UNITED STATES v. WHITE
No. 13
Supreme Court of the United States
Argued November 10, 1969—Reargued October 20, 1970—Decided April 5, 1971
401 U.S. 745
Assistant Attorney General Wilson reargued the cause for the United States. With him on the briefs were Solicitor General Griswold, Joseph J. Connolly, John S. Martin, Jr., Jerome M. Feit, Beatrice Rosenberg, and Sidney M. Glazer.
John L. Boeger reargued the cause for respondent. With him on the brief were Morris A. Shenker and Chauncey Eskridge.
Abraham Glasser and Maurice Edelbaum filed a brief for John G. Broady et al. as amici curiae urging affirmance.
MR. JUSTICE WHITE announced the judgment of the Court and an opinion in which THE CHIEF JUSTICE, MR. JUSTICE STEWART, and MR. JUSTICE BLACKMUN join.
In 1966, respondent James A. White was tried and convicted under two consolidated indictments charging various illegal transactions in narcotics violative of
The Court of Appeals read Katz v. United States, 389 U. S. 347 (1967), as overruling On Lee v. United States, 343 U. S. 747 (1952), and interpreting the Fourth Amendment to forbid the introduction of the agents’ testimony in the circumstances of this case. Accordingly, the court reversed but without adverting to the fact that the transactions at issue here had occurred before Katz was decided in this Court. In our view, the Court of Appeals misinterpreted both the Katz case and the Fourth Amendment and in any event erred in applying the Katz case to events that occurred before that decision was rendered by this Court.2
I
Until Katz v. United States, neither wiretapping nor electronic eavesdropping violated a defendant‘s Fourth Amendment rights “unless there has been an official search and seizure of his person, or such a seizure of his papers or his tangible material effects, or an actual physical invasion of his house ‘or curtilage’ for the purpose of making a seizure.” Olmstead v. United States, 277 U. S. 438, 466 (1928); Goldman v. United States, 316 U. S. 129, 135–136 (1942). But where “eavesdropping was accomplished by means of an unauthorized physical penetration into the premises occupied” by the defendant, although falling short of a “technical trespass under the local property law,” the Fourth Amendment was violated and any evidence of what was seen and heard, as well as tangible objects seized, was considered the inadmissible fruit of an unlawful invasion. Silverman v. United States, 365 U. S. 505, 509, 511 (1961); see also Wong Sun v. United States, 371 U. S. 471 (1963); Berger v. New York, 388 U. S. 41, 52 (1967); Alderman v. United States, 394 U. S. 165, 177–178 (1969).
Katz v. United States, however, finally swept away doctrines that electronic eavesdropping is permissible under the Fourth Amendment unless physical invasion of a constitutionally protected area produced the challenged evidence. In that case government agents, without petitioner‘s consent or knowledge, attached a listening device to the outside of a public telephone booth and recorded the defendant‘s end of his telephone conversations. In declaring the recordings inadmissible in evidence in the absence of a warrant authorizing the surveillance, the Court overruled Olmstead and Goldman and held that the absence of physical intrusion into the telephone booth did not justify using electronic devices in listening to and recording Katz’ words, thereby vio-
The Court of Appeals understood Katz to render inadmissible against White the agents’ testimony concerning conversations that Jackson broadcast to them. We cannot agree. Katz involved no revelation to the Government by a party to conversations with the defendant nor did the Court indicate in any way that a defendant has a justifiable and constitutionally protected expectation that a person with whom he is conversing will not then or later reveal the conversation to the police.
Hoffa v. United States, 385 U. S. 293 (1966), which was left undisturbed by Katz, held that however strongly a defendant may trust an apparent colleague, his expectations in this respect are not protected by the Fourth Amendment when it turns out that the colleague is a government agent regularly communicating with the authorities. In these circumstances, “no interest legitimately protected by the Fourth Amendment is involved,” for that amendment affords no protection to “a wrongdoer‘s misplaced belief that a person to whom he voluntarily confides his wrongdoing will not reveal it.” Hoffa v. United States, at 302. No warrant to “search and seize” is required in such circumstances, nor is it when the Government sends to defendant‘s home a secret agent who conceals his identity and makes a purchase of narcotics from the accused, Lewis v. United States, 385 U. S. 206 (1966), or when the same agent, unbeknown to the defendant, carries electronic equipment to record the defendant‘s words and the evidence so gathered is later offered in evidence. Lopez v. United States, 373 U. S. 427 (1963).
