📄 the constitution in cyberspace.txt
字号:
It would be illuminating at this point to compare the SupremeCourt's initial reaction to new technology in *Olmstead* with itsinitial reaction to new technology in *Maryland v. Craig*, the 1990closed-circuit television case with which we began this discussion.In *Craig*, a majority of the Justices assumed that, when the 18th-century Framers of the Confrontation Clause included a guarantee oftwo-way *physical* confrontation, they did so solely because it hadnot yet become technologically feasible for the accused to look hisaccuser in the eye without having the accuser simultaneously watchthe accused. Given that this technological obstacle has beenremoved, the majority assumed, one-way confrontation is nowsufficient. It is enough that the accused not be subject tocriminal conviction on the basis of statements made outside hispresence. In *Olmstead*, a majority of the Justices assumed that, when the18th-century authors of the Fourth Amendment used language thatsounded "physical" in guaranteeing against invasions of a person'sdwelling or possessions, they did so not solely because *physical*invasions were at that time the only serious threats to personalprivacy, but for the separate and distinct reason that *intangible*invasions simply would not threaten any relevant dimension ofFourth Amendment privacy. In a sense, *Olmstead* mindlessly read a new technology *out* ofthe Constitution, while *Craig* absent-mindedly read a new technology*into* the Constitution. But both decisions -- *Olmstead* and *Craig* --had the structural effect of withholding the protections of theBill of Rights from threats made possible by new informationtechnologies. *Olmstead* did so by implausibly reading theConstitution's text as though it represented a deliberate decisionnot to extend protection to threats that 18th-century thinkerssimply had not foreseen. *Craig* did so by somewhat more plausibly-- but still unthinkingly -- treating the Constitution's seeminglyexplicit coupling of two analytically distinct protections asreflecting a failure of technological foresight and imagination,rather than a deliberate value choice. The *Craig* majority's approach appears to have been driven inpart by an understandable sense of how a new information technologycould directly protect a particularly sympathetic group, abusedchildren, from a traumatic trial experience. The *Olmstead*majority's approach probably reflected both an exaggerated estimateof how difficult it would be to obtain wiretapping warrants evenwhere fully justified, and an insufficient sense of how a newinformation technology could directly threaten all of us. Althoughboth *Craig* and *Olmstead* reveal an inadequate consciousness abouthow new technologies interact with old values, *Craig* at least seemsdefensible even if misguided, while *Olmstead* seems just plainwrong. Around 23 years ago, as a then-recent law school graduateserving as law clerk to Supreme Court Justice Potter Stewart, Ifound myself working on a case involving the government'selectronic surveillance of a suspected criminal -- in the form ofa tiny device attached to the outside of a public telephone booth.Because the invasion of the suspect's privacy was accomplishedwithout physical trespass into a "constitutionally protected area,"the Federal Government argued, relying on *Olmstead*, that there hadbeen no "search" or "seizure," and therefore that the FourthAmendment "right of the people to be secure in their persons,houses, papers, and effects, against unreasonable searches andseizures," simply did not apply. At first, there were only four votes to overrule *Olmstead* andto hold the Fourth Amendment applicable to wiretapping andelectronic eavesdropping. I'm proud to say that, as a 26-year-oldkid, I had at least a little bit to do with changing that number>from four to seven -- and with the argument, formally adopted by aseven-Justice majority in December 1967, that the Fourth Amendment"protects people, not places." (389 U.S. at 351.) In thatdecision, *Katz v. United States*, the Supreme Court finallyrepudiated *Olmstead* and the many decisions that had relied upon itand reasoned that, given the role of electronic telecommunicationsin modern life, the First Amendment purposes of protecting *freespeech* as well as the Fourth Amendment purposes of protecting*privacy* require treating as a "search" any invasion of a person'sconfidential telephone communications, with or without physicaltrespass. Sadly, nine years later, in *Smith v. Maryland*, the SupremeCourt retreated from the *Katz* principle by holding that no searchoccurs and therefore no warrant is needed when police, with theassistance of the telephone company, make use of a "pen register",a mechanical device placed on someone's phone line that records allnumbers dialed from the phone and the times of dialing. TheSupreme Court, over the dissents of Justices Stewart, Brennan, andMarshall, found no legitimate expectation of privacy in the numbersdialed, reasoning that the digits one dials are routinely recordedby the phone company for billing purposes. As Justice Stewart, theauthor of *Katz*, aptly pointed out, "that observation no more thandescribes the basic nature of telephone calls . . . . It is simplynot enough to say, after *Katz*, that there is no legitimateexpectation of privacy in the numbers dialed because the callerassumes the risk that the telephone company will expose them to thepolice." (442 U.S. at 746-747.) Today, the logic of *Smith* isbeing used to say that people have no expectation of privacy whenthey use their cordless telephones since they know or should knowthat radio waves can be easily monitored! It is easy to be pessimistic about the way in which theSupreme Court has reacted to technological change. In manyrespects, *Smith* is unfortunately more