Right to Be Let Alone

Transcription

Right to Be Let Alone
4. The Right to Be Let Alone: The Rise of Communication Privacy A new mode of obtaining power, of mind over mind, in a quantity hitherto without
example. Jeremy Bentham, Panopticon, or the Inspection House, 1791
In the eighteenth century, the utilitarian English philosopher Jeremy Bentham and his
brother Samuel designed a building in which a small number of observers could monitor
the behavior of large populations of residents, or more properly, inmates. This structure
would be suitable for
punishing the incorrigible, guarding the insane, reforming the vicious,
confining the suspected, employing the idle, maintaining the helpless,
curing the sick, instructing the willing in any branch of industry, or
training the rising race in the path of education, in a word . . . houses of
correction, or work-houses, or manufactories, or hospitals, or schools.
[Bentham 1791, 2-3]
A panopticon, from the Greek ‘all-seeling,’ was an eighteenth-century peep-show device
through which viewers could look at a series of pictures. Bentham used the name for his
structure, and for those who might find the meaning of panopticon obscure, he also
referred to it as an “Inspection House.”
The Panopticon, based on “a new principle of construction applicable to any sort
of establishment, in which persons of any description are to be kept under inspection”
(Bentham 1791, t.p.), is a circular building designed to minimize privacy. The population
to be watched—whether prisoners, workers, patients, or students—lived in cells arrayed
around the outside wall. And a “governor,” or “inspector,” sat in the center in a booth, or
“inspector’s lodge,” unseen by those being observed, but able to see them at any time.
Bentham acknowledged that a guard could not watch every resident at every moment, but
he argued that the knowledge that one could be seen would serve as a deterrent, ensuring
appropriate behavior by prisoners and keeping workers and students on task. Bentham
did show his concern that residents have some small amount of privacy for their ablutions
by including in each cell a “slight screen, which the prisoner might occasionally interpose
[for] decency, [but which] might be so adjusted as to prevent his concealing from the
Inspector any forbidden enterprize” (Bentham 1791, 11, n.).
Even with this privacy protection, the Bentham Panopticon was a technology
destined to fail. Despite his exact specifications for room size, wall thickness, plumbing,
waste removal, lighting, security, and modesty, Bentham’s elaborate design worked
better on paper than in real life, and for reasons both economic and practical, no true
panopticon prison, hospital, or school was ever built. But although Bentham was
frustrated in his attempts to realize what he saw as a more humane and utilitarian prison,
and serve as its governor, he did establish one important principle that is still around:
technology—in this case, the design of a building—can be used to regulate privacy.
The digital age, like Bentham’s eighteenth century, is an age of Englightenment,
and like that time, rapidly-advancing technologies are bringing surveillance and privacy
concerns to the fore. In this chapter, we will look specifically at ways in which, not new
architectural designs, but new technologies of communication, impact privacy, and we
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 2
will see that Bentham’s concept of all-seeing surveillance has finally been realized, two
centuries later, with the development of mobile phones and the internet, which track
where we are and what we are doing, and the panopticon of CCTV, with its capacity to
observe everyone in view, not just sometimes, but all of the time, not just in institutional
settings, but in all kinds of buildings, including their hallways, nooks, and crannies, and
on every kind of highway, alley, street, or sidewalk.
Panopticon.jpg
Above: In 1787, Jeremy Bentham and his brother Samuel designed a Panopticon prison
[Steadman 2012, p. 16]. Below: A true panopticon had to wait for the development of
CCTV surveillance [screenshot of a Strike Industries CCTV surveillance system.
http://www.strikeind.com/images/cctvlee6a.JPG. Accessed April 21, 2014].
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 3
cctv_strikeindustries.jpg
Communication and privacy Humans developed language anywhere from 50,000 to 200,000 years ago, and we were
probably communicating before that as well, since pre-linguistic communication seems
necessary for language to develop. Along the way, we began separating our
communications into those intended for public consumption, and those which are private.
That, in turn, meant finding ways to protect privacy from those who would breach it, and,
for the snoops in a society, it meant defeating those protections. Privacy is both a social
practice and a legal right. Some of the ways of protecting communication privacy are
codified into law, and the long history of spying and censorship shows that there are legal
ways to invade that privacy as well as illegal ones.
It has become a commonplace to say that the right to privacy is seriously
threatened by advances in digital technology. These digital technologies have brought
new invasions of our privacy, along with new justifications for the invasions. It’s been
obvious for centuries that peeping Toms are breaking the law, but it took a Supreme
Court decision to clarify that the police need a warrant to aim a heat sensor at a house to
see if its residents might be growing marijuana (Kyllo v. United States, 533 U.S. 27
[2001]. And in 2014, the Court will decide two cases hinging on whether the police need
a warrant to search a person’s cell phone after they’ve been arrested (Rylie v. California;
United States v. Wurie).
It’s an age of a new kind of panopticon, where much of what we do is mediated
by the internet and mobile phones, and our on- and offline behavior is visible to
marketers, hackers, and governments whether we like it or not. We hear the constant
lament that privacy is not what it used to be in the good old analog days. Pessimists fear
that the only way to stay private in an age of digital surveillance is to go completely off
the grid, while optimists insist that all that’s necessary to protect privacy and rein in
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 4
today’s technological intrusiveness, is to tweak the law. Those cries are punctuated by the
occasional smug assertion that privacy is dead, so get over it. But to the rest of us, it’s
clear that we need more than Bentham’s “slight screen,” more than the slippery privacy
protections set up by Facebook, Google, and the National Security Administration
designed to preserve a modicum of decency but exposing more and more of our behavior
to the “Inspectors.” We still have a need for privacy, even if that need differs from age to
age and culture to culture, and privacy policies and laws need both serious and continual
updating to adjust to technological change.
Technology and the right to privacy Technology has always posed a challenge to privacy. From the start, writing, and
later, print, provided a means of making the private, public—publication, after all, means
‘making things public.’
The earliest reference to a right to privacy in a legal text appears in a discussion
of slander and libel:
[T]he question at present is not as to the moral, or even legal delinquency
of one who publishes the truth, with a malicious design to create mischief,
but whether the party, concerning whom nothing more than the truth is
published, has such a right to privacy and concealment, as shall, even in
point of reason and natural justice, entitle him to a compensation in
damages from one who publishes the fact.
[Starkie 1830, I: liii-liv; emphasis added]
Here, the means of “publishing” the slander or libel—speech and print—aren’t the central
issue: the focus is on the speaker or writer who publishes a truth which the subject wants
to conceal; the technology is incidental.
