Familial Forensic Identification, in Consumer Genetic Technologies: Ethical and Legal Considerations 211, 214 (I. Glenn Cohen et al. eds., 2021); Ayesha Rasheed, ‘Personal’ Property: Fourth Amendment Protection for Genetic Information, 23 U. Pa. J. Const. L. 547, 589–90 (2021); Karen J. Kukla, Direct to Consumer or Direct to All: Home DNA Tests and Lack of Privacy Regulations in the United States, 13 IP Theory 31, 32–33 (2023). As states have begun to regulate in this area, many have explicitly allowed for police access to DTC sites.16Ariz. Dep’t of Pub. Safety Sci. Analysis Bureau, Familial DNA Analysis, https://www.azdps.gov/sites/default/files/2023-08/Familial_DNA_Analysis_Flyer_3.pdf [https://perma.cc/YV9X-PEG8]. However, several states have passed statutes restricting law enforcement use of familial DNA. The District of Columbia and Maryland wholly ban familial DNA searches of police databases; in Maryland’s case, the ban extends even to searches by private citizens (and, thus, criminal defendants).17D.C. Code § 22-4151(b) (2025); Md. Code Ann., Pub. Safety § 2-506(d) (West 2024). Montana, meanwhile, prohibits police from conducting familial DNA analysis using either DTC or police DNA databases without probable cause, which may be very difficult to establish in many cases involving an unidentified sample.18Mont. Code Ann. § 44-6-104(2) (2023).

The constitutionality of familial DNA searches is governed by the Supreme Court’s most recent word on the Fourth Amendment in an era of evolving technology—Carpenter v. United States.19Carpenter v. United States, 585 U.S. 296 (2018). Carpenter invalidated the government’s use of a subpoena (rather than a warrant) to access a subject’s cell phone location data from their service provider, a practice it had previously justified under the “third-party doctrine” of the Fourth Amendment.20            Id. at 309. The Court held that a person has a reasonable expectation of privacy in the totality of their movements, and that, because carrying a cell phone is effectively involuntary in the modern age, such an expectation is not defeated by the fact that a user’s location data is shared with third-party service providers.21Id. at 309–12. Critics of unfettered law enforcement access to DTC DNA databases and of familial DNA searches generally point to the increasing ubiquity of both public and private databases and the large number of strangers who can be involuntarily identified through a fairly small number of users.22See Ram, supra note 15, at 220. They argue that a person has a reasonable expectation of privacy in their DNA against such non-consensual, indirect identification.23Id.

This Article is the first to examine this question with regard to a forgotten constitutional stakeholder: the potentially innocent “other” suspect who, like Christopher Tapp, familial DNA might exonerate. While critics on both sides tend to balance the privacy rights of targeted parties against the crime-solving interests of the government, the constitutional framework is more complicated than this given the due process rights of these potential defendants. In Part One, this Article explains the science of forensic DNA generally, familial DNA specifically, and their roles in investigations and exonerations. Part Two presents the Fourth Amendment background to this problem and summarizes the argument that courts should recognize a reasonable expectation of privacy that would prohibit warrantless familial DNA searches, even where DTC users give consent. Part Two also asserts that while this argument is colorable, it is weak. This is due to both standing problems and the fact that the privacy interest in not being identified as the specific depositor of a single DNA sample is not comparable to the interest in the privacy of one’s daily movements.

Part Three argues that a falsely accused suspect has a similarly colorable due process right in the availability of familial DNA testing. Such a right derives from three sources: the Compulsory Process Clause, the due process right to exculpatory evidence, and the due process right to post-conviction relief procedures. This Part argues both that defendants themselves should not be legally barred from running familial DNA searches in public or private databases and that the practical realization of their due process rights requires that law enforcement not be so barred either. Part Four concludes that, in close cases, competing constitutional rights must not excessively burden one another. On that basis, this Part argues against any categorical rule substantially preventing law enforcement from conducting familial DNA searches. While legislatures are well-advised to limit the use of this technology to serious cases in which other investigative techniques have failed, they should not adopt bans or probable cause requirements; if they do, they should at least create an explicit process for defense subpoenas. Furthermore, Part Four concludes that courts should not extend Carpenter to create a categorical warrant requirement for familial DNA searches of police databases or DTC databases where an initial user has given consent to law enforcement access.

I.  The Developing Practice of Forensic DNA

A.  DNA Science

Deoxyribonucleic acid (“DNA”) is a molecule found in cells that contains the genetic code for an organism’s development, function, growth, and reproduction.24Nat’l Libr. of Med., What is DNA?, MedlinePlus, https://medlineplus.gov/genetics/understanding/basics/dna [https://perma.cc/QM4G-XTYC]. DNA is hereditary, meaning it is passed from parent to child.25Id. The information in DNA is stored as a code made up of four chemical bases: adenine (“A”), guanine (“G”), cytosine (“C”), and thymine (“T”).26Id. Human DNA consists of about three billion bases and more than 99% of those bases are identical across the species.27Id. Their sequence determines the information available for building and maintaining the organism.28Id.

Variations in code can occur at any point in the genome, including non-coding areas.29Karen Norrgard, Forensics, DNA Fingerprinting, and CODIS, Nature Educ.: Scitable (2008), https://www.nature.com/scitable/topicpage/forensics-dna-fingerprinting-and-codis-736 [https://perma.cc/Z3H5-4KRB]. Scientists have discovered that these non-coding regions contain repeated units of DNA that vary in length between individual subjects; one particular type of repeat, the short tandem repeat (“STR”), is easily measured and compared for identification purposes.30Id. The FBI has identified thirteen areas, or “loci,” on a chromosome where STRs are found, which U.S. law enforcement now uses to identify individuals—for example, to identify remains, determine paternity, or match a suspect to a forensic sample from a crime scene.31Id.

DNA identification involves the use of statistics.32Id. The FBI has established the frequency with which each form, or “allele,” of the thirteen core STRs naturally occurs in people of different ethnicities.33Id. In a specific case, a lab will determine the allele profile of the thirteen core STRs for both the crime scene sample and the suspect’s sample. If they do not match, the suspect is excluded.34Id. If they have matching alleles at all thirteen STRs, it then becomes possible to make a statistical calculation to determine the frequency with which that genotype arises in the population.35Id. The probability, for example, of two unrelated Caucasians having identical DNA “fingerprints” is about 1 in 575 trillion.36Phil Reilly, Legal and Public Policy Issues in DNA Forensics, 2 Nature Revs.: Genetics 313, 314 (2001). Because there are 5,000 trillion pairs of people out of the 100 million Caucasians in the world, roughly eight or nine pairs would be expected to match at the thirteen STR loci.37Norrgard, supra note 29.

Given the exceedingly low likelihood of any given person matching the DNA profile associated with a crime scene, the probabilistic science of DNA has generated some of the most reliable evidence known to our justice system.38Id. This does not mean that it is always perfect evidence. DNA samples may be small in quantity, improperly preserved, or highly degraded (meaning that analysts can only obtain a partial profile).39Id. When fewer than thirteen alleles can be examined from a sample, it increases the possibility of a random match. Id. Furthermore, some crime scene samples contain DNA from multiple sources. All of these issues can confound the effectiveness of DNA fingerprinting as a means of identification. However, in cases in which all thirteen STR loci can be examined and matched, such matches are extraordinarily reliable.40See Holly A. Hammond, Li Jin, Y. Zhong, C. Thomas Caskey & Ranajit Chakraborty, Evaluation of 13 Short Tandem Repeat Loci for Use in Personal Identification Applications, 55 Am. J. Hum. Genetics 175, 175 (1994); Nat’l Comm’n on the Future of DNA Evidence, Nat’l Inst. of Just., Off. of Just. Programs, The Future of Forensic DNA Testing: Predictions of the Research and Development Working Group 5, 35 (2000).

The use of DNA science in crime solving has been facilitated by the rise of DNA databases maintained by law enforcement. The DNA profiles in these databases come primarily from two sources: (1) DNA samples taken from crime scenes where they can be obtained (for example, “rape kits”) and (2) samples taken from convicted offenders and, in some states, arrestees. All fifty states statutorily require at least some offenders, especially those convicted of sexual or violent crimes, to submit samples.41Xiaochen Hu, Mai E. Naito & Rolando V. del Carmen, Pre- and Post- Conviction DNA Collection Laws in the United States: An Analysis of Proposed Model Statutes, 1 J. Crim. Just. & L. 22, 24 (2017). In addition, thirty states statutorily authorize law enforcement to collect DNA samples from those arrested for certain types of crimes, usually felonies.42Id.; Figure 1. States That Have Enacted Arrestee DNA Collection Laws in the United States, Nat’l Inst. of Just., https://nij.ojp.gov/media/image/10251 [https://perma.cc/EP4Y-HBWZ]. The FBI maintains the Combined DNA Index System (“CODIS”), a program of support for law enforcement DNA databases nationwide.43Frequently Asked Questions on CODIS and NDIS, FBI, https://www.fbi.gov/how-we-can-help-you/dna-fingerprint-act-of-2005-expungement-policy/codis-and-ndis-fact-sheet [https://web.archive.org/web/20240625150854/https://www.fbi.gov/how-we-can-help-you/dna-fingerprint-act-of-2005-expungement-policy/codis-and-ndis-fact-sheet]. It includes the National DNA Index System (“NDIS”), which contains the DNA profiles contributed by federal, state, and local participating forensic laboratories.44Id. As of February 2024, CODIS had assisted in over 680,122 criminal investigations.45CODIS-NDIS Statistics, FBI, https://le.fbi.gov/science-and-lab/biometrics-and-fingerprints/codis/codis-ndis-statistics#:~:text=CODIS’s%20primary%20metric%2C%20the%20%22Investigation,in%20more%20than%20680%2C122%20investigations [https://web.archive.org/web/20240714204728/https://le.fbi.gov/science-and-lab/biometrics-and-fingerprints/codis/codis-ndis-statistics]. One study of Danish data found that police collection of criminal offenders’ DNA profiles increases detection probability and reduces recidivism rates over the next year by as much as 43%.46Anne Sofie Tegner Anker, Jennifer L. Doleac & Rasmus Landersø, The Effects of DNA Databases on the Deterrence and Detection of Offenders, 13 Am. Econ. J.: Applied Econ. 194, 221 (2021); see also Jennifer L. Doleac, The Effects of DNA Databases on Crime, 9 Am. Econ. J.: Applied Econ. 165, 165–68 (2017) (showing the significant deterrent effects of state DNA databases).

B.  DNA and Exonerations

One of the most important developments flowing from the rise of DNA evidence since the mid-1990s has been its potential for exonerating the wrongfully accused and convicted.47Jon B. Gould & Richard A. Leo, One Hundred Years Later: Wrongful Convictions After a Century of Research, 100 J. Crim. L. & Criminology 825, 829–30 (2010). A 1996 study found that as many as 25% of the cases sent for DNA analysis in the early days of the technology ended up excluding the primary suspect, demonstrating the significance of DNA technology in avoiding potential wrongful convictions.48Edward Connors, Thomas Lundregan, Neal Miller & Tom McEwen, U.S. Dep’t of Just., Convicted by Juries, Exonerated by Science: Case Studies in the Use of DNA Evidence to Establish Innocence After Trial xix–xx (1996). Between 1989 and 2020, the Innocence Project reports that 375 wrongfully convicted prisoners were freed due to post-conviction DNA testing.49DNA Exonerations in the United States (1989–2020), Innocence Project, https://innocenceproject.org/dna-exonerations-in-the-united-states [https://perma.cc/N2ZT-VGB6]. This is, unfortunately, due not only to the accuracy of DNA evidence but also to the unreliability of other forms of evidence that have been contributing to false convictions since time immemorial.50Id.

One significant factor in wrongful convictions has been the problem of false eyewitness identifications. Sixty-nine percent of DNA exonerations tracked by the Innocence Project involved eyewitness misidentification.51See Innocence Staff, How Eyewitness Misidentification Can Send Innocent People to Prison, Innocence Project (Apr. 15, 2020), https://innocenceproject.org/how-eyewitness-misidentification-can-send-innocent-people-to-prison [https://perma.cc/Q9AS-2UX9]. This is perhaps unsurprising due to the role of trauma in distorting witness recollections over time52See generally Kenneth A. Deffenbacher, Brian H. Bornstein, Steven D. Penrod & E. Kiernan McGorty, A Meta-Analytic Review of the Effects of High Stress on Eyewitness Memory, 28 Law & Hum. Behav. 687 (2004). and the fact that police practices around line-ups and show-ups can often—even unintentionally—prove overly suggestive and encourage bad identifications.53See False Confessions Happen More Than We Think, Innocence Project (Mar. 14, 2011), https://innocenceproject.org/false-confessions-happen-more-than-we-think [https://perma.cc/4TKB-N4FD]. Cross-racial identifications are notoriously less reliable than identifications made by witnesses of the same race as the suspect.54See Stephanie J. Platz & Harmon M. Hosch, Cross-Racial/Ethnic Eyewitness Identification: A Field Study, 18 J. Applied Soc. Psych. 972, 978 (1988) (showing that 53% of Caucasians correctly identified a Caucasian subject in a field study but only 40% of Caucasians correctly identified a Black subject).

False confessions, as exemplified by Christopher Tapp’s case, have been identified as a factor in over 25% of DNA exonerations.55False Confessions, Innocence Project, https://innocenceproject.org/false-confessions [https://perma.cc/V3UC-ZCED]; Explore the Numbers: Innocence Project’s Impact, Innocence Project, https://innocenceproject.org/exonerations-data [https://perma.cc/2EKT-3CPZ]. On average, people who confess to crimes they did not commit have been interrogated for sixteen hours or more.56Id. Other factors associated with false confessions include deceptive practices by police, such as lying about evidence, isolation, intimidation, and force.57Id. Whatever the particular causes, the problem of wrongful conviction has been found to disproportionately affect Black suspects.58See Explore the Numbers: Innocence Project’s Impact, supra note 55 (showing that 58% of the wrongful convictions recorded by the Innocence Project involved Black exonerees). But see Mark Saber, Brooke Nodeland & Robert Wall, Exonerating DNA Evidence in Overturned Convictions: Analysis of Data Obtained from the National Registry of Exonerations, 33 Crim. Just. Pol’y Rev. 256, 267 (2022) (finding that “being Black did not significantly impact the odds of obtaining an exoneration featuring DNA evidence” in Dallas and Harris Counties in Texas). The role of DNA in exonerations thus suggests that it improves not only accuracy but also equality in the criminal justice system.

Responding to the implications of DNA science for the wrongfully convicted, all fifty states have enacted statutes dealing with defendants’ access to DNA evidence post-conviction.59See Brandon L. Garrett, Claiming Innocence, 92 Minn. L. Rev. 1629, 1673–75, 1719–23 (2008) (collecting post-conviction DNA statutes from the forty-six states and the District of Columbia that had been enacted as of 2008); Ala. Code § 15-18-200 (2024) (providing for post-conviction DNA testing in capital cases only); Alaska Stat. § 12.73.010 (2024); Mass. Gen. Laws ch. 278A, §§ 1, 2; Miss. Code Ann. § 99-39-5 (202); Okla. Stat. tit. 22, § 1373.5 (2024). Such statutes generally provide not only a right to post-conviction testing under certain circumstances but also an easing of traditional rules of finality in cases where the results demonstrate innocence.60See Garrett, supra note 59, at 1673. At the federal level, the Innocence Protection Act provides for post-conviction DNA testing in federal cases, and the Justice for All Act creates financial incentives for states to provide for post-conviction DNA testing.6118 U.S.C. § 3600(g)(2); 42 U.S.C. § 14163a(b)(1)(D).

Increased public attention to the problem of wrongful convictions has also prompted several jurisdictions to create Conviction Integrity Units (“CIUs”) within their prosecutor’s offices to monitor and investigate potentially wrongful convictions.62See Saber et al., supra note 58, at 258. The creation of the CIU in Dallas County, Texas was the result of the County’s DNA retention policy as well as the election of District Attorney Craig Watkins, who made conviction integrity a particular priority.63See id. A nationwide study of data from the National Registry of Exonerations between 1989 and 2016 even found that Dallas County was the geographic region with the greatest likelihood of a DNA exoneration occurring.64See id. at 258, 265. Despite the increasing availability of DNA testing, however, one study of fifty cases found that DNA exonerations were met by skepticism among stakeholders in the system—by prosecutors, judges and victims. Anne Richardson Oakes & Julian Killingley, DNA Exonerations and Stakeholder Responses: A Case of Cognitive Dissonance?, 90 Tenn. L. Rev. 109, 110–11 (2022). The study found close to the same degree of skepticism as between two periods: 1990 to 1999 (the very early days of forensic DNA) and 2010 to 2019 (after DNA science had become more ubiquitous). Id. at 147. The authors posited that such skepticism may reflect the threat exonerations pose to the value systems and self-belief of such stakeholders, who may have acted in good faith and in genuine but mistaken belief in the exoneree’s guilt. Id. at 147–48.

C.  Familial DNA

An obvious limit to the use of forensic DNA in crime-solving is the fact that the universe of potential matches for crime scene samples comprises only profiles already stored in existing databases. In cases where an unknown perpetrator has no prior record or other reason to have a profile stored, DNA has been less useful. These limitations seemingly dissolved for the first time when police apprehended the Golden State Killer (“GSK”), Joseph DeAngelo, in 2018.

The GSK was a serial rapist and murderer who terrorized California across six counties in the 1970s and 1980s.65Paige St. John & Luke Money, Golden State Killer Given Life in Prison for Rapes, Murders That Terrorized a Generation, L.A. Times (Aug. 21, 2020, 5:17 PM), https://www.latimes.com/california/story/2020-08-21/golden-state-killer-sentencing-justice-victims-serial-murders-rapes [https://perma.cc/SQ9Q-WJW2]. Escalating from peeping Tom behavior to burglary and finally to home invasion rapes and murders, which often seemed to target couples, the GSK was responsible for at least thirteen murders and over fifty rapes.66Id. While initially famous for the horrific nature of his offenses and the length of his escape from justice, DeAngelo—a former police officer—would become equally famous as the first defendant identified through familial DNA.67Id.

Prosecutors took genetic material preserved from the rape kits of GSK’s victims and first sent it to FamilyTreeDNA, a DTC testing company.68St. John, supra note 13. DTC companies like FamilyTreeDNA allow customers to submit their own DNA through saliva samples and receive genetic information such as countries of origin, health risks, and the names of relatives who have also submitted to the database.69Direct-to-Consumer Genetic Testing FAQ for Healthcare Professionals, Nat’l Hum. Genome Rsch. Inst., https://www.genome.gov/For-Health-Professionals/Provider-Genomics-Education-Resources/Healthcare-Provider-Direct-to-Consumer-Genetic-Testing-FAQ#:~:text=Direct%2Dto%2Dconsumer%20genetic%20tests,risks)%20from%20a%20saliva%20sample [https://perma.cc/65Y6-QXZ4]. Therefore, they contain a different and more varied range of profiles than those available in CODIS as they are unrelated to known crimes. Furthermore, the genetic profiles collected in genealogy databases, instead of consisting of STRs, are unique single nucleotide polymorphism (“SNP”) profiles.70Christi J. Guerrini, Ray A. Wickenheiser, Blaine Bettinger, Amy L. McGuire & Stephanie M. Fullerton, Four Misconceptions About Investigative Genetic Genealogy, 8 J.L. & Biosciences 1, 3 (2021). These are more evenly distributed through a person’s genome than STRs and can thus carry information about a person’s physical appearance that would not be available from a profile in CODIS.71Id. at 4.

FamilyTreeDNA created a DNA profile for the GSK’s sample which officers hoped would yield the identities of close family relations and, thus, enable them to narrow their search.72See St. John, supra note 13. That attempt yielded only distant relations and proved unhelpful in identifying the killer.73Id. However, a civilian genealogy expert assisting the investigative team uploaded the DNA profile to another DTC company, MyHeritage, using her own personal user profile.74Id. She also uploaded it to GEDmatch, a then-public site to which users could upload their DNA profiles and seek out family members for free.75Id.

The MyHeritage search yielded a pool of second cousins of the killer, one of whom investigators visited at her home in Orange County. She then voluntarily provided a DNA sample, which showed that the killer was related to her through other family members investigators had discovered on a third DTC site, Ancestry.com.76Id. This narrowed the pool of suspects down to six men, only one of whom, Joseph DeAngelo, had blue eyes—a feature already known from the original DNA profile. After ten days of surveilling DeAngelo, investigators seized DNA-bearing evidence from his trash can, finally proving him to be the killer.77Id.

The GSK story raises obvious privacy concerns around the access afforded to law enforcement by the companies themselves in the first place. Immediately after DeAngelo’s arrest, an investigator confirmed only that the officers had uploaded the rape kit profile to the open-source GEDmatch site.78Id. For a time, the FBI treated the three private companies as privileged confidential sources, instructing California investigators that they were not to reveal their identities as they assembled charges against DeAngelo.79Id.

As it turns out, the companies had widely divergent views about assisting law enforcement. FamilyTreeDNA actively assisted the FBI, giving them access to the site for investigative purposes without knowing specifically which case they were investigating.80Id. Their terms of service at the time contained a warning that the company could be required to release users’ personal information in response to a “lawful request by public authorities,” and their CEO stated that he did not believe assisting the police violated this policy.81Id. By contrast, MyHeritage’s privacy policy contained the stronger language that information would only be released “if required by law” (suggesting the company would only release information to law enforcement in the face of a warrant or at least a subpoena).82Id. Because MyHeritage did not assist law enforcement directly but merely sold its services to a purported consumer, it arguably did not violate its own policy. Its marketing executive noted that their privacy policy “did not explicitly” address this form of access and said “[i]t is possible that the civilian geneticist thought she was not violating our terms of service.”83Id.

In the wake of the interest generated by the GSK case, most DTC companies have revised their policies to strengthen and clarify the degree of privacy to be expected vis-à-vis law enforcement. For example, MyHeritage now stipulates that “[w]e will not provide information to law enforcement unless we are required by a valid court order or subpoena for genetic information.”84MyHeritage Privacy Policy, MyHeritage, https://www.myheritage.com/privacy-policy [https://perma.cc/EC34-HGG2]. The popular site 23andMe.com makes an even stronger statement, promising “to use all practical legal and administrative resources to resist requests from law enforcement,” though noting that under some circumstances the company “may be required by law to comply with a valid court order, subpoena, or search warrant for genetic or personal information.”8523andMe Guide for Law Enforcement, 23andMe, https://www.23andme.com/law-enforcement-guide [https://perma.cc/8M74-Y6CY]. Furthermore, most sites now prohibit users from uploading DNA belonging to someone other than themselves or a dependent.86See Jasper Ford-Monroe, Why Familial Searches of Civilian DNA Databases Can and Should Survive Carpenter, 72 Hastings L.J. 1717, 1725 (2021). Even these strengthened policies leave somewhat open-ended the question of how hard companies will resist police requests and, specifically, whether they will take the hardline position of companies like Apple, who refuse to hand over customer data in the absence of a warrant supported by probable cause.87Apple, Apple Transparency Report: Government and Private Party Requests 1 (2022), https://www.apple.com/legal/transparency/pdf/requests-2022-H1-en.pdf [https://perma.cc/U99B-VVWL]. Furthermore, it is difficult to imagine how genetic companies could prevent users from uploading a third party’s DNA sample under their own name.88Ford-Monroe, supra note 86, at 1725.

There are also two notable outliers in the privacy trend in consumer genetics. GEDmatch (now owned by the Qiagen Corporation) has taken a different approach, allowing law enforcement to upload DNA samples in cases of murder, nonnegligent manslaughter, aggravated rape, robbery, aggravated assault, or when there is a need to identify a dead body.89Id. While users must actively “opt in” to have their own DNA profiles matchable by law enforcement, the site actively encourages them to do so, exhorting that users can help “provide answers to those with missing loved ones” and “enable law enforcement to solve violent crimes and exonerate the falsely accused.”90GEDmatch & Community Safety, supra note 14. The GEDmatch site features profiles of crime victims identified and murders solved, along with the story of Christopher Tapp.91Id. FamilyTreeDNA has remained the most friendly to law enforcement, now clarifying on its site that it will allow police to create profiles to help identify bodies or perpetrators in violent crimes and requires users affirmatively to “opt out” of their data’s inclusion in such searches.92IGGM Frequently Asked Questions, supra note 14. The state of California now legally requires consumer genetic companies to obtain consent in this manner.93Cal. Civ. Code § 56.181(a)(2)(C)–(D) (West 2024).

As of the end of 2022, 545 cases have been solved using familial DNA.94Michelle Taylor, How Many Cases Have Been Solved with Forensic Genetic Genealogy?, Forensic Mag. (Mar. 3, 2023), https://www.forensicmag.com/594940-How-Many-Cases-Have-Been-Solved-with-Forensic-Genetic-Genealogy [https://perma.cc/MZ35-2PJ9]. Another dimension of consumer genetic databases worth noting is their demographic differences from CODIS. Black Americans appear to be overrepresented in CODIS relative to the general population.95See Ford-Monroe, supra note 86, at 1736 (citing Kim Zetter, DNA Sample from Son Led to Arrest of Accused ‘Grim Sleeper’, Wired (July 12, 2010, 7:41 PM), https://www.wired.com/2010/07/dna-database [https://perma.cc/9PYW-SDMU]). By contrast, people of Northern European ancestry are more heavily represented in consumer databases (perhaps unsurprisingly due to the uncertainty of precise ancestral origins among people of vaguely European descent).96See id. (citing Antonio Regaldo, A DNA Detective Has Used Genealogy to Point Police to Three More Suspected Murderers, MIT Tech. Rev. (June 26, 2018), https://www.technologyreview.com/2018/06/26/2600/a-dna-detective-has-used-genealogy-to-point-police-to-three-more-suspected [https://perma.cc/VTJ4-BSB3]). One study found that at least 60% of Americans of European descent may be identifiable through a genealogical database of just 1.3 million people.97See Yaniv Erlich, Tal Shor, Itsik Pe’er & Shai Carmi, Identity Interference of Genomic Data Using Long Range Familial Searches, 362 Science 690, 690 (2018).

II.  The Privacy Argument for Restricting Familial DNA

This Section will consider the privacy interests implicated by law enforcement use of familial DNA, starting with the Fourth Amendment framework protecting privacy. It will summarize the scholarly commentary arguing that warrantless familial DNA searches may violate the Fourth Amendment, as well as new state statutory protections that limit such searches. Finally, it will argue that police conducting familial searches of their own databases or of DTC databases with the consent of genetically related users raises colorable but ultimately quite weak Fourth Amendment arguments.

A.  The Constitutional Dimension

The debate over familial DNA occurs at a time of high doctrinal instability around the meaning of the Fourth Amendment in a world of constantly changing technology. The Fourth Amendment provides that:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.98U.S. Const. amend. IV.

The Founders adopted the Amendment, which mirrored parallel provisions in state constitutions at the time, in response to the Crown’s use of general warrants in the Colonies.99Gerard V. Bradley, Searches and Seizures, Heritage Found., https://www.heritage.org/constitution/#!/amendments/4/essays/144/searches-and-seizures [https://perma.cc/D72C-SZR8]. Courts issued these warrants allowing Crown agents to search and seize evidence with no limitations.100Id. In the infamous cases Entick v. Carrington (1765) and Wilkes v. Wood (1763), the Crown used these broad warrants to arrest two pamphleteers critical of the government and to seize their books and papers.101Wilkes v. Wood [1763] 98 Eng. Rep. 489, 490; Entick v. Carrington [1765] 95 Eng. Rep. 807, 807–08. Ultimately, Carrington and Wilkes won trespass suits against the relevant government.102Wilkes, 98 Eng. Rep. at 490; Entick, 95 Eng. Rep. at 807–08.

With this brief history as backdrop, most early cases construing the Fourth Amendment understood it to prohibit only warrantless, trespassory interferences with property, allowing auditory surveillance by law enforcement where they did not physically intrude on the defendant’s property.103See Olmstead v. United States, 277 U.S. 438, 466 (1928) (holding that warrantless wiretapping of private telephone conversations did not violate the Fourth Amendment because it did not occur physically on the defendants’ property but on a publicly-available phone network); Goldman v. United States, 316 U.S. 129, 134–35 (1942) (holding that evidence obtained by use of a detectaphone, applied to the wall of the room adjoining the office of the defendant, was not unlawfully obtained, despite a prior trespass). In the watershed 1967 case United States v. Katz, however, the Court made a change.104Katz v. United States, 389 U.S. 347 (1967). In Katz, FBI agents had attached a listening device to the outside of a public telephone booth in which the defendant was making a call.105Id. at 348. Explicitly overruling prior precedent, the Court held that this constituted a warrantless search and announced a new rule: “[w]hat a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. . . . But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.”106Id. at 351–52. This new test for the existence of a Fourth Amendment search has become known (based on language in Justice Harlan’s concurrence) as the “reasonable expectation of privacy” test.107Id. at 360 (Harlan, J., concurring). To apply it, courts ask, first, whether the defendant had exhibited a subjective expectation of privacy and, second, whether that expectation was “one that society is prepared to recognize as reasonable.”108Bond v. United States, 529 U.S. 334, 338 (2000).

While Katz ostensibly renounced the property-based trespass rule of the Fourth Amendment, the subsequent half-century of Supreme Court jurisprudence has seen, nonetheless, a doctrinal struggle between property- and privacy-based conceptions of the right. Some cases have elaborated on the reasonable expectation of privacy test, recognizing, for example, a reasonable expectation against thermographic surveillance by a heat-sensing device set up across the street from one’s home.109Kyllo v. United States, 533 U.S. 27, 40 (2001). In other cases, the Court declined to recognize such an expectation against overhead surveillance of property by police aircraft flying at FAA-approved heights110See Florida v. Riley, 488 U.S. 445, 450–51 (1989); California v. Ciraolo, 476 U.S. 207, 215 (1986). or in discarded trash set out for collection.111California v. Greenwood, 486 U.S. 35, 37 (1988). Yet, in still other cases, the Court has held that the Katz reasonable expectations test has been “added to, not substituted for, the traditional property-based understanding of the Fourth Amendment” and therefore need not apply when “the government gains evidence by physically intruding on constitutionally protected areas.”112Florida v. Jardines, 569 U.S. 1, 11 (2013); United States v. Jones, 565 U.S. 400, 409 (2012). In Jardines, the Court relied upon common law trespass concepts to hold it to be a search when a police officer brought a drug-sniffing dog onto a suspect’s porch. Jardines, 569 U.S. at 8–9. The Court stated that a police officer simply entering a porch to knock on the resident’s door fell into the traditional “implied invitation” to enter such a space—the same invitation that renders it not a trespass for Girl Scouts or trick-or-treaters to do the same. Id. at 8. However, the Court found, “[t]he scope of a license—express or implied—is limited not only to a particular area but also to a specific purpose.” Id. at 9. An officer bringing a trained police dog onto a porch for the purposes of sniffing out narcotics, the Court held, violated the implied license and, thus, constituted a Fourth Amendment search. Id. at 11–12.

One rule of particular relevance to the context of familial DNA is the so-called “third-party” doctrine, which predated and survived Katz.113See Sarah Murphy, Watt Now?: Smart Meter Data Post-Carpenter, 61 B.C. L. Rev. 785, 794 (2020). See generally United States v. White, 401 U.S. 745 (1971). The third-party doctrine states that a person has no reasonable expectation of privacy in communications they share with a third party—that the law “permits the frustration of actual expectations of privacy by permitting authorities to use the testimony of those associates who for one reason or another have determined to turn to the police.”114White, 401 U.S. at 752. The third-party doctrine has excluded from the warrant requirement scenarios in which an associate of the defendant has voluntarily worn a wire, as well as transaction records the police obtain from the defendant’s bank and call records (so-called “pen” registers) they obtain from the defendant’s phone company.115Id. at 754; United States v. Miller, 424 U.S. 435, 443 (1976); Smith v. Maryland, 442 U.S. 735, 744 (1979). But see Ferguson v. City of Charleston, 532 U.S. 67, 85–86 (2001) (holding that it violated the Fourth Amendment for hospital staff to analyze urine samples they had obtained within the protections of doctor-patient privilege for the purposes of providing incriminating information to law enforcement).

Under both the property and privacy theories of the Fourth Amendment, courts have generally recognized the presumption that if police conduct does constitute a search, a warrant is required.116See Kit Kinports, The Origins and Legacy of the Fourth Amendment Reasonableness-Balancing Model, 71 Case W. L. Rev. 157, 157 (2020). However, the Supreme Court has also held that some searches that would otherwise be presumed to require a warrant supported by probable cause are nonetheless constitutional because “the touchstone of the Fourth Amendment is reasonableness.”117Florida v. Jimeno, 500 U.S. 248, 250 (1991). In such cases, the Court weighs the defendant’s privacy interests against competing government interests, which usually happens in cases involving either categorical exceptions to the Fourth Amendment or administrative searches.118See Kinports, supra note 116, at 177–81. The “reasonableness balancing” model of the Fourth Amendment has created categorical exceptions such as stop-and-frisks based only on reasonable suspicion,119Terry v. Ohio, 392 U.S. 1, 19–20 (1968). searches incident to arrest,120Chimel v. California, 395 U.S. 752, 768 (1969). and police uses of force in cases where the officer’s actions were reasonable based on the facts confronting them.121Graham v. Connor, 490 U.S. 386, 388, 395 (1989). Using such balancing, the Court has also created administrative exceptions for wholly suspicionless searches of parolees, airport security checkpoints, sobriety checkpoints, fire code and public safety inspections, among many others.122See Camara v. Municipal Court, 387 U.S. 523, 540 (1967); Samson v. California, 547 U.S. 843, 846 (2006); Mich. Dep’t of State Police v. Sitz, 496 U.S. 444, 447 (1990); United States v. Davis, 482 F.2d 893, 908 (9th Cir. 1973). For an argument that the common probation condition allowing suspicionless searches of probationers’ phones is due for Supreme Court consideration, see generally Daniel Yeager, Certain Certiorari: The Digital Privacy Rights of Probationers, 50 Conn. L. Rev. Online 1 (2017).

As investigative technology has developed at a seemingly geometric rate, however, the Court has struggled to address all seemingly invasive police behavior under the privacy and property tests—especially in light of the third-party doctrine.123See Paul Ohm, The Fourth Amendment in a World Without Privacy, 81 Miss. L.J. 1309, 1325–26 (2012); Stephen E. Henderson, The Timely Demise of the Fourth Amendment Third Party Doctrine, 96 Iowa L. Rev. Bull. 39, 39–40 (2011); Sherry F. Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 Stan. L. Rev. 119, 121 (2002). In United States v. Jones, the Court unanimously held that police engaged in a warrantless search by affixing a GPS tracking device to a suspect’s car to track its movements.124United States v. Jones, 565 U.S. 400, 404 (2012). While the majority opinion rested on trespass grounds—that “[t]he Government physically occupied private property for the purpose of obtaining information” by attaching the device,125Id. Justice Sotomayor’s concurrence suggested that, in the future, the digital age might make it “necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties.”126Id. at 417 (Sotomayor, J., concurring). The Court also distinguished between digital data and other types of searches in Riley v. California, which dealt with the search of a suspect’s cell phone incident to arrest.127Riley v. California, 573 U.S. 373 (2014). The Court concluded that “[c]ell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person,” due to the wealth of sensitive information they contain about a person’s browsing history, location, relationships, and so forth.128Id. at 393. It thus held that, absent an emergency, police require a warrant to search the contents of a phone otherwise properly seized incident to arrest.129Id. at 401–02.

The future that Justice Sotomayor alluded to in Jones seemed finally to arrive in 2018 with Carpenter v. United States, in which the Court made the biggest technology-reactive shift in Fourth Amendment doctrine since Katz.130Carpenter v. United States, 585 U.S. 296 (2018). Carpenter involved the 1994 Stored Communications Act (“SCA”), which authorized the Government to compel private companies to disclose telecommunication records when it “offers specific and articulable facts showing that there are reasonable grounds to believe” that the records “are relevant and material to an ongoing criminal investigation.”13118 U.S.C. § 2703(d). While the SCA required that a magistrate make this determination in order for the government to obtain a subpoena, it was on a reasonable suspicion standard rather than the probable cause necessary for a warrant.132By imposing a reasonable suspicion standard, the Stored Communication Act (“SCA”) was actually intended to make it more difficult for the government to access third-party electronic records than it would be if normal subpoena law applied. Orin Kerr, Does Carpenter Revolutionize the Law of Subpoenas?, Lawfare (June 26, 2018, 6:44 PM), https://www.lawfaremedia.org/article/does-carpenter-revolutionize-law-subpoenas [https://perma.cc/D5NU-6Q4J]. Prior to the SCA, telecom companies had only the narrow Fourth Amendment argument that complying with the subpoena would be unduly burdensome. Id.

In Carpenter, the government obtained subpoenas under the SCA for weeks’ worth of cell-site location information (“CSLI”) from the defendant’s cell phone providers.133Carpenter, 585 U.S. at 302. CSLI data consists of time-stamped records generated several times a minute when a user’s phone connects to a cell phone tower.134Id. at 301. While it does not provide as precise of geographic data as GPS, CSLI data from a subject’s phone over a substantial period of time

provides government analysts with a broad picture of that person’s movements.135Id. at 309.

The government argued that the subpoenas were constitutional under the third-party doctrine; Carpenter had voluntarily shared his location information with his carriers in the same manner a person does their call record or as a person shares their financial transactions with a bank.136Id. at 313. The Court rejected this argument, holding for the first time that an individual “maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI.”137Id. at 310. Importantly (and contrary to some pre-Jones precedent),138United States v. Knotts, 460 U.S. 276, 282 (1983). the Court held that there was no distinction for these purposes between public and private movements, even if a subject’s public movements would be visible to the naked eye of someone physically following them.139Carpenter, 585 U.S. at 313–14.

The Court based its rule on five factors specific to the technological context of CSLI data.140See Laura Hecht-Felella, Brennan Ctr. for Just., The Fourth Amendment in the Digital Age: How Carpenter Can Shape Privacy Protections for New Technologies 9–10 (2021) (distilling a five-factor framework for the privacy test from Carpenter). First, it noted that such data is comprehensive: it provides a record of movement that is “detailed” and “encyclopedic” and constitutes “near perfect surveillance.”141Carpenter, 585 U.S. at 309, 312. Second, it is intimate in the sense that a cell phone “faithfully follows its owner beyond public thoroughfares and into private residences, doctor’s offices, political headquarters, and other potentially revealing locales.”142Id. at 311. Third, it is inexpensive—especially compared to “traditional investigative tools” like the in-person surveillance approved in earlier third-party doctrine cases.143Id. Fourth, it is retrospective in the sense that it allows the government to go back in time and investigate anyone it wishes, without having to determine an investigative target in advance.144Id. at 312. And, fifth, it is functionally nearly involuntary, due to the fact that cell phones are “indispensable to participation in modern society.”145Id. at 315. Carpenter left several significant issues explicitly unresolved. First, its holding was based on the seven days of data actually requested from one of the cell phone providers, leaving open the question of whether a request for a shorter period of data would constitute a search. Id. at 310 n.3. Second, the Court stated it did not express a view on the question of “real-time CSLI” or “tower dumps,” in which law enforcement download information from all of the devices that connected to a particular cell phone tower during a particular interval. Id. at 316.

Some scholars have suggested that Riley and Carpenter adopt a “mosaic” theory of the Fourth Amendment—a concept the D.C. Circuit, the lower court in Jones, had originally imported from the national security context and relied on to exclude the GPS tracking data.146United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010). Under a mosaic theory, a Fourth Amendment search can arise based on police actions taken over time, even if no individual step taken in isolation would constitute a search.147See Orin S. Kerr, The Mosaic Theory of the Fourth Amendment, 111 Mich. L. Rev. 311, 313 (2012). Critics such as Orin Kerr argue that the mosaic theory suffers from problems of administrability and an overreliance on a subject’s probabilistic expectations of privacy, which is ill-suited to regulate electronic surveillance.148Id. at 346. In the wake of Carpenter, lower courts have been divided over whether to formally recognize the mosaic theory as a fundamental rule of the Fourth Amendment.149Compare United States v. Tuggle, 4 F.4th 505, 517 (7th Cir. 2021) (holding that long-term video surveillance of a suspect’s house using pole cameras does not violate his reasonable expectation of privacy and noting that lower courts are not bound by the mosaic theory and that many have disapproved it), with United States v. Moore-Bush, 381 F. Supp. 3d 139, 150 (D. Mass. 2019) (granting a defendant’s motion to suppress pole camera surveillance footage on the grounds that it allowed the government to “piece together intimate details of [the defendant’s] life” and noting that the mosaic theory had effectively been adopted by the Supreme Court).

These new iterations of the reasonable expectation of privacy test have sparked broader debate about Katz itself. Many critics have advocated for replacing the Katz test entirely due to its confusing and cyclical nature.150See, e.g., William Baude & James Y. Stern, The Positive Law Model of the Fourth Amendment, 129 Harv. L. Rev. 1821, 1825–26 (2016); Richard M. Re, Fourth Amendment Fairness, 116 Mich. L. Rev. 1409, 1447 (2018); Michael J. Zydney Mannheimer, The Contingent Fourth Amendment, 64 Emory L.J. 1229, 1284–87 (2015). Others have argued that modern Fourth Amendment case law is actually driven by consistent principles which can now be applied to evolving technology. Matthew Tokson, for example, argues that the expectation of privacy turns on the intimacy of the area searched, the amount of information sought, and the cost of the investigation.151See, e.g., Matthew Tokson, The Emerging Principles of Fourth Amendment Privacy, 88 Geo. Wash. L. Rev. 1, 51–53 (2020) (applying these principles to novel technology and concluding that the Supreme Court would likely find drone surveillance footage and data from smart home devices to implicate the Fourth Amendment but real-time use of facial recognition technology in public places not to). These factors, relevant in Carpenter, are worth bearing in mind while considering how courts apply the recent Fourth Amendment precedent to DNA evidence.

B.  DNA and the Fourth Amendment

Given that traditional forensic DNA technology is nearly thirty years old, it is unsurprising that much of the Fourth Amendment case law concerning it long predates Carpenter. As discussed above, early use of forensic DNA relied heavily on databases assembled by law enforcement from perpetrators and suspects who were already lawfully in custody. Broadly speaking, “intrusions into the human body” such as blood draws constitute Fourth Amendment searches.152Schmerber v. California, 384 U.S. 757, 770 (1966). Yet in Maryland v. King, the Supreme Court rejected a Fourth Amendment challenge to the Maryland DNA Collection Act (“MDCA”), which allows state and local law enforcement to collect DNA samples from individuals arrested for a crime of violence, an attempted crime of violence, burglary, or attempted burglary.153Maryland v. King, 569 U.S. 435, 443, 465–66 (2013).

In King, the Court recognized that the intrusion of the DNA swabbing was a search and engaged in a balancing test to determine whether it was reasonable as an administrative exception to the Fourth Amendment (and therefore not requiring probable cause of a crime likely to yield DNA evidence). Specifically, the Court balanced the defendant’s privacy interest against “the need for law enforcement officers in a safe and accurate way to process and identify the persons and possessions they must take into custody.”154Id. at 449. Noting that a search incident to arrest is a long-standing exception to the warrant requirement, the Court, nevertheless, did not invoke the doctrine directly (likely because it limits a search to what is necessary to protect officer safety, prevent escape, and preserve evidence).155Chimel v. California, 395 U.S. 752, 762–63 (1969). Instead, the Court found that “[w]hen probable cause exists to remove an individual from the normal channels of society and hold him in legal custody, DNA identification plays a critical role in serving those interests.”156King, 569 U.S. at 450; see also United States v. Buller, No. 17-CR-40105, 2018 U.S. Dist. LEXIS 2202, at *14 (D.S.D. Jan. 5, 2018) (applying King to uphold an administrative DNA swab, authorized by federal law, of a misdemeanor arrestee and noting that “King . . . did not explicitly limit its holding only to serious felonies”). Finding the intrusion on the defendant’s privacy through the physical act of swabbing for DNA to be minimal, the Court upheld the MDCA. In dissent, Justice Scalia analogized the collection of DNA from arrestees for whom there was no probable cause of a crime of violence to the general warrants of the Colonial era.157King, 569 U.S. at 466 (Scalia, J., dissenting).

King left open many questions, such as whether DNA identification analysis of a blood sample originally drawn for a non-identification purpose (such as blood-alcohol analysis) constitutes a search.158See State v. Mitcham, 535 P.3d 948, 953 (Ariz. Ct. App. 2023). Lower courts have found some limits to the government’s Fourth Amendment authority to perform DNA analysis on samples they’ve obtained from non-arrest contexts. For example, the Fourth Circuit has held that King did “not give a law enforcement agency carte blanche to perform DNA extraction and analysis derived from clothing lawfully obtained from the victim of a crime in relation to the investigation of other crimes.”159United States v. Davis, 690 F.3d 226, 246 (4th Cir. 2012) (emphasis added). Similarly, an Arizona court has held that a defendant’s consent to a blood draw for testing for intoxicants did not authorize the police to create a DNA profile from the blood cells to investigate other offenses.160Mitcham, 535 P.3d at 957. The court, however, applied the fruit of the poisonous tree doctrine to reverse the trial court’s suppression order, on the grounds that the police had probable cause to arrest the defendant for murder even without the DNA profile and, thus, would have obtained a DNA profile anyway due to Arizona’s statute authorizing the DNA collection from suspects arrested for violent crimes. Id. at 958–59; see also Ariz. Rev. Stat. Ann. § 13-610(K) (1956). Federal district courts have denied government requests to conduct purported administrative DNA swabs for purposes other than the identification and safety rationales stated in King.161See United States v. Daughtridge, No. 16-CR-107-1H, 2018 U.S. Dist. LEXIS 153401, at *3–5 (E.D.N.C. Sept. 10, 2018) (rejecting a request, unsupported by cause, for the purposes of “securing evidence”). Others, however, have allowed such explicitly evidence-gathering searches on a showing of reasonable suspicion short of probable cause.162See United States v. Hayes, No. 15-CR-29, 2017 U.S. Dist. LEXIS 61945, at *4 (W.D.N.Y. Apr. 24, 2017).

While most of the existing DNA-related precedent involves clear police intrusions on the person of the subject for the purpose of collecting samples, and thus clearly trigger Fourth Amendment concerns under either a privacy or trespass conception, the use of consumer DNA databases do not involve bodily invasion. Furthermore, courts generally do not recognize a property interest in one’s DNA. In Association for Molecular Pathology v. Myriad Genetics, the Supreme Court held that isolated, naturally occurring DNA sequences could not be patented because isolating a gene is not an “act of invention.”163Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 569 U.S. 576, 591 (2013). More directly on point, courts have traditionally declined to recognize a property right in one’s own genetic materials that is sufficient to support a conversion action in cases where hospitals have utilized patients’ excised cells.164See Moore v. Regents of the Univ. of Cal., 793 P.2d 479, 489–90 (Cal. 1990) (dismissing a splenectomy patient’s conversion action after the treating physician collected and commercialized his tissue); Greenberg v. Mia. Child.’s Hosp. Rsch. Inst., Inc., 264 F. Supp. 2d 1064, 1074–76 (S.D. Fla. 2003) (dismissing donors’ conversion claims against a hospital who used their voluntarily donated genetic information in research which it subsequently patented and enforced restrictively). Scholars argue that recognizing property rights in DNA would raise a host of problems ranging from the conceptual165See I. Glenn Cohen, The Right Not to Be a Genetic Parent?, 81 S. Cal. L. Rev. 1115, 1151 (2008) (demonstrating that Lockean bases for property rights are inapt in the case of genetic information). to the dignitary166Sonia M. Suter, Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic Privacy, 72 Geo. Wash. L. Rev. 737, 800 (2004) (arguing that it “diminishes the personal value of our genetic information to describe it as a commodity”). to the policy-based.167Jorge L. Contreras, Direct-to-Consumer Genomics and Personal Health Data, in Consumer Genetic Technologies: Ethical and Legal Considerations 51, 64 (I. Glenn Cohen et al. eds., 2021) (arguing that the propertization of genetic data “could have severe consequences for biomedical research, public health, and the health care system well beyond the comparatively small DTC testing industry”). Critics of the status quo argue that the rise of consumer genetic companies, with the accompanying privacy concerns, necessitate property-based tools such as conversion actions to ensure good behavior and privacy practices.168See Jessica L. Roberts, In Favor of an Action for Genetic Conversion, in Consumer Genetic Technologies, supra note 167, at 39, 50. At least a couple of courts have recently proved receptive to privacy-based conversion claims related to genetic information.169Id. at 49–50 (citing Peerenboom v. Perlmutter, No. 2013-CA-015257, 2017 Fla. Cir. LEXIS 14957, at *10 (Jan. 23, 2017); Cole v. Gene by Gene, Ltd., No. 14-cv-00004, 2017 U.S. Dist. LEXIS 10176, at *5 (D. Alaska June 30, 2017)). Five states—Alaska, Colorado, Georgia, Louisiana, and Florida—have current legislation granting people ownership of their genetic information.170See Contreras, supra note 167, at 51. Nonetheless, after Carpenter, the privacy theory of the Fourth Amendment provides a stronger foundation for the argument that familial DNA database searches trigger the Fourth Amendment.

C.  The Case for Genetic Privacy post-Carpenter

The proliferating concerns over genetic privacy sparked by the rise of DTC genetics companies have been particularly salient in the law enforcement context. This Section will review arguments that law enforcement use of DTC genetic databases generally and for familial DNA searches specifically raise Fourth Amendment concerns even when third-party users consent to law enforcement access.171This Article focuses its analysis on familial searches of DTC databases in which the original user has affirmatively consented to law enforcement searches. A situation with no such consent would give the initial user a potential Fourth Amendment claim after Carpenter’s weakening of the third-party doctrine, though, as this Section will argue, an indirectly identified family member should lack standing to raise it. See Minnesota v. Carter, 525 U.S. 83, 91 (1998) (holding that third parties lack standing to challenge the constitutional violations of others). A situation without such explicit consent but where a website’s Terms of Service stipulated that information was subject to search by law enforcement raises a separate question. After Carpenter, it is, again, unclear that the third-party doctrine alone would automatically bar such a claim based merely on use of the database, though the Terms of Service would be relevant to the question of whether the user had a reasonable expectation of privacy in the information they shared there. Many courts have held that agreeing to a website’s terms of service constitutes a full-blown waiver of Fourth Amendment rights against government searches. See, e.g., Commonwealth v. Dunkins, 229 A.3d 622, 629–30 (Pa. Super. Ct. 2020), allocatur granted, 237 A.3d 415 (Pa. 2020) (per curiam). As Orin Kerr argues, however, such decisions are problematic because Terms of Service can define relationships only between private parties, not between a private party and the government. See Orin S. Kerr, Terms of Service and Fourth Amendment Rights, 172 U. Pa. L. Rev. 287, 287–88 (2024). It will also survey the state legislative responses to these concerns.

1.  The Scholarly Debate

The scholarly concern over privacy issues raised by forensic DNA generally and familial DNA specifically has been widespread with the weight of commentary suggesting that warrantless familial DNA searches explicitly violate Carpenter or should at least be otherwise prohibited.172See, e.g., George M. Dery III, Can a Distant Relative Allow the Government Access to Your DNA?: The Fourth Amendment Implications of Law Enforcement’s Genealogical Search for the Golden State Killer and Other Genetic Genealogy Investigations, 10 Hastings Sci. & Tech. L.J. 103, 121–28 (2019) (arguing that Carpenter applies to familial DNA); Claire Mena, Another Katz Moment?: Privacy, Property, and a DNA Database, 55 U. Mich. J.L. Reform 729, 753 (2022) (arguing that Maryland v. King should be reevaluated in light of evolving DNA technology); Karen J. Kukla, Direct to Consumer or Direct to All: Home DNA Tests and Lack of Privacy Regulations in the United States, 13 IP Theory 31, 53–54 (2023) (arguing for federal privacy regulations similar to those of the European Union); Jordan Mason, No Longer Innocent Until Proven Guilty: How Ohio Violates the Fourth Amendment Through Familial DNA Searches of Felony Arrestees, 69 Clev. St. L. Rev. 185, 205–09 (2020) (arguing that Ohio’s routine familial DNA searches of arrestees violate Maryland v. King because they do more than simply “identify” a person but reveal information about his blood relatives and because the governmental interests identified in King relate only to the arrestee himself, not to family); Emma Kenny-Pessia, Ditching “DNA on Demand”: A Harms-Centered Approach to Safeguarding Privacy Interests Against DNA Collection and Use by Law Enforcement, 101 Wash. U. L. Rev. 627, 641–56 (2023) (identifying the privacy harms caused by familial DNA collection and proposing legislation to address them); Alexis B. Hill, Note, I Just Took a DNA Test, Turns Out My Relative’s a Murder Suspect: Restoring Fourth Amendment Balance to Direct-to-Consumer DNA Testing Companies, 89 Geo. Wash. L. Rev. 1046, 1046–47 (2021) (arguing that genetic testing companies should be required to include an option for consumers to opt out of law enforcement access that details the consequences of remaining in the law enforcement pool); Caroline Spiers, Note, Keeping It in the Family: Direct-to-Consumer Genetic Testing and the Fourth Amendment, 59 Hous. L. Rev. 1205, 1205 (2022) (arguing that the third-party doctrine should be abolished entirely or else not applied to DTC genetic testing). But see Teneille R. Brown, Why We Fear Genetic Informants: Using Genetic Genealogy to Catch Serial Killers, 21 Colum. Sci. & Tech. L. Rev. 1, 1–2 (2020). Scholars have sought to delineate the nature of the privacy harms suffered by persons who are genetically identified through familial searches.173See Kenny-Pessia, supra note 172, at 641–53. Some argue that privacy violations implicate autonomy interests and result in “people’s inability to make choices in accordance with their preferences,” a consequence with additional negative emotional effects.174Danielle Keats Citron & Daniel J. Solove, Privacy Harms, 102 B.U. L. Rev. 793, 849 (2022). Furthermore, because genetic surveillance can be both large-scale and untethered to suspicion, it can also chill the exercise of civil liberties and create the risk of discrimination and selective enforcement.175Neil M. Richards, The Dangers of Surveillance, 126 Harv. L. Rev. 1934, 1935 (2013); see also David Gray & Danielle Citron, The Right to Quantitative Privacy, 98 Minn. L. Rev. 62, 72 (2013) (arguing that, under a mosaic theory, the sheer quantity of data susceptible of aggregation in searchable databases may violate privacy even when a smaller amount of the same sort of information might not).

