FINDINGS OF FACT AND CONCLUSIONS OF LAW
In 2008 the Indiana General Assembly enacted Public Law 119, which amended many of the requirements imposed upon those persons who must register with the state as sex offenders and violent offenders. This case presents a challenge to one of the new requirements as it would apply to those who have completed their sentences and are no longer on parole, probation, or any other form of court supervision. Under the new statute, set to take effect on July 1, 2008, all those who must register must also consent to the search of their personal computers or devices with internet capability at any time, and they must consent to installation on the same devices, at their expense, of hardware or software to monitor their internet use. Ind. P.L. 119-2008 § 6 (2008) (SEA 258), to be codified in Ind.Code § ll-8-8-8(b) (effective July 1, 2008). Failure to “consent” to these measures is itself a felony.
Pursuant to the parties’ stipulation, the court certified a plaintiff class under Rule 23(b)(2) of the Federal Rules of Civil Procedure. Plaintiffs are a class of “all persons, current and future, who are required to register as sex or violent offenders pursuant to Indiana law and who are not currently on parole or probation or court supervision.” Plaintiffs allege that the new law violates their rights under the Fourth Amendment to the United States Constitution prohibiting unreasonable *866 searches and requiring probable cause for issuance of a warrant. Plaintiffs seek a declaration that the new consent-to-search requirements are unconstitutional and an injunction against their enforcement. The court heard argument on a stipulated factual record on May 30, 2008, and now states its findings of fact and conclusions of law pursuant to Rules 52 and 65 of the Federal Rules of Civil Procedure. Substance shall govern whether an item is deemed a finding of fact or conclusion of law.
The plaintiff class consists of people who have committed serious crimes and have been punished for those crimes. They have returned to society, and they have rights under the United States Constitution. As explained in detail below, the plaintiff class may bring this pre-enforcement challenge to this new law as applied to these class members. The new law forces an unconstitutional choice upon these plaintiffs. They must choose now between committing a new crime by refusing to consent and giving up their Fourth Amendment rights to privacy and security in their homes, their “papers,” and their effects. The unprecedented new law, however well-intentioned it may be, violates the Fourth Amendment rights of the plaintiff class, who have completed their sentences and are no longer on probation, parole, or any other kind of court supervision. The court is issuing a declaratory judgment stating that the consent-to-search requirements in Indiana Code § 11 — 8—8—8(b) may not be applied to members of the plaintiff class.
I. The Indiana Sex and Violent Offender Registry
Like many states, Indiana has established a sex and violent offender registry, and the information is available on a public website. Ind.Code § 36-2-13-5.5. The law requires those convicted of a wide range of offenses to register. The offenses include rape, criminal deviate conduct, child molesting, child exploitation, vicarious sexual gratification, child solicitation, child seduction, sexual misconduct with a minor as a Class A, B, or C felony (with certain exceptions), incest, sexual battery, kidnaping if the victim is less than 18 years old, some criminal confinement of a person under 18 years old, possession of child pornography, promoting prostitution, human trafficking and promoting human trafficking if the victim is less than 18 years old, sexual trafficking of a minor, murder, voluntary manslaughter, an attempt to commit a listed offense, and any substantially equivalent crime under the laws of another jurisdiction, and certain juvenile offenses. Ind. Code § 11-8-8-5.1. Some sex or violent offenders must register for the rest of their lives. Ind.Code § 35-38-1-7.5. Others must register until ten years have passed after the later of the offender’s release from prison, placement in a community transition program or community corrections program, or placement on parole or probation. Ind.Code § 11-8-8-19(a).
A person who is required to register must register in every county in Indiana in which he owns real property, resides, is employed, or is a student. Ind.Code § 11-8-8-7(a)-(e). If the location of his residence, employment, or school changes, the person must report the changes in person to the local law enforcement authority. Ind.Code § 11-8-8-11. The sex or violent offender must report in person to the local law enforcement authority to register and be photographed at least once per year, or at least every ninety days if he has been designated a sexually violent predator. Ind.Code § 11-8-8-14. To verify the residence of the sex or violent offender, local law enforcement must personally visit each sex or violent offender at his residence at *867 least once per year, or at least every ninety days if the person is designated a sexually violent predator. Ind.Code § 11 — 8—8— 13(a). If the person appears not to reside at the location, local law enforcement “shall immediately notify” the Indiana Department of Correction and the county prosecuting attorney. Ind.Code § 11 — 8—8— 13(b).
