Writing Homework on Privacy

THE DANGERS OF SURVEILLANCE Neil M. Richards* From the Fourth Amendment to George Orwell's Nineteen Eighty- Four, and from the Electronic Communications Privacy Act to films like Minority Report and The Lives of Others, our law and culture are full of warnings about state scrutiny of our hves. These warnings are commonplace, but they are rarely very specific. Other than the vague threat of an Orwellian dystopia, as a society we don't really know why surveillance is bad and why we should be wary of it. To the extent that the answer has something to do with "privacy," we lack an under- standing of what "privacy" means in this context and why it matters.

We've been able to live with this state of affairs largely because the threat of constant surveillance has been relegated to the realms of science fiction and failed totalitarian states.

But these warnings are no longer science fiction. The digital tech- nologies that have revolutionized our daily lives have also created mi- nutely detailed records of those Uves, In an age of terror, our govern- ment has shown a keen wilhngness to acquire this data and use it for unknown purposes. We know that governments have been buying and borrowing private-sector databases,' and we recently learned that the National Security Agency (NSA) has been building a massive data and supercomputing center in Utah, apparently with the goal of intercept- ing and storing much of the world's Internet communications for de- cryption and analysis,^ Although we have laws that protect us against government surveil- lance, secret government programs cannot be challenged until they are discovered. And even when they are, our law of surveillance provides only minimal protections. Courts frequently dismiss challenges to such programs for lack of standing, under the theory that mere surveillance creates no harms. The Supreme Court recently reversed the only ma- jor case to hold to the contrary, in Clapper v. Amnesty International Professor of Law, Washington University School of Law. For helpful comments on prior drafts, I thank Jim Bohman, John Inazu, Jonathan King, Wendy Niece Richards, and participants in the Washington University Political Theory Workshop. Special thanks are also due to my co- participants at the Harvard Law Review Symposium on Privacy and Technology — Professors Julie Cohen, Paul Schwartz, Dan Solove, and Lior Strahilevitz — and my generous commenta- tors, Danielle Citron, David Gray, and Orin Kerr. Thanks also to my research assistants, Matthew Cin and Ananth Iyengar, and my faculty assistant, Rachel Manee.

1 See, e.g., ROBERT O'HARROW, JR., NO PLACE TO HIDE 1-4 (2005).

2 James Bamford, The Black Box, WIRED, Apr. 2012, at 78, 80.

1934 2013] THE DANGERS OF SURVEILLANCE 1935 USA,^ finding that the respondents' claim that their communications were likely being monitored was "too speculative."'* But the important point is that our society lacks an understanding of why (and when) government surveillance is harmful. Existing at- tempts to identify the dangers of surveillance are often unconvincing, and they generally fail to speak in terms that are likely to influence the law. In this Article, I try to explain the harms of government surveil- lance. Drawing on law, history, literature, and the work of scholars in the emerging interdisciplinary field of "surveillance studies," I offer an account of what those harms are and why they matter. I will move beyond the vagueness of current theories of surveillance to articulate a more coherent understanding and a more workable approach.

At the level of theory, I will explain why and when surveillance is particularly dangerous and when it is not. First, surveillance is harm- ful because it can chill the exercise of our civil liberties. With respect to civil liberties, consider surveillance of people when they are think- ing, reading, and communicating with others in order to make up their minds about political and social issues. Such intellectual surveillance is especially dangerous because it can cause people not to experiment with new, controversial, or deviant ideas. To protect our intellectual freedom to think without state oversight or interference, we need what I have elsewhere called "intellectual privacy."^ A second special harm that surveillance poses is its effect on the power dynamic between the watcher and the watched. This disparity creates the risk of a variety of harms, such as discrimination, coercion, and the threat of selec- tive enforcement, where critics of the government can be prose- cuted or blackmailed for wrongdoing unrelated to the purpose of the surveillance.

At a practical level, I propose a set of four principles that should guide the future development of surveillance law, allowing for a more appropriate balance between the costs and benefits of government surveillance. First, we must recognize that surveillance transcends the public/private divide. Public and private surveillance are simply related parts of the same problem, rather than wholly discrete. Even if we are ultimately more concerned with government surveillance, any solution must grapple with the complex relationships between gov- ernment and corporate watchers. Second, we must recognize that secret surveillance is illegitimate and prohibit the creation of any domestic-surveillance programs whose existence is secret. Third, we should recognize that total surveillance is illegitimate and reject the 3 133 S. Ct. 1138(2013).

4 Id. at 1147.

5 See generally Neil M. Richards, Intellectual Privacy, 87 TEX. L. REV. 387 (2008) [hereinaf- ter Richards, Intellectual Privacy]. 1936 HARVARD LAW REVIEW [Vol.

126:1934 idea that it is acceptable for the government to record all Internet ac- tivity without authorization. Government surveillance of the Internet is a power with the potential for massive abuse. Like its precursor of telephone wiretapping, it must be subjected to meaningful judicial process be-fore it is authorized. We should carefully scrutinize any surveillance that threatens our intellectual privacy. Fourth, we must recognize that surveillance is harmful. Surveillance menaces intellec- tual privacy and increases the risk of blackmail, coercion, and discrim- ination; accord-ingly, we must recognize surveillance as a harm in con- stitutional standing doctrine. Explaining the harms of surveillance in a doctrinally sensitive way is essential if we want to avoid sacrificing our vital civil liberties.

I develop this argument in four steps. In Part I, I show the scope of the problem of modern "surveillance societies," in which individuals are increasingly monitored by an overlapping and entangled assem- blage of government and corporate watchers. I then develop an ac- count of why this kind of watching is problematic. Part II shows how surveillance menaces our intellectual privacy and threatens the devel- opment of individual beliefs in ways that are inconsistent with the ba- sic commitments of democratic societies. Part III explores how sur- veillance distorts the power relationships between the watcher and the watched, enhancing the watcher's ability to blackmail, coerce, and dis- criminate against the people under its scrutiny. Part IV explores the four principles that I argue should guide the development of surveil- lance law, to protect us from the substantial harms of surveillance.

L THE AGE OF SURVEILLANCE We are living in an age of surveillance. The same digital technolo- gies that have revolutionized bur daily lives over the past three de- cades have also created ever more detailed records about those lives.

In addition, new technologies, from surveillance cameras and web bugs to thermal scanners and GPS transponders, have increased the ability to track, observe, and monitor. The scope and variety of the types of surveillance that are possible today are unprecedented in hu- man history. This fact alone should give us pause.

But not only have the technologies of surveillance multiplied; so too have the entities that wish to surveil. Autocratic regimes have long been the Villains in the stories we tell about surveillance, but they are no longer the only governments that have stepped up their surveillance activities. Democratically elected governments in the West have deep- ened their commitment to surveillance of the public as well. Since 2001 this monitoring has often been done in the name of counter- terrorism, but it has also been justified as protecting cybersecurity, in- tellectual property, children from predators, and a seemingly ever- growing list of other concerns. Some of the most well-known and 2013] THE DANGERS OF SURVEILLANCE 1937 valuable publicly traded corporations have also got in on the act, often with the consent (in varying degrees) of their customers. Surveillance, it seems, is not just good politics, but also good business.

What, then, is surveillance? Scholars working throughout the Enghsh-speaking academy have produced a thick descriptive literature examining the nature, causes, and implications of the age of surveil- lance.^ Working under the umbrella term of "surveillance studies," these scholars represent both the social sciences and humanities, with sociologists making many of the most significant contributions.' Reviewing the vast surveillance studies literature. Professor David Lyon concludes that surveillance is primarily about power, but it is al- so about personhood.^ Lyon offers a definition of surveillance as "the focused, systematic and routine attention to personal details for pur- poses of influence, management, protection or direction."' Four as- pects of this definition are noteworthy, as they expand our understand- ing of what surveillance is and what its purposes are.

First, it is focused on learning information about individuals. Second, surveil- lance is systematic] it is intentional rather than random or arbitrary.

Third, surveillance is routine — a part of the ordinary administrative apparatus that characterizes modern societies.'° Fourth, surveillance can have a wide variety of purposes — rarely totalitarian domination, but more typically subtler forms of influence or control.^' A.

The Scope of Surveillance Even a cursory overview of the kinds of surveillance that are being performed today reveals the scope of the surveillance problem.

At the level of state surveillance, it should be no surprise that autocratic re- gimes have been among the worst offenders.

For example, China has used Internet activity to detect and censor dissidents,^^ and states re- sisting the Arab Spring uprisings have also keenly sought social media data in order to stem the tide of the revolts." Some activists also sus- pect that the Vietnamese government may have used computer viruses * For three recent introductions to this vast literature, see, for example, DAVID LYON, SUR- VEILLANCE STUDIES (2007); SURVEILLANCE AND DEMOCRACY (Kevin D. Haggerty & Minas Samatas eds., 2010); and THE SURVEILLANCE STUDIES READER (Sean P.

Hier & Joshua Greenberg eds., 2007).

' See LYON, supra note 6, at 18-22.

8 See id.

at 23.

9 Id. at 14.

•0 Id.

•• See id.

at 15-16.

•2 REBECCA MACKINNON, CONSENT OF THE NETWORKED 36-40 (2012).

•3 ld.\ Anupam Chander, Essay, Jasmine Revolutions, 97 CORNELL L.

REV.

1505, 1516-17, 1525-28(2012). 1938 HARVARD LAW REVIEW [Vol.

126:1934 to monitor the Internet activity and private data of dissidents protest- ing government mining poUcies."* Surveillance is not just for communists and dictators. Democratic states have also invested heavily in surveillance technologies in the af- termath of the September 11 attacks in America, the London subway bombings of 2005, and other atrocities. Britain is one of the most heavily surveilled countries in the world, with a network of public and private surveillance cameras, traffic enforcement cameras, and broad government powers to examine Internet traffic.'^ In the United States, the NSA has engaged in a program of warrantless wiretapping of tele- phone conversations. Although many of the details of the wiretapping and other surveillance programs remain shrouded in secrecy, it is clear that the investment in surveillance infrastructure remains significant.