Technology looms slightly larger in the case of Prince Albert v. Strange (1848),
argued before England’s High Court. Though it concerned, not slander and libel, but the
connection between property and privacy, this case hinged in part on the unauthorized
use of print technology to invade the privacy of Queen Victoria and Prince Albert.
Starting in 1840, Prince Albert and Queen Victoria made sketches for their
personal amusement, some of which they reproduced as etchings to be hung at Windsor
or to be given as gifts to friends. Typically Albert and Victoria printed their own etchings
on the palace press, keeping the plates locked up to ensure that no one made an
unauthorized copy, but in 1847 they gave a printer named Brown some of the plates “for
the purpose of printing off certain impressions thereof for her Majesty and the Plaintiff
[Prince Albert].” Middleton, one of Brown’s employees, secretly printed extra copies of
sixty-three etchings, which he sold for £5 to Jasper Tomsett Judge, a writer specializing
in royal gossip: in one of his books, Judge exposed the royal budget, including the
salaries of the Queen’s advisors and appointees. Judge proposed to exhibit these bootleg
etchings. He also arranged with his printer, William Strange, to publish a catalogue
describing the pictures. On learning of the exhibition, Prince Albert sought and was
granted an injunction both against the public display of the artwork and against the
publication of the descriptive catalogue.
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 5
In protecting the royal couple’s right to control news about their artistic hobby,
the court concluded that “the privacy is the right invaded,” connecting that privacy right
with intellectual property:
That there is property in the ideas which pass in a man’s mind is consistent
with all the authorities in English law. Incidental to that right is the right
of deciding when and how they shall first be made known to the public.
Privacy is a part, and an essential part, of this species of property.
The High Court found both that the unauthorized reproduction of the royal etchings was a
clear case of theft, and also that the similarly unauthorized catalogue which described the
etchings in words but did not reproduce the images, was also impermissible.
albertetching.jpg
Above: One of Prince Albert’s etchings, showing his artistic talent. Below: An etching by
Queen Victoria, whose drawing ability was more modest. These are two of a small
number of royal etchings, apparently not ones covered by the injunction, that were made
public in 2012 when they were sold at auction.
victoriaetch1.jpg
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 6
The right to be let alone The court did not specifically address the role of technology in Prince Albert v. Strange,
but the printing press is the implicit tool for breaching the royal privacy. By the late
nineteenth century, printing had developed to the point where the technology itself was
starting to be perceived as intrusive and as an explicit threat to privacy.
Samuel D. Warren and Louis D. Brandeis were the first American jurists to argue
that privacy was more than a right to private property, as in Albert v. Strange. It was also
more than the long-accepted right to seek refuge from the turmoil and publicity of
everyday life by going home, shutting the door, and drawing the curtains. Instead,
Warren and Brandeis argued that privacy was the right to be let alone as one went about
one’s daily tasks outdoors, away from the sanctuary of one’s home and castle, in public.
What prompted Warren and Brandeis to articulate this right were new
developments in printing and photographic technology that permitted gossip columnists
and press photographers to expose the lives of ordinary people for all to see:
Instantaneous photographs and newspaper enterprise have invaded the
sacred precincts of private and domestic life; and numerous mechanical
devices threaten to make good the prediction that “what is whispered in
the closet shall be proclaimed from the house-tops.” [Warren and Brandeis
1890, 195]
Samuel Warren may have come to this view because his wife was the daughter of
Sen. Thomas F. Bayard, well-known scion of a prominent Washington political family
often hounded by intrusive reporters (Gaijda 2008). For example, the Washington Post’s
account of Warren’s wedding to the senator’s daughter, Mabel Bayard, gushes,
[T]he tones of Mendelssohn’s wedding march broke upon the ear of the
hundreds gathered to witness this, the marriage of the season, the party
moved down the aisle, and the long expected event, for whch there had
been hopes and fears, heart flutterings and silent longings, was a fact.
[“A Brilliant Bridal” Washington Post, Jan. 26, 1883, p. 4]
And the Post’s overwrought account of the death of Warren’s sister-in-law ran on the
front page under the headline, “Death’s Sad Summons”:
Entering the room and standing by her sister’s bedside, she noticed a
peculiar expression on the face of Miss Bayard, nor did her sister respond
to the several attempts to awaken her. Miss Nannie instantly became
alarmed and screamed out, “Katie is dead!” In a few minutes the family
gathered around the still warm but unconscious form and a scene of
heartrending distress followed. [Washington Post, Jan. 17, 1886, p. 1;
neither the Post nor the New York Times reported the death as a likely
suicide, although that fact was well-enough known to be mentioned years
later in the Milwaukee Journal (“Three strange suicides,” Dec. 22, 1897,
p. 6.]
If the Post’s voyeuristic journalism motivated Warren to write on privacy, he kept
the information private. What is most germane for our consideration of privacy in the
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 7
digital age is the concern expressed by Warren and Brandeis that changing technologies
were eroding the private sphere. In the early days of photography, they note, people had
to make a deliberate decision to have their portraits taken. But new cameras and film
made it possible to shoot pictures outside the studio, and without the knowledge or
consent of those photographed, something which posed new challenges for privacy law:
While, for instance, the state of the photographic art was such that one's
picture could seldom be taken without his consciously “sitting” for the
purpose, the law of contract or of trust might afford the prudent man
sufficient safeguards against the improper circulation of his portrait; but
since the latest advances in photographic art have rendered it possible to
take pictures surreptitiously, the doctrines of contract and of trust are
inadequate to support the required protection, and the law of tort must be
resorted to. [211]
Before technology intervened, gossip was spread person-to-person, its range
limited by the social networks of the day. The telephone, which became popular in the
1880s, increased the speed and range of gossip, but it still distributed such chatter the oldfashioned way, from person to person (telephones had their own privacy issues, which we
will discuss later in this chapter). In contrast, the modern newspaper of the 1890s
broadcast gossip to the entire city, the nation, even the world. According to Warren and
Brandeis, the broad publication of such private information created a taste for “idle
gossip, which can only be procured by intrusion upon the domestic circle” (196). For
them, putting such trivialities into the paper perverted the public taste, convincing readers
that such stories were important and crowding out reports about “matters of real interest
to the community” (196).
In addition to whetting the public’s taste for gossip, advances in newspaper and
photo technology led to demands for more articles illustrated with more pictures, and one
result was that ordinary people were suddenly at the mercy of reporters who regarded
everything and everybody as a potential story, along with press photographers intent on
putting anybody’s image on public display, without asking for permission. Warren and
Brandeis saw that the increasing complexities of modern life had made privacy even
more important to the individual, but also more difficult to attain. In their view, what we
would call “virtual” invasions of personal space could be worse than an actual physical
attack:
[M]odern enterprise and invention have, through invasions upon his
privacy, subjected him to mental pain and distress, far greater than could
be inflicted by mere bodily injury.
[Warren and Brandeis 1890, 196]
Celebrities, politicians, and other public figures are subject to different privacy
rules, because they voluntarily put themselves on display, but for the rest of us, as the
authors put it, “Modern devices afford abundant opportunities for the perpetration of [the
unauthorized publication of one’s image or actions] without any participation by the
injured party” (Warren and Brandeis 1890, 211).
To combat this technology-driven invasion of privacy, exemplified in 1890 by
“the unauthorized circulation of portraits of private persons; and the evil of the invasion
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 8
of privacy by the newspapers,” Warren and Brandeis posit a right to privacy that covers
more than our reputation (as Starkie put it), or our intellectual property (as in Albert v.
Strange). It also includes who we are and what we do:
a general right to privacy for thoughts, emotions, and sensations, these
should receive the same protection, whether expressed in writing, or in
conduct, in conversation, in attitudes, or in facial expression.
[Warren and Brandeis 1890, 206]
The authors suggest that legal protections for intellectual property can simply be
extended to cover what they call “the right to an inviolate personality”:
The right of property in its widest sense, including all possession,
including all rights and privileges, and hence embracing the right to an
inviolate personality, affords alone that broad basis upon which the
protection which the individual demands can be rested. . . . The principle
which protects personal writings and any other productions of the intellect
or of the emotions, is the right to privacy, and the law has no new
principle to formulate when it extends this protection to the personal
appearance, sayings, acts, and to personal relation, domestic or otherwise.
[211-13]
Warren and Brandeis conclude their essay by outlining the parameters of a legal
right to privacy which permits the publication of private matters that are of legitimate
public interest (including both courtroom testimony and pertinent private details about
the lives of public figures), but also protects both ordinary people and public figures from
invasions of their privacy:
The design of the law must be to protect those persons with whose affairs
the community has no legitimate concern, from being dragged into an
undesirable and undesired publicity and to protect all persons, whatsoever;
their position or station, from having matters which they may properly
prefer to keep private, made public against their will. It is the unwarranted
invasion of individual privacy which is reprehended, and to be, so far as
possible, prevented. [215; to be fair, the press could be sensitive as well as
intrusive. Warren eventually left his law practice with Brandeis to run his
family’s business, though he remained a public figure in Boston’s art
world. When he committed suicide in 1910, the cause of his death was
reported as apoplexy.]
Warren and Brandeis were concerned that innovative newspaper technologies enabling
gossip columnists and out-of-control photographers were breaching privacy in conduct,
conversation, attitudes, and facial expression. Eventually, Brandeis addressed telephone
privacy as well: not the intrusive nature of phone calls, something that early critics of the
telephone complained about, but warrantless government wiretaps. Today we see the
same invasions of privacy in the form of CCTV and the internet, technologies and the
privacy issues surrounding them that will be discussed at the end of this chapter. First,
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 9
we’ll take a look in more detail at the technological changes that prompted Warren and
Brandeis’ essay.
Read all about it: mechanical devices lead to invasion of privacy Photography and newspapers, the “mechanical devices” that worried Warren and
Brandeis, were hardly new in 1890, but the rise of what we now call paparazzi and the
gutter press was brought about in large part by three nineteenth-century innovations: the
rotary steam press, the rotogravure process for printing photographs, and easy-to-use,
hand-held cameras.
Improvements in the printing press The invention of the steam-powered rotary printing press in the early 1800s
enabled the mass production of newspapers. Although printing had already become
widespread, its technology hadn’t changed significantly in four hundred years. Gutenberg
used the wine press as a model for the first hand-cranked flatbed screw press in the
1450s, and although wooden presses had been replaced by iron ones, and a few
improvements had been made to the press mechanism, not much else had changed in
terms of press design. As a result, in 1800, books were still slow to print, few newspapers
ran daily editions, and newspapers remained small, often eight pages or less. Then Johann
Koenig invented a rotary steam press in 1814 that could print 1100 pages an hour, more
than doubling the output of the older, hand-operated flatbed press. The London Times
was the first newspaper to adopt the new technology, and others quickly followed.
Richard Hoe improved the design, and by mid-century, the speed of the rotary steam
press quadrupled. At the turn of the twentieth century presses ran faster still: a high-speed
Hoe press, printing both sides of a five-mile-long roll of paper, could churn out 100,000
sixteen-page sections, cut and folded, per hour (Hutchinson 2008, 2).
Above: A working Austrian replica of Gutenberg’s first printing press, with a flat bed and
hand-operated screw mechanism, a design based on the winepress. Cast iron presses sped
the process up, but not significantly. Below: The rotary steam press, invented by Koenig
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 10
in 1814, with an output of 1100 pages per hour, enabled true mass production of printed
materials. Using the rotary press, newspapers could publish larger editions on a daily,
rather than a weekly, basis.
As newspapers shifted from weekly to daily editions—some big city papers
published more than once a day—editors scrambled to find stories to fill their expanding
pages. They looked for art as well. The rotogravure process, in which a photographic
image is transferred to a print cylinder, was first used in the 1860s, allowing newspapers
to run photos instead of line art. Demand for photographs dramatically increased as
rotogravure became widespread, but news photography really took off in the 1880s, with
the development of hand-held film cameras. Photographers were more mobile and more
productive once they didn’t have to lug around tripods and boxes of glass photographic
plates. Now too, newspapers could choose from an abundance of pictures, and by the
early twentieth century papers like the New York Times began printing weekly pictorial,
or “rotogravure,” supplements in their Sunday editions, a practice memorialized in the
lyrics of Irving Berlin’s song “Easter Parade”:
On the avenue, Fifth Avenue, the photographers will snap us,
And you’ll find that you’re in the rotogravure.
Improvements in photography Not all newspaper photography was worth singing about, and not everyone
wanted their picture in the paper. Photography had been around since the 1820s, but by
the time “The Right to Privacy” was published in 1890, photographers with “hand
cameras” were shooting a new kind of “instantaneous” photo, the term used by Warren
and Brandeis as well as by the photographers of the time. Today we’d call them candids
or snapshots (snap-shot was a term borrowed from hunting for a shot taken quickly,
without careful aim): their quality didn’t match that of high-end studio cameras, but they
were good enough, not just for vacations and birthday parties, but also for the newlyemerging genre of photojournalism. These hand cameras were to invasion of privacy in
the 1890s what cell phone cameras are today.
In 1888, Eastman Kodak introduced the first hand-held box camera. It used roll
film instead of the more cumbersome glass photographic plates, allowing photographers
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 11
to shoot as many as one hundred pictures without reloading, and it sold for $25, about
$650 in today’s dollars—not cheap, but within the reach of upper-middle-class amateurs
as well as working photographers to supplement their professional equipment. For the
general public, the camera was marketed as “the only camera that anybody can use
without instructions” under the slogan, “You press the button, we do the rest.” Other
companies put out similar, inexpensive, easy-to-use, cameras. Professionals were
encouraged to adopt these box cameras, as well as the adjustable pocket cameras that
soon followed, but the main customer for hand-helds was the amateur: Kodak’s first
“Brownie” box camera, released in 1901, sold for only $1 (about $25 today). Kodak
produced half a million No. 1 Brownies in the first year, and they soon numbered in the
millions. Now anyone could be a photographer.
Now anyone could have their photo taken as well, like it or not. Manufacturers
considered surreptitious photography to be a major selling point for their “instantaneous”
cameras, simple point-and-shoot box cameras that didn’t require elaborate set-ups. This
1897 pamphlet from the Rochester Optical Company, a Kodak competitor, encourages
photographers to catch their subject unawares:
Instantaneous Photography possesses a fascination peculiar to itself; the
amateur feels a peculiar desire to take “something,” and if that
“something” be an animate object, unconscious of his presence, so much
the better, and with what a thrill does he see his first “snap shot” develop
up, whether a railroad train, trotting horse, or a man hurrying along the
street, whom he has transfixed with one foot on the ground, the other in
the air, and his whole figure in an attitude that the original would
repudiate, and declare he never assumed such a position, were the proof
not against him.
[Carlton 1897, 38]
1kodakad.jpg
An undated ad for the first Kodak hand-held box camera, released in 1888 and marketed
as “the only camera that anybody can use without instructions.” With this model, the user
didn’t even have to load the film. When the 100-exposure roll was finished, the camera
went back to Kodak for developing and printing. Kodak returned the prints and camera,
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 12
loaded with a new roll of film, ready for more. This model sold for $25, or about $650
today (not cheap, but significantly less than the cost of professional cameras). The first
Kodak Brownie, where photographers changed six-exposure rolls themselves, was
released in 1901 and cost $1.00. [Wikimedia Commons image]
Note, too, the pamphlet’s assertion that the photograph offers incontrovertible
proof that something happened. Photographs, because they seemed so much more
realistic than painting and drawing, were widely believed to provide authentic
representations of the natural world. “Photographs don’t lie” is the claim that underpins
what would soon become surveillance photography, but it also brought out the
unbelievers. In Sir Arthur Conan Doyle’s novel The Lost World (1912), the skeptical Dr.
Illingworth reminds an audience of fellow-scientists that pictures can be doctored and are
therefore not trustworthy. The narrator summarizes Illingworth’s rejection of
photographic evidence that a pterodactyl had been found alive in a remote area of South
America:
The corroboration of these wondrous tales was really of the most slender
description. What did it amount to? Some photographs. Was it possible
that in this age of ingenious manipulation photographs could be accepted
as evidence? What more? . . . It was understood that Lord John Roxton
claimed to have the skull of a phororachus. He could only say that he
would like to see that skull.
[Doyle 1912, 181]
In response, the expedition leader, Prof. Challenger, presents Dr. Illingworth, not with a
dinosaur skull, but with a living pterodactyl, which panics when removed from its box,
flies out a window, and is seen no more.
lostworld image.jpg
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 13
Photographs don’t lie: In Conan Doyle’s The Lost World, when Prof. Illingworth won’t
believe the photographic evidence, Prof. Challenger brings in a box with the real
pterodactyl in it. The pterodactyl breaks loose, flies madly about the room, then out the
window, and is gone, presumably back to the South American plateau where it was
found. In the 1925 film adaptation of Doyle’s novel, a brontosaurus replaces the
pterodactyl. The brontosaur escapes while its cage is being offloaded at the docks, and it
runs amok terrorizing London. In this still from the film, the brontosaur is crossing Tower
Bridge. Spoiler: In the next frame, the bridge collapses under its weight, and the
brontosaurus falls into the Thames and vanishes.
In any case, despite warnings about their unreliabilty, news photos fed into the “seeing is
believing” mood of readers, and real or faked, these pictures sold papers.
Surveillance cameras The potential for photography to be deployed not just as evidence, but as a
surveillance tool, was also clear from the beginning. William Henry Fox Talbot, the first
English photographer, wrote that the camera could see light invisible to the human eye
and speculated about using photography to unmask secrecy both in real life and in
literature:
Now, I would propose to separate these invisible [i.e., ultraviolet] rays
from the rest, by suffering them to pass into an adjoining apartment
through an aperture in a wall or screen of partition. This apartment would
thus become filled (we must not call it illuminated) with invisible rays,
which might be scattered in all directions by a convex lens placed behind
the aperture. If there were a number of persons in the room, no one would
see the other: and yet nevertheless if a camera were so placed as to point
in the direction in which any one were standing, it would take his portrait,
and reveal his actions.
For to use a metaphor we have already employed, the eye of the
camera would see plainly where the human eye would find nothing but
darkness.
Alas! that this speculation is somewhat too refined to be introduced
with effect into a modern novel or romance; for what a dénouement we
should have, if we could suppose the secrets of the darkened chamber to
be revealed by the testimony of the imprinted paper.
[Talbot, The Pencil of Nature, 1844, p. 30]
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 14
library.jpg
The body in the library: Fox Talbot’s speculation about the potential for surveillance
photography to uncover the truth was insightful but premature. England’s first
photgrapher used paper treated with a light-sensitive emulsion placed in a camera
obscura, a back box with a pinhole opening that served as a lens. In order to have enough
light to make the “realistic” image (above) which he called “The Library,” Talbot had to
reconstruct the reality to meet the needs of his technology. He emptied the bookcase, took
it outdoors into the sun, and put the books back in. Then he took the picture. Talbot’s
published collection of photos, The Pencil of Nature, was similarly adapted to the
technology at hand. It consisted of an introduction and printed commentary for each
picture, but the photographs were not printed graphics. Each was an original, shot,
developed, and pasted onto the page. As a result, every copy of the book was slightly
different. This is how art made its way into early printed books as well. Because early
print technology was better for reproducing text than pictures, books like Gutenberg’s
Bible also had their artwork and decorative lettering hand-painted after the pages had
been run through the press.