Natalie Ram, one of the leading scholars on genetic privacy, argues that, based on the factors the Court identified in Carpenter, courts should recognize a Fourth Amendment reasonable expectation of privacy in one’s own DNA, even when stored in a third-party database.176Natalie Ram, Genetic Privacy After Carpenter, 105 Va. L. Rev. 1357, 1424 (2019). On the question of intimacy, Ram notes that genetic information is “deeply revealing” as well as “highly detailed and precise about the individual information it discloses.”177Id. at 1386–87. As to comprehensiveness, she notes that the sudden proliferation of consumer genetic databases and the use of genetic information in medical records—while not yet as widespread as cell phone usage—suggests that genetic analysis is a substantially growing part of users’ lives.178Id. at 1387–88. As to expense, Ram points out that the use of genetic data in investigations is cheap, easy, and efficient, similar to CSLI data.179Id. at 1388. Finally, as to voluntariness, she points again to the sudden proliferation of genetic databases to argue that their use “may be approaching an ‘inescapable and automatic nature’ ” in the way that cell phone use once reached fairly quickly.180Id. at 1389. She concludes that these factors all urge that there be a reasonable expectation of privacy in one’s own genetic information, even when voluntarily shared with third-party databases. Furthermore, she notes that there is a much stronger property interest in one’s own genetic information than in one’s location data—a fact seemingly supported by the user agreements of genetic sites which emphasize the user’s “ownership” of their own data, as well as the statutes in the five states that recognize it.181Id. at 1390.

With respect to familial DNA, the argument, of course, becomes more complicated due to the fact that an individual’s genetic information could be accessed through a third party voluntarily sharing their information—not only with the database itself but also through “opting in” or choosing not to “opt out” of sharing with law enforcement. Ram argues that in such cases, the target of the investigation who is indirectly identified through a family member’s DNA cannot be said to have voluntarily consented to the search, due to the fact that: (1) genetic relatedness is intrinsically involuntary and (2) people rarely have control over the decision-making of even near relations, much less the distant relations through which investigative matches often occur.182Ram, supra note 15, at 213–14. She thus concludes that, while a law enforcement search of a consumer database for a direct match, voluntarily shared, may be appropriate, searches for indirect matches through third-party relations is not.183Id. at 225.

2.  Legislative Responses

In the U.S., sixteen states have explicitly allowed law enforcement to conduct familial DNA searches, though often with policies limiting the usage to serious crimes or cases in which the public safety is at risk.184Ariz. Dep’t of Pub. Safety Sci. Analysis Bureau, Familial DNA Analysis, https://www.azdps.gov/sites/default/files/2023-08/Familial_DNA_Analysis_Flyer_3.pdf [https://perma.cc/YV9X-PEG8] (listing Arizona, California, Colorado, Florida, Kentucky, Louisiana, Michigan, Minnesota, New York, North Carolina, Ohio, South Dakota, Texas, Virginia, Wisconsin, and Wyoming); Utah Code Ann. § 53-10-403.7 (LexisNexis 2024); see also Alexandra Nieto, Familial Searching: How Implementing Minimum Safeguards Ensures Constitutionally-Permissible Use of This Powerful Investigative Tool, 40 Cardozo L. Rev. 1765, 1771–76 (2019) (summarizing various state law enforcement policies on familial DNA searches); In re Stevens, 227 N.E.3d 1064, 1070–71 (N.Y. 2023) (upholding the authority of New York’s Commission on Forensic Sciences to promulgate regulations allowing for familial DNA searches by law enforcement). Other states, however, have passed statutes greatly limiting such searches. The District of Columbia and Maryland bar familial DNA searches of the states’ own DNA databases.185D.C. Code § 22-4151(b) (2025); Md. Code Ann., Pub. Safety § 2-506(d) (West 2024). As to consumer databases, Maryland also has the most detailed statute to date, requiring judicial authorization based on a sworn affidavit by law enforcement with approval of the relevant prosecutor.186Md. Code Ann., Crim. Proc. § 17-102 (West 2024). Familial DNA searches will only be authorized when the crime is murder, rape, a felony sexual offense, or an act presenting “a substantial and ongoing threat to public safety or national security.”187Id. Furthermore, law enforcement must first attempt to identify a suspect through CODIS, as well as to first pursue “reasonable investigative leads” that ultimately fail to identify them.188Id. The law also limits law enforcement to databases that provide explicit notice to users that law enforcement may use it and that “seeks acknowledgement and express consent from its service users” regarding this possibility.189Id.

Montana’s statute, while more vaguely drafted, appears to severely limit familial DNA searches. It provides that “[a] government entity may not obtain familial DNA search results or search results from partial matching from the [state-maintained] DNA identification index or a consumer DNA database without a search warrant issued by a court on a finding of probable cause.”190Mont. Code Ann. § 44-6-104 (2023). It has another provision requiring the government to obtain a warrant even for direct searches of consumer database users, unless “the consumer whose information is sought previously waived the consumer’s right to privacy.”191Id. If Idaho had such a statute during Christopher Tapp’s post-conviction proceedings, he would likely remain in prison, as no probable cause would have existed at the time for the Idaho Falls Police to have assisted his family by searching for the DNA of the neighbor who was ultimately identified. In many cases, police could establish probable cause that the owner of the unidentified sample committed a crime (as, for example, when semen is found in the body of a rape victim). At other times, such as when there are large numbers of DNA samples found at a scene, this might be impossible. Furthermore, probable cause must exist for the specific area to be searched.192See California v. Acevedo, 500 U.S. 565, 580 (1991). It would often be a preventative burden for police to have to establish probable cause that relatives of the perpetrator have created a searchable account with a particular ancestry site, which would be necessary to establish probable cause that the database contained evidence of a crime.

D.  The Fourth Amendment Argument Against Familial DNA Searches is Weak

Any attempt to evaluate the strength of the Fourth Amendment argument against law enforcement use of familial DNA is necessarily complicated by the current instability of Fourth Amendment doctrine generally. Nonetheless, this Section will show that, whichever Fourth Amendment theory one subscribes to, the argument is fairly weak.

With respect to DTC databases in which users have opted in to sharing with law enforcement, the relevant rule is that consensual searches do not require warrants or any degree of suspicion to be reasonable under the Fourth Amendment.193See generally Amos v. United States, 255 U.S. 313 (1921); Schneckloth v. Bustamonte, 412 U.S. 218 (1973). It is therefore clear that if Person A submits their DNA sample to MyFamilyTree, opts in to law enforcement searches, and is subsequently identified as a match to a crime scene sample, no constitutional issues arise. If the DNA of said Person A leads the investigators indirectly to their Grandpa B, however, Grandpa may argue—with Ram and other scholars—that his privacy rights were violated because he did not consent to the search that led to his DNA. One possible response is that, at a physical level, it was not Grandpa’s genetic sample that was searched. In Fourth Amendment law generally, a defendant does not have standing to object to the violation of a third party’s constitutional rights.194See Rakas v. Illinois, 439 U.S. 128, 133 (1978). If only Person A was searched, Grandpa has no standing to object. This same argument would apply to familial searches of lawfully collected samples in police databases.

Critics argue, however, that the pervasiveness of technology should change existing Fourth Amendment principles and that there is functional identity between one person’s DNA and their family member’s, which should change our understanding of standing in these cases. As discussed above, Ram makes a good argument that genetic data obtained through familial searches meets the Carpenter factors insofar as it is intimate, comprehensive, and inexpensive, as well as involuntary from the perspective of the family member ultimately identified.195Ram, supra note 176, at 1386–90. Yet there are some compelling counterarguments. As to the intimacy of the data, Jasper Monroe-Jones notes that—unlike location or cell phone data—DNA “cannot reveal anything about a person’s actual actions, conduct, or character” but only, if anything, predisposition to various traits or diseases.196Ford-Monroe, supra note 86, at 1733. This point is even stronger when coupled with the fact that law enforcement officials who access consumer DNA sites only access the same identification information as other users, which does not include intimate information such as propensity for physical or psychological diseases.197See Guerrini et al., supra note 70, at 10. While it would be theoretically possible for law enforcement to reconstruct such intimate information from the information they can obtain, states could pass laws specifically prohibiting this practice, which the U.S. Department of Justice’s current Interim Policy on Forensic Genetic Genealogy already does.198Id. In short, a DNA match in a DTC database only provides one significant piece of information: the fact that a person or their family member was present at the place from which a sample was recovered.

Furthermore, critics may overstate the “inexpensiveness” of familial DNA searches—while putting a DNA sample into a consumer database may be easy, the process of building out family trees based on genetic relationships requires an expert in genetic genealogy and may take months.199Id. at 15. For now, at least, this process is not realistically comparable to looking at a map of cell tower pings. That said, due to the need for Fourth Amendment doctrine to be durable in the face of evolving technology, it should still be assumed that this technology may become less expensive in the future.

With the specific Carpenter factors only partially apposite to the problem of familial DNA, it is worth recurring to the test Carpenter attempts to apply: reasonable expectation of privacy. While it seems clear that Grandpa B cannot consent to Person A’s voluntary release of their genetic material to law enforcement, can it be said that he has a reasonable expectation of privacy in another person’s body? No authority recognizes such an expectation, which would need to be strong enough to overcome standing principles.200See State v. Hartman, 534 P.3d 423, 427 (Wash. Ct. App. 2023) (holding that the defendant did not have standing to challenge police use of familial DNA because there was no privacy interest in commonly held DNA that a relative voluntarily uploaded to a private database); People v. Williams, 178 N.Y.S.3d 420, 422 (Sup. Ct. 2022) (denying a motion to suppress evidence from a familial DNA search of CODIS because the defendant did not “establish that he was the victim of an unlawful search”); see also Ford-Monroe, supra note 86, at 1734; Brown, supra note 172, at 29; Antony Barone Kolenc, “23 and Plea”: Limiting Police Use of Genealogy Sites After Carpenter v. United States, 122 W. Va. L. Rev. 53, 100–01 (2019). It is a weak argument that, even if there is no reasonable expectation of privacy in personal genetic material left in another person’s bathroom, there should be a reasonable expectation of privacy in another person’s own genetic material that happens partially to match one’s own. As critics of the Katz test’s inherent circularity might note, with the increased public awareness of DNA science, such an expectation of privacy is even less reasonable than it might have been in, say, 1985.201See João Marinotti, Escaping Circularity: The Fourth Amendment and Property Law, 81 Md. L. Rev. 641, 649–53 (2022).

In addition, the preceding sections have made it clear that trespass-based theories of the Fourth Amendment provide even less traction for constitutional objections to familial DNA searches than does the Katz test. Clearly, a search of Person A’s sample (or the data it generates) is not a search of Grandpa B’s “person,” and most existing authorities hold that neither party has a property interest in the genetic sequence itself. Indeed, Greenberg v. Miami Children’s Hospital arose in Florida—one of only five states with statutes that recognize some form of property interest in genetic test results—and the court nonetheless held that the statute did not create a genetic property interest sufficient for establishing a conversion action.202Greenberg v. Mia. Child.’s Hosp. Rsch. Inst., Inc., 264 F. Supp. 2d 1064, 1075–76 (S.D. Fla. 2003). That said, as Jessica Roberts notes, at least a couple of courts have very recently shown receptiveness to conversion claims based on privacy violations involving a plaintiff’s own genetic material.203Roberts, supra note 168, at 44–45.

At the end of the day, there are colorable arguments on both sides of the question. As Ram argues, there is a mismatch in consent between the DTC user and the familial relation ultimately identified. Yet that mismatch complements another one: the mismatch in the sensitivity of the information consensually revealed about the initial user (including their immediately accessible name and contact information) and the information about the ultimately identified, distant relation (the match to a specific crime scene sample, established only after extensive analysis). Given the unique accuracy value of what such a search would reveal—near-certain presence at a crime scene—one could argue for a wholesale DNA carveout to the Fourth Amendment. In such cases, one might say that the crime-solving interests of law enforcement are particularly high relative to the interests of the suspect (privacy in the specific fact of having been at a crime scene). Entertaining such an argument, however, would require engaging in higher-level debates about the nature of the Fourth Amendment generally, which is beyond the scope of this paper.

The next Part will focus instead on one specific countervailing interest: the liberty interest of the falsely accused who could be exonerated through the availability of familial DNA searches to law enforcement. For constitutional purposes, the Due Process rights of this party must be weighed against the Fourth Amendment rights of a third party, and they must be weighed particularly heavily against any sub-constitutional privacy justifications for statutory restrictions on familial DNA searching.

III.  The Due Process Rights of the Innocent Suspect

This Part will argue that a falsely accused suspect has a colorable due process right in the availability of familial DNA testing. If a legislature or court were to impose a ban or probable cause requirement that could effectively preclude law enforcement from using familial DNA to identify unknown third-party suspects, it would impinge on already narrow, yet still cognizable, due process rights designed to protect innocents. The same would be true of any statute preventing private parties, including defendants, from conducting such searches. These rights derive from three sources, which this section will consider in turn: the Compulsory Process Clause, the Due Process right to exculpatory evidence, and the Due Process right to post-conviction relief procedures.

A.  The Compulsory Process Clause

The Sixth Amendment guarantees a criminal defendant, among other trial rights, the right “to have compulsory process for obtaining witnesses in his favor.”204U.S. Const. amend. VI. Unlike other Sixth Amendment rights, the Compulsory Process Clause is undertheorized and often overlooked by litigators.205Janet C. Hoeffel, The Sixth Amendment’s Lost Clause: Unearthing Compulsory Process, 2002 Wis. L. Rev. 1275, 1276 (2002). The case law on the Clause has been contradictory and confusing, alternating between the rule that it stands for the “accused’s ‘right to present a defense’ ” and the idea that it should be subordinate to statutory rules of evidence, such as the rules governing the admissibility of expert testimony, which apply to all litigants alike.206Id. (citing Washington v. Texas, 388 U.S. 14, 19 (1967)). It is also limited by the limits of the judicial power itself, which does not extend to the “executive” functions of the police and the prosecution.207See discussion infra Part III.A.3.

The constitutional idea of compulsory process has its origins in the burgeoning trial rights Parliament enacted in the late seventeenth and early eighteenth centuries, specifically for defendants accused of treason.208Robert N. Clinton, The Right to Present a Defense: An Emergent Constitutional Guarantee in Criminal Trials, 9 Ind. L. Rev. 711, 720 (1976). These included the right to notice of charges, the right to counsel, the right to produce witnesses under oath, and the right to compel attendance of involuntary witnesses. Id. Eventually Parliament extended the right to have witnesses give sworn testimony to all felony defendants, but there remained a gap between the rights of treason defendants and those in other cases. Hoeffel, supra note 205, at 1281. Trial rights in the American colonies initially paralleled and eventually surpassed their British counterparts in scope.209See Clinton, supra note 208, at 720. Pennsylvania recognized the most expansive rights; its Charter of Privileges, authored by William Penn, provided that “all criminals shall have the same Privileges of Witnesses and Council as their Prosecutors.”210Hoeffel, supra note 205, at 1281–82 (citing Pennsylvania Charter of Privileges § 5 (1701), reprinted in 1 Bernard Schwartz The Bill of Rights: A Documentary History 170–73 (1971)). At the time of the Founding, defendants’ trial rights within an adversary system were seen as a means of offsetting the power of the government.211Id. at 1282. Importantly, trial rights also protect truth-generation, and historical commentators emphasize their function of ensuring that innocent defendants are not convicted.212See William Blackstone, Commentaries on the Laws of England: Book the Fourth 208 (1769) (“It is better that ten guilty persons escape than that one innocent suffer.”); see also Akhil Reed Amar, The Future of Constitutional Criminal Procedure, 33 Am. Crim. L. Rev. 1123, 1132 (1996) (“Truth and accuracy are vital values. A procedural system that cannot sort the innocent from the guilty will confound any set of substantive laws, however just. . . . A Constitution proclaimed in the name of We the People should be rooted in enduring values that Americans can recognize as our values. Truth and the protection of innocence are such values.”); Daniel Epps, The Consequences of Error in Criminal Justice, 128 Harv. L. Rev. 1065, 1081–87 (2015) (surveying the impact of Blackstone’s principle).

  1.  The Subpoena Power

At the time the Bill of Rights was drafted, nine state constitutions included some sort of right for criminal defendants to call witnesses but only two, Massachusetts and New Hampshire, included the subpoena power.213Stephen Saltzburg, Compulsory Process Clause, Heritage Found., https://www.heritage.org/constitution/#!/amendments/6/essays/157/compulsory-process-clause [https://perma.cc/RS4F-FBW7]. Nonetheless, Congress adopted Madison’s draft language for the Sixth Amendment, including the subpoena power, with no discussion.214Id. While the Supreme Court would not formally consider the scope of the Compulsory Process Clause until the twentieth century, Chief Justice John Marshall, sitting as trial judge in the 1807 treason trial of Aaron Burr, would have the occasion to demonstrate his own understanding.215Id. Marshall approved a pre-indictment request for a subpoena of documents in the possession of President Thomas Jefferson without requiring the defense to pre-determine which ones might be material at trial.216Id.

The access to subpoenas of third-party witnesses and documents formally granted to most criminal defendants by state and federal rules of criminal procedure is notably narrower than what Justice Marshall understood compulsory process to require.217The Supreme Court has held that the Compulsory Process Clause provides fewer rights in discovery against the government than does the Due Process Clause under the Brady doctrine, discussed in the next Section. Pennsylvania v. Ritchie, 480 U.S. 39, 56 (1987). Thus, this Section focuses its analysis on subpoenas of third-party witnesses and evidence held by third parties. To avail themselves of the court’s subpoena power under Federal Rule of Criminal Procedure 17(c), a defendant must show that the evidence sought has “specificity,” “relevancy,” and “admissibility.”218United States v. Nixon, 418 U.S. 683, 700 (1974). A minority of circuits have followed Justice Marshall and held that the admissibility test requires only that evidence be potentially admissible at trial under the rules of evidence.219See generally In re Irving, 600 F.2d 1027 (2d Cir. 1979); United States v. Silverman, 745 F.2d 1386 (11th Cir. 1984). A majority, however, have applied a strict admissibility test, which requires a defendant to establish that the items sought are actually admissible before a subpoena will be enforced.220See United States v. Rand, 835 F.3d 451, 463 (4th Cir. 2016); United States v. Hang, 75 F.3d 1275, 1283 (8th Cir. 1996). See generally Thor v. United States, 574 F.2d 215 (5th Cir. 1978); United States v. Arditti, 955 F.2d 331 (5th Cir. 1992); United States v. Cuthbertson, 651 F.2d 189 (3d Cir. 1981); United States v. Fields, 663 F.2d 880 (9th Cir. 1981). Many states have similarly strict requirements.221See, e.g., People v. Kozlowski, 898 N.E.2d 891, 902 (N.Y. 2008) (requiring “a good faith factual predicate sufficient . . . to draw an inference that specifically identified materials are reasonably likely to contain information that has the potential to be both relevant and exculpatory”).

While proponents of the strict admissibility requirement often describe it as necessary to prevent a defendant from going on a “fishing expedition,”222See Bowman Dairy Co. v. United States, 341 U.S. 214, 219–21 (1951). critics point out that it foils the purpose of the Compulsory Process Clause.223Ken Miller, Focusing on a Subpoenaed Item’s Potential Evidentiary Use (As Nixon Intended) Will Permit Rule 17(c) Subpoenas to Promote Fair Trials, Fed. Law., Jan./Feb. 2018, at 25, 27. The defendant may never have seen the evidence sought and therefore be unable to explain how it is admissible, and in many cases, inadmissible evidence may be necessary to obtaining other admissible, exculpatory evidence.224Id. at 25. The rule in force in a given jurisdiction would therefore dictate whether, in a case where unidentified third-party DNA is recovered at a crime scene, the defendant could avail themself of the subpoena power to seek familial matches in a consumer database. In most cases, it would be impossible to tell in advance whether any matches would exist at all. If they did, they would be more likely to lead to relevant evidence after further testing, rather than be admissible in and of themselves. Regardless, even in a jurisdiction with a potential admissibility rule, statutes limiting familial DNA searches could fully thwart defendants’ right to compulsory process for securing evidence. For example, Maryland’s rule prohibits any “person” from conducting a familial search of the state DNA database, which would apply to defendants as well as state actors.225       Md. Code Ann., Pub. Safety § 2-506(d) (West 2024).

  1. The Right to Present a Defense and its State-Rule-Based Limitations

Another contested question regarding the Compulsory Process Clause is whether, beyond the right to subpoena witnesses, it gives defendants affirmative rights to put witnesses and evidence on the stand. If so, this would be a colorable basis for arguing that a defendant has a constitutional right to present familial DNA evidence—superior to any state-law prohibitions regulating DNA and at least equal to the Fourth Amendment rights of the identified parties. In 1967, the Supreme Court considered this question for the first time in Washington v. Texas, when it considered the constitutionality of two Texas statutes preventing a criminal defendant from offering the testimony of a person charged or convicted as a co-conspirator for the charged crime.226Washington v. Texas, 388 U.S. 14, 16 (1967). The Court first held that the compulsory process right is so fundamental to a fair trial that it is incorporated against the states by the Due Process Clause of the Fourteenth Amendment.227Id. at 17–19. It then concluded that it includes the right to “present a defense” to the jury:

The right to offer the testimony of witnesses, and to compel their attendance, if necessary, is in plain terms the right to present a defense, the right to present the defendant’s version of the facts as well as the prosecution’s to the jury so it may decide where the truth lies. Just as an accused has the right to confront the prosecution’s witnesses for the purpose of challenging their testimony, he has the right to present his own witnesses to establish a defense. This right is a fundamental element of due process of law.228Id. at 19 (emphasis added).

The Washington Court’s test for whether a state evidentiary rule violates this right is whether it is “arbitrary,” holding, in this case, that Texas “arbitrarily denied [the defendant] the right to put on the stand a witness who was physically and mentally capable of testifying to events that he had personally observed, and whose testimony would have been relevant and material to the defense.”229Id. at 23. In so doing, the Court noted that the Texas laws had deep common law roots in a rule that once totally barred defense witnesses, which was abolished by the Sixth Amendment but lived on in the form of various restrictions on the testimony of co-defendants.230Id. at 20–22.

 Washington would be the first of three cases in which the Supreme Court held that the Compulsory Process Clause gave the defendant a broad right to present evidence that is “relevant and material” to telling their side of the story, over state rules that are “arbitrary or disproportionate” to their purpose.231Rock v. Arkansas, 483 U.S. 44, 55–56 (1987). The second Supreme Court case in this line came in 1986 with Crane v. Kentucky, which reversed a trial court’s ruling that a defendant could not testify about alleged police coercion around his confession. Crane v. Kentucky, 476 U.S. 683, 691–92 (1986). The trial court had held that the issue of voluntariness had already been litigated during the defendant’s failed motion to suppress the confession. Id. at 686. While explicitly withholding comment on the strengths or merits of the defendant’s proffered testimony, the Court found that the defendant’s constitutional right to test the prosecution’s case at trial “would be an empty one if the State were permitted to exclude competent, reliable evidence bearing on the credibility of a confession when such evidence is central to the defendant’s claim of innocence.” Id. at 690. In holding that the testimony should have been admitted, the Court emphasized its “relevance” to the defense and the lack of a “rational justification” for its exclusion. Id. at 689, 691. Third, and finally, in Rock v. Arkansas the Court held that the Arkansas Supreme Court violated the defendant’s compulsory process rights by ruling that hypnotically refreshed testimony was per se inadmissible. Rock, 483 U.S. at 62. It held that the court’s per se ruling was “arbitrary” and “disproportionate” to the purposes it was designed to serve (in this case, ensuring the reliability of evidence). Id. at 55–56. The Court directed that “[i]n applying its evidentiary rules a State must evaluate whether the interests served by a rule justify the limitation imposed on the defendant’s constitutional right to testify.” Id. at 56. These cases explicitly emphasize the Compulsory Process Clause’s purpose of assisting the jury in the search for truth.232Rock, 483 U.S. at 54 (quoting Rosen v. United States, 245 U.S. 467, 471 (1918)) (observing that the “truth is more likely to be arrived at by hearing the testimony of all persons of competent understanding who may seem to have knowledge of the facts involved in a case, leaving the credit and weight of such testimony to be determined by the jury or by the court”). In one of the most comprehensive modern treatments of compulsory process, Janet Hoeffel observes that the Washington Court effectively adopted an overbreadth test based on its reasoning that the Texas law “prevent[ed] whole categories of defense witnesses from testifying on the basis of a priori categories that presume them unworthy of belief.” Hoeffel, supra note 205, at 1292 (quoting Washington, 388 U.S. at 22). As Janet Hoeffel notes, Washington and its progeny appear to stand for the proposition that the accused’s right to present a defense is a significant one.233Hoeffel, supra note 205, at 1298. When there is a clash between the defendant’s right to compulsory process and some state evidentiary rule—even one, as in Washington, based in common law—and the opponent of the evidence can test its reliability through the adversarial process, these cases all hold that “the Constitution prefer[s] that the jury hear the evidence.”234Id.

In other cases, however, the Supreme Court appears to subordinate the defendant’s right to put on a case to state laws—to “shrink,” as Hoeffel puts it, “the right to little more than a right to put on evidence, as long as it comports with the rules of evidence.”235Id. For example, in Chambers v. Mississippi, the Court decided for the defendant, holding that the combination of Mississippi’s hearsay rule excluding statements against penal interest and its so-called “ ‘voucher’ rule,” preventing a party from impeaching its own witness, violated Due Process.236Chambers v. Mississippi, 410 U.S. 284, 294, 298–302 (1973). In doing so, however, the Court did not ask the general question it asked in Washington and its progeny—whether the Mississippi rule was “arbitrary” or “disproportionate” to its stated goal of preventing perjured or unreliable testimony. Instead, it turned to the facts of the specific case and determined that the out-of-court statements at issue had “considerable assurance of their reliability.”237Id. at 300.

The Supreme Court further refined its compulsory process rule in cases unrelated to the reliability of evidence. United States v. Valenzuela-Bernal involved the pre-trial deportation of a possible defense witnesses—a context more analogous to statutory preclusion of defendants’ access to familial DNA searches. The Court held that to establish a violation, a defendant “must at least make some plausible showing of how [the excluded] testimony would have been both material and favorable to his defense.”238United States v. Valenzuela-Bernal, 458 U.S. 858, 867 (1982) (emphasis added). Then, in Taylor v. Illinois, the Court—while reemphasizing that the Sixth Amendment provides a defendant not only the right to subpoena witnesses but also the right to put them on the stand—rejected the defendant’s argument that such a right to exculpatory evidence is absolute.239Taylor v. Illinois, 484 U.S. 400, 406–11 (1988). It held that the accused “does not have an unfettered right to offer testimony that is incompetent, privileged, or otherwise inadmissible under standard rules of evidence” and noted that “the trial process would be a shambles if either party had an absolute right to control the time and content of his witnesses’ testimony.”240Id. at 410–11. On that basis, the Court held that the trial court did not violate the Compulsory Process Clause by excluding a defense witness when it found that the defendant had willfully failed to disclose the witness in an attempt to obtain a tactical advantage that would minimize the effectiveness of cross examination.241Id. at 416–17; see also United States v. Scheffer, 523 U.S. 303, 316–17 (1998) (upholding the Military Rule of Evidence categorically banning exculpatory polygraph evidence against defendant’s compulsory process claim because, unlike the hypnotized defendant in Rock, he would still be able to testify to “his version of the facts” in which the addition of the polygraph expert would only serve to bolster his credibility).

In practice, the circuits have routinely engaged in fact-specific analysis to uphold trial courts’ exclusion of defense evidence as not arbitrary or disproportionate, or on the grounds that the excluded evidence was not material or favorable.242See, e.g., United States v. Crater, 93 F.4th 581, 587–90 (1st Cir. 2024) (upholding the lower court’s decision not to enforce defendant’s subpoena of government witnesses because it was not material or favorable as at best it could be used only to impeach witnesses the government never called to testify); Cagle v. Branker, 520 F.3d 320, 325 (4th Cir. 2008) (upholding the exclusion of a defense witness’ testimony on the grounds that the court had found him to be “ ‘an opportunistic liar’ whom no reasonable jury would believe”); United States v. Corr, 543 F.2d 1042, 1052 (2d Cir. 1976) (noting that it was troubled by the trial court’s exclusion of evidence related to valuation of losses in a mail fraud case as it was “relevant to [defendant’s] good faith and tended to corroborate part of [defendant’s] own testimony” yet finding no error due to “the discretionary nature of the exclusion” and the fact that “the jury had ample opportunity to consider and weigh the defense” through other evidence). Even under a narrow view of the rule, however, it seems a criminal defendant who can show the existence of material, favorable DNA evidence has a Compulsory Process right for the court to subpoena that evidence. In practice, this would require that the defendant receive a crime scene sample from the prosecution as Brady material and obtain a subpoena from the court to allow the defense to upload it to a consumer DNA database, regardless of the database’s privacy policies.

In a case involving an unknown, third-party genetic sample found at a crime scene, the defendant has an argument that any potential matches to that profile are material in the sense that they would make the identity of a particular perpetrator other than the defendant more or less likely. The challenge, of course, would be in showing that potential DNA matches in a consumer database are likely to be favorable to a defendant. In most cases, this could not be known reliably ahead of time because the third-party sample could come from someone easily explained away as innocently present at the crime scene. Furthermore, it could not even be known ahead of time whether a consumer database would provide a familial match at all. Finally, even if a database did contain a familial match, the defense would need an expensive genetic expert to build out a profile of the actual perpetrator from the data of whichever family member had made their identity public. However, the fact that a right is difficult to realize in practice does not in and of itself allow the government to violate it.

  1. Constitutional Limitations

Another obstacle for a defendant seeking to make a compulsory process argument for the right to subpoena familial DNA evidence comes from the constitutional separation of powers. The Compulsory Process Clause governs a defendant’s rights at trial, not during the course of a police investigation. Courts have largely recognized the right to present a defense as implicating judicial, rather than executive, branch powers.243See Rebecca Wexler, Life, Liberty, and Data Privacy: The Global CLOUD, the Criminally Accused, and Executive Versus Judicial Compulsory Process Powers, 101 Tex. L. Rev. 1341, 1383 (2023). This distinction has extinguished compulsory process clause arguments in situations in which the law limits defendants’ ability to conduct investigations for themselves.

For example, as Rebecca Wexler has noted, in cases involving extraterritorial investigations, courts have held against compulsory process challenges the asymmetries between law enforcement and defense investigators created by Mutual Legal Assistance Treaties (“MLATs”).244Id. at 1358. An MLAT is a bilateral treaty that commits the signatory nations to reciprocal cooperation in criminal investigations, including waiver, where relevant, of privacy laws that would otherwise prevent the transfer of evidence across borders.245Id. MLATs do not, however, provide for defense subpoenas of material protected by such privacy laws, which puts it out of the reach of compulsory process. As one federal court put it, “the right to compulsory process . . . cannot be stretched to include compelling the invocation of treaty process powers available only to the Executive Branch.”246United States v. Rosen, 240 F.R.D. 204, 215 (E.D. Va. 2007).

Courts have applied similar logic in cases involving conflict between the asserted Sixth Amendment compulsory process rights of a defendant and a potential defense witness who asserts their Fifth Amendment privilege against self-incrimination. Trial courts are deemed to have a duty to protect the witness’s Fifth Amendment right, and if a trial court sustains a witness’s assertion of the privilege, the defendant lacks the right to force the witness to take the stand only to assert the privilege.247United States v. Lyons, 703 F.2d 815, 818 (5th Cir. 1983). If the witness has already testified for the prosecution and asserts the privilege on cross-examination, however, the trial court may strike the direct examination testimony if it finds a “substantial danger of prejudice by depriving [the defendant] of the ability to test the truth of the witness’s direct testimony.”248Id. at 819 (quoting United States v. Diecidue, 603 F.2d 535, 552 (5th Cir. 1979)). Otherwise, the case law establishes that in such situations of competing constitutional rights courts have no authority to either compel the government to grant immunity to a defense witness or to grant such immunity themselves.249See United States v. Simmons, 70 F.4th 1086, 1089 (8th Cir. 2023); United States v. Dolah, 245 F.3d 98, 105 (2d Cir. 2001). This rule appears based on the idea that immunity is “pre-eminently a function of the Executive Branch.”250See Wexler, supra note 243, at 1388 (quoting United States v. Turkish, 623 F.2d 769, 776 (2d Cir. 1980)).

The MLAT and Fifth Amendment examples suggest that when a statute or competing constitutional right prevents a defendant from fully realizing their compulsory process right, compulsory process is subordinate, and courts even lack the authority to force the government to take “executive” measures to allow the defendant the same end-runs around such rules that the government is allowed to take for itself. The case law is more conflicted when the question presented is whether the Compulsory Process Clause requires a court to compel a witness to give testimony protected by attorney-client privilege. Such cases involve a clash between the constitutional right of the defendant and the statutory right of the witness. The most recent Supreme Court case to touch this question, Swidler & Berlin v. United States, left it unresolved.251Swidler & Berlin v. United States, 524 U.S. 399, 408 n.3 (1998). In this case, the court held that attorney-client privilege survives a client’s death, but left open the question of whether “exceptional circumstances implicating a criminal defendant’s constitutional rights might warrant breaching the privilege.”252Id. Since then, a minority of courts have held that that a defendant’s Sixth Amendment rights (confrontation as well as compulsory process) require the court to pierce attorney-client privilege when the witness’s testimony is material.253See Murdoch v. Castro, 365 F.3d 699, 706 (9th Cir. 2004) (“[T]he attorney-client privilege ‘must fall before the right of petitioner to seek out truth in the process of defending himself.’ ”); State v. Hoop, 731 N.E.2d 1177, 1187 (Ohio Ct. App. 1999). Other courts categorically subordinate the compulsory process right to “traditional testimonial privileges,” in a logic similar to that of the Supreme Court in Chambers.254United States v. Serrano, 406 F.3d 1208, 1215 (10th Cir. 2005); People v. Gonzalez, 465 N.Y.S.2d 471, 473–74 (Sup. Ct. 1983). Still, other courts will engage in some sort of balancing to determine whether the compulsory process right pierces the privilege.255See, e.g., United States ex rel. Blackwell v. Franzen, 688 F.2d 496, 501 (7th Cir. 1982) (examining the record to determine “whether the probative value of the alleged privileged communication was such that the defendant’s right to effective cross-examination was substantially diminished”); Neku v. United States, 620 A.2d 259, 263 (D.C. 1993) (balancing the privileged testimony’s “probative value” against the interests the privilege serves and piercing where the probative value is “clear and substantial”).

The context of the Stored Communications Act (“SCA”) ostensibly provides an example most relevant to the context of familial DNA. Courts have interpreted the SCA to categorically bar defense counsel from subpoenaing U.S. service providers for users’ stored electronic communications regardless of how exculpatory the potential evidence might be, while expressly permitting law enforcement to subpoena such information.256Wexler, supra note 243, at 1373. The government’s subpoena power under the SCA is now, as discussed above, limited by Carpenter, thus lessening the adversarial asymmetry between prosecution and defense. Even after Carpenter, however, some courts have suggested in dicta that a categorical bar on criminal defense subpoenas for electronic communications under the statute might impinge on a defendant’s right to compulsory process under certain circumstances, though none have reached the issue.257See Facebook, Inc. v. Wint, 199 A.3d 625, 633–34 (D.C. 2019); Facebook, Inc. v. Superior Ct., 471 P.3d 383, 402 (Cal. 2020). A similar argument would seem to apply to a defendant being statutorily barred from subpoenaing relevant familial DNA evidence from a consumer site.258In a similar vein, Jacob McCarty has argued that the Compulsory Process Clause should be held to guarantee defendants access to material video evidence during the “acceptance period” prior to trial. He points to the unique salience of video technology and its heightened likelihood of destruction through routine video retention policies prior to trial. Jacob W. McCarty, Processing Speed: Expanding the Sixth Amendment Right to Compulsory Process in the Age of Big Data, 95 Tul. L. Rev. 183, 190–91 (2020).

  1. Conclusions on Familial DNA and Compulsory Process

In a case like Christopher Tapp’s, an innocent defendant would benefit from the ability to run an unidentified third-party DNA sample through a database to seek matches—direct or familial—that suggest other suspects.259The availability of such a sample from investigators in the first place raises separate issues under Brady doctrine, discussed in the next Section, infra. To the extent that the companies’ own privacy policies barred individuals from uploading DNA other than their own, this would likely require a court-issued subpoena to effectuate. In jurisdictions following the “strict admissibility rule,” the defendant would likely be unable to meet the admissibility requirement because it would be impossible to prove ahead of time that such a database would in fact contain matches relevant to the case. In jurisdictions following the “potential admissibility rule,” they would likely fare better. Either way, a rule like Maryland’s—which prohibits even defendants from conducting familial DNA searches, at least in police databases—wholly extinguishes the right to compulsory process for this type of evidence.

Privacy law scholars have called for an equivalent to the SCA to protect consumers’ genetic information,260See Natalie Ram, Christi J. Guerrini & Amy L. McGuire, Genealogy Databases and the Future of Criminal Investigation: The Police Can Access Your Online Family Tree Research—and Use It to Investigate Your Relatives, 360 Science 1078, 1079 (2018). yet courts have noted in the SCA context that the total unavailability of a category of evidence due to lack of subpoena power raises Compulsory Process issues. Critics note that the current admissibility requirement in the subpoena rules of most jurisdictions raises a similar problem, broadly speaking.261See, e.g., Miller, supra note 223, at 26. Should states pass consumer DNA statutes that wholly bar access to such evidence by defendants, these issues would be compounded, and the Sixth Amendment impairment would be even greater. A defendant has a colorable argument that such a statute would be “arbitrary or disproportionate,” under Washington, to its privacy goal.

B.  The Due Process Right to Exculpatory Evidence

The Sixth Amendment right to obtain judicial assistance in securing evidence from third parties is, as we have seen, severely limited. However, the Supreme Court has also recognized a Fourteenth Amendment due process right to the government’s exculpatory investigative materials that is distinct from—and broader than—the compulsory process right.262See Pennsylvania v. Ritchie, 480 U.S. 39, 56 (1987). Brady v. Maryland held that due process requires that a prosecutor turn over to the defendant all material, exculpatory evidence in their possession.263Brady v. Maryland, 373 U.S. 83, 87 (1963). United States v. Agurs clarified that this duty exists even without a request from defense counsel where suppression of the evidence would be “of sufficient significance to result in the denial of the defendant’s right to a fair trial.” United States v. Agurs, 427 U.S. 97, 107–08 (1976). It further held that failure to do so violates due process even when the prosecutor is not acting in bad faith.264Brady, 373 U.S. at 87. Subsequent cases confirmed that evidence tending to impeach prosecution witnesses constitutes material, exculpatory evidence for Brady purposes.265Giglio v. United States, 405 U.S. 150, 154 (1972). Regardless of whether the defense requests the evidence, favorable evidence is material “only if there is a reasonable probability that, had the evidence been disclosed to the defense, the result of the proceeding would have been different.”266United States v. Bagley, 473 U.S. 667, 682 (1985). Restated, the test is whether “the favorable evidence could reasonably be taken to put the whole case in such a different light as to undermine confidence in the verdict.”267Kyles v. Whitley, 514 U.S. 419, 435 (1995). However, evidence is not considered “ ‘suppressed’ by the government when the defendant has access to the evidence before trial by the exercise of reasonable diligence.”268United States v. White, 970 F.2d 328, 337 (7th Cir. 1992).

 1.  Brady and DNA

The Supreme Court has emphasized that the prosecutor has a duty to learn of any favorable evidence known to “the others acting on the government’s behalf,” such as the police.269Kyles, 514 U.S. at 437. It is currently uncertain to what extent a defendant has a Brady right to evidence of a third-party’s DNA from a CODIS search conducted on DNA found at a crime scene.270Garrett, supra note 59, at 1659–60. The sparse case law dealing with such claims has rejected specific arguments on their own facts, finding that the prosecution’s failure to disclose CODIS hits under the circumstances could not be “taken to put the whole case in such a different light as to undermine confidence in the verdict.”271Kyles, 514 U.S. at 435; see, e.g., State v. Rosa, 230 A.3d 677, 692–93 (Conn. App. Ct. 2020) (holding that evidence of third-party DNA collected from a sweatshirt near the crime scene was not material because there was no evidence to indicate how long the sweatshirt had been there or that it was even present when police first responded to the crime scene); Dorsey v. Steele, No. 15-08000-CV, 2019 U.S. Dist. LEXIS 166667, at *31–32 (W.D. Mo. Sept. 7, 2019) (rejecting as immaterial the defendant’s Brady claim based on an undisclosed CODIS hit to a third-party in addition to the hit to the defendant, because (1) the jury was told that 2.3 out of every 1,000 males would not be ruled out by the test, (2) that indeed there had been a hit in this case to yet another third-party they did hear about, and (3) because the evidence connecting other CODIS hits to the crime was weak in comparison to the extensive evidence against the defendant); State v. Knight, 245 N.E.3d 859, 879–80 (Ohio Ct. App. 2024) (holding that Brady was not violated because the prosecution eventually provided defense counsel with evidence of a third-party CODIS hit before trial, but that the trial court erred by granting the defendant only a continuance of the trial due to the lengthy delay in disclosure); People v. Jackson, No. B210542, 2010 Cal. App. Unpub. LEXIS 4855, at *8 (June 28, 2010) (finding no Brady violation where the withheld CODIS hit was inculpatory rather than exculpatory); Jones v. Comm’r of Corr., 274 A.3d 237, 256 (Conn. App. Ct. 2022) (finding no Brady violation because the third-party CODIS hit was not material as (1) the blood evidence was not at the crime scene but was in the victim’s locked car some distance from the crime scene, (2) the blood was dry, (3) the victim only recently had purchased the car, and (4) the petitioner did not present testimony or evidence linking a third party to the crime); State v. James, No. A-19-797521-W, 10C265506, 2020 Nev. Dist. LEXIS 165, at *22 (Feb. 21, 2020) (finding no Brady violation where there was sufficient independent evidence that the defendant sexually assaulted the victim); State v. Estes, No. CA2013-12-126, 2014 Ohio App. LEXIS 3230, at *P27–28 (July 28, 2014) (finding no Brady violation where the state did not disclose the identity of a third party whose DNA was found on heroin paraphernalia because the jury was told the defendant’s DNA was not found on it and the jury nonetheless found him guilty, believing that more than one person could have shared a straw). Nonetheless, the reasoning in those cases indicates that if the defendant can show materiality, CODIS hits are subject to disclosure under Brady.

Brady and its progeny apply to exculpatory evidence that remains in the government’s possession, but a separate line of cases governs situations in which the government no longer possesses the evidence in question.272United States v. Femia, 9 F.3d 990, 993 (1st Cir. 1993). In California v. Trombetta, the Court held that a defendant complaining of a state’s failure to preserve evidence must show, first, that the evidence “possess[es] an exculpatory value that was apparent before the evidence was destroyed” and, second, “[is] of such a nature that the defendant would be unable to obtain comparable evidence by other reasonably available means.”273California v. Trombetta, 467 U.S. 479, 488–89 (1984). Subsequently, the Court added a third element to this test in Arizona v. Youngblood, holding that “unless a criminal defendant can show bad faith on the part of the police, failure to preserve potentially useful evidence does not constitute a denial of due process.”274Arizona v. Youngblood, 488 U.S. 51, 58 (1988). Numerous states have since adopted statutes requiring law enforcement to preserve DNA evidence.275See Garrett, supra note 59, at 1669. The government’s failure to preserve evidence when there is a duty to do so gives rise to a due process violation under some state constitutions if the evidence is material.276See generally State v. Ferguson, 2 S.W.3d 912 (Tenn. 1999); Ex parte Gingo, 605 So. 2d 1237 (Ala. 1992); Thorne v. Dep’t of Pub. Safety, 774 P.2d 1326 (Alaska 1989); State v. Matafeo, 787 P.2d 671 (Haw. 1990); Commonwealth v. Henderson, 582 N.E.2d 496 (Mass. 1991); State v. Osakalumi, 461 S.E.2d 504 (W. Va. 1995).

Youngblood also said in dicta that there is no due process right to the government using any “particular investigatory tool,” including quantitative testing, to secure exculpatory evidence.277Youngblood, 488 U.S. at 58–59. This makes it unclear whether a defendant has a Brady right to require police to upload unidentified third-party samples into CODIS to search for exculpatory hits. The argument is that, due to the cooperation between local prosecuting authorities and the federal government, which runs CODIS, any data in the database could qualify as evidence “known to” others acting on “the government’s behalf.278See Nat’l Inst. of Just., DNA for the Defense Bar 31 (2012), https://www.ojp.gov/pdffiles1/nij/237975.pdf [https://perma.cc/KQJ8-8DGV]. Some courts have adopted this reasoning despite Youngblood.279See, e.g., Commonwealth v. Brison, 618 A.2d 420, 424–25 (Pa. Super. Ct. 1992) (acknowledging but not following the Youngblood dicta); State v. Schwartz, 447 N.W.2d 422, 427 (Minn. 1989); State v. Hammond, 604 A.2d 793, 806–08 (Conn. 1992) (indicating that state’s failure to have DNA tests performed on the vaginal swabs taken from the victim where DNA tests previously performed on the victim’s clothing exculpated the defendant may have constituted a breach of duty to disclose exculpatory evidence which could have affected the case’s outcome); State v. Thomas, 586 A.2d 250, 253 (N.J. Super. Ct. App. Div. 1991) (suggesting that the state’s failure to submit material for DNA analysis may trigger its obligation to reveal exculpatory evidence, as set forth in Brady). Others have rejected such claims but only because of a defendant’s failure to show that the testing would have been favorable to the defendant.280See Mitchell v. Artus, No. 07 Civ. 4688, 2008 U.S. Dist. LEXIS 42604, at *123–24 (S.D.N.Y. June 8, 2008) (rejecting an ineffective assistance claim where the petitioner failed to establish the first Brady prong by not demonstrating that the DNA testing on a bloody wooden door saddle would have been “favorable” to him); Leake v. Senkowski, No. 01 Civ. 7559, 2004 U.S. Dist. LEXIS 11939, at *74–75 (S.D.N.Y. June 30, 2004) (holding that the police’s failure to collect and test blood samples from bloody stains on the sidewalk and test a bloody sweatshirt did not constitute a Brady violation because the petitioner failed to “demonstrate either that the blood evidence, if preserved and tested, would have been ‘favorable to’ him or that prejudice resulted from the failure to preserve and test it”). Yet others have construed Youngblood to mean that Brady does not include the right to CODIS searches.281See, e.g., Batchilly v. Nance, No. 08 Civ. 7150, 2010 U.S. Dist. LEXIS 33031, at *116–17 (S.D.N.Y. Apr. 2, 2010) (holding that failure to test the DNA found on a bitemark was not a Brady violation both because the defendant could not demonstrate that the outcome would have been favorable to him, and because, per Youngblood, the government’s failure to run a DNA test does not constitute a Brady violation absent bad faith); Derr v. State, 73 A.3d 254, 274–75 (Md. 2013). Regardless, some states have allowed these defense-initiated searches through statute,282725 Ill. Comp. Stat. § 5/116-5 (2005) (allowing defense searches by court order); Ga. Code Ann. § 24-4-63 (West 2010) (providing defense access where “access to the DNA data bank is material to the investigation, preparation, or presentation of a defense at trial or in a motion for a new trial”). Other states permit database access without specifically identifying criminal defendants as those with rights to request such searches. Haw. Rev. Stat. Ann. § 844D-82 (West 2024); N.C. Gen. Stat. Ann. § 15A-266.8 (West 2019); Cal. Penal Code § 299.5(g)–(h) (West 2011); N.J. Stat. Ann. § 53:1-20.21 (West 2003). and individual laboratories have varying policies, some of which provide for running searches for the defense.283Nat’l Inst. of Just., supra note 278, at 148.

In District Attorney’s Office v. Osborne, the Supreme Court made clear that there is no substantive due process right for criminal defendants to access DNA testing.284Dist. Att’y’s Off. v. Osborne, 557 U.S. 52, 72 (2009). In Osborne, the defendant was convicted of kidnapping and sexual assault even though restriction-fragment-length-polymorphism DNA testing had not been performed on semen found in a condom at the scene of the crime.285Id. at 57–58. A much less precise form of DNA testing was performed, which ruled out over 80% of other members of Osborne’s race. Id. In a 1983 action, Osborne argued that he had a substantive due process right to the state’s evidence for the purposes of applying new DNA testing technology that might prove him innocent.286Id. at 72. The Court rejected that claim on the grounds that “[e]stablishing a freestanding right to access DNA evidence for testing would force us to act as policymakers, and our substantive due process rulemaking authority would not only have to cover the right of access but a myriad of other issues.”287Id. at 73–74

A defendant objecting to the suppression of DNA evidence during the discovery process, thus, only has a few clear constitutional arguments. A defendant might be able to argue that a CODIS hit on a third party from samples taken at the crime scene was material and exculpatory under Brady if they can pass the rather high bar of showing a reasonable probability that the outcome would have been different had it been disclosed. Christopher Tapp, whose own DNA was not found at the crime scene despite the presence of semen from other unknown sources, might have had such an argument if the other sources had been identified but undisclosed. A more challenging case arises when the government conceals the existence of testable samples of biological material that it had not itself tested. Osborne dealt only with the post-conviction context, and thus did not foreclose a procedural due process argument, under Brady, that a defendant has a right to know about untested samples. It would simply be extraordinarily difficult for a defendant to demonstrate the materiality of as-of-yet untested biological samples. Furthermore, Youngblood implies that the argument that Brady compels the state to affirmatively test unidentified third-party samples itself may be quite weak, despite some case law to the contrary.

2.  Conclusions on Brady and Familial DNA

Brady applies only to evidence known to the government, which would seem to render it irrelevant to un-searched consumer DNA databases. Even the strongest view of Brady emerging from the case law only requires the government to run searches within CODIS, which includes government-controlled databases. As a practical matter, however, the very existence of Brady doctrine renders consumer databases a powerful and promising new source of exculpatory evidence for criminal defendants. Brady requires that law enforcement turn over evidence of potentially culpable third parties generated by the familial DNA searches they conduct. Thus, preventing law enforcement from accessing consumer databases without probable cause effectively deprives innocent defendants of critical exculpatory evidence.

The reality is that police and prosecutors have independent motivations to bring the correct guilty party to justice. Some prosecutors even pursue this duty post-conviction, as evidenced by the rise of Conviction Integrity Units and examples of cooperation between the government and the defense that have led to DNA exonerations as technology has improved.288See Bruce A. Green, Should Prosecutors Be Expected to Rectify Wrongful Convictions?, 10 Tex. A&M L. Rev. 167, 178 (2023). Given the obstacles discussed in the prior Section that prevent defendants from subpoenaing familial matches from consumer databases, law enforcement access may be the only meaningful way for the defense ever to obtain it. This is particularly true given the exceedingly high costs of using a familial DNA hit to build out a family tree and identify the actual party who left the sample at the crime scene. Even if a defendant obtained an unnamed third-party sample from the government through a conventional Brady disclosure and also obtained a court order to input the sample into a consumer database, most defense teams would lack the resources to hire the forensic experts necessary to do anything useful with the results.