And as noted above, a 2012 investigative report by Wired magazine revealed that the NSA is building a massive supercomputing facility in the Utah desert, possibly with the goal of capturing and archiving much of the world's Internet traffic, with a view to decrypting and searching it as decryption technologies inevitably advance."^ Surveillance is not just for governments either. Private companies big and small generate vast fortunes from the collection, use, and sale of personal data.

At the broadest level, we are building an Internet that is on its face free to use, but is in reality funded by billions of transactions where advertisements are individually targeted at Internet users based upon detailed profiles of their reading and consumer hab- its.

^^ Such "behavioral advertising" is a multibillion-dollar business, and is the foundation on which the successes of companies hke Google and Facebook have been built.'^ One recent study concludes that this form of surveillance is so ingrained into the fabric of the Internet "that a small number of companies have a window into most of our move- ments online."'' Other technologies engage in similar forms of private surveillance. "Social reading" applications embedded into Facebook and other platforms enable the disclosure of one's reading habits.

I"* EVGENY MOROZOV, THE NET DELUSION 143-45 (2011).

15 Brendan M. Palfreyman, Note, Lessons from the British and American Approaches to Com- pelled Decryption, 75 BROOK. L. REV. 345, 362 (2009). See generally KiRSTIE BALL ET AL., A REPORT ON THE SURVEILLANCE SOCIETY: FOR THE INFORMATION COMMISSIONER BY THE SURVEILLANCE STUDIES NETWORK (David Murakami Wood ed., 2006), avail- able at http://news.bbc.co.uk/2/shared/bsp/hi/pdfs/o2_i i_o6_surveillance.pdf; How We Are Being Watched, BBC NEWS (Nov. 3, 2006, 2:21 AM), http://news.bbc.co.uky2/hi/uk_news/6iio866.stm.

16 See generally Bamford, supra note 2.

17 See SIVA VAIDHYANATHAN, THE GOOGLIZATION OF EVERYTHING 26-30 (2011).

18 See DAVID KIRKPATRICK, THE FACEBOOK EFFECT 260-66 (2010); STEVEN LEVY, IN THE PLEX 262-63, 336-37 (2011).

19 Chris Jay Hoofnagle et al.. Behavioral Advertising: The Offer You Cannot Refuse, 6 HARV.

L. & POL'Y REV.

273, 279 (2012). 2OI3] THE DANGERS OF SURVEILLANCE 1939 while electronic readers like the Kindle and the Nook track reader be- havior down to the specific page of the specific book on which a user's attention is currently Ungering,^^ In recent years, industry, media, and scholars have increasingly fo- cused their attention on the concept of "Big Data," an unwieldy term often used to describe the creation and analysis of massive data sets,^' Big Data is notable not just because of the amount of personal infor- mation that can be processed, but because of the ways data in one area can be linked to other areas and analyzed to produce new inferences and findings. As social scientists danah boyd and Kate Crawford put it, "Big Data is fundamentally networked. Its value comes from the patterns that can be derived by making connections between pieces of data, about an individual, about individuals in relation to others, about groups of people, or simply about the structure of information itself,"" Big Data holds much potential for good in areas as diverse as medical research, the "smart" electrical grid, and traffic management,^^ But Big Data also raises many potential problems in areas such as privacy and consumer power. For example, the retail superstore Tar- get uses Big Data analytics to infer which of its customers are preg- nant based upon their purchases of other products and upon personal- ly identifying data from other sources.2"* As the New York Times Magazine reports, new parents are highly desirable customers not just because they buy many new products, but because their normally sta- ble purchasing habits are "up for grabs" in the chaotic exhaustion that accompanies the birth of a child.^^ Target uses Big Data to snare new parents because, as one of its data analysts concedes, "[w]e knew that if we could identify them in their second trimester, there's a good chance we could capture them for years , , , , As soon as we get them buying diapers from us, they're going to start buying everything else too,"2ö Big Data analytics enabled Target to discover that expectant parents display a change in buying habits (for example, buying un- scented lotion and magnesium supplements) that mark them as expec- tant, allowing this kind of (appropriately enough) "targeted" market- 20 Neil M.

Richards, The Perils of Social Reading, ioi GEO. L.J. 689, 698-99 (2013) [hereinaf- ter Richards, The Perils of Social Reading].

21 danah boyd & Kate Crawford, Six Provocations for Big Data 6 (Sept.

21, 2011) (unpub- lished manuscript) (on file with the Harvard Law School Library).

22 Id.

23 See generally Omer Tene & Jules Polonetsky, Big Data for All:

Privacy and User Control in the Age of Analytics, 11 Nw.

J.

TECH. & INTELL. PROP, (forthcoming 2013).

21 Charles Duhigg, Psst, You in Aisle 5, N.Y.

TIMES, Feb. 16, 2012 (magazine), § 6, at 30, available at http://www.nytimes.com/2012/02/19/magazine/sh0pping-habits.html.

25 Id.

26 Id.\ see also Tom Simonite, What Facebook Knows, MIT TECH. REV. (June 13, 2012), http://www.technologyreview.com/featured-story/428i5p/what-facebook-knows/?mod=related. 1940 HARVARD LAW REVIEW [Vol.

126:1934 ing.

Big Data surveillance and analysis thus affect the commercial power of consumers, identifying their times of relative weakness and allowing more effective marketing to nudge them in the directions that watchful companies desire.

The incentives for the collection and distribution of private data are on the rise. The past fifteen years have seen the rise of an Internet in which personal computers and smartphones have been the domi- nant personal technologies.

But the next fifteen will likely herald the "Internet of Things," in which networked controls, sensors, and data collectors will be increasingly built into our appliances, cars, elec- tric power grid, and homes, enabling new conveniences but subjecting more and more previously unobservable activity to electronic measurement, observation, and control.^' Many of us already carry GPS tracking devices in our pockets, not by government command, but in the form of powerful multifunction smartphones. Sociologists Zygmunt Bauman and David Lyon have identified the spread of sur- veillance beyond nonconsensual state watching to a sometimes-private surveillance in which the subjects increasingly consent and partici- pate — a phenomenon that they call "liquid surveillance."^* Professor Scott Peppet foresees the "unraveling" of privacy,^^ as economic incen- tives lead consumers to agree to surveillance devices like Progressive Insurance's "MyRate" program, which offers reduced insurance rates in exchange for the installation of a device that monitors driving speed, time, and habits.^° Peppet argues that this unraveling of priva- cy creates a novel challenge to privacy law, which has long focused on unconsented surveillance rather than on surveillance as part of an eco- nomic transaction.^!

It might seem curious to think of information gathering by private entities as "surveillance." Notions of surveillance have traditionally been concerned with the watchful gaze of government actors like po- lice and prison officials rather than companies and individuals.

But in a postmodern age of "liquid surveillance," the two phenomena are deeply intertwined. Government and nongovernment surveillance support each other in a complex manner that is often impossible to disentangle.

At the outset, the technologies of surveillance — soft- ware, RFID chips, GPS trackers, cameras, and other cheap sensors — 27 Clive Thompson, Sensors Everywhere, WIRED, Dec. 2012, at 72, available at http://www .wired.com/opinion/20i2/i2/20-i2-st_thompson/.

For a critique of the "Internet of Things," see ROB VAN KRANENBURG, THE INTERNET OF THINGS (2008), available at http://www .networkcultures.org/_uploads/notebook2_theinternetofthings.pdf.

28 ZYGMUNT BAUMAN & DAVID LYON, LIQUID SURVEILLANCE 2-3 (2013). ' 2' Scott R.

Peppet, Unraveling Privacy:

The Personal Prospectus and the Threat of a Full- Disclosure Future, 105 Nw.

U. L.

REV. 1153, 1156 (2011).

30 /d. at 1153-56.

31 Id. 2013] THE DANGERS OF SURVEILLANCE 1941 are being used almost interchangeably by government and nongov- ernment watchers.32 Private industry is also marketing new surveil- lance technologies to the state. Though it sounds perhaps like a plot from a paranoid science fiction novel, the Gwardia« reports that the Disney Corporation has been developing facial recognition technolo- gies for its theme parks and selling the technology to the U.S. mih- tary.33 Nor do the fruits of surveillance respect the public/private di- vide.

Since the September 11 attacks, governments have been eager to acquire the massive consumer and Internet-activity databases that private businesses have compiled for security and other purposes, ei- ther by subpoena^" or outright purchase.^^ Information can also flow in the other direction; the U.S.

government recently admitted that it was giving information to insurance companies that it had collected from automated license-plate readers at border crossings.^^ Similarly, while government regulation might be one way to limit or shape the growth of the data industry in socially beneficial ways, governments also have an interest in making privately collected data amenable to public-sector surveillance.

In the United States, for ex- ample, the Communications Assistance for Law Enforcement Act of 19943' requires telecommunications providers to build their networks in ways that make government surveillance and interception of elec- tronic communications possible.^^ A European analogue, the EC Data Retention Directive Regulations of 2009, requires Internet service pro- viders to retain details of all Internet access, email, and Internet tele- phony by users for twelve months, so that they can be made available to government investigators for cases of antiterrorism, intellectual property, child protection, or for other purposes.^« This surveillant symbiosis between companies and governments means that no analysis of surveillance can be strictly limited to just the government or the market in isolation. Surveillance must instead be understood in its ag- gregated and complex social context.

32 See LYON, supra note 6, at 111-12.

33 Naomi Wolf, The New Totalitarianism of Surveillance Technology, GUARDIAN (Aug.

15, 2012, 4:12 PM), http://www.guardian.co.uk/commentisfree/2012/aug/15/new-totalitarianism-surveillance -technology.