Under current law, the registry must include a recent photograph of the offender, the home address, and other information required under Indiana Code § 11 — 8— 8-8. The offender must also provide a physical description, information about the vehicles he uses, and employer and/or school information. Beginning July 1, 2008, the registrant must also provide any electronic mail address, instant messaging user name, electronic chat room user name, or social networking web site user name that the registrant uses or intends to use. Ind. P.L. 119-2008 § 6 (2008) (SEA 258), to be codified in Ind.Code § 11-8-8-8(a)(7) (effective July 1, 2008). 1 Plaintiffs do not challenge any of these requirements, including the new requirements in section 8(a)(7) to report electronic mail addresses, user names, and the like.
The 2008 legislation also includes a new requirement, known as “section 8(b),” which plaintiffs challenge under the Fourth Amendment:
(b) If the sex or violent offender registers any information under subsection (a)(7) [ie., electronic mail addresses, user names, etc.], the offender shall sign a consent form authorizing the:
(1) search of the sex or violent offender’s personal computer or device with Internet capability, at any time; and
(2) installation on the sex or violent offender’s personal computer or device with Internet capability, at the sex or violent offender’s expense, of hardware or software to monitor the sex or violent offender’s Internet usage.
Ind. P.L. 119-2008 § 6 (2008) (SEA 258), to be codified in Ind.Code § ll-8-8-8(b) (effective July 1, 2008). One curious feature of the statute is that it does not say whom the consent form authorizes to conduct the searches and monitoring.
A knowing or intentional failure to comply with the registration requirements is a felony under Indiana law. Ind.Code § 11-8-8-17. A knowing or intentional failure to provide the consent required by section 8(b) therefore amounts to a felony under Indiana law. 2
II. The Parties
The plaintiffs are a class of “all persons, current and future, who are required to register as sex or violent offenders pursuant to Indiana law and who are not currently on parole or probation or court supervision.” The plaintiff class was certified by stipulation of the parties under Rule 23(b)(2) of the Federal Rules of Civil Procedure because the defendant prosecutors (and the State of Indiana) have acted or refused to act on grounds that apply generally to the plaintiff class, so that injunctive relief or declaratory relief would be appropriate for the class as a whole.
*868 Plaintiffs John Doe and Steve Morris are class representatives and adult residents of Indiana. They are listed on the sex and violent offender registry and must register for the rest of their lives. Both have been released from prison. They are not currently on probation, parole, supervised release, or any other form of court supervision.
Doe owns his own business and operates it out of his home. He has an electronic mail address and constantly uses his computer in his business. He also owns a cellular telephone with internet capability. Doe is aware of the new law’s requirements in section 8(b). He realizes that he will be required to give permission to unspecified law enforcement authorities to enter his home at any time and to search his computer and telephone at any time, all without a warrant. He also will be required to pay for software or hardware to allow other unspecified law enforcement authorities to search his computer and monitor his internet use.
Doe does not want to comply with section 8(b) because it will remove his privacy in his own home. Also, his computer contains a great deal of private information concerning his clients and his business dealings, including information that his clients have sent him in confidence and that they consider proprietary. He has formal non-disclosure requirements with clients and may not disclose information to other persons who have not also signed non-disclosure agreements. Neighbors know that Doe is listed on the registry, but he believes his clients do not know. Doe does not want to tell clients he is on the registry because of his fear that he will lose business and suffer financially. Doe’s computer also contains confidential information personal to Doe, including personal banking information and communications with his attorney.
Morris lives with his wife. He owns a personal computer at home. He has an electronic mail address and owns an internet-capable cellular telephone. Morris does his family’s banking over the internet with his personal computer, which thus contains his financial and banking records.
Morris also does not want to comply with section 8(b) because it will remove his and his wife’s privacy in their home. He does not want to lose his privacy in his home and effects, and he also does not want to have to install and pay for software and/or hardware that would allow other persons to monitor his computer use. 3
*869 Morris did not finish his criminal sentence easily. He must register because he was convicted of two counts of child molesting in 1996. In 1998, while he was on probation, he was charged with sexual misconduct with a minor, and in 1999 he was convicted of that offense and his probation was revoked. Morris was paroled in 2001. In 2003, while still on parole, he was arrested for residential entry and violation of a protective order. In 2004, he was given a pre-trial diversion agreement for both of those charges. In 2005, his parole was revoked because he had violated conditions of parole by using marijuana, entering a package liquor store, renting pornographic movies, and searching for and observing (adult) pornography on the internet. Morris was paroled again on November 12, 2005, and was finally discharged from his sentence on August 24, 2006.