This reality also sits in significant tension with the holding of another watershed Due Process case, Ake v. Oklahoma.289Ake v. Oklahoma, 470 U.S. 68 (1985). In Ake, the Supreme Court held that the Fourteenth Amendment requires that indigent defendants raising the insanity defense be provided with state-funded psychiatric experts to examine them and testify on their behalf.290Id. at 86–87. The Ake Court balanced several factors: the private interest affected by the state action, the governmental interest affected if the safeguard were provided and the probable value of the procedural safeguards sought, and the risk of an erroneous deprivation of the affected interest if they were not provided.291Id. at 77. On the third point, the Court found that in the absence of a qualified psychiatric expert, “the risk of an inaccurate resolution of sanity issues is extremely high.”292Id. at 82. Despite similar accuracy concerns raised by DNA evidence, there is no parallel right to a state-funded forensic expert.293Garrett, supra note 59, at 1665. This means that even when the government hands over testable biological material to the defense, an indigent defendant’s counsel may still lack the means to have it tested.294Id.

All considered, as a formal matter, a law or constitutional holding severely restricting law enforcement access to familial DNA searching would most likely not violate Brady as courts have construed it. Yet, by effectively blocking the defense’s access to potentially valuable exculpatory evidence and to the state’s resources for testing it, such laws would indirectly burden the due process values implicated by both Brady and Ake. In trying to protect the privacy interests of guilty parties, such a rule would inadvertently impact the liberty interests of innocent ones.

C.  Due Process Rights to Post-Conviction Proceedings Under State DNA and Innocence Statutes

  1. The Lack of Constitutional Innocence Claim

The third potential source of due process rights related to familial DNA involves post-conviction appeals on the grounds of innocence. This landscape is governed substantively by the Supreme Court’s 1993 decision in Herrera v. Collins, which narrowly held that a convicted petitioner’s claim of actual innocence does not state a ground for federal habeas relief, absent some independent constitutional violation during the state proceeding.295Herrera v. Collins, 506 U.S. 390, 400 (1993). In dicta, the Court left open the possibility that “in a capital case a truly persuasive demonstration of ‘actual innocence’ made after trial would render the execution of a defendant unconstitutional, and warrant federal habeas relief if there were no state avenue open to process such a claim.”296Id. at 417; see also In re Davis, 557 U.S. 952, 952 (2009) (transferring an original writ of habeas corpus in a capital case to the federal district court for an evidentiary hearing to determine whether evidence that was unavailable at the time of trial clearly establishes petitioner’s innocence). The Court emphasized that “the threshold showing for such an assumed right would necessarily be extraordinarily high.”297Herrera, 506 U.S. at 417. A few years later in Schlup v. Delo, the Court reaffirmed that no constitutional claim of innocence exists, but it also held that a showing of actual innocence may allow a habeas petitioner to avoid the procedural bar on other, defaulted constitutional claims.298Schlup v. Delo, 513 U.S. 298, 313–17 (1995).

The Court finally addressed the issue of DNA in post-conviction appeals in the 2006 case House v. Bell.299House v. Bell, 547 U.S. 518 (2006). Paul House was convicted and sentenced to death in Tennessee for the 1985 murder of his neighbor, with the jury finding as an aggravating factor during the death phase that the murder was committed in the course of a rape or a kidnapping.300Id. at 532–33. At trial, the prosecution introduced primitive forensic evidence showing that the semen on the victim’s nightgown was consistent with House’s and that the blood on House’s pants was consistent with the victim’s, but not his own.301Id. at 528–29. The forensic expert testified that the blood sample on the pants excluded 93% of the white population.302Id. at 531. One of the government’s expert witnesses acknowledged that the state did not provide saliva samples from the victim’s husband, which would have helped to determine his secretor status and, thus, whether he too could have been a potential source of the collected semen.303Id. at 529.

After his conviction, House filed a state habeas petition based on ineffective assistance and faulty jury instructions.304Id. at 533. When the trial court dismissed the petition, House appealed, but only on the jury-instructions ground.305Id. at 533–34. After House’s conviction was affirmed, he filed a second state habeas claim for ineffective assistance and sought investigative and expert assistance.306Id. at 534. The Tennessee Supreme Court held that these claims were barred by a statute providing that claims not raised in prior post-conviction proceedings are procedurally defaulted.307Id. On federal habeas, the Eastern District of Tennessee held an evidentiary hearing to determine whether House fell within the “actual innocence” exception to the procedural default rule recognized in Schlup. Holding that he had failed to demonstrate actual innocence, the Court denied relief, and a divided Sixth Circuit ultimately affirmed.

The Supreme Court granted certiorari to determine, as required by Schlup, whether, in light of new evidence, “it is more likely than not that no reasonable juror would have found petitioner guilty beyond a reasonable doubt” in cases where a prisoner asserts innocence to avoid a procedural default.308Id. at 536–37 (citing Schlup v. Delo, 513 U.S. 298, 327 (1995)). The Court reviewed the new evidence, which reflected the dramatic evolution in DNA technology between 1985 and 2006. First, it noted that DNA testing established that the semen on the victim’s nightgown and panties came from her husband and not House.309House, 547 U.S. at 540. It noted that this would remove sexual assault as a potential motive for the crime and cast doubt on the jury’s finding of rape as an aggravating factor for sentencing.310Id. at 540–41. Second, it considered the testimony of an Assistant Chief Medical Examiner for the State of Tennessee that indicated that the blood found on House’s pants was chemically too degraded and too similar to blood collected during the autopsy to have come from the victim’s body on the night of the crime.311Id. at 542. He concluded that the stains were more likely to have been spilled from vials containing autopsy samples.312Id. at 542–43. On the basis of all of this evidence, the Court concluded that “although the issue is close [due to other, non-forensic evidence] . . . this is the rare case where—had the jury heard all the conflicting testimony—it is more likely than not that no reasonable juror viewing the record as a whole would lack reasonable doubt.”313Id. at 554. The Court then remanded for consideration of the merits of House’s ineffective assistance claims.314Id. at 555. While the prosecutor initially vowed to retry House if he successfully overturned his conviction, the prosecutor later dropped the charges after subsequent developments in DNA technology revealed an unknown perpetrator.315David G. Savage, DNA Evidence Means Freedom After 2 Decades, L.A. Times (May 13, 2009, 12:00 AM), https://www.latimes.com/archives/la-xpm-2009-may-13-na-court-dna13-story.html [https://perma.cc/HA6V-QVXG]. House had spent over twenty-two years on death row.316Id.

While House presents a rare case in which evidence of actual innocence had constitutional relevance in a federal habeas appeal, it is important to note how narrow a gateway the case represents. House’s substantive appeal was premised not on innocence but on ineffective assistance under the Sixth Amendment—a distinct constitutional error as required by Herrera. As in many similar cases, House was attempting to argue that his counsel had been ineffective in failing to discover and present exculpatory evidence at trial.317House, 547 U.S. at 533. Under Strickland v. Washington, a petitioner can make out an ineffective assistance claim if they can show a reasonable probability that counsel’s poor performance prejudiced the outcome.318Strickland v. Washington, 466 U.S. 668, 687 (1984). However, the Strickland test is explicitly deferential to the judgment of counsel, and courts will evaluate the reasonableness of attorney decisions ex ante, from the perspective of counsel at the time the decisions were made.319Id. at 689. It is often the case that—particularly given evolving technology—the absence of exculpatory DNA evidence at trial cannot be attributed to counsel’s ineffective assistance. In such cases, given Herrera, a petitioner has no constitutional grounds for an appeal.

  1. State Post-Conviction Statutes

As discussed in Part I, in response to political demand and the lack of existing remedies, all U.S. states and the federal government have now enacted statutes providing some sort of right to post-conviction DNA testing and for vacatur of sentence on demonstration of innocence.320See Garrett, supra note 59, at 1673–75. Rules of finality have likewise been displaced by statute in order to permit motions based on new evidence of innocence.321Id. As Brandon Garrett shows in a taxonomic study of such statutes, however, most statutes create various procedural hurdles that a petitioner must surmount before obtaining testing.322Id. at 1675.

Some states focus on the outcome and require a showing that the DNA evidence is at least probative of innocence or, more strenuously, “material,” meaning that “a reasonable probability exists that the petitioner would not have been convicted if exculpatory results had been obtained through DNA testing.”323Id. at 1676 (quoting Ariz. Rev. Stat. Ann. § 13-4240 (2001 & Supp. 2007)). Garrett notes that such tests would not be insurmountable if interpreted “to simply require that the DNA testing could be probative of innocence” but points out that some courts will “construct flimsy hypothetical scenarios and then hold that, if there exists even a possibility that DNA testing might not exculpate, it should not be granted.”324Garrett, supra note 59, at 1677.

Some states limit post-conviction innocence relief to DNA testing alone, precluding other sorts of scientific evidence of innocence, and others limit the relief only to technology unavailable at trial.325Id. at 1679. A majority of states limit DNA testing to cases involving serious or violent crimes.326Id. at 1680. Many states require that the petitioner be in custody to seek relief.327Id. Some exclude those defendants who pled guilty, and some specify that identity must have been at issue in the underlying trial (which, as Garrett notes, precludes relief in cases of guilty pleas).328Id. at 1681. Four states hold that attorney error or failure to exercise due diligence at trial to preclude post-conviction DNA testing (though such defendants might be eligible for a new trial on a Strickland claim).329Id. at 1682.

The accessibility of relief under these state statutes raises distinct constitutional due process issues. In District Attorney’s Office v. Osborne, the Supreme Court recognized that a convicted individual has “a liberty interest in demonstrating [their] innocence with new evidence under state law.”330Dist. Att’y’s Off. v. Osborne, 557 U.S. 52, 68 (2009). The Court affirmed that a state-created right “can, in some circumstances, beget yet other rights to procedures essential to the realization of the parent right.”331Id. (quoting Conn. Bd. of Pardons v. Dumschat, 452 U.S. 458, 463 (1981)). The Sixth Circuit had held below that Alaska had violated Osborne’s due process rights under Brady by failing to provide the defendant access to the DNA evidence used at trial, because the Alaska statute provides a substantive right to be released on a sufficiently compelling showing of new evidence that establishes innocence.332Id. The Supreme Court, however, held that Brady did not apply post-conviction and that a state “has more flexibility in deciding what procedures are needed in the context of post-conviction relief.”333Id. at 69. The appropriate test, the Court said, is whether Alaska’s post-conviction relief procedures “are fundamentally inadequate to vindicate the substantive rights provided” (in this case, the liberty interest in being released under Alaska’s innocence statute).334Id.

The Osborne Court examined Alaska’s post-conviction procedures, which provide for discovery in post-conviction proceedings and specified that such discovery is available for those seeking access to DNA evidence.335Id. at 70. The Alaska post-conviction statute limits discovery to “newly available” evidence and imposes due diligence and materiality limitations.336Id. Furthermore, the Court found that Alaska courts had suggested in dicta that in DNA cases, the state constitution may even provide an additional right of access to those who cannot meet the usual post-conviction discovery requirements, though the issue remains unsettled. The Court held that these procedures, which Osborne had not yet exhausted, were “adequate on their face” to the realization of his liberty interest under the post-conviction DNA statute.337Id. at 71.

Federal courts of appeals have been relying on Osborne to find state post-convictions procedures fundamentally adequate and, thus, reject Section 1983 claims based on refusal of post-conviction DNA testing.338See, e.g., McKithen v. Brown, 626 F.3d 143, 153 (2d Cir. 2010) (holding New York’s post-conviction DNA procedures were fundamentally adequate where they required only a showing that had the DNA test been performed at trial, “there exists a reasonable probability that the verdict would have been more favorable to the [petitioner],” an easier standard than that in the Alaska law approved by Osborne); Young v. Phila. Dist. Att’y’s Off., 341 Fed. Appx. 843, 844 (3d Cir. 2009) (per curium) (holding that there was no due process violation when the state denied DNA testing on the grounds that the defendant could not meet the “assert[ion] of actual innocence” requirement of the Pennsylvania DNA statute after having confessed). However, the Second Circuit came to the opposite conclusion about the New York City Police Department’s evidence management system in Newton v. City of New York.339Newton v. City of New York, 779 F.3d 140, 156 (2d Cir. 2015) In 1985, Alan Newton was convicted of rape, robbery, and assault based on eyewitness testimony.340Id. at 142–43. The rape kit was not tested at trial, but in 1988, Newton moved for an order authorizing his expert to conduct forensic tests on the rape kit pursuant to New York’s post-conviction relief statute. The statute authorizes vacatur based on the discovery of new evidence that “could not have been produced by the defendant at the trial even with due diligence on his part and which is of such character as to create a probability that had such evidence been received at the trial the verdict would have been more favorable to the defendant.”341N.Y. Crim. Proc. L. § 440.10(1)(g) (McKinney 2012). The New York Supreme Court granted the motion, but the officer of the Chief Medical Examiner Office reported that the rape kit contained no testable sperm.342Newton, 779 F.3d at 143.

In 1994, New York passed a post-conviction DNA statute that allows for testing upon the court’s determination that “if a DNA test had been conducted on such evidence, and if the results had been admitted in the trial . . . there exists a reasonable probability that the verdict would have been more favorable to the defendant.”343N.Y. Crim. Proc. L. § 440.30(1-a)(a)(1) (McKinney 1994). When Newton made a motion for testing under this statute on the grounds that technological advances since 1988 had rendered smaller samples testable, the court denied his motion after the District Attorney’s Office revealed that it had lost the rape kit entirely after the 1988 analysis.344Newton, 779 F.3d at 143. Ten years later, upon request from defense counsel, an Assistant District Attorney who had not been involved in Newton’s case searched for the rape kit again and found it in a barrel in an NYPD Property Clerk’s warehouse in Queens.345Id. at 144. After Newton had served more than twenty years in prison, new DNA testing of the rape kit exonerated him.346Id.

In reviewing the district court’s decision to set aside the jury verdict for Newton in a subsequent Section 1983 case, the Second Circuit applied Osborne to the facts of the case. It held that, first, like Osborne, Newton had a liberty interest in demonstrating his innocence on new evidence.347Id. at 147–48. It then turned to the question of whether New York’s procedural rules were fundamentally adequate to the realization of this interest. Newton argued that, like Alaska’s in Osborne, New York State’s similar procedures were fundamentally adequate, and, unlike Osborne, Newton had diligently availed himself of all of them. However, Newton argued that New York City’s ineffective evidence management system effectively nullified those procedures.348Id. at 150.

The Second Circuit agreed. Noting that Newton’s action focused not on the State law itself but on the execution of the law, the court did “not decide what specific City procedure is necessary to manage and track evidence,” but the court reinstated the jury’s verdict for Newton.349Id. at 151. It found that New York’s post-conviction DNA statute “is consistent with requiring the NYPD’s evidence management system to provide an adequate means to determine if evidence is available for testing and, if so, where the evidence is located.”350Id. at 152. It is important to note that the DNA statute also provides that, for the purposes of a post-conviction court considering a motion to vacate a conviction, “no inference unfavorable to the people may be drawn” from missing or destroyed evidence. Id. (quoting N.Y. Crim. Proc. Law § 440.30(1-a)(b) (McKinney 1994)). The Newton court held that this did not bar a civil remedy under § 1983. Id.

  1. Post-Conviction Statutes and Familial DNA

Newton suggests courts might be open to the argument that state procedures rendering DNA testing of old evidence effectively impossible could violate a defendant’s limited due process right to vindicate substantive rights under post-conviction relief statutes. Mismanaged storage procedures are distinctly different, however, from a formal legislative decision to restrict familial DNA searches through consumer sites. If Osborne stands for anything, it is the proposition that “[f]ederal courts should not presume that state criminal procedures will be inadequate to deal with technological change.”351Dist. Att’y’s Off. v. Osborne, 557 U.S. 52, 74 (2009). The Court made it quite clear that “the development of rules and procedures” in the area of DNA science should be left in the “hands of legislatures and state courts shaping policy in a focused manner.”352Id. at 56. A convicted prisoner might try to argue that a state statute effectively barring law enforcement from even attempting to re-open a case through familial DNA searches renders its procedures “fundamentally inadequate” under Osborne to vindicate their right to state-created post-conviction process. However, given the Court’s strong deference to legislatures, this argument is unlikely to prevail. It should be noted from this discussion of post-conviction process, however, that the lack of a constitutional innocence claim and the inapplicability of Brady post-conviction emphasize the importance of accuracy in initial criminal adjudications.

Conclusion: Adjudicating Due Process in Conflict

Part Two of this Article considered the argument that a subject has a Fourth Amendment right not to be subject to warrantless searches of their family member’s DNA within databases, even with the database user’s consent. It agreed with commentators who argue that DNA contains intimate information, and the consent of an actual database user is not logically equivalent to the consent of that user’s relatives who may be identified through a familial search. Nonetheless, Part Two concluded that the argument that such searches require a warrant after Carpenter is fairly weak. In the first place, the specific privacy interest recognized by Carpenter in the totality of one’s movements implicates detailed information about one’s actual life. By contrast, with the proper limitations on use, a DNA match reveals only one significant piece of information: that a subject left a particular sample in a particular place. More importantly, no authority recognizes a reasonable expectation of privacy in someone else’s bodily materials. Familial DNA works because a subject has left their own sample at a crime scene, and the police match it to the profile of a physical sample offered voluntarily by a relative. A suspect does not have a right to bar their spouse from allowing the police to take a sperm sample from their own body after marital intimacy in order to compare it to the sample in a rape kit. In the case of consumer databases, the suspect’s connection to the consenting party is even more attenuated and less voluntary. Thus, the idea that the Fourth Amendment allows them to override the third party’s use of their own body sample might be somewhat more colorable, but it is still, ultimately, weak.

On the other hand, familial DNA searches implicate the Sixth and Fourteenth Amendment rights of other criminal suspects in cases where unidentified third-party samples are found at crime scenes. Part Three of this Article argued that a criminal defendant has a colorable due process right not to have consumer DNA evidence rendered effectively unattainable by law enforcement. First, any statute preventing criminal defendants from exercising their Sixth Amendment right to subpoena that information would raise compulsory process issues. Even if legislatures or courts only barred law enforcement from conducting such searches, the defendant’s access to the subpoena power is heavily limited in many jurisdictions by the materiality and favorability requirements, and any useful hits resulting from such a search would in any case require expensive forensic testing to lead to a specific subject. Thus, the reality is that a defendant is usually only going to access important exculpatory evidence through Brady, which would put familial DNA largely out of reach if the police were precluded from conducting searches at all or only with probable cause. In any given case, this problem is also compounded by limited options post-conviction, at which point the Supreme Court has held that Brady does not apply and no independent right to DNA testing exists. Law enforcement’s ability to access the most accurate evidence on the front end affects a defendant’s right to obtain the most important kind of exculpatory evidence under Brady.

In Osborne, the Supreme Court declined to “constitutionalize” post-conviction DNA testing as a freestanding due process right to protect the liberty interest of a potentially wrongfully convicted party.353Id. at 73. Innocent defendants would then be especially harmed by an asymmetrical attempt to “constitutionalize” DNA on the front end—during investigations. Should courts recognize, or legislatures adopt, a Fourth Amendment rule that keeps familial DNA away from law enforcement absent probable cause, such defendants would be effectively shut off from the most accurate and valuable evidence at all stages of the criminal process. Like the Fourth Amendment argument, this Sixth Amendment argument is also somewhat weak since most courts do not even recognize a Brady right to law enforcement searches of public databases. Nonetheless, because a categorical ban on warrantless searches would essentially render all familial DNA evidence inaccessible, it would inherently block a defendant’s access to exculpatory evidence.

The admissibility of familial DNA is, thus, not a due process question in which it makes sense to think of balancing one defendant’s rights against purely “government interests” (although the accuracy of DNA evidence certainly makes the government’s crime-solving interest particularly high). Rather, there are two potential defendants’ liberty interests at stake—one of whom is most likely innocent. Constitutional rights necessarily have limits when they impact other parties’ constitutional rights; scholars debate whether these constitute limits on the scope of rights or simply their realization.354Compare Aharon Barak, Proportionality: Constitutional Rights and Their Limitations 99 (Doron Kalir trans., David Dyzenhaus & Adam Tomkins eds., 2012) (“A limitation of a constitutional right only narrows the ability to realize the right without changing the right’s actual boundaries. These limitations are constitutional only if they are proportional, as required by the limitation clause.”), with Robert Alexy, A Theory of Constitutional Rights 38 (Julian Rivers trans., 2002) (arguing that when two constitutional principles are in conflict, or when one is in conflict with the public interest, a special constitutional rule is formed which narrows the scope of the constitutional right). Many nations’ constitutions have general limitation clauses, which set out the specific conditions under which constitutional rights can be limited.355See, e.g., Canadian Charter of Rights and Freedoms § 1, Part I of the Constitution Act, 1982, being Schedule B to the Canada Act, 1982 (guaranteeing “the rights and freedoms set out in it subject only to such reasonable limits prescribed by law as can be demonstrably justified in a free and democratic society”). However, the United States does not have a general limitation clause and defines certain rights without any limitation.356Barak, supra note 354, at 133. Courts have treated some rights as having implicit limitations, such as when they engage in interest balancing to determine “unreasonableness” under the Fourth Amendment. For other situations, the Supreme Court has adopted its own, much criticized tiered system of scrutiny.357See Tiffani Lennon, Stepping Out of the Competing Constitutional Rights Conundrum: A Comparative Harm Analysis, 82 Denv. L. Rev. 359, 359 (2004); see also Ken Hyle, When Constitutional Rights Clash: Masterpiece Cakeshop’s Potential Legacy, 9 ConLawNOW 200, 203 (2018) (“The Court’s purported fallback to a categorical approach involving levels of scrutiny to resolve cases where constitutional rights collide is flawed in that it creates a hierarchy of constitutional rights . . . Under a traditional level of scrutiny analysis, courts examine government interests and the means necessary to achieve those interests for just one of the two constitutional rights in conflict.”). Sometimes, though inconsistently, courts limit constitutional rights through recourse to some version of John Stuart Mill’s harm principle, which holds that the only acceptable limitation on liberty is when it is necessary to prevent harm to others.358John Stuart Mill, On Liberty 80 (David Bromwich & George Kateb eds., 2003); see Hill v. Colorado, 530 U.S. 703, 725–29 (2000) (holding that the First Amendment was not violated by a Colorado law limiting abortion protest within eight feet of a person entering a healthcare facility, because the right not to be unduly harmed by being traumatized outweighed the right to free speech); Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (establishing a three-part test to determine when the government can restrict speech based on (1) imminent harm, (2) likelihood of producing illegal activity, and (3) intent to cause imminent illegality).

Generally, it is true that a constitutional right’s lack of limitation clause does not render the right absolute but instead subject to interpretation in harmony with the Constitution’s other provisions and other legitimate public interests.359Barak, supra note 354, at 135. This inherently entails courts prioritizing certain rights over others based on the facts of a particular case.360Id. at 361 (“Rights that advance the legal system’s most fundamental values and that contribute to the personal welfare of each member of the community differ from rights that rely upon general welfare considerations as their only justification.”). The U.S. Supreme Court has found limitations to individual rights in cases involving deference to military-decision-making due to the need for national security. See, e.g., Thomasson v. Perry, 80 F.3d 915, 926 (4th Cir. 1996). In cases involving parental decision-making, despite the Supreme Court recognizing a liberty interest in child rearing under the Fourteenth Amendment, where minor and parental interests have conflicted, the winner has been the minor, with the “scope of the state’s interest serving as the deciding factor.” Courtney Vorwald, When Parental and Minors’ Rights Conflict: Minors’ Constitutional Rights & Gay-Straight Alliances, 13 J. Gender, Race & Just. 465, 476 (2010) (citing Meyer v. Nebraska, 262 U.S. 390, 400 (1923) (holding that the right to raise and educate children is a liberty interest under the Fourteenth Amendment) and Troxel v. Granville, 530 U.S. 57, 88 (2000) (Stevens J., dissenting) (stating that parental rights “have thus never been regarded as absolute” due to the state’s parens patriae interest). During the Prohibition era the Supreme Court even narrowed the scope of the Fourth Amendment in order to facilitate enforcement of the Eighteenth Amendment. See Daniel Yeager, A History of the Fruit of the Poisonous Tree (1916–1942), 67 How. L.J. 51, 72–73 (2023). For an argument that U.S. courts should, as in other countries, recognize that two conflicting rights co-exist and allow the democratic political process to mediate them see, Jamal Greene, How Rights Went Wrong: Why Our Obsession with Rights Is Tearing America Apart 114–39, 248 (2021). In the context of criminal justice, for example, claims of Sixth Amendment deprivations “are subject to the general rule that remedies should be tailored to the injury suffered from the constitutional violation and should not unnecessarily infringe on competing interests.”361United States v. Morrison, 449 U.S. 361, 364 (1981). Thus, trial courts have discretion to limit a defendant’s Sixth Amendment confrontation right in a particular case through limiting the scope of cross-examination based on potential harms, such as harassment of the witness, prejudice, confusion of the issues, the witness’s safety, or questioning that is repetitive or only marginally relevant.362Delaware v. Van Arsdall, 475 U.S. 673, 679 (1986). In United States v. Stein, the Second Circuit found a violation of the Sixth Amendment right to counsel where a Department of Justice charging policy caused a private employer to terminate attorneys’ fees that they would otherwise have paid for according to the terms of their employees’ contracts.363United States v. Stein, 541 F.3d 130, 157 (2d Cir. 2008) (“[T]hese defendants can easily demonstrate interference in their relationships with counsel and impairment of their ability to mount a defense based on [trial court’s] non-erroneous findings that the post-indictment termination of fees ‘caused them to restrict the activities of their counsel,’ and thus to limit the scope of their pre-trial investigation and preparation.”). While the employees did not have a Sixth Amendment right to employer-funded legal counsel—in the same way that a suspect may not have a right for the police to conduct a familial DNA search—it nonetheless constituted an interference with the employees’ exercise of their Sixth Amendment right to mount a defense with their own assets that could not be justified by the state interest in encouraging cooperation by the corporate defendant.364Id. at 156.

Cases of competing constitutional interests are more delicate. In Nebraska Press Association v. Stuart, the Court rejected an absolute balancing test between the First and Sixth Amendments where, in order to protect the accused’s right to an impartial jury, a trial judge had issued an order restraining members of the press from publishing or broadcasting accounts of the defendant’s admissions.365Nebraska Press Ass’n v. Stuart, 427 U.S. 539, 560–61 (1976). The Court noted that “[t]he authors of the Bill of Rights did not undertake to assign priorities as between First Amendment and Sixth Amendment rights, ranking one as superior to the other”366Id. at 561. and proceeded to balance the nature and extent of pretrial news coverage, potential mitigating measures, and the effectiveness of a restraining order at preventing the danger; ultimately, the Court held for the petitioner journalists.367Id. at 562, 570.

When courts must adjudicate clashes between the constitutional rights of two criminal defendants, their work is complicated by the fact that the meaning of criminal due process is itself contested. Due process has a specific doctrinal meaning related to the procedures required by the Fifth and Fourteenth Amendments, the latter of which incorporates most rights in the Bill of Rights against the states.368Rosann Greenspan, Criminal Due Process in the Administrative State, 14 Stud. L., Pol. & Soc’y 169, 172 (1994). It also has a broader meaning that represents the “principles of civility or fairness that are supposed to underlie procedural and often substantive legal rules.”369Id. Because of its prominent role in the Bill of Rights, due process has become a distinctly American concept, with jurists in other nations resorting to other concepts such as “procedural justice,” “the rule of law,” “natural justice,” and “fundamental justice.”370Id.

In The Limits of the Criminal Sanction, Herbert Packer famously divides criminal justice thinking into two camps.371Herbert L. Packer, The Limits of the Criminal Sanction 153 (1968). One, which he refers to as the “Due Process Model,” values the observation of fair procedures, even at the expense of letting the guilty go free, while the other, the “Crime Control Model,” values accurate determinations of guilt and innocence.372Id. Accuracy has, in and of itself, been a value central to constitutionalized criminal due process since the start of the criminal procedure revolution in the mid-twentieth century.373See Ronald Jay Allen, Joseph L. Hoffman, Debra A. Livingston, Andrew D. Leipold & Tracey L. Meares, Criminal Procedure: Investigation and Right to Counsel 68 (4th ed., 2020) (“Thus, the problem with the mob-dominated trial in Moore [v. Dempsey], with the absence of any real defense counsel in Powell [v. Alabama], and with the beating-induced confession in Brown [v. Mississippi] was the same: All tended to lead to conviction and punishment without regard to whether the defendants were guilty.”). Rules about impartiality and reliability, the right to counsel for indigent defendants, the right to cross-examination, and the rule against involuntary confessions all exist to prevent the conviction of innocents due to malicious, lazy, hasty, or overzealous police and prosecutors.374See id. at 68–69; Thomas C. Grey, Procedural Fairness and Substantive Rights, in Due Process 182, 184 (J. Roland Pennock & John W. Chapman eds., 1977). In In re Winship, the Supreme Court held that the standard of proof beyond a reasonable doubt is a due process requirement in criminal trials on accuracy grounds.375In re Winship, 397 U.S. 358, 367 (1970) (“The preponderance [of the evidence] test is susceptible to the misinterpretation that it calls on the trier of fact merely to perform an abstract weighing of the evidence in order to determine which side has produced the greater quantum, without regard to its effect in convincing his mind of the truth of the proposition asserted.”).

As David Resnick argues, due process serves an important justificatory purpose, providing reasons for subjecting a person to criminal punishment.376David Resnick, Due Process and Procedural Justice, in Due Process, supra note 374, at 206, 214. He notes that “our concern with the subjective probability of correct outcomes reflects a requirement of morality and not simply efficiency or rationality.”377Id. at 215. Thus, while critics tend to pit accuracy values against due process values in cases where fair process requires guilty defendants to go free, the protection of innocents is a critical moral component of due process. The availability of DNA evidence inherently implicates accuracy values—not only the broader societal goal of identifying the guilty but also an individual’s right not to be punished without justification.

That said, Packer’s “Due Process Model” fits the argument that unwarranted familial DNA searches violate the Fourth Amendment rights of the third-party family members identified. Under this view of due process, the absence of “fair play” for the suspect should override the state’s interest in crime solving.378See Susan Bandes, Taking Some Rights Too Seriously: The State’s Right to a Fair Trial, 60 S. Cal. L. Rev. 1019, 1039 (1987). Some of the Supreme Court decisions that fit this model have been described as premised on “fundamental fairness”—most notably Rochin v. California, which excluded evidence found after law enforcement pumped a suspect’s stomach against his will and without judicial authorization.379Rochin v. California, 342 U.S. 165, 166, 174 (1952). In an opinion by Justice Frankfurter, the Court held that the stomach pumping—while producing accurate evidence—violated due process because it “shock[ed] the conscience.”380Id. at 172. The Fourth and Fifth Amendment exclusionary rules in general represent the primacy of fair play over accuracy since they necessarily better protect the procedural rights of the guilty than they do the innocent. However, an unjustly accused party could also argue that principles of fair play and fundamental fairness should prevent them from being criminally convicted without access to a whole body of highly reliable evidence.

It should be noted that there is a third set of due process values beyond these two that is related to the expressive function of criminal procedure and its relationship to public confidence in the justice system. The public will be more likely to support and participate in criminal justice when it believes that the process operates fairly.381Tracey L. Meares, Everything Old is New Again: Fundamental Fairness and the Legitimacy of Criminal Justice, 3 Ohio St. J. Crim. L. 105, 108 (2005); see also Tom R. Tyler & E. Allan Lind, A Relational Model of Authority in Groups, in 25 Advances in Experimental Social Psychology, at 115, 140–41 (Mark P. Zanna ed., 1992) (proposing a “group-value” theory of procedural justice based on the idea that people “belong to social groups and . . . are very attentive to signs and symbols that communicate information about their status within their groups,” such as whether a procedural system treats people with dignity, neutrality, and warrants trust from those subjected to it). On that basis, some critics point out that “[a] focus on the individual rights of the defendant to the exclusion of the interests of other participants belies the public’s critical role.”382Meares, supra note 381, at 116; see also Judith Resnik, Due Process: A Public Dimension, 39 U. Fla. L. Rev. 405, 408 (1987) (arguing “that the interaction between process and public is important and assists in the development of legal norms about the merits of disputes and how disputes should be handled”). In this view, a trial is not just a fact-finding mission but serves an “important symbolic function as public expressions of the affected parties’ rights to demand that official acts be explained and justified.”383T.M. Scanlon, Due Process, in Due Process, supra note 374, at 93, 99. This concept of due process is particularly important in the case of familial DNA. High-profile cases like the Golden State Killer have increased public awareness of this science, and exonerations like Christopher Tapp’s, which was widely covered in true crime media, have created demand for it as a means of recourse for the wrongfully accused and convicted.

Ultimately, the case of familial DNA does not present a simple, bilateral competition between fair Fourth Amendment process for a criminal defendant and public interest in crime-detection; it also implicates the Sixth and Fourteenth Amendment rights of an innocent suspect whose risk of wrongful conviction would be higher in a world with law enforcement access to familial DNA substantially restricted. Should courts consider Fourth Amendment claims challenging familial DNA evidence, they should bear in mind these other defendants when determining whether such searches are reasonable without a warrant. Furthermore, should states seek to regulate law enforcement use of DNA via statute, they should not adopt restrictions as broad as Montana’s. Ideally, even if states do restrict law enforcement access, they should at least create a formal subpoena process to clarify how criminal defendants can access this evidence. However, given the limitations on defense testing resources, this mechanism would likely benefit only a minority of defendants and should be supplemented by some degree of law enforcement access.

98 S. Cal. L. Rev. 761

Download

* Professor, California Western School of Law. Many thanks to Daniel Yeager and Donald Dripps for their valuable comments on drafts of this Article. I am also grateful to the helpful feedback I received at workshops from the faculties of California Western School of Law and the University of San Diego School of Law.

The Default Rule and Due Process: Diverging Interpretations of “The Charging Document” Requirement in Extradition Treaties

INTRODUCTION

The United States is a party to over one hundred bilateral extradition treaties with foreign governments.1  Treaty Affs. Staff, Off. of the Legal Adviser, U.S. Dep’t of State, Treaties in Force: A List of Treaties and Other International Agreements of the United States in Force on January 1, 2020 (2020). These treaties allow the U.S. and foreign countries to facilitate the transfer of individuals accused of crimes to the jurisdictions seeking to prosecute them.2Extradition Treaty, Black’s Law Dictionary (12th ed. 2024). Extradition is an ancient practice: processes resembling extradition have existed since antiquity, and the United States has entered into versions of bilateral extradition treaties and received extradition requests since shortly after the country’s founding in the 18th century.3William Magnuson, The Domestic Politics of International Extradition, 52 Va. J. Int’l L. 839, 846 (2012); see Christopher D. Man, Extradition and Article III: A Historical Examination of the “Judicial Power of the United States,” 10 Tul. J. Int’l & Compar. L. 38, 40 (2002); M. Cherif Bassiouni, International Extradition: United States Law and Practice 63 (6th ed. 2014).

As the world continues to grow smaller by means of technological advances and ever-increasing accessibility to international travel, extradition has become increasingly important as a means of international law enforcement.4Michael Abbell, Extradition to and from the United States 10 (2010); Ann Powers, Justice Denied? The Adjudication of Extradition Applications, 37 Tex. Int’l L.J. 277, 279–80 (2002). This growth in extradition has forced the judiciary of the United States to face unique issues of law that relate to the constitutional rights of the individuals whose extradition from the United States is requested by foreign countries. In that same vein, the recognition and enforcement of international human rights law has grown in the last century, and as rules of international human rights law have become binding on the United States judiciary, courts are faced with new, conflicting demands of both extradition requests and international law-derived rights of relators (that is, the individuals whose extradition is requested by foreign countries).

In 2023, two federal circuit courts analyzed the phrase “the charging document” in two bilateral extradition treaties: the Fourth Circuit reviewed an extradition treaty between the United States and Lithuania, and the Ninth Circuit reviewed an extradition treaty between the United States and Peru. The Fourth and Ninth Circuits disagreed over how to approach the phrase and its effect on the extradition process. In Manrique v. Kolc, the Ninth Circuit found “the charging document” requirement in the U.S.-Peru Extradition Treaty to be ambiguous and subject to multiple interpretations. Utilizing court precedents on treaty interpretation, the Ninth Circuit deferred to the executive branch’s interpretation of the phrase. In doing so, the court found that Peru had provided the necessary documents to satisfy the “charging document” requirement. On the other hand, the Fourth Circuit found that the phrase was clear and unambiguous, holding in Vitkus v. Blinken that the judiciary was compelled to decline Lithuania’s extradition request upon analyzing the “charging document” requirement in the U.S.-Lithuania Extradition Treaty. The Fourth Circuit found that the inclusion of “the charging document” in the U.S.-Lithuania treaty was a requirement that Lithuania had not satisfied when it had presented prosecutorial documents to the Secretary of State in an extradition request. The court rejected the Secretary of State’s argument as to the adequacy of Lithuania’s submitted documents.

The discrepancy between these two circuit courts illustrates how the judiciary’s deference to the executive branch (a deference codified by the Supreme Court in the early 20th century and referred to in this Note as the “default rule”) in matters of extradition treaty interpretation has manifested in the 2020s. At least twenty-eight extradition treaties that the United States has entered into with foreign nations reference the “charging document” in their lists of documents that a foreign nation is required to provide in an extradition request to the United States.5Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Albania, Alb.-U.S., art. 8, Dec. 22, 2020, S. Treaty Doc. No. 117-2 (2022); Extradition Treaty Between the United States of America and the Argentine Republic, Arg.-U.S., art. 8, June 10, 1997, S. Treaty Doc. No. 105-18 (1997); Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Austria, Austria-U.S., art. 10, Jan. 8, 1998, S. Treaty Doc. No. 105-50 (1998); Extradition Treaty Between the United States of America and the Kingdom of Belgium, Belg.-U.S., art. 7, Apr. 27, 1987, T.I.A.S. No. 97-901; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Bolivia, Bol.-U.S., art. VI, June 27, 1995, S. Treaty Doc. No. 104-22 (1995); Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Bulgaria, Bulg.-U.S., art. 8, Sept. 19, 2007, T.I.A.S. No. 09-521; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Cyprus, Cyprus-U.S., art. 8, June 17, 1996, S. Treaty Doc. No. 105-16 (1997); Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Estonia, Est.-U.S., art. 8, Feb. 8, 2006, T.I.A.S. No. 09-407; Extradition Treaty Between the United States of America and France, Fr.-U.S., art. X, Apr. 23, 1996, S. Treaty Doc. No. 105-13 (1997); Extradition Treaty Between the Government of the United States of America and the Government of the Republic of India, India-U.S., art. 9, June 25, 1997, S. Treaty Doc. No. 105-30 (1997); Protocol Between the Government of the United States and the Government of the State of Israel Amending the Convention on Extradition, Isr.-U.S., art. 6, July 6, 2005, S. Treaty Doc. No. 109-3 (2005); Extradition Treaty Between the Government of the United States of America and the Government of the Hashemite Kingdom of Jordan, Jordan-U.S., art. 8, Mar. 28, 1995, S. Treaty Doc. No. 104-3 (1995); Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Korea, S. Kor.-U.S., art. 8, June 9, 1998, T.I.A.S. No. 12962; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Latvia, Lat.-U.S., art. 7, Dec. 7, 2005, T.I.A.S. No. 09-415; Protocol on the Application of the Agreement on Extradition Between the United States of America and the European Union to the Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Lithuania, Lith.-U.S., art. 8, June 15, 2005, T.I.A.S. No. 10-201.14; Extradition Treaty Between the Government of the United States of America and the Government of the Grand Duchy of Luxembourg, Lux.-U.S., art. 8, Oct. 1, 1996, S. Treaty Doc. No. 105-10 (1997); Extradition Treaty Between the Government of the United States of America and the Government of Malaysia, Malay.-U.S., art. 7, Aug. 3, 1995, S. Treaty Doc. No. 104-26 (1996); Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Paraguay, Para.-U.S., art. VII, Nov. 9, 1998, S. Treaty Doc. No. 106-4 (1999); Extradition Treaty Between the United States of America and the Republic of Peru, Peru-U.S., art. VI, July 26, 2001, T.I.A.S. No. 03-825; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Philippines, Phil.-U.S., art. 7, Nov. 13, 1994, T.I.A.S. No. 96-1122; Extradition Treaty Between the United States of America and the Republic of Poland, Pol.-U.S., art. 9, July 10, 1996, S. Treaty Doc. No. 105-14 (1997); Extradition Treaty between the United States of America and Romania, Rom.-U.S., art. 8, Sept. 10, 2007, T.I.A.S. No. 09-508; Treaty Between the United States of America and the Republic of Serbia on Extradition, Serb.-U.S., art. 8, Aug. 15, 2016, T.I.A.S. No. 19-423; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of South Africa, S. Afr.- U.S., art. 9, Sept. 16, 1999, T.I.A.S. No. 13060; Extradition Treaty Between the Government of the United States of America and the Government of the Democratic Socialist Republic of Sri Lanka, Sri Lanka-U.S., art. 8, Sept. 30, 1999, T.I.A.S. No. 13066; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Trinidad and Tobago, Trin. & Tobago-U.S., art. 7, Mar. 4, 1996, T.I.A.S. No. 1129; Extradition Treaty Between the Government of the United States of America and the Government of the United Kingdom of Great Britain and Northern Ireland, U.K.-U.S., art. 8, Mar. 31, 2003, T.I.A.S. No. 07-426; Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Zimbabwe, U.S.-Zim., art. 6, Jul. 25, 1997, T.I.A.S. No. 00-426. The phrase “the charging document” appears in the above referenced treaties in various capacities: some note “the charging document, if any” or other conditional language regarding “the charging document.” As the judiciary will likely be called to interpret the “charging document” in future extradition requests, the judiciary’s decision to give deference to the executive branch in interpreting this phrase merits attention. The interpretation of the “charging document” requirement implicates due process concerns of relators, given that the charging document requirement ensures that the country requesting extradition complies with the procedure outlined in its treaty. This Note argues that courts, when faced with extradition requests from countries whose treaties include the “charging document” requirement, are bound by precedent to apply the default rule in a way that may conflict with a relator’s constitutional, due process rights. This Note also contends that this form of deferential interpretation to the executive branch may conflict with the fundamental right of due process afforded to relators by international law. However, departing from executive deference affects the United States’ foreign relations with other sovereign countries—this Note will briefly explore this ramification as well.

Part I of this Note provides an overview of how extradition treaties are utilized by the United States and how they are interpreted by both the executive and judicial branches. In brief, the statute governing extraditions in the United States bestows the judiciary with the responsibility of certifying an individual for extradition: the judiciary interprets the relevant extradition treaty to determine whether the person being sought by the requesting country may be certified as extraditable.618 U.S.C. § 3184; Artemio Rivera, A Case for the Due Process Right to a Speedy Extradition, 50 Creighton L. Rev. 249, 252–53 (2017) [hereinafter Rivera, Speedy Extradition]. Once the court certifies the extraditability of a relator, the Secretary of State has the discretion to either extradite the relator or deny the foreign country’s extradition request.7Rivera, Speedy Extradition, supra note 6, at 254; United States v. Lui Kin-Hong, 110 F.3d 103, 109 (1st Cir. 1997) (“It is . . . within the Secretary of State’s sole discretion to determine whether or not the relator should actually be extradited.”); 18 U.S.C. § 3186 (“The Secretary of State may order the person . . . to be delivered to any authorized agent of such foreign government, to be tried for the offense of which charged.”); Aimée J. Buckland, Note, Offending Officials: Former Government Actors and the Political Offense Exception to Extradition, 94 Calif. L. Rev. 423, 439 (2006). Importantly, although extradition is neither a full trial nor a solely administrative function, relators are deemed to have certain constitutional rights when subject to extradition proceedings in the United States.8See infra note 71. However, the unique procedural characteristics of extradition do not align with notions of constitutionally mandated due process, as relators do not benefit from the constitutional protections that courts have recognized for criminal defendants.9Man, supra note 3, at 44 n.34 (“Courts have held that the fugitive has no right to discovery; he may not cross-examine anyone who testifies at the extradition hearing; he may not cross-examine the affiants or deponents on whose affidavits or depositions the foreign complaint is based; his right to present evidence is severely limited; the Sixth Amendment guarantee of a speedy trial does not apply to an extradition hearing; the Federal Rules of Evidence do not apply to extradition proceedings; the Federal Rules of Criminal Procedure do not apply to extradition proceedings; a fugitives [sic] right to controvert the evidence against him is extremely limited; the constitutional prohibition against double jeopardy does not apply in the context of extradition; a fugitive who defeats an extradition attempt cannot claim the protection of double jeopardy or res judicata in a later extradition proceeding on the same charge; the exclusionary rule does not apply in extradition proceedings; hearsay is allowed in extradition proceedings; unsworn summaries of witness statements can be used in support of a finding that the fugitive is extraditable; and, the extradition may go forward even if the accused is not sane.” (alteration to the original)). Judicial precedent also mandates that courts defer to the executive branch’s interpretation of extradition treaties.10See GE Energy Power Conversion Fr. SAS, Corp. v. Outokumpu Stainless USA, LLC, 140 S. Ct. 1637, 1647 (2020). This deference has created friction between the judicial and executive branches, as the judiciary has been tasked with balancing relators’ due process rights against the executive branch’s foreign relations commitments to other sovereign nations. As the fundamental right to due process has been developed by international human rights bodies over the course of the 20th century, the judiciary’s deference to the executive branch has come into conflict with the advancement of due process as an international human right as well.11Infra Part III.A.

Part II surveys two appellate court cases decided in 2023, Vitkus v. Blinken and Manrique v. Kolc. In these cases, the Fourth and Ninth Circuits both analyzed “the charging document” requirement in extradition treaties, and in doing so, they exemplify the divergent approaches to granting deference to the executive branch in extradition procedures. In their divergent outcomes, these cases demonstrate the impact the default rule may have on a court’s decision to determine whether a relator is extraditable.

Part III of this Note analyzes the decisions of the Fourth and Ninth Circuits in Vitkus v. Blinken and Manrique v. Kolc. In analyzing the decisions, this Note argues that the Fourth Circuit’s avoidance of the default rule in reviewing “the charging document” requirement protects the relator from a potential infringement of their constitutional due process rights under domestic law, even at the cost of the executive branch’s ability to maintain foreign relations. The Fourth Circuit’s interpretation also respects the relator’s fundamental right to due process as established by international human rights law. This Note contends that the Fourth Circuit’s interpretation of a bilateral extradition treaty is one example of how the judiciary should approach the “charging document” requirement, notwithstanding other circumstances in the extradition process.

I.  BACKGROUND

A.Executing Bilateral Extradition Treaties

The United States and foreign countries usually coordinate the extradition of relators through bilateral extradition treaties. A treaty is “[a]n agreement formally signed, ratified, or adhered to between two countries or sovereigns; [or] an international agreement concluded between two or more states in written form and governed by international law.”12Treaty, Black’s Law Dictionary (12th ed. 2024). In the United States, treaties are “international agreements made by the President with the advice and consent of the Senate in accordance with Article II, [S]ection 2 of the Constitution of the United States.”13Treaty Affs. Staff, Off. of the Legal Adviser, U.S. Dep’t of State, Foreword to Treaties in Force 2021—2023: Supplemental List of Treaties and Other International Agreements, https://www.state.gov/wp-content/uploads/2023/06/TIF-Supplement-Report-2023.pdf [https://perma.cc/A9YW-HUCT]. Extradition treaties are treaties that contain the general, agreed-upon terms of the extradition process that both signatories must abide by. There are various forms of extradition treaties14Bassiouni, supra note 3, at 91.: there are bilateral extradition treaties, which are “concluded between [a country adopting the law] and a foreign country,” and multilateral treaties, which contain “provisions governing extradition of persons who are present in the territory of [country adopting the law].”15U.N. Off. on Drugs and Crime (UNODC), Model Law on Extradition 8 (2004), https://www.unodc.org/pdf/model_law_extradition.pdf [https://perma.cc/FJN5-CFHZ].

The United States has entered into extradition agreements with foreign countries since shortly after its founding in the 18th century.16John T. Parry, The Lost History of International Extradition Litigation, 43 Va. J. Int’l L. 93, 105 (2002). The United States primarily executes bilateral extradition treaties.17Artemio Rivera, Interpreting Extradition Treaties, 43 U. Dayton L. Rev. 201, 202 (2018) [hereinafter Rivera, Interpreting Extradition Treaties]; Bassiouni, supra note 3, at 91. This means that for the United States to engage in an extradition proceeding, the United States usually must have executed an extradition treaty directly with the foreign country requesting extradition in order to consider an extradition request.18Frequently Asked Questions Regarding Extradition, U.S. Dep’t of Just.: Crim. Div., https://www.justice.gov/criminal/criminal-oia/frequently-asked-questions-regarding-extradition [https://perma.cc/PQ6P-F6M4]. But see Ntakirutimana v. Reno, 184 F.3d 419, 425 (5th Cir. 1999) (“[A]lthough some authorization by law is necessary for the Executive to extradite . . . the Constitution’s text [does not] require that the authorization come in the form of a treaty.”).

The extradition process falls under the umbrella of the United States’ foreign relations responsibilities and therefore, extradition is considered by the United States as a responsibility of the executive branch. The executive branch is authorized to manage the extradition process “by virtue of its constitutional power to conduct foreign relations.”19Bassiouni, supra note 3, at 70. The executive’s influence on the extradition process is further explored in Part I.C. The treaties that the executive branch enters into on behalf of the United States can be divided into two kinds of treaties: self-executing treaties, which are akin to legislative acts, and non-self-executing treaties, which are treaties that the federal legislature is required to ratify and enforce.20Medellin v. Texas, 552 U.S. 491, 526–28 (2008); see Foster v. Neilson, 27 U.S. 253, 314 (1829) overruled by United States v. Percheman, 32 U.S. 51 (1833); Cook v. United States, 288 U.S. 102, 119 (1933) (noting that a self-executing treaty is one for which “no legislation [is] necessary to authorize executive action pursuant to its provisions”). Self-executing treaties do not need legislation to be enacted, as their self-executing nature imbues them with the power of domestically-created federal legislation that supersedes both state law and prior federal law.21Whitney v. Robertson, 124 U.S. 190, 194 (1888); Bassiouni, supra note 3, at 119; Terlinden v. Ames, 184 U.S. 270, 288 (1902) (citing Foster v. Neilson, 27 U.S. 253 (1829)); U.S. Const. art. VI., cl. 2 (“[A]ll Treaties made, or which shall be made, under the Authority of the United States, shall be the supreme Law of the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any State to the Contrary notwithstanding.”); Carlos Manuel Vázquez, The Four Doctrines of Self-Executing Treaties, 86 Am. J. Int’l. L. 695, 699–700 (“The effect of the Supremacy Clause was to superimpose the nation’s treaty obligations, as well as the Constitution and federal statutes, on the existing corpus juris of the states as supreme federal law. By virtue of the Supremacy Clause, treaties of their own force nullify inconsistent state laws and earlier federal laws, and the judicial mechanisms available generally to enforce laws in the United States are available to enforce treaties.”). Bilateral extradition treaties are self-executing.22Cheung v. United States, 213 F.3d 82, 95 (2d Cir. 2000); Bassiouni, supra note 3, at 119; see, e.g., Agreement on Extradition Between the United States of America and the European Union, Eur. Union-U.S., June 25, 2003, S. Treaty Doc. No. 109-14 (2006), at vi, https://www.congress.gov/treaty-document/109th-congress/14/document-text [https://perma.cc/7W8F-WTE6] (“The U.S.-EU Extradition Agreement and bilateral instruments are regarded as self-executing treaties under U.S. law, and thus will not require implementing legislation for the United States.”). Upon ratification of the bilateral extradition treaty with a foreign government, the legislative branch enacts statutes, based on the terms of the extradition treaties, that govern the procedures by which the executive and judicial branches respond to extradition requests.23Bassiouni, supra note 3, at 71. When domestic legislation and treaty provisions conflict, treaty provisions “prevail.”24Id.

A pertinent aspect of treaty enforcement for purposes of this Note is the inclusion of the “documents required” section in an extradition treaty. In the modern era of extradition treaty drafting, extradition treaties usually list the required documents a requesting foreign country must provide to the Secretary of State to initiate proceedings in the United States.25See Amy Jeffress, Samuel Witten & Kaitlin Konkel, International Extradition: A Guide to U.S. and International Practice, Arnold & Porter (Nov. 10, 2020), https://www.arnoldporter.com/en/perspectives/advisories/2020/11/international-extradition-a-guide [https://perma.cc/K8JZ-6FHX]. Under the Revised Manuals on the Model Treaty on Extradition and on the Model Treaty Mutual Assistance in Criminal Matters (the “Manual”), the UN provides recommendations on drafting extradition treaties, including how parties should list the documents that accompany an extradition request:

[T]he request must contain a precise description of the person sought; a copy of the applicable legal provisions (or a statement of the relevant law), a statement of the penalty that can be imposed for the offence; proof of the enforceable sentence or of the warrant of arrest (as the case requires) and any other documents having the same force; and an exposition of the facts for which extradition is requested (including a description of the acts or omissions constituting the alleged offence and an indication of the time and place of its commission). A reference to the basis of jurisdiction has been found to be useful. Additional requirements apply where the person has been convicted of an offence in his or her absence and where the person has been convicted of an offence but no sentence has yet been imposed.26U.N. Office on Drugs and Crime (UNODC), Revised Manuals on the Model Treaty on Extradition and on the Model Treaty on Mutual Assistance in Criminal Matters 31–32 (2004), https://www.unodc.org/pdf/model_treaty_extradition_revised_manual.pdf [https://perma.cc/DF97-J4EW].

The Manual explains that in order “[t]o obtain speedy and efficient execution of requests, [the treaty] should provide a precise description of the information to be included in the request,” and that “[t]he treaty will then act as a guide for those who are called upon to provide the information.”27Id. at 32. Given the discrepancy between countries’ legal systems, the Manual recommends that the negotiating parties draft the treaty with reference to specific documents relevant to each country’s criminal procedure to avoid erroneous interpretation of foreign criminal procedure.28Id. Although guidance on how parties should draft treaties is publicly available, drafting histories of treaties are rarely accessible to the public.29Georgetown Law Library, Drafting & Ratification History for U.S. Treaties, Geo. L., https://guides.ll.georgetown.edu/c.php?g=365734&p=3644889 [https://perma.cc/LAV3-MZRS]; see Off. of Treaty Affs., Treaty Procedures, U.S. Dep’t of State (Nov. 26, 2018), https://www.state.gov/treaty-procedures [https://perma.cc/7BFZ-GYYX]. As such, this Note does not address how bilateral extradition treaties are negotiated and executed by two sovereign nations.

B.The Extradition Process in the United States: Foreign Requests

The extradition process is initiated when a foreign government makes an extradition request to the U.S. State Department. Usually, a foreign government makes this request by providing the supporting documents that are listed in the “documents required” section of the relevant extradition treaty.30Jonathan Masters, What is Extradition?, Council on Foreign Rels., https://www.cfr.org/backgrounder/what-extradition [https://perma.cc/LG6E-6P36] (“The process generally begins with a foreign government making a request to the U.S. State Department with treaty-required paperwork, which often includes details on the person sought, the offenses alleged, charging documents, arrest warrants, and evidence.”). The procedure for responding to an extradition request is codified in 18 U.S.C. § 3184.3118 U.S.C. § 3184; see Parry, supra note 16, at 134–35. Under 18 U.S.C. § 3184, once a foreign country with an extradition treaty with the United States has submitted an extradition request to the Department of State, a warrant is issued for the wanted individual.3218 U.S.C. § 3184; Office of the Legal Adviser, Extraditions, U.S. Dep’t of State, https://www.state.gov/extraditions [https://perma.cc/9BPM-RRD7]. Once the individual is located and arrested, “any justice or judge of the United States” may hear evidence of the “criminality” being heard and considered, and “[i]f, on such hearing, he deems the evidence sufficient to sustain the charge . . . he shall certify the same . . . to the Secretary of State . . . for the surrender of such person, according to the stipulations of the treaty or convention.”3318 U.S.C. § 3184.

When a court hears evidence of the criminality of an individual sought by a foreign government, “the extradition magistrate examines the treaty to ascertain whether it allows extradition in the circumstances presented by the relator.”34Vo v. Benov, 447 F.3d 1235, 1245–46 (9th Cir. 2006). Generally, the magistrate is required to review whether the government has established:

(1) probable cause that the relator committed the alleged offense at the requesting country; (2) the offense upon which extradition is requested is extraditable according to the applicable treaty; (3) the offense in question constitutes a crime [in] both the requesting country and the United States (“dual criminality”); (4) an enforceable extradition treaty exists between the United States and the requesting country; and (5) the arrested individual is the person sought by the requesting country.35Rivera, Speedy Extradition, supra note 6, at 253 (footnote omitted) (citation omitted).

The extradition court does not determine the “guilt or innocence” of the relator.36Melia v. United States, 667 F.2d 300, 302 (2d Cir. 1981) (“An extradition hearing is not the occasion for an adjudication of guilt or innocence. Rather, its purpose is to determine whether there is reasonable ground to believe that the person whose extradition is sought is guilty, that is, whether there is sufficient evidence to justify extradition under the appropriate treaty.”). The extradition court is limited to hearing the evidence of a case to determine whether “the facts alleged constitute a crime in the prosecuting country”; interpreting the provisions of the treaty to ensure their applicability to the extradition request; and ensuring that the extradition process complies with the relevant constitutional provisions.37Masters, supra note 30; Bassiouni, supra note 3, at 71. Given its responsibilities, the extradition court’s role in the extradition process is akin to its role in a preliminary hearing in United States criminal court.38Man, supra note 3, at 115–16; Ward v. Rutherford, 921 F.2d 286, 288 (D.C. Cir. 1990) (“[T]he proceeding is essentially a ‘preliminary examination to determine whether a case is made out which will justify the holding of the accused and his surrender to the demanding nation.’ ” (quoting United States v. Kember, 685 F.2d 451, 455 (D.C. Cir. 1982))). Following the extradition court’s findings on the extradition request, the extradition court may enter “an order certifying extradition to the Secretary of State.”39Santos v. Thomas, 830 F.3d 987, 993 (9th Cir. 2016); Vo, 447 F.3d at 1237–38. Once the judiciary certifies the relator for extradition, the certification is passed on to the Secretary of State, who has the ultimate discretion to either accept or deny the extradition request.40Santos, 830 F.3d at 993; United States v. Lui Kin-Hong, 110 F.3d 103, 109–10 (1st Cir. 1997) (“It is . . . within the Secretary of State’s sole discretion to determine whether or not the relator should actually be extradited. . . . The Secretary may also decline to surrender the relator on any number of discretionary grounds, including but not limited to, humanitarian and foreign policy considerations.”).

The judiciary’s role in extradition proceedings is somewhat “constrained” by the executive branch.41Hilton v. Kerry, 754 F.3d 79, 84 (1st Cir. 2014); Lopez-Smith v. Hood, 121 F.3d 1322, 1326 (9th Cir. 1997) (“Extradition is a matter of foreign policy entirely within the discretion of the executive branch, except to the extent that the statute interposes a judicial function.”); Demjanjuk v. Petrovsky, 776 F.2d 571, 584 (6th Cir. 1985) (“Extradition is an act of the Executive Branch.”), vacated, 10 F.3d 338 (1993); see Rivera, Speedy Extradition, supra note 6, at 252–53. The judiciary is “limited because it cannot enjoin, prohibit, or mandate the executive’s negotiation of an agreement or a treaty, nor can it enjoin or mandate the executive’s exercise of discretion to request a relator’s extradition or to refuse to grant extradition although the terms of the applicable treaty have been satisfied.”42Bassiouni, supra note 3, at 71. The court reviewing a request for extradition does not determine whether the accused is innocent or guilty, as the extradition process only serves to begin the “criminal proceedings against an accused” individual—the foreign court ultimately decides the guilt or innocence of the accused.43Valencia v. Limbs, 655 F.2d 195, 198 (9th Cir. 1981). Therefore, the extradition court in the United States is required to review whether a foreign country’s extradition request satisfies the provisions of the relevant treaty “and that no valid defense or exception to extradition is in order.”44Rivera, Interpreting Extradition Treaties, supra note 17, at 204–05; United States v. Lui Kin-Hong, 110 F.3d 103, 110 (1st Cir. 1997) (“[U]nder 18 U.S.C. § 3184, the judicial officer’s inquiry is limited to a narrow set of issues concerning the existence of a treaty, the offense charged, and the quantum of evidence offered. The larger assessment of extradition and its consequences is committed to the Secretary of State.”).

Importantly, extradition orders by the extradition court can only be challenged through petitions for writs of habeas corpus,45Vo v. Benov, 447 F.3d 1235, 1240 (9th Cir. 2006). and habeas petitions “can challenge detention by the government if [the detention] is in violation of the Constitution, laws or treaties of the United States.”46Santos, 830 F.3d at 1015. In general, when considering a habeas petition following a magistrate’s extradition order, the reviewing court considers the following factors: (1) the jurisdiction of the judge presiding over the extradition proceeding; (2) the jurisdiction of the relevant court over the relator; (3) the applicable treaty provisions and their requirements; (4) “the character of the crime charged and whether” the crime is included within the treaty provisions; and (5) whether the government has provided evidence to substantiate a claim of extraditability.47Valencia v. Limbs, 655 F.2d 195, 197 (9th Cir. 1981); Caplan v. Vokes, 649 F.2d 1336, 1340 (9th Cir. 1981).

C.Extradition Treaty Interpretation in the United States

The magistrate court is responsible for reviewing an extradition treaty to determine whether the requesting country has satisfied the requirements listed in the extradition treaty.48Vo, 447 F.3d at 1245–46. When an extradition court finds that written portions of a treaty are ambiguous and subject to multiple meanings, the court is tasked with interpreting those ambiguous terms. The interpretation of treaty provisions highlights the relationship between the judiciary and the executive branches in enforcing the provisions of an extradition treaty. The executive branch “has authority to determine the interpretation of an international agreement to be asserted by the U.S. in its relations with other states,” but “[c]ourts in the U.S. have final authority to interpret an international agreement for purposes of applying it.”49Bassiouni, supra note 3, at 116 (quoting Restatement (Third) of Foreign Rels. L. § 326 (1987)).

The judiciary analyzes extradition treaties in the same manner that it analyzes contracts and statutes.50BG Group PLC v. Republic of Arg., 572 U.S. 25, 37 (2014) (“[A] treaty is a contract, though between nations. Its interpretation normally is, like a contract’s interpretation, a matter of determining the parties’ intent.”); Medellin v. Texas, 552 U.S. 491, 506 (2008) (“The interpretation of a treaty, like the interpretation of a statute, begins with its text.”); Sullivan v. Kidd, 254 U.S. 433, 439 (1921) (“[T]reaties are to be interpreted upon the principles which govern the interpretation of contracts in writing between individuals, and are to be executed in the utmost good faith, with a view to making effective the purposes of the high contracting parties.”); Kahn Lucas Lancaster v. Lark Int’l, 186 F.3d 210, 215 (2d Cir. 1999). Courts begin their analysis of treaties by first examining the text of the treaty, or the four corners of the document.51Marks ex rel. SM v. Hochhauser, 876 F.3d 416, 420 (2d Cir. 2017) (quoting Abbott v. Abbott, 560 U.S. 1, 10 (2010)). Much like the interpretation of statutes or contracts, “[w]hen interpreting a treaty, [courts] begin with the text of the treaty and the context in which the written words are used.”52E. Airlines, Inc. v. Floyd, 499 U.S. 530, 534 (1991) (quoting Volkswagenwerk Aktiengesellschaft v. Schlunk, 486 U.S. 694, 699 (1988)). If the court finds that a treaty’s language is clear and unambiguous, the court will cease its analysis of the meaning of the words of the treaty and “apply the words of the treaty as written.”53United States v. Duarte-Acero, 208 F.3d 1282, 1285 (11th Cir. 2000).

When interpreting treaty provisions, courts may find that the treaty provisions, much like statutory provisions, are ambiguous. When courts encounter ambiguous provisions in treaties, they expand their scope of focus to incorporate intrinsic and extrinsic evidence to evaluate the text of the treaty “in light of its object and purpose.”54Vienna Convention on the Law of Treaties § 3, arts. 31–32, May 23, 1969, 1155 U.N.T.S. 331, https://legal.un.org/ilc/texts/instruments/english/conventions/1_1_1969.pdf [https://perma.cc/ZBC6-RR9T] (“A treaty shall be interpreted in good faith in accordance with the ordinary meaning to be given to the terms of the treaty in their context and in the light of its object and purpose . . . A special meaning shall be given to a term if it is established that the parties so intended.”). The Vienna Convention also notes that “[r]ecourse may be had to supplementary means of interpretation, including the preparatory work of the treaty and the circumstances of its conclusion, in order to confirm the meaning resulting from the application of article 31, or to determine the meaning when the interpretation . . . leaves the meaning ambiguous or obscure . . . or leads to a result which is manifestly absurd or unreasonable.”). Id. at art. 32. In understanding ambiguous terms, courts are meant to undertake an interpretation in a “ ‘holistic endeavor’ and must account for the statute’s ‘full language, text, language as well as punctuation, structure and subject matter.’ ”55Kahn Lucas Lancaster, 186 F.3d at 215 (quoting U.S. Nat. Bank v. Indep. Ins. Agents of Am., Inc., 508 U.S. 439, 455 (1993)). In ascertaining ambiguous terms in a treaty, courts “may look . . . to the history of the treaty, the negotiations, and the practical construction adopted by the parties.”56Air France v. Saks, 470 U.S. 392, 396 (1985) (quoting Choctaw Nation of Indians v. United States, 318 U.S. 423, 431–32 (1943)); Medellin v. Texas, 552 U.S. 491, 507 (2008) (“Because a treaty ratified by the United States is ‘an agreement among sovereign powers,’ we have also considered as ‘aids to its interpretation’ the negotiation and drafting history of the treaty as well as ‘the postratification understanding’ of the signatory nations.” (quoting Zicherman v. Korean Air Lines Co., 516 U.S. 217, 226 (1996))).

One of the most important tools of extradition treaty interpretation used by the judiciary, and which scholars and courts have both criticized and utilized since the Supreme Court issued its opinion in 1933, is the extradition treaty interpretation principle established in Factor v. Laubenheimer.57Factor v. Laubenheimer, 290 U.S. 276 (1933); Rivera, Interpreting Extradition Treaties, supra note 17, at 228. Factor v. Laubenheimer involved an extradition request by the United Kingdom for Factor, who had allegedly committed a financial crime there and fled to Illinois. Factor argued that because Illinois did not have a comparable criminal statute, the extradition treaty between the United States and the United Kingdom could not be used to extradite him.58Factor, 290 U.S. at 286–87. In one of the most influential and long-standing guides on how courts should interpret treaties, the court in Factor considered whether a broad or narrow interpretation of a treaty should be utilized by an extradition court:

In choosing between conflicting interpretations of a treaty obligation, a narrow and restricted construction is to be avoided as not consonant with the principles deemed controlling in the interpretation of international agreements. Considerations which should govern the diplomatic relations between nations, and the good faith of treaties, as well, require that their obligations should be liberally construed so as to effect the apparent intention of the parties to secure equality and reciprocity between them. For that reason if a treaty fairly admits of two constructions, one restricting the rights which may be claimed under it, and the other enlarging it, the more liberal construction is to be preferred.59Id. at 293–94 (emphasis added). This interpretation of sovereign nation’s rights is in line with the concept that human beings under sovereign control were not afforded rights in international law. See Peter J. Spiro, Treaties, International Law, and Constitutional Rights, 55 Stan. L. Rev 1999, 2008 (2003) (“[Extradition treaties] posed significant benefits for U.S. law enforcement, and were considered to be in the crucial national interest. Otherwise applicable individual rights were submerged in the face of international imperatives.”) (footnote omitted).

This construction—that when faced with two possible constructions of an ambiguous term in a treaty, courts should broaden the interpretive scope of the extradition treaty in favor of the executive branch—is referred to as the default rule of extradition treaty interpretation.60Rivera, Interpreting Extradition Treaties, supra note 17, at 202; United States v. Lui Kin-Hong, 110 F.3d 103, 110 (1st Cir. 1997) (highlighting that the “executive branch’s construction of a treaty, although not binding upon the courts is entitled to great weight” and that extradition treaties “are to be construed liberally in favor of enforcement”); In re Extradition of Howard, 996 F.2d 1320, 1330–31 (1st Cir. 1993). This rule has been used to argue that, as the purpose of the extradition treaty is to extradite individuals, courts should interpret treaty provisions broadly to fulfill that purpose.61Kin-Hong, 110 F.3d at 110; see Kolovrat v. Oregon, 366 U.S. 187, 194 (1961); In re Gomez, No. 24-MJ-458, 2024 U.S. Dist. LEXIS 199218, at *13 (E.D.N.Y. Nov. 1, 2024); In re Extradition of D’Monte, No. 22-mj-230, 2023 U.S. Dist. LEXIS 202356, at *16–18 (D.P.R. Nov. 9, 2023); In re Rodriguez-Lastre, No. 23-MJ-2028, 2024 U.S. Dist. 8836, at *5–6 (S.D. Tex. Jan. 17, 2024). This principle has been articulated by various courts since 1933, such as the Sixth Circuit in the 2016 case Martinez v. United States, in which the court stated that “ambiguity in an extradition treaty must be construed in favor of the ‘rights’ the ‘parties’ may claim under it,” and in extradition proceedings, the parties are the countries and the “right the treaty creates is the right of one country to demand the extradition of fugitives in the other country,” as “[t]he point of an extradition after all is to facilitate extradition, as any country surely would agree at the time of signing.”62Martinez v. United States, 828 F.3d 451, 463 (6th Cir. 2016) (quoting Factor, 290 U.S. at 293–94).

The judiciary’s deference to the executive’s interpretation of international treaties is noteworthy.63See Rivera, Interpreting Extradition Treaties, supra note 17, at 206. This deference stems from the executive branch’s role in foreign relations. Since United States v. Curtiss-Wright Export Corporation in 1936, the U.S. Supreme Court has codified the executive branch’s power in foreign relations by proclaiming the “exclusive power of the President as the sole organ of the federal government in the field of international relations.”64United States v. Curtiss-Wright Exp. Corp., 299 U.S. 304, 320 (1936). Later, in Kolovrat v. Oregon, the Supreme Court stated that “[w]hile courts interpret treaties for themselves, the meaning given them by the departments of government particularly charged with their negotiation and enforcement is given great weight.”65Kolovrat, 366 U.S. at 194–95; see also Air France v. Saks, 470 U.S. 392, 399 (1985) (“[I]t is our responsibility to give the specific words of the treaty a meaning consistent with the shared expectations of the contracting parties.”). Additionally, courts will consider how the parties to the treaty constructed and interact with the treaty, as such behavior informs its application.66United States v. Stuart, 489 U.S. 353, 369 (1989).

There are foreign policy concerns when courts are called to interpret extradition treaties. Courts are likely to give deference to an executive branch’s interpretation given its role “in diplomatic negotiation with other countries, on the ground that the U.S. should speak with one voice, than to one adopted by the Executive in relation to a case before the courts, especially where individual rights or interests are involved.”67Bassiouni, supra note 3, at 117; see Sumitomo Shoji Am., Inc. v. Avagliano, 457 U.S. 176, 185 (1982). There are also concerns that the executive branch, in finding that an extradition request is inadequate, should not “expand the obligations of another nation in a treaty.”68In re Assarsson, 635 F.2d 1237, 1241 n.5 (7th Cir. 1980). In 2020, the Supreme Court noted that it has “never provided a full explanation of the basis for [its] practice of giving weight to the Executive’s interpretation of a treaty. Nor [has it] delineated the limitations of this practice.”69GE Energy Power Conversion Fr. SAS, Corp. v. Outokumpu Stainless USA, LLC, 590 U.S. 432, 444 (2020) (noting that although the Court has never provided a full explanation for the basis of executive deference, the Court’s “textual analysis aligns with the Executive’s interpretation so there is no need to determine whether the Executive’s understanding is entitled to ‘weight’ or ‘deference.’ ”). As it is generally understood that United States’ compliance with extradition treaties is beneficial to U.S. foreign policy, the executive branch’s interpretation of an extradition treaty that favors a relator’s extradition has considerable influence in extradition court proceedings.70Artukovic v. Rison, 784 F.2d 1354, 1356 (9th Cir. 1986) (“Such proper compliance promotes relations between the two countries, and enhances efforts to establish an international rule of law and order.”).

D.Due Process in the Extradition Process

Relators who are physically present in the United States and who a foreign government wishes to extradite are subject to the Due Process Clause of the Fifth Amendment of the U.S. Constitution.71Rivera, Interpreting Extradition Treaties, supra note 17, at 237–38; U.S. Const. amend. V (“No person shall . . . be deprived of life, liberty, or property, without due process of law . . . .”); Zadvydas v. Davis, 533 U.S. 678, 693 (2001); Valenzuela v. United States, 286 F.3d 1223, 1129 (11th Cir. 2002) (“[T]he judiciary must ensure that the constitutional rights of individuals subject to extradition are observed.”); Martinez v. United States, 793 F.3d 533, 556 (6th Cir. 2015) (“Courts have unanimously held that the government is bound by principles of due process in its conduct of extradition proceedings.”), rev’d on other grounds en banc, 828 F.3d 451 (6th Cir. 2016). Relators are also the beneficiaries of due process under international law. It is worthwhile to explore the domestic and international understandings of due process: both understandings of due process apply to extradition proceedings that occur in the United States.

Procedural due process “asks whether the government has followed the proper procedures when it takes away life, liberty or property.”72Erwin Chemerinsky, Substantive Due Process, 15 Touro L. Rev. 1501, 1501 (1999). Due process is contextually dependent on the type of liberty interests over which a court or agency is ruling.73Mathews v. Eldridge, 424 U.S. 319, 334 (1976) (“[D]ue process, unlike some legal rules, is not a technical conception with a fixed content unrelated to time, place and circumstances.” (quoting Cafeteria Workers v. McElroy, 367 U.S. 886, 895 (1961))). In considering due process claims, courts, depending on their context, are often compelled to balance the following factors established by the Court in Mathews v. Eldridge:

First, the private interest that will be affected by the official action; second, the risk of an erroneous deprivation of such interest through the procedures used, and the probable value, if any, of additional or substitute procedural safeguards; and finally, the Government’s interest, including the function involved and the fiscal and administrative burdens that the additional or substitute procedural requirement would entail.74Mathews, 424 U.S. at 335; see also Toledo v. U.S. Dep’t of State, No. 23-627, 2023 U.S. Dist. LEXIS 53048, at *23–24 (D.D.C. Mar. 28, 2023); Rivera, Speedy Extradition, supra note 6, at 265.

Although the extradition process is neither a criminal proceeding nor a trial, the extradition process affects relators’ liberty interests; relators do enjoy Constitutional rights, albeit in a different capacity than those protections the courts recognize for criminal defendants.75Artemio Rivera, Probable Cause and Due Process in International Extradition, 54 Am. Crim. L. Rev. 131, 167, 169 (2017) [hereinafter Rivera, Probable Cause and Due Process] (noting that “the process afforded to relators in extradition hearings is much lower than the one required by extradition treaties,” and that “magistrates at preliminary hearings afford criminal defendants much more process than relators are allowed at extradition hearings”). Given that extradition in the United States is a “bifurcated procedure” between the executive and judiciary branches, extradition is considered an executive process under the executive branch of the government76United States v. Lui Kin-Hong, 110 F.3d 103, 110 (1st Cir. 1997); Harshbarger v. Regan, 599 F.3d 290, 292 (3d Cir. 2010)., and the judiciary is tasked with applying its expertise in statutory interpretation, evidentiary requirements, and understandings of probable cause as well as other related legal concepts.77Kin-Hong, 110 F.3d at 110 (“This bifurcated procedure reflects the fact that extradition proceedings contain legal issues peculiarly situated for judicial resolution, such as questions of the standard of proof, competence of evidence, and treaty construction, yet simultaneously implicate questions of foreign policy, which are better answered by the executive branch. Both institutional competence rationales and our constitutional structure, which places primary responsibility for foreign affairs in the executive branch . . . support this division of labor.”). The Ninth Circuit has found that extradition courts have discretion in conducting their proceedings—as relators are not criminal defendants in United States criminal courts, the courts do not need to follow the procedural safeguards enforced in criminal proceedings, such as the Federal Rules of Civil Procedure and the Federal Rules of Evidence.78Rivera, Probable Cause and Due Process, supra note 75, at 135. Rather, their role is limited to “ensur[ing] that the government complies with the requirements of the extradition treaty and the extradition statute.”79Id. The judiciary is mindful that the extradition process is an executive function, and thus attempts to balance the interests of the relators with the interests of the executive branch.80In re Burt, 737 F.2d 1477, 1487 (7th Cir. 1984) (“We are reminded that before placing constraints on the executive branch’s foreign policy decision making, ‘we must move with the circumspection appropriate when [a court] is adjudicating issues inevitably entangled in the conduct of our international relations. To constrain the government by placing it on the duty to undertake its extradition decisions with an eye not only toward the legitimate international interests of the United States as determined by the branch charged with that responsibility, but also toward the prejudice that might result to an individual accused because of the amount of time that has elapsed, would be to distort the aims of the diplomatic effort.” (quoting Romero v. Int’l Terminal Operating Co., 358 U.S. 354, 383 (1959)).

The Due Process Clause is applicable to the liberty interests of relators, as “the consequences of extradition—the forceful surrender of a relator to a foreign country for criminal prosecution and imprisonment—affect” a relator’s Constitutional rights.81Rivera, Probable Cause and Due Process, supra note 75, at 149; see U.S. Const. amend. V. This is because “[r]elators face tremendous liberty losses” upon extradition, as the process is aimed at surrendering a relator to a foreign jurisdiction for criminal prosecution and imprisonment.82Rivera, Speedy Extradition, supra note 6, at 252, 292 (arguing that courts should more often utilize the balancing test from Mathews v. Eldridge in considering the due process rights of relators); United States v. Lui Kin-Hong, 110 F.3d 103, 106 (1st Cir. 1997) (“There is the ultimate safeguard that extradition proceedings before United States courts comport with the Due Process Clause of the Constitution.”). Therefore, the court hearing the extradition case must ensure that the extradition proceeding comports with a relator’s right to due process “in a manner consistent with the Constitution.”83Kent Wellington, Note, Extradition: A Fair and Effective Weapon in the War on Terrorism, 51 Ohio St. L.J. 1447, 1452 (1990); see Grin v. Shine, 187 U.S. 181, 184 (1902) (“[Extradition] treaties should be faithfully observed, and interpreted with a view to fulfill our just obligations to other powers, without sacrificing the legal or constitutional rights of the accused.”); Bassiouni, supra note 3, at 115; Jacques Semmelman, The Rule of Non-Contradiction in International Extradition Proceedings: A Proposed Approach to the Admission of Exculpatory Evidence, 23 Fordham Int’l L.J. 1295, 1300 (2000) (“The extradition magistrate is charged with protecting the accused’s due process rights, and the extradition hearing is the primary vehicle through which the accused is accorded due process.”).

As the purpose and structure of an extradition hearing differs from those of domestic criminal and civil proceedings, courts have deemed that the amount of procedures, and therefore due process, owed to relators differs from the procedures that are owed to criminal defendants.84Rivera, Speedy Extradition, supra note 6, at 276–77 (“[E]xtradition case law allows the government to prove its case through a low standard of proof, ‘probable cause’; the case may be proven, in whole or in part, through hearsay evidence; relators are not allowed to contradict the government’s evidence; the government may refile its case if it is denied certification because the doctrines of double jeopardy and res judicata are not applicable.” (footnotes omitted)); Vo v. Benov, 447 F.3d 1235, 1247 (9th Cir. 2006) (“[A]n extradition court’s decision not to consider evidence, or not to make findings relevant to a discretionary exception, does not violate due process.”); Collins v. Loisel, 262 U.S. 426, 429 (1923); In re Extradition of D’Monte, No. 22-MJ-230, 2023 U.S. Dist. LEXIS 202356, at *12 (D.P.R. Nov. 9, 2023) (“The full panoply of due process rights available to criminal defendants is not available to fugitives because an extradition proceeding culminates in a surrender to the foreign government, rather than in criminal punishment of any sort.”). Unlike its application of the Mathews analysis to other categories of cases that involve the deprivation of liberty, extradition courts do not uniformly apply the Mathews analysis factors of due process to determine whether the relator has sufficient due process.85Rivera, Speedy Extradition, supra note 6, at 265 (arguing that courts should more often utilize the balancing test from Mathews v. Eldridge in considering the due process rights of relators); Toledo v. U.S. Dep’t of State, No. 23-627, 2023 U.S. Dist. LEXIS 53048, at *24–25 (D.D.C. Mar. 28, 2023). In reviewing challenges to the constitutionality of extradition proceedings, the judiciary has found that “the totality” of the proceedings conducted by both judicial and executive branch “comports with the requirements of the Fifth Amendment, in light of the substantial process afforded in the judicial phase and the executive’s broad discretion to decide matters of foreign policy.”86Toledo, 2023 U.S. Dist. LEXIS 53048, at *24–25. Toledo appealed the decision of the district court, and the Ninth Circuit’s judgment in Toledo’s case is discussed in Part II. Courts find that the procedural requirements of 18 U.S.C. § 3186 and § 3184 are sufficiently protective of a relator’s due process rights and commensurate with the due process owed to relators to ensure that a relator is not extradited entirely “by Executive whim,” as the executive branch exercises its discretion “only if the magistrate determines that there is ‘evidence sufficient to sustain the charge under the provisions of the proper treaty.’ ”87Escobedo v. United States, 623 F.2d 1098, 1105 (5th Cir. 1980); 18 U.S.C. §§ 3184, 3186. The D.C. District Court rationalized the adequacy of the procedural due process given to relators in extradition proceedings:

[T]he risk of an erroneous deprivation absent an additional hearing conducted by the State Department and the furnishing of any unclassified documents relied upon is minimal . . . given [the relator’s] active role . . . in developing the record in his judicial proceedings and challenging the key determinations there, not to mention his ability to supplement the record in whatever way he wished before the State Department. Further, requiring the State Department to provide the additional opportunities for participation . . . would unnecessarily overtax Department resources without meaningfully expanding the scope of information considered and risks chilling the Department’s ability to freely obtain information and assurances from relevant foreign governments, which might be less willing to speak frankly if the information disclosed was not kept confidential.88Toledo, 2023 U.S. Dist. LEXIS 53048, at *23–24.

International law also affords due process rights to relators in the extradition process; due process is a fundamental human right under customary international law.89See Bassiouni, supra note 3, at 2, 54 (noting that “states have protected human rights by giving legal rights to individuals, entitling them to certain rights and placing limitations on the powers of the respective states” and “if the breach [of an extradition treaty by a state] is of an internationally protected right, or the result of lack of fairness or good faith by the parties in the application of rights stipulated in favor of third parties, or conceded to individuals as third-party beneficiaries under the particular treaty, then there is a violation of international law”). For context, customary international law can be defined as the “general and consistent practice of states followed by them from a sense of legal obligation.”90Restatement (Third) of Foreign Rels. L. of the U.S. § 102(2) 1987. The United States has signed the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, the Convention on Torture, the Hostage Convention, and, along with “other treaties, the United States has agreed, with certain reservations, to be bound by their provisions and to incorporate them into U.S. law.”91Powers, supra note 4, at 295–96. Within the United States, the federal judiciary has “applied rules of customary international law in countless cases since the founding of the Republic . . . treating customary international law rules in the same manner as U.S. treaties and other international agreements.”92Gary Born, Customary International Law in United States Courts, 92 Wash. L. Rev. 1642, 1644 (2017). The United States is bound by customary international law on its treatment of human rights, as human rights standards “are binding [on the federal judiciary] as jus cogens (i.e., overriding principles) under international law”—human rights treaties “may provide guidance in determining contemporary human rights norms that should inform a court’s decisions in extradition proceedings.”93Powers, supra note 4, at 295; see id. at 320 (“[E]xtradition is a criminal proceeding, and the standards of domestic criminal proceedings, as well as international human rights precepts, should inform the process.”); John Quigley, The Rule of Non-Inquiry and the Impact of Human Rights on Extradition Law, 15 N.C.J. Int’l L. & Com. Reg. 401, 415–16 (1990) (“In the mid-twentieth century . . . the law of human rights emerged as a body of law binding on states. That body of law is held by courts of the United States to be binding on them, even apart from any treaty obligation that the United States has assumed. Human rights law is relevant to extradition law in that among the human rights norms binding on states are prohibitions against prolonged arbitrary detention and against torture or other cruel, inhuman, or degrading treatment or punishment. International human rights law requires states to provide fair trials with a presumption of innocence and the rights to present a defense and to be represented by counsel.”). For the most part, as the judiciary has “treated rules of customary international law as rules of federal law,” the judiciary is compelled to uphold customary international law.94Born, supra note 92, at 1644; Powers, supra note 4, at 295 (“[H]uman rights law as derived from human rights treaties is superior to, and controlling over, other treaties, including extradition treaties, under public international law. Moreoever, even if the formal provisions of an extradition treaty are not violative of human rights norms, the application of those provisions might be . . . .”).

On the other hand, the principles of international law are made up of “rules of international law” that are “accepted as such by the international community of states . . . by derivation from general principles common to the major legal systems of the world.95Charles T. Kotuby Jr. & Luke A. Sobota, General Principles of Law and International Due Process: Principles and Norms Applicable in Transnational Disputes 21 (Ronald A. Brand ed. 2017) (citing Restatement (Third) of Foreign Rels. L. of the U.S. § 102(1) (Am. L. Inst. 1987)). Under principles of customary international law, due process is defined as “procedural norms . . . that are applicable to . . . limit governmental powers”—these norms include “[t]he right of equal access to courts, the right to equal treatment of litigants, the right to an effective remedy and the right to a fair hearing.”96Andrea Marilyn Pragashini Immanuel, Did Shamima Begum Receive Her Due Process under International Law?, OpinioJuris (Apr. 13, 2021), https://opiniojuris.org/2021/04/13/did-shamima-begum-receive-her-due-process-under-international-law [https://perma.cc/V2DN-GLAW]. Other aspects of the due process under international law include that “there shall be no common interest between the parties and the judge”97Kotuby & Sobota, supra note 95, at 71. and that each party has a “reasonable opportunity of presenting [their] case . . . under conditions which do not place [them] at substantial disadvantage vis-à-vis [their] opponent.”98Kaufman v. Belgium, App. No. 10938/84, 50 Eur. Comm’n H.R. Dec. & Rep. 98, 115 (1986). Importantly, as explored in Part III, another element of international due process is the “assurance that ‘the judiciary [is not] dominated by the political branches of government or by an opposing litigant . . . .’ ”99Charles T. Kotuby Jr., General Principles of Law, International Due Process, and Modern Role of Private International Law, 23 Duke J. Comp. & Int’l L. 411, 427 (2013) (quoting Restatement (Third) of Foreign Rels. L. § 482 cmt. b (1987)); see infra Part III. Charles T. Kotuby, Jr. and Luke Sobota, in General Principles of Law and International Due Process, outline the human rights conventions that affirm the obligation of sovereign nations to uphold the fundamental due process right of individuals:

The Inter-American Convention on Human Rights (IACHR)—building upon the principles set forth in “the Charter of the Organization of American States, in the American Declaration of the Rights and Duties of Man, and in the Universal Declaration of Human Rights”—imposes upon States the obligation to “respect the rights and freedoms” it enshrines “without any discrimination.” Included is the “right to a hearing, with due guarantees and within a reasonable time, by a competent, independent, and impartial tribunal, previously established by law.” The European Convention for the Protection of Human Rights and Fundamental Freedoms follows a similar pattern, providing . . . that “everyone is entitled to a fair and public hearing within a reasonable time by an independent and impartial tribunal established by law.”100Kotuby & Sobota, supra note 95 , at 61.

Within the U.S., the intersection of extradition and due process is especially poignant under the rule of non-inquiry. Non-inquiry is the concept that the judiciary is not compelled to inquire into the adequacy of the foreign proceedings to ensure that the proceedings in the foreign jurisdiction preceding the extradition request comport with “fundamental rights to due process”—this rule raises concerns about the judiciary’s role in complying with international due process requirements when responding to extradition requests from foreign jurisdictions.101Powers, supra note 4, at 314–16. But see Munaf v. Geren, 553 U.S. 674, 700–01 (2008) (“[I]t is for the political branches, not the judiciary, to assess practices in foreign countries . . . .”). In reviewing the procedures of the requesting country, the Ninth Circuit has said that it gives “credence to foreign proceedings” and that it declines “to rule on the procedural requirements of foreign law out of respect for other nations’ sovereignty.”102Sainez v. Venables, 588 F.3d 713, 717 (9th Cir. 2009). In doing so, the Ninth Circuit has understood the risk of “erroneous interpretation” of a foreign country’s legal system.103Emami v. U.S. Dist. Ct. for the N. Dist. of Cal., 834 F.2d 1444, 1449 (9th Cir. 1987). Courts generally see that the Secretary of State’s understanding of the treaty and of foreign criminal procedure should be considered as part of its considerations when interpreting a treaty document. This becomes especially important when questions regarding the foreign country’s political intentions for extraditing individuals are brought before the U.S. judiciary.

Relators often argue that the extradition proceedings lack due process even though the extradition process is not considered a full-fledged criminal trial.104See Sridej v. Blinken, No. 2:23-cv-00114, 2023 U.S. Dist. LEXIS 117727 (D. Nev. July 10, 2023) (dismissing relators’ argument that the extradition process is an “unfair adversarial process” that violates due process). These complaints relate to the statutes of limitations of crimes committed in foreign countries, the discretion of the court to consider whether the requesting country might torture the relator, the admissibility of hearsay evidence in extradition proceedings, and other findings that the procedure owed to relators is inadequate.105See id.; Emami, 834 F.2d at 1446–47; Venckiene v. United States, 929 F.3d 843, 861–62 (7th Cir. 2019); Powers, supra note 4; In re Burt, 737 F.2d 1477, 1487 (7th Cir. 1984) (“We hold that no standards of fair play and decency sufficient to trigger due process concerns are automatically implicated when, in undertaking its foreign policy mission, a governmental extradition decision subjects a citizen accused of committing crimes in a foreign jurisdiction to prosecution in the foreign state after a substantial time has elapsed since the commission of the crime.”); Trinidad y Garcia v. Thomas, 683 F.3d 952, 957 (9th Cir. 2012). However, relators have little redress when they argue that extradition proceedings are violative of due process, as the standard for finding a procedural defect in the process is high: this is due to the unique nature of an extradition proceeding as a proceeding akin to a preliminary hearing. The judiciary often finds that extradition processes should not be encumbered by more procedure.106See Sridej, 2023 U.S. Dist. LEXIS 117727, at *17–19; Rivera, Interpreting Extradition Treaties, supra note 17, at 204. The judiciary has found that,

[S]o long as the United States has not breached a specific promise to an accused regarding his or her extradition, and bases its extradition decisions on diplomatic considerations without regard to such constitutionally impermissible factors as race, color, sex, national origin, religion, or political beliefs, and in accordance with such other exceptional constitutional limits as may exist because of particularly atrocious procedures or punishments employed by the foreign jurisdiction, those decisions will not be disturbed.107In re Burt, 737 F.2d at 1487 (citation omitted).

Accordingly, as the discretion to extradite lies with the executive branch, “[t]he judiciary has no authority to impose requirements on the decision-making process that go beyond the scope of what is required under the Constitution.”108Venckiene, 929 F.3d at 863–64 (7th Cir. 2019).

II. INTERPRETING THE “CHARGING DOCUMENT”

A.Overview of the Circuit Split

Part II of this Note explores the difference in treatment of the phrase the “charging document” which the U.S. has included in at least twenty-eight bilateral extradition treaties.109See the list of treaties, supra note 5, for a complete overview. Part I outlined the history and reasoning behind the different tools of interpretation courts utilize in interpreting extradition treaties, and the due process rights that relators are afforded in the extradition process. Part II will cover how these interpretation tools have been implemented by the judiciary in its treatment of extradition treaties that include “the charging document” requirement in 2023.

In 2023, the Ninth and Fourth Circuits were charged with interpreting the phrase “the charging document” in two bilateral extradition treaties: the Ninth Circuit analyzed a bilateral extradition treaty between the U.S. and Peru, and the Fourth Circuit analyzed a bilateral extradition treaty between the U.S. and Lithuania.110Vitkus v. Blinken, 79 F.4th 352 (4th Cir. 2023); Manrique v. Kolc, 65 F.4th 1037 (9th Cir. 2023). These cases, Vitkus v. Blinken and Manrique v. Kolc, involved foreign nationals residing in the U.S. who were wanted by foreign countries for crimes allegedly committed by the foreign nationals in their respective countries of nationality. Both cases rose to the federal circuit courts after the foreign nationals petitioned for stays and preliminary injunctions on their extradition requests. The relators in each case argued that they were not extraditable as the foreign countries did not provide “the charging document,” a document listed under the required documents section of the relevant extradition treaties that a requesting country must provide in its extradition request. The two courts diverged over how to interpret the phrase, or even whether there was a need to interpret the phrase and apply the default rule. The implications of this divergence will be explored in Part III of this Note.111Infra Part III.

B.Manrique v. Kolc

In 2023, the Ninth Circuit reviewed a petition filed by former president of Peru, Alejandro Toledo Manrique,112Individuals often have two last names in Latin America. When referred to by only one of the last names, the first of the two last names is used. Accordingly, this Note refers to Alejandro Toledo Manrique as Toledo. to stay Toledo’s extradition from the U.S. to Peru while appealing the denial of his petition for writ of habeas by the U.S. District Court for the Northern District of California.113Manrique, 65 F.4th at 1040. Peruvian prosecutors sought to extradite Toledo to Peru from the United States after they alleged that Toledo had committed money laundering and collusion, specifically “taking $20 million in bribes from Odebrecht, a giant Brazilian construction company that has admitted to U.S. authorities that it bribed officials to win contracts throughout Latin America for decades.”114Olga R. Rodriguez, US Judge Orders Peru Ex-leader Detained for Extradition, AP News (Apr. 19, 2023, 2:16 PM) https://apnews.com/article/peru-expresident-extradition-court-aedb5ca6e502e505648944ebddea523d [https://perma.cc/U64Z-SU5L]; see Manrique, 65 F.4th at 1040. The Peruvian investigators had investigated or put on trial almost every living former president of Peru while conducting sweeping investigations of those who might have participated in the bribery with the Odebrecht company.115Rodriguez, supra note 114.

Peru brought the accusations against Toledo in “two Prosecutor’s Decisions, documents that summarize the ongoing investigation, and in an Acusación Fiscal, a document produced at the end of an investigation that lays out the crimes allegedly committed and supporting evidence.”116Manrique, 65 F.4th at 1040. After the Supreme Court of Justice of Peru approved an extradition request for Toledo, the Peruvian government filed an extradition request with the United States in 2018 and sent a supplemental request in August 2020.117Id.

In July 2019, a United States federal prosecutor filed a criminal complaint against Toledo, and two years later, a United States magistrate judge in the U.S District Court for the Northern District of California certified Toledo’s extradition.118Manrique v. O’Keefe, No. 21-CV-08395, 2022 WL 1212018, at *2 (N.D. Cal. Apr. 22, 2022); Manrique, 65 F.4th at 1040. Separately, Toledo filed suit in the D.C. District Court to enjoin the U.S. Department of State from extraditing him to Peru, claiming that his extradition was politically motivated and that the decision to extradite him violated due process because the Secretary of State “did not ‘disclose the unclassified bases for its decisions’ or ‘afford Dr. Toledo and his counsel an opportunity to rebut those bases in a full and fair exchange of views.’ ”119Toledo v. U.S. Dep’t of State, No. 23-627, 2023 U.S. Dist. LEXIS 53048, at *1, 6, 15–16 (D.D.C. Mar. 28, 2023) (quoting Complaint for Injunctive and Declaratory Relief, Toledo, 2023 U.S. Dist. LEXIS 53048, at ¶¶ 55, 59). The District Court rejected Toledo’s arguments and wrote that the Secretary of State’s decision to extradite Toledo was based on considerations of international law on political extradition and that Toledo had been afforded adequate due process in the proceedings prior to the Secretary of State’s decision to extradite Toledo.120Id. at *7–8, 24–25. Following multiple appeals, the Ninth Circuit heard Toledo’s appeal of the denial of his writ of habeas corpus in April 2023.121Manrique, 65 F.4th at 1040.

Toledo asserted that “he was not ‘charged with’ an extraditable offense because the extradition treaty requires a formal charge” and that “the ‘charging document’ Peru submitted was insufficient.”122Id. at 1041. In reviewing Toledo’s appeal, the Ninth Circuit took a holistic approach to Toledo’s assertions regarding the charging document requirement within the United States-Peru Extradition Treaty. First, the Ninth Circuit analyzed the purpose of the United States-Peru Extradition Treaty, noting that “Article I of the United States-Peru Extradition Treaty provides for extradition of ‘persons whom the authorities in the Requesting State have charged with, found guilty of, or sentenced for, the commission of an extraditable offense.’ ”123Id. (citing Extradition Treaty Between the United States of America and the Republic of Peru, Peru-U.S., July 26, 2001, T.I.A.S. No. 03-825). Next, the Ninth Circuit provided background on Peruvian criminal procedure:

[A] Peruvian criminal proceeding has three phases: (1) preliminary or investigative, (2) intermediate or examining, and (3) trial. First, during the investigative phase, a prosecutor examines the facts and presents allegations to a judge of the Preliminary Investigation Court. When the investigation ends, the prosecutor must decide whether to dismiss the case or to issue an Acusación Fiscal and then seek a formal charge. Once a formal charge is sought, the prosecutor cannot further investigate. Second, during the examining phase, a judge of the Preliminary Investigation Court holds a preliminary hearing, during which the accused may object and present exculpatory evidence. At the end of this hearing, if the judge believes a formal charge is warranted, the judge issues an Orden de Enjuiciamiento. Finally, if an Orden de Enjuiciamiento issues, the parties proceed to a trial presided over by the Criminal Judge or the President of the Collegiate Court.124Id. at 1041–42.

As Peru had issued an Acusación Fiscal in the corruption case against Toledo, the parties fought over “whether the accusations contained in the Acusación Fiscal suffice to ‘charge’ Toledo ‘with’ an extraditable offense under the Treaty.”125Id. at 1042. Toledo argued “that the United States-Peru treaty . . . requires ‘a copy of the charging document’ in addition to an arrest warrant.”126Id.; Extradition Treaty Between the United States of America and the Republic of Peru art. VI(3), Peru-U.S., July 26, 2001, T.I.A.S. No. 03-825. In rebutting Toledo’s assertion that a charging document was necessary and was not satisfied by the Acusación Fiscal, the U.S. government supported its argument by noting that the provision “charged with” elsewhere in the treaty was sufficient for the extraditing country to argue that a relator could be extradited without providing any specific document or official charge—therefore, the Acusación Fiscal satisfied the charging document.127Manrique, 65 F.4th at 1043.

The Ninth Circuit looked at the text of the treaty to determine the significance of the “charging document” provision within the United States-Peru Extradition Treaty in its entirety. The court found that the addition of “the charging document” was not necessary to find that Peru satisfied the requirements of the extradition treaty, finding support in Emami v. United States District Court for the Northern District and In re Assarsson. In both Emami and Assarsson, there was no “formal charge” listed in the U.S.-Sweden and U.S.-Federal Republic of Germany treaties to find that a relator might be extraditable, and as such, the requirement that there be “formal charges” in the foreign jurisdiction before the foreign country filed an extradition request was not a necessary requirement to find that the relators were extraditable.128Id. at 1042–43; Emami v. U.S. Dist. Ct. for the N. Dist. of Cal., 834 F.2d 1444 (9th Cir. 1987); In re Assarsson, 687 F.2d 1157, 1160 (8th Cir. 1982). The court utilized these cases even though neither case dealt with a “charging document” requirement. In Toledo’s case, the court found that “the Treaty does not mention formal charges or the Orden de Enjuiciamiento anywhere. And the requirement of a ‘copy of the charging document’—which specifies no particular document—does not define the level of formality [they] should read into ‘charged with.’ ”129Manrique, 65 F.4th at 1043. The court found that such a reading would allow the Acusación Fiscal to be permitted as a “charging document” given that language elsewhere in the U.S.-Peru treaty equated “charged with” to “sought for prosecution,” and that the documents indicating an individual was “sought for prosecution” could encompass documents submitted before the Orden de Enjuiciamiento in Peruvian criminal proceedings—that is, the Acusación Fiscal—therefore satisfying the treaty’s requirements.130Id. at 1042.

The Ninth Circuit furthered its analysis, finding that if “the charging document” was ambiguous, then the treaty’s drafting history and judicial precedents would assist the court in determining how to interpret the provision. The court stated that “charged with” could be broadly interpreted to mean any warrant-backed accusation presented by the Peruvian or United States governments, essentially making “the charging document” requirement null.131Id. at 1043. The court looked to the Technical Analysis of the United States-Peru Extradition Treaty, which stated:

[T]he negotiating delegations intended that “charged” persons include those who are sought for prosecution for an extraditable offense based on an outstanding warrant of arrest, regardless of whether such warrant was issued pursuant to an indictment, complaint, information, affidavit, or other lawful means for initiating an arrest for prosecution under the laws in Peru or the United States.132Id. (citing S. Exec. Doc. No. 107-12, at 4 (2002), https://www.congress.gov/107/crpt/erpt12/CRPT-107erpt12.pdf [https://perma.cc/KCE7-74BX]).

The court further noted that “[their] rules of interpretation militate against reading in a requirement of particular formal charges where the treaty makes no such specification.”133Id. Critically, the Ninth Circuit applied the default rule of treaty interpretation to Toledo’s case. Utilizing support from Supreme Court precedents, the court found that it should defer to the government agencies who were charged with negotiating and enforcing the treaty, as “such a construction enlarges the rights of the signatories and respects the interpretations given by [the] Executive Branch and the Peruvian government.”134Id.; E. Airlines, Inc. v. Floyd, 499 U.S. 530, 535 (1991); Sumitomo Shoji Am., Inc. v. Avagliano, 457 U.S. 176, 184–85 (1982). The court found that because the treaty does not require that the requesting country provide formal charges to satisfy the extradition treaty’s requirements when submitting an extradition request, the Acusación Fiscal was sufficient to satisfy “the charging document” mandate. Moreover, in analyzing Peruvian criminal procedure, the court found that the Acusación Fiscal was a “charging document” as it provided a plethora of evidence, serving “the important purpose in the Peruvian system of signaling the end of discovery and moving the case from the prosecutor’s office to a judge of the Preliminary Investigation Court.”135Manrique, 65 F.4th at 1043. Interestingly, the Ninth Circuit’s approach in Manrique v. Kolc hints at a break from its “giving credence to foreign proceedings.” Sainez v. Venables, 588 F.3d 713, 717 (9th Cir. 2009) (stating that the court was unwilling to “analogize a Mexican arrest warrant to an American indictment,” as the Court believed it was “adhering to [its] established approach of giving credence to foreign proceedings. . . . [It has] declined to rule on the procedural requirements of foreign law out of respect for other nation’s sovereignty.”).

In summary, the Ninth Circuit found that “the charging document” was an ambiguous term; properly interpreting it required extrinsic evidence and consideration of the two sovereign countries’ rights. Accordingly, the court relied on the draft treaty provisions and the Peruvian government’s standards around criminal procedure to analogize the Acusación Fiscal to a document that would satisfy “the charging document” requirement of the United States-Peru Extradition Treaty. It did so under the standard default rule. Because the Treaty was meant to expand the rights of the parties involved (in this case, the United States and Peru) to encourage extradition and the Treaty did not specify what document was required to extradite Toledo under the “charging document” requirement, Acusación Fiscal could be construed to be the charging document. However, as mentioned earlier in this Note, the Ninth Circuit had historically found that this approach might be prone to error.136Sainez, 588 F.3d at 717.

Notably, as previously discussed, the Ninth Circuit utilized two cases regarding two treaties which did not include “the charging document” requirement to find that the Secretary of State had satisfied the requirements to extradite Toledo. By doing so, the court diminished the requirement that Peru provide a “charging document” when it found that the treaty had allowed for the extradition of individuals who were simply “charged with” extraditable offenses. Ultimately, this approach to “the charging document” requirement in the United States-Peru Extradition Treaty hints at the judiciary’s use of the default rule to ensure that the rights of sovereign nations are not infringed upon when they file an extradition request with the United States. After the Ninth Circuit’s decision, Toledo surrendered to be extradited to Peru in April 2023.137Peru Ex-Leader Toledo Surrenders to be Extradited from US, AP News (Apr. 21, 2023, 11:01 AM), https://apnews.com/article/peru-expresident-extradition-court-417bb6255a550ed01ddded474b3de47b [https://perma.cc/R2CR-UAEE].

C.Vitkus v. Blinken

In 2023, the Fourth Circuit heard an appeal of a denial of preliminary injunction brought by Darius Vitkus, a citizen of the Republic of Lithuania.138Vitkus v. Blinken, 79 F.4th 352, 352 (4th Cir. 2023). Vitkus sought to prevent Lithuania from extraditing him for crimes he allegedly committed in 2008 and 2009 by filing for preliminary injunctive relief and a petition for writ of habeas corpus.139Id. at 354–56. Vitkus owned a real estate business in Lithuania, and after it fell into bankruptcy proceedings, the Lithuanian authorities investigated him for various financial crimes between 2008 and 2010.140Id. at 355–56. Notably, following the Lithuanian authority’s summons for questioning, Vitkus testified “that the Lithuanian police officers tied him to a chair, beat him, deprived him of water . . . , burned him with cigarettes” and asked about his political activities.141Id.