1 34 See Gonzales v.

Google, Inc., 234 F.R.D.

674, 688 (N.D. Cal.

2006).

35 See O'HARROW, supra note i, at 64, 98-103.

36 Cyrus Farivar, License Plates Scanned at Border, Data Shared with Car Insurance Group, ARS TECHNICA (Aug. 22, 2012, 4:36 PM), http://arstechnica.com/tech-policy/2012/08/license-plates -scanned-at-border-data-shared-with-car-insurance-group/.

37 47 U.S.C §§ 1001-1010(2006).

38 Id. § 1002.

39 The United Kingdom version of this regulation is The Data Retention (EC Directive) Regula- tions, 2009, S.I.

2009/859 (U.K.), available at http://www.legislation.gov.ukyukdsi/2OO9/978oii 1473894 /contents. 1942 HARVARD LAW REVIEW [Vol.

126:1934 B.

Surveillance Law's Limited Protections American law governing surveillance is piecemeal, spanning consti- tutional protections such as the Fourth Amendment, statutes like the Electronic Communications Privacy Act of 1986"° (ECPA), and private law rules such as the intrusion-into-seclusion tort."i But the general principle under which American law operates is that surveillance is le- gal unless forbidden. Perhaps out of a fear that surveillance might be used to suppress dissent, American law contains some limited protec- tions against government surveillance of purely political activity. For example, government investigators in antiterrorism cases possess a powerful tool known as the National Security Letter (NSL). NSLs are statutory authorizations by which the FBI can obtain information about people from their telephone companies, Internet service provid- ers, banks, credit agencies, and other institutions with which those people have a relationship. NSLs are covert and come with a gag or- der that prohibits the recipient of the letter from disclosing its exis- tence, even to the person whose secrets have been told to the govern- ment. NSLs can currently be obtained under four federal statutes: the Right to Financial Privacy Act of 1978"^ (RFPA), the ECPA,"^ the Fair Credit Reporting Act"" (FCRA), and the National Security Act of 1947."^ Taken together, these provisions allow the FBI to access a wide variety of information about people, including historical and transactional information relating to telephone calls and emails, finan- cial information, and consumer credit information."^ This information can be obtained by crossing a Very low threshold — the FBI must merely certify in writing that the request is "relevant to an authorized investigation to protect against international terrorism or clandestine "•o Pub. L. No. 99-508, 100 Stat.

1848 (codified as amended in scattered sections of 18 U.S.C).

'' • See generally Neil M.

Richards & Daniel J.

Solove, Prosser's Privacy Law: A Mixed Legacy, 98 CALIF.

L.

REV.

1887 (2010).

"•2 12 U.S.C.

§§ 3401-3422 (2006 & Supp. V 2011) (allowing access to personal financial records held by a wide variety of entities, including casinos, insurance companies, automobile dealerships, credit unions, real estate companies, and travel agencies).

"•3 18 U.S.C.

§ 2709 (allowing access to telephone and email information including billing and call history, email, subscriber information, and screen names).

'*'' 15 U.S.C.

§§ 1681-1681X (2006 & Supp. V 2011); iee also id. § 1681U (allowing access to credit history information and the header information on credit reports, including name, address, and employment history); id. § i68iv (allowing access to a consumer's full credit report and "all other information in a consumer's file").

"'S 50 U.S.C.

§§ 4Oi-442b (2006 & Supp. V 2011); iee also id. § 436 (allowing the issuance of NSLs in connection with investigations of improper disclosure of classified information by gov- ernment employees).

46 See OFFICE OF THE INSPECTOR GEN., U.S.

DEP'T OF JUSTICE, A REVIEW OF THE FEDERAL BUREAU OF INVESTIGATION'S USE OF NATIONAL SECURITY LETTERS 10 (2007). 2OI3] THE DANGERS OF SURVEILLANCE 1943 intelligence activities."'*' Communications and bank records sought under the ECPA and the RFPA are protected by the additional re- quirement that the FBI certify that "such an investigation of a United States person is not conducted solely upon the basis of activities pro- tected by the first amendment to the Constitution of the United States."-*« Despite these protections, courts lack the tools to enforce them.

This problem predates the current NSL framework.

For example, in 1967, the President ordered the U.S. Army to engage in surveillance of domestic dissident groups, fearing civil disorder in the aftermath of the assassination of IMartin Luther King, Jr."' The program expanded over time to become a large-scale military surveillance program of the domestic political activities of American citizens.^° In Laird v.

Tatum,^^ the Supreme Court held that it lacked jurisdiction over the claims that the surveillance violated the First Amendment rights of the subjects of the program, because the subjects claimed only that they felt deterred from exercising their First Amendment rights or that the government could misuse the information it collected in the future.^^ The Court could thus declare that "[a]llegations of a subjective 'chill' are not an adequate substitute for a claim of specific present objective harm or a threat of specific future harm."^^ ]V[ore recent surveillance cases have followed the lead of the Laird Court. Challenges to the NSA's wiretapping program have foundered because plaintiffs have failed to convince federal courts that secret surveillance has caused them any legally cognizable injury.

In ACLU V.

NSA,^'^ the Sixth Circuit dismissed any suggestion that First Amendment values were threatened when the government listened to private conversations.

As that court put it: "The First Amendment protects public speech and the free exchange of ideas, while the Fourth Amendment protects citizens from unwanted intrusion into their per- sonal lives and effects."^^ The court concluded that the plaintiffs had ••7 This precise language is quoted from the ECPA, 18 U.S.C.

§ 27O9(b)(i)-(2), but the other NSL provisions are substantially similar.

See 12 U.S.C § 34i4(a)(5)(A) (RFPA); 15 U.S.C §§ i68iu(b), i68iv(a) (FCRA); 50 U.S.C.

§ 436(a)(3) (National Security Act).

18 18 U.S.C § 2 7O9(b)(i)-(2) (ECPA); 12 U.S.C.

§ 34i4(a)(5)(A) (RFPA).

The original FCRA NSL provision allowing access to the headers of credit reports only, 15 U.S.C.

§ i68iu(b), contains such a First Amendment limitation, but since the Patriot Act added § i68iv, which allows for the full credit report to be obtained without meeting the First Amendment requirement, it is unclear what practical effect the limitation in § i68iu(b) will have.

t' See Laird v.

Tatum, 408 U.S.

i, 4-5 (1972).

50 See id. at 6-7.

51 408 U.S.

I.

52 Id. at 13.

53 Id. at 13-14.

5'' 493 F.3d 644 (6th Cir.

2007).

55 Id. at 657 n.15 (citations omitted). 1944 , HARVARD LAW REVIEW [Vol.

126:1934 no standing to assert First or Fourth Amendment violations, as they could not prove that the secret government surveillance program had targeted them,^^ Similarly, in Al-Haramain Islamic Foundation, Inc.

V. Bush,^'' the government successfully invoked the state-secrets doc- trine to stop the plaintiffs from finding out whether they were the sub- jects of secret surveillance under the program,^^ This ruling created a brutal paradox for the plaintiffs: they could not prove whether their telephone calls had been listened to, and thus they could not establish standing to sue for the violation of their civil liberties,^^ Despite the fact that the judges in the case knew whether surveillance had taken place, they believed that the state-secrets doctrine barred them from ruling on that fact,^° And the Court's most recent decision in Clapper affirmed this approach to standing to challenge surveillance. Plaintiffs can only challenge secret government surveillance they can prove, but the government isn't telling. Plaintiffs (and perhaps civil liberties) are out of luck.

So far so bad.

Or maybe not. Putting the oppression of totalitarian states to one side, public and private surveillance can have beneficial effects.

All other things being equal, greater security from crime and terrorism is a good thing,^!

So too are the conveniences of modern communications, email, and the power of a search engine in our pock- ets valuable advances that improve our quality of life.

And a sensible system of automated traffic regulation can save money and direct scarce police resources to serious criminals rather than ordinary motorists.

As a society, we are thus of two minds about surveillance.

On the one hand, it is creepy, Orwellian, and corrosive of civil liberties.

On the other hand, it keeps us and our children safe.

It makes our lives more convenient and gives us the benefit of a putatively free Internet.

Moreover, some influential thinkers argue that data surveillance does not affect privacy at all. As Judge Posner puts it:

The collection, mainly through electronic means, of vast amounts of per- sonal data is said to invade privacy.

But machine collection and processing of data cannot, as such, invade privacy. Because of their vol- ume, the data are first sifted by computers, which search for names, ad- dresses, phone numbers, etc, that may have intelligence value. This ini- 56 Id. at 673-74.

5' 507 F.3d ii9o(9th Cir.

2007).

58 Id. at 1204.

59 See id. at 1205.

60 See id. at 1204-05.

61 See RICHARD A.

POSNER, NOT A SUICIDE PACT 130 (2006) (arguing that adherence to civil liberties like the right to privacy must be flexible where it confiicts with government antiter- rorism efforts). 2013] THE DANGERS OF SURVEILLANCE 1945 tial sifting, far from invading privacy (a computer is not a sentient being), keeps most private data from being read by any intelligence officer^^ Surveillance is thus confusing. We like its benefits, though we are fearful (and sometimes dismissive) of its costs. This confusion points to a larger problem: civil liberties advocates lack a compelling account of when and why (if at all) surveillance is harmful.

As a society, we have an intuitive understanding that public- and private-sector sur- veillance is potentially bad, but we do not have an articulate explana- tion of why it is bad. Some of our intuitions stem from literature, such as George Orwell's chilling portrait of Big Brother in Nineteen Eighty- Four.^^ But few critics of government surveillance such as the NSA wiretapping program and the British data-retention regulations would suggest that these programs are directly analogous to the evil regime depicted in Orwell's dystopia. Moreover, the Orwell metaphor seems wholly inapplicable to databases used to personalize targeted advertis- ing on the web, the efforts of insurance companies to promote safe driving, and the practices of online booksellers to sell more books by monitoring consumers' shopping habits in ways that used to be impossible.^"^ We need an account of when and why surveillance is problematic to help us see when we should regulate and when we should not.