The plaintiff class has named as defendants all prosecuting attorneys in the state of Indiana, as well as the mayor of Indianapolis. Plaintiffs seek injunctive relief against enforcement of section 8(b) and a declaratory judgment that section 8(b) is unconstitutional.
III. Ripeness of this Pre-Enforcement Challenge
The defendants raise several arguments that seek to avoid a decision on the merits of the Fourth Amendment claim. The first of these affects the court’s subject matter jurisdiction. Defendants argue that the case is not yet ripe for adjudication because section 8(b) has not yet taken effect, because no searches have been carried out under its authority, and because many details remain to be worked out for how section 8(b) should be implemented. The court rejects these arguments and finds that these plaintiffs’ challenge to section 8(b) is ripe for adjudication. The plaintiffs have presented a sufficiently concrete and specific challenge. Without relief at this time, plaintiffs face significant hardships and loss of the security and privacy protected by the Fourth Amendment. Varying details of enforcement mechanisms would not affect the basic Fourth Amendment issues.
A. Factors for Assessing Ripeness
Federal courts may not render advisory opinions that address abstract legal questions.
United Public Workers v. Mitchell,
No precise test exists to distinguish between an abstract question and a justiciable case or controversy, but well-established principles provide guidance.
Babbitt v. United Farm Workers National Union,
In
Abbott Laboratories v. Gardner,
the Supreme Court laid out the basic criteria for pre-enforcement ripeness in the context of a claim challenging the validity of regulations promulgated by the Commissioner of Food and Drugs.
The Supreme Court has provided guidance for applying the ripeness factors from
Abbott Laboratories
to cases in which a plaintiff contends that a criminal statute affects his ability to exercise constitutional rights. In
Steffel v. Thompson,
In
Babbitt v. United Farm Workers National Union,
the plaintiffs sought
*871
an injunction and a declaratory judgment that various portions of an Arizona agricultural labor law were unconstitutional, including a provision that established criminal penalties for employers who committed unfair labor practices. Though the criminal penalty had never been enforced, the Supreme Court held that the issue was ripe because there was a credible threat of prosecution.
The Supreme Court has recently explained that claims challenging the constitutionality of a state statute can be ripe even absent an imminent threat of prosecution under the challenged statute. In
MedImmune, Inc. v. Genentech, Inc.,
Our analysis must begin with the recognition that, where threatened action by government is concerned, we do not require a plaintiff to expose himself to liability before bringing suit to challenge the basis for the threat — for example, the constitutionality of a law threatened to be enforced. The plaintiffs own action (or inaction) in failing to violate the law eliminates the imminent threat of prosecution, but nonetheless does not eliminate Article III jurisdiction.
549 U.S. at-,
Similarly, the Seventh Circuit has recognized that the mere existence of a law sometimes can serve as a threat that would in and of itself make ripe a claim challenging the constitutionality of the law.
Schmidling v. City of Chicago,
Drawing from these and other Supreme Court decisions, the Seventh Circuit has identified three factors that a court should consider to determine whether a case is ripe when the plaintiff seeks a declaration that a state law violates the United States Constitution: (1) the magnitude of the threat that the challenged law will actually be enforced against the plaintiff; (2) the nature of the consequences risked by the plaintiff if the law is enforced against him or her; and (3) whether the plaintiff has actually been forced to alter his or her conduct as a result of the state law.
Wisconsin’s Environmental Decade, Inc.,
B. Magnitude of the Threat of Enforcement
It is almost certain that a person on the registry who elects not to sign the consent form will be detected. Section 8(b) is one small part of a complex set of registration requirements for sex and violent offenders. A person who is a sex or violent offender must register in every county in Indiana in which he owns real property, resides, is employed, or is a student. Ind.Code § 11— 8-8-7(a). If the location of his residence, employment, or school changes, he must report the changes in person to the local law enforcement authority. Ind.Code § 11-8-8-11. He must report in person to the local law enforcement authority to register and be photographed at least once per year, or at least every ninety days if he has been designated a sexually violent predator. Ind.Code § 11-8-8-14. These face-to-face visits provide opportunities for law enforcement to insist that members of the plaintiff class sign the consent forms required by section 8(b). To verify the residence of the sex or violent offender, local law enforcement also must personally visit each sex or violent offender at his residence at least once per year, or at least every ninety days if the person is designated a sexually violent predator. Ind.Code § ll-8-8-13(a). Failures must be reported immediately to the prosecuting attorney. Ind.Code § ll-8-8-13(b). With this near constant interaction with law enforcement, it is hard to imagine that a sex or violent offender who refused to sign the consent form would go undetected.