Vitkus received three “Notification of Suspicion” documents during Lithuania’s criminal investigations, which all separately informed Vitkus that (1) he was a suspect in the Lithuanian authorities’ investigation of him, (2) he allegedly violated specific “Lithuanian code provisions,” and (3) he had engaged in “suspected criminal conduct.”142Id. at 356. After Vitkus left Lithuania, the Lithuanian authorities issued two orders of arrest for Vitkus.143Id. The Lithuanian prosecutors created a document called a “Decision to Recognize D. Vitkus as a Suspect,” which “described Vitkus’s suspected criminal conduct and identified the implicated provisions of the Lithuanian criminal code”—this was allegedly decided based on the evidence the Lithuanian prosecutor gathered.144Id. After moving to the United States, Vitkus applied for asylum and protection under the Convention Against Torture given his treatment by the Lithuanian government, which the Board of Immigration Appeals certified.145Id. at 356–57.

In May 2015, the Lithuanian government requested that the United States extradite Vitkus to Lithuania, advising the Department of State that Vitkus was a suspect in a criminal investigation and “wanted for prosecution in Lithuania in connection” with the various criminal investigations.146Id. at 357. Lithuanian prosecutors provided supporting documents for their allegations against Vitkus that “summarized evidence gathered during the three investigations, along with copies of three orders for Vitkus’s arrest issued in connection with those investigations.”147Id. Lithuania provided three Notifications of Suspicion and two Suspect Decisions to the United States, which later became the subjects of debate in the Secretary of State’s argument for extraditing Vitkus.148Id.

In response to Lithuania’s request, “the Secretary of State filed an extradition complaint in the Southern District of Florida, where Vitkus was then residing,” and extradition proceedings commenced in the Southern District of Florida.149Id. During the proceeding, Vitkus argued that the Notifications of Suspicion and Suspect Decision did not “satisfy the charging document mandate” of the United States-Lithuania Extradition Treaty.150Id. at 357–58. Vitkus also utilized the evidence provided by a Lithuanian attorney “who testified that, under Lithuanian law, only one document—an ‘indictment’—can be a ‘charging document’ for purposes of the charging document mandate.”151Id. Additionally, in a footnote in the opinion, the Lithuanian attorney “testified that only an indictment could initiate a prosecution in Vitkus’s case.” Id. at n.5. The extradition court found that “deference was warranted to the Treaty interpretation of the Secretary of State and supported by Lithuania” and “ruled that the Notifications of Suspicion and Suspect Decisions ‘are sufficient to meet the requirements of’ the charging document mandate.”152Id. at 358. The court analyzed the extradition treaty between Lithuania and the United States, and utilized the executive branch’s argument to deny Vitkus’s argument that Lithuania did not comply with “the charging document” requirement of the extradition treaty:

The Secretary argued that the only purpose of the charging document mandate is to identify the charges for which Lithuania seeks to extradite Vitkus, and that the mandate does not require the initiation of any criminal charges. According to the Secretary, the charging document mandate is satisfied by the Notifications of Suspicion and Suspect Decisions. The Secretary supported that position with an affidavit of an attorney at the Department of State . . . and with a letter from a Lithuanian official called the Prosecutor General . . . . The State Department Affidavit averred that the Notifications of Suspicion and the Suspect Decisions are sufficient to satisfy the charging document mandate. And the Prosecutor General Letter maintained that the Notifications of Suspicion and Suspect Decisions ‘would be the equivalent of the charging documents referred to in’ the charging document mandate. The Letter also asserted that the proof required to identify a person as a suspect—and thus issue a Notification of Suspicion or Suspect Decision—‘should not be of the same level as necessary to substantiate the judgment of conviction or bringing charges (this occurs at a later stage of the criminal proceedings).’ ”153Id.

In a separate procedure following his transfer to Virginia, Vitkus filed a petition for a writ of habeas corpus and sought declaratory and injunctive relief in the Eastern District of Virginia. The court rejected Vitkus’s charging document argument, as it stated “that it gave ‘great weight’ to the Treaty interpretation presented by the Secretary of State,” and found that, along with the affidavits provided by the State Department and Prosecutor, the charging document mandate “can be satisfied by a document identifying ‘the violations of Lithuanian law that form the basis of Mr. Vitkus’s extradition, and . . . describ[ing] the facts underlying those alleged violations.’ ”154Id. at 360 (alteration in the original).

The Eastern District of Virginia summarized the Secretary of State’s argument in support of Vitkus’s extradition:

Lithuania has complied with the charging document mandate. Similar to Vitkus, the Secretary maintains that the language of the charging document mandate is plain and unambiguous. The Secretary maintains, however, that the charging document mandate does not require production of any particular type of charging document, and that it does not demand production of an indictment or something similar. According to the Secretary, the charging document mandate only requires the Requesting State to produce documents that sufficiently detail the alleged criminal violations and conduct, such as the Notifications of Suspicion and Suspect Decisions. The Secretary argues that the federal courts have consistently interpreted other treaties made by the United States to allow for extradition of persons who have not actually been criminally charged. Finally, the Secretary insists that, if the relevant text of the Treaty is ambiguous, his proposed construction thereof—that the charging document mandate requires only a document detailing suspected criminal conduct—adheres to the Treaty’s requirements and is entitled to deference.155Id. at 361.

The Fourth Circuit overturned the Eastern District of Virginia’s judgment. The majority of the Fourth Circuit found that “the Secretary’s construction of the charging document mandate does not ‘follow from the clear Treaty language’ ” and, therefore, the district court erred in utilizing it in its decision to reject Vitkus’s petition for a preliminary injunction.156Id. at 362. The Court of Appeals for the Fourth Circuit first looked to the text of the treaty, finding that “if the [treaty’s] textual meaning is plain and cannot reasonably bear the government’s construction, then [the court] must reject that construction.”157Id. (citing Aguasvivas v. Pompeo, 984 F.3d 1047, 1058 (1st Cir. 2021)). The court looked to Article 8 § 3 of the Treaty, which requires that the Requesting State produce “a copy of the charging document.”158Id. at 363; Protocol on the Application of the Agreement on Extradition Between the United States of America and the European Union to the Extradition Treaty Between the Government of the United States of America and the Government of the Republic of Lithuania, Lith.-U.S., art. 8, June 15, 2005, T.I.A.S. No. 10-201.14. The Fourth Circuit noted that the “Secretary of State is not entitled to extradite Vitkus unless Lithuania first produces . . . a copy of ‘the charging document.’ ”159Vitkus, 79 F.4th at 363. Looking at the grammatical structure of the phrase “the charging document,” the court found that the treaty required a “discrete document that initiates criminal charges” and that “the charging document mandate is plain and unambiguous, and it cannot be fulfilled by some document (or set of documents) that fails to perform the charging function—even if it or they contain similar information to ‘the charging document.’ ”160Id.

Moreover, the court utilized extrinsic evidence and looked to the Federal Rules of Criminal Procedure to analyze the “charging document” requirement in the treaty between the United States and Lithuania and analogize documents that the Lithuanian prosecutors produced in their investigation of Vitkus to relevant documents in U.S. criminal procedure.161Id. at 363–64. The Fourth Circuit found that the charging document mandate required that a requesting country produce a document “that performs the same function as an indictment, information, or complaint” in the United States.162Id. at 364. The court found that the documents that the Lithuanian government produced were akin to the “subject letters” and “target letters” which are used by federal prosecutors in the United States to inform individuals that they “are either a ‘subject’ or a ‘target’ of a federal criminal investigation.”163Id. The Fourth Circuit summarized their findings on the matter by stating:

Critically, those identified as federal “subjects” and “targets” of criminal investigations have not been charged—unless and until they become defendants by virtue of an indictment, an information, or a complaint. The Notifications of Suspicion and Suspect Decisions relied on by the Secretary of State did not initiate criminal charges against Vitkus. They simply characterize him as a suspect, and thus do not satisfy the plain and unambiguous language of the Treaty’s charging document mandate.164Id.

The court also relied on the evidence provided by the Lithuanian attorney supporting this argument, noting that the documents provided by the Lithuanian government “remain in a pretrial investigation stage” and that there is a difference “between the sufficiency of evidence needed to confer the status of ‘suspect’ and that needed to ‘bring[] charges,’ which ‘occurs at a later stage of the criminal proceedings.’ ”165Id. at 365 (alteration in the original). The Fourth Circuit acknowledged the Secretary of State’s argument that the United States had extradited individuals who had not been formally charged in the requesting country prior to the extradition request.166Id. The Fourth Circuit compared the United States-Lithuania treaty to other treaties which show either the absence of “the charging document” requirement—in a form of expressio unius interpretation—or contain the requirement that requesting countries produce “a copy of the charging document, if any” to indicate the importance of a specific charging document in extradition proceedings between Lithuania and the United States.167Id. at 365–66. Additionally, the Fourth Circuit found that the inclusion of the charging document requirement was intentional, and that “the Treaty language agreed to by the parties must be adhered to and carry the day.”168Id. at 366. The Fourth Circuit stated that Lithuania could not proceed with the extradition without producing the charging document, as Lithuania “cannot produce ‘the charging document’ when no criminal charges have been filed.”169Id.

The Fourth Circuit explicitly rejected the Ninth Circuit’s statement that “the charging document mandate ‘makes no difference’ ” given its arguments regarding the grammatical structure of the phrase, the evidence provided by both parties, and the text of the treaty.170Id. The Fourth Circuit also denied the Secretary of State’s interpretation of the treaty, arguing that as the charging document mandate was clear and unambiguous, the court “do[es] not owe deference to the Secretary.”171Id. at 367. In doing so, it found that the Notifications of Suspicion and Suspect Decisions produced by the Lithuanian prosecutors did not initiate criminal charges against Vitkus and were insufficient to satisfy the extradition treaty’s requirements.

Judge Quattlebaum, writing the dissenting opinion in Vitkus v. Blinken, highlighted the majority’s unwillingness to utilize the default rule. Judge Quattlebaum noted that “the district court’s decision to side with the Secretary’s interpretation over Vitkus’ faithfully applies Supreme Court precedent requiring deference to the Secretary.”172Id. at 369 (Quattlebaum, J., dissenting). Judge Quattlebaum found that “the Secretary produced evidence supporting a broader interpretation of [the charging document] in the context of an international extradition treaty,” by providing context regarding the nature of the Lithuanian prosecutor’s documents in support of its extradition of Vitkus to Lithuania.173Id. Judge Quattlebaum also appeared to be persuaded by an affidavit written by a State Department attorney, who noted that the treaty between Lithuania and United States includes provisions for extraditing individuals who are “sought for prosecution,” and “that a formal indictment cannot be sought under Lithuanian law until the prosecution receives Vitkus’ position on the notification of suspicion documents.”174Id. at 370–71.

Judge Quattlebaum found both the Secretary’s interpretation of the treaty and Vitkus’s interpretation of the treaty plausible.175Id. at 371. He found that within the extradition treaty between the United States and Lithuania,

Article 8, the section setting forth the required documentation that must accompany an extradition request, refers to individuals ‘sought for prosecution.’ [W]hile . . . ‘charged with’ may suggest a formal charge, ‘sought for prosecution’ is broader. It could also be plausibly read . . . to include persons wanted for prosecution by Lithuania, such as Vitkus, who are wanted to stand trial for specific crimes, but for whom a formal charging document akin to the ones used in the United States may not have been issued.176Id. (citation omitted) (internal quotation omitted).

In stating that the Secretary’s argument was plausible, Judge Quattlebaum utilized the default rule to argue that the judiciary should defer to the executive branch’s interpretation of a treaty when two possible interpretations are apparent.177Id. at 369. Judge Quattlebaum found that the Ninth Circuit’s opinion in Manrique v. Kolc was persuasive, given that the Ninth Circuit similarly analyzed “the charging mandate” within the extradition treaty between the United States and Peru, and that Vitkus presented the same argument that Toledo presented to the Ninth Circuit.178Id. at 372–73. Judge Quattlebaum noted that the court denied Toledo’s argument, as the treaty between Peru and the United States did not have explicit language mentioning “formal charges or the Orden de Enjuiciamiento,” and that the court “noted that documents submitted by Peru sufficiently identified the crimes that the petitioner was accused of and summarized the supporting evidence.”179Id. at 372. Judge Quattlebaum also found the court’s deference to the executive branch indicative of how the treaty between Lithuania and the United States should be interpreted.180Id. at 372–73. Finally, in concluding, Judge Quattlebaum stated, “the Secretary’s view that documents submitted by Lithuania satisfy the treaty’s charging document requirement is, at the very least plausible. When that is the case, we must defer to the Executive Branch’s interpretation of treaties that it has been charged with negotiating and enforcing.”181Id. at 373.

Given the discrepancy between the foreign criminal court procedures in Peru and Lithuania, it is unclear whether the Fourth Circuit would have found that Peru satisfied the requirements of its extradition request. However, the Fourth Circuit’s opinion sheds light on the relationship between the executive and judiciary branches in extradition proceedings: it is apparent that the Secretary of State’s influence on extradition is substantial, especially when the judiciary analyzes treaty agreements. When the court in Vitkus v. Blinken acknowledged the default rule, it noted the competing interests at stake in Lithuania’s extradition request, namely the executive’s interest in maintaining foreign relations and the public’s interest “in seeing its governmental institutions follow the law.”182Id. at 368 (citing Roe v. Dep’t of Def., 947 F.3d 207, 230–31 (4th Cir. 2020)). Nevertheless, by determining that the “charging document” lacked the requisite ambiguity to apply the default rule, and accordingly, finding the executive’s interest did not outweigh the public’s interest in seeing the government follow the law, the Fourth Circuit upheld Vitkus’s fundamental due process rights by following the procedures outlined in the treaty as written and ensuring that the extradition proceeding was fair. The Fourth Circuit’s decision and its implications will be explored further in Part III.

III.  INTERNATIONAL RELATIONS AND DUE PROCESS

A.Due Process and Treaty Interpretation

Although not directly stated in the circuit courts’ opinions, the analyses of the Lithuania-United States and Peru-United States extradition treaties shed light on the due process rights afforded to relators in the United States. The constitutional rights of relators, vested in them by their presence in the United States, are at odds with the executive branch’s responsibility to uphold relations between the United States and foreign nations.183See supra Part I. The Fourth Circuit’s interpretation of “the charging document” upheld Vitkus’s due process rights—the Fourth Circuit deferred to the plain language of the treaty, and finding the executive branch’s argument unpersuasive, ensured that the executive’s influence did not overshadow the judiciary’s role in the extradition process.

Legal scholars have analyzed the intersection of due process and the extradition process, focusing on the rule of non-inquiry, the possibility of double jeopardy, the rule of specialty, and hearsay exceptions. Additionally, due process concerns intersect with the appropriateness of a court’s use of the default rule to interpret provisions of extradition treaties because broadening of the rights of the nations who sign extradition treaties affects the liberty of a person sought for extradition.184See Rivera, Probable Cause and Due Process, supra note 75, at 159.

International due process encompasses “the assurance that ‘the judiciary [is not] dominated by the political branches of government,’ ”185Kotuby, supra note 99, at 427 (2013) (quoting Restatement (Third) of Foreign Rels. L. § 482 cmt. b (1987)). and implicitly in accordance with this principle, the Fourth Circuit limited the executive’s political objective by enforcing its statutorily granted power to deny extradition. Powerless to change the structure of the United States-Lithuania treaty, the Fourth Circuit, in its decision in Vitkus v. Blinken, highlights not only the importance of specificity in extradition treaties but also the risk of harming an individual’s fundamental right to due process by giving undue deference to the executive branch’s interpretation of extradition treaties.

The default rule of treaty interpretation, as addressed in Part I of this Note, has been criticized by scholars for being outdated: it was formed before human rights concerns of relators were properly addressed by courts in considering whether to certify the relators’ extradition to the requesting country.186Supra Part I; see Rivera, Interpreting Extradition Treaties, supra note 17, at 202. The judiciary implemented the default rule at a time when human beings were not subjects of international law—when the Supreme Court issued its Laubenheimer decision in 1933, sovereign countries, not individuals, were considered the beneficiaries of rights that flowed from treaties.187See Kate Parlett, The Individual in the International Legal System: Continuity and Change in International Law 26 (2011); Peter J. Spiro, Treaties, International Law, and Constitutional Rights, 55 Stan. L. Rev. 1999, 2001 (2003) (“The nature of treatymaking . . . has changed, moving in a direction that should systematically protect against the diminishment of rights. Where international law was once blind to individuals as such, today we find an increasingly consequential umbrella of individual rights protections in the form of international human rights norms. . . . Where states were once free to bargain away individual rights . . . they now must account for them under other treaty and nontreaty norms.”). The default rule upheld the sovereign signatories’ right to extradite individuals wanted for prosecution, and continues to be upheld in some form by the Vienna Convention on the Law of Treaties.188See supra note 54. The default rule continues to exert influence over the extradition interpretation process even as the human rights of relators have become a prominent and important consideration in the extradition process.189Parlett, supra note 187, at 36–37.

The Ninth Circuit’s understanding of Peruvian criminal procedure and the deference it afforded the United States executive branch bring to light the potential risks of applying the default rule. The court in Manrique v. Kolc considered the evidence provided by both the Peruvian prosecutors and the State Department to understand “the charging document” requirement in the Peru-United States Extradition Treaty, and in doing so, the court contextualized the requirements of the treaty.190Manrique v. Kolc, 65 F.4th 1037, 1042–43 (9th Cir. 2023). This analysis favored the Secretary of State’s interpretation—as noted previously, extradition proceedings are distinct from criminal trials, and the judiciary may be comfortable with some bias in a proceeding that does not determine the guilt or innocence of the accused.191United States v. Lui Kin-Hong, 110 F.3d 103, 120 (1st Cir. 1997) (citing In re Kaine, 55 U.S. (14 How.) 103, 113 (1852)). However, the court’s deference to the Secretary of State’s interpretation of the “charging document” could be read as the court’s inclination to uphold foreign relations with Peru at the potential expense of Toledo’s liberty rights. As the court acknowledged, the risk of misinterpreting the requirements of the treaty was great: Toledo would be sent to Peru to face trial and be imprisoned, and his ability to file a habeas petition would be nullified by his presence in the Peruvian criminal justice system.192Manrique, 65 F.4th at 1041.

Vitkus v. Blinken implicitly renounces the traditional application of the default rule: the Fourth Circuit alludes to the pressure the executive branch places on the judiciary to comply with the Secretary of States’s understanding of a provision of a treaty—especially when the judiciary finds that the provision in question is clear and unambiguous.193Vitkus v. Blinken, 79 F.4th 352, 367 (4th Cir. 2023) (“[T]he Secretary of State maintains that we are obliged to defer to his interpretation of the Treaty, even if we would not adopt that construction de novo.”). In finding that “the charging document” mandate was clear and unambiguous in its requirement that a discrete document was to be produced by the Lithuanian government, the Fourth Circuit protected Vitkus from a questionable extradition request when it found that the treaty required that the requesting country produce a specific document charging him with a crime. By doing so, the Fourth Circuit found clarity in the procedural requirements established in the extradition treaty and potentially upheld Vitkus’s Fifth Amendment due process rights. However, it is important to note that should the majority of the Fourth Circuit have found that “the charging document” requirement was an ambiguous provision in the treaty, then there would have been a possibility that the court would have applied the default rule.

The Fourth Circuit also implicitly respected principles of international law on due process by ensuring that the political branch did not dominate the proceeding by compelling the court to recognize its interpretation of “the charging document” requirement.194Kotuby, supra note 99, at 427 (quoting Restatement (Third) of Foreign Rels. L. § 482 cmt. b (1987)). International due process requires that trials are “fair” and are not “dominated” by the political branch.195See id.; Bassiouni, supra note 3, at 2, 54 (“[S]tates have protected human rights by giving legal rights to individuals, entitling them to certain legal rights and placing limitations on the powers of the respective states” and “if the breach [of an extradition treaty by a party] is of an internationally protected right, or the result of lack of fairness or good faith by the parties in the application of rights stipulated in favor of third parties, or conceded to individuals as third-party beneficiaries under the particular treaty, then there is a violation of international law.”); Powers, supra note 4, at 415–16. However, as discussed previously, extradition proceedings are not trials, and a challenge against an extradition proceeding for being “unfair” was notably discounted by a Nevada District Court in 2023 in Sridej v. Blinken, in which the court referenced two cases from the 19th and early 20th centuries to note that the extradition procedure did not require the formalities of other judicial proceedings.196See Sridej v. Blinken, No. 23-cv-00114, 2023 U.S. Dist. LEXIS 117727, at *18 (D. Nev. July 10, 2023) (“Extradition proceedings are neither criminal trials nor full blown civil actions; they are administrative in character, and . . . are not burdened with legalism and formalities with which American courts are familiar.” (citing Wright v. Henkel, 190 U.S. 40 (1903) and In re Kaine, 55 U.S. (14 How.) 103 (1853))). This case also underscores contemporary federal judiciary’s deference to understandings of international law codified before the duties of upholding international due process became binding on the American judiciary. Accordingly, although Vitkus might have been able to raise that the executive branch’s interpretation of “the charging document” would not be “fair,” it would be unlikely to be held as a viable argument against the certification of his extradition by the judiciary.

The interpretive dissonance surrounding “the charging document” requirement could be remedied by diminishing deference to the executive branch in treaty interpretation: the judiciary is tasked with interpretation in the extradition process specifically because its legal acumen regarding interpretation is more developed than the executive branch’s legal acumen. By not affording as much deference to the Secretary of State’s interpretation of “the charging document” as the Ninth Circuit had afforded, the Fourth Circuit’s approach to interpreting the U.S.-Lithuania treaty was more consistent with its obligations under international law: it sought to provide a fair hearing to Vitkus and did not near the point of acting “at the whim” of the executive branch.

Another consideration for remedying this tension between the judiciary and executive branch, with some limitations, would be to include more specific language in bilateral extradition treaties regarding a sovereign nation’s criminal procedure. Although, as stated in Part I of this Note, the judiciary has no authority to alter bilateral extradition treaties that the United States executes with foreign governments, Vitkus v. Blinken exemplifies the kind of case that could incentivize the executive branch to negotiate extradition treaties that have specific language relevant to the parties’ criminal procedures. By doing so, the U.S. and a sovereign signatory to a bilateral extradition treaty could prevent interpretive friction in the United States judiciary and allow for more expeditious extradition processing. Specifying the documents that better ascertain the level of probable cause established in a foreign proceeding could not only protect relators from extradition that invades their constitutional and international human rights but also the judiciary from breaching rules of non-inquiry and incorrectly interpreting a foreign country’s criminal procedure.197The court in Manrique v. Kolc deliberated over whether an Acusación Fiscal or an Orden de Enjuiciamento satisfied “the charging document” requirement, opening a pandora’s box of issues regarding the court’s review of foreign criminal procedure. Manrique v. Kolc, 65 F.4th 1037, 1042 (9th Cir. 2023) (“The parties dispute whether the accusations contained in the Acusación Final suffice to ‘charge[]’ Toledo ‘with’ an extraditable offense under the Treaty. The United States claims it does. Toledo argues that the Treaty requires an Orden de Enjuiciamiento before extradition.”). See In re Application for an Ord. for Jud. Assistance in a Foreign Proc. in the Lab. Ct. of Brazil, 466 F. Supp. 2d 1020, 1028 (N.D. Ill. 2006) (“American courts should treat foreign law the way American courts want foreign courts to treat American law: avoid determining foreign law whenever possible.”); In re Bravo, No. 19-23851, 2023 U.S. Dist. LEXIS 177916, at *40–41 (S.D. Fla. Oct. 3, 2023) (“[A] foreign government should not be required to prove to a U.S. judge that it is properly construing its own laws.”). However, this would not be a salve to the protection of international human rights of relators: a country without an independent judiciary could likely still satisfy the document requirement even if it were specified, and the risk of violating a relators’ due process rights might still be an issue, albeit in a different form than the one at issue in this Note.

B.Relevant Background

The two circuit opinions may also differ for reasons not explicitly stated by the published decisions. Although Toledo raised the possibility of maltreatment and suffering while awaiting trial in a Peruvian prison, his argument failed to trigger a humanitarian concern by the court.198Manrique, 65 F.4th at 1041 (“Toledo has explained that he could be detained in Peru up to three years pending formal charges and that the conditions in Peruvian prisons are dire. Given his advanced age and preexisting health conditions, Toledo risks contracting a fatal illness or experiencing other serious health declines.”); Toledo v. United States Dep’t of State, No. 23-627 (BAH), 2023 U.S. Dist. LEXIS 53048, at *7–8 (D.D.C. Mar. 28, 2023). Notably, courts in the United States may disavow the rule of non-inquiry should the relator raise the possibility of meeting human rights abuses by the requesting state in the event the extradition court certifies extradition—Toledo’s argument regarding his ill health does not align with the circumstances the court considers in extradition.199Powers, supra note 4, at 315 (“The United States has recognized that, in some circumstances, it has an obligation to inquire into the treatment which an individual will receive if transferred to another nation.”). Powers notes that as the United States ratified the 1979 International Convention Against the Taking of Hostages, extradition cannot be completed by the requested country if the requested party has “substantial grounds for believing: (a) That the request [for extradition] has been made for the purpose of prosecuting or punishing a person on account of his race, religion, nationality, ethnic origin or political opinion . . . .” Id. (quoting International Convention Against the Taking of Hostages, art. 9, Dec. 17, 1979, 1316 U.N.T.S. I-21931). On the other hand, Vitkus’s testimony about his arrest in Lithuania does support a contention that he could be tortured should the U.S. certify Lithuania’s extradition request, given that while applying for asylum, the “Board of Immigration Appeals (the ‘BIA’) found in 2014 that Vitkus’s ‘credible testimony established that he was beaten, burned, and nearly asphyxiated by [Lithuanian] police officers, who inquired into his contributions to a political party.”200Vitkus v. Blinken, 79 F.4th 352, 356 (4th Cir. 2023) (alteration in the original). The findings of the Board of Immigration Appeals did not preclude the extradition court from certifying Vitkus for extradition.201Id. at 358 n.6. Vitkus’s torture in Lithuania—allegedly related to his political involvement in Lithuania with a political group called “the Russia party”202Id. at 355.—may have implicitly prompted the court to consider that the Lithuanian criminal proceedings would violate Vitkus’s human rights upon returning to Lithuania. This concern might have informed the Fourth Circuit’s view that “the charging document” requirement was a clear and unambiguous requirement that Lithuania provide a discrete charging document.

C.Foreign relations and the interpretation of “the Charging Document” requirement

The United States uses extradition treaties to prevent U.S. citizens and non-U.S. citizens alike from utilizing the United States as a safe haven when they have committed crimes on foreign soil, and are tools used by the United States to uphold its relationships with foreign countries.203Emily Edmonds-Poli & David Shirk, Extradition as a Tool for International Cooperation: Lessons from the U.S.-Mexico Relationship, 33 Md. J. Int’l L. 215, 217 (2018) (“[C]ountries are expected to abide by a treaty’s established terms because failing to do so could undermine the prospect of future extraditions or cooperation in other areas of the international relationship.”). The default rule of treaty interpretation supports the executive branch’s role of upholding its treaty obligations as the governmental body responsible for foreign relations. Extradition treaties are entered into by the executive branch in its process of conducting foreign relations, creating international agreements regarding extradition unifies countries in a common, collaborative law enforcement apparatus.204Wang v. Masaitis, 416 F.3d 992, 1002 (9th Cir. 2005) (Ferguson, J., dissenting) (“By virtue of wielding the power to make treaties, appoint ambassadors, and recognize foreign governments, all part of the President’s extensive power to conduct foreign relations, the President is necessarily entrusted by the structure of the Constitution with the power to determine who makes a proper treaty partner.”). In Wang v. Masaitis, the petitioner argued that the Treaty Clause of the United States Constitution (U.S. Const. art. II, § 2, cl. 2) did not include agreements made between the United States and Hong Kong, which is a non-sovereign state. Id. at 993–94. The Ninth Circuit rejected the argument in finding that “the United States’ history of treaties with nonsovereign Indian nations fills in the silence of the Treaty Clause and the extradition statute with respect to the term ‘treaty.’ ” Id. at 999. In rejecting the court’s reasoning to justify the constitutionality of the treaty, the dissent noted that the “question of whether Hong Kong is a constitutionally cognizable treaty partner is committed to the political branches because it is inextricably linked to the President’s broad authority in the field of foreign relations.” Id. at 1001. There are many reasons for entering into a collaborative law enforcement apparatus, including “ensuring that fugitive criminals do not go unpunished for their alleged crimes, discouraging crime throughout the world, and protecting nations from fugitive criminals by eliminating the possibility of safe havens for fugitive criminals.”205David L. Gappa, Note, European Court of Human Rights – Extradition – Inhuman or Degrading Treatment or Punishment, Soering Case, 161 Eur. Ct. H.R. (SER. A) (1989), 20 Ga. J. Int’l & Compar. L. 463, 479 n.121 (1990). Allowing countries to extradite individuals strengthens the relationship between the two countries, while not cooperating with an extradition request, especially when issues regarding erroneous treaty interpretation arise, hampers international relations between the countries.206Edmonds-Poli & Shirk, supra note 203, at 217 (“[C]ountries are expected to abide by a treaty’s establish terms because failing to do so could undermine the prospect of future extraditions or cooperation in other areas of the international relationship.”); see Koskotas v. Roche, 931 F.2d 169, 174 (1st Cir. 1991) (“Extradition proceedings are grounded in principles of international comity, which would be ill-served by requiring foreign governments to submit their purposes and procedures to the scrutiny of United States courts.”); Artukovic v. Rison, 784 F.2d 1354, 1356 (9th Cir. 1986) (“[T]he public interest will be served by the United States complying with a valid extradition application . . . . Such proper compliance promotes relations between the two countries, and enhances efforts to establish an international rule of law and order.”). When considering the factors for staying a pending appeal (“(1) whether the stay applicant has made a strong showing that he is likely to succeed on the merits; (2) whether the applicant will be irreparably injured absent a stay; (3) whether issuance of the stay will substantially injure the other parties interested in the proceeding; “and (4) where the public interest lies”),207Nken v. Holder, 556 U.S. 418, 426 (2009). courts have noted that noncompliance with extradition requests diminishes the “force” of extradition treaties, and that “[i]f other countries lose confidence that the United States will abide by its treaties, the United States risks losing the ability to obtain the extraditions of people who commit crimes here and flee to other countries.”208Venckiene v. United States, 929 F.3d 843, 865 (7th Cir. 2019). This may be the reason why the Secretary of State, who ultimately decides whether to proceed with an extradition request once the court certifies a relator for extradition, does not often refuse to surrender those sought by a foreign country for prosecution.209Parry, supra note 16, at 96 (“The Secretary of State is ‘the ultimate decisionmaker’ and has discretion to refuse surrender. In practice, however, the Secretary rarely exercises his discretion, perhaps because the needs of diplomacy outweigh the concerns of individuals who may have committed crimes.”).

In denying Lithuania’s extradition request, the Fourth Circuit may have chipped at the United States’ relationship with the Lithuanian government by rejecting the default rule.210See Venckiene, 929 F.3d at 865. Although the U.S. government does not rescind the entire extradition treaty when the requestor country fails to extradite an individual, failing to extradite prohibits the flow of criminals between countries, and can encourage the impression that the U.S. can be held as a safe haven for criminals.211Gappa, supra note 205, at 479 n.121. Moreover, international comity would be ill-served by the uncertainty a requesting country may face when summoning an individual from the United States, should the relevant treaty have a “charging document” requirement.

CONCLUSION

As the two circuit court opinions in 2023 demonstrate, the default rule of treaty interpretation continues to influence the judiciary’s role in determining whether to certify a foreign nation’s extradition request. In the Ninth Circuit opinion in Manrique v. Kolc, the court was partial to the Secretary of State’s interpretation of “the charging document” requirement in its extradition of Toledo—the court found the “charging document” requirement to be relatively inconsequential in finding that the Peruvian government had satisfied its extradition request by providing an Acusación Fiscal. However, in Vitkus v. Blinken, the court was more dubious of the Secretary of State’s interpretation of the treaty and disagreed that the documents that the Lithuanian government had provided to extradite Vitkus satisfied the requirements listed in the U.S.-Lithuania Extradition Treaty.

By continuing to find opportunities to utilize the default rule in interpreting extradition treaties, the judiciary is more likely to impinge on the constitutional due process rights of relators in an effort to appease the executive’s concern with maintaining foreign relations with sovereign countries.212See Powers, supra note 4, at 320 (“In the United States we have developed strong constitutionally based protections for those accused of crimes, and those norms should not be unquestioningly transgressed because of foreign-policy concerns. Instead, notions of due process and fundamental fairness should always guide the court.”). The divergence in interpretation of “the charging document” highlights the possibility of two diametrically opposite outcomes for those who face extradition, with important implications: the removal of an individual from the United States to a requesting country, and therefore, the removal of the constitutional rights afforded to them when they are physically in the United States. Vitkus v. Blinken, in acknowledging the default rule, noted that although there is a legitimate public interest in extraditing criminals to the countries that request them, the executive’s obligations to follow the law should not be outweighed by its duty to maintain foreign relations; doing so honors the procedural safeguards written into a treaty.

The judiciary’s continued use of the default rule is in tension with the development of international human rights. Manrique v. Kolc embodies the risk to internationally recognized due process rights when courts cite to the default rule of treaty interpretation: the court in Manrique appeared to interpret “the charging document” to conciliate the executive branch. Toledo is not the only relator who has argued that the extradition process did not comport with due process: relators have raised arguments about various components of the extradition process that violate fundamental due process rights. As precedents almost require that the judiciary does not consider these arguments, the judiciary should gradually reduce the weight of the default rule of treaty interpretation so that extradition proceedings align more closely with the fairness and juridical equality requirements of the fundamental human right to due process.

Because the United States is a party to at least twenty-eight bilateral extradition treaties that contain “the charging document” requirement, arguments as to its ambiguity will likely arise again. Accordingly, to better uphold the due process rights of relators, courts should defer to the executive branch and the plain text of the relevant extradition treaty proportionally to ensure that decisions are in line with customary international law on due process. By critically analyzing the default rule, the courts will be better equipped to uphold their obligations to the rights of relators: rights granted by the Constitution and by international law on the fundamental right to due process.

98 S. Cal. L. Rev. 761

Download

* Executive Senior Editor, Southern California Law Review, Volume 98; J.D. Candidate 2025, University of Southern California Gould School of Law; B.A. 2017, Science in Society Program, Wesleyan University. All views and conclusions expressed in this Note are solely my own and do not express the opinions or positions of my employer. Many thanks to Professor Marcela Prieto for her invaluable guidance throughout the drafting process. I also want to thank the talented Southern California Law Review staff and editors for their work throughout the publication process.

A Whole-of-Government Approach to Protect Unaccompanied Children from Labor Exploitation

A sharp rise in illegal child labor and an influx of unaccompanied migrant children into the United States combined to dominate headlines in 2023. Despite federal authorities placing migrant children in sponsor care, reports detailed such children being exploited in hazardous occupations across the country, with some losing their lives. An aging patchwork of federal immigration and labor laws and underfunded enforcement agencies have left an incredibly vulnerable subset of children at risk of exploitation or worse, and congressional action is needed to ensure that sponsored children are properly cared for and kept out of hazardous workplaces. While the federal government’s processing of unaccompanied children and illegal child labor have been separately examined by scholars, there is a glaring lack of scholarship on how the gaps in the immigration system and federal labor law combine to put unaccompanied minors at a greater risk of labor exploitation. This Note argues that the federal government must comprehensively update existing immigration and labor laws and increase interagency coordination to lower the risk of labor exploitation for unaccompanied children. If the United States wants to fulfill a humanitarian mission of caring for unaccompanied children, it must take responsibility for every child’s wellbeing throughout their immigration journey by taking a whole-of-government approach to the problem.

Introduction

News reports broke midway through the Biden presidency detailing shocking and troubling findings of migrant children working in punishing and dangerous jobs across the United States in violation of federal law. One report detailed the experience of a migrant child named Antonio, a fourteen-year-old who had left his home in Guatemala and made the perilous trek north to the United States.1Hannah Dreier, As Migrant Children Were Put to Work, U.S. Ignored Warnings, N.Y. Times (Apr. 17, 2023), https://www.nytimes.com/2023/04/17/us/politics/migrant-child-labor-biden.html [https://perma.cc/NB76-XWB5]. After arriving at the U.S. border alone, the U.S. government placed Antonio into its custody in a shelter for several weeks until a former neighbor residing in Florida agreed to sponsor him while Antonio made his way through the immigration system. Upon his release to the sponsor, Antonio enrolled in the eighth grade and went to work for anyone who would hire a child without a work permit. Work took priority, and Antonio soon stopped attending school in order to survive. While sponsors of undocumented children are supposed to provide for the children in their care, Antonio’s sponsor instead kept track of the costs required to transport, house, and feed Antonio and required him to pay that money back, which took a year of work. Antonio cleaned houses, landscaped, and packed vegetables overnight. He worked for companies that claimed not to hire minors. He did not stay in his sponsor’s care long, instead living in apartments with several other people. Rather than attend school like other children, Antonio was forced to support himself. He now lives in a neighborhood in which children as young as twelve years old work in hazardous occupations such as construction in order to survive.2Id.

Antonio’s story is a common one. Children who arrive at the U.S. border alone often find themselves forced to work rather than attend school in order to survive or pay off debts that sponsors or other parties impose on them, creating a real risk of child labor exploitation or even labor trafficking. “Labor exploitation” is an oft-used term without an exact definition, but as used in this Note, it generally describes employers committing workplace violations for profit, usually by scheduling employees for excessively long hours, underpaying them in violation of law, or disregarding safety rules and regulations meant to protect workers.3As used, the term encapsulates civil violations of labor regulations but does not necessarily include conduct that rises to a criminal level. “Labor trafficking” is a crime in which traffickers force people to work while taking the fruits of workers’ labor for themselves.4This Note defines “labor trafficking” by adopting the definition for “severe forms of trafficking in persons” found in the United States Code. 22 U.S.C. § 7102(11)(B) (2023) (“The term ‘severe forms of trafficking in persons’ means—the recruitment, harboring, transportation, provision, or obtaining of a person for labor or services, through the use of force, fraud, or coercion for the purpose of subjection to involuntary servitude, peonage, debt bondage, or slavery.”). Labor trafficking turns on an element of force, fraud, or coercion, by which labor exploitation is elevated from harmful, but possibly blameless, conduct to criminal and morally reprehensible behavior.5To understand factors that elevate labor exploitation to labor trafficking, see The Department of Labor’s Approach to Human Trafficking, U.S. Dep’t of Lab., https://www.dol.gov/agencies/oasp/resources/trafficking/dols-approach [https://perma.cc/E6KS-Z24L] (“Employers become human traffickers when they use force or physical threats, psychological coercion, abuse of the legal process, fraud, or deception, or other coercive means to compel someone to work and eliminate the individual’s ability to leave.”). Unaccompanied children are meant to be protected from such abuses in the United States by federal immigration and labor law.6See discussion infra Parts II & III (detailing the legal frameworks that exist to protect unaccompanied minors from exploitation and trafficking).

When children arrive at the U.S. border without permission to enter the country, they are apprehended and detained, usually by United States Customs and Border Protection (“CBP”).7Lisa Seghetti, Cong. Rsch. Serv., IN10107, Unaccompanied Alien Children: A Processing Flow Chart 1 (2014). Children with no parent or legal guardian present are separated from whoever they are with and held in temporary facilities made for adults. They are then questioned by federal agents and, if found to be unaccompanied, are transferred to the custody of the Department of Health and Human Services’ (“HHS”) Office of Refugee Resettlement (“ORR”). In ORR custody, children are put into some form of group facility with other children, generally for about thirty days. ORR houses and feeds these children, and case managers eventually speak with each child to determine a suitable sponsor for the child to be placed with. While finding sponsors, the U.S. government enters each child into formal removal proceedings, unless a child asks to be repatriated.

ORR screens each potential sponsor, but screening requirements often change with presidential administrations or with a rise in the backlog of children in federal custody. Changes in sponsor screening can affect the length of time that children are in ORR custody, which is particularly problematic given that longer stays in government custody can cause lasting trauma to children. With a backlog of children in federal custody upon taking office in 2021, the Biden administration pushed to release children as quickly as possible to sponsor homes and lowered the hurdles that sponsors must clear when applying to ORR’s Unaccompanied Alien Children Bureau (“UAC Bureau”), the federal program that places unaccompanied children in sponsor homes.8William A. Kandel, Cong. Rsch. Serv., R43599, Unaccompanied Alien Children: An Overview 30 (2024). In its haste, the administration may have unintentionally increased the risk of unaccompanied children landing in unsuitable environments in which labor exploitation or trafficking can occur.

In the best-case scenario, ORR places a child with a sponsor that the child knows, such as a parent or family member, who will properly care for them and enroll them in school while the child’s immigration proceedings play out. The worst-case scenario is that the child is placed with a sponsor whom they have never met, who will take advantage of the child financially or otherwise. In this worst-case scenario, sponsors might charge children for basic expenses like rent, food, clothing, and school supplies, essentially forcing the child to work after school (or in lieu of attending) to repay their debt.9See Dreier, supra note 1. Worse, the sponsor may force the child to work and take the child’s entire earnings for themselves. Migrant children who must work often find themselves in workplaces considered dangerous by the federal government, even for adults.10See, e.g., Laura Strickler & Julia Ainsley, The Federal Government Is Investigating the Possible Human Trafficking of Children Who Cleaned Slaughterhouses, NBC News (Jan. 19, 2023, 3:30 AM), https://www.nbcnews.com/news/us-news/feds-dhs-investigating-human-trafficking-children-slaughterhouses-rcna66081 [https://perma.cc/3FWA-ZXJN]; Mica Rosenberg, Kristina Cooke & Joshua Schneyer, Child Workers Found Throughout Hyundai-Kia Supply Chain in Alabama, Reuters (Dec. 16, 2022, 1:00 PM), https://www.reuters.com/investigates/special-report/usa-immigration-hyundai [https://perma.cc/Y4LJ-77PL]. These children may not make enough money to pay their debts working normal shifts after school hours, so they may work overnight shifts or stop attending school altogether to work full-time. In such workplaces, child workers have been injured, maimed, and killed while working in violation of federal labor law.11See, e.g., News Release, U.S. Dep’t of Lab., Wage & Hour Div., Roofing Contractor Pays $117,175 Penalty After 15-year-old’s Fatal Fall at Alabama Work Site (Feb. 7, 2024) [hereinafter Fatal Fall at Alabama Work Site], https://www.dol.gov/newsroom/releases/whd/whd20240207 [https://perma.cc/C95H-WSE4]; News Release, U.S. Dep’t of Lab., Wage & Hour Div., Sawmill Operator Agrees to Compliance with Federal Child Labor Laws After Wisconsin Teen Suffers Fatal Injuries Operating Dangerous Machinery (Sept. 7, 2023) [hereinafter Teen Suffers Fatal Injuries Operating Dangerous Machinery], https://www.dol.gov/newsroom/releases/whd/whd20230907 [https://perma.cc/78E7-PMUC]. Despite the risk, the harsh reality is that many unaccompanied children feel they have to work due to their vulnerable circumstances. What choice do they have otherwise?

The scenario described may seem horrific, or even unrealistic, but it has happened repeatedly in the United States. While such stories surface in the news annually, Congress finally put a renewed focus on the issue of child labor in 2023 after Hannah Dreier’s reporting in The New York Times detailed just how widespread the issue of migrant children working in dangerous American workplaces is.12Dreier, supra note 1. Some migrant children have allegedly been trafficked into forced labor, and multiple federal agencies have been criticized for failing to adequately prevent or respond to the risk these children face, particularly ORR and the Department of Labor (“DOL”). Exposés like Dreier’s have cropped up amidst an unprecedented spike in unaccompanied children arriving at the U.S.-Mexico border, a spike that strained the government’s ability to adequately care for unaccompanied children. Particularly concerning to some members of Congress and the public was an allegation that ORR was unable to get in touch with over 80,000 unaccompanied children that the agency had released from its custody into sponsor homes.13Hannah Dreier, Alone and Exploited, Migrant Children Work Brutal Jobs Across the U.S., N.Y. Times (Feb. 25, 2023), https://www.nytimes.com/2023/02/25/us/unaccompanied-migrant-child-workers-exploitation.html [https://perma.cc/3FYX-XJ5G] (noting that ORR had been unable to contact roughly 85,000 children between 2021 and 2022). ORR’s inability to get in touch with tens of thousands of children coincided with a dramatic surge in documented cases of illegal child labor nationwide. Although congressional Republicans and Democrats held hearings with ORR and DOL officials to understand why children could not be contacted and why child labor violations were increasing,14Federal Officials Testify on Unaccompanied Migrant Children, C-SPAN (Oct. 25, 2023), https://www.c-span.org/program/public-affairs-event/federal-officials-testify-on-unaccompanied-migrant-children/634129 [https://web.archive.org/web/20250407025052/https://www.c-span.org/program/public-affairs-event/federal-officials-testify-on-unaccompanied-migrant-children/634129]. there was little in the way of a coordinated government response to deal with these crises as related issues that may increase the risk of unaccompanied children being exploited for their labor.

Encouragingly, in 2023, ORR and DOL agreed to share information in an effort to jointly combat child labor trafficking and exploitation.15News Release, Off. of the Sec’y, U.S. Dep’t of Lab., Departments of Labor, Health and Human Services Announce New Efforts to Combat Exploitative Child Labor (Feb. 27, 2023) [hereinafter DOL-HHS Information Sharing Agreement], https://www.dol.gov/newsroom/releases/osec/osec20230227 [https://perma.cc/8RDD-XFHM]. But between ORR’s limitations in providing post-release services to children paroled into sponsor care and DOL’s lack of resources and relatively toothless enforcement options, migrant children still have inadequate protections and can fall prey to labor trafficking or exploitation. While some scholarship exists on the inadequacies of the UAC Bureau,16See generally, e.g., Brooke Hollmann, The Lost Immigrant Children of the U.S. Department of Health and Human Services: A Broken Program and a Path Forward, 26 Tex. Hisp. J. L. & Pol’y 97 (2020) (arguing for legislation that holds HHS responsible for the post-release safety and well-being of unaccompanied children). few if any scholars have focused on how gaps in immigration law and federal labor law combine to increase the risk of exploitation to unaccompanied children. This Note aims to fill the gap in current scholarship relating to unaccompanied children by undertaking a novel and holistic review of both federal immigration law and labor law. The aim is to identify gaps in both areas of law that contribute to the risk of unaccompanied children being exploited for their labor by either their sponsors or irresponsible employers and discuss how these areas can be addressed in a comprehensive manner to lower that risk of harm.

This Note attempts to make sense of the various statutes, regulations, and government agencies that are meant to protect migrant children in different ways and argues for a coordinated, whole-of-government approach to minimize the risk that unaccompanied children fall into labor exploitation. While this Note touches on labor trafficking, its main focus is labor exploitation, as there is no comprehensive source of reliable data on labor trafficking among unaccompanied minors. Part I of this Note begins by quantifying the historic levels of unaccompanied minors arriving at the U.S. border since 2019 and explores the shifting immigration policies and rationales that have contributed to the crisis. Part II explains the legal foundation governing the apprehension of unaccompanied minors and discusses ORR’s role in placing minors into custody. Part III examines child labor violations nationwide and delves into the legal framework that is supposed to protect children from being exploited in the workplace. Part IV analyzes the current failings of both federal immigration law and labor law to protect unaccompanied children and offers possible solutions that can minimize the risk of exploitation for these children. The Note concludes by laying the groundwork for future discussion.

By addressing the labor exploitation of unaccompanied children through a multipronged review of separate but overlapping areas of law, this Note endeavors to change the discourse surrounding the federal government’s approach from a conversation of unilateral federal agency failures to one that discusses how our patchwork system of laws can be updated to best serve the needs of unaccompanied children. The Biden administration correctly approached influxes of unaccompanied minors with a humanitarian focus, but federal law needs to be updated to ensure that the federal government takes full responsibility for ensuring the safety of each child it welcomes into the country.17As of this Note’s completion, it is unclear how President-elect Donald Trump re-taking the White House in 2025 will impact federal immigration law or labor law or whether unaccompanied minors will still be treated as a population that needs protection. President-elect Trump’s plans of mass deportations may alter the legal landscape significantly. As such, this Note may be best placed as an artifact to be considered under a future administration.

I.A Historic Influx of Unaccompanied Children

Before exploring what happens when unaccompanied children enter the United States, it is important to highlight who these children are, where they come from, why they flee their homes, and what happens when they encounter border authorities in the United States. To begin, a migrant child who arrives at the U.S. border unaccompanied by a parent or guardian is referred to by CBP as an “unaccompanied alien child,” or “UC,” for short.186 U.S.C. § 279(g)(2). This Note will not use the “UC” shorthand beyond this Section to refer to unaccompanied children, as it dehumanizes the children actually being discussed. A UC is statutorily defined as a child under eighteen years old who has no lawful immigration status in the United States and who either has no parent or legal guardian accompanying them into the United States or has no parent or guardian who can provide immediate care and physical custody.19Id. From 2010 until 2019, CBP apprehended an average of 43,425 unaccompanied children per year at the U.S. border, with nearly all of those apprehensions occurring at the Southwest border.20See U.S. Border Patrol Total Monthly UC Encounters by Sector (FY 2010-FY 2020), U.S. Customs & Border Prot., https://www.cbp.gov/document/stats/us-border-patrol-total-monthly-uc-encounters-sector-fy-2010-fy-2020 [https://perma.cc/G2WC-3F38] (choose “U.S. Border Patrol Total Monthly UC Encounters by Sector (FY 2010-2020)” under “Attachment”) (averaging the yearly totals of unaccompanied child apprehensions for each fiscal year). The number of apprehensions trended upward over that ten-year span, hitting a then-record high of 76,136 during the first Trump presidency in 2019.21Id. Decreased migration and public health border enforcement during the COVID-19 pandemic led to a sharp downturn in apprehensions in 2020, but since 2021, there has been a massive spike in the number of unaccompanied children arriving at the U.S. border, with an average of 130,122 CBP apprehensions per year.22This figure was derived by averaging the total number of apprehensions of unaccompanied children for fiscal years 2021 through 2024 using the Customs and Border Protection Data Portal. See Southwest Land Border Encounters, U.S. Customs & Border Prot., https://www.cbp.gov/newsroom/stats/southwest-land-border-encounters [https://perma.cc/F37H-P8F5] (select “FY” filter and choose “2022,” “2023,” and “2024”; then select “Component” filter and choose “U.S. Border Patrol”; then select “Demographic” filter and choose “UC / Single Minors”; then select “Title of Authority” filter and choose “Title 8”); Southwest Land Border Encounters FY22, U.S. Customs & Border Prot. [hereinafter Southwest Land Border Encounters FY22], https://www.cbp.gov/newsroom/stats/southwest-land-border-encounters-fy22 [https://perma.cc/57N8-A5U9] (select “FY” filter and choose “2021”; then select “Component” filter and choose “U.S. Border Patrol”; then select “Demographic” filter and choose “UC / Single Minors”; then select “Title of Authority” filter and choose “Title 8”). This average nearly doubles the pre-pandemic record high for apprehensions of unaccompanied children in a single year.

The majority of unaccompanied children are consistently aged between fifteen and seventeen years old.23Fact Sheets and Data: Unaccompanied Children, Off. of Refugee Resettlement (Dec. 23, 2024), https://www.acf.hhs.gov/orr/about/ucs/facts-and-data [https://perma.cc/FS5Y-SV6V]. For years, most unaccompanied children arrived from Mexico, but that majority has shifted dramatically over the last ten years to the Northern Triangle countries of El Salvador, Guatemala, and Honduras.24William A. Kandel, Cong. Rsch. Serv., IN11638, Increasing Numbers of Unaccompanied Children at the Southwest Border 2 (2023). In 2009, Mexican children comprised 83% of unaccompanied apprehensions, but that number shrunk to a mere 20% in the first eight months of 2023. At the same time, the number of apprehended children arriving from noncontiguous countries, such as the Northern Triangle countries of El Salvador, Guatemala, and Honduras, flipped from 18% in 2009 to 80% in 2023. Id. Regardless of country of origin, similar explanations underlie why migrant children are traveling to the U.S. border en masse. Many migrant children seek economic opportunity, which has always been a factor driving immigration, but many others flee extreme violence, poverty, and ecological disaster.25See, e.g., Families on the Run: Why Families Flee from Northern Central America?, UNHCR & UNICEF [hereinafter Families on the Run], https://familiesontherun.org [https://perma.cc/9NEJ-4924]. Others are driven by a desire to reunite with family already in the United States, with an estimated 80% of unaccompanied children having at least one family member in the country as of 2021.26Camilo Montoya-Galvez, Nearly 130,000 Unaccompanied Migrant Children Entered the U.S. Shelter System in 2022, A Record, CBS News (Oct. 14, 2022, 7:00 AM), https://www.cbsnews.com/news/immigration-unaccompanied-migrant-children-record-numbers-us-shelter-system [https://perma.cc/CSL2-KREL]. While some politicians and pundits may try to ascribe nefarious motives to the spike in migration, there are usually reasonable economic and socio-political explanations for why children arrive at the U.S. border.