Conceding that Hoffa, Lewis, and Lopez remained unaffected by Katz,3 the Court of Appeals nevertheless
To reach this result it was necessary for the Court of Appeals to hold that On Lee v. United States was no longer good law. In that case, which involved facts very similar to the case before us, the Court first rejected claims of a Fourth Amendment violation because the informer had not trespassed when he entered the defendant‘s premises and conversed with him. To this extent the Court‘s rationale cannot survive Katz. See 389 U. S., at 352–353. But the Court announced a second and independent ground for its decision; for it went on to say that overruling Olmstead and Goldman would be of no aid to On Lee since he “was talking confidentially and indiscreetly with one he trusted, and he was overheard. . . . It would be a dubious service to the genuine liberties protected by the Fourth Amendment to make them bedfellows with spurious liberties improvised by farfetched analogies which would liken eavesdropping on a conversation, with the connivance of one of the parties, to an unreasonable search or seizure. We find no violation of the Fourth Amendment here.” 343 U. S., at 753–754. We see no indication in Katz that the Court meant to disturb that understanding of the Fourth Amendment or to disturb the result reached in the On Lee case,4 nor are we now inclined to overturn this view of the Fourth Amendment.
Our problem is not what the privacy expectations of particular defendants in particular situations may be or the extent to which they may in fact have relied on the discretion of their companions. Very probably, individual defendants neither know nor suspect that their colleagues have gone or will go to the police or are carrying recorders or transmitters. Otherwise, conversation would cease and our problem with these encounters would be nonexistent or far different from those now
Inescapably, one contemplating illegal activities must realize and risk that his companions may be reporting to the police. If he sufficiently doubts their trustworthiness, the association will very probably end or never materialize. But if he has no doubts, or allays them, or risks what doubt he has, the risk is his. In terms of what his course will be, what he will or will not do or say, we are unpersuaded that he would distinguish between probable informers on the one hand and probable informers with transmitters on the other. Given the possibility or probability that one of his colleagues is cooperating with the police, it is only speculation to assert that the defendant‘s utterances would be substantially different or his sense of security any less if he also thought it possible that the suspected colleague is wired for sound. At least there is no persuasive evidence that the difference in this respect between the electronically equipped and the unequipped agent is substantial enough to require discrete constitutional recog-
Nor should we be too ready to erect constitutional barriers to relevant and probative evidence which is also accurate and reliable. An electronic recording will many times produce a more reliable rendition of what a defendant has said than will the unaided memory of a police agent. It may also be that with the recording in existence it is less likely that the informant will change his mind, less chance that threat or injury will suppress unfavorable evidence and less chance that cross-examination will confound the testimony. Considerations like these obviously do not favor the defendant, but we are not prepared to hold that a defendant who has no constitutional right to exclude the informer‘s unaided testimony nevertheless has a Fourth Amendment privilege against a more accurate version of the events in question.
It is thus untenable to consider the activities and reports of the police agent himself, though acting without a warrant, to be a “reasonable” investigative effort and lawful under the Fourth Amendment but to view the same agent with a recorder or transmitter as conducting an “unreasonable” and unconstitutional search and seizure. Our opinion is currently shared by Congress and the Executive Branch, Title III, Omnibus Crime Control and Safe Streets Act of 1968, 82 Stat. 212,
No different result should obtain where, as in On Lee and the instant case, the informer disappears and is un-
II
The Court of Appeals was in error for another reason. In Desist v. United States, 394 U. S. 244 (1969), we held that our decision in Katz v. United States applied only to those electronic surveillances that occurred subsequent to the date of that decision. Here the events in question took place in late 1965 and early 1966, long prior to Katz. We adhere to the rationale of Desist, see Williams v. United States, ante, p. 646. It was error for the Court of Appeals to dispose of this case based on its understanding of the principles announced in the Katz case. The court should have judged this case by the pre-Katz law and under that law, as On Lee clearly holds, the electronic surveillance here involved did not violate White‘s rights to be free from unreasonable searches and seizures.