It appears highly likely that a class member who refused to give consent to searches under section 8(b) would be prosecuted. The defendants’ arguments about the importance of these new requirements and the need to monitor persons on the sex and violent offender registry (discussed below) indicate that prosecutors are unlikely to overlook what would have to be seen as deliberate refusals to comply with the new statute. In general, a court may assume that a statute will be enforced absent an affirmative statement from the government that it will not be enforced. See
Babbitt,
C. Nature of Consequences Risked
The consequences that plaintiffs must risk weigh in favor of deciding this case on the merits. The members of the plaintiff class committed serious crimes. The case brings to mind Justice Frankfurter’s comment: “It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people.”
United States v. Rabinowitz,
Each plaintiff must make a decision in the next few days or weeks whether to comply with section 8(b). Section 8(b) requires him to give written consent to someone, the statute does not say who, who may enter his home at any time to search his personal computer and other devices. Section 8(b) poses a choice. If he refuses, he commits a felony and subjects himself to a new round of criminal prosecution and punishment. If he complies with the law, then he effectively abandons his rights under the Fourth Amendment. He cannot feel secure in his home, his modern “papers,” and his effects.
Thus, at stake here are consequences that are fundamental to our Constitution. The Fourth Amendment embodies the conviction of our Nation’s founders that there must be “a right of personal security against arbitrary intrusions by official power.”
Coolidge v. New Hampshire,
D. Whether Plaintiffs Will Be Forced to Alter Conduct
The plaintiffs have made a sufficient showing that the new law will force them to alter their conduct, weighing in favor of this pre-enforcement challenge. Defendants argue that it is not certain that searches will ever be performed based on consents obtained under section 8(b). That argument misses the most important point — the legitimate fears the plaintiffs have that the statute will be used — and the immediate effects those fears have on them and their privacy and activity, regardless of how often the government actually uses the powers conferred by section 8(b). Valid consent to a search is a well-established exception to the warrant requirement under the Fourth Amendment. See
Schneckloth v. Bustamonte,
Those effects are best understood from the perspective of the plaintiffs. For example, plaintiff Doe uses his personal computer in his business. He keeps confidential information on it. Section 8(b) tells him that he cannot give clients any reasonable assurance that confidential information that they send him will remain confidential. The new law does not identify who may carry out the searches, and it puts no limits on the scope of the search. Nor does it limit the use of information, let alone give any person the opportunity to object to disclosure or use of the information. If Doe must give consent and wait to challenge the law, should he tell his clients that their information may be compromised, and thus risk irreparable harm to his business? Or should he stay silent and hope that his computer is not searched and that no harm will be done? Should he continue to use his computer for conducting his personal business, or should he use some other form of communication not covered by section 8(b)?
Or consider plaintiff Morris or any other unnamed member of the plaintiff class. If he signs the consent, he and his wife cannot feel secure at home. The prospect of searches “at any time” without a search warrant, without probable cause, and without even reasonable suspicion of wrongdoing, would dramatically impair the privacy these plaintiffs have the right to enjoy in their own homes under the Fourth Amendment. It is reasonable to expect such impairment of privacy to have a chilling effect on the plaintiffs’ daily lives in their own homes. And it is cold comfort to suggest that they wait until their homes and computers are actually searched before bringing constitutional challenges.
In other words, by its presence in the Indiana Code, and by the requirement that plaintiffs give written consent when they register, section 8(b) will affect the plaintiffs’ conduct as soon as it goes into effect. Unless the court allows this pre-enforcement challenge, plaintiffs must choose between risking another criminal prosecution for refusing to comply, or accepting the immediate impairment of their ability to enjoy their constitutional right of privacy under the Fourth Amendment. Those effects are now imminent, and the plaintiffs are entitled to seek injunctive and declaratory relief from those effects.
At the hearing, the defendants suggested that these effects are not substantial because no one in our society can ever have absolute assurances of privacy. Defendants point out, for example, that a court might issue a search warrant for plaintiff Doe’s computer, thus exposing his clients’ and his confidential information to scrutiny by police officers. That much is true, but the logic of the argument runs contrary to nearly 220 years of American constitutional law. The Fourth Amendment protects the privacy of Americans by placing a neutral judicial officer between the police and the privacy of the home and papers (and now computers), by requiring a warrant based on probable cause, and by requiring that the warrant be specific. See
United States v. United States District Court for Eastern District of Michigan,
E. Pre-Enforcement Challenges Under the Fourth Amendment
The defendants argue that the Fourth Amendment is not implicated until there has been an actual search, so that
any
pre-enforcement claim based on the Fourth Amendment cannot be ripe. The court is not persuaded that Fourth Amendment rights are so vulnerable to threats that stop short of actual warrantless searches. It is true that many cases addressing pre-enforcement challenges to laws involve First Amendment rights. See,
e.g., Steffel,
In addition, the few cases that have considered pre-enforcement challenges based on the Fourth Amendment have not applied a blanket rule but have used the factors discussed above: the magnitude of the threat of enforcement and the nature of the harm that would be caused by enforcement. In
Village of Hoffman Estates v. Flipside, Hoffman Estates, Inc.,
the plaintiffs brought a pre-enforcement challenge to a local ordinance that stated that a business must obtain a license before it could sell any items that were designed or marketed for use with illegal cannabis or drugs.