The following Parts seek to provide an account of some of the dangers of surveillance and the ways in which laws could mitigate them.

..I want to advance two lines of critique to the notion that surveillance does not create a legally cognizable injury: first, that surveillance by govern- ment and private actors threatens intellectual privacy and chills the exercise of vital civil liberties; and second, that surveillance affects the power balance between individuals and those who are watching, in- creasing the risk of persuasion, blackmail, and other harmful uses of sensitive information by others.

II.

SURVEILLANCE AND INTELLECTUAL PRIVACY The most salient harm of surveillance is that it threatens a value I have elsewhere called "intellectual privacy. "^^ Intellectual-privacy 62 Richard A.

Posner, Our Domestic Intelligence Crisis, WASH.

POST, Dec. 21, 2005, at A31, available at http://www.washingtonpost.com/wp-dyn/content/article/2005/12/20/AR2005122001053.html.

63 GEORGE ORWELL, NINETEEN EIGHTY-FOUR (Irving Howe ed., Harcourt Brace Jovanovich, Inc.

1982) (1949).

64 5ee DANIEL J.

SOLOVE, THE DIGITAL PERSON 29-36 (2004) (critiquing the usefulness of Orwell's metaphor as a tool in understanding the private database industry).

But see Neil M.

Richards, Essay, The Information Privacy Law Project, 94 GEO.

L.J. 1087, 1133 (2006) (suggesting that the Orwell metaphor retains some validity as a tool to understand electronic surveillance).

65 Richards, Intellectual Privacy, supra note 5, at 389; Richards, The Perils of Social Reading, supra note 20, at 691. 1946 HARVARD LAW REVIEW [Vol.

126:1934 theory suggests that new ideas often develop best away from the in- tense scrutiny of public exposure; that people should be able to make up their minds at times and places of their own choosing; and that a meaningful guarantee of privacy — protection from surveillance or in- terference — is necessary to promote this kind of intellectual freedom.

It rests on the idea that free minds are the foundation of a free society, and that surveillance of the activities of belief formation and idea gen- eration can affect those activities profoundly and for the worse.^^ I want to be clear at the outset that intellectual-privacy theory protects "intellectual" activities, broadly defined — the processes of thinking and making sense of the world with our minds. Intellectual privacy has its limits — it is a subset of all things that we might call "privacy," albeit a very important subset. But importantly, intellectual privacy is not just for intellectuals; it is an essential kind of privacy for us all.

At the core of the theory of intellectual privacy are two claims, one normative and one empirical. The normative claim is that the founda- tion of Anglo-American civil hberties is our commitment to free and unfettered thought and belief — that free citizens should be able to make up their own minds about ideas big and small, political and triv- ial.

This claim requires at a minimum protecting individuals' rights to think and read, as well as the social practice of private consultation with confidantes. It may also require some protection of broader so- cial rights, whether we call them rights of association or assembly.^' Protection of these individual rights and social practices allows indi- viduals to develop both intellectual diversity and eccentric individuali- ty. They reflect the conviction that big ideas like truth, value, and culture should be generated from the bottom up rather than from the top down.^* These commitments to the freedoms of thought, belief, and private speech lie at the foundation of traditional First Amendment theory, though they have been underappreciated elements of that tradition.

But as I have argued elsewhere, a careful examination reveals that a commitment to freedom of thought is present in virtually every major text in First Amendment theory.^' In particular, freedom of thought lies at the core of the modern American tradition of First Amendment libertarianism, which began with the opinions of Justices Holmes and 66 Richards, Intellectual Privacy, supra note 5, at 403-04.

6' See, e.g., Ashutosh Bhagwat, Associational Speech, 120 YALE L.J. 978, 998 (2011) ("An as- sociation is a coming together of individuals for a common cause or based on common values or goals.").

See generally JOHN D.

INAZU, LIBERTY'S REFUGE (2012) (arguing for the protection of political- and religious-group autonomy under the alternative rubric of the right of assembly).

68 See generally JULIE E.

COHEN, CONFIGURING THE NETWORKED SELF (2012).

69 See Richards, Intellectual Privacy, supra note 5, at 408-12 (exploring this point in greater detail).

For a similar argument, see generally Seana Valentine Shiffrin, A Thinker-Based Ap- proach to Freedom of Speech, 27 CONST. COMMENT.

283 (2011). 2013] THE DANGERS OF SURVEILLANCE 1947 Brandéis in the decade following the end of the First World War. Dis- senting from the majority position of the Supreme Court, the two friends developed theories that justified special protection for speech and ideas under the First Amendment. The two men advanced slightly different reasons why speech should be protected — Justice Holmes justified protection in terms of the search for truth, while Jus- tice Brandeis privileged democratic self-government — but each theory enshrined protection for free thought at its core. For example.

Justice Holmes's dissent in Abrams v. United States'"^ is a forceful statement of the idea that democratic institutions depend on minds' being able to freely and fearlessly engage in the search for political truth. As he put it poetically:

[W]hen men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas — that the best test of truth is the power of the thought to get itself accepted in the competition of the market, and that truth is the only ground upon which their wishes safely can be carried out.'^ Justice Brandeis also placed the freedom of thought at the foun- dation of his justification for special protection for free speech. In Whitney v.

California,''^ he wrote:

Those who won our independence believed that the final end of the State was to make men free to develop their faculties, and that in its gov- ernment the deliberative forces should prevail over the arbitrary. They valued liberty both as an end and as a means. They believed liberty to be the secret of happiness and courage to be the secret of liberty. They be- lieved that freedom to think as you will and to speak as you think are means indispensable to the discovery and spread of political truth . . . .'^ Thus, in each of the traditional American justifications for freedom of speech,'" a commitment to freedom of thought — to intellectual freedom — rests at the core of the tradition.

70 250 U.S. 616(1919).

'• Id. at 630 (Holmes, J., dissenting).

'2 274 U.S. 357 (1927).

'3 Id. at 375 (Brandeis, J., concurring) (emphasis added).

'* Although most courts justify free speech in terms of truth-seeking or democratic self- governance, some scholars have argued that free speech is better justified in terms of the autono- my or self-development of the individual. See, e.g., C. Edwin Baker, Scope of the First Amend- ment Freedom of Speech, 25 UCLA L. REV. 964, 990-92 (1978); Martin H. Redish, The Value of Free Speech, 130 U. PA. L. REV. 591, 593-94 (1982); David A. J. Richards, free Speech and Ob- scenity Law: Toward a Moral Theory of the First Amendment, 123 U.

PA.

L.

REV.

45, 62 (1974); Thomas Scanlon, A Theory of Freedom of Expression, 1 PHIL. & PUB. AFF. 204, 210-19 (1972).

Free thought is a logically necessary precondition for autonomous speech, though this point is un- derdeveloped in the relevant literature. For an analysis of the relationship between free thought and autonomous speech, see Richards, Intellectual Privacy, supra note 5, at 406 & n.113, and see generally Shiffrin, supra note 69. 1948 HARVARD LAW REVIEW [Vol.

126:1934 The second claim at the core of the theory of intellectual privacy is an empirical one — that surveillance inclines us to the mainstream and the boring.

It is a claim that when we are watched while engag- ing in intellectual activities, broadly defined — thinking, reading, web- surfing, or private communication — we are deterred from engaging in thoughts or deeds that others might find deviant. Surveillance thus menaces our society's foundational commitments to intellectual diver- sity and eccentric individuality.

Three different kinds of arguments highlight the ways in which surveillance can restrain intellectual activities.

The first set of argu- ments relies on cultural and literary works exploring the idea that sur- veillance deters eccentric or deviant behavior. IVIany such works owe a debt to Jeremy Bentham's idea of the Panopticon, a prison designed around a central surveillance tower from which a warden could see in- to all of the cells.

In the Panopticon, prisoners had to conform their activities to those desired by the prison staff because they had no idea when they were being watched.

As Bentham describes this system, "[t]o be incessantly under the eyes of an Inspector is to lose in fact the power of doing ill, and almost the very wish."" Of course, the most famous cultural exploration of the conforming effects of surveillance is Orwell's harrowing depiction in Nineteen Eighty-Four of the totalitar- ian state personified by Big Brother." Orwell's fictional state sought to prohibit not just verbal dissent from the state but even the think- ing of such ideas, an act punished as "thoughtcrime" and de- terred by constant state surveillance." Some scholars have docu- mented how the modern surveillance environment differs from both the classic Panopticon and a fully realized Big Brother in important ways.'^ Nevertheless, Orwell's insight about the effects of surveillance on thought and behavior remains valid — the fear of being watched causes people to act and think differently from the way they might otherwise.

Our cultural intuitions about the effects of surveillance are sup- ported by a second set of arguments that comes from the empirical work of scholars in the interdisciplinary field of surveillance studies.

Moving beyond the classic metaphors of the Panopticon and Big Brother, these scholars have tried to understand modern forms of sur- veillance by governments, companies, and individuals in all of their 75 Jeremy Bentham, Panopticon, in 3 OPINIONS OF DIFFERENT AUTHORS UPON THE PUNISHMENT OF DEATH 321,328 (Basil Montagu ed., 1816).

76 ORWELL, SM^ra note 63, at 4.

" Id. at 14.

'8 See, e.g., Kevin D.

Haggerty & Richard V.

Ericson, The Surveillant Assemblage, 51 BRIT.

J.

SOC.

605, 606-08 (2000); SOLOVE, supra note 64, at 33-35. 2013] THE DANGERS OF SURVEILLANCE 1949 complexities." The scope of this burgeoning literature has been wide- ranging and provides many examples of the normalizing effects of sur- veillance in a wide variety of contexts.