The judgment of the Court of Appeals is reversed.
It is so ordered.
MR. JUSTICE BLACK, while adhering to his views expressed in Linkletter v. Walker, 381 U. S. 618, 640 (1965), concurs in the judgment of the Court for the reasons set forth in his dissent in Katz v. United States, 389 U. S. 347, 364 (1967).
I agree that Desist v. United States, 394 U. S. 244 (1969), requires reversal of the judgment of the Court of Appeals. Therefore, a majority of the Court supports disposition of this case on that ground. However, my Brothers DOUGLAS, HARLAN, and WHITE also debate the question whether On Lee v. United States, 343 U. S. 747 (1952), may any longer be regarded as sound law. My Brother WHITE argues that On Lee is still sound law. My Brothers DOUGLAS and HARLAN argue that it is not. Neither position commands the support of a majority of the Court. For myself, I agree with my Brothers DOUGLAS and HARLAN. But I go further. It is my view that the reasoning of both my Brothers DOUGLAS and HARLAN compels the conclusion that Lopez v. United States, 373 U. S. 427 (1963), is also no longer sound law. In other words, it is my view that current Fourth Amendment jurisprudence interposes a warrant requirement not only in cases of third-party electronic monitoring (the situation in On Lee and in this case) but also in cases of electronic recording by a government agent of a face-to-face conversation with a criminal suspect, which was the situation in Lopez. For I adhere to the dissent in Lopez, 373 U. S., at 446–471, in which, to quote my Brother HARLAN, post, at 778 n. 12, “the doctrinal basis of our subsequent Fourteenth Amendment decisions may be said to have had its genesis.” Katz v. United States, 389 U. S. 347 (1967), adopted that “doctrinal basis” and thus, it seems to me, agreed with the argument in the Lopez dissent that “subsequent decisions and subsequent experience have sapped whatever vitality [On Lee] may once have had; that it should now be regarded as overruled” and that the situation in Lopez “is rationally indistinguishable.” 373 U. S., at 447. The reasons in support of those conclusions are set forth fully in the Lopez
MR. JUSTICE DOUGLAS, dissenting.
I
The issue in this case is clouded and concealed by the very discussion of it in legalistic terms. What the ancients knew as “eavesdropping,” we now call “electronic surveillance“; but to equate the two is to treat man‘s first gunpowder on the same level as the nuclear bomb. Electronic surveillance is the greatest leveler of human privacy ever known. How most forms of it can be held “reasonable” within the meaning of the Fourth Amendment is a mystery. To be sure, the Constitution and Bill of Rights are not to be read as covering only the technology known in the 18th century. Otherwise its concept of “commerce” would be hopeless when it comes to the management of modern affairs. At the same time the concepts of privacy which the Founders enshrined in the Fourth Amendment vanish completely when we slavishly allow an all-powerful government, proclaiming law and order, efficiency, and other benign purposes, to penetrate all the walls and doors which men need to shield them from the pressures of a turbulent life around them and give them the health and strength to carry on.
That is why a “strict construction” of the Fourth Amendment is necessary if every man‘s liberty and privacy are to be constitutionally honored.
When Franklin D. Roosevelt on May 21, 1940, authorized wiretapping in cases of “fifth column” activities and sabotage and limited it “insofar as possible to aliens,” he said that “under ordinary and normal circumstances
“[T]he government seems to approach these dissident domestic organizations in the same fashion as it deals with unfriendly foreign powers. The government cannot act in this manner when only domestic political organizations are involved, even if those organizations espouse views which are inconsistent with our present form of government. To do so is to ride roughshod over numerous political freedoms which have long received constitutional protection. The government can, of course, investigate and prosecute criminal violations whenever these organizations, or rather their individual members, step over the line of political theory and general advocacy and commit illegal acts.”