Speculation about surveillance photography continued into the later nineteenth
cenuty. Marvin (1988) cites a suggestion in the Electrical Review in 1888 that flash
photography could combine with burglar alarms to monitor bank vaults:
As soon as [the burglars] had begun operations the police would be
alarmed, and at the same instant a picture of the men would be made by
the camera and the flash-light combined, so that even if the men escaped
the police, they would leave behind them evidence which would very
probably eventually result in their detection.
[“Flash-light Photography” 1888, p. 3]
As photography became more established, its predicted capacity for surveillance
became a reality. In the latter part of the nineteenth-century, police used cameras to make
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 15
mug shots of prisoners, and by the early twentieth-century, police took up photography
for serious surveillance. In 1913-1914, Scotland Yard operatives used telephoto lenses to
photograph imprisoned suffragettes and participants at suffragette rallies, sending
warning fliers with suspects’ pictures to museums, galleries, and other places where
women’s rights advocates had staged protests that sometimes turned violent.
suffragettsurveillance.tiff
Votes for women: “These early examples of state use of surveillance photography show
how they rattled male-ruled Edwardian Britain.” Jones 2013. Under the Hammer.
National Archive Image Library. spy pictures:
http://news.bbc.co.uk/2/hi/uk_news/magazine/3153024.stm
Doyle’s skeptical Dr. Illingworth would have been delighted to learn that one
such surveillance photo was doctored: the imprisoned activist Evelyn Manesta (no. 10,
above) had to be restrained in order to be photographed, but when her picture was
released, the restraining arm around her neck became a scarf.
manestabefore.jpg
manestaafter.jpg
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 16
Surveillance photographs of suffragette Evelyn Manesta: on the left, the original shot
shows her with a man’s arm around her neck, restraining her for the photograph; on the
right, the doctored photo distributed on warning posters, with the restraining arm replaced
by a bit of scarf.
Although forcing a prisoner to pose for a photograph and doctoring the images of
protestors may be questionable practices for law enforcement, public surveillance,
whether with eye or camera, is perfectly legal. American law protects people from
intrusive photography when they are at home, even when they are visible through a
window from a public place. But despite Warren and Brandeis’ concerns about intrusive
photographers, in most cases both the police and private photographers may photograph
anyone in a public place without first obtaining permission. Warren and Brandeis might
not be happy with this assessment of the current situation from a recent book on
photography law:
Even the most sensitive aspects of people’s lives, including extreme
tragedy and embarrassing moments, may be photographed freely unless
the subjects have secluded themselves in a place or manner where they can
reasonably expect privacy. . . . If a person in public view does not want
personal moments, embarrassing situations, or unwanted implied
associations photographed, it is their duty to take reasonable measures to
protect their privacy and not the duty of other persons to refrain from
viewing or photographing them. [Krages 2012, Kindle locations 711-12;
732-33]
Laws bar photography in public only when subjects have a reasonable expectation
of privacy, for example in locker rooms, dressing rooms, tanning booths, and restrooms.
Krages says that even after 9/11, and the passage of the USA Patriot Act, “no laws were
enacted that restrict photography. Structures such as bridges, industrial facilities, and
trains remain perfectly legal to photograph” (Krages 2012, Kindle location 1584). And he
argues, perhaps unconsciously echoing the rhetoric of pro-gun advocates, that citizens
with cell phone cameras at the ready don’t threaten public safety, they enhance it, serving
as deterrents to crime and terrorism (Kindle location 1636).
Even though much public photography remains legal, laws may regulate the
publication of those photographs (Krages 2012; laws are more or less specific in their
discussion of photography, depending on the state). News photography in particular is
protected under the First Amendment, but with the spread of online photography and
video sites like YouTube and Instagram, the definition of who counts as a journalistic
photographer is expanding, or at least becoming problematic: it may be a stretch to argue
that anyone posting a silly cat photo online is publishing news, but it’s also true that
many news outlets regularly ask readers to upload eyewitness images of breaking stories
such as natural disasters, fires, accidents, or crimes. Video is another matter: while image
surveillance in public, even by private individuals, remains generally legal, some states
treat the sound track of a video separately, under more-restrictive anti-wiretapping
legislation (Krages 2012).
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 17
Even when it[s legal, there are still privacy concerns voiced over the ethics of
public photography. Although Bentham would certainly approve, Warren and Brandeis
might question the practice of CCTV monitoring of public streets, which places
government in the role of full-time inspector of public behavior, and the deployment in a
growing number of cities of police red light cameras and license plate recorders, many of
them maintained by private vendors who earn fees for every ticket issued, a practice we
will discuss in the next chapter.
Number please: The telephone and privacy Warren and Brandeis objected to intrusive private photographers, but “The Right to
Privacy” is silent about the increasingly popular telephone, although that innovative
technology raised privacy concerns from the start. But Brandeis continued to worry about
the impact of technology on privacy, and after he was appointed to the Supreme Court, he
addressed the question of governmental surveillance, and of telephone wiretapping in
particular. As we will see below in his often-cited dissent in Olmstead v. United States
(1928), Justice Brandeis put government surveillance at the very top of his list of threats
to the right to be let alone:
The makers of our Constitution . . . sought to protect Americans in their
beliefs, their thoughts, their emotions and their sensations. They conferred,
as against the Government, the right to be let alone—the most
comprehensive of rights and the right most valued by civilized men.
[Olmstead, 478]
Olmstead was a case where the police did not let someone alone, but instead
conducted a warrantless wiretap. Such wiretaps raised the issue of whether a telephone
conversation was public or private. Today we think of the telephone as a device that
allows us to talk freely and confidentially, but in the early days of telephony that was not
generally the case.
Alexander Graham Bell and Elisha Gray invented the telephone at about the same
time in 1876. The invention took off quickly, and by 1900 there were 1.4 million phones
in use in the United States. But critics of the new technology immediately began to
complain that it was eroding privacy. Some of the complaints came from early telephone
users who didn’t quite understand how the device worked, and worried that a caller could
see as well as hear them (Marvin 1988). Fears were also voiced that the network of phone
lines being strung across cities could capture everyone’s speech, not just the voices of
those making a call. This led the New York Times to predict, only a year after the
telephone’s invention, that the new technology would bring about the “immediate end of
all privacy.” Some today would argue that’s exactly what did happen. According to the
Times, it wasn’t enough just to avoid the telephone and stay off the grid; to protect their
privacy, people would either have to remain silent or give up speech for writing:
No matter to what extent a man may close his doors and windows, and
hermetically seal his key-holes and furnace-registers with towels and
blankets, whatever he may say, either to himself or a companion, will be
overheard. Absolute silence will be our only safety. Conversation will be
carried on exclusively in writing. . . . An invention which thus mentally
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 18
makes silence the sole condition of safety cannot be too severely
denounced.