Though the
Hoffman Estates
Court did not find that particular claim to be ripe, it did not adopt a blanket rule against any and all pre-enforcement challenges based on the Fourth Amendment. Instead, the Court’s reasoning plainly left open the possibility that a plaintiff could offer evidence of a concrete threat of enforcement and could bring a pre-enforcement challenge to a statute based on the Fourth Amendment. The Court also noted that the case involved economic regulation, where the government may adopt more detailed rules or regulations that could narrow the scope of the law.
Id.
at 504,
In this case, the state statute requires the plaintiffs to give blanket consent that effectively exempts their homes and computers from the Fourth Amendment, affecting not merely economic activity but core privacy interests in the home. In addition, the legal issue does not depend on further factual development that would better await further experience under the new law. These plaintiffs’ Fourth Amendment challenge is therefore ripe for decision.
In
United Transportation Union v. Foster,
The plaintiffs here, by contrast, face a credible, concrete prospect of enforcement of section 8(b) due to their close contact with law enforcement, their existing registration obligations, and the legislature’s decision to require broad “consent” to searches. In contrast to the railroad employees in Foster, these plaintiffs risk serious consequences in the event that section 8(b) is enforced: either prosecution for a felony or the immediate loss of their expectation of privacy in their homes, papers and effects. Absent declaratory or injunc-tive relief, the members of the plaintiff class must make their decisions in the next few days or weeks. They are entitled to seek relief now to avoid having to make that choice.
TV. “As Applied” or “Facial” Challenge?
Defendants also argue that the plaintiffs have brought a “facial” challenge to section
*877
8(b) and that the facial challenge should be rejected because, in the words of
United States v. Salerno,
The plaintiffs’ complaint seeks broad in-junctive relief, apparently against any enforcement of section 8(b), thus opening up plaintiffs’ challenge to the
Salerno
argument. But the court need not act so broadly as to say that section 8(b) cannot be applied to anyone at all. See,
e.g., Ayotte v. Planned Parenthood of Northern New England,
In this case, plaintiffs do not challenge the application of section 8(b) to persons on parole, probation, or other court supervision, and their Fourth Amendment theory does not reach so far. Plaintiffs’ theory is that the plaintiff class members have completely finished their criminal sentences, so that they cannot be forced to consent to surrender their Fourth Amendment rights. Under plaintiffs’ theory, in other words, section 8(b) may not be applied to members of the plaintiff class. A declaratory judgment or injunction against section 8(b) as applied to members of the plaintiff class can provide these plaintiffs with complete and effective relief. See
Ayotte,
*878 V. Merits of the Fourth Amendment Claim
Turning to the merits of the plaintiffs’ Fourth Amendment claim, the court concludes that section 8(b), as applied to the plaintiff class of persons who no longer are under any form of court supervision, will violate the plaintiffs’ Fourth Amendment rights. The parties have not cited, and the court has not found, any American law that attempts to authorize such a broad intrusion on personal privacy and security, without a warrant, probable cause, or even reasonable suspicion, for persons not in prison or subject to parole, probation, or other court supervision.
A. Entry into the Home
Section 8(b) cuts into the heart of the Fourth Amendment — privacy in the home. Section 8(b) requires the members of the plaintiff class to consent to the search of their personal computers or internet-capable devices “at any time.” Even if law enforcement officers chose to wait outside the home to demand the right to search a registrant’s portable devices (the statute is silent on the point), personal computers will most often be inside the home. By granting unlimited access to these devices, the Indiana legislation crosses the most fundamental boundary under the Fourth Amendment, and dispenses with the warrant requirement. The ability of the individual to retreat into his home, and there to be free from unreasonable intrusion by the government, stands “at the very core” of the protections granted by the Fourth Amendment. See
Silverman v. United States,
B. Required “Consent”
Valid consent to a search is a well-established exception to the warrant requirement under the Fourth Amendment. See
Schneckloth v. Bustamonte,
Section 8(b) requires those subject to the law to consent to searches of their computers, internet-capable devices, and internet use. If they refuse to sign the consent for authorizing the searches and monitoring, they are subject to prosecution for a felony. See Ind.Code § 11-8-8-17. The plaintiffs argue that the “consent” required under section 8(b) does not amount to valid consent under the law. The defendants effectively concede the point, and the *879 court agrees. 5 The “consent” required under the statute forces the plaintiffs to choose between allowing access to their personal computers, internet-capable devices, and internet use or facing criminal prosecution. This is no choice at all. The “consent” envisioned in section 8(b) will not serve to legitimize the proposed intrusions.