typical than *Katz* of the waythe Court has behaved. For example, when movies were invented, andfor several decades thereafter, the Court held that movieexhibitions were not entitled to First Amendment protection. Whencommunity access cable TV was born, the Court hindered municipalattempts to provide it at low cost by holding that rules requiringlandlords to install small cable boxes on their apartment buildingsamounted to a compensable taking of property. And in *Red Lion v.FCC*, decided twenty-two years ago but still not repudiated today,the Court ratified government control of TV and radio broadcastcontent with the dubious logic that the scarcity of theelectromagnetic spectrum justified not merely government policiesto auction off, randomly allocate, or otherwise ration the spectrumaccording to neutral rules, but also much more intrusive andcontent-based government regulation in the form of the so-called"fairness doctrine." Although the Supreme Court and the lower federal courts havetaken a somewhat more enlightened approach in dealing with cabletelevision, these decisions for the most part reveal a curiousjudicial blindness, as if the Constitution had to be reinventedwith the birth of each new technology. Judges interpreting a late18th century Bill of Rights tend to forget that, unless its *terms*are read in an evolving and dynamic way, its *values* will lose eventhe *static* protection they once enjoyed. Ironically, *fidelity* tooriginal values requires *flexibility* of textual interpretation. Itwas Judge Robert Bork, not famous for his flexibility, who onceurged this enlightened view upon then Judge (now Justice) Scalia,when the two of them sat as colleagues on the U.S. Court of Appealsfor the D.C. Circuit. Judicial error in this field tends to take the form of sayingthat, by using modern technology ranging from the telephone to thetelevision to computers, we "assume the risk." But that typicallybegs the question. Justice Harlan, in a dissent penned two decadesago, wrote: "Since it is the task of the law to form and project,as well as mirror and reflect, we should not . . . merely recite .. . risks without examining the *desirability* of saddling them uponsociety." (*United States v. White*, 401 U.S. at 786). And, I wouldadd, we should not merely recite risks without examining howimposing those risks comports with the Constitution's fundamentalvalues of *freedom*, *privacy*, and *equality*. Failing to examine just that issue is the basic error Ibelieve federal courts and Congress have made: * in regulating radio and TV broadcasting without adequate sensitivity to First Amendment values; * in supposing that the selection and editing of video programs by cable operators might be less than a form of expression; * in excluding telephone companies from cable and other information markets; * in assuming that the processing of "O"s and "1"s by computers as they exchange data with one another is something less than "speech"; and * in generally treating information processed electronically as though it were somehow less entitled to protection for that reason. The lesson to be learned is that these choices and thesemistakes are not dictated by the Constitution. They are decisionsfor us to make in interpreting that majestic charter, and inimplementing the principles that the Constitution establishes.*Conclusion* If my own life as a lawyer and legal scholar could leave justone legacy, I'd like it to be the recognition that the Constitution*as a whole* "protects people, not places." If that is to comeabout, the Constitution as a whole must be read through atechnologically transparent lens. That is, we must embrace, as arule of construction or interpretation, a principle one might callthe "cyberspace corollary." It would make a suitableTwenty-seventh Amendment to the Constitution, one befitting the200th anniversary of the Bill of Rights. Whether adopted all atonce as a constitutional amendment, or accepted gradually as aprinciple of interpretation that I believe should obtain evenwithout any formal change in the Constitution's language, thecorollary I would propose would do for *technology* in 1991 what Ibelieve the Constitution's Ninth Amendment, adopted in 1791, wasmeant to do for *text*. The Ninth Amendment says: "The enumeration in theConstitution, of certain rights, shall not be construed to deny ordisparage others retained by the people." That amendment providesadded support for the long-debated, but now largely accepted,"right of privacy" that the Supreme Court recognized in suchdecisions as the famous birth control case of 1965, *Griswold v.Connecticut*. The Ninth Amendment's simple message is: The *text*used by the Constitution's authors and ratifiers does not exhaustthe values our Constitution recognizes. Perhaps a Twenty-seventhAmendment could convey a parallel and equally simple message: The*technologies* familiar to the Constitution's authors and ratifierssimilarly do not exhaust the *threats* against which theConstitution's core values must be protected. The most recent amendment, the twenty-sixth, adopted in 1971,extended the vote to 18-year-olds. It would be fitting, in a worldwhere youth has been enfranchised, for a twenty-seventh amendmentto spell a kind of "childhood's end" for constitutional law. TheTwenty-seventh Amendment, to be proposed for at least seriousdebate in 1991, would read simply:"This Constitution's protections for the freedoms ofspeech, press, petition, and assembly, and itsprotections against unreasonable searches and seizuresand the deprivation of life, liberty, or property withoutdue process of law, shall be construed as fullyapplicable without regard to the technological method ormedium through which information content is generated,stored, altered, transmitted, or controlled."
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -