The Sacred Fourth Amendment Text
Christopher Slobogin*
Review of Jeffrey Bellin, Fourth Amendment Textualism, 118 Mich. L. Rev. 233 (2019).
The Supreme Court’s jurisprudence governing the Fourth Amendment’s “threshold”—a word meant to refer to the types of police actions that trigger the amendment’s warrant and reasonableness requirements—has confounded scholars and students alike since Katz v. United States.[1] Before that 1967 decision, the Court’s decisions on the topic were fairly straightforward, based primarily on whether the police trespassed on the target’s property or property over which the target had control.[2] After that decision—which has come to stand for the proposition that a Fourth Amendment search occurs if police infringe an expectation of privacy that society is prepared to recognize as reasonable[3]—scholars have attempted to define the Amendment’s threshold by reference to history, philosophy, linguistics, empirical surveys, and positive law.[4] With the advent of technology that more easily records, aggregates, and accesses public activities and everyday transactions, the cacophony on the threshold issue has grown deafening—especially so after the Supreme Court’s decisions in United States v. Jones[5] and Carpenter v. United States.[6] In these decisions, the Court seemed to backtrack from its previously established notions that public travels and personal information held by third parties are not reasonably perceived as private and are therefore not protected by the Fourth Amendment.[7]
Enter Jeffrey Bellin who, in Fourth Amendment Textualism, attempts to simplify and rationalize the law governing when the Fourth Amendment is implicated by looking closely at the amendment’s language.[8] Professor Bellin is not the first author to parse the text of the Fourth Amendment, of course.[9] But his effort is both more detailed and more comprehensive than most, and it produces results that, while perhaps not satisfying to everyone, are reasonable interpretations of both text and history, avoid the morass created by the expectation-of-privacy test, and help answer the multiple conundrums that have arisen in connection with technologically driven law enforcement investigations.
Bellin’s breakdown of the Fourth Amendment’s text comes in three parts. First, he tackles the word “search.”[10] Like other scholars (and as suggested by Justice Scalia in Kyllo v. United States[11]), he opts for the commonsense definition of that word—that is, “an examination of an object or space to uncover information.”[12] That definition covers all of the situations the Court has denominated as searches. But it does not include casual glances (no “examination”); interviews of suspects by police or informants (no examination of “an object or space”); accidental intrusions (no attempt to obtain “information”); or intentional examinations of something—such as the outside of a house or the public travels of a car—that “is already apparent through standard visual and audio observation” (i.e., no attempt to “uncover” information).[13]
The second component of Bellin’s textual analysis is the Fourth Amendment’s reference to “persons, houses, papers, and effects.”[14] The word “person” is self-defining, but unless police “search” the person (e.g., by going through pockets or obtaining a DNA sample), the Fourth Amendment is not triggered. To Bellin, observing a person in public is not a search of that person but only a search of a public space.[15] Houses include curtilage but not barns outside the curtilage.[16] Papers must be conscious, written communications; while that includes electronic as well as paper documents, it excludes oral communications and the pings associated with emails and texts.[17] With respect to effects, Bellin concludes—here based as much on a review of colonial history as on text—that while all moveable private property is encompassed by the term, tangible public property, as well as one’s voice, wireless signals, and other intangibles, is not.[18] Thus, according to Bellin, Katz (which involved bugging a public phone booth) was wrongly decided and Title III (the federal electronic-surveillance statute) is not constitutionally required, although Bellin notes that the existence of that statute “render[s] this gap a theoretical rather than a practical concern.”[19]
The final textual element is the word “their” that appears in the Fourth Amendment before persons, houses, papers, and effects.[20] Consistent with the Supreme Court’s third-party doctrine (and in contrast to Carpenter[21]), Bellin concludes that searching for a person’s information in papers possessed by another—whether a company, friend, or doctor—usually does not implicate the Fourth Amendment.[22] However, as might have been the case in United States v. Miller[23] (which involved government accessing Miller’s checks and deposit slips from his bank) and is clearly the case with respect to personal documents maintained in the Cloud (whether linked through computers, iPhones, or Fitbit watches), sometimes papers in the possession of third parties remain the target’s papers.[24]
By now, despite this last caveat, the reader may be thinking, “This textualism approach will seriously reduce the scope of the Fourth Amendment, beyond even the grudging stance taken by the current Court!” That assumption is probably correct, although one should not overlook arguments in favor of a more expansive threshold even if one accepts Bellin’s general approach. For instance, if a person fills out a form (in writing or electronically) and transmits it to a third party so that the third party can use it for mutual gain, one could argue that the form and any derivative document are still the person’s “papers” on a bailment theory. If an informant not only talks to a suspect but examines the contents of his or her home, a search of the suspect’s house would seem to have occurred, contrary to the holding in Lewis v. United States[25] and various other “false friend” cases. If the outside of a house, the location of a car, or the location of a person is only “readily apparent” to police through the use of technology rather than via “standard visual . . . observation,” once again, a search could be said to occur at least when the police use that technology with the intention of uncovering information about those items (a result Bellin himself seems to endorse).[26]
I do not like many of the outcomes that Bellin’s textualism reaches. And, as Professor Caminker ably demonstrates in his insightful essay for Michigan Law Review Online,[27] both Professor Bellin’s definition of “search” and his focus on searches of rather than for the four items mentioned in the Fourth Amendment come with their own ambiguities. However, Bellin’s stance hews more closely to constitutional language and is more manageable than the Katz reasonable-expectation-of-privacy test. I have defended that test in part because “privacy is a capacious enough concept to accommodate virtually all of the values commentators have said [the Fourth Amendment] does not encompass.”[28] Nonetheless, it must be admitted that privacy is a capacious concept and thus subject to multiple interpretations; as Bellin notes, “[c]onsistency and predictability are important features of Fourth Amendment doctrine which seeks to guide not just court decisions but police investigative activity as well.”[29] In defining the Fourth Amendment’s threshold, it may make sense to cede authority to a more textual, commonsense interpretation of the word “search.”