The defendants suggest that the plaintiffs could choose to avoid searches and monitoring under section 8(b) by choosing not to own a computer or internet-capable device. Def. Br. 6. Of course, a person also could choose not to write letters or use a telephone, and thereby avoid war-rantless searches of letters or surveillance of telephone calls. The voluntary use of the mails or telephone lines does not mean the user gives up her rights under the Fourth Amendment, and the same reasoning applies to computer and internet use.
In
United States v. Holm,
C. The Scope of Computer and Device Searches
Defendants argue that, because section 8(b) has not yet taken effect, the plaintiffs can only speculate about whether the searches and monitoring to which they must consent will amount to a “search” within the meaning of the Fourth Amendment. If the actual intrusions do not rise to that level, the defendants argue that the plaintiffs cannot claim Fourth Amendment protection, and there is no need to determine whether the statute’s intrusions are reasonable under the Constitution.
Defendants point out, for example, that the Fourth Amendment does not apply to installation of a pen register to record the numbers dialed on an individual’s phone,
Smith v. Maryland,
The defendants’ argument is not persuasive. First, none of the defendants’ analogies address the most basic point: Section 8(b) requires plaintiffs to consent to entry into and searches inside their homes, and at any time. Section 8(b) therefore forces plaintiffs to consent to the most fundamental sort of intrusion without a warrant or any applicable exception to the warrant requirement of the Fourth Amendment.
Second, the differences among different methods of extracting information from computers and other devices do not address the basic problem here, which is the forced waiver of Fourth Amendment rights. The court recognizes that some computer and internet monitoring techniques have been held not to amount to “searches” within the meaning of the Fourth Amendment, in essence to be comparable to a pen register on a telephone or an examination of the outside of an envelope in the mail. See,
e.g., United States v. Forrester,
Similarly, some courts have found that monitoring of content on public bulletin boards or on widely accessible computer
*881
networks does not amount to a search because there is no reasonable expectation of privacy in the content. See,
e.g., United States v. King,
The problem with this argument is that if the defendants’ intended monitoring of the plaintiffs’ computers and internet use would
not
amount to a search under the Fourth Amendment, then the defendants do not need section 8(b) or the plaintiffs’ consent at all. Section 8(b) would be a nullity. Section 8(b) would have effect only if law enforcement officials intend to carry out searches that would require a search warrant, but for the supposed “consent” under section 8(b). Courts presume that statutory provisions are intended to have effect and are not superfluous.
E.g., Connecticut Nat’l Bank v. Germain,
An additional problem with defendants’ argument is that the text of section 8(b) imposes no limits on the types or scope of searches of plaintiffs’ computers and internet use. The court appreciates that a state court might construe a statute narrowly to avoid constitutional problems. See,
e.g., A Woman’s Choice-East Side Women’s Clinic v. Neuman,
*882 In the meantime, of course, the plaintiffs are being told, under penalty of criminal prosecution, that they must give unlimited consent to any type of computer searches and internet monitoring that the defendants care to try, and that they must allow law enforcement authorities to enter their homes at any time to carry out the work. The result is the unconstitutional chilling of and intrusion upon plaintiffs’ privacy and security at home, and in their papers and effects. 7
Defendants also argue that section 8(b) is only a logical extension of felons’ loss of certain freedoms. Sex and violent offenders may be required to register information about their whereabouts and to submit DNA samples. See
Smith v. Doe,
The defense attempt to extend these cases to authorize section 8(b) is not persuasive. In section 8(b), the Indiana legislature has gone further and has taken an unprecedented step in stripping plaintiffs of their right to be secure in their homes, “papers,” and personal effects. Unlike registering public information or working in particular professions, the right to privacy in one’s home and personal effects is fundamental. See
Ker v. California,
YI. The State’s “Special Needs” Argument
“[I]t is settled for purposes of the Amendment that ‘except in certain carefully defined classes of cases’, a search of private property without proper consent is ‘unreasonable’ unless it has been authorized by a valid search warrant.”
Mancusi v. DeForte,
Defendants argue that the searches authorized by section 8(b) require no warrant because they serve a “special need” other than law enforcement. Defendants argue that sex crimes are a “serious threat in this Nation,”
Connecticut Department of Public Safety v. Doe,
As would be true in any cases dealing with serious crimes, it is easy to sympathize with the defendants’ argument. Although most sex crimes and violent crimes are prosecuted in state courts, federal courts see enough of them to recognize the dangers they pose. The defendants’ argument, however, loses sight of the boundaries of the special needs exception to the Fourth Amendment: the law’s primary purpose cannot be “to uncover evidence of ordinary criminal wrongdoing.”
City of Indianapolis v. Edmond,
*884
The Supreme Court’s discussion of a special needs exception began with searches by public school officials of students and their personal belongings. See
New Jersey v. T.L.O.,
Since
T.L.O.,
the Court has adopted Justice Blackmun’s formulation of a “special needs” exception and has recognized some other exceptional circumstances justifying this substitution under varying conditions. Certain employees in trusted public positions and some student populations may be tested for drugs without any individualized suspicion of drug use. See
Board of Education v. Earls,
Government officials also may search the homes of probationers pursuant to enumerated regulations and based on only reasonable suspicion. See
Griffin v. Wisconsin,
The Supreme Court has never substituted a balancing test for the warrant and probable cause requirements where the primary justification for the policy was to make it easier to detect criminal activity. See
Ferguson v. City of Charleston,
In Edmond, the City of Indianapolis had created a vehicle checkpoint program designed to catch drug users and traffickers. At each checkpoint, an officer approached every car and asked for the driver’s license and vehicle registration. During this interaction, the officer looked for signs of impairment and also looked into the car for evidence of criminal activity in plain view. A drug-sniffing dog also circled each car. More intrusive searches or seizures required particularized suspicion. Out of 1,161 vehicles stopped, police arrested fifty-five people for drug-related crimes and another forty-nine people for offenses unrelated to drugs. In finding that the Fourth Amendment prohibited such checkpoints, the Edmond Court distinguished the law enforcement purpose of the Indianapolis checkpoints from the unique needs of the limited permanent border and sobriety checkpoints approved in Martinez-Fuerte and Sitz:
Securing the border and apprehending drunk drivers are, of course, law enforcement activities, and law enforcement officers employ arrests and criminal prosecutions in pursuit of these goals. See Sitz,496 U.S. at 447 ,110 S.Ct. 2481 ; Martinez-Fuerte,428 U.S. at 545-550 ,96 S.Ct. 3074 . If we were to rest the case at this high level of generality, there would be little check on the ability of the authorities to construct roadblocks for almost any conceivable law enforcement purpose. Without drawing the line at roadblocks designed primarily to serve the general interest in crime control, the Fourth Amendment would do little to prevent such intrusions from becoming a routine part of American life.
The same can be said of various other illegal activities, if only to a lesser degree. But the gravity of the threat alone cannot be dispositive of questions concerning what means law enforcement officers may employ to pursue a given purpose. Rather, in determining whether individualized suspicion is required, we must consider the nature of the interests threatened and their connection to the particular law enforcement practices at issue. We are particularly reluctant to recognize exceptions to the general rule of individualized suspicion where governmental authorities primarily pursue their general crime control ends.
Id.
at 42-43,
In
Ferguson,
the Court invalidated another policy designed to deter a perceived “national epidemic”: pregnant women using cocaine.
Despite Charleston’s asserted purpose of protecting the health of mothers and their children, “the central and indispensable feature of the policy from its inception was the use of law enforcement to coerce the patients into substance abuse treatment.”
Id.
at 80,
The Supreme Court’s “special needs” cases admittedly seem to invite extension. It is not difficult to characterize any need as special, so as to make law enforcement easier with respect to particular categories of crimes. But if the motive for extending the doctrine is to detect and eradicate crime, then there is no limit to the special needs exception, and the exception will easily expand to replace the Fourth Amendment itself. That is why a special needs exception cannot be based on the ordinary and important law enforcement purpose of reducing crime. See
Ferguson,
The heart of defendants’ special needs argument here is that sex crimes are “a serious threat in this Nation,” see
Connecticut Department of Public Safety,
*888 Conclusion
Section 8(b), however well intentioned, seeks to achieve law enforcement goals with means that violate the Fourth Amendment, at least as applied to the plaintiff class, offenders who have completed their criminal sentences and who are no longer under any form of parole, probation, or other court supervision. These plaintiffs have rights under the Fourth Amendment. The State may not force them to waive those rights under threat of criminal prosecution for failing or refusing to do so. Final declaratory relief should be sufficient here, in a case brought as a Rule 23(b)(2) class action against all prosecuting attorneys in Indiana, to protect the plaintiffs’ Fourth Amendment rights. The court does not see a need at this time for the somewhat more intrusive relief of a permanent injunction. See generally
Dickinson v. Indiana State Election Bd.,
So ordered.
Notes
. Key terms are defined in new sections, Indiana Code §§ 11-8-8-1.2, -1.4, -1.6, and - 1.8.
. The same public law that added section 8(b)’s requirements for all persons who must register also added nearly identical consent-to-search provisions for sex offenders who are paroled (section 10, amending Indiana Code § 11 — 13—3—4(g)(2)), or who are put on probation (section 16, amending Indiana Code § 35-38-2-2.2).
. The court raised a question at the hearing about how section 8(b) would apply to a spouse’s computer. Defendants took the position that section 8(b)’s application to the "offender's personal computer or device” means that it applies only to a personal computer or device legally owned by the offender. If his wife or house-mate or employer owned the personal computer or device, defendants suggest, then section 8(b) does not apply and the offender’s use of the personal computer or other device is not subject to search or monitoring.
This interpretation would probably disappoint the Indiana General Assembly. It would apply not only to section 8(b) but also to the new, parallel provisions of mandatory conditions of parole and probation for sex offenders. Defendants’ interpretation would make it astonishingly easy for sex and violent offenders to evade the oversight the statute seeks to impose. (This interpretation would also open up lots of intriguing questions that police officers might have to answer in the middle of the night as they enter to search the offender’s personal computer or other device. How should marital property be treated? What if the computer is leased? Or owned by an employer? Would the police be authorized to search for a sales receipt or bill of sale? Would they be required to complete that search, and even seek a judicial determination, before carrying out their search?) While there may still be room for interpretation at the edges, the court expects that the *869 Indiana courts would apply section 8(b) to personal computers or other devices that the registered offender actually uses with the registered email addresses, user names, etc., regardless of the legal ownership of the devices in question.
. Based on close observation of the Supreme Court’s work, some commentators have concluded that the distinction between “facial” and "as applied” constitutional challenges is not helpful. Instead, it is more useful and accurate to focus on specific constitutional doctrines and standards that apply to the particular case, and to shape the relief based on those more specific standards. See, e.g., Richard H. Fallon,
As-Applied and Facial Chai-
*878
lenges and Third-Party Standing,
113 Harv. L.Rev. 1321, 1336-39, 1368-69 (2000); Michael C. Dorf,
Facial Challenges to State and Federal Statutes,
46 Stan. L.Rev. 235, 294 (1994).
Ayotte v. Planned Parenthood
provides a good example, where the Supreme Court reversed a lower court decision completely invalidating a state statute requiring prior parental notification before a minor could obtain an abortion, and remanded the case for consideration of whether a narrower remedy could cure the constitutional flaw.
. Although Forrester held that computer surveillance techniques that revealed the Internet Protocol [IP] addresses of web sites visited were indistinguishable from a telephone pen register, the court drew a careful line between monitoring IP addresses and monitoring the uniform resource locators ("URLs") of the pages visited:
A URL, unlike an IP address, identifies the particular document within a website that a person views and thus reveals much more information about the person’s Internet activity. For instance, a surveillance technique that captures IP addresses would show only that a person visited the New York Times' website at http://nytimes.com, whereas a technique that captures URLs would also divulge the particular articles the person viewed.
. Cases involving computer searches or internet monitoring of persons subject to continued court supervision (parole or probation), or searches of computers on an employer's network, have little relevance here because the expectations of privacy are reduced so much in both contexts. See, e.g..
United States v. Herndon,
. Section 8(b) also applies to those convicted of murder and voluntary manslaughter who must register as violent offenders under sections 11-8-8-5 and 11-8-8-7. This inclusion supports the point that the defendants' asserted special need of protecting children and others from sexual predators is not a limited need.
. The fact that section 8(b) does not specify who would be authorized to conduct the searches does not affect the special needs analysis or the larger conclusion that section 8(b) violates these plaintiffs’ Fourth Amendment rights. The sex and violent offender registry is administered and enforced by law enforcement and correction officials. Searches for evidence of criminal activity are an essential part of a state's police powers. That work cannot be delegated to private parties in an attempt to avoid responsibility for state action. See generally
Griffin v. Maryland,