[“The Telephone Unmasked” 1877; cited also in Marvin 1988]
Those who better understood the mechanics of telephony belittled claims that the
new electric technologies saw and heard all. One writer urged the press to educate the
public about the telephone’s real potential instead of stirring paranoia with sensational
predictions that “we shall soon be nothing but transparent heaps of jelly to each other”
(“Sensational Science” 1897; cited also in Marvin 1988). But even discounting such false
fears, privacy was still a serious issue for telephone users.
For one thing, voice transmission in the 1880s was primitive compared to what it
is today: callers had to speak loudly into the phone in order to be heard on the other end.
Whispering was out of the question. In addition, telephones were placed in central
locations in homes and businesses. This meant that everyone in the room could hear at
least one side of a conversation, and sometimes, when the person on the other end
shouted loudly enough, both.
It’s not that callers didn’t want privacy; it just took a while for the technology to
catch up with their needs. The location of phones was limited by their wiring, and
creating privacy required remodeling interior space in order to move phones and callers
away from high-traffic areas into separate, sometimes sound-proofed, rooms (references
to the dedicated telephone call room appear as early as 1885), and eventually into smaller
telephone booths (the expression dates from around 1895), or telephone boxes (1904).
Extension phones were another way to gain privacy, though it took about thirty years for
them to be developed: the term extension phone first appears around 1906.
Even though callers’ privacy had increased, as late as 1918 the telephone was still
considered a means of public communication. In that year, in response to America’s entry
into World War I the year before, Iowa governor Walter Harding forbade the use of
foreign languages in public in the state. The “Babel Proclamation,” as it was called,
established that English, and only English, was to be the language used in schools and
churches, and for all public speeches. Harding included phone calls in his ban on foreign
languages:
Conversation in public places, on trains and over the telephone should be
in the English language.
[Harding 1918, 2, empasis added]
At the time, many rural areas shared “party-line” telephones: a phone that connected the
farmhouses along a country road in series. A pre-determined number of rings let each
family know if the call was for them. It was also possible for multiple parties to join in a
single conversaton, but it was also possible, though impolite, to eavesdrop on calls
intended for someone else. Such eavesdroppers turned in several Iowa women for
violating Harding’s “Babel Proclamation,” an action which turned Iowa into a national
laughingstock. In any case, the ban on foreign languages on the phone, or anyplace else
in Iowa, was lifted a year later, after the armistice was signed.
The earlier technology of telegraphy assumed that message transmission was, to
some extent, public communication. Because telegraphers had to convert messages into
Morse code in order to send them, then decode received messages back into written
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 19
English for the recipient, users could have no expectation of privacy. Eyes-only
messages—those that were highly personal or secret—had to be sent by mail, where
message privacy was protected by law, and where there was a greater chance they’d only
be read by the addressee. The telegraph also fell victim to third-party eavesdropping:
business competitors and criminals found ways to tap the telegraph wires in order to
acquire information on stock prices and race results, for example, illicit practices which
led to the first state anti-wiretap laws.
Like telegraphers, telephone operators eavesdropped as part of their job. Before
direct dialing started to spread in the 1890s, callers had to ask an operator to connect their
calls. Not only did operators know who was calling whom—the telephone metadata of
the nineteenth century—they also routinely listened in so they could know when to free
the line for another call—something that had to be done manually because the circuit
didn’t automatically disconnect when the parties hung up. Sometimes operators made
their presence known when they did this, asking “Are you done?” and sometimes they
just lurked in the background, jumping from call to call, unplugging circuits when there
was silence on the line, a practice which occasionally cut off callers who hadn’t finished
but were just collecting their thoughts. An anonymous contributor to The Critic (1895)
celebrates the invention of direct dialing—the first dial phone appeared in 1889—because
it would eliminate the annoyance of operators constantly trying to disconnect the call.
As we saw with Iowa’s party lines, it wasn’t just operators listening in. But
sometimes eavesdropping was unavoidable. Inadequate insulation meant that phone lines
commonly crossed, and a caller might accidentally overhear the contents of another
conversation. The same contributor to The Critic hoped that direct dial would also end
such uncomfortable voyeurism:
another thing will be avoided—the overhearing of other people’s
conversation. Such silly conversation it usually is, too. I have even heard
people trying to kiss over the wire. You can imagine how trying that is
when one is intent upon getting an answer to an important question.
[The Critic, 1895]
Operators did more than connect and disconnect calls. They were also charged
with monitoring the content of phone conversations. Many phone contracts stipulated that
only subscribers, not their friends, clients, or customers, could place calls. Business
subscribers were supposed to make business-related calls. Domestic subscribers were
expected to make domestically-appropriate calls. And all callers were expected to use
polite language, a constraint in keeping with the assumption that even the home phone
was an instrument of public communication (an assumption later affirmed by the
Supreme Court in Olmstead [1928]). Such stipulations about how phone service should
be used have their contemporary equivalent in the digital rights management restrictions
for today’s music, ebooks, and videos. According to Marvin (1988), courts considered
customer complaints that their phone service had been canceled because of swearing; that
a caller had violated the terms of his contract by reporting a fire in the neighborhood (his
phone contract specified he could only make personal calls, and reporting a fire that
wasn’t in his own house didn’t count as personal); that a hotel manager had allowed a
guest to use the hotel phone to make theater reservations (violating the stiupulation that
only employees could make calls). The introduction of the pay phone relieved some of
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 20
the pressure on phone subscribers, whose restrictions were also eventually relaxed, but
pay phones, which began to appear in the 1880s in response to growing demands from
users that they be able to make calls while they were were out and about, introduced yet a
new privacy issue: a homeowner might be able to ignore a door-to-door peddler, but the
pay phone allowed anyone with a nickel in their pocket and a con up their sleeve to barge
into that home via the telephone, without warning.
Then there was intentional eavesdropping. Telegraph anti-wiretap laws did not
automatically cover the new telephone, and third parties could tap a line to listen in.
(Interestingly, the term wiretapping first appears in 1878, just two years after the phone’s
invention, in connection with a phone tap; it appears a year later in reference to tapping a
telegraph line.) Marvin (1988, 69) reports that in 1889 a jealous husband bugged his
home phone, transcribed the conversations between his wife and another man, and
successfully sued for divorce. That led to Connecticut’s first law against phone taps.
The police tapped phones as well, without a warrant and with impunity. The
legality of such wiretaps was both questioned and defended into the 1930s. In 1916, for
example, the Senate Legislative Committee held hearings on New York City police
wiretaps of a law office. Defending the practice, New York’s police commissioner,
Arthur Woods, explained that only the guilty have anything to fear from government
surveillance:
No one in this town need have any fear that his conversation will be
listened to unless he is a crook. We will not listen in on any wire except
we are convinced that a crime has been committed or that there is a good
chance to prevent crime.
Using a rationale that, with some stylistic updating, could be used by the National
Security Agency today, Woods emphasized his department’s commitment to
transparency:
The whole conduct of the Police Department is to conceal nothing except
where it is of interest to the public to have it concealed. We take pride in
letting everyone see what’s going on. [“Police Head’s Testimony” 1916.]
New York’s mayor and many business leaders defended police phone taps because not
only did they put criminals behind bars or send them to the electric chair, they also to
protect the “interests of the whole nation in its international relations.”
But at the time, the Federal Government disapproved of police wiretaps. The
Justice Department banned federal phone taps, but agents sometimes ignored that policy.
One such violation led to the landmark Supreme Court decision in Olmstead v. United
States legalizing the practice. But a dissent in the case, by Justice Louis D. Brandeis,
paved the way for reversing that decision in 1967, in Katz v. United States.
Olmstead v. United States Roy Olmstead was a Seattle policeman turned bootlegger. In 1927 he was arrested, along
with members of his operation, and convicted on the basis of warrantless wiretaps. The
Treasury Department was charged with enforcing Prohibition, and a group of Treasury
agents—G-men, as they were called—went against department policy and tapped the
office and home telephones of Olmstead and members of his gang. Olmstead and several
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 21
co-defendants appealed their convictions, arguing that their Fourth Amendment
protection against illegal search and seizure had been violated. They argued as well that
the wiretap evidence was inadmissible, since wiretaps were illegal in Washington.
According to that state’s anti-wiretapping law, adopted in 1909:
Every person . . . who shall intercept, read or in any manner interrupt or
delay the sending of a message over any telegraph or telephone line . . .
shall be guilty of a misdemeanor. [Olmstead, 468]
The Supreme Court rejected both arguments, upholding the Olmstead gang’s
convictions. The Court found that illegally-obtained evidence was still admissable, and
that there were no Fourth Amendment violations because the phone taps were placed not
in private offices or residences, but in the basement of Olmstead’s office building and on
telephone lines on the streets outside the defendants’ homes. In his majority opinion,
Chief Justice William Howard Taft characterized phone calls as public communications,
not protected private ones like the U.S. mail:
The United States takes no such care of telegraph or telephone messages
as of mailed sealed letters. The [Fourth] Amendment does not forbid what
was done here. There was no searching. There was no seizure. The
evidence was secured by the use of the sense of hearing and that only.
There was no entry of the houses or offices of the defendants.
[Olmstead, 464]
According to Taft, the telephone offers a way to go out into the world while remaining
physically at home—a function analogous to what the internet does today. Sending one’s
voice on wires that travel outside one’s home is thus no different from walking outdoors
or driving down the street, acts where there is clearly no expectation of privacy:
The language of the [Fourth] Amendment can not be extended and
expanded to include telephone wires reaching to the whole world from the
defendant's house or office. The intervening wires are not part of his house
or office any more than are the highways along which they are stretched.
[Olmstead, 465]
According to the Court, users of the telephone should be aware that making a call
is a pubic act, and as such, the Fourth Amendment does not apply:
The reasonable view is that one who installs in his house a telephone
instrument with connecting wires intends to project his voice to those
quite outside, and that the wires beyond his house and messages while
passing over them are not within the protection of the Fourth Amendment.
[Olmstead, 466]
In “The Right to Privacy,” Warren and Brandeis had objected to new technologies
of print and photography that eroded privacy. As we have seen, some of their
contemporaries would have added the telephone to that list of intrusive devices. But in
his dissent in Olmstead, Justice Brandeis sees the telephone tap, not the telephone itself,
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 22
as the danger. Disagreeing with Taft, Brandeis sees the telephone as a way to extend
private, personal communication, and what he objects to are technologies like the wiretap
which invade the privacy of the phone conversation.
To that end, Brandeis argues that telephone conversations should enjoy the same
protections as mail—the Postal Act of 1792 made it illegal for anyone but the addressee
to open a letter. And he warns that government deployment of surveillance technologies,
including those not yet invented, must be limited by the Fourth Amendment:
Ways may some day be developed by which the Government, without
removing papers from secret drawers, can reproduce them in court, and by
which it will be enabled to expose to a jury the most intimate occurrences
of the home. Advances in the psychic and related sciences may bring
means of exploring unexpressed beliefs, thoughts and emotions. The
progress of science in furnishing the Government with means of espionage
is not likely to stop with wire-tapping. [Olmstead 1928. 474; here
Brandeis anticipates not just today’s CCTV monitoring, spy satellites, and
NSA data mining, but also government-sponsored neuroscience research
into lie detection and mindreading, which remain, at least for now, in the
realm of science fiction.]
According to Brandeis, phone taps are worse than mail tampering, and they
constitute even more significant official intrusions than the eighteenth-century
governmental trespasses that the Fourth Amendment was drafted to address:
The evil incident to invasion of the privacy of the telephone is far greater
than that involved in tampering with the mails. Whenever a telephone line
is tapped, the privacy of the persons at both ends of the line is invaded and
all conversations between them upon any subject, and although proper,
confidential and privileged, may be overheard. Moreover, the tapping of
one man’s telephone line involves the tapping of the telephone of every
other person whom he may call or who may call him. As a means of
espionage, writs of assistance and general warrants are but puny
instruments of tyranny and oppression when compared with wire-tapping.