In his pioneering work in the 1980s, for example. Professor Anthony Giddens argues that surveil- lance continually seeks the supervision of social actors and carries with it a permanent risk that supervision could lead to domination.8° More recent scholars have explored the risks that surveillance poses to dem- ocratic self-governance.81 One such risk is that of self-censorship, in terms of speech, action, or even belief.

Studies of communist states give social-scientific accounts of many of the cultural intuitions about these self-censoring effects of surveillance,^^ but so too do studies of modern forms of surveillance in democratic societies.

For example, one study of the EU Data Retention Directive notes that "[u]nder per- vasive surveillance, individuals are inclined to make choices that con- form to mainstream expectations."*^ As I explore below, the scope of surveillance studies is much broader than merely the study of panoptic state surveillance; scholars working in this field have examined the full scope of modern forms of watching, including data surveillance by private actors.

But above all, surveillance scholars continually reaf- firm that, while surveillance by government and others can have many purposes, a recurrent purpose of surveillance is to control behavior,*"* A third and final set of arguments for intellectual privacy comes from First Amendment doctrine, A basic principle of free speech law as it has developed over the past century is that free speech is so im- portant that its protection should err on the side of caution. Given the uncertainty of Utigation, the Supreme Court has created a series of procedural devices to attempt to ensure that errors in the adjudication of free speech cases tend to allow unlawful speech rather than engage in mistaken censorship. These doctrines form what Professor Lee Bollinger calls the "First Pillar" of First Amendment law — the "[e]xtraordinary [p]rotection against [cjensorship.''^^ Such doctrines take various forms, such as those of prior restraint, overbreadth, and vagueness, but they are often characterized under the idea of the "chilling effect." This idea maintains that rules that might deter poten- tially valuable expression should be treated with a high level of suspi- 7' See generally LYON, supra note 6.

80 See generally ANTHONY GIDDENS, THE NATION-STATE AND VIOLENCE (1985).

81 See generally, e.g., SURVEILLANCE AND DEMOCRACY, supra note 6, 82 See, e,g,, Maria Los, A Trans-Systemic Surveillance: The Legacy of Communist Surveillance in the Digital Age, in SURVEILLANCE AND DEMOCRACY, supra note 6, at 173, 174-75.

83 Lilian Mitrou, The Impact of Communications Data Retention on Fundamental Rights and Democracy — The Case of the EU Data Retention Directive, in SURVEILLANCE AND DEMOC- RACY, supra note 6, at 127, 138.

8'' See, e.g., LYON, supra note 6, at 15; BALL ET AL., supra note 15, at 4.

»^ LEE C, BOLLINGER, UNINHIBITED, ROBUST, AND WIDE-OPEN 12 (2010), 195° HARVARD LAW REVIEW [Vol.

126:1934 cion by courts. As the Supreme Court put it in perhaps its most im- portant free speech decision of the twentieth century. New York Times Co.

V. Sullivan,^^ the importance of uninhibited public debate.means that, although "erroneous statement is inevitable in free debate, ... it must be protected if the freedoms of expression are to have the 'breathing space' that they 'need ... to survive.'"^' As Professor Frederick Schauer explains, "the chilling effect doctrine recognizes the fact that the legal system is imperfect and mandates the formulation of legal rules that reflect our preference for errors made in favor of free speech."8* Although the chilling-effect doctrine has been criticized on grounds that it overprotects free speech and makes empirically unsup- ported judgments,*^ such criticisms miss the point. The doctrines en- capsulated by the chilling effect reflect the substantive value judgment that First Amendment valúes are too important to require scrupulous proof to vindicate them, and that it is (constitutionally speaking) a bet- ter bargain to allow more speech, even if society must endure some of that speech's undesirable consequences.

Intellectual-privacy theory explains why we should extend chilling- effect protections to intellectual surveillance, especially traditional-style surveillance by the state. If we care about the development of eccen- tric individuality and freedom of thought as First Amendment values, then we should be especially wary of surveillance of activities through which those aspects of the self are constructed.^° Professor Timothy Macklem argues that "[t]he isolating shield of privacy enables people to develop and exchange ideas, or to foster and share activities, that the presence or even awareness of other people might stifle. For better and for worse, then, privacy is sponsor and guardian to the creative and the subversive."" A meaningful measure of intellectual privacy should be erected to shield these activities from the normalizing gaze of surveillance. This shield should be justified on the basis of our cul- tural intuitions and empirical insights about the normalizing effects of surveillance. But it must also be tempered by the chilling-effect doc- trine's normative commitment to err on the side of First Amendment values even if proof is imperfect.

86 376 U.S.

254(1964).

8' Id. at 271-72 (second omission in original) (quoting NAACP v.

Button, 371 U.S. 415, 433 (1963))- 88 Frederick Schauer, Fear, Risk and the First Amendment:

Unraveling the "Chilling Effect," 58 B.U. L. REV 685, 688 (1978).

85 See generally, e.g., Leslie Kendrick, Speech, Intent and the Chilling Effect, 54 WM.

& MARY L.

REV.

(forthcoming 2013).

'0 See COHEN, supra note 68, at 223-25; Julie Cohen, What Privacy Is For, 126 HARV.

L.

REV.

1904, 1912, 1918 (2013).

'1 TIMOTHY MACKLEM, INDEPENDENCE OF MIND 36 (2006). 2013] THE DANGERS OF SURVEILLANCE 1951 Intellectual-privacy theory therefore suggests a solution to the con- fusion that has plagued courts and others in dealing with whether sur- veillance programs create legally cognizable injuries. Despite often displaying an intuitive understanding that surveillance might be pot- entially harmful, courts have struggled to understand why.

This ab- sence of clarity has led to courts misunderstanding and diminishing privacy interests that conflict with other values.

.

When faced with ba- lancing a vague and poorly articulated privacy right against state in- terests such as the prevention of terrorist attacks, surveillance tends to win. Courts also make the mistake that the ACLU v.

NSA court made and cast surveillance as solely a Fourth Amendment issue of crime prevention, rather than as one that also threatens intellectual freedom and First Amendment values of the highest order. «^ other decisions mirror the mistake of the Al-Haramain court in concluding that pre- venting secret surveillance is less important than inconveniencing the executive branch.'^ Additionally, some courts can make the mistake that the Clapper Court made, refusing to recognize as justiciable harms the costly measures that people must adopt to shield their communica- tions from government surveillance.'" Shadowy regimes of surveillance corrode the constitutional com- mitment to intellectual freedom that lies at the heart of most theories of political freedom in a democracy. Secret programs of wide-ranging intellectual surveillance that are devoid of pubhc process and that cannot be justified in court are inconsistent with this commitment and illegitimate in a free society.

My argument is not that intellectual sur- veillance should never be possible, but that when the state seeks to learn what people are reading, thinking, and saying privately, such scrutiny is a serious threat to civil liberties. Accordingly, meaningful legal process (that is, at least a warrant supported by probable cause) must be followed before the government can perform the digital equivalent of reading our diaries.

But we must also remember that in modern societies, surveillance fails to respect the line between public and private actors. Intellectual privacy should be preserved against private actors as well as against the state. Federal prosecutions based on purely intellectual surveil- lance are thankfully rare, but the coercive effects of monitoring by our friends and acquaintances are much more common.

We are con- strained in our actions by peer pressure at least as much as by the state.

Moreover, records collected by private parties can be sold to or subpoenaed by the government, which (as noted above) has shown a 92 See ACLU v. NSA, 493 F.3d 644, 657 (6th Cir.

2007).

93 See Al-Haramain Islamic Found., Inc. v.

Bush, 507 F.3d 1190, 1201-05 (9th Cir.

2007).

94 See Clapper v.

Amnesty Int'l USA, 133 S. Ct. 1138, 1150-53 (2013). 1952 HARVARD LAW REVIEW [Vol.

126:1934 voracious interest in all kinds of personal information, particularly records related to the operation of the mind and political beliefs.^^ Put simply, the problem of intellectual privacy transcends the pub- lic/private divide, and justifies additional legal protections on intellec- tual privacy and the right to read freely.'^ Constitutional law and standing doctrine alone will not solve the threat of surveillance to in- tellectual freedom and privacy, but they are a good place to start.

III.

SURVEILLANCE AND POWER The mechanics of intellectual privacy discussed so far depend upon knowing, or at least fearing, that someone might be watching us.

If we have a sense of privacy, even one that turns out to be an illusion, we are less likely to change our behavior under the panoptic gaze.

Truly secret and unexpected surveillance, from this perspective, might appear not to violate our intellectual privacy at all.

If we have no in- kling that we are being watched, if we really do not care that we are being watched, or if we fear no consequences of being watched, it could be argued that our intellectual freedom is unaffected.

It can thus be argued that if the NSA Wiretapping Program had never leaked, it would have posed no threat to intellectual privacy.

There are two problems with this account. First, no program of widespread surveillance is likely to remain secret forever.

At some point, such a program will inevitably come to light, either by being leaked (as happened with the NSA program and the Army surveillance in Laird), or by actions taken pursuant to the program (such as prose- cutions or disclosures).

The injury suffered by those thus punished would serve as an example to the rest of us, and the mechanisms of in- tellectual privacy would come into effect at that point.

Second, surveillance (even secret surveillance) can create additional harms that are separate from the ones suggested by intellectual- privacy theory. Scholars working in surveillance studies have explored the phenomenon of surveillance in all of its contemporary complexity, going beyond the Panopticon to consider private surveillance, the rela- tionships between watchers and watched, and the wide variety of dan- gers that modern surveillance societies raise.

^' Recall in this regard that Lyon's definition of surveillance notes that surveillance has a purpose,'^ but in the modern era this purpose is rarely totalitarian domination. All the same, most forms of surveillance seek some form '5 See Richards, Intellectual Privacy, supra note 5, at 427-28 (providing examples).

9* See generally Richards, The Perils of Social Reading, supra note 20.

97 See, e.g., Kevin D.

Haggerty & Minas Samatas, Introduction, in SURVEILLANCE AND DEMOCRACY, supra note 6, at i, 3-4.

98 See LYON, supra note 6, at 14. 2013] THE DANGERS OF SURVEILLANCE 1953 of subtler influence or control over others. Even when' surveillance is not Orwellian, it is usually about influencing or being able to respond to someone else's behavior. And while surveillance can sometimes have benign goals (like traffic safety, or parents using baby monitors or GPS trackers to keep tabs on their children), it is invariably tied to a particular purpose. Critically, the gathering of information affects the power dynamic between the watcher and the watched, giving the watcher greater power to influence or direct the subject of surveil- lance.'' It might sound trite to say that "information is power," but the power of personal information lies at the heart of surveillance.

The power effects of surveillance illustrate three additional dangers of surveillance: blackmail, discrimination, and persuasion.

A.

Blackmail Information collected surreptitiously can be used to blackmail or discredit opponents by revealing embarrassing secrets. American po- litical history over the past hundred years furnishes numerous exam- ples of this phenomenon, but perhaps the most compelling is the treatment of Martin Luther King, Jr., by the FBI. Concerned that Dr.

King was a threat to public order, the FBI listened to his private tele- phone conversations in order to seek information with which to blackmail him. As the official government investigation into the Dr.

King wiretaps concluded in 1976:

The FBI collected information about Dr. King's plans and activities through an extensive surveillance program, employing nearly every intelli- gence-gathering technique at the Bureau's disposal. Wiretaps, which were initially approved by Attorney General Robert F. Kennedy, were main- tained on Dr. IQng's home telephone from October 1963 until mid-iços; the SCLC headquarter's [sic] telephones were covered by wiretaps for an even longer period. Phones in the homes and offices of some of Dr. King's close advisers were also wiretapped. The FBI has acknowledged 16 occa- sions on which microphones were hidden in Dr. King's hotel and motel rooms in an "attempt" to obtain information about the "private activities of King and his advisers" for use to "completely discredit" them.i°° Imagine a dissident like Dr. King living in today's information age.

A government (or political opponent) that wanted him silenced might be able to obtain not just access to his telephone conversations, but al- so to his reading habits and emails. This critic could be blackmailed outright, or he could be discredited by disclosure of the information as an example to others. Perhaps he has not been having an affair, but has some other secret. Maybe he is gay, or has a medical condition, or 99 See id.

100 S.

REP.

NO.

94-755, at 8i (1976) (quoting Memorandum from Frederick Baumgardner to William Sullivan (Jan. 28, 1964)). I9S4 HARVARD LAW REVIEW [Vol.

126:1934 visits embarrassing web sites, or has cheated on his expenses or his taxes.

All of us have secrets we would prefer not be made public.

Surveillance allows those secrets greater opportunities to come out, and it gives the watchers power that can be used nefariously.

The risk of the improper use of surveillance records persists over time.

Most of the former communist states in Eastern Europe have passed laws strictly regulating access to the surveillance files of the communist secret police.

The primary purpose of such laws is to pre- vent the blackmail of political candidates who may have been sur- veilled under the former regime,i°i The experience of these laws re- veals, moreover, that the risk of such blackmail is one that the law cannot completely prevent after the fact. Professor Maria Los explains that "[s]ecret surveillance files are routinely turned into a weapon in political struggles, seriously underrnining democratic processes and More recently, the world observed some of the potential of electron- ic blackmail during the revolutions in the Arab world. Many observ- ers have argued that the turmoil in Ilinisia, Libya, and Syria shows the liberating potential of digital technologies,'°^ But the crisis also il- lustrates the potential of modern surveillance technologies, which have been deployed by authoritarian governments across the Middle East, The Libyan government of Colonel Moammar Gadhafi, for example, attempted to capture Internet and phone communications with the as- sistance of Western technology companies for later review.

As one journalist remarked about the availalbility of such "'massive intercept' technology" to governments around the world, "[t]oday you can run an approximation of IÇ84 out of a couple of rooms filled with server racks, "1°"* Using these technologies, the Libyan government obtained information about dissidents that it was able to use to blackmail them into silence.

And while the Gadhafi regime did not hesitate to use vi- olence against its critics, it found blackmail and harassment to be even easier tools to use,i°5 The fact that the Gadhafi regime ultimately col- lapsed does not diminish surveillance's blackmail threat.

Even in democratic societies, the blackmail threat of surveillance is a real one.

Surveillance (especially secret surveillance) often detects crimes or embarrassing activity beyond or unrelated to its original purposes.

The surveillance of Dr, King, for instance, produced evi- dence of his marital infidelity.

In another infamous case, FISA- authorized surveillance of a terrorist suspect produced chilling evi- 101 Los, supra note 82, at 176.-77.

102 Id at 180.

103 See, e.g., Chander, supra note 13, at 1508.

lot Matthieu Aikins, Jamming Tripoli, WIRED, June 2012, at 146, 176.

105 Id. 2OI3] THE DANGERS OF SURVEILLANCE 1955 dence of the suspect's murder of his own daughter for dating the wrong boy.i°^ Whether these discoveries are important, incidental, or irrelevant, all of them give greater power to the watcher. Unscrupu- lous government officials could engage in blackmail, whether moti- vated by political or pecuniary considerations.

But even faithful gov- ernment agents who discover illegal activity would now possess the weapon of selective prosecution, which could be used to influence the subject, and would be able to wield the threat of mere disclosure of le- gal but embarrassing activity. Putting the seriousness of the crime to one side, it is important to realize that wide-ranging secret surveillance gives coercive power to the watcher.

B.

Persuasion Surveillance also gives the watcher increased power to persuade.

Persuasion is a more subtle exercise of the power differential that can be used to blackmail, but it can be even more effective. Consider again Target's use of Big Data to lure pregnant customers into its stores.

Even if the customers have told no one that they are expecting.

Big Data analj^ics can look for correlations between pregnancy and other changes in consumer behavior, for instance, purchasing more vi- tamins or scent-free lotions. Once an inference of pregnancy is estab- lished. Target's marketers can offer coupons to the pregnant woman in order to capture her business, knowing that she is at a point in her life when her buying habits are temporarily in flux before they will lock in for a period of some years.

It is entirely possible that such actions by a retailer like Target could occur without the knowledge of the pregnant consumer. Indeed, the science of targeted online or "behavioral" ad- vertising seeks to do exactly that:

to market products to consumers based upon detailed profiles collected about their behavior.

The effec- tive sales technique of behavioral "retargeting" allows marketers to go one step further and literally follow targeted consumers around the web, delivering the same targeted advertisement to them with enough frequency that they are likely eventually to succumb and make a pur- chase in a moment of weakness.'°' Governments also use the power of surveillance to control behavior.

For example, one of the justifications for massive closed-circuit televi- sion (CCTV) networks in modern urban areas is that they allow police greater ability to watch and influence what happens on city streets.

1°^ Certainly, the presence of cameras or police can persuade citizens to obey the law, but it can have other effects as well.

The surveillance- 1^6 United States v. Isa, 923 F.2d 1300, 1302 (8th Cir. 1991).

10' EI.TPARTSF.R, THE FTT.TER RURRLE44 (20TT).

108 See LYON, supra note 6, at 107-08. I9S6 HARVARD LAW REVIEW [Vol.

126:1934 studies literature has documented the use of government CCTV as- semblages to direct public behavior toward commerce and away from other activities ranging from crime to protest."°' In Britain, where the science of surveillance-based control is at its most advanced, CCTV operates in connection with court-ordered injunctions, known as Anti- Social Behavior Orders, to move groups of teens out of the commercial cores of cities using surveillance and the power of the state to ensure that commerce continues efficiently. ""° Government use of persuasive surveillance is still in its relative infancy, but since the technologies of surveillance and Big Data analjdics are available to the state as well as to private companies, we can imagine the government becoming in- creasingly able to engage in Target-style persuasion in the future.

The bottom line about surveillance and persuasion is that surveil- lance gives the watcher information about the watched. That infor- mation gives the watcher increased power over the watched that can be used to persuade, influence, or otherwise control them, even if they do not know they are being watched or persuaded. Sometimes this power is arguably a good thing, for example when police are engaged in riot control.

But we should not forget that surveillance represents a persuasive power shift whether the watcher is a government agent or a corporate marketer, and whether the target is a rioter or law-abiding citizen.

The legal system has rules dealing with power imbalances be- tween consumers and businesses, such as the doctrine of unconsciona- bility and much of consumer protection law.

There are also rules pro- tecting citizens from state coercion, such as the unconstitutional conditions doctrine and the First Amendment's protections of freedom of thought and conscience.

In our age of surveillance, where technolo- gical change has given the watcher enhanced powers of persuasion, it may well be time to think about updating those doctrines to restore the balance.

C.

Sorting/Discrimination Many kinds of surveillance are routinely used to sort people into categories. Some of these forms of sorting are insidious. Consider, for example, the use of census records by the American, Canadian, and German governments during the Second World War to identify citizens to relocate to the Japanese internment camps in North America and the concentration camps in Europe.""" Others seem innocuous or even benign.

The vast preference engines that power the "free" Internet are 109 See, e.g., ROY COLEMAN, RECLAIMING THE STREETS 226-28 (2004); LYON, supra note 6, at 107-08; Roy Coleman, Surveillance in the City: Primary Definition and Urban Spatial Or- der, in THE SURVEILLANCE STUDIES READER, supra note 6, at 231,234-35.

110 See COLEMAN,5M/>ra note 109, at III.

111 LYON, s«/)»-o note 6, at 30, 32. 2013] THE DANGERS OF SURVEILLANCE 1957 used to profile Internet users for marketing purposes. Companies like Google amass vast detailed profiles of our web-surfing habits, our in- terests, and our buying habits."^ Data brokers hke Acxiom and LexisNexis create even more detailed consumer profiles by combining various kinds of data and sell the data to a wide variety of sources, in- cluding direct marketers, background-check companies, and compa- nies consumers may already have a relationship with, such as car deal- er's or Target."^ Commercial data of this kind can be used to offer discounts or selective promotions to more or less desirable customers.

The sorting power of surveillance is a major theme among surveil- lance scholars.

In the 1990s, sociologist Oscar Gandy described the "panoptic sort":

the use of consumer databases to profile consumers, sort them into categories, and then discriminate among the categories, allocating opportunities on the basis of the classification."" More re- cently, Lyon and other scholars have built on Gandy's work to show the ways in which software is increasingly used to sort citizens and consumers by governments seeking profiles of criminal risk and by companies seeking profiles of commercial opportunity."^ From one perspective, the use of the fruits of data surveillance in this way might look like ordinary marketing.

But consider the power that data-driven marketing gives companies in relation to their cus- tomers.

The power of sorting can bleed imperceptibly into the power of discrimination.

A coupon for a frequent shopper might seem inno- cuous, but consider the power to offer shorter airport security lines (and less onerous procedures) to rich frequent fliers, or to discriminate against customers or citizens on the basis of wealth, geography, gender, race, or ethnicity.

The power to treat people differently is a dangerous one, as our many legal rules in the areas of fair credit, civil rights, and constitutional law recognize. Surveillance, especially when fuelled by Big Data, puts pressure on those laws and threatens to upend the basic power balance on which our consumer protection and constitutional laws operate.

As Professor Danielle Citron argues, algorithmic deci- sionmaking based on data raises issues of "technological due process.""^ The sorting power of surveillance only raises the stakes of these issues. After all, what sociologists call "sorting" has many other ••2 LEVY, supra note 18, at 336-37, 341.

••3 See Jon D.

Michaels, All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 CALIF.

L.

REV. 901, 917-18 (2008).

•••I OSCAR H.

GANDY, JR., THE PANOPTIC SORT 15 (1993).

•'5 See generally JOHN GiLLIOM, OVERSEERS OF THE POOR (2006); DAVID LYON, SUR- VEILLANCE AFTER SEPTEMBER I I (2003); THE NEW POLITICS OF SURVEILLANCE AND VISIBILITY (Kevin D.

Haggerty & Richard V.

Ericson eds., 2006); SURVEILLANCE AS SOCIAL SORTING (navid Lyon erl., 2003).

••6 Danielle Keats Citron, Technological Due Process, 85 WASH.

U. L.

REV.

1249, 1258 (2008). 1958 HARVARD LAW REVIEW [Vol.

126:1934 names in the law, with "profiling" and "discrimination" being just two of them.

IV.

LIMITING SURVEILLANCE These insights into the ways in which surveillance is harmful point toward identifying remedies that can be built into law, technologies, and social norms to deter the most dangerous forms of surveillance.

In this section, I outline four principles that we should use to guide the treatment of surveillance. ]VIy purpose is not to propose neat doctrinal fixes to existing law; as I have shown already, the age of surveillance raises massive challenges that will require us to think creatively about how to capture its benefits without sacrificing important civil liberties.

Instead, my purpose is to identify some of the values that the law of surveillance ought to protect and the principles that should guide its evolution.

A.

Surveillance Transcends the Public/Private Divide One of the most significant changes that the age of surveillance has brought about is the increasing difficulty of separating surveillance by governments from that by commercial entities. Public- and private- sector surveillance are intertwined — they use the same technologies and techniques, they operate through a variety of public/private part- nerships, and their digital fruits can easily cross the public/private divide.

It is probably in this respect that our existing models for un- derstanding surveillance — such as Big Brother and the Panopticon — are the most out of date. Even if we are primarily worried about state surveillance, perhaps because we fear the state's powers of criminal enforcement, our solutions to the problem of surveillance can no longer be confined to regulation of government actors.

Any solutions to the problem of surveillance must thus take into account private surveil- lance as well as public.

In this respect. Professor Orin Kerr is correct when he argues that federal statutory law has advantages over the Fourth Amendment in guarding against surveillance in the digital age.*'' Not only is statuto- ry law easier to change, but it also can be applied to bind both gov- ernment and nongovernment actors.

A good model in this context is the federal ECPA and its state-law equivalents. These laws prohibit wiretapping by private actors and require the government to obtain a warrant under a standard higher than probable cause before it can en- gage in wiretapping."8 ECPA has many defects, both in terms of the 117 Orin S.

Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 MICH.

L.

REV. 801, 806-08 (2004).

118 18 U.S.C. §2516(2006). 2013] THE DANGERS OF SURVEILLANCE 1959 level of protection it offers and in its often-bewildering complexity, but in transcending the public/private divide, it represents a good model for dealing with surveillance.

Additional legal protections will be needed to cope with develop- ments in surveillance practices. Because the government can sidestep many legal restrictions on the collection of data by buying it from pri- vate databases, we should place additional restrictions on this growing form of state surveillance. Such regulations could operate in both di- rections.

In relation to government, we could place restrictions both on the government's abihty to buy private databases and on its ability to share personal information with the private sector. Privacy law al- ready has numerous models for this latter category, ranging from the Driver's Privacy Protection Act of 1994,"' which limits the govern- ment's ability to sell drivers' license records to industry, to the Privacy Act of 1974,1^° which prevents the government from disclosing many kinds of records about individuals that it has in its possession.

In rela- tion to private actors, we can place special obligations of confidentiali- ty upon the holders of personal information related to intellectual pri- vacy, treating them as information fiduciaries. Our law has long had a tradition of confidentiality rules, placing nondisclosure obligations on lawyers, doctors, trustees, librarians, and other information custo- dians,'^^ On the Internet, many companies already promise not to share personal information with governments unless compelled.

It would be but a small step to make such promises the default, or even the mandatory practice, for certain kinds of particularly sensitive information,'^^ B.

Secret Surveillance Is Illegitimate Democratic societies should prohibit the creation of any domestic- surveillance programs whose existence is secret.

In a democratic socie- ty, the people, and not the state apparatus, are sovereign.

In American law, this tradition goes back to James Madison, and it lies at the very heart of both First Amendment theory and American constitutionalism itself, 1^^ These principles are refiected at the core of modern informa- tion law.

For example, the Supreme Court has made clear that the 119 18 U.S.C. §§2721-2725 (2006).

120 5 U.S.C.

§ 552a (2006).

•21 See Neil M.

Richards & Daniel J.

Solove, Privacy's Other Path:

Recovering the Law of Con- fidentiality, 96 GEO.

L.J. 123, 134-40 (2007).

122 Richards, The Perils of Social Reading, supra note 20, at 692, 123 Madison's Report on the Virginia Resolutions (178Ç-1800), in 4 THE DEBATES IN THE SEVERAL STATE CONVENTIONS ON THE ADOPTION OF THE FEDERAL CONSTITUTION 546, 553-76 (Jonathan Elliot ed., Philadelphia, J.B. Lippincott Co. 2d ed. 1891). i960 HARVARD LAW REVIEW [Vol.

126:1934 federal Freedom of Information Act^^"* protects at its core the "citizens' right to be informed about 'what their government is up to.'"i^^ As Professor Henry Steele Commager put it aptly, "[t]he generation that made the nation thought secrecy in government [to be] one of the in- struments of Old World tyranny and committed itself to the principle that a democracy cannot function unless the people are permitted to know what their government is up to."'^^ The illegitimacy of secret surveillance also lies at the heart of in- formation-privacy law, which remains guided by the "Fair Information Practices" drafted by the U.S. Department of Health, Education, and Welfare in 1973.^^^ The Code of Fair Information Practices recom- mended by the Department has continued to influence information- privacy law throughout the world,i^^ and the first of its five principles is the commitment that "there must be no personal-data record- keeping systems whose very existence is secret."'^^ Requiring the existence of domestic-surveillance programs to be disclosed solves a practical problem that has bedeviled courts trying to assess legal challenges to secret surveillance programs.

How can plaintiffs prove injury if the government is not required to admit whether surveillance exists in the first place?

A prohibition on secret surveillance programs solves this problem. When government pro- grams are public — when we have no secret surveillance — courts will be able to assess their legality in the open.

The NSA wiretapping pro- gram was hard to challenge because its details were shrouded in secre- cy, denials, and unassessable invocations of national security inter- ests.

1^° At the same time, its shadowy nature created an even greater threat to intellectual privacy in particular because no one knew if her telephone calls were being listened to or not.

Requiring disclosure of the existence and capabilities of domestic-surveillance programs to the general public makes them amenable to judicial and public scrutiny to ensure their compatibility with the rule of law.

At the same time, the prohibition on secret surveillance systems does not require the gov- ernment to notify individual targets of surveillance that they are being 124 5 U.S.C.

§ 552 (2006 & Supp.

V 2011).

125 U.S.

Dep't of Justice v.

Reporters Comm.

for Freedom of the Press, 489 U.S. 749, 773 (1989) (quoting EPA v.

Mink, 410 U.S.

73, 105 (1973)).

126 Henry Steele Commager, The Defeat of America, N.Y. REV.

BOOKS, Oct.

5, 1972, at 7, 7 (reviewing RICHARD J.

BARNET, ROOTS OF WAR (1972)).

12' U.S.

DEP'T OF HEALTH, EDUC.

& WELFARE, RECORDS, COMPUTERS, AND THE RIGHTS OF CITIZENS: REPORT OF THE SECRETARY'S ADVISORY COMMITTEE ON AUTO- MATED PERSONAL DATA SYSTEMS (1973).

128 LAWRENCE LESSIG, CODE: VERSION 2.0, at 227 (2006); DANIEL J.

SOLOVE, UNDER- STANDING PRIVACY 130 (2008).

129 U.S.

DEP'T OF HEALTH, EDUC.