Where an unaccompanied child is from makes a large difference in what happens when they encounter border officials. Under the Trafficking Victims Protection Reauthorization Act of 2008 (“TVPRA”),27William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008, Pub. L. 110-457, § 235(a)(4), (b)(3), 122 Stat. 5044, 5076–77 (codified at 8 U.S.C. § 1232). children arriving from noncontiguous countries such as El Salvador, Guatemala, and Honduras are usually detained by CBP and transferred into the custody of ORR.28Kandel, supra note 24, at 3. Once transferred, these children are put into formal removal proceedings and given an opportunity to seek different forms of immigration relief, such as asylum.29Id. In contrast, children arriving from Mexico or Canada are usually repatriated immediately, so long as they are not trafficking victims and raise no fear of persecution upon return to their home countries.30Id. at 2.

Waves of unaccompanied minors arriving at the U.S. border have challenged the last four presidential administrations. Fearing that children were being trafficked into the United States, the George W. Bush administration passed the TVPRA in 2008, which barred the quick deportation of unaccompanied minors from countries other than Mexico.31Montoya-Galvez, supra note 26. The Obama administration used the TVPRA to greatly expand the government’s ability to respond to unaccompanied arrivals, housing children in temporary camps on military bases and spending billions of dollars expanding a network of shelters that ORR could place unaccompanied children into while they awaited placement in the United States.32Joel Rose, President Obama Also Faced a ‘Crisis’ at the Southern Border, NPR (Jan. 9, 2019, 2:29 PM), https://www.npr.org/2019/01/09/683623555/president-obama-also-faced-a-crisis-at-the-southern-border [https://perma.cc/R9XE-79UW]. The Trump administration responded to surges in arrivals in 2019 and 2020 by trying to limit both legal and illegal immigration, focusing on deterrence through family separation policies and the solicitation of Congress for funds to erect a border wall, all while allowing ORR’s shelters to fill near capacity.33Id. When the COVID-19 pandemic struck in 2020, the Trump administration seized on a Center for Disease Control and Prevention (“CDC”) public health order called Title 42 to promptly deport most unaccompanied children detained by CBP to Mexico, in violation of the TVPRA.34Kandel, supra note 8, at 4. The use of Title 42 cut encounters with unaccompanied children at the southern border by more than half,35Id. but left kids to fend for themselves along the U.S.-Mexico border. In 2021, the Biden administration reversed course, formally exempting unaccompanied minors from Title 42 expulsions and requiring that they be processed under the TVPRA’s Title 8 procedures.36Id. Unaccompanied minor apprehensions rebounded in 2021 to what was then a new record high of 140,191, before jumping again in 2022 to 149,086.37See Southwest Land Border Encounters FY22, supra note 22.

Whether any executive policy has been particularly effective in properly addressing surges in unaccompanied-minor arrivals is up for debate. The Trump administration’s hardline policies against immigration lessened the number of encounters with unaccompanied minors, but a survey of Central American children in transit revealed that 66% would try to flee their country again if detained and deported by the U.S. government,38Families on the Run, supra note 25. showing that hardline tactics are not likely to stop unaccompanied children from arriving at the U.S. border. The Obama and Biden administrations took a two-pronged humanitarian approach by housing minors in shelters as a short-term solution with a goal of family reunification or sponsor placement, while attempting to address the root causes of immigration by working with foreign governments to dissuade foreign citizens from immigrating and providing legal pathways for children to apply for entry into the United States without arriving at the border unannounced.39Kandel, supra note 8, at 18–19, 31–33. While the Obama and Biden approaches were humanitarian in nature, such approaches were also unlikely to disincentivize children from traveling to the border.

This Note is not meant to tackle the root causes of child migration or question whether the U.S. border should be accessible or closed to migrant children. Whether increased child migration is driven by violence, poverty, ecological disaster, economic opportunity, or governmental policy, it almost certainly will persist. Rather, this Note recognizes that unaccompanied minors are uniquely vulnerable to labor exploitation and trafficking and that current U.S. law is ill equipped to protect children from such realities. The question is, how can current legal structures be changed or improved to handle arrivals of unaccompanied minors in a way that best meets the needs of such children?

II.The Legal Foundation Underpinning ORR’s Apprehension, Custody, and placement of Unaccompanied Children

The apprehension and administrative processing of unaccompanied children is governed by a court settlement known as the Flores Settlement Agreement of 1997 (“Flores Agreement”), the Homeland Security Act of 2002 (“HSA”), the TVPRA, and various regulations. Understanding the legal foundation underpinning the UAC Bureau is critical to evaluating the gaps in the system that expose unaccompanied minors to a greater risk of labor exploitation.

A.The Flores Settlement Agreement of 1997

The modern-day treatment of unaccompanied children detained by the government was largely shaped by the Flores Agreement. The Flores Agreement resulted from a class action lawsuit between the former Immigration and Naturalization Service (“INS”) and two organizations representing the legal interests of immigrant children held in INS detention. The lawsuit was brought on behalf of detained children who were held in “suboptimal conditions” and “subjected to daily strip searches by immigration officers.”40Hollmann, supra note 16, at 102. In 1984, the INS “adopted a policy prohibiting the release of detained minors to anyone other than ‘a parent or lawful guardian, except in unusual or extraordinary cases.’ ”41Flores v. Lynch, 828 F.3d 898, 901 (9th Cir. 2016). These children were held in government detention despite many having other adult family members who were willing to care for them while their immigration proceedings played out.42Hollmann, supra note 16, at 102.

In 1997, the plaintiff class and the government reached a settlement which set out a nationwide policy governing the detention, release, and treatment of minors in INS custody.43Flores, 828 F.3d at 901. The settlement required the humane treatment of migrant children held in federal custody44Leticia v. United States, No. 22-CV-7527, 2023 U.S. Dist. LEXIS 193390, at *5 (E.D.N.Y. Oct. 27, 2023). and created a presumption in favor of release and family reunification for minors who were not at risk of missing appearances in immigration court or whose safety did not need to be ensured.45Flores, 828 F.3d at 903. Under the agreement, minors were to be released from INS custody, in order of preference, to (1) a parent, (2) a legal guardian, (3) an adult relative, (4) an adult individual or entity designated by the parent or legal guardian, (5) a licensed program willing to accept legal custody, or (6) an adult individual or entity seeking custody.46Id. Unreleased children were to be placed in a state-licensed and non-secure program that provided residential, group, or foster-care services for children.47Id.

While the district court that approved the Flores Agreement continues to monitor the federal government’s compliance with its terms,48Kelsey Y. Santamaria, Cong. Rsch. Serv., IF11799, Child Migrants at the Border: The Flores Settlement Agreement and Other Legal Developments (2024). developments in statutory law (particularly the passage of the HSA and TVPRA) and federal regulations have changed the structure of U.S. immigration and modified the Flores Agreement’s nationwide policy regarding the detention and release of minors held in government custody.

B.The Homeland Security Act of 2002

The HSA abolished the INS and created the Department of Homeland Security (“DHS”) to fulfill most of INS’s functions,49Homeland Security Act of 2002, Pub. L. No. 107-296, § 471 (codified at 6 U.S.C. § 291). including immigrant detention and removal responsibilities.50Id. § 441. Importantly, section 462 of the HSA transferred INS’s jurisdiction over unaccompanied children to ORR.51Id. § 462(a)–(b) (codified at 6 U.S.C. § 279). Section 462(b)(1) made ORR responsible for “the care and placement of unaccompanied alien children,” requiring the agency to consider the interests of each child when making care and custody decisions and make placement determinations for every unaccompanied child in federal custody by reason of immigration status.52Id. § 462(b)(1)(A)–(C). The HSA defined “unaccompanied alien children” as children under eighteen years of age who have no lawful immigration status and no accompanying parent or guardian present in the United States53Id. § 462(g)(2). and defined the term “placement” as the “placement of an unaccompanied child in either a detention facility or an alternative to such a facility.”54Id. § 462(g)(1). ORR inherited both INS’s custodial responsibilities and its responsibilities arising under the Flores Agreement, specifically the mandate to place unaccompanied minors into the care of a suitable sponsor, per the list of placement preferences.

C.The William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008

Congress enacted the TVPRA, in part, to address concerns that unaccompanied minors in government custody were being inadequately screened for evidence of human trafficking.55Kandel, supra note 8, at 6. The TVPRA builds on the HSA and requires that the Secretary of Homeland Security develop policies and procedures to ensure that unaccompanied children are safely repatriated to their country of nationality or to the last country they lived in.56William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008, Pub. L. 110-457, § 235(a)(1), 122 Stat. 5044, 5074–75 (codified at 8 U.S.C. § 1232(a)(1)). Section 235 of the TVPRA lays out “special rules” allowing children from contiguous countries (Mexico and Canada) to be safely repatriated to their country of origin or last habitual residence.57Id. § 235(a)(2). Under section 235(a), an immigration officer may remove an unaccompanied child appearing at a land border or U.S. port of entry from the country so long as the child is from a contiguous country, has not been nor is at risk of being a victim of a severe form of human trafficking, and does not have a credible fear of persecution in their home country, and so long as the child is allowed to make an independent decision to withdraw their application for admission to the United States.58Id. § 235(a)(2)(A)–(B). Children must be screened for evidence of trafficking or persecution within forty-eight hours of apprehension.59Id. § 235(a)(4).

Unaccompanied children from noncontiguous countries, like those comprising the Northern Triangle, must be transferred to ORR’s custody within seventy-two hours, consistent with the HSA.60Id. § 235(b)(1), (3). The Secretary of HHS, in collaboration with the Secretary of Homeland Security, Attorney General, and Secretary of State, is tasked with promulgating policies and programs for ORR to follow to ensure that unaccompanied children are “protected from traffickers and other persons seeking to victimize or otherwise engage such children in criminal, harmful, or exploitative activity.”61Id. § 235(c)(1). Importantly, children in ORR’s care and custody are to be promptly placed in the “least restrictive setting that is in the best interest of the child.”62Id. § 235(c)(2). The least restrictive setting requirement works hand in hand with the HSA requirement of sponsor placement and prevents children from being held in government detention indefinitely while awaiting their immigration hearings.

The TVPRA directs ORR to find each child a suitable sponsor who is capable of providing for the child’s physical and mental well-being.63Id. § 235(c)(3)(A). ORR is tasked with verifying a sponsor’s identity and relationship to the child and is responsible for ensuring that a sponsor has not engaged in any activity that would signal potential risk to the child.64Id. ORR must also determine whether a study of the sponsor’s home is necessary before placement, which is required for children who were victims of severe forms of trafficking or of physical or sexual abuse, who have disabilities, or whose proposed sponsors clearly present a risk of “abuse, maltreatment, exploitation, or trafficking.”65Id. § 235(c)(3)(B). After placement, the TVPRA requires ORR to conduct “follow-up services” only for children for whom a home study was conducted, but ORR is authorized to conduct such services for children who could “benefit from ongoing assistance from a social welfare agency.”66Id. What follow-up services entail is not defined in the law, nor is there guidance as to which children would benefit from ongoing assistance, leaving ORR with discretion unless directed otherwise. Put another way, if no home study is performed, ORR has no responsibility under the TVPRA to follow up with a child whom it placed into a sponsor’s care.

D.ORR’s Role in Child Custody and Placement

As laid out in the HSA and TVPRA, ORR is the branch of HHS tasked with caring for and placing unaccompanied minors into sponsor homes. Those two statutes, and by extension, the Flores Agreement, provide the legal basis for ORR’s UAC Bureau, which puts the statutory schemes of child detention and placement into practice. Exploring the reality of the UAC Bureau, including how and where children are actually placed and what occurs after placement, is essential to understanding how immigration law and ORR practices place migrant children at an increased risk of labor exploitation.

The majority of unaccompanied children are referred to ORR’s UAC Bureau after being apprehended by DHS border patrol officers, with some children referred by other federal agencies in rare circumstances.67ORR Unaccompanied Children Alien Bureau Policy Guide: Section 1, Off. of Refugee Resettlement § 1.1 (Aug. 1, 2024), https://www.acf.hhs.gov/orr/policy-guidance/unaccompanied-children-bureau-policy-guide-section-1#1.1 [https://perma.cc/YB4H-ED3D]. When a child is referred to ORR, ORR obtains background information on the child from the referring agency and attempts to determine the most appropriate and least restrictive setting in which to hold the child until a sponsor determination is made.68Id. Settings may include a shelter facility, foster care or group home, staff secure or secure care facility, residential treatment center, or other special needs care facility.69Id. In moments of high influx, settings have included temporary influx care facilities (“ICFs”), in which hundreds or thousands of children can be kept, usually on army bases or in remote locations.70See, e.g., Kandel, supra note 8, at 20–23.

The initial setting that children are held in is part of the problem with ORR’s UAC Bureau. While some shelters are appropriate for children, the use of ICFs is controversial due to the “facilities’ large sizes, remote locations, durations of stay, and processes for transferring children to the facilities.”71Id. at 23. ORR internal reports have revealed thousands of allegations of sexual abuse and harassment in ICFs and identified shortcomings for reporting such incidents within ORR’s shelter network.72Id. at 23–24. Even in smaller settings, children are often traumatized by their stays in government custody. Minors are often surrounded by strangers and limited to two short phone calls per week with family members or potential sponsors, facing a lack of caregiver support that can cause toxic stress in children.73Annalise Keen, Minal Giri & Roya Ijadi-Maghsoodi, Detained Immigrant Minors Deserve More Than Two Calls Per Week, The Hill (Jan. 21, 2023, 10:00 AM), https://thehill.com/opinion/immigration/3821581-detained-immigrant-minors-deserve-more-than-two-calls-per-week [https://perma.cc/SK6P-BHZP]. Studies have shown that children detained in federal custody can suffer from “high rates of PTSD, anxiety, depression, and suicidal ideation.”74Neha Desai, Melissa Adamson & Lewis Cohen, Nat’l Ctr. for Youth L., Child Welfare & Unaccompanied Children in Federal Immigration Custody 6 (2019). Thus, the longer children are detained, the more likely they will suffer harm of some sort. As of March 2025, the average stay for children in ORR custody was eighty-two days, which ORR is continually working to reduce.75Unaccompanied Alien Children Bureau: Fact Sheet, Off. of Refugee Resettlement, https://www.acf.hhs.gov/orr/fact-sheet/programs/uc/fact-sheet [https://perma.cc/G9AJ-DAE2].

The placement of children in sponsor homes and ORR’s follow-up services are of particular interest in this Note. As discussed, ORR’s placement of a child with a sponsor begins as soon as ORR takes custody, with the Flores Agreement preferences used as a guideline in placement. Parents, relatives, and close family members in the United States may apply to have a child in custody released to their care.76ORR Unaccompanied Children Alien Bureau Policy Guide: Section 2, Off. of Refugee Resettlement, § 2.2 (Aug. 1, 2024), https://www.acf.hhs.gov/orr/policy-guidance/unaccompanied-children-bureau-policy-guide-section-2#2.2 [https://perma.cc/NH37-DRX6]. If no family member comes forward, ORR works with the child to identify a potential sponsor, or with the child’s consulate or a reputable family tracing organization if the child is too young to provide potential sponsor information.77Id. § 2.2.1.

ORR requires each potential sponsor to be screened using safe screening methods. A non-exhaustive list of safe screening methods includes identifying the sponsor, verifying a familial relationship, coordinating with a child’s parents, legal guardians, or closest relative to contact nonrelative adult sponsors, screening for exploitation or trafficking concerns, or communicating with the child directly about his or her own sense of safety.78Id. § 2.2.2.

Sponsor requirements are not extensive. For the most part, a sponsor simply needs to fill out an application, undergo a background check, address any criminal history, and provide proof of their identity and address, the identity of the child whom they wish to sponsor, and any sponsor-child relationship.79Id. § 2.2.4. Sponsors are assessed based on a number of factors. A non-exhaustive list includes the sponsor’s relationship with the child, their resources and motivation to care for the child, the child’s view on the release, the sponsor’s understanding of the child’s needs, and risk factors that may impact the child, such as the sponsor’s criminal background, history of substance abuse, mental health issues, or domestic violence or child welfare concerns.80Id. § 2.4.1. ORR does not disqualify sponsors “based solely on their immigration status or for law enforcement purposes.”81Id. § 2.6. Importantly, while sponsors enter into agreements with the federal government to provide for the physical and mental well-being of children,82Id. § 2.8.1. there appears to be no enforcement mechanism at ORR’s disposal to ensure that sponsors live up to their agreements.

Once a child is transferred to a sponsor’s custody, “ORR’s custodial relationship with the child terminates,” and care providers are required only to keep a child’s case file open for thirty days to conduct a “Safety and Well-Being Follow Up Call.”83Id. § 2.8.3. The purpose of the safety call is to determine whether the child is safe, still in the sponsor’s care, enrolled in or attending school, and aware of upcoming immigration court dates.84Id. § 2.8.4. If the care provider cannot get in touch with the child or sponsor, the provider is required only to document that fact in the child’s file,85Id. a somewhat inadequate requirement given that the government has tasked itself with ensuring the well-being of unaccompanied children.86For a discussion of issues with ORR’s follow-up approach, see Hollmann, supra note 16, at 113–14; Dreier, supra note 13. While ORR provides post-release services to some children with certain needs, most children and sponsors are given access only to a national hotline to be called when needed. With hotline reports of labor trafficking and exploitation of unaccompanied children jumping up in 2023,87Dreier, supra note 1 (see chart titled “Reports of Trafficking and Abuse of Migrant Children”). it is alarming that ORR was able to contact only 81% of sponsor households between 2021 and 2022.88Britain Eakin, HHS Official Says Agency Did Not Lose Migrant Children, Law360 (Apr. 18, 2023, 7:43 PM), https://www.law360.com/articles/1595990/hhs-official-says-agency-did-not-lose-migrant-children [https://perma.cc/J7HU-5SQQ]. But even more alarming is that ORR has no legal responsibility to track children once they leave its custody89Dreier, supra note 1 (see chart titled “Reports of Trafficking and Abuse of Migrant Children”). or to remove children from unfit sponsors in the event a child is exploited.90Eakin, supra note 88.

III.  Labor Law’s Role in protecting Unaccompanied Children

While the federal government grappled with an influx of unaccompanied minors during the Biden presidency, the United States saw a 69% increase nationwide in the number of documented cases involving children employed illegally from 2018 through 2022, notably in dangerous workplaces such as meatpacking plants, construction sites, and food-processing factories.91U.S. Dep’t of Lab., 2022 Findings on the Worst Forms of Child Labor 31 (2023). This increase corresponded with several news reports in 2023 detailing migrant children working in dangerous workplaces in violation of child labor laws,92See, e.g., Tonya Mosley, Amid a Child Labor Crisis, U.S. State Governments Are Loosening Regulations, NPR (May 4, 2023, 1:09 PM), https://www.npr.org/2023/05/04/1173697113/immigrant-child-labor-crisis [https://perma.cc/WPB2-ZQZQ]; Strickler & Ainsley, supra note 10; Rosenberg, Cooke & Schneyer, supra note 10; Dreier, supra note 13. along with reports documenting the possible trafficking of migrant children into forced labor.93See Strickler & Ainsley, supra note 10; Dreier, supra note 1. While this Note has explored the leaky system of sponsor placement for unaccompanied minors, an exploration of the laws governing child labor protections also needs to be conducted before the holes in the system can be addressed.

A. The Fair Labor Standards Act of 1938 and Related Child Labor Policies

The federal law governing the employment of child labor is the Fair Labor Standards Act of 1938 (“FLSA”).94Fair Labor Standards Act (FLSA) of 1938, 29 U.S.C. §§ 201–19. The FLSA imposes occupational and hourly restrictions for children of different ages and provides penalties for employers who violate these restrictions. According to § 212(c) of the FLSA, employers95“ ‘Employer’ includes any person acting directly or indirectly in the interest of an employer in relation to an employee[,] includ[ing] a public agency, but . . . not includ[ing] . . . labor organization[s] . . . or anyone acting [as an officer or agent of a labor organization].” Id. § 203(d). cannot employ any “oppressive child labor” in commerce, the “production of goods for commerce,” or any “enterprise engaged in commerce or the production of goods for commerce.”96Id. § 212(c). Oppressive child labor means that an employer employs a child under the age of sixteen in any industry except for those exempted by the Secretary of Labor97Children under sixteen are allowed to be employed by a parent or guardian in any occupation other than manufacturing or mining and in any occupation deemed by the Secretary of Labor to be exempt because working hours in the industry can be confined to periods that do not interfere with schooling and working conditions do not interfere with the health and well-being of such children. Id. § 203(l). or that a child between sixteen and eighteen is employed in any occupation declared as particularly hazardous for the child or detrimental to the child’s health.98Id.

There are several subparts in the Code of Federal Regulations (“CFR”) that either permit or prohibit specific jobs that children are allowed to work, with jobs not explicitly allowed by the CFR considered prohibited.99See 29 C.F.R. §§ 570.32–.35. The CFR allows minors to work in jobs like babysitting, newspaper delivery, and retail work,100Id. §§ 570.33–.34, 570.122. but minors are generally not allowed to work in hazardous occupations such as manufacturing, mining, processing, construction, roofing, warehousing, or transportation of persons.101Id. §§ 570.33, 570.51–.68. Working hours for children between the ages of fourteen and fifteen are restricted by the FLSA, with such children generally not allowed to work during school hours, more than three hours a day or eighteen hours a week while school is in session, or beyond 7 p.m. during the school year or 9 p.m. during the summer.102Id. § 570.35(a). Children sixteen and older can generally work without hourly restriction in any jobs that have not been declared hazardous or detrimental to their health. While occupational restrictions remain in place as children age, federal law removes hourly restrictions when children turn sixteen, a somewhat arbitrary line, but one that corresponds with the maximum age of compulsory school attendance in many states. The main thrust of the FLSA’s restrictions is that children should not be working in hazardous workplaces or doing jobs that are detrimental to their health, nor should work interfere with their education.

An employer who violates the FLSA is subject to civil money penalties and possibly up to six months in prison if they willfully violate a child labor provision subsequent to an earlier conviction.10329 U.S.C. § 216. Employers are subject to a maximum fine of $15,138 for each employee who was the subject of a child labor violation and can face fines up to $68,801 for each violation that causes the death or serious injury of employees under eighteen.10429 C.F.R. § 570.140(b). For repeated or willful violations that lead to the death or serious injury of a child employee, the fine may double.105Id. § 570.140(b)(2). There is no private cause of action under the FLSA for children who suffer child labor violations, a problematic omission that will be discussed in Section IV.B.2.

DOL’s Wage and Hour Division (“WHD”) is responsible for investigating and determining whether employers are in compliance with the FLSA’s child labor provisions.106U.S. Dep’t of Lab., supra note 91, at 34. In 2023, WHD concluded 955 cases involving child labor violations, finding 5,792 minors were employed in violation of the FLSA, of which 502 were employed in hazardous occupations.107Child Labor, U.S. Dep’t of Lab., Wage & Hour Div., https://www.dol.gov/agencies/whd/data/charts/child-labor [https://perma.cc/J65F-C6ZM]. During the Biden presidency, WHD stepped up enforcement significantly, levying multi-million dollars in fines that nearly doubled in amount year-over-year between 2022 and 2024.108Id. Unfortunately, the number of cases involving migrant children is not tracked by WHD, but the number of children employed in violation of federal law increased 88% between 2019 and 2023,109Jessica Looman, Wage and Hour Division: Working to Keep Kids Safe, U.S. Dep’t of Lab. Blog (Oct. 19, 2023), https://blog.dol.gov/2023/10/19/wage-and-hour-division-working-to-keep-kids-safe [https://perma.cc/QQ6U-EVDP]. corresponding with the influx of unaccompanied child arrivals.

In February 2023, DOL and ORR recognized the link between increased child migration and increased child labor exploitation and entered into an interagency agreement to combat child labor exploitation amongst unaccompanied children.110DOL-HHS Information Sharing Agreement, supra note 15. Pursuant to this agreement, DOL and ORR collaborate and share information regarding child labor investigations and child placements.111Id. The agencies gave an example of what this information sharing looks like: DOL shares information regarding an active child labor investigation with ORR, and ORR scrutinizes its sponsor vetting process in the related geographic location for signs of exploitation affecting unaccompanied children placed nearby.112Id. In the agreement, WHD pledged to affirmatively initiate investigations in which child labor violations are most likely to occur, while ORR pledged to follow up with any child who calls the ORR National Call Center with a safety concern, a practice that was not previously utilized.113Id. Most importantly, the agreement called on Congress to increase funding for WHD and the Office of the Solicitor to investigate child labor cases and to increase civil penalties for child labor violations to be more of a deterrent for employers.114Id. WHD and the Office of the Solicitor have been chronically underfunded for decades, costing WHD 12% of its staff between 2010 and 2019 and resulting in more than a hundred attorneys leaving the Office of the Solicitor.115Id. Those losses have limited the number of child labor cases that WHD and the Office of the Solicitor can investigate and conclude. Given that the actual number of child labor violations in the United States is currently unknown and WHD’s budget shortfalls leave it unable to properly investigate, there is no telling how many children are actually being exploited in U.S. workplaces.

B. Varying State Child Labor Laws

As mentioned earlier, state law plays a role in the child labor protection scheme, with each state having its own system for policing illegal child labor. Some states simply implement FLSA’s provisions into their labor codes, but many create stronger protections for minors. For instance, California follows the FLSA structure of occupational and hourly restrictions but imposes hourly restrictions on children over sixteen.116Cal. Lab. Code § 1391(a) (West 2025). California’s labor code also expands the reach of its child labor protections to any person who owns or controls real property where a minor is employed if that person benefits from the minor’s employment and knowingly permits a child labor violation.117Id. § 1301(a). Extending liability to those who own or control property covers situations in which no employment relationship exists between the property holder and a minor. For example, if a business entity hires an independent contractor to work on the entity’s property and the contractor uses illegal child labor, the entity could be liable despite having no control over the contractor’s employee. State laws also often require children and employers to obtain work permits that can provide proof of age and detail any restrictions in working hours or tasks a minor is qualified to do.118For a nationwide survey of work permit requirements, see Employment/Age Certificate, U.S. Dep’t of Lab., Wage & Hour Div., https://www.dol.gov/agencies/whd/state/age-certificates [https://perma.cc/836P-UMXD].

Troublingly, at least twenty-eight states have reworked their labor codes to loosen restrictions on child labor since 2021, with some states loosening hourly and occupational restrictions to the point of conflict with the FLSA.119See Nina Mast, Child Labor Remains a Key State Legislative Issue in 2024, Econ. Pol’y Inst.: Working Econ. Blog (Feb. 7, 2024, 12:35 PM), https://www.epi.org/blog/child-labor-remains-a-key-state-legislative-issue-in-2024-state-lawmakers-must-seize-opportunities-to-strengthen-standards-resist-ongoing-attacks-on-child-labor-laws [https://perma.cc/H5QA-V4H9] (outlining a trend of weakening child labor laws among several states); Lauren Kaori Gurley, America Is Divided Over Major Efforts to Rewrite Child Labor Laws, Wash. Post (Apr. 5, 2024), https://www.washingtonpost.com/business/2024/03/31/us-child-labor-laws-state-bills [https://perma.cc/ZXV5-LBC5] (same). Iowa, for example, loosened occupational restrictions to allow children to work in dangerous occupations like brick manufacturing, roofing, and excavation, which are prohibited under the FLSA.120See Iowa Code §§ 92.8, 98.2A (West 2025) (allowing children to work in occupations prohibited under the FLSA as part of a work-based learning program, registered apprenticeship, career and technical education program, or student learner program); see also Letter from Seema Nanda, Solic. of Lab., Dep’t of Lab. & Jessica Looman, Principal Deputy Adm’r, Dep’t of Lab., Wage & Hour Div., to Nate Boulden, Senator (Aug. 24, 2023) [hereinafter DOL Letter to Senator Boulden], https://aboutblaw.com/bajw [https://perma.cc/2JL6-V54Q] (“There are several hazardous occupations orders that do not have the limited apprentice and student-learner exception, and youth generally may not perform work in such occupations even if they are participating in an apprenticeship or student-learner program. . . . Iowa Code § 92.8A purports to permit 16- and 17-year-olds to perform work that is, in fact, prohibited by federal law to the extent that an employer or child is covered by the FLSA.”). Iowa’s approach of allowing children to work in direct violation of FLSA restrictions is reflective of a recent push by some states to create a point of tension between state and federal law, which puts DOL on alert moving forward.121DOL Letter to Senator Boulden, supra note 120 (“[T]he Department [of Labor] will continue to monitor Iowa’s implementation of the law to assess potential obstruction of federal child labor protections.”).

Due to the varying approaches states take to child labor protections, state law generally is not the best tool with which to protect unaccompanied minors. While states like California may offer stronger protections than states like Iowa, unaccompanied minors will only be protected by the laws of the states in which they reside with their sponsors. Relying on state law to cure the gaps in federal law creates a system in which unaccompanied minors will be exposed to various levels of risk depending on how much emphasis states put on protecting children in the workplace.

C. Anti-Trafficking Laws Protecting Unaccompanied Children

Labor trafficking of unaccompanied minors is the ultimate concern when it comes to labor exploitation. Although the TVPRA is written to help protect minors from being trafficked by requiring DHS to determine whether an unaccompanied minor has been a victim of a severe form of trafficking or whether a child is at risk of being a victim in the future,122William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008, Pub. L. No. 110-457, § 235(a)(2)(A)(i), 122 Stat. 5044, 5075 (Dec. 23, 2008) (codified at 8 U.S.C. § 1232). there are not many preventative measures once a child leaves ORR custody. The precursor to the TVPRA, the Trafficking Victims Protection Act of 2000 (“TVPA”), added criminal offenses relating to human trafficking to the United States Code, which are supposed to act as a deterrent to would-be traffickers.123Trafficking Victims Protection Act of 2000, Pub. L. No. 106-386, § 1589, 114 Stat. 1464, 1486 (amended by William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008, Pub. L. No. 110-457, § 1589, 122 Stat. 5044, 5068) (codified at 18 U.S.C. §§ 1589–94). Under 18 U.S.C. § 1589, defendants found to be trafficking in persons can face fines and be imprisoned for up to twenty years.12418 U.S.C. § 1589(d). If a trafficking violation includes kidnapping or an attempt to kidnap, aggravated sexual abuse, or an attempt to kill, the trafficker can be imprisoned for life.125Id. Traffickers are people who knowingly provide or obtain the labor or services of a person by means or threats of force, physical restraint, serious harm, the actual or threatened abuse of law or legal process, or by any scheme, plan, or pattern intended to cause a person to believe that if they do not perform labor or services, they or another person would suffer serious harm or physical restraint.126Id. § 1589(a). The meaning of the term “serious harm” is broad, including physical, psychological, financial, or reputational harm that is serious enough to compel a reasonable person of the same background and in the same circumstances to perform labor or services to avoid the harm.127Id. § 1589(c)(2). Traffickers are also subject to civil penalties, including full restitution to a victim for the full amount of the victim’s losses.128Id. § 1593.

On its face, the penalty scheme for trafficking has robust enough punishments to deter sponsors or third parties from trafficking unaccompanied minors and abusing their labor. But the actual effectiveness of those deterrents is unknown given that there are no readily available and reliable statistics about how often traffickers are prosecuted for the labor trafficking of unaccompanied minors. Unaccompanied children have a remedy under the TVPA in the event that trafficking is proven, but trafficking tends to be very hard to prosecute, and the TVPA’s deterrents are unlikely to keep migrant children from being pressured or forced into hazardous labor in the first place. As discussed, migrant children often want to work to help their families, and it is unlikely that many know what a textbook case of labor trafficking consists of or when to report it. While these protections for unaccompanied children and punishments for traffickers are important to keep in mind, a lack of information from the government prevents this Note from being able to adequately explore and critique the TVPA’s efficacy.

IV. ISSUES WITH and possible solutions for ORR’s PLACEMENT OF UNACCOMPANIED MINORS AND Federal enforcement of Child LABOR LAWs

Migrant children working in hazardous occupations is not a new issue, but the rate at which child labor violations are increasing and the holes in the placement and supervision of unaccompanied children portend serious failings in U.S. law and the procedures that federal agencies employ. At best, the current gaps in immigration and labor law increase the risk of migrant children being exploited or harmed by working in jobs they should not be in. At worst, the gaps are large enough to allow labor trafficking to occur. Determining how to solve the issue is not a straightforward exercise. Federal agencies, shelter networks, and individuals all have a part to play, but the complex web of federal laws, regulations, and interagency agreements has been built by dealing with one symptom of the unaccompanied arrivals issue at a time. The government should take a more comprehensive approach, updating existing laws as a complete system to protect children from point A (arrival at the border) to point B (the resolution of immigration proceedings). The Biden administration rightfully responded to unaccompanied arrivals with a humanitarian approach focused on quickly getting children out of federal custody, but current law does not ensure that unaccompanied children will be adequately taken care of after their release. The TVPRA alone does not mandate ORR to do enough to protect children, nor does the FLSA provide robust enough enforcement mechanisms to properly deter irresponsible employers or third parties from exploiting children who are motivated to work for a variety of reasons. State law also cannot be relied on to adequately protect unaccompanied children due to the various different enforcement schemes at hand across the nation.

This Part will identify issues with ORR’s custody, placement, and post-release supervision of unaccompanied minors and DOL’s inability to properly deter illegal child labor. It will also discuss possible solutions that can be implemented in a way that balances humanitarian principles with employer realities and government capabilities, presenting a series of adjustments in U.S immigration and labor law that could combine to minimize the risk that unaccompanied children face labor exploitation. This Part assumes that the majority of employers are responsible and seek to fully comply with the law. It uses the term “irresponsible employers” to mean those that would willingly resort to illegal child labor in violation of state or federal law.

A.Issues with ORR’s Custody, Placement, and Post-Release Supervision of Unaccompanied Minors

1.Proper Vetting of Sponsors Versus Speed of Release

As discussed in Part III, there are many drawbacks to holding children in ORR custody. Children may suffer sexual harassment and abuse in government facilities,129U.S. Dep’t of Health & Hum. Servs., Report on Sexual Abuse and Sexual Harassment Involving Unaccompanied Alien Children: 2017 (2020), https://www.hhs.gov/programs/social-services/unaccompanied-children/uac-sexual-abuse-report-2017 [https://perma.cc/9ZSC-SHXU]. and a child’s lack of contact with their family can lead to toxic stress that permanently alters brain chemistry.130Keen et al., supra note 73. Children being traumatized in federal custody is real. Studies show that detention is “deleterious to the mental health of immigrants” and that detained children experience significant psychological distress, especially when separated from their caretakers.131Sarah A. MacLean, Priscilla O. Agyeman, Joshua Walther, Elizabeth K. Singer, Kim A. Baranowski & Craig L. Katz, Mental Health of Children Held at a United States Immigration Detention Center, 230 Soc. Sci. & Med. 303, 307 (2019); see also Suzan J. Song, Mental Health of Unaccompanied Children: Effects of U.S. Immigration Policies, BJPsych Open, Nov. 2021, at 1, 3. While the risk of harm to migrant children in ORR’s custody has been clearly documented, releasing a child to a sponsor too quickly can put the child at risk of not being properly cared for, possibly leading to the child’s exploitation or trafficking, examples of which reporters have repeatedly identified.132See, e.g., Laura Strickler & Julia Ainsley, Report Finds More Than 340 Migrant Kids Were Sent to Live with Nonrelatives Who Sponsored Other Children, NBC News (June 2, 2023, 11:59 AM), https://www.nbcnews.com/politics/immigration/advocates-hhs-questions-unaccompanied-migrants-child-labor-rcna87326 [https://perma.cc/UE5Z-X9M7]; Strickler & Ainsley, supra note 10; Dreier, supra note 1. Thus, the government must strike a risk-minimizing balance between quickly placing unaccompanied children with sponsors to avoid prolonged detention and properly vetting sponsor households to ensure a safe environment for paroled children.

During the first Trump presidency, the average length of time that unaccompanied children remained in ORR custody ballooned to 102 days, partially as a result of an information-sharing agreement between ORR, Immigration and Customs Enforcement (“ICE”), and CBP that was geared toward increasing the due diligence required for sponsors.133Kandel, supra note 8, at 11, 25. The agreement called for ORR to share the citizenship and immigration status, criminal and immigration history, and biographic and biometric information about potential sponsors and their household members with ICE.134Id. at 25. In turn, ICE would provide summaries of a sponsor’s immigration and criminal histories for ORR to make a more thorough decision on a sponsor’s suitability.135Id. While the Trump administration sold the agreement as a more stringent vetting of sponsors to ensure the well-being and protection of unaccompanied minors, the policy was ultimately used by ICE to arrest and deport undocumented migrants who applied to sponsor children, causing a chilling effect on the number of sponsors willing to apply to take children in.136Id. at 25–26. With fewer sponsors, increases in minors’ detention time naturally resulted. A massive backlog of unaccompanied minors in prolonged detention led the Biden administration to terminate the Trump-era information sharing agreement between ORR and ICE and temporarily waive background check requirements for sponsor applicant household members,137Id. at 33. See generally Admin. for Child & Fams., Off. of Refugee Resettlement, FG-11, Re: ORR Field Guidance #11, Temporary Waivers of Background Check Requirements for Category 2 Adult Household Members and Adult Caregivers (2021). adopting a controversial policy of moving children more rapidly through the shelter system.138See, e.g., Amanda Seitz, White House Promises Crackdown on Migrant Child Labor, AP News (Feb. 27, 2023, 5:56 PM), https://apnews.com/article/politics-child-endangerment-abuse-us-department-of-health-and-human-services-children-91ad24f4cfafd03434ad83f72732b64e [https://perma.cc/9NSA-E3EA]. These policy changes created a major issue for the UAC Bureau: the risk of harm to children in custody was traded for the risk that children would end up in an inappropriate sponsor home. Moving back into a Trump presidency begs the question of whether President Biden’s approach should persist.

The second Trump administration should not return to a policy of sharing sponsor information between ORR and ICE, as it greatly prolonged child stays in detention while being used as a tool to deport family members who sought to reunite with children in federal custody. The Biden administration’s decision to terminate the information sharing agreement to speed up sponsor placements was the correct call, as it is not in the best interests of unaccompanied children or the government to discourage sponsorship by involving ICE in the vetting process. A child’s best interest is to be released quickly and safely, ideally into a family member’s care. But many family members of unaccompanied children may themselves be undocumented or live with others who are. Allowing ICE to scrutinize members of a sponsor’s household will undoubtedly disincentivize family members from applying as sponsors and lead to longer detention for children, as seen during the first Trump presidency. It is also unlikely that the immigration status of a member of a sponsor’s household, on its own, increases any risk to a child placed in the sponsor’s care. Likewise, the government’s best interest is also to quickly and safely place a child in a sponsor’s care, as it is not feasible for ORR to house, educate, and care for tens of thousands of children for any prolonged period of time. In its current state, the U.S. immigration system is not equipped to care for unaccompanied minors for more than a few weeks, if at all. Placing children with sponsors quickly, even if a member of a sponsor’s household may not have legal status in the United States, is better than leaving children languishing in federal detention and meets the needs of both unaccompanied minors and the federal government.

While the second Trump administration should not return to its former policies, the Biden administration’s policy of speeding up sponsor placements by waiving background checks for members of a sponsor applicant’s household should also not be used in the future. When ORR’s ability to properly care for children in custody is maxed out, sponsor placement is the only option, absent an uptick in resources meted out by Congress. That is the situation the Biden administration found itself in after taking office. But while speeding up placements is the only adequate option during times of agency overwhelm, the executive branch should not be able to resort to outright waivers of background checks for members of sponsor-applicants’ homes, as such measures impose unnecessary risk on the children that ORR is tasked to protect. The TVPRA already spells out minimum considerations ORR must make regarding sponsors,139William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008, Pub. L. No. 110-457, § 235(c)(3)(A), 122 Stat. 5078 (codified at 8 U.S.C. § 1232). and agency officials should remain beholden to minimal legal standards for the safety of unaccompanied minors.

Congress can likely address the shortcomings of both the Trump and Biden administrations by amending the TVPRA to ensure that anti-immigration administrations cannot impose unnecessary burdens on the UAC Bureau that slow child placement and that immigration-neutral or pro-immigration administrations cannot waive necessary background checks. Rather than setting a minimum standard, the TVPRA could be amended to define what a proper background check consists of, while making that background check non-waivable. While the TVPRA has minimum background check standards, Congress should take some discretion out of the hands of the Secretary of HHS by laying down a comprehensive and non-waivable background check via statute. Congress is in the best position to listen to stakeholders and balance the needs of children and HHS in outlining a background check. It can define the full scope of what a proper background check should consist of, prohibiting unnecessary steps like the extra ICE check, while ensuring that background checks cannot be legally waived by the HHS Secretary. Moreover, Congress should also statutorily guarantee that it will adjust ORR’s funding in times of system overwhelm. Such measures would add a layer of accountability and oversight over HHS in order to protect children from the harm of being released to unsuitable sponsors and guarantee that ORR has the resources it needs to properly ramp up operations during times of influx.

2.Keeping Track of Migrant Children Paroled into Sponsor Homes

The true impact of the Biden administration’s changes to sponsor vetting and child placement is currently unknown due to a lack of information about children placed into a sponsor’s care after a waived background check, which is a large part of the issue. According to former HHS Secretary Xavier Becerra, ORR has no legal requirement to keep track of children once it releases them from its custody, nor do paroled children or their sponsors have an obligation to follow up with ORR.140In March 2023, Secretary Becerra told a U.S. House Committee that “Congress has given [HHS] certain authorities. Our authorities essentially end the moment we have found a suitable sponsor to place that child with. We try to do some follow-up but neither the child nor the sponsor is actually obligated to follow up with us.” Kristian Hernández, How (and Why) the GOP and a Popular Film Are Misleading You About Migrant Kids, Ctr. for Pub. Integrity: Immigration (Dec. 11, 2023), https://publicintegrity.org/inequality-poverty-opportunity/immigration/gop-film-sound-of-freedom-misleading-migrant-kids [https://perma.cc/7WPG-QCHU]. This is a major gap in the TVPRA and related regulations that raises the risk of labor exploitation. ORR increasingly lost touch with the children it paroled into sponsor care during the Biden presidency, as evidenced by the fact that it could not reach roughly 85,000 children for follow-up calls.141See Dreier, supra note 13. Without a legal mandate to keep track of unaccompanied children upon release, ORR cannot be expected to prioritize critical measures that could help ensure the well-being of paroled children. ORR is the first line of defense in ensuring that children are in proper homes in which education is the priority, and the agency should be required to procure and maintain post-release data about whether children are attending school full-time or working, the nature of any such employment, and whether sponsors are adequately caring for them. Such data is critical in evaluating whether children are at a greater risk of harm by remaining in government custody or by being released as quickly as possible. At a minimum, Congress should amend the TVPRA to require ORR to keep track of children formerly in its custody and record statistics regarding school attendance and work performed, along with qualitative data about the child’s experience with their sponsor.

ORR does voluntarily contact children thirty days after their release and offers post-release services to a decent number of children,142Off. of Refugee Resettlement, supra note 76, § 2.8.3; Fact Sheets and Data, Off. of Refugee Resettlement (Apr. 7, 2025), https://acf.gov/orr/about/ucs/facts-and-data [https://perma.cc/M8ZW-Z9UM] (choose “Post-Release Services” under the “Data” heading) (showing the percentage of released children referred for post-release services under the Biden administration increased from 27.5% to 82.1% from 2021 to 2024). which shows that some infrastructure exists that could be scaled up. But ORR is not currently equipped to keep track of the tens of thousands of sponsored children currently in the United States and would certainly need further funding from Congress to do so. It is important to note that children would not need to be monitored indefinitely. The length of time that monitoring would be required is limited temporally by two factors: first, all unaccompanied minors are placed into removal proceedings immediately upon being transferred into ORR’s custody,143Kandel, supra note 24, at 3. meaning each child’s monitoring has a guaranteed end date based on a determination of their immigration status; and second, children age out of the unaccompanied child program when they turn eighteen.144Their matters are then transferred to ICE, which may place them into adult detention pending removal. While ORR would need to significantly scale up its post-release capabilities to comprehensively track where every unaccompanied child goes and what happens to them post-release, this is likely a matter of political will that could have the backing of both conservative politicians concerned about undocumented immigrants in the country and liberal politicians concerned about the wellbeing of migrant children.

Monitoring whether unaccompanied children are attending school regularly would greatly improve the ability of ORR and DOL to identify children who may be at risk of exploitation. Much of the victimization discussed in this Note centers on unaccompanied minors who are working in hazardous conditions in violation of federal child labor laws. Children released to sponsors are usually required to attend school under state law,145Unaccompanied Children: Services Provided, Off. of Refugee Resettlement, https://www.acf.hhs.gov/orr/about/ucs/services-provided [https://perma.cc/SS9W-MNW6]. Every state in the United States generally requires children to attend school until they turn sixteen years old, with many states requiring attendance until the child turns seventeen or eighteen years old. See Compulsory Education Laws: 50-State Survey, Justia, https://www.justia.com/education/compulsory-education-laws-50-state-survey [https://perma.cc/WS3K-8QZ2]. but news reports make clear that many are not attending school regularly, if at all, and instead working long shifts in dangerous workplaces.146See, e.g., Mosley, supra note 92. These children should be attending school full-time and focusing on their immigration matters. If a child’s attendance record in school is sparse, it may be evidence that the child is being overworked outside of school, which could point to exploitation from a third party. While ORR alone does not have the capacity or infrastructure to monitor every child it places into a sponsor home, it could enter into an information-sharing agreement with the Department of Education (“DOE”) to monitor school attendance for paroled children attending public schools. Local and state education boards regularly track student attendance in schools, and public schools that receive federal funding have the ability to share attendance statistics with DOE under the Federal Educational Rights and Privacy Act (“FERPA”).14720 U.S.C. § 1232g(b). Although FERPA protects the privacy of students’ education records (including history of attendance) and prevents them from being shared with any individual, agency, or organization without the written consent of parents,148Id. the law only specifically affords privacy protections to parents and eligible students.149“Eligible student means a student who has reached 18 years of age or is attending an institution of postsecondary education.” 34 C.F.R. § 99.3. FERPA arguably does not apply to unaccompanied minors who are not in the care of their parents and, as such, would not be an impediment to DOE sharing student records with ORR. This kind of interagency agreement would provide ORR with vital information that could help tip the government off to potential exploitation of children who are not regularly attending class.

Through congressional mandate or interagency cooperation, keeping track of paroled children is the surest way to monitor their wellbeing and prevent them from working in dangerous situations. If the TVPRA were amended to mandate that ORR keep track of paroled children, an information-sharing agreement with DOE would likely be an efficient and cost-effective way to fulfill part of that mandate. Along with ORR’s information-sharing agreement with DOL, an agreement with DOE would enable federal agencies to pool their resources and work together to protect unaccompanied minors, without requiring a massive increase in funding from Congress. In today’s polarized political climate, a targeted amendment to the TVPRA and an interagency agreement are probably the most realistic and practical solutions.

3.Implementing Reporting Requirements for Sponsors

Even if ORR was mandated to monitor every unaccompanied child post-release, its efforts would not be effective without a change in current law to require sponsors and paroled children to report in to the agency. As previously noted, ORR was able to contact only about 81% of sponsor households with thirty-day wellness checks between 2022 and 2023.150See Dreier, supra note 1. Mandating ORR to contact children will not ensure contact will be made. Sponsors and children may simply be unreachable. While each sponsor signs an agreement with the federal government promising to provide for a child’s well-being, there is seemingly no requirement that a sponsor prove that they are doing so. For instance, if a sponsor coerces a child to work in order to pay for rent or meals that the sponsor is supposed to provide, ORR will not know unless the child reports the abuse to ORR’s National Call Center. The current system puts the onus squarely on children to voluntarily report their own abuse, which leads to guaranteed underreporting issues.151For a discussion of a well-known issue of the underreporting of child abuse, see Inst. of Med. & Nat’l Rsch. Council, New Directions in Child Abuse and Neglect Research 44 (Anne C. Petersen, Joshua Joseph & Monica Feit eds., 2014) (“Retrospective reports from adults abused or neglected as children reveal that most cases are not reported to anyone, and fewer still are reported and investigated by child protection workers or law enforcement officials.”). A more humane system would require sponsors to check in with ORR at regular intervals to certify that children are being cared for, with an emphasis placed on hearing from the child directly. While such reporting requirements would still be vulnerable to sponsor misrepresentation or noncompliance, an affirmative obligation would exist for sponsors that could deter unsuitable sponsors from applying in the first place.

There may be some question as to whether tracking children post-release is actually necessary, as most children who arrive unaccompanied at the border are fifteen or older.152Off. of Refugee Resettlement, supra note 23 (“Age” chart). Indeed, the idea of fifteen- and sixteen-year-olds entering the workforce is common in the United States,153Several Republican-dominated states have loosened child          labor protections in order to expand the number of hours and types of work children as young as fourteen can do. See, e.g., Michael Sainato, Republicans Continue Effort to Erode US Child Labor Rules Despite Teen Deaths, The Guardian (Oct. 20, 2023, 7:00 AM), https://www.theguardian.com/us-news/2023/oct/20/republican-child-labor-law-death [https://perma.cc/XWY9-4B3H]. but it is important to remember we are talking about a specific subset of particularly vulnerable children. It should not be controversial to say that a child’s focus should be on completing a primary education rather than working in a factory or slaughterhouse. As it stands, children who fail to attend school regularly, regardless of the reason, tend to suffer worse outcomes than those who do.154According to a report on chronic absenteeism in schools published by the White House, “irregular attendance can be a predictor of high school drop-out, which has been linked to poor labor market prospects, diminished health, and increased involvement in the criminal justice system. Students who are chronically absent are at higher risk for these adverse outcomes.” Chronic Absenteeism and Disrupted Learning Require an All-Hands-On-Deck Approach, White House (Sept. 13, 2023), https://www.whitehouse.gov/cea/written-materials/2023/09/13/chronic-absenteeism-and-disrupted-learning-require-an-all-hands-on-deck-approach [https://perma.cc/D2AH-XZCP]. If the federal government is intent on meeting arrivals of unaccompanied children with a humanitarian focus, as it was under President Biden, it must create an immigration system that focuses on providing unaccompanied children with a proper education while keeping them from working in illegal occupations. Knowing where children are and what their condition is post-release is an important step toward meeting those goals and lowering the risk of harm.

4.Enforcement Mechanism Needed

The last major problem with ORR that this Note will address is ORR’s inability to act when sponsors fail to properly care for children. ORR’s role is limited to placing children safely into sponsor homes. It is not a federal law enforcement agency, and it is not statutorily tasked with scrutinizing whether sponsorships are successful. But ORR does require sponsors to agree to provide care for paroled children,155Off. of Refugee Resettlement, Sponsor Care Agreement 1 (2020), https://www.acf.hhs.gov/sites/default/files/documents/orr/sponsor-care-agreement-1-31-20.pdf [https://perma.cc/U3KB-6HJF]. and it has an interest in knowing that sponsors comply with those agreements. If a sponsor’s care is lacking, ORR does not have many options to enforce its agreement and ensure that children are getting the help they need. According to former ORR Director Robin Dunn Marcos, ORR’s only recourse in such cases is to refer the matter “to local law enforcement, child protective service[s], and other federal entities as appropriate.”156Refugee Resettlement Director Testifies on Unaccompanied Children at the U.S.-Mexico Border, C-Span, at 01:21:40 (Apr. 18, 2023), https://www.c-span.org/video/?527458-1/refugee-resettlement-director-testifies-unaccompanied-children-us-mexico-border. ORR itself has no power to remove a child from a sponsor’s care. While referring allegations of sponsor abuse to state and local agencies seems like a reasonable process, the reliance on third-party entities to make a determination adds complexity to the UAC Bureau system and shifts the burden of protection away from the federal government. Unaccompanied children have distinct needs due to their immigration status, such that being placed into a foster home by a state or local agency may complicate their ability to seek familial help or legal representation during their immigration processes. Rather than relying on state agencies using differing processes to address sponsor abuse or abandonment, the federal government should be responsible for managing each unaccompanied minor to ensure continuity of care throughout the immigration process.

If an ORR sponsor credibly fails to honor their agreement with the federal government, there should be tangible actions that ORR can take, such as reclaiming custody of any child in the sponsor’s care and revoking that sponsor’s right to sponsor other children in the future. Rather than letting paroled children bounce between local, state, and federal agencies in the event of a failed sponsorship, Congress should amend the TVPRA to allow ORR to reassign children to suitable sponsors. Failed sponsorships include not only cases of abuse and exploitation, but also cases of neglect and abandonment in which sponsors help children get out of federal custody but then leave them to fend for themselves after release, which are not always foreseeable situations when vetting sponsors. By allowing or requiring ORR to retake custody of unaccompanied minors, Congress would incentivize ORR to follow sponsor-vetting procedures and find the right match at the outset, while allowing for continuity of contact between paroled children and the agency in the event a child is exploited by their sponsor. Increased continuity would lessen the confusion that unaccompanied children experience throughout the UAC Bureau and task ORR with the responsibility to make the program a success.