[Olmstead, 475-76]
Brandeis warns that well-intentioned government intrusions, like those justified, for
example, by the New York City police commissioner and his supporters in 1916, and by
the NSA today, because such surveillance puts criminals behind bars and protects
national security, are the kind to fear the most:
Experience should teach us to be most on our guard to protect liberty
when the Government’s purposes are beneficent. . . . The greatest dangers
to liberty lurk in insidious encroachment by men of zeal, well-meaning but
without understanding. [Olmstead, 479]
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 23
And as for using illegally-obtained evidence, Brandeis concludes by reminding the
government that it must obey its own laws:
Crime is contagious. If the Government becomes a lawbreaker, it breeds
contempt for law; it invites every man to become a law unto himself; it
invites anarchy. [Olmstead, 485]
But the majority of the Court did not agree, and for almost forty years, the
Olmstead ruling placed telephone conversation outside the protection of the Fourth
Amendment. That didn’t give free rein to wiretap, however. The Communications Act of
1934 took a step in that direction, providing that:
[N]o person not being authorized by the sender shall intercept any
communication and divulge or publish the existence, contents, substance,
purport, effect, or meaning of such intercepted communications to any
person.
[§ 605, Communications Act of 1934]
Because the Communications Act didn’t specifically ban government wiretaps, federal
agents continued to tap the phones of suspected criminals. But in 1937, the Supreme
Court put that practice on hold with its decision in Nardone v. United States, which ruled
that wiretap evidence was inadmissible in court:
[T]he plain words of § 605 forbid anyone, unless authorized by the sender,
to intercept a telephone message, and direct in equally clear language that
“no person” shall divulge or publish the message or its substance to “any
person.” To recite the contents of the message in testimony before a court
is to divulge the message.
Even so, it took another thirty years for the Supreme Court to conclude, in Katz v.
United States (1967), that Brandeis was right, and that telephone conversations deserved
protection against warrantless invasions of privacy.
Katz v. United States Charles Katz was convicted in federal court in California of violating interstate gambling
laws by “transmitting wagering information by telephone from Los Angeles to Miami
and Boston” (Katz v. United States 389 U.S. 347 [1967], 348). Without a warrant, the
FBI set a recording device on top of a phone booth which they knew Katz regularly used
to make his calls. Recordings of his calls, which captured only Katz’s side of the
conversations, provided the evidence for convicting him. Katz appealed, claiming that
calls from a public phone booth carry a reasonable expectation of privacy. The
government, citing Olmstead and other precedents, argued that no warrant was necessary
since such calls, made in public and outside the home, have no Fourth Amendment
protection. The government further argued that since the recorder was outside the phone
booth, there was no physical intrusion, hence no “search” within the meaning of the
Fourth Amendment. It insisted that phone booths, whose walls are glass, are not private
places, since their occupants are visible to those outside the booth. And the FBI didn’t tap
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 24
Katz’s calls, agents simply recorded his side of the conversations with a microphone,
overhearing them as any passerby might.
In a 7-1 decision, the Supreme Court rejected these arguments, ruled that Katz’s
privacy had been violated, and reversed his conviction. Olmstead had stated that trespass
required physical intrusion, but in Katz the Court set aside this requirement and ruled
that, by shutting the phone booth door, callers indicate their expectation that their calls
will be private.
In his opinion, Justice Potter Stewart determined that a general right to privacy, to
be let alone by others, was the province, not of the Fourth Amendment, but of the states
(Katz, 350-51). Nevertheless, he found that the Constitution does protect specific aspects
of privacy, including private acts performed in otherwise public places, and so, “what [a
person] seeks to preserve as private, even in an area accessible to the public, may be
constitutionally protected” (351). Even though a person may be visible through the phone
booth’s glass,
what he sought to exclude when he entered the booth was not the intruding
eye—it was the uninvited ear. He did not shed his right to do so simply
because he made his calls from a place where he might be seen.
[Katz, 352]
Justice John Harlan emphasized in his concurrence that intrusion comes in
technological as well as physical form: “reasonable expectations of privacy may be
defeated by electronic as well as physical invasion,” and he called the telephone booth “a
temporarily private place whose momentary occupants’ expectations of freedom from
intrusion are recognized as reasonable”—a cone of silence, as it were (Katz, 361).
In language that echoes Brandeis, Justice Stewart writes that the Fourth
Amendment applies not just at home, in an office, in a friend’s house, or in a taxi, it also
applies in a public phone booth:
[A] person in a telephone booth may rely upon the protection of the Fourth
Amendment. One who occupies it, shuts the door behind him, and pays
the toll that permits him to place a call is surely entitled to assume that the
words he utters into the mouthpiece will not be broadcast to the world. To
read the Constitution more narrowly is to ignore the vital role that the
public telephone has come to play in private communication. [Katz, 352]
Stewart concludes by ruling that physical intrusion is not necessary for search and
seizure:
The Government’s activities in electronically listening to and recording
the petitioner’s words violated the privacy upon which he justifiably relied
while using the telephone booth, and thus constituted a “search and
seizure” within the meaning of the Fourth Amendment. The fact that the
electronic device employed to achieve that end did not happen to penetrate
the wall of the booth can have no constitutional significance. [Katz, 353]
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 25
There are two interesting points that surface in Katz. In his concurrence, Justice
Byron White indicated that he would make a national security exception for warrantless
surveillance:
We should not require the warrant procedure and the magistrate’s
judgment if the President of the United States or his chief legal officer, the
Attorney General, has considered the requirements of national security and
authorized electronic surveillance as reasonable. [Katz, 364]
And Justice Hugo Black, dissenting, takes the originalist position that using a recorder to
eavesdrop on a phone call is not qualitatively different from traditional eavesdropping,
hiding under the eaves of a roof to listen in secret to a face-to-face conversation, a
practice not meant to be covered by the Fourth Amendment:
There can be no doubt that the Framers were aware of this practice [literal
eavesdropping], and, if they had desired to outlaw or restrict the use of
evidence obtained by eavesdropping, I believe that they would have used
the appropriate language to do so in the Fourth Amendment. They
certainly would not have left such a task to the ingenuity of languagestretching judges. [Katz 366]
banksywiretap.jpg
Above: A contemporary echo of Katz: A mural on the side of a house in Cheltenham,
Gloucesterhire, presumably painted by the street artist Banksy, depicts agents of GCHQ,
Britain’s top spy agency, wiretapping a public call box. The Guardian. April 14, 2014.
Below: From the TV show, Get Smart, Agent Maxwell Smart and the Chief demonstrate
a portable Cone of Silence, a fictional way of securing privacy in public.
Baron, Language and law. Ch. 4: The Rise of Communication Privacy, 26
coneofsilence.jpg
In Katz, decided almost a century after the invention of the telephone, phone calls finally
got a full range of privacy protections. But communication technologies continue to
move on, from land line to cell phone, from letters to email, from talking to texting. In
the next chapter, we will see how each of these developments changes our
communication behavior, realigns the border between the public and the private, and
presents new challenges for privacy protection.