& WELFARE, i«^a note i27,at4i;jeeo/soid.

29-30,41-42.

•30 See In re NSA Telecomm. Record Litig., 671 F.3d 881, 893 (9th Cir. 2011). 2013] THE DANGERS OF SURVEILLANCE 1961 watched. But fundamentally, surveillance requires legal process and the involvement of the judiciary to ensure that surveillance is targeted, justified, and no more extensive than is necessary.

Thus, while covert domestic surveillance can be justified in discrete (and temporary) instances when there is advance judicial process, Ijlanket surveillance of all Internet activity menaces our intellectual privacy and gives the government too much power to blackmail or discriminate against the subjects of surveillance. In a free society, all forms of surveillance must be ultimately accountable to a self- governing public, and for this reason, secret domestic-surveillance pro- grams of any kind are illegitimate.

C.

Total Surveillance Is Illegitimate Democratic societies should also reject the idea that it is reasonable for the government to record all Internet and telephone activity with or without authorization. Government surveillance of the Internet is a power with the potential for massive abuse, as the (thankfully) failed attempts by the Gadhafi regime illustrated."3" Like its precursor, tele- phone wiretapping, Internet surveillance must be subjected to mean- ingful judicial process before it is authorized. And such authorization must allow only discrete and limited forms of surveillance. Otherwise, there would be no constraint on the government's ability to record and archive all electronic communications and read them at its leisure.

The magnitude of technological change should not blind us to the im- portant values that our law has protected for decades: the importance of private communications, intellectual privacy, and unfettered intel- lectual exploration. Moreover, a world of total surveillance would be one in which the power dangers of surveillance are even more menac- ing. In such a world, watchers would have increased power to black- mail, selectively prosecute, coerce, persuade, and sort individuals. A world of total surveillance is not just science fiction. It is the world toward which we are slowly creeping, as software is coded, databases are combined, and each CCTV camera is successively added to the network.

Rather than jettisoning longstanding civil liberties in our brave new digital world, we should instead follow the example of federal wiretapping law, which for decades has rested on the premise that pri- vate communications should be exactly that, shielded from the. gov- ernment (and other private actors) except in cases of proven law- enforcement need for limited access to those communications. Such a regime is a far cry from the security-driven argument for total surveil- lance, even in an age of terror.

131 See generally Aikins, supra note 104. 1962 HARVARD LAW REVIEW [Vol.

126:1934 D.

Surveillance Is Harmful As Parts II and III of this Article demonstrate, many forms of sur- veillance — covert and overt, public and private — menace our intel- lectual privacy and the processes of belief formation on which a free society depends. They also create a power imbalance between the watcher and the watched that creates risks of blackmail, undue per- suasion, and discrimination. Courts and legislatures should therefore scrutinize any surveillance that threatens these values.

But because of its relationship to First Amendment values and political freedom, sur- veillance of intellectual records — Internet search histories, email, web traffic, and telephone communications — is particularly harmful.

In practice, this means that surveillance by government that seeks access to intellectual records should be subjected to a high threshold before a warrant can issue.

A good model for this rule is Title I of the ECPA, which provides for a more stringent procedure under federal wiretap- ping law before a warrant may issue to intercept the contents of a tele- phone or electronic communication.

1^2 -phe ECPA requires more than just the standard probable cause requirement that is the constitutional floor under Fourth Amendment law. In addition to probable cause, government agents seeking to tap a phone or electronic communication must also show three other elements:

(i) that the warrant is sought for a limited time, (2) that the interception of the communication is neces- sary to obtain the information sought, and (3) that the wiretapping will be conducted in such a way as to minimize the interception of infor- mation not relevant to the warrant.'^^ These "super-warrant" protec- tions for communications should be expanded to cover the full range of intellectual records.

For private-sector surveillance, additional statutory procedures are necessary to ensure that intellectual records are handled with greater care by the entities that hold them.

We already have piecemeal protec- tions for intellectual privacy against private-sector surveillance, which could serve as useful models for the extension of intellectual-privacy protection more broadly.^^" For example, the ECPA prohibition against warrantless wiretapping applies to private actors as well.'^^ The Act makes private acts of wiretapping illegal, providing severe criminal and civil liability — up to five years in prisoni36 and fines or •32 18 U.S.C.

§ 2518(2006).

•33 See ¿d.

; see also Paul Ohm, Probably Probable Cause:

The Diminishing Importance of Justi- fication Standards, 94 MiNN.

L.

REV.

1514, 1554 (2010).

•3'' For an expanded treatment of this argument in the context of reading records, see generally Richards, The Perils of Social Reading, supra note 20.

•35 18 U.S.C.

§ 2511 ("any person").

•36 Id. § 25ii(4)(a). 2013] THE DANGERS OF SURVEILLANCE 1963 tort liability of $10,000 for each violation of the Act.'^' Other good models for intellectual-privacy protection in the private sector include the confidentiality obligations placed on video-rental companies by the Video Privacy Protection Act of 1988,'^* on librarians by the vast number of library-records confidentiality laws, and on print and elec- tronic booksellers in Cahfornia under its Reader Privacy Act."' Because surveillance of intellectual activities menaces self- government, our law must also recognize it as a harm in standing doc- trine.

One of the difficulties that courts have faced in dealing with surveillance in the past is an inability to articulate exactly why surveil- lance is harmful. This inability was the problem in Laird and also in the NSA wiretapping cases. Contrary to the trend of the law. Amnesty International USA v.

Clapper^'*^ held that amendments to the Foreign Intelligence Surveillance Act that authorized the NSA wiretapping program actually could cause a legally cognizable injury to journalists, lawyers, and aid workers whose communications with overseas clients might be subjected to surveillance by the United States government.''*' But even that outlier case, which the Supreme Court reversed on ap- peal, failed to recognize that a reasonable fear of government surveil- lance threatens the privacy of the surveilled, causing them to act dif- ferently.

The Second Circuit found standing but rested its conclusions instead upon injury to the professional duties of the doctors and law- yers who feared that the government was listening.

The professional duties of the plaintiffs in Clapper are important, and the Second Cir- cuit was correct to recognize injuries to those duties as harms under standing doctrine.

But on its own terms, even the Second Circuit seemed to suggest that only professional elites have standing to chal- lenge surveillance. Such a conclusion is underprotective of the rights of all people to be free from unlawful surveillance and to be able to challenge unlawful surveillance in court. As I have argued, intellectual privacy is not just for intellectuals.

If the government is engaged in unwarranted surveillance of a person's intellectual activities, that per- son should have standing to challenge the legality,of the surveillance.

The surveillance may or may not turn out to be warranted in each particular case, but our society's fundamental commitments to due process, freedom of the mind, and the rule of law suggest that such dangerous surveillance should be subject to legal challenge.

Intellectual-privacy theory thus corrects the errors of Clapper, Laird, and the NSA cases.

It would extend protection from surveil- 137 Id. § 252O(2)(B).

138 18 U.S.C. §2710(2006).

'39 CAL. CIV.

CODE § 1798.90.05 (West 2012).

'"0 638 F.3d 118 (2d Cir. 2011), rev'd, 133 S. Ct. 1138 (2013).

''" Id. at 121-22. 1964 HARVARD LAW REVIEW [Vol.

126:1934 lance to all people, and not just to professional elites. It explains why surveillance of reading, thinking, and private communication harms the development of ideas and beliefs unfettered by the skewing effects of observation. Accordingly, a reasonable fear of government surveil- lance that affects the subject's intellectual activities (reading, thinking, and communicating) should be recognized as a harm sufficient to prove an injury in fact under standing doctrine. Such a change to our law would not be a radical one; in fact, it is precisely the way courts currently assess challenges to individual free speech rights under the First Amendment's chilling-effects doctrine. Since intellectual privacy protects, at heart. First Amendment values, it is appropriate to extend these existing and workable doctrinal tools to this related area of the law.

This is not to say that individual determinations of the chilling of intellectual activities will always be easy. Determining whether a chill to intellectual privacy is substantial would certainly present difficult cases at the margins. In our law, the devil is frequently in the details.

But as the chilling-effects doctrine has demonstrated, courts have man- aged to balance threats to free speech against competing government interests. Moreover, because the general details of government surveil- lance programs should be pubhc, courts and litigants will have more information with which to assess the effects of surveillance. And even when publication of the details of surveillance might threaten ongoing investigations, such details could be released either under seal to the litigants or shared with the court. Courts have a wide variety of tools to manage the flow of confidential information that litigation inevita- bly produces, and they would be well suited to such a task. Such tasks may be difficult and require judgment, but that is the job of courts.

The alternative to grappling with the civil-hberties threats that sur- veillance poses is to ignore those threats altogether, to face the prospect of rendering widespread government surveillance unreviewable and uncheckable. Democratic societies can do better than that.

V.

CONCLUSION The challenge to our law posed by the Age of Surveillance is im- mense. The justifications for surveillance by pubhc and private actors are significant, but so too are the costs that the rising tide of unfettered surveillance is creating. Surveillance can sometimes be necessary, even helpful. But unconstrained surveillance, especially of our intellectual activities, threatens a cognitive revolution that cuts at the core of the freedom of the mind that our political institutions presuppose. There- fore, surveillance must be constrained by legal and social rules. The technological, economic, and geopolitical changes of the past twenty years have whittled away at those rules, both formally on their sub- stance (for example, the Patriot Act and the expansion of National Se- 2013] THE DANGERS OF SURVEILLANCE 1965 curity Letter jurisdiction) and in practice (for example, the pressure that the technological social practices of. the Internet have exerted on privacy).

By thus recognizing the harms of surveillance and crafting our laws accordingly, we can obtain many of its benefits without sacri- ficing our vital civil liberties or upending the power balance between individuals on the one hand and companies and governments on the other. Copyright © 2013 by The Harvard Law Review Association. Copyright of Harvard Law Review is the property of Harvard Law Review Association and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.