B. Inadequacies in FLSA Penalties and DOL Enforcement Capabilities

In 2023, then former ORR Director Dunn Marcos told the House Oversight and Accountability Subcommittee on National Security, the Border, and Foreign Affairs that combatting labor exploitation among unaccompanied children requires “a whole-of-government approach,”157Id. at 01:22:37. intimating that ORR alone cannot solve the issue. Despite facing heavy bipartisan criticism for ORR’s performance, Director Dunn Marcos was correct. The federal government must act in tandem across agencies and government branches to properly safeguard unaccompanied minors. Collaborating with DOE would be a start in terms of monitoring children’s well-being post-release, but ORR cannot also monitor children in the workplace. That task belongs to DOL. While an existing agreement between the agencies exists to tackle possible labor exploitation of unaccompanied minors, congressional action and statutory changes are needed to further reduce the risk of exploitation for unaccompanied minors. This Section will address DOL’s chronic underfunding and FLSA’s insufficient statutory penalties as two issues that can be remedied to reduce the risk of unaccompanied minor exploitation. Further, it will discuss the need for a private cause of action for victims of willful child labor violations to provide children with a remedy for the harm they suffer.

1.DOL’s Chronic Underfunding Increases the Risk that Unaccompanied Minors Go Unnoticed by Federal Investigators

2023 and 2024 marked DOL’s most aggressive enforcement years in the agency’s history in terms of punishing employers who illegally employed child labor.158Rebecca Rainey, Child Labor Cases Rise as DOL Vows Historic Enforcement Push, Bloomberg L. (July 26, 2023, 9:31 AM), https://www.bloomberglaw.com/product/blaw/bloomberglawnews/bloomberg-law-news/XCTROIP8000000 [https://perma.cc/L5BC-LJH8]. In response to a reported 88% jump in illegal child labor between 2019 and 2023,159Looman, supra note 109. DOL made clear that the rising rate “is a direct result of [the agency’s] increased emphasis on identifying child labor cases and bringing enforcement actions when [it] find[s] companies violating the law.”160Rainey, supra note 158. The agency’s focus on expanding enforcement actions is welcome news for those concerned about unaccompanied children facing labor exploitation or trafficking, but Congress has left DOL chronically underfunded for years, undercutting WHD’s ability to properly investigate and enforce child labor laws.

In reviewing DOL’s 2024 budget, the number of investigators that WHD employed is near the lowest it has been in the last fifty years, down significantly from the peak level achieved in the 2013 fiscal year.161U.S. Dep’t of Lab., FY 2024 Department of Labor Budget in Brief 36 (2024), https://www.dol.gov/sites/dolgov/files/general/budget/2024/FY2024BIB.pdf [https://perma.cc/RM6M-6ENZ]. According to the agency, reduced staffing levels limit WHD’s ability to “develop impactful cases,” and “[c]ontinuing to operate at these levels poses significant risks to the [agency’s] mission.”162Id. As of April 2023, WHD employed a mere 794 investigators163Rebecca Rainey, Wage and Hour Staff Crunch May Hinder DOL Child Labor Crackdown, Bloomberg L. (Apr. 11, 2023, 2:25 AM), https://news.bloomberglaw.com/daily-labor-report/wage-and-hour-staff-crunch-may-hinder-dol-child-labor-crackdown [https://perma.cc/6LFM-NPY4]. to police 11 million workplaces and enforce laws protecting roughly 165 million workers.164U.S. Dep’t of Lab., Wage & Hour Div., About the Wage and Hour Division, https://www.dol.gov/sites/dolgov/files/WHD/fact-sheets/WH1030.pdf [https://perma.cc/F7U9-JR2F]. The number of investigators that WHD can afford to hire has eroded year-after-year since the agency employed over a thousand investigators per year from 2010 to 2013.165Daniel Costa & Philip Martin, Econ. Pol’y Inst., Record-Low Number of Federal Wage and Hour Investigations of Farms in 2022 at 8 fig.C (2023), https://files.epi.org/uploads/271660.pdf [https://perma.cc/X229-6M2U]. WHD’s 2023 operating budget authority of roughly $310 million was a slight increase over 2022’s $299 million,166U.S. Dep’t of Lab., supra note 161, at 34. but in terms of inflation-adjusted dollars, those funding figures are roughly even with the amount of money appropriated by Congress back in 2006,167Costa & Martin, supra note 165, at 7 fig.B. demonstrating that Congress has been unwilling to increase its investment in the enforcement of child labor protections for decades. Without adequate funding, WHD cannot ensure it has an adequate number of investigators to look into allegations of illegal child labor.168This is a problem also shared by the Office of the Solicitor as discussed in Section III.A.

The sheer number of workplaces that WHD is responsible for illustrates the problem of underfunding. If each of WHD’s 794 investigators began individually reviewing one workplace per day for signs of child labor violations, it would take roughly thirty-eight years to complete a single round of investigations of all eleven million workplaces in the United States.169Eleven million workplaces, divided by 794 investigators, divided by 365 investigations per year. Obviously, not every employer needs to be investigated for child labor violations, as many (if not most) do everything in their power to follow the law, but the illustration serves to show how thinly stretched WHD is. Under all of the statutes that WHD enforces, it concluded 20,215 compliance actions in 2023, its lowest total in ten years.170Impact in Fiscal Year 2024: Fiscal Year Data for WHD: All Acts, U.S. Dep’t of Lab., Wage & Hour Div., https://www.dol.gov/agencies/whd/data/charts/all-acts [https://perma.cc/T8J2-3X63]. Even though its number of closed cases involving child labor violations reached a ten-year high in 2023,171Id. WHD failed to conclude the same number of compliance actions as the previous year for the sixth straight year.172Id. These figures should not be read to assume that federal labor law violations are on the decline. As evidenced by the sharp increase in child labor law violations nationwide, the rate of violations tends to increase in areas in which WHD focuses its attention in the first place.

The only solution to the issue of inadequate enforcement caused by understaffing is proper funding. Both chambers of Congress have made a point to try to address child labor violations by presenting bills with expanded penalties for violators,173See, e.g., Diego Areas Munhoz, GOP Senators Push for Child Labor Bills in Rare Bipartisan Move, Bloomberg L. (Nov. 9, 2023, 2:05 AM), https://news.bloomberglaw.com/daily-labor-report/gop-senators-push-for-child-labor-bills-in-rare-bipartisan-move [https://perma.cc/6ZZ3-96Z9] (describing multiple bipartisan bills introduced following DOL data about increases in child labor violations). but increasing penalties alone will not lessen WHD’s burden as it attempts to enforce child labor laws. Harsher penalties may deter some irresponsible employers and lead them back to a place of compliance, but the agency will likely still be stymied by the same erosion of resources and investigators as has been the case the past ten years. If Congress is serious about addressing the harms that unaccompanied children (and U.S. children) face in abusive workplaces, it needs to fully fund DOL, as the Biden administration requested in its 2024 budget. With full agency funding, WHD would have the capacity to increase child labor investigations, thereby reducing the risk that unaccompanied minors working in some of the United States’ most dangerous workplaces go unnoticed. Without adequate funding, WHD will be continually forced to ration its enforcement capabilities with an ever-shrinking roster of investigators, thus ensuring that labor exploitation of unaccompanied minors goes unnoticed.

2. Current FLSA Penalties Are Inadequate to Deter Bad Actors from Committing Child Labor Law Violations

Even if Congress adequately funded DOL, there would still be an issue of inadequate penalties for child labor law violators. As mentioned in Section III.A, FLSA violators are currently subject to a maximum fine of $15,138 for each child labor violation and can be fined up to $68,801 for each violation that causes the death or serious injury of any employee under eighteen.17429 U.S.C. § 216(e)(1)(A)(i); 29 C.F.R. § 570.140(b). By assessing fines per violation,175See Memorandum from Jessica Looman, Adm’r, to Regional Administrators and District Directors, U.S. Dep’t of Lab., Wage & Hour Div. 3 (Nov. 28, 2023), https://www.dol.gov/sites/dolgov/files/WHD/fab/fab2023_4.pdf [https://perma.cc/SD3N-58WC]. WHD is also able to stack penalties against violators depending on the severity of the conduct. But while these fines may be costly, the FLSA penalization scheme often feels woefully insufficient based on the harm suffered.

For instance, a contractor that hired a fifteen-year-old boy to do roofing work on a corporate building was fined $117,175 in civil penalties for FLSA child labor violations, but the harm the boy suffered included falling fifty feet to his death on his first day of work.176Fatal Fall at Alabama Work Site, supra note 11. Proportionally, the civil penalty feels inadequate given that the boy lost his life in a job he should have never been hired for. To make matters worse, the fines collected in such a tragedy only go toward “reimbursement of [WHD’s] costs of determining the violations and assessing and collecting such penalties.”17729 U.S.C. § 216(e)(5). No compensation exists under the FLSA for the victim or their family. Depending on the size of the irresponsible employer cited, a six-figure fine may not be enough of a deterrent for risky behavior.

In lieu of fines, WHD may hold an irresponsible employer accountable by activating the “hot goods” provision of the FLSA, allowing WHD to prevent the sale of any goods made using oppressive child labor.178“No producer, manufacturer, or dealer shall ship or deliver for shipment in commerce any goods produced in an establishment situated in the United States in or about which within thirty days prior to removal of such goods therefrom any oppressive child labor has been employed[.]” 29 U.S.C. § 212(a). This provision was used in 2023 against a Wisconsin sawmill operator following the death of a sixteen-year-old who was caught in a wood-stacking machine, resulting in the company’s goods being withheld from shipment.179Teen Suffers Fatal Injuries Operating Dangerous Machinery, supra note 11. Ultimately, in exchange for WHD releasing its hold on the goods, the sawmill operator agreed to $190,696 in civil penalties for numerous child labor violations and to place labels and signage to prevent children under eighteen from using dangerous equipment at the sawmill.180Id. The company then fired all employees under the age of eighteen.181Id. While costly and inconvenient for the sawmill operator, the threat of such fines did not prevent the tragic outcome in the first place.

Given that child labor violations, even those involving the death of children, generally result only in civil monetary penalties that are limited by statute, Congress should revisit the effectiveness of the FLSA’s penalization scheme. The current scheme does not make up for the serious harm children sometimes suffer, nor are the penalties adequate to deter irresponsible actors from using and abusing the labor of unaccompanied children. While many responsible employers will be sure to hire competent counsel to guide their compliance efforts, irresponsible employers may not and might expose children to risk based on a cost-benefit analysis.

To illustrate an extreme case, a slaughterhouse sanitation company was fined more than $1.5 million after WHD investigators found over one hundred children employed by the company cleaning slaughterhouses across the country.182News Release, U.S. Dep’t of Lab., Wage & Hour Div., More than 100 children Illegally Employed in Hazardous Jobs, Federal Investigation Finds; Food Sanitation Contractor Pays $1.5M in Penalties (Feb. 17, 2023), https://www.dol.gov/newsroom/releases/whd/whd20230217-1 [https://perma.cc/5GA3-YEGF]. Some of these children were as young as thirteen and suffered chemical burns, and DHS investigated possible human trafficking after finding that some of the children were unaccompanied minors.183Strickler & Ainsley, supra note 10. In addition to chemical burns and working overnight shifts after attending school all day,184Id. the children also lost their jobs in response to government fines and saw no compensation from the penalties levied on their employer, aside from the end of their exploitation. While the sanitation company lost some contracts with major corporations185Josh Funk & The Associated Press, A Slaughterhouse Cleaning Company that Used More than 100 Children as Workers Keeps Losing Contracts with Big Companies, Fortune (May 1, 2023, 12:34 PM), https://fortune.com/2023/05/01/slaughterhouse-cleanign-company-child-labor-losing-contracts-packers-sanitation-services [https://perma.cc/KT8T-PRMW]. and paid a hefty WHD fine, it otherwise showed few, if any, signs of a long-term setback in operations and still employs about 16,500 workers nationwide.186Id. The children who were the subject of the violations arguably fared much worse, specifically the unaccompanied minors, as such children are often motivated to work to send money home to their families187See generally Stephanie L. Canizales, The Costs of Exploitative Labor on Unaccompanied Migrant Children’s Lives, What We Can Do About It, USC Equity Rsch. Inst. (Mar. 3, 2023), https://dornsife.usc.edu/eri/2023/03/03/blog-the-costs-of-exploitative-labor-on-unaccompanied-migrant-childrens-lives [https://perma.cc/9UUD-LBGL]. and probably needed their jobs, however exploitative. Moreover, if the sanitation company properly terminated the unaccompanied minors in its employ, the unaccompanied minors were likely left with no recourse whatsoever, as the FLSA provides no private cause of action for victims of child labor violations.

While this Note assumes that most employers want to do the right thing and do not wish to exploit children, irresponsible or negligent actors do exist. So, what statutory fixes can be made to increase deterrence? As noted earlier, several bipartisan bills have been proposed in Congress in recent years to strengthen the penalties for child labor violations.188See Areas Munhoz, supra note 173. An interesting bill advanced by Senators Brian Schatz and Todd Young, the Stop Child Labor Act,189S. 3051, 118th Cong. (2023). proposed to increase the maximum FLSA fines to $132,270 for common child labor violations and $601,150 for violations that result in serious injury or death to a minor.190Id. § 2(b)(1)(B)–(C). It also proposed a private cause of action for exploited children to seek up to $250,000 in punitive and compensatory damages in federal court.191Id. § 2(a)(1). By proposing increased fines and a private cause of action, the senators’ bill addressed two issues that make current labor law so ineffective as a deterrent for irresponsible employers, thus serving as an intriguing model for how labor law could evolve to safeguard unaccompanied minors.

First, FLSA fines are currently far too low to deter many employers. Even the sizeable $1.5 million fine mentioned above can be a drop in the bucket for many companies. The sanitation company that absorbed the $1.5 million fine was bought for close to $1 billion in 2014192Greg Roumeliotis & Soyoung Kim, Leonard Green to Buy PSSI for $1 Billion: Sources, Reuters (Nov. 4, 2014, 4:30 PM), https://www.reuters.com/article/idUSKBN0IP01M [https://perma.cc/BG9E-D2ZE]. and sold for an undisclosed amount in 2018 to a private equity firm with a January 2025 market cap of $210 billion.193Blackstone Inc., MarketWatch, https://www.marketwatch.com/investing/stock/bx [https://perma.cc/GKV7-98Q4]. While most employers are responsible and seek to avoid child labor violations, irresponsible actors may simply conduct a cost-benefit analysis and turn a blind eye to potential child labor violations in their workplaces if the payoff is high enough. There is also an issue of companies failing to recognize an appreciable risk of harm to children when utilizing staffing agencies or contractors who place children in company workplaces.194See, e.g., Joshua Schneyer, Mica Rosenberg & Kristina Cooke, Teen Risked All to Flee Guatemala. Her Payoff: A Grueling Job in U.S. Chicken Plant, Reuters (Feb. 7, 2022, 1:00 PM), https://www.reuters.com/investigates/special-report/usa-immigration-alabama [https://perma.cc/3GC9-E7RC]. To have any kind of a deterrent effect, FLSA fines need to be high enough to convince irresponsible employers to seek full compliance with the law. Otherwise, if the cost is negligible, irresponsible actors will simply build potential penalties into their business models and accept the risk of getting caught. The Stop Child Labor Act proposed increasing the minimum and maximum fines nearly tenfold, with penalties increasing annually in lockstep with the consumer price index for all urban consumers.195S. 3051, § 2(b)(1)–(2). It is hard to say whether these increases would be enough to properly incentivize every irresponsible actor to comply with the law or too punitive for responsible employers who mistakenly violate the law, but increases of any kind are a start and are recommended by this Note.196As of the writing of this Note, criminal prosecutions for child labor violations under the FLSA are nearly nonexistent. While criminal penalties can be a strong deterrent for irresponsible behavior, they are unlikely to be effective in the employment context given the issue of finding the right party to prosecute and the fact that many child labor violations occur due to simple negligence. With that said, employers who act willfully in committing child labor violations can face up to six months in prison under the FLSA if they have already been convicted of a previous child labor violation and are prosecuted a second time. 29 U.S.C. § 216. Such a deterrent is adequate in this author’s view.

Second, granting a private cause of action to children who suffer exploitation may be more effective than assessing WHD penalties in remedying the harm caused, provided that responsible employers are protected from unnecessary and unfair litigation. The Stop Child Labor Act’s inclusion of liability in the form of punitive and compensatory damages for child victims is a model that could help increase deterrence and provide an avenue for unaccompanied minors to seek justice, an avenue which does not currently exist. As seen earlier, employers who are fined by WHD for child labor violations sometimes terminate all minors in their employ, even children who are not the subjects of the violations. Due to the particular needs of unaccompanied minors, they may be incentivized to work, even if the work is exploitative. Thus, losing a job, even an exploitative one, can harm these children more than it helps at times. In such a situation, government action essentially victimizes unaccompanied minors further, exposing them to a vicious cycle in which they are exploited in a job that they need, fired when DOL cracks down, and then forced to find another available job, even if it too is dangerous. Providing such children with a cause of action would give them a remedy to their individualized harm. Moreover, litigation can enable facts to come to light that demonstrate the true harm that unaccompanied minors at times suffer.

The federal government will soon be able to look to Colorado to see whether a private cause of action is viable. Colorado added a private cause of action to its labor code for aggrieved children who suffer child labor violations, which became effective on January 1, 2025.197Colo. Rev. Stat. § 8-12-116(3) (2025). Depending on the violation suffered, a child can recover anywhere from $500 to $65,000.198Id. This scheme provides an outlet for exploited children to seek redress where they otherwise may not have been able to. It is worth noting, however, that such a system could be abused by children who lie about their ages, thus burdening responsible employers. Unaccompanied minors seeking work are not immune to misrepresenting their ages to employers. Importantly, Colorado’s additions to its labor code protect responsible employers by allowing actions against an employer to be waived if a minor intentionally misleads the employer about their age.199Id. § 8-12-116(5)(a). Further employer protections may be needed to avoid incentivizing frivolous litigation, such as limiting an employer’s liability in situations in which the employer was merely negligent. A delicate balance must be struck so that unaccompanied minors can seek justice and compensation without employers bearing an undue burden by having to litigate unnecessarily.

Increased fines and the availability of a private cause of action for exploited minors, with some guardrails to protect responsible employers, would add an appropriate level of deterrence to existing law and provide an avenue for unaccompanied children who are wronged to actually be compensated for their harm. Without strong deterrents, the rate of child labor violations nationwide may continue to increase, leaving unaccompanied minors at an increased risk of exploitation. At a minimum, Congress must properly fund DOL so that WHD can continue its important mission of uncovering exploitation of unaccompanied minors in the workplace.

C. Summary of Solutions

To reduce the risk of unaccompanied minors being exploited in U.S. workplaces, a number of measures need to be taken. As discussed in Section IV.A, Congress should first ensure that ORR never waives background checks for sponsors. Next, Congress should amend the TVPRA to require ORR to monitor children formerly in its custody and record school attendance and employment statistics for unaccompanied children, as well as qualitative data about each child’s experience with their sponsor. This monitoring can be accomplished by ORR increasing post-release services for all children and creating an information-sharing agreement with DOE to track school attendance among unaccompanied minors. Moreover, regulations should be implemented to require sponsors and unaccompanied children placed into their care to report to ORR periodically. To meet the mission of monitoring hundreds of thousands of paroled children, Congress will have to direct proper funding and resources to ORR, as well grant ORR the statutory authority to reclaim custody and find new sponsor homes for children whose sponsors fail to care for them.

Addressing ORR’s issues alone is not sufficient. A whole-of-government approach is required, whereby Congress must properly fund DOL so it can increase enforcement actions against irresponsible parties engaging in illegal child labor. Increased enforcement can be accomplished only by properly staffing WHD, which requires DOL to be fully funded. Additionally, Congress should act to increase the penalties that DOL can assess for child labor violations and create a cause of action for victims of illegal child labor, provided that any cause of action has proper protections built in for responsible employers. If implemented as a comprehensive set of reforms, these solutions will minimize the risk of unaccompanied children being victimized and exploited for their labor.

CONCLUSION

This Note sought to identify the gaps in federal immigration law and labor law that increase the risk of labor exploitation for unaccompanied minors who are placed in sponsor homes in the United States. While immigration law and labor law are usually looked at separately, this Note set out to recommend a comprehensive set of measures that could be taken in both areas of law to meet the common goal of mitigating the risk of harm that unaccompanied minors face due to their unique circumstances.

In making these recommendations, this Note examined a series of overlapping statutes and policies that are either structurally unsound or undermined by congressional inaction and underfunding. The TVPRA’s text and ORR’s approach to child placement are too relaxed and put unaccompanied children at an increased risk of exploitation. The TVPRA mandates government action only while unaccompanied minors are in ORR custody and relieves the government of any responsibility once children are placed into sponsor homes. Moreover, ORR does not have the resources or infrastructure available to effectively monitor every child that it releases from its custody. Similarly, while the basic structure of the FLSA is sound, the statute is undermined by relatively weak penalties and provides no avenue for child victims to seek compensation for the harm they suffer. Moreover, although Congress has signaled that it wants child labor protections to be enforced, it has underfunded the agency responsible for upholding child labor laws for years, leaving DOL understaffed and unable to meet its critical mission of holding irresponsible employers accountable and ensuring a safe workplace for children and adults alike.

Protecting unaccompanied children from labor exploitation cannot be accomplished by addressing only one set of laws or a single federal agency. A whole-of-government approach is needed whereby the legislative branch addresses gaps in current law and the executive branch uses all of the levers at its disposal to combat the issue. Legal adjustments in both immigration law and labor law and congressional funding are needed to empower ORR and DOL to fulfill their missions, and interagency agreements should be entered into and maintained in order to safeguard unaccompanied minors through their entire journey with the UAC Bureau. In the immigration arena, Congress should amend the TVPRA to require ORR to monitor children who are released from government custody until their immigration matters are settled or they age out of the UAC Bureau, and ORR must be given the authority to reclaim custody and find new sponsor homes for children who are being abused or exploited by their sponsors. ORR should also find creative ways to monitor children in lieu of increased federal funding, such as entering into an information-sharing agreement with DOE. Finally, sponsors and unaccompanied children should be required to check in with ORR as a means to demonstrate that the child is being properly cared for.

Once children have been released from ORR custody, DOL is uniquely positioned to safeguard them from employer exploitation. But DOL needs to be properly funded by Congress to be able to adequately monitor and respond to reports of illegal child labor. Understaffing has hindered DOL’s ability to investigate illegal child labor, which puts unaccompanied minors at a greater risk of harm in dangerous workplaces. While an information-sharing agreement with ORR to identify potential exploitation or trafficking amongst unaccompanied minors is a good start, DOL needs help from Congress regarding enforcement. Congress should first update the FLSA to ensure that financial penalties are high enough to act as a proper deterrent against illegal child labor. Congress should also consider providing victims of illegal child labor with a private cause of action to seek individual justice, so long as proper protections exist to prevent frivolous litigation against responsible employers.

Unaccompanied children are a particularly vulnerable group, made even more so by the shifting political winds in the United States. With the current gaps in federal law and new leadership in the executive branch every four years, unaccompanied minors are falling through the cracks and ending up in prohibited workplaces. No single agency or statutory scheme is capable of protecting each child through every step of their immigration journey. But through a collaborative and whole-of-government approach, the United States can address the shortcomings in federal immigration and labor law to properly mitigate the risk that unaccompanied children face exploitation. If Congress truly cares about children being exploited in the workplace, it should not hesitate to act by amending the TVPRA and FLSA and properly funding ORR and DOL. Congressional critiques of these agencies will not fix the structural problems hampering their performances; only congressional action can do that. The federal government has properly committed itself to protecting unaccompanied children, but it is long past time that it lives up to that commitment.

 

98 S. Cal. L. Rev. 761

Download

* Senior Editor, Southern California Law Review, Volume 98; J.D. Candidate 2025, University of Southern California Gould School of Law; B.A. 2011, Emerson College. Thank you to Jeremy Gartland, Isabelle Yuan, Michelle Solarczyk, and the staff of the Southern California Law Review for their expert edits and wonderful feedback, and to Professor Rebecca Brown for her guidance and tutelage.

I especially want to thank Professor Henna Pithia and my International Human Rights Clinic classmates. Advocating for the rights of vulnerable and politically unpopular groups requires bravery and sacrifice, and the passion that Professor Pithia and my IHRC family brought to their work inspired me in writing this Note and left me in awe.

Criminalization: An Exceptionally American Response to Homelessness

This Note analyzes the recent trend of criminalizing homelessness in the United States. The first half discusses homelessness through the lens of American exceptionalism as a comparative tool. Comparing America to its international peers helps us better understand why America’s response to homelessness has become increasingly punitive. In doing so, the Note makes a novel contribution to American exceptionalism literature in applying the concept to homelessness. Specifically, it shows that while American homelessness rates are not unusually high, American shelter rates are unusually low relative to other western democracies. The Note shows this by combining national homelessness reports into a single dataset and document. The second half of the Note discusses current constitutional doctrine relating to homelessness, focusing on City of Grants Pass v. Johnson. This section uses the first half’s analysis to show why, contrary to the Supreme Court’s decision, the Ninth Circuit’s ruling was, at its core, correct on a legal and sociological level in applying status crimes doctrine to homelessness. In doing so, the Note builds on others’ defenses of the Ninth Circuit’s ruling by both adding to those legal arguments and bolstering them with a sociological grounding, offering a new way of thinking about status crimes in general and homelessness in particular. The Note mounts a defense not only of now-outdated homelessness constitutional doctrine, but also of a shift in American political culture that recognizes homelessness as a product of social circumstances rather than individual failure. Such a change is a necessary prerequisite for curbing, on legal and political levels, America’s intensifying trend of criminalizing homelessness, the first step in bringing America in line with its peers and actually solving homelessness.

Introduction

In 2010, Debra Blake, a resident of Grants Pass, Oregon, lost her job.1Blake v. City of Grants Pass, No. 18-cv-01823, 2020 U.S. Dist. LEXIS 129494, at *11 (D. Or. July 22, 2020). Already in a precarious financial position, she could not afford to remain in her home and was forced out.2Id. For the next ten years, she had no choice but to spend her nights in a variety of locations, either in temporary shelters or on the streets of Grants Pass.3Id. This already devastating and tumultuous experience was made worse beginning in 2013, when Grants Pass began issuing civil citations to people sleeping on public property.4Id. at *17. Between 2013 and 2019, Blake accumulated over $5,000 in fines.5Id. at *11. If she did not pay those fines and was caught by the police on city property, she would be subject to criminal prosecution for trespass.6Johnson v. City of Grants Pass, 72 F.4th 868, 875 (9th Cir. 2023). With nowhere else to go, Blake was on the brink of just such a prosecution. Before any prosecution could take place, however, Debra Blake died. Little is publicly known about her death. She was sixty-two.7Penny Rosenberg, A Look at the Legal System and the Lawsuits Leading to Oregon HB 3115, Alb. Democrat-Herald (June 28, 2024), https://democratherald.com/news/local/government-politics/the-lawsuits-leading-to-oregon-hb-3115/article_db1386fa-67a1-11ee-acd4-2701a6f853a7.html [https://perma.cc/9KNN-K4YQ].

Blake’s story is tragic, but it is far from unique in the United States. As of 2024,8When comparing countries’ homelessness rates later, the year 2022 will be used due to the availability of quality data. over 770,000 people were living without a home or apartment in America.9U.S. Dep’t of Hous. & Urb. Dev., The 2024 Annual Homelessness Assessment Report (AHAR) to Congress 2 (2024), https://www.huduser.gov/portal/sites/default/files/pdf/2024-AHAR-Part-1.pdf [https://perma.cc/N3EW-6R6G]. In response, cities across the country, including Grants Pass, have passed laws and regulations increasingly hostile to their homeless residents.10Eric S. Tars, Criminalization of Homelessness, in Nat’l Low Income Hous. Coal., Advocates Guide ‘21: A Primer on Federal Affordable Housing & Community Development Programs & Policies 6-36 (2021), https://nlihc.org/sites/default/files/AG-2021/06-08_Criminalization-of-Homelessness.pdf [https://perma.cc/53YG-FBGT]. Before passing away, Blake filed a class action lawsuit with other homeless residents against Grants Pass.11Blake v. City of Grants Pass, No. 18-cv-01823, 2020 U.S. Dist. LEXIS 129494, at *11–12 (D. Or. July 22, 2020). She alleged that the practice of fining people for sleeping on public property violated the Eighth Amendment’s ban on status crimes—crimes which criminalize people solely for their states of being rather than their actions.12Id. at *12–13. Although she did not live to see the result, the Ninth Circuit agreed with her claim that the city’s practice was unconstitutional.13Johnson v. City of Grants Pass, 72 F.4th 868, 891 (9th Cir. 2023). Grants Pass, however, appealed the case to the Supreme Court, which in 2024 ruled in favor of the city.14City of Grants Pass v. Johnson, 144 S. Ct. 2202, 2228 (2024). The ruling solidified and gave constitutional cover to the nationwide trend of municipalities criminalizing homelessness.

How did we get here? What has led to so many towns and cities in the United States to criminalize homelessness? Is America unique in this regard? How should the Court have ruled? This Note explores these questions through the concept of American exceptionalism and American history to better understand and justify legal doctrine and arguments surrounding the criminalization of homelessness.

The first half of this Note, Part I, explains American homelessness and compares it to America’s international peers. Section I.A outlines its methodology showing that an approach to legal scholarship that puts black-letter law in social context is imperative for understanding law. Section I.B introduces newly synthesized data on homelessness rates and shelter rates among western democracies where data is available, showing that while America’s homelessness rate is not uniquely high, its rate of unsheltered homeless people is. The subsequent parts of this Section explain these findings. Section I.C examines government spending and America’s comparatively weak social safety net writ large. Section I.D outlines American public opinion and ideology, unveiling a culture of individualism over collectivism using a variety of political documents and public opinion polling. Section I.E discusses the role of race and homelessness, showing how America’s history of racial oppression enables and exacerbates the problem of homelessness. Section I.F explains America’s turn towards criminalization as a “solution” to homelessness, embedding it in larger trends of American history and ideology.

The second half of this Note, Part II, outlines and defends current Ninth Circuit legal doctrine on homelessness. Section II.A gives an outline of current law, showing how the Ninth Circuit used the Eighth Amendment’s status crime doctrine to bar cities from utilizing what is effectively a loophole in constitutional law. Section II.B examines the arguments made in City of Grants Pass v. Johnson. Section II.C analyzes the Supreme Court’s eventual decision in the case. Section II.D defends the Ninths Circuit’s ruling against the Court’s decision. It takes the stance that the Ninth Circuit’s understanding and application of status crime doctrine fits well within the more collectivist understanding of reality as comprehended by those in other western democracies. Finally, Section II.E calls for a change in popular American ideology that is likely to motivate the Court’s decision and current municipal law. Only a shift away from an individualist and towards a collectivist understanding of society can fuel the political will to change homelessness law.

Homelessness Compared and Explained

This Part uses the lens of American exceptionalism to elucidate homelessness data and policy in the United States, comparing it to other western democracies in order to better understand America’s turn to criminalization as a “solution” to homelessness.

A.A Preliminary Note on Method

This Note takes a relatively unique approach to the study of homelessness law and doctrine. That is, it does not take law as an isolated field that can (or should) be studied on its own, or with a mere dash of policy analysis thrown in at the end. Rather, it sees law as embedded in and determined by social context. Such a strategy, according to some, has been described as “the single most revolutionary development in modern legal thought.”15Samuel Moyn, Reconstructing Critical Legal Studies, 134 Yale L.J. 77, 84 (2024). This is not to say that all legal research must consider law this way. Rather, it is to say that doing so is useful and worthwhile, one of many forms that legal analysis and thought can take. Thus, while not all analysis in this Note is directly legal, the consequences of the ideology and governmental policies outlined in this Note are directly legal, manifesting in municipal decisions to criminalize homelessness and court decisions responding thereto. In addition to the strictly legal arguments made below, another contribution of this Note is an analysis of what motivates recent American legal trends. Such an analysis is imperative not only for understanding and evaluating current trends, but also for analyzing the root causes and offering solutions in domains that extend outside of law yet influence law, such as notions about what has to change in popular American political ideology. When legal arguments go hand-in-hand with political arguments, since law is always bound up with politics,16Id. at 87. they become all the more potent. As such, this Note takes an approach that is interdisciplinary and necessarily so.

The first half of this Note uses the lens of American exceptionalism to help explain homelessness. There are many approaches to the understanding and use of the concept “American exceptionalism.”17These include both political and scholarly usages. The scholarly discipline has been in existence for many years and largely precedes the political usage. See generally James W. Ceaser, The Origins and Character of American Exceptionalism, 1 Am. Pol. Thought 3 (2012). Some scholars, like Jerome Karabel and Daniel Laurison, use the term in a value-neutral sense, asking if America is in fact an “exception” relative to other countries. See generally Jerome Karabel & Daniel Laurison, An Exceptional Nation? American Political Values in Comparative Perspective (U.C. Berkeley Inst. for Rsch. on Lab. & Emp., Working Paper No. 136-12, 2012). Others, like John Wilsey, seek to formulate a version of American exceptionalism in a way that “contributes to human flourishing,” arguing for the political mobilization of the concept. See John D. Wilsey, American Exceptionalism and Civil Religion 34 (2015). This Note largely works with the former concept of American exceptionalism, though it does not assume from the outset that America is exceptional regarding homelessness. This Note seeks to add to the body of literature exploring American exceptionalism by examining a previously understudied topic: homelessness and homelessness policy. The Note deploys a method close to that developed by Charles Lockhart in The Roots of American Exceptionalism. That is, it utilizes a schema that draws on historical, institutional, and cultural variables to explain both the nuances of America’s homelessness problem as well as America’s political reaction to homelessness.18Charles Lockhart, The Roots of American Exceptionalism: Institutions, Culture, and Policies ix (2d ed. 2012). In doing so, this Note shows certain aspects in which America is exceptional with regard to its stance towards homelessness, which is reflected both in its policy and ideological belief system.

Moreover, placing America in a comparative light helps explain why America’s response has been increasingly punitive. By analyzing recent American history, one can see how criminalizing homelessness fits within larger cultural and structural trends. A comparative understanding of American societal disposition towards economic opportunity in general and homelessness in particular is imperative for understanding why America is making the choice to criminalize homeless people. These trends explain why the Supreme Court chose to reverse the Ninth Circuit’s ruling in Johnson.19This Note does not argue that this outcome and these trends are inevitable. Rather, it argues that certain entrenched, oft-used paths of political and social responses to a variety of societal problems are being similarly used to respond to homelessness. But first, these underlying trends must be identified, and they are examined below.

B. Homelessness Compared

This Section conducts a brief, international comparison of homelessness rates to see if and how America is unique with regard to its treatment of homeless people. Delving into a data collection that is the first of its kind, this Section shows that while the rate of homelessness in America is not exceptional, the percentage of homeless Americans who are unsheltered is very high relative to other western democracies.

Numerous reasons might lead one to suspect that America has an exceptionally high homelessness rate compared to other western democracies.20For the purposes of this Note, “western democracies” refers to Canada, Australia, New Zealand, and many European liberal democracies where homelessness data is available. For instance, the United States, even after taxes and monetary transfers, has a very high level of income inequality relative to other western democracies.21Jeffrey D. Sachs, Building the New American Economy: Smart, Fair & Sustainable 42 (2017). Its “Gini Coefficient,” which measures income inequality, ranks higher than Australia, New Zealand, Canada, and most European Union countries.22Id. Moreover, since the 1980s, the share of income going to the top 10% of earners has consistently increased on an annual basis.23Thomas Piketty, Capital in the Twenty-First Century 365–67 (Arthur Goldhammer trans., 2014). While the United States used to have a more egalitarian distribution of income in the early 20th century, this is no longer the case today.24Id.

However, a closer examination of the data25See Appendix infra for data collection notes. on homelessness rates from other western democracies reveals that, in this realm, America is unexceptional:

Figure 1.  Percentage of Population Homeless by Country

Note: Data assembled by the author. See Appendix infra for methods.

Figure 1 shows the rate of people experiencing homelessness by the percentage of the population of the country in which they reside. Essentially, it is the homelessness rate of each country. As the chart shows, the homelessness rate in the United States is not particularly high compared to other western democracies. Among seventeen other countries where data is available, the United States ranks as having the seventh highest homelessness rate. Its rate almost exactly matches the overall homelessness rate for the European Union.26Homelessness rates in some European countries have been rising in recent years. See Isabel Marques da Silva, At Least 895,000 People Are Homeless in Europe as Unfit Housing Conditions Persist, New Report Says, Euronews (May 9, 2023, 5:10 PM), https://www.euronews.com/my-europe/2023/09/05/at-least-895000-people-are-homeless-in-europe-as-unfit-housing-conditions-persist-new-repo [https://perma.cc/VUC2-KD2H]. Meanwhile, the number of homeless people in the United States has remained flat. Tanya de Sousa, Alyssa Andrichik, Marissa Cuellar, Jhenelle Marson, Ed Prestera & Katherine Rush, U.S. Dep’t of Hous. & Urb. Dev., The 2022 Annual Homelessness Assessment Report (AHAR) to Congress 10 (2022) [hereinafter AHAR 2022], https://www.huduser.gov/portal/sites/default/files/pdf/2022-AHAR-Part-1.pdf [https://perma.cc/8NAU-3F7F]. Even if America was at one point an outlier among western democracies in this regard, it no longer is.

But homelessness rates alone do not tell the whole story. Delving deeper into the data, when one examines the percentage of homeless people spending nights unsheltered, one sees a very different picture:

Figure 2.  Percentage of Homeless Population Unsheltered by Country

Note: Data assembled by the author. See Appendix infra for methods.

Not all countries included in Figure 1 have data available for the rate of unsheltered homeless people in the studies used. Still, thirteen countries do. Figure 2 shows that the percentage of unsheltered homeless people is far higher in the United States than it is in most other western democracies. Its rate of unsheltered homeless people is 33% higher than the next closest country, New Zealand. It is approximately double the EU average. Of the countries examined, only Czechia has a higher rate. Thus, while the United States does not differ in kind from other western democracies in this respect, it does significantly differ in degree.

As such, although there is not a particularly large number of people experiencing homelessness in the United States relative to other western democracies, the percentage of these people that are unsheltered in the United States is relatively high. This difference is important for both analyzing the problem itself and for understanding how America has reacted to homelessness. If America had a unique level of homelessness, one would seek to explain this phenomenon by examining the root causes of homelessness. However, given that America has an unusually high number of people living outdoors or on the streets, this means that shelter availability is comparatively low in the United States relative to other western democracies.

This specific intervention is important. Homelessness has been hitherto neglected in the debate around American exceptionalism. This is likely because, at first blush as shown above, America does not have an exceptionally high rate of homelessness. Still, there is a popular perception that America does have a much higher homelessness rate than other western democracies.27Larry Wilson, Why Are There so Few Homeless People in Western Europe?, Pasadena Star-News, (Aug. 7, 2022, 7:00 AM), https://www.pasadenastarnews.com/2022/08/07/why-are-there-no-homeless-people-in-europe [https://perma.cc/9TBA-UWR3]. The major difference between America and its peers is the rate of shelter availability. Because people (especially in the United States) do not see the level of homelessness in Europe, they think it does not exist.

Therefore, to understand why America is exceptional in the realm of homelessness, the subsequent four Sections of this Note seek to understand America’s response to homelessness rather than homelessness’s causes.

C. The Social Safety Net

The first factor that helps explain why America lacks the homeless shelters that other western democracies have is the relatively weak social safety net its state, local, and federal governments maintain. Seen in this light, America’s lack of homeless shelters is not an isolated fact that sets it apart from other western democracies. Rather, it is part of a larger trend concerning America’s relatively weak social safety net.

In general, American total government expenditure is less, as a proportion of its total GDP, than most other western democracies. In 2019, for example, the U.S. government’s expenditure as a percentage of GDP was 36%, while France’s was 55%, Sweden’s was 48%, the United Kingdom’s was 38%, and New Zealand’s was 39%.28Government Expenditure, Percent of GDP, Int’l Monetary Fund (2022), https://www.imf.org/external/datamapper/exp@FPP/USA/FRA/JPN/GBR/SWE/ESP/ITA/NZL/POL/AUS/DNK/BEL [https://perma.cc/L8GC-YW99]. Although these are only a few examples, there is a general historical trend of the United States’ government being outspent by other western democracies.29John W. Kingdon, America the Unusual 19–21 (1999). This is in spite of the fact that America wildly outspends those same countries on maintaining its military, accounting for 39% of the world’s military expenditure.30Diego Lopes da Silva, Nan Tian, Lucie Béraud-Dudreau, Alexandra Marksteiner & Xiao Liang, SIPRI, Trends in World Military Expenditure, 2021 (2022), https://www.sipri.org/publications/2022/sipri-fact-sheets/trends-world-military-expenditure-2021 [https://perma.cc/A959-92JC].

This difference in government spending is reflected in the provision of a variety of social services. For example, many other western democracies own and operate their railroad and airline systems.31Kingdon, supra note 29, at 16. In America, however, the federal government has not made a similar commitment. The same can be said for the operation of utilities. While other western democracies often directly operate means of communication (like telephone lines) or energy distribution (like gas and electricity), the United States has largely left the operation of these basic necessities to the private sector.32Id. There is thus a more minimal role of government in the coordination of economic activity in America compared to other western democracies.

America’s social safety net is similarly weak. In a wide variety of areas, from mandated maternity leave to child day care to low-income housing, the U.S. government33And here “government” means government on the local, state, and federal levels. provides comparatively less to its residents than most other western democracies.34Kingdon, supra, note 29, at 17. A paradigmatic example of this trend is healthcare. The United States is the only western democracy to not ensure medical insurance coverage for virtually all of its residents.35Org. for Econ. Coop. & Dev., Health at a Glance 2019, at 29 (2019). This is partially due to the fact that the United States achieves its 90% health care coverage through a patchwork system of private insurers and government programs like Medicare and Medicaid.36Sachs, supra, note 21, at 61–65. Moreover, the story goes further than simply who is providing the care. The United States has largely left other key elements of the healthcare system to the private sector, such as price-setting. This has also contributed to the United States’ relatively high cost of healthcare.37See Sarah L. Barber, Luca Lorenzoni & Paul Ong, Price Setting and Price Regulation in Healthcare: Lessons for Advancing Universal Health Coverage 3–4 (2019), https://iris.who.int/bitstream/handle/10665/325547/9789241515924-eng.pdf [https://perma.cc/XXV8-VTKC]; Gerard F. Anderson, Peter Hussey, & Varduhi Petrosyan, It’s Still the Prices, Stupid: Why the US Spends So Much on Health Care, and a Tribute to Uwe Reinhardt, 38 Health Affs. 87, 89 (2019).

In sum, America has a relatively weak social safety net compared to other western democracies. This is intertwined with the fact that the U.S. Constitution does not announce rights in a positive sense. Rather, it accords negative rights. The Constitution’s Bill of Rights consists of private activities that the government will be largely restrained from infringing upon, like the right to freedom of speech, the right to bear arms, and the right against cruel and unusual punishment.38Perhaps the lone exception is the Sixth Amendment’s right to counsel, which has been interpreted to mean the positive granting of an attorney when an indigent person is charged with a crime. See Gideon v. Wainwright, 372 U.S. 335, 339–41 (1963). Commonplace in other western democracies, however, are positive rights. These are rights that promise positive provisions that the government accords its citizens, such as food, shelter, and healthcare.39Michael Ignatieff, Introduction: American Exceptionalism and Human Rights, in American Exceptionalism and Human Rights 1, 10 (Michael Ignatieff ed., 2005). While not all of these guarantees are necessarily lived up to by those governments, particularly those of poorer nations, the presence of de jure positive rights nonetheless signals a difference between America and its peers.

Thus, on a structural level, the United States’ relative lack of shelter for people experiencing homelessness fits well in this larger picture. America’s government spending in general and social safety net in particular are far weaker than other western democracies. Even though America’s economic and housing systems have not produced more homeless people, a relative lack of spending in social programs can begin to shed light on why American governments—federal, state, and local—have not been willing to build more shelters for those experiencing homelessness.

But more explanation is needed. America is, after all, a democracy.40Well, in a sense. Corporate influence remains a major flaw in America’s political system. See Samar Ahmad, Unmaking Democracy: How Corporate Influence Is Eroding Democratic Governance, Harvard Int’l Rev. (May 4, 2020), https://hir.harvard.edu/unmaking-democracy-how-corporate-influence-is-eroding-democratic-governance [https://perma.cc/NSD2-6CFX]. Why have Americans refrained from voting to expand their welfare state? Why are they not voting to expand government funding to include the construction of homeless shelters? What explains the gap between America and its peers?

D. Public Opinion and Ideology

To explain America’s relatively weak social safety net in general and its refusal to adequately shelter homeless people in particular, a deeper dive into American ideology and voter belief is necessary.41This is not to say that government action and structures do not influence voter behavior and ideology. They certainly do. But public opinion and ideology can also affect government policy. There is a feedback loop between the two, and an intervention on either side of the loop can influence the entire ecosystem of ideology and government policy. This Section does exactly that, using a variety of public opinion polling as well as the documents of elected officials to show how ideological beliefs around individualism inform American social policy and homelessness policy.

To engage popular ideology, public opinion polling is a useful place to start. Karabel and Laurison summarized a number of useful studies comparing American public opinion to public opinion in a variety of other countries.42Karabel & Laurison, supra note 17, at 5–10. Their analysis was enlightening. America was an outlier relative to other western democracies in a variety of ways. Americans were more likely to value freedom over equality than those in other western democracies surveyed.43Id. at 5. More specifically, Americans were more likely to believe that the freedom to pursue life’s goals outweighed the importance of the state guaranteeing that no one is in need.44Id. at 6. While the percentage of people favoring this statement was roughly 25% in France and 31% in Germany, it was over 60% in the United States.45Id. Additionally, almost 50% of Americans in one survey thought that “it should not be the responsibility of government to reduce income differences.”46Id. at 7. Amongst the other countries included in the survey, only New Zealand scored higher, and did so only by a small margin. The analogous proportion in most other western democracies was far lower. In another poll, the percentage of Americans surveyed who thought that private ownership of business is preferable to government ownership of business was over 60%, higher than any other western democracy surveyed.47Id. at 10. The analogous figures for Germany, Australia, and Canada were roughly 38%, 39%, and 52%. Finally, most on the nose, Americans agreed with the statement “it should not be the responsibility of government to provide for the unemployed” at a rate of roughly 49%.48Id. at 8. This rate was higher than every other country surveyed, except for New Zealand.

From these surveys, we can conclude that Americans not only value personal freedom more than economic equality at a higher rate than other western democracies, but also that Americans are less willing to endorse government action to assist people in dire economic straits.

Still, the differences run deeper than mere social values and government actions. Americans surveyed also differed in their explanations for the root causes of social realities themselves. For instance, one question asked whether “people are poor because of laziness and lack of willpower” or “poor because of an unfair society.” In America, 62% agreed with the former, the highest proportion of any western democracy surveyed.49Id. at 11. While 50% of both New Zealanders and Australians agreed with that statement, the analogous rate for Finland and Germany was 23% and 17%, respectively.50Id. Relatedly, Americans were more likely to believe that their society is meritocratic. For instance, 63% of Americans believed that success is determined by hard work rather than luck and connections, scoring higher than all other western democracies except for Finland.51Id. at 14. Finally, the United States had the highest rate of disagreement with the statement “success in life is pretty much determined by forces outside our control,” relative to other western democracies.52Id. at 15. Almost 70% of Americans disagreed, while most other countries surveyed had disagreement rates of 50% or less.53Id.

Thus, majorities of Americans tend to see poverty not as a social failure, but as a personal one. Moreover, Americans tend to hold these views at much higher rates than most if not all other western democracies.

These attitudes are not only passively held by Americans, but also actively practiced by their elected officials. One can see these ideas made manifest in Paul Ryan’s A Roadmap for America’s Future.54Paul Ryan, A Roadmap for America’s Future: Version 2.0, at 17 (2010). Although the roadmap itself is somewhat dated, Paul Ryan was the speaker of the U.S. House of Representatives until as recently as 2019. More recent versions of Republican policy do not strongly deviate from these principles. In the proposal, the former Speaker of the House of Representatives meticulously lays out not only policy proposals, but also philosophical and historical rationales for those proposals. These policies largely consist of scaling back levels of spending on the federal government’s social safety net. To justify these rollbacks, he appeals to many of the values outlined above, such as personal freedom and individual responsibility. He justifies his favor of markets and individual freedom by stating that in market-based economies, like America’s, “no individual or family is bound to their circumstances: they can advance, they can improve their conditions, through their own efforts.”55Id.

Ryan sees this “freedom” as being threatened by government intrusion into the economy through the expansion of the social safety net. Writing of efforts to expand welfare programs, he writes that “government increasingly dictates how Americans live their lives . . . [b]ut dependency drains individual character, which in turn weakens American society.”56Id. at 13. Thus, although Ryan is a partisan actor arguing for particular policy solutions, here he is appealing to broader sentiments that resonate with large majorities of the American public.57These appeals have a bipartisan history. For instance, Democratic President Bill Clinton once bragged that an entitlement reform bill “will help dramatically to reduce welfare, increase independence, and reinforce parental responsibility.” Bill Clinton, Remarks on Signing the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 and an Exchange with Reporters, 1047 Pub. Papers 1325, 1326 (Aug. 22, 1996), https://www.govinfo.gov/content/pkg/PPP-1996-book2/pdf/PPP-1996-book2-doc-pg1325.pdf [https://perma.cc/BQT2-87E2]. The economic failures of individuals are not seen as rooted in structural economic forces. Rather, they are seen as failures of individuals not “bound to their circumstances.’’58Ryan, supra note 54, at 17. Moreover, government action aimed at solving these problems not only fails but exacerbates them. This is in marked contrast to other western democracies, in which even conservative party members do not seek to dismantle welfare state policies.59The far-right Dutch politician Geert Wilders is just one example. See Stijn van Kessel, Geert Wilders’ Win Shows the Far Right Is Being Normalised. Mainstream Parties Must Act, The Guardian (Nov. 26, 2023, 1:00 AM), https://www.theguardian.com/world/2023/nov/26/far-right-normalised-mainstream-parties-geert-wilders-dutch#:~:text=In%20the%20Dutch%20election%20campaign,for%20%E2%80%9Cundeserving%E2%80%9D%20ethnic%20minorities [https://perma.cc/4QYP-U5K6]. An added piece of nuance must be noted, however. Many European conservatives do seek to reduce the role of government in the lives of citizens. However, the actual policy proposals are far more moderate in scale relative to those proposed by American conservatives. See Mugambi Jouet, Exceptional America, 143–93 (2017).

Government entities, however, are not the only entities that can be used to combat poverty in general and homelessness in particular. Private charity and faith-based organizations can also play a role. The United States has the highest rate of religious belief among western democracies.60Mugambi Jouet, A History of Post-Roe America and Canada: From Intertwined Abortion Battles to American Exceptionalism, 23 Nw. J. Hum. Rts. (forthcoming 2025) (manuscript at 54), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4430602. Although the religious belief of its residents has been moderately decreasing in recent decades, it remains comparatively strong.61Religion in Depth, Gallup, https://news.gallup.com/poll/1690/religion.aspx [https://perma.cc/2483-884C]. Churches are an increasingly used source of housing for homeless shelters.62Megan Henry, Tanya de Sousa, Colette Tano, Nathaniel Dick, Rhaia Hull, Meghan Shea, Tori Morris & Sean Morris, U.S. Dep.’t of Hous. & Urb. Dev., The 2021 Annual Homelessness Assessment Report (AHAR) to Congress 6 (2021) [hereinafter AHAR 2021], https://www.huduser.gov/portal/sites/default/files/pdf/2021-AHAR-Part-1.pdf [https://perma.cc/ZMR7-6FXZ]. Some politicians have also voiced support for faith-based solutions to homelessness.63Republicans ACT on Homelessness, Cal. Senate Republicans, https://src.senate.ca.gov/issue/actonhomelessness [https://perma.cc/N27A-YJ4D]. Given these facts, one might suspect that while Americans may be averse to government-run shelters, they may be more supportive of private, faith-based shelters. The data, however, simply does not support such a view. Faith-based shelters make up only 4% of shelter beds available to homeless people.64AHAR 2021, supra note 62, at 31. Thus, the American ideological emphasis on self-responsibility for one’s economic conditions outweighs both private, charitable responses as well as publicly funded ones.

Of course, many Americans see economically deprived individuals as the products of circumstances and many Europeans view poor individuals as personally responsible for their economic circumstances. America has no monopoly on these views. However, these ideas are substantially more widespread in the United States than in other western democracies. They are also reflected in U.S. government policy. When economically destitute individuals, like Debra Blake, are seen as solely, personally responsible for their situation, it is less likely that people holding those views will favor government policies to help people falling on hard times. This means that government-run shelters are less likely to receive political support. Other western democracies, meanwhile, are more likely to see homelessness as a product of social circumstances and societal failure, and therefore provide shelter.

Seen through this lens, America’s disinclination to build shelters for individuals facing homelessness does not arise through some unique hatred that America has for homeless people, but rather as part of a larger narrative about the way Americans and policy-makers think about poverty and its root causes.

E. Race and Homelessness

Inextricable from an explanation of homelessness in the United States is an account of who experiences homelessness. This Section shows not only the racial disparities of those experiencing homelessness, but also uses those demographics to help explain American homelessness policy and posture.

Obviously, the people who experience homelessness are those in poverty. Along these lines, Black and Latino people are already overrepresented, with roughly 20.1% of Black folks living in poverty in the United States today, despite being only 13.5% of the population.65Em Shrider, Poverty Rate for the Black Population Fell Below Pre-Pandemic Levels, U.S. Census Bureau (Sept. 12, 2023), https://www.census.gov/library/stories/2023/09/black-poverty-rate.html [https://perma.cc/AT8U-YNXA]. The respective numbers for Latino folks are 28.4% and 19.3%.66Id. But the numbers are even more exacerbated when it comes to homelessness. While 24.1% of homeless people are Latino, a staggering 37.3% of homeless people identify as Black.67AHAR 2022, supra note 26, at 12. Thus, the intersection of homelessness and race, at least for Black folks, is not merely equivalent to that of poverty and race. Rather, homeless people are disproportionately Black at a rate even more extreme than that of poverty.

We know that the general causation of these gaps in economic wealth, income, and opportunity are due to longstanding racial oppression.68See generally Angela Hanks, Danyelle Solomon, & Christian E. Weller, Ctr. for Am. Progress, Systematic Inequality: How America’s Structural Racism Helped Create the Black-White Wealth Gap (2018), https://www.americanprogress.org/wp-content/uploads/sites/2/2018/02/RacialWealthGap-report.pdf [https://perma.cc/6TBM-LF2N]. But what effect does the fact that the majority of people sleeping on America’s streets are nonwhite have on our homelessness policy? Although a concrete answer is multifaceted and can probably only be arrived at indirectly, critical race theory can help provide answers. Doing so will help explain why America’s majority-minority homeless population does not receive the same amount of government and public care and attention as other countries.69This is not to say other western democracies do not have disproportionately nonwhite homeless populations. They do. See infra note 91.

One book within the discipline of critical race theory that can help explain why the racial makeup of the homeless population likely has an impact on the way homeless people are treated in the United States is Jody Armour’s book, provocatively titled N*gga Theory.70Jody Armour, N*gga Theory (2020). Although the book largely focuses on criminal law, it highlights important developments in both the history of American racism and recent research into white Americans’ relationship with Black Americans in the realm of cognitive science.

One of Armour’s central claims is that “the dominant brand of anti-black discrimination in post-civil rights era America is not active racial animus but unconscious racial bias.”71Id. at 41–42. This view leads Armour to locate the disparities in treatment across races not as the result of conscious racial hatred but rather that of unconscious or subconscious behavior of white Americans.

One of the ways this unconscious bias operates is through disparities in empathy for others as manifested in specific “neuroanatomical circuits underlying . . . cognitive processes.”72Id. at 89. Specifically, recent studies show that particular parts of the brain, such as the bilateral anterior insula, the anterior cingulate cortex, and the medial prefrontal cortex are active when individuals are feeling empathy, in both the emotional and cognitive realm.73Id. Functional magnetic resonance imaging (“fMRI”) technology has allowed neuroscientists to measure when humans are and are not feeling empathy towards others. Unsurprisingly, many Americans tested in these studies show decreased empathetic neural activity when viewing people of different racial groups.74Id. at 90. This was true, for instance, when twenty-eight participants were shown scenes depicting individuals of varying racial groups in painful or neutral situations.75Id. at 89. Upon viewing these images, people who shared a social-racial identity with the person in need exhibited a higher level of empathetic neural activity than they did with those who did not share their ethnic group.76Id. at 89–90. This was despite the fact that many people would not likely claim they have explicit racial bias, since the social consequences of having such a bias are negative.77Alexandra Goedderz & Adam Hahn, Biases Left Unattended: People Are Surprised at Racial Bias Feedback Until They Pay Attention to Their Biased Reactions, J. Experimental Soc. Psych., Sept. 2022, at 1. Other studies involving mirror-neuron systems, which are responsible for unconsciously mirroring other individuals, show a similar level of racial bias.78Armour, supra note 70, at 95–97. Thus, there are empathy gaps across racial lines.

Here, it is important to note that these are not inevitable biological responses to inherent human differences. On the contrary, race is not a biological category, but a social one.79Karen E. Fields & Barbara J. Fields, Racecraft: The Soul of Inequality in American Life 1–21 (2012). Thus, the status of who is “in” and “out” of one’s social group are constantly in flux.80Id. More importantly, the categories are historically contingent, the outcome of social oppression and not biology.81Id. It is likely not the supposed differences in look or skin color that is the cause of these empathy-deficits, but rather socially-reinforced differentiation and hierarchies. Thus, America, as a multiracial liberal democracy, does not inherently have these issues of empathy gaps, but rather has them because of its specifically racist past and present, one that had a beginning and therefore (hopefully) has an end.82Id. at 289–90.

Armour eventually goes on to discuss how these empathy barriers contribute to disparities in judge and jury convictions of Black Americans. How do they apply to homelessness? The answer is probably intuitive: in a majority white country83See Racial Inequalities in Homelessness, by the Numbers, Nat’l All. to End Homelessness (June 1, 2022), https://endhomelessness.org/resource/racial-inequalities-homelessness-numbers [https://perma.cc/5BW2-HL8G]. with politics dominated by white individuals and interests,84See Derrick A. Bell, Comment, Brown v. Board of Education and the Interest-Convergence Dilemma, 93 Harv. L. Rev. 518 passim (1980). a problem that largely affects nonwhite people is likely to be neglected. The fact that most homeless people are mostly not white means that our political system is less likely to respond urgently to the problem. It is a classic case of structural racism. This was true, for instance, of the natural disaster of Hurricane Katrina in 2005, wherein the government responded slower than it could have, an action which many people attributed to the fact that the people most in need were disproportionately Black.85Ismail K. White, Tasha S. Philpot, Kristin Wylie & Ernest McGowen, Feeling the Pain of My People: Hurricane Katrina, Racial Inequality, and the Psyche of Black America, 37 J. Black Stud. 523, 523–24 (2007). Moreover, in the man-made disaster of the Flint, Michigan water crisis of 2014, the largely Black population of Flint likely suffered more intensely and received a less urgent response from the state due to the demographic of who was suffering.86See generally Mich. C.R. Comm’n, The Flint Water Crisis: Systemic Racism Through the Lens of Flint (2017), https://www.michigan.gov/mdcr/-/media/Project/Websites/mdcr/mcrc/reports/2017/flint-crisis-report-edited.pdf?rev=4601519b3af345cfb9d468ae6ece9141 [https://perma.cc/7DCH-UT9P]. In each of these catastrophes, it is likely that the empathy deficits that white officials and members of the public exhibited towards the Black victims contributed to the lackadaisical response by government actors. The same can likely be said for homelessness. If homeless people were not members of an oppressed group, it is likely that there would be a more urgent government response to their plight.

Unconscious bias may explain the lack of a response, but why the personal blame? How does the attribution of individual responsibility to those in poverty (a view that is popular in America and described above) intersect with the government’s general unwillingness to provide shelter to homeless people given the racial lens with which we are operating? Armour’s book has even more answers here. In it, he uses the work of Fritz Heider to show how people ascribe moral blame to individuals.87Armour, supra note 70, at 85–86. Specifically, when judging others, people who attribute one’s actions to their social circumstances are less likely to morally blame them for those actions than when they see those actions as stemming from an inner psychology.88Id at 86. When people focus on the situations in which others find themselves, they are less likely to morally blame those others for their bad acts. Applying this to the criminal sphere, a study done by Birt Duncan found that “violent acts tended to be attributed to internal causes when the harm-doer was black, but to situational causes when the harm-doer was white.”89Id. (citing Birt L. Duncan, Differential Social Perception and Attribution of Intergroup Violence: Testing the Lower Limits of Stereotyping of Blacks, 34 J. Personality & Soc. Psych. 590, 595– 97 (1976)) Other studies have verified these findings.90See id.

If this phenomenon is occurring in the lab and in the courtroom, it is likely also occurring on the streets. In a country where people are already largely blamed for their actions, and the role of social circumstance is neglected, it makes sense that a racially-charged issue like homelessness would exacerbate this phenomenon. Racial minorities are likely being blamed for being homeless even more intensely than their white peers. Indeed, America’s response to homelessness exhibits precisely the kind of response we would expect if this were the case. Racism, individual and structural, is therefore not only responsible for Black people disproportionately becoming homeless, but also for their remaining homeless. The unwillingness to build homeless shelters and the tendency to blame people for the economic circumstances, which is exacerbated by the history of racial oppression and division in the United States, makes America’s response to homelessness much more understandable (though not justifiable). Thus, the empathy deficit and tendency to blame racial minorities—particularly Black folks—for their actions and economic status intensifies America’s lackluster response to homelessness.91This is not to say other western democracies do not have disproportionately nonwhite homeless populations. They do. For example, in the UK, despite making up only 3% of the population, Black people account for 11% of homeless people. See How Racism Causes Homelessness, Single Homeless Project, https://www.shp.org.uk/homelessness-explained/how-racism-causes-homelessness [https://perma.cc/J2RZ-V76K]. However, despite a history of racial oppression, the reason homeless people receive more humane treatment in the U.K. and other countries is because, in the view of this Note and at least in part, there are simply fewer minorities in those countries. Thus, because the median homeless person is white in many other western democracies, the image conjured by the government and public of a homeless person is more likely to align with the group of the ethnic majority in that country.

F. America’s Turn to Criminalization

The above sections explain why a substantial number of Americans likely, to a sizeable extent, blame homeless people for being homeless, but they do not explain why there has been an increasing trend towards criminalization of homelessness.92Due to a lack of space, this Section does not delve deeply into the issue of race and incarceration, instead focusing on the class dimensions of incarceration. Nonetheless, the racial dimension of homelessness, outlined above, no doubt plays a role in America’s turn towards criminalization. Concerning the racial impact of the recent trend of mass incarceration, see generally Michelle Alexander, The New Jim Crow: Mass Incarceration in the Age of Colorblindness (2010). This Section addresses this issue. Making sense of this trend requires a broader examination of criminal law and policy. Through this analysis, one can see that criminalizing homelessness and imprisoning people like Debra Blake makes sense according to the ideology of self-responsibility and America’s comparatively harsh criminal system.93This Note does not claim that America is unique in its increasing tendency to criminalize and possibly jail homeless people. Other countries make it illegal to be homeless in certain parts of larger cities and regularly clear homeless encampments in city centers like the United States does. See Matthew Yglesias, They Have Homelessness in Europe, Too, Slow Boring (Jan. 24, 2022), https://www.slowboring.com/p/they-have-homelessness-in-europe [https://perma.cc/WFU5-GYZY]. However, the key difference is the availability of shelter. Because, as shown above, shelter availability is much higher in Europe, these laws have a far less deleterious effect on homeless people than similar policies do in the US. Shelters give people a place to go, making spending nights on the street a choice. While Europe’s system is far from perfect, it is different from (and better than) that of the United States.

 The United States has the highest rate of incarceration of any western democracy, and nearly the highest incarceration rate in the world.94See Countries with the Largest Number of Prisoners per 100,000 of the National Population, as of January 2024, Statista, https://www.statista.com/statistics/262962/countries-with-the-most-prisoners-per-100-000-inhabitants [https://perma.cc/E67R-72J9]. America is remarkably punitive in a number of ways. Not only is it the only western democracy to retain capital punishment, but its sentencing structure is also one of the harshest in the world.95Carol S. Steiker & Jordan M. Steiker, Global Abolition of Capital Punishment: Contributors, Challenges, and Conundrums, in Comparative Capital Punishment 388, 392 (Carol S. Steiker & Jordan M. Steiker eds., 2019). This trend is relatively new. Beginning in the early 1970s, an explosion in the prison population—known popularly as “mass incarceration”—made the United States the world leader in imprisonment rates.96Kevin R. Reitz, Introduction to American Exceptionalism in Crime and Punishment 1, 3 (Kevin R. Reitz ed., 2017). America’s recently learned penal instinct for dealing with social problems is more intense than in any other western democracy.

Coupled with this well-known trend is a lesser known but related trend: a proliferation in economic sanctions incorporated into the criminal system. There has been a surge in civil fines, court fines, and other financial penalties levied against individuals since the early 1980s.97See generally Neil L. Sobol, Charging the Poor: Criminal Justice Debt & Modern-Day Debtors’ Prisons, 75 Md. L. Rev. 486 (2016). Although debtors’ prisons are officially banned in every state, people who are unable to pay a variety of civil or court-imposed fines are being increasingly imprisoned as a result.98Id. at 490–98.

While laws directly, explicitly criminalizing homelessness are practically nonexistent, laws that impose fines on homeless people are increasingly being passed around the country.99Nat’l L. Ctr. on Homelessness & Poverty, Housing not Handcuffs 2019: Ending the Criminalization of Homelessness in U.S. Cities 27–57 (2019), https://homelesslaw.org/wp-content/uploads/2019/12/HOUSING-NOT-HANDCUFFS-2019-FINAL.pdf [https://perma.cc/SM3J-8G47]. That said, there are some important exceptions. For instance, New York City guarantees short-term shelter to people experiencing homelessness. Noah Bierman, What One Man’s Castle in Scotland Says About L.A.’s Homelessness Crisis, L.A. Times (Nov. 27, 2023), https://www.latimes.com/homeless-housing/story/2023-11-27/homeless-los-angeles-right-to-housing-scotland-california [https://web.archive.org/web/20241009012946/https://www.latimes.com/homeless-housing/story/2023-11-27/homeless-los-angeles-right-to-housing-scotland-california]. This is the kind of criminal penalty that Debra Blake was facing. Although the statute she violated by sleeping on public land only resulted in a fine, a repeated violation of the statute, combined with her inability to pay, would have resulted in a jail sentence.100Johnson v. City of Grants Pass, 72 F.4th 868, 875 (9th Cir. 2023). Notably, the Ninth Circuit did not explicitly make the leap to jailtime for such an action. Still, criminal trespass in Oregon is punishable by jailtime. See David N. Lesh, Oregon Criminal Trespass Laws, Or. Theft Guide, https://www.oregoncrimes.com/oregon_criminal_trespass_offenses.html [https://perma.cc/6SUU-3P3K]; Or. Rev. Stat. §§ 161.615(3), 164.245(2) (2024). In the absence of a penalty beyond civil fines, which homeless people are extremely unlikely to be able to pay, it is all but inevitable that they will be sentenced with jailtime after being found guilty of criminal trespass. She would not have been the only homeless person with such a fate.101Stacey McKenna, Jailed for Being Homeless, Salon (Feb. 28, 2016, 12:30 AM), https://www.salon.com/2016/02/28/jailed_for_being_homeless_partner [https://perma.cc/B84F-7KTM]. While other countries have laws that criminalize some behavior associated with sleeping on public property,102Eur. Fed’n of Nat’l Ass’ns Working with the Homeless, Criminalising Homeless People: Banning Begging in the EU 9 (2015), https://www.feantsa.org/download/2015-02-07_draft_criminalisation_policy_statement-38703600034690521366.pdf [https://perma.cc/69WF-YQZ9]. Some countries, like Finland and Scotland, even have a positive right to housing. See Bierman, supra note 99. the wider availability of shelters makes those laws far less relevant to homeless people abroad.

The American instinct to not only blame people facing homelessness for their camping in public but also to actively oppose them through criminalization is also part of a larger trend. Violent attacks on homeless people have been on the rise in recent years.103Margot Kushel, Violence Against People Who Are Homeless: The Hidden Epidemic, U.C.S.F. Benioff Homelessness & Hous. Initiative (July 14, 2022), https://homelessness.ucsf.edu/blog/violence-against-people-homeless-hidden-epidemic [https://perma.cc/545J-ULZK]. When homelessness is seen by members of the public as a problem of individual responsibility, it makes sense that when one sees individuals taking up space on public streets or parks, they are angry at the individual rather than the socio-economic system that created the situation. The instinct to criminalize such behavior therefore follows from an individualization of the problem combined with an existing propensity for criminalization. If homeless people are solely responsible for their situation, and their situation interferes with a pedestrian’s ability to move about public grounds unimpeded, the justification for imprisonment on the grounds of public interference also begins to make sense. Imprisonment will solve the immediate problem of getting the person off the street and is justified due to that person’s inability to maintain the economic resources necessary to maintain shelter for themselves.

Of course, such a logic is withdrawn from the social realities that actually create homelessness.104While the author’s sympathies certainly do not lie with the trend of criminalizing homeless people, the Note’s goal is not to criticize the trend, but merely to explain it. While experts disagree on the specific means of reducing homelessness, there is a consensus that to do so, one must dramatically increase the supply of affordable housing and connect homeless people with social services and employment opportunities.105Statement on the California Community Assistance Recovery, and Empowerment (CARE) Court Program, Nat’l All. to End Homelessness (Sept. 20, 2022), https://endhomelessness.org/blog/statement-on-the-california-community-assistance-recovery-and-empowerment-care-court-program/#:~:text=The%20consensus%20among%20academics%2C%20practitioners,be%20they%20in%20behavioral%20health [https://perma.cc/X4KK-CQY6]. Unfortunately, for homeless people and housed people, Americans have a long history of not only ignoring expert opinion, but actively loathing expert opinion and intellectualism writ large. As Richard Hofstadter wrote in Anti-Intellectualism in American Life over 50 years ago, “intellectuals . . . are [seen as] pretentious, conceited, effeminate, and snobbish . . . .”106Richard Hofstadter, Anti-Intellectualism in American Life 18–19 (1963). America has no monopoly on anti-intellectualism. Nor has anti-intellectualism as a cultural force been constant in its history. Rather, it is one that fluctuates in intensity.107Id. at 7. Our current time, however, sees a more intense moment of this fluctuation, rendering a penal response to homelessness that deviates from expert opinion even more likely.108Marc Hetherington & Jonathan M. Ladd, Destroying Trust in the Media, Science, and Government has Left America Vulnerable to Disaster, Brookings (May 1, 2020), https://www.brookings.edu/articles/destroying-trust-in-the-media-science-and-government-has-left-america-vulnerable-to-disaster [https://web.archive.org/web/20241204081855/https://www.brookings.edu/articles/destroying-trust-in-the-media-science-and-government-has-left-america-vulnerable-to-disaster].

This hostility towards both homeless people and experts on homelessness can be seen in America’s current populist wave. While a deep analysis on the relationship between homelessness and populism is worthwhile, it extends beyond the scope of this Note. Still, a brief discussion can be given. Jan-Werner Müller defines populism as “a particular moralistic imagination of politics,” one that establishes a “morally pure” people against elites and outsiders.109Jan-Werner Müller, What Is Populism? 19–20 (2017). While modern populists have long derided experts as part of the elite outsiders,110Id. homeless people themselves are increasingly considered outsiders (and paradoxically paired with elites), deviants who are apart from and opposed to “normal” people. For instance, former Fox News host Tucker Carlson recently argued that homelessness is the result of liberal leaders becoming “more lenient on petty crime” and that “because of their liberal attitudes and the mild climate, [Seattle] is a magnet for vagrants.”111Courtney Hagle, Fox News Zeroes in on a New Target: The Homeless, MediaMatters (June 4, 2019, 3:41 PM), https://www.mediamatters.org/fox-news/fox-news-zeroes-new-target-homeless [https://perma.cc/DHF5-3FCY]. Overall, political populism and a history of punitive responses to social problems are worryingly combining to produce laws that criminalize homelessness in spite of expert opinion.

In sum, America’s penal response to homelessness stems from both its conception of homelessness as a problem of individual failings combined with its comparatively harsh penal system. As a result, homelessness has become a hot-button political issue, one for which populists have whipped up anti-elite sentiment and anger about homelessness to create false narratives about homelessness and advocate punitive solutions thereto.

Homelessness and the Law

Now that an overview of homelessness, in both a comparative and historic-domestic light, has been given, we can return to an analysis of Debra Blake’s case and use it as a microcosm to understand and evaluate homelessness law in general. This Part, divided into several sections, outlines law concerning homelessness, both before and after the Court’s ruling in Grants Pass. Next, this Part argues that America needs a fundamental reckoning on not only the legal level, but also the ideological and social level. Only once our attitudes towards homeless people change from an individualist understanding to a collectivist understanding can our laws change to reflect that understanding. Absent such a deep reckoning, political and legal responses reflecting such a change are virtually impossible.

A. Law Prior to Grants Pass

Although Debra Blake passed away, the case she and her fellow residents filed, City of Grants Pass v. Johnson, did not. This Section outlines the case law surrounding Blake’s claim.

In 1962, the Supreme Court decided Robinson v. California. In Robinson, the Court struck down as unconstitutional part of a California statute that made it illegal “to be addicted to the use of narcotics.”112Robinson v. California, 370 U.S. 660, 662 (1962). This case also incorporated Eighth Amendment protections to the states. The Court reasoned that while it was within California’s power to regulate behavior surrounding and including the use of drugs, criminalizing someone for their status of being addicted to illegal drugs was fundamentally different. In doing so, California was enforcing a “statute which makes the ‘status’ of narcotic addiction a criminal offense.”113Id. at 666. Rather than criminalizing an action, the status of being addicted to an illegal narcotic was criminalized. The Court likened addiction to a chronic disease, one over which the defendant had little to no control.114Id. at 675. The Court reasoned that “in the light of contemporary human knowledge, a law which made a criminal offense of such a disease would doubtless be universally thought to be an infliction of cruel and unusual punishment in violation of the Eighth and Fourteenth Amendments.”115Id. This ruling established what became popularly known as the Eighth Amendment’s ban on “status crimes.”

Six years after Robinson, however, this doctrine was complicated by a case titled Powell v. Texas.116Powell v. Texas, 392 U.S. 514 (1968). The case concerned whether or not the state of Texas could criminalize being found drunk “in any public place, or at any private house except his own.”117Id. at 516. The petitioners argued that the statute violated the Eighth Amendment’s ban on status crimes since an alcoholic would have to drink, and would therefore inevitably violate the statute. The Powell Court distinguished the Texas statute from California’s statute in Robinson, however, in a number of ways. While certain parts of the decision argued that being drunk was an act rather than a status,118Id. at 532. other parts highlighted the fact that alcoholic individuals could choose to be drunk in their homes and therefore avoid violating the statute while maintaining their status as alcoholics.119Id. In a 4 plus 1 plurality, the Powell Court upheld the statute. Although the precedential impact of this decision was disputed,120Petition for Writ of Certiorari at 16, City of Grants Pass v. Johnson, 144 S. Ct. 2202 (2024) (No. 23-175), https://www.supremecourt.gov/DocketPDF/23/23-175/275911/20230823153037814_Grants%20Pass%20v.%20Johnson_cert%20petition_corrected.pdf [https://perma.cc/29GY-QG3C]. it is affirmed in the Supreme Court’s decision in City of Grants Pass.

In 2006, a Ninth Circuit ruling found that the Constitution’s ban on status crimes covered homeless individuals. In Jones v. City of Los Angeles, six homeless individuals brought suit against the city of Los Angeles for an ordinance that criminalized “sitting, lying, or sleeping on public streets and sidewalks at all times and in all places.”121Jones v. City of Los Angeles, 444 F.3d 1118, 1120 (9th Cir. 2006). The Ninth Circuit ruled that the City could neither criminalize the status of being homeless, nor acts that are an inevitable result of being homeless.122Id. at 1132. The Court linked the status of being homeless to the number of shelter beds available. If the number of homeless people in a municipality “far exceed[ed]” the number of shelter beds available at any given time, the municipality will have violated the homeless individuals’ Eighth Amendment rights by enforcing a statute that criminalizes an integral aspect of their status as homeless people.123Id. Although this specific ruling was later vacated on technical grounds, its logic and holdings were reincorporated into law for the Ninth Circuit in 2019, in Martin v. City of Boise.124Martin v. City of Boise, 920 F.3d 584, 590 (9th Cir. 2019). While these holdings were not binding outside of the Ninth Circuit, they are highly relevant, as many states within the Ninth Circuit, like California, Hawaii, Arizona, and Oregon, have some of the highest rates of homelessness in the nation.125AHAR 2022, supra note 26, at 17.

B. City of Grants Pass Heads to the Supreme Court

Before Martin, the City of Grants Pass enforced ordinances that fined individuals for sleeping on public grounds.126City of Grants Pass v. Johnson, 72 F.4th 868, 876 (2022). Although the city modified these ordinances in the aftermath of Martin, it did not repeal them. Rather, it tweaked them to only ban “camping,” which it broadly defined as sleeping while using even rudimentary assistance, like sleeping bags.127Id. at 889. Still, after Debra Blake was cited for sleeping while using a sleeping bag on public property in 2019, she filed a class action lawsuit on behalf of all homeless people in Grants Pass, arguing that the city’s ordinance constituted a violation of her Eighth Amendment rights.128Id. at 882. The Ninth Circuit agreed, since Grants Pass did not have enough shelter beds to house the homeless population within city limits.129Id. at 894. Although the ordinance did not directly criminalize camping, mandating only civil fines, the Ninth Circuit panel found that these fines would still lead to criminal prosecution when they were inevitably unpaid by the homeless people fined.130Id. at 880. Furthermore, although one could still “sleep” on public property, sleeping outside in Grants Pass, Oregon, where temperatures regularly dip into the 30s,131Climate Grants Pass – Oregon, U.S. Climate Data (2024), https://www.usclimatedata.com/climate/grants-pass/oregon/united-states/usor0146 [https://perma.cc/9QYC-HP32]. surely constituted an untenable option. To sleep outside with the assistance of a blanket was the only option for the city’s homeless residents. Thus, the ordinance was struck down as violating the plaintiffs’ Eighth Amendment rights.132Johnson, 72 F.4th at 896.

This ruling seemed like a hopeful victory for homelessness advocates, one that put a check on the trend of criminalizing homelessness. But the city appealed the case to the Supreme Court, who in 2024 announced their decision overturning the Ninth Circuit’s ruling to allow municipalities to criminalize homelessness.133City of Grants Pass v. Johnson, 144 S. Ct. 2202 (2024).

C. The Supreme Court’s Ruling

In a decision that made headlines nationwide in June of 2024,134E.g., Abbie VanSickle, Supreme Court Upholds Ban on Sleeping Outdoors in Homelessness Case, N.Y. Times (June 28, 2024), https://www.nytimes.com/2024/06/28/us/politics/supreme-court-homelessness.html. the Supreme Court reversed the Ninth Circuit’s decision and allowed Grants Pass to enforce its ordinance. Justice Gorsuch authored the opinion and was joined by the Court’s five other conservative Justices. The Court’s three liberals, meanwhile, dissented in an opinion written by Justice Sotomayor. Although the Court split along ideological lines in the decision, the decision was celebrated by conservative and liberal lawmakers alike.135See Press Release, Governor Gavin Newson, Governor Newsom Statement on Supreme Court’s Homeless Encampments Decision (June 28, 2024), https://www.gov.ca.gov/2024/06/28/governor-newsom-statement-on-supreme-courts-homeless-encampments-decision [https://perma.cc/9Z82-S6ZG]; Press Release, Oregon Senate Republican Leader, Legislative Action Must Follow Supreme Court’s Common-Sense Grants Pass v. Johnson Decision (June 28, 2024), https://www.oregonlegislature.gov/senaterepublicans/Documents/2024-6-28%20Legislative%20Action%20Must%20Follow%20Supreme%20Courts%20Common-Sense%20Grants%20Pass%20v.%20Johnson%20Decision.pdf [https://perma.cc/3NEU-CJMQ]. This Section provides an overview of the opinion.

The Court’s decision does not explicitly argue that homelessness is the fault of the individual and therefore subject to criminal liability. Rather, it is implied. Moreover, personal responsibility for homelessness is the result of the Court’s logic. Nonetheless, it is still worth examining the Court’s reasoning in detail. The policy arguments are analyzed first, then the more strictly doctrinal arguments.

Almost cynically, the Court, largely parroting amicus curiae briefs submitted on behalf of Grants Pass, frames the policy criminalizing sleeping in public as one “protecting the rights, dignity[,] and private property of the homeless.”136Johnson, 144 S. Ct. at 2208. The decision to ban sleeping in public, by the opinion’s logic, has as much to do with protecting homeless people as it does with serving the interests of the housed public.137For example, the Court writes that “[w]e are told, for example, that the ‘exponential increase in . . . encampments in recent years has resulted in an increase in crimes both against the homeless and by the homeless.’ ”Id. at 2209. The Court also highlights that others (with whom it is siding) have concluded that “[j]ust building more shelter beds and public housing options is almost certainly not the answer by itself.”138Id. Rather, the Court concludes in its first section, after laying out the severity of America’s homelessness problem, that municipalities need “access to the full panoply of tools in the policy toolbox” to combat the issue.139Id. at 2211.

What is odd about this abstract characterization of the problem is that it sees the Ninth Circuit’s ruling as limiting the options that municipalities have to combat the issue. But the ruling does not ban cities from criminalizing homelessness outright. Rather, it limits municipalities from doing so when the number of homeless people exceeds the number of shelter beds. All cities would have to do is build homeless shelters. They could then criminalize sleeping in public as much as they want. This argument is only engaged with indirectly by the Court. Rather than engaging with it substantively, the opinion argues that the standard is somehow not clear enough, since it may be difficult to count the number of homeless people on any given night and because it may be difficult for cities to estimate the number of shelter beds available and build adequate housing.140Id. at 2222–24. All the analysis really shows, however, is that many cities have not made good-faith efforts to comply with the ruling. Rather, cities have routinely crafted threadbare policies to “comply” in appearance only with the requirements set forth in Boise, then been challenged in court when their policies are shown for what they are, then complained to the courts that the standards are unworkable using their own ineptitude as the evidence. Thus, the Court uses the city governments’ incompetence to justify overturning the Ninth Circuit’s precedent. The logic does not acknowledge the agency of the cities and locates the failure as a lack of possibility rather than a lack of will. In reality, it is not the former, but rather the latter.141Imagine if this logic had been applied in the years following Gideon v. Wainwright, 372 U.S. 225 (1963). It has taken some time for public defender’s offices to offer adequate legal services, and many still do not. However, nobody argues against the fact that the project has, on the whole, been a success, despite it being a court-mandated policy to provide people attorneys.

Doctrinally, the Court all but overturns Robinson. The Court states clearly that “[t]he Cruel and Unusual Punishments Clause focuses on the question what ‘method or kind of punishment’ a government may impose after a criminal conviction, not on the question whether a government may criminalize particular behavior in the first place or how it may go about securing a conviction for that offense.”142Johnson, 144 S. Ct. at 2216. This language leaves no room for Robinson, since that ruling did place substantive limits on what could be punished. The Court states that it does not overrule Robinson because no party argued for it to do so.143Id. at 2218. Instead, it emphasizes that Grants Pass’s ordinance nominally criminalizes the act of camping rather than the act of being homeless. Responding to the argument that those acts inevitably follow from a status, the Court relies on the plurality in Powell, not discussing the argument that being intoxicated in public as an alcoholic is more voluntary than sleeping outside as a homeless person.144Id. at 2219–20. The Court gives brief mention of a possible common law “necessity” defense, but does not enforce it against Grants Pass and cites a case in which an Oregon appellate court appears to refuse to apply it to the homeless person cited.145Id. at 2220. Finally, the Court argues that there is no limiting principle that would restrict the conduct possibly off limits from punishment, arguing that the decision is better left to the legislature.146Id. at 2221. This kind of appeal to the legislature is made almost every time a court refuses to strike down a law as unconstitutional. This argument is analyzed below. Given this, laws that criminalize acts that inevitably follow from a status are constitutional under the Court’s standard.147In criticizing the Ninth Circuit’s decision, the Court argues that it is too difficult to know if a person is camping on the street by choice. Id. at 2221–22. But this problem is solved by the Ninth Circuit’s decision, which does not inquire into the specific circumstances of the person arrested. Rather, it looks at the number of homeless people and shelters to determine this fact. By citing a common law defense of necessity as a possible statutory location of refuge for future defendants, the Court incentivizes looking into those very personal circumstances it wanted to avoid analyzing. Thus, the Court creates the very problem it claims to solve in this ruling.

   This telling moment of the text also indirectly affirms the sentiment that many people are homeless by choice. By stating that only some people are involuntarily homeless, it follows that others are voluntarily so.
The decision reduces the power of Robinson to a mere linguistic limitation. As long as the government body does not explicitly criminalize a status, it is practically free to do so by punishing an act inevitably flowing from a status.

D. What Should the Court Have Done?

This Section devotes some time to defending the logic of the Ninth Circuit’s ruling and engaging critics who have spoken out against the ruling.

While many in the activist community and some in the legal community have already defended the Ninth Circuit’s logic,148E.g., Erwin Chemerinsky, Opinion: In California, Homelessness Isn’t a Crime. Is the Supreme Court About to Change That?, L.A. Times (Jan. 12, 2024), https://www.latimes.com/opinion/story/2024-01-12/supreme-court-homeless-housing-johnson-vs-grants-pass-martin-vs-boise-california-oregon-9th-circuit [https://perma.cc/JFK8-TC4M]; Maria Foscarinis, Nat’l L. Ctr. on Homelessness & Poverty, Martin v. Boise: A Victory in Fighting The Criminalization of Rough-Sleeping (2020), https://www.feantsa.org/public/user/Resources/magazine/2020/Martin_v._Boise_-_a_victory_in_fighting_the_criminalisation_of_rough_sleeping_-_Homeless_in_Europe_Magazine_Spring2020_Criminalisation_of_homelessness-9.pdf [https://perma.cc/FW4G-S82D]. many more in the legal academy have criticized it.149See generally, e.g., Martin R. Gardner, Rethinking Robinson v. California in the Wake of Jones v. Los Angeles: Avoiding the “Demise of the Criminal Law” by Attending to “Punishment,” 98 J. Crim. L. & Criminology 429 (2008); Mary Boatright, Note, Jones v. City of Los Angeles: In Search of a Judicial Test of Anti-Homeless Ordinances, 25 Law & Ineq. 515 (2007). To defend many of the justifications already set forth above, the Ninth Circuit’s logic makes sense. If it is unconstitutional to punish someone for their “state of being,” something that does not have an actus reus and cannot be controlled by the individual in question, how can one criminalize acts that inevitably flow from one’s state of being? Being homeless, as the Ninth Circuit said in Jones, is no more in one’s control than being addicted to narcotics.150Jones v. City of Los Angeles, 444 F.3d 1118, 1132 (9th Cir. 2006). Moreover, even though Los Angeles attempted to ban “sleeping” on public property, which is an act rather than a status, the court’s logic was that to ban an act that inevitably follows from a status would be to offer a gaping loophole in status crime doctrine.151Id. It would allow the government, through a simple workaround, to criminalize statuses just as they had in Robinson. The law can and should hold accountable people who commit acts over which they have control, not acts that they are forced to do out of circumstance. Here, Justice White, in his concurrence in Powell, put the reasoning best:

If it cannot be a crime to have an irresistible compulsion to use narcotics, I do not see how it can constitutionally be a crime to yield to such a compulsion. Punishing an addict for using drugs convicts for addiction under a different name. Distinguishing between the two crimes is like forbidding criminal conviction for being sick with flu or epilepsy but permitting punishment for running a fever or having a convulsion. Unless Robinson is to be abandoned, the use of narcotics by an addict must be beyond the reach of the criminal law.152Powell v. Texas, 392 U.S. 514, 548–49 (1968) (White, J., concurring) (citation omitted).

The same goes for homelessness. If it is unconstitutional to explicitly punish the status of “being homeless,” it should also be unconstitutional to punish acts that inevitably follow from being homeless, like sleeping on the street with a blanket in Oregon.

Moreover, it practically goes without saying that a prison sentence for homelessness will likely be short and will not solve the root causes of homelessness in the first place.153Tars, supra note 10, at 6-39. It will merely create a cycle of imprisonment and release that will only intensify and worsen the already terrible experience of homelessness.154Id.

Other legal scholars, like Martin Gardner, have argued that the logic of five Justices in Powell, and their logical descendants in Jones, apply a logic that would implode the entire criminal justice system.155Gardner, supra note 149, at 429. Gardner argues that courts inquiring into the social circumstances of individuals who commit certain acts to determine whether or not they have the proper mens rea for violating a statute “is unwise and poses a radical threat to traditional criminal law doctrine that perhaps even threatens the continued existence of the criminal law itself.”156Id. This argument is similar to the one made by the Supreme Court in Grants Pass. See City of Grants Pass v. Johnson, 144 S. Ct. 2202, 2221–22 (2024). Such hand-wringing is likely unwarranted. Realistically, it is hard to imagine the doctrine of banning status crimes and statutes that indirectly criminalize statuses as going much further than narcotics addiction, homelessness, and perhaps some immigration status issues. Indeed, Gardner himself is light on examples.157See generally Gardner, supra note 149. Thus, a worry that criminal law in general faces a “radical threat” from Robinson and its progeny is likely undue.

But, for a moment, let us assume Gardner is correct, and that the logic of Robinson, Powell, and Jones, which begin to consider the social circumstances that affect the human agency of individuals who commit crimes, does begin to question the underlying premises of criminal law. Below, this Note will take the view that the aforementioned European view of human nature and decision-making is the more accurate one than the hyper-individualistic American view. Considering that view with specific regard to this case, this Note asks: why not? If people accept the underlying logic of Robinson, why not “carry things to their logical conclusion”158Id. at 482. and begin to inquire into the social circumstances of criminals? It seems that Gardner, like the majority in McCleskey v. Kemp according to Justice Brennan, is simply afraid of “too much justice.”159McCleskey v. Kemp, 481 U.S. 279, 339 (1987) (Brennan, J., dissenting). This case concerned the constitutionality of the death penalty in Georgia. After a social science study, popularly known as the “Baldus Study,” showed that people who were convicted of murdering white people were much more likely to be sentenced to death than individuals convicted of killing Black people, the Court upheld Georgia’s practice. They did so in part because, despite the clear evidence showing racial disparities, the same logic could be applied to the entirety of the criminal justice system, since racial disparities appear in every aspect of the criminal system, from arrests to convictions to sentencing. This is what inspired Justice Brennan’s remark that the majority feared “too much justice.”

From a more abstract standpoint, the status crime doctrine juxtaposed to the traditional schema for construing criminal law through actus reus and mens rea can be understood as a counter-principle juxtaposed to a principle. That is, while in current law the counter-principle takes up a minority space relative to the space occupied by the general principle, this Note argues in the general spirit of critical legal studies that there should be an inversion between the two.160See Roberto Mangabeira Unger, The Critical Legal Studies Movement, 96 Harv. L. Rev. 561, 569 (1983). That is, the status crime doctrine could be the central principle from which courts begin their analysis, while the classical view could take the minority, exceptional position.

Finally, as elaborated on below, extending the status crime doctrine to include homeless individuals better reflects the reality of their circumstances. Homelessness is a status, and sleeping on the street is an inevitable act that follows from that status. Legally acknowledging this reality not only offers protections to homeless people, but also narrows the legislative path to policies that actually address the root causes of homelessness.

Although Gardner concedes that such a reconsideration might be warranted, he argues that it must come from the legislative process rather than through courts.161Gardner, supra note 149, at 481. While there is some merit to this argument, other movements for social change have seen courts play a pivotal role in leading the way, like Brown v. Board of Education, which was responsible for ending the policy of separate but equal across the United States.162Brown v. Bd. of Educ. of Topeka, 347 U.S. 483, 493 (1954). Furthermore, others have argued that dramatic changes that moderate or curtail criminal punishment are far more likely to come from political elites (even democratically elected ones) than through mass movements or popular referenda.163See generally Andrew Hammel, Ending the Death Penalty: The European Experience in Global Perspective (2010). Thus, the mere fact that courts would be responsible for such a change is not enough to object to the possibility of such change where an alternative route is not possible or highly unlikely to yield results.164This Note does not take a stance on the desirability of judicial review in general. Rather, the Note is simply arguing that in our current system of judicial review, courts should wield the power in the way argued above.

One aspect of the doctrine that Gardner is correct to criticize is the status crime doctrine’s placement in the Eighth Amendment. Indeed, the Eighth Amendment was originally intended only to curtail certain methods of punishments, rather than impose substantive limits on what could be punished.165Anthony F. Granucci, “Nor Cruel and Unusual Punishments Inflicted:” The Original Meaning, 57 Calif. L. Rev. 839, 842 (1969). This piece is cited by originalist Justice Scalia. See Harmelin v. Michigan, 501 U.S. 957, 979 (1991). While originalism is a deeply flawed and unwise approach to constitutional law,166See generally Erwin Chemerinsky, Worse Than Nothing: The Dangerous Fallacy of Originalism (2022). the original intent of an amendment should probably carry some weight. As such, Gardner thinks that the status crime doctrine should be constitutionally grounded in the Fourteenth Amendment’s Due Process Clause rather than in the Eighth Amendment.167Gardner, supra note 149, at 482–87. Indeed, Robinson is the only case that has imposed substantive limits on what can be punished under the Eighth Amendment.168Petition for Writ of Certiorari, supra note 120, at 3–4. This Note agrees that a Fourteenth Amendment grounding is the superior place to couch the status crime doctrine. Still, this Note does not agree with Gardner that doing so would necessarily limit the logical and doctrinal consequences of Robinson, nor should it. The same arguments will inevitably be made no matter where in the Constitution status crime doctrine is placed.

In sum, the Court should have upheld the Ninth Circuit’s decision and not allowed municipalities a cheap workaround to avoid status crime doctrine. In doing so, the Court has solidified and given legal sanction to the nation’s increasing trend of criminalizing homelessness.

E. A Change in Ideology Must Now Precede a Change in Law

Now that the Court has delivered its ruling and allowed the criminalization of homelessness, a change in popular ideology and legislative posture must now precede any novel constitutional argument or policy proposals to tackle homelessness. Essentially, popular consciousness must change and precede any future change in legality in this domain. Ultimately, this Note takes the view that the European conceptualization of economic conditions in general, and homelessness in particular, better recognizes reality. People are products of their environment.169This idea has been the subject of debate for generations, but many have taken the side that this Note takes. For an early example, see Emile Durkheim’s work on suicide as a product of social environments. See generally Emile Durkheim, Suicide (George Simpson ed., John A. Spaulding & George Simpson trans., Taylor & Francis e-Library 2005) (1897). Luck plays a role not only in the situations into which people are thrown, but also the decisions they end up making in those situations.170Armour, supra note 70, at 65–86. Once more Americans begin to agree with the statement “people are poor because of an unfair society” than “people are poor because of laziness and lack of willpower,” homelessness policy can turn away from its increasingly penal tendencies and towards building shelters and restructuring economic relations. While the Ninth Circuit’s ruling was imperfect in that it did not explicitly guarantee minimum requirements of safety and standards for homeless shelters,171It merely states that the shelter must be “adequate.” Martin v. City of Boise, 920 F.3d 584, 617 n.8 (2019). it acknowledged that homelessness is a “status” akin to drug addiction—one that is dependent on social circumstances and not controllable predominantly by the individual. Thus, the Ninth Circuit’s ruling already contains in it the ideological shift required by the rest of the country for combatting homelessness. But absent a larger, popular recognition of the principle, our law is unlikely to reflect such a principle.

Many specific policies for ending homelessness do already exist.172Solutions, Nat’l All. to End Homelessness, https://endhomelessness.org/ending-homelessness/solutions [https://perma.cc/R2HK-MSGU]. Moreover, legal arguments, like the ones outlined above and ignored by the Court, also already exist. But all of these are moot absent a shift in popular consciousness away from individualism and towards collectivism.

Conclusion

The Supreme Court decision reversing the Ninth Circuit’s ruling in Johnson is the culmination of long-standing trends of the individualization of societal problems. While America’s homelessness rate is not particularly high relative to other western democracies, its rate of unsheltered homeless people is. This is explained by America’s comparative unwillingness to spend as much as other western democracies on its social safety net. But it is also more fundamentally the product of broadly and deeply held beliefs about the root causes of poverty and homelessness as problems of individual rather than societal failure, beliefs that are exacerbated by structural racism.

The Ninth Circuit’s interpretation of the Constitution’s status crime doctrine makes sense in this light, since it accurately and shrewdly closed a loophole that governments could use to circumvent status crime doctrine. Nonetheless, the Court reversed the ruling and allowed municipalities to criminalize homelessness. The Court’s ruling effectively legitimized the view that homelessness is an individual “failing” like murder and allowed cities to criminalize people like Debra Blake. This Note has argued not only that such a ruling is misguided, but also that it rests on a fundamentally flawed view of how individuals and society interact. America’s legal approach to homelessness must see it as a social problem rather than a problem arising from a set of atomized individuals. The Supreme Court, however, has taken the opposite view. Seen through the lens of American exceptionalism, it is an exceptionally American response to further allow the criminalization of homelessness.

Appendix

Unable to find a previously published report comparing international homelessness rates, the author assembled this data using a variety of sources. This the first known assemblage of such data and should help contribute to future research in the realm of comparative politics and sociology. For Europe and the U.K., the source used is Fédération Européenne d’Associations Nationales Travaillant avec les Sans-Abri (“FEANTSA”)’s 2023 report titled Eighth Overview of Housing Exclusion.173Fédération Européenne d’Associations Nationales Travaillant avec les Sans-Abri, Eighth Overview of Housing Exclusion in Europe (2023) [hereinafter FEANTSA], https://www.feantsa.org/public/user/Resources/reports/2023/OVERVIEW/Rapport_EN.pdf [https:/perma.cc/H6UP-BB4C]. For America, the U.S. Department of Housing and Urban Development’s report titled The 2022 Annual Homelessness Assessment Report (AHAR) to Congress is used.174AHAR 2022, supra note 26. For Canada, the report used is the Government of Canada’s “Everyone Counts 2020-2022” survey.175Everyone Counts 2020-2022: Preliminary Highlights Report, Gov’t of Can. (Apr. 28, 2023), https://www.infrastructure.gc.ca/homelessness-sans-abri/reports-rapports/pit-counts-dp-2020-2022-highlights-eng.html#h2.4 [https://perma.cc/F65U-QMWT]. For Australia, see the Australian Institute of Health and Welfare’s data on homelessness and homelessness services.176Homelessness and Homelessness Services, Austl. Inst. of Health & Welfare (Feb. 27, 2024), https://www.aihw.gov.au/reports/australias-welfare/homelessness-and-homelessness-services [https://web.archive.org/web/20241022123239/https://www.aihw.gov.au/reports/australias-welfare/homelessness-and-homelessness-services]. For New Zealand, see the New Zealand Ministry of Housing and Urban Development, Homelessness Outlook report.177Homelessness Outlook, Ministry of Hous. & Urb. Dev., https://www.hud.govt.nz/stats-and-insights/homelessness-outlook/homelessness-indicators [https://perma.cc/8XS2-J9T8]. Note: The linked source allows one to download from the database the data appearing in the table below and charts above. These reports consist of the most recent available data for each respective country.

Each study qualifies that their methods are imperfect and likely undercount the number of homeless people. The point of this Note is not to be the authoritative comparative source on national homelessness rates, since the data is constantly changing and not always reliable, but rather to generally observe that America has a higher rate of unsheltered homeless people than all western democracies analyzed but one, a limited claim which is justified despite some uncertainty in the data. Furthermore, this Note is meant to offer a starting point for future research on the subject, as homelessness is in flux in both the United States and in Europe.

For the population counts, this Note used the following reports: For Europe, see the same FEANTSA report referenced above.178See FEANTSA, supra note 173. For the United States, see the 2022 Census Bureau Data.179Quick Facts, U.S. Census Bureau, https://www.census.gov/quickfacts/fact/table/US/PST045222 [https://web.archive.org/web/20240620094111/hhttps://www.census.gov/quickfacts/fact/table/US/PST045222]. For Canada, see 2021 Canadian Census data.180Census of Population, Gov’t. of Can. (2021), https://www12.statcan.gc.ca/census-recensement/index-eng.cfm [https://perma.cc/BX4A-LQRX]. For Australia, see the Australian Bureau of Statistics.181Population Clock and Pyramid, Austl. Bureau of Stat., https://www.abs.gov.au/statistics/people/population/population-clock-pyramid [https://perma.cc/4L5K-JMCV]. For New Zealand, see the New Zealand Government “Stats.”182Population, Stats NZ, https://www.stats.govt.nz/topics/population [https://perma.cc/WU69-WX2R].

It is important to note, however, that various countries define homelessness differently. For instance, New Zealand counts as “homeless” people who are staying with relatives temporarily,183See Ministry of Hous. & Urb. Dev., supra note 177; see also New Zealand Definition of Homelessness, Stats NZ (July 14, 2022, 4:06:03 PM), https://aria.stats.govt.nz/aria/?_ga=2.239608195.1644262357.1589145430-1129135485.1581538382#StandardView:uri=http://stats.govt.nz/cms/StatisticalStandard/TLkT54sjpxE30mJ4 [https://perma.cc/W5TS-L44P]. while the United States and other countries do not count this group.184See, e.g., AHAR 2022, supra note 26, at 4. Thus, in order to ensure that the proper, equivalent numbers are being compared, the data selected from each of the above sources is limited to people falling into one of three categories: (1) people “sleeping rough,” generally outdoors, (2) people sleeping in various forms of short-term emergency housing, and (3) people spending nights in designated homeless shelters. Thus, for the European data, the data from categories one, two, and three from the European Typology of Homelessness and Housing Exclusion (“ETHOS”) is used.185FEANTSA, supra note 173, at 16. For the U.S. data, no special selection is required. For the Canadian data, “sheltered” and “unsheltered” people are counted.186Gov’t of Can., supra note 175. For Australia, the categories of “[p]eople temporarily staying with other households” and “[p]eople living in ‘severely’ crowded dwellings” are excluded.187Austl. Inst. of Health & Welfare, supra note 176. For New Zealand, the number of total homeless people is limited to people “[w]ithout shelter” and to those living in “[t]emporary accommodation,” since including the other categories would have been overinclusive.188Stats NZ, supra note 183.

Compiling the data from the preceding sources yields the following chart:

Figure 1.  Percentage of Population Homeless by Country

The table with the raw numbers is included at the end of this Appendix for reference. For the second round of comparisons, which compared countries’ homelessness rate relative to shelter available, the following method of calculation was used. The number of people living without shelter was divided by the number of homeless people using the above methods for determining the number of homeless people. Thus, for the European data, ETHOS category 1 was used.189FEANTSA, supra note 173, at 16. For the United States, the “unsheltered” category was used.190AHAR 2022, supra note 26, at 12. For Canada, the “[u]nsheltered” category was used.191Gov’t of Can., supra note 175. For Australia, the “[p]eople living in improvised dwellings, tents, or sleeping out (rough sleepers)” category was used.192Austl. Inst. of Health & Welfare, supra note 176. For New Zealand, the “[w]ithout shelter” category was used.193Ministry of Hous. & Urb. Dev., supra note 177. The data yields the following chart:

Figure 2.  Percentage of Homeless Population Unsheltered by Country

It should be noted that not all countries, particularly in the FEANTSA report, had specific data for the number of people sheltered versus unsheltered. Five countries were unable to be included, therefore, in Figure 2: Finland, France, Ireland, Luxembourg, and Sweden. For the specific numerical breakdown of each category, a chart of the collected data is pasted below. Each number in the chart was collected using the methodology outlined above, and each chart is compiled using this data:

Table 1.  Homelessness Data by Country

Country

Homeless Count

National Population

% of Population

Homeless Unsheltered

% of Homeless Population Unsheltered

Belgium

6,700

11,554,767

0.058

1,187

17.71641791

Czechia

19,653

10,649,800

0.185

8,892

45.24500076

Denmark

3,738

5,873,420

0.064

535

14.31246656

Finland

794

5,548,241

0.014

N/A

. . .

France

209,074

67,656,682

0.309

N/A

. . .

Germany

210,612

83,237,124

0.253

32,467

15.41555087

Hungary

6,944

9,689,010

0.072

1,649

23.74711982

Ireland

11,632

5,060,005

0.230

N/A

. . .

Luxembourg

420

590,667

0.071

N/A

. . .

Poland

23,812

37,972,812

0.063

2,551

10.71308584

Portugal

9,604

10,298,252

0.093

N/A

. . .

Spain

16,006

47,432,805

0.034

4,508

28.16443834

Sweden

14,065

9,995,153

0.141

990

7.0387487

EU Rate (FEANTSA)

533,054

305,558,738

0.174

N/A

. . .

United States

582,462

333,287,557

0.175

233,832

40.14545155

United Kingdom

86,288

66,796,807

0.129

17,012

19.71537178

Canada

20,000

36,991,981

0.054

5,000

25.0

Australia

58,002

25,760,867

0.220

7,636

13.165063

New Zealand

11,553

4,900,600

0.230

3,624

31.3684757

Note: Data used to produce Figures 1 and 2.

98 S. Cal. L. Rev. 761

Download

*Articles Editor, Southern California Law Review, Volume 98; J.D. Candidate 2025, University of Southern California Gould School of Law; M.A. 2021, University of Warwick; B.A. 2020, University of Southern California.