Today no one perhaps notices because only a small, obscure criminal is the victim. But every person is the victim, for the technology we exalt today is everyman‘s master. Any doubters should read Arthur R. Miller‘s The Assault On Privacy (1971). After describing the monitoring of conversations and their storage in data banks, Professor Miller goes on to describe “human monitoring” which he calls the “ultimate step in mechanical snooping“—a device for spotting unorthodox or aberrational behavior across a wide spectrum. “Given the advancing state of both the remote sensing art and the capacity of computers to handle an uninterrupted and synoptic data flow, there seem to be no physical barriers left to shield us from intrusion.” Id., at 46.
When one reads what is going on in this area today, our judicial treatment of the subject seems as remote from
II
We held in Berger v. New York, 388 U. S. 41, that wiretapping is a search and seizure within the meaning of the Fourth Amendment and therefore must meet its requirements, viz., there must be a prior showing of probable cause, the warrant authorizing the wiretap must particularly describe “the place to be searched, and the persons or things to be seized,” and that it may not have the breadth, generality, and long life of the general warrant against which the Fourth Amendment was aimed.
In Katz v. United States, 389 U. S. 347, we held that an electronic device, used without trespass onto any given enclosure (there a telephone booth), was a search for which a Fourth Amendment warrant was needed.1 MR. JUSTICE STEWART, speaking for the Court, said: “Wherever a man may be, he is entitled to know that he will remain free from unreasonable searches and seizures.” Id., at 359.
As a result of Berger and of Katz, both wiretapping and electronic surveillance through a “bug” or other device are now covered by the Fourth Amendment.
There were prior decisions representing an opposed view. In On Lee v. United States, 343 U. S. 747, an
Lopez v. United States, 373 U. S. 427, was also pre-Berger and pre-Katz. The government agent there involved carried a pocket wire recorder which the Court said “was not planted by means of an unlawful physical invasion of petitioner‘s premises under circumstances which would violate the Fourth Amendment.” Id., at 439.
MR. JUSTICE BRENNAN, dissenting, stated the philosophy of Katz soon to be adopted:
“[T]here is a qualitative difference between electronic surveillance, whether the agents conceal the devices on their persons or in walls or under beds, and conventional police stratagems such as eavesdropping and disguise. The latter do not so seriously intrude upon the right of privacy. The risk of being overheard by an eavesdropper or betrayed by an informer or deceived as to the identity of one with whom one deals is probably inherent in the conditions of human society. It is the kind of risk we necessarily assume whenever we speak. But as soon as electronic surveillance comes into play, the risk changes crucially. There is no security from that kind of eavesdropping, no way of mitigating the risk, and so not even a residuum of true privacy. . . .
“. . . Electronic aids add a wholly new dimension to eavesdropping. They make it more penetrating, more indiscriminate, more truly obnoxious to a free
society. Electronic surveillance, in fact, makes the police omniscient; and police omniscience is one of the most effective tools of tyranny.” 373 U. S., at 465–466.
It is urged by the Department of Justice that On Lee be established as the controlling decision in this field. I would stand by Berger and Katz and reaffirm the need for judicial supervision2 under the Fourth Amendment of the use of electronic surveillance which, uncontrolled, promises to lead us into a police state.
These were wholly pre-arranged episodes of surveillance. The first was in the informant‘s home to which respondent had been invited. The second was also in the informer‘s home, the next day. The third was four days later at the home of the respondent. The fourth was in the informer‘s car two days later. Twelve days after that a meeting in the informer‘s home was intruded upon. The sixth occurred at a street rendezvous. The seventh was in the informer‘s home and the eighth in a restaurant owned by respondent‘s mother-in-law. So far as time is concerned there is no excuse for not seeking a warrant. And while there is always an effort involved in preparing affidavits or other evidence in support of a showing of probable cause, that burden was given constitutional sanction in the Fourth Amendment against the activities of the agents of George III. It was designed not to protect criminals but to protect everyone‘s privacy.
On Lee and Lopez are of a vintage opposed to Berger and Katz. However they may be explained, they are
“We simply cannot say that the protections provided by the warrant procedure are not needed in this context; broad statutory safeguards are no substitute for individualized review, particularly when those safeguards may only be invoked at the risk of a criminal penalty.” Id., at 533.
In Chimel v. California, 395 U. S. 752, in considering the constitutionality of a search incident to an arrest we held that, while the area in the immediate reach of an arrestee is “reasonable” though made without a warrant, a search beyond that zone may generally be made “only under the authority of a search warrant.” Id., at 763. And in two “stop and frisk” cases, Terry v. Ohio, 392 U. S. 1, and Davis v. Mississippi, 394 U. S. 721, we held that any restraint of the person, however brief, was subject to judicial inquiry on “reasonableness” (392 U. S., at 19) and that “the Fourth Amendment governs all intrusions by agents of the public upon personal security. . . .” Id., at 18 n. 15.
We have moved far away from the rationale of On Lee and Lopez and only a retrogressive step of large dimensions would bring us back to it.
The threads of thought running through our recent decisions are that these extensive intrusions into privacy
Monitoring, if prevalent, certainly kills free discourse and spontaneous utterances. Free discourse—a First Amendment value—may be frivolous or serious, humble or defiant, reactionary or revolutionary, profane or in good taste; but it is not free if there is surveillance.4
The philosophy of the value of privacy reflected in the Fourth Amendment‘s ban on “unreasonable searches and seizures” has been forcefully stated by a former Attorney General of the United States:
“Privacy is the basis of individuality. To be alone and be let alone, to be with chosen company, to say what you think, or don‘t think, but to say what you will, is to be yourself. Solitude is imperative, even in a high rise apartment. Personality develops from within. To reflect is to know yourself. Character is formed through years of self-examination. Without this opportunity, character will be formed largely by uncontrolled external social stimulations. Americans are excessively homogenized already.
“Few conversations would be what they are if the speakers thought others were listening. Silly, secret, thoughtless and thoughtful statements would all be affected. The sheer numbers in our lives, the anonymity of urban living and the inability to influence things that are important are depersonalizing and dehumanizing factors of modern life. To penetrate the last refuge of the individual, the precious little privacy that remains, the basis of individual dignity, can have meaning to the quality of our lives that we cannot foresee. In terms of present values, that meaning cannot be good.
“Invasions of privacy demean the individual. Can a society be better than the people composing it? When a government degrades its citizens, or permits them to degrade each other, however beneficent the specific purpose, it limits opportunities for individual fulfillment and national accomplishment. If America permits fear and its failure to make basic social reforms to excuse police use of secret electronic surveillance, the price will be dear indeed. The practice is incompatible with a free society.” R. Clark, Crime in America 287 (1970).
Now that the discredited decisions in On Lee and Lopez are resuscitated and revived, must everyone live in fear that every word he speaks may be transmitted or recorded5 and later repeated to the entire world? I can
imagine nothing that has a more chilling effect on people speaking their minds and expressing their views on important matters. The advocates of that regime should spend some time in totalitarian countries and learn first-hand the kind of regime they are creating here.
office, that he is now spending thousands of dollars having his office searched each day, taking his phone apart every morning, and stationing a special guard outside his office 24 hours a day.
“He is one of a growing number of men in industry who live in constant fear that what they say is being listened to by their competitor.” 19 Adm. L. Rev. 442, 444. And see E. Long, The Intruders (1966).
6“A technological breakthrough in techniques of physical surveillance now makes it possible for government agents and private persons to penetrate the privacy of homes, offices, and vehicles; to survey individuals moving about in public places; and to monitor the basic channels of communication by telephone, telegraph, radio, television, and data line. Most of the ‘hardware’ for this physical surveillance is cheap, readily available to the general public, relatively easy to install, and not presently illegal to own. As of the 1960‘s, the new surveillance technology is being used widely by government agencies of all types and at every level of government, as well as by private agents for a rapidly growing number of businesses, unions, private organizations, and individuals in every section of the United States. Increasingly, permanent surveillance devices have been installed in facilities used by employees or the public. While there are defenses against ‘outside’ surveillance, these are so costly and complex and demand such constant vigilance that their use is feasible only where official or private matters of the highest security are to be protected. Finally, the scientific prospects for the next decade indicate a continuing increase in the range and versatility of the listening and watching devices, as well as the possibility of computer processing of recordings to identify automatically the speakers or topics under surveillance. These advances will come just at the time when personal contacts, business affairs, and government operations are being channeled more and more into electronic systems such as data-phone lines and computer communications.” A. Westin, Privacy and Freedom 365-366 (1967).
III
The decision not to make Katz retroactive to any electronic surveillance which occurred prior to December 18, 1967 (the day we decided Katz), is not, in my view, a tenable one for the reasons stated by MR. JUSTICE HARLAN and me in our dissents in Desist v. United States, 394 U. S. 244, 255, 256 (1969).
APPENDIX I TO OPINION OF DOUGLAS, J., DISSENTING
THE WHITE HOUSE
WASHINGTON
May 21, 1940
CONFIDENTIAL
MEMORANDUM FOR THE ATTORNEY GENERAL
I have agreed with the broad purpose of the Supreme Court decision relating to wire-tapping in investigations. The Court is undoubtedly sound both in regard to the use of evidence secured over tapped wires in the prosecution of citizens in criminal cases; and is also right in its opinion that under ordinary and normal circumstances wire-tapping by Government agents should not be carried on for the excellent reason that it is almost bound to lead to abuse of civil rights.
However, I am convinced that the Supreme Court never intended any dictum in the particular case which it decided to apply to grave matters involving the defense of the nation.
It is, of course, well known that certain other nations have been engaged in the organization of propaganda of so-called “fifth columns” in other countries and in preparation for sabotage, as well as in actual sabotage.
You are, therefore, authorized and directed in such cases as you may approve, after investigation of the need in each case, to authorize the necessary investigation agents that they are at liberty to secure information by listening devices directed to the conversation or other communications of persons suspected of subversive activities against the Government of the United States, including suspected spies. You are requested furthermore to limit these investigations so conducted to a minimum and to limit them insofar as possible to aliens.
[SEAL]
/s/ F. D. R.
APPENDIX II TO OPINION OF DOUGLAS, J., DISSENTING
ADMINISTRATIVELY CONFIDENTIAL
THE WHITE HOUSE
WASHINGTON
June 30, 1965
MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES
I am strongly opposed to the interception of telephone conversations as a general investigative technique. I recognize that mechanical and electronic devices may sometimes be essential in protecting our national security. Nevertheless, it is clear that indiscriminate use of those investigative devices to overhear telephone conversations, without the knowledge or consent of any of the persons involved, could result in serious abuses and invasions of privacy. In my view, the invasion of privacy of communications is a highly offensive practice which should be engaged in only where the national security is at
- No federal personnel is to intercept telephone conversations within the United States by any mechanical or electronic device, without the consent of one of the parties involved, (except in connection with investigations related to the national security).
- No interception shall be undertaken or continued without first obtaining the approval of the Attorney General.
- All federal agencies shall immediately conform their practices and procedures to the provisions of this order.
Utilization of mechanical or electronic devices to overhear non-telephone conversations is an even more difficult problem, which raises substantial and unresolved questions of Constitutional interpretation. I desire that each agency conducting such investigations consult with the Attorney General to ascertain whether the agency‘s practices are fully in accord with the law and with a decent regard for the rights of others.
Every agency head shall submit to the Attorney General within 30 days a complete inventory of all mechanical and electronic equipment and devices used for or capable of intercepting telephone conversations. In addition, such reports shall contain a list of any interceptions currently authorized and the reasons for them.
/s/ Lyndon B. Johnson
MR. JUSTICE HARLAN, dissenting.