At the same time, I don’t think that agreeing with all or most of what Bellin says about that threshold means that societal expectations of privacy have no relevance to Fourth Amendment jurisprudence or other laws regulating police intrusions. Figuring out the Fourth Amendment’s coverage is only half of the battle over regulation of searches and seizures; there is also the task of determining when a search or seizure is “reasonable.” That word does not have a textual or commonsense meaning and in fact is intentionally capacious. For this second stage of Fourth Amendment analysis—which involves figuring out whether a warrant, probable cause, or something less (or more) is required—privacy and its associated values can more easily become the focal point of analysis as a textual matter. Indeed, I have argued, on proportionality grounds, that assessments of intrusiveness are crucial in deciding the “reasonableness” of a search; for instance, short-term tracking and obtaining a single personal datapoint, although searches, might be permissible on something short of probable cause because they are not very privacy-invasive.[30] And even if the Constitution does not apply at all—as Bellin concludes is the case with certain instances of electronic surveillance and searches of third-party papers, for example[31]—legislators and agencies surely will be driven by privacy concerns in devising subconstitutional rules, as Title III illustrates. So even if Bellin’s textualism reigns on the threshold issue, Katz’s expectations of privacy rubric remains very relevant to regulation of police investigation.
* Milton Underwood Professor of Law, Vanderbilt University.
[2]. See, e.g., Olmstead v. United States, 277 U.S. 438, 466 (1928).
[3]. See, e.g., California v. Ciraolo, 476 U.S. 207, 211 (1986) (citing Katz, 389 U.S. at 360 (Harlan, J., concurring)).
[4]. See, e.g., Clark D. Cunningham, A Linguistic Analysis of the Meanings of “Search” in the Fourth Amendment: A Search for Common Sense, 73 Iowa L. Rev. 541 (1988); David Gray, The Fourth Amendment Categorical Imperative, 116 Mich. L. Rev. Online 14, 15 (2017), https://michiganlawreview.org/wp-content/uploads/2017/10/116MichLRevOnline14_Gray.pdf [https://perma.cc/3GN8-NXAR]; Christopher Slobogin, Proportionality, Privacy, and Public Opinion: A Reply to Kerr and Swire, 94 Minn. L. Rev. 1588, 1601–07 (2010); William Baude & James Y. Stern, The Positive Law Model of the Fourth Amendment, 129 Harv. L. Rev. 1821 (2016).
[7]. See, e.g., United States v. Knotts, 460 U.S. 276, 282 (1983) (holding that use of a beeper to track a car is not a search); United States v. Miller, 425 U.S. 435, 443 (1976) (holding that requisitioning Miller’s bank records is not a search).
[8]. Jeffrey Bellin, Fourth Amendment Textualism, 118 Mich. L. Rev 233 (2019).
[9]. See, e.g., Cunningham, supra note 4; Gray, supra note 4.
[10]. Bellin, supra note 8, at 254–60.
[11]. 533 U.S. 27, 32 n.1 (2001).
[12]. Bellin, supra note 8, at 257 (emphasis omitted).
[14]. Id. at 260–66 (quoting U.S. Const. amend. IV).
[21]. Carpenter v. United States, 138 S. Ct. 2206, 2216–21 (2018).
[22]. Bellin, supra note 8, at 269–74.
[24]. Bellin, supra note 8, at 271–72.
[26]. See Bellin, supra note 8, at 258.
[27]. Evan H. Caminker, How Definitive is Fourth Amendment Textualism?, 119 Mich. L. Rev. Online 22 (2020).
[28]. Christopher Slobogin, A Defense of Privacy as the Central Value Protected by the Fourth Amendment’s Prohibition on Unreasonable Searches, 48 Tex. Tech. L. Rev. 143, 152 (2015).
[29]. Bellin, supra note 8, at 281.
[30]. Christopher Slobogin, Making the Most of United States v. Jones in a Surveillance Society: A Statutory Implementation of Mosaic Theory, 8 Duke J. Const. L. & Pub. Pol’y (Special Issue) 1 (2012). The general proportionality theory is laid out in Christopher Slobogin, Privacy at Risk: The New Government Surveillance and the Fourth Amendment 21–47 (2007).
[31]. Bellin, supra note 8, at 273, 276.