The uncontested facts of this case squarely challenge the continuing viability of On Lee v. United States, 343 U. S. 747 (1952). As the plurality opinion of MR. JUS-
I think that a perception of the scope and role of the
I
Before turning to matters of precedent and policy, several preliminary observations should be made. We deal here with the constitutional validity of instantaneous third-party electronic eavesdropping, conducted by federal law enforcement officers, without any prior judicial approval of the technique utilized, but with the consent and cooperation of a participant in the conversation,1 and where the substance of the matter electronically overheard2 is related in a federal criminal trial by those who eavesdropped as direct, not merely corroborative, evidence of the guilt of the nonconsenting party. The magnitude of the issue at hand is evidenced not simply by the obvious doctrinal difficulty of weighing such activity in the
II
On these premises I move to the problem of third-party “bugging.” To begin by tracing carefully the evolution of
A
On Lee involved circumstances virtually identical to those now before us. There, Government agents enlisted the services of Chin Poy, a former friend of Lee, who was suspected of engaging in illegal narcotics traffic. Poy was equipped with a “minifon” transmitting device which enabled outside Government agents to monitor Poy‘s conversations with Lee. In the privacy of his laundry, Lee made damaging admissions to Poy which were overheard by the agents and later related at trial. Poy did not testify. Mr. Justice Jackson, writing for five Justices, held the testimony admissible. Without reaching the question of whether a conversation could be the subject of a “seizure” for
It is, of course, true that the opinion in On Lee drew some support from a brief additional assertion that “eavesdropping on a conversation, with the connivance of one of the parties” raises no
By 1963, when we decided Lopez v. United States, 373 U. S. 427, four members of the Court were prepared to pronounce On Lee and Olmstead v. United States, 277 U. S. 438 (1928), dead.8 The pyre, they reasoned, had been stoked by decisions like Wong Sun v. United States, 371 U. S. 471 (1963), which, on the one hand, expressly brought verbal communication within the sweep of the
inforced our Silverman and Jones decisions which “refused to crowd the
Although the Court‘s decision in Lopez is cited by the Government as a reaffirmation of On Lee, it can hardly be thought to have nurtured the questionable rationale of that decision or its much-criticized ancestor, Olmstead. To the discerning lawyer Lopez could only give pause, not comfort. While the majority opinion, of which I was the author, declined to follow the course favored by the dissenting and concurring Justices by sounding the death knell for Olmstead and On Lee, our holding, despite an allusion to the absence of “an unlawful . . . invasion of a constitutionally protected area,” 373 U. S., at 438-439, was bottomed on two premises: the corroborative use that was made of the tape recordings, which increased reliability in the factfinding process, and the absence of a “risk” not fairly assumed by petitioner. The tape recording was made by a participant in the conversation and the opinion emphasized this absence of a third-party intrusion, expressly noting that there was no “electronic eavesdropping on a private conversation which government agents could not otherwise have overheard.” 373 U. S., at 440.10 As I point out in Part III
While Lopez cited On Lee without disavowal of its holding, 373 U. S., at 438, it is entirely accurate to say that we did not there reaffirm it.11 No decision since Lopez gives a breath of life to the reasoning that led to the On Lee and Olmstead results, and it required little clairvoyance to predict the demise of the basic rationale of On Lee and Olmstead foreshadowed by our subsequent opinions in Osborn v. United States, 385 U. S. 323 (1966), and Berger v. New York, 388 U. S. 41 (1967).
Only three years after Lopez, MR. JUSTICE STEWART writing for the Court in Osborn v. United States, supra, expressly abjured reliance on Lopez and, instead, approved identical conduct based on the “circumstances under which the tape recording was obtained in [that] case,” facts that involved “using [a recorder] under the most precise and discriminate circumstances, circumstances which fully met the ‘requirement of particularity’
Since Osborn our decisions have shown no tolerance for the old dividing lines resting, as they did, on fiction and common-law distinctions without sound policy justification in the realm of values protected by the
Certainly if Osborn, Warden, and Camara did not plainly draw into question the vigor of earlier precedents, Berger v. New York, 388 U. S. 41, did, and expunged any remnants of former doctrine which might have been
“[T]he ‘indiscriminate use of such [bugging] devices in law enforcement raises grave constitutional questions under the
Fourth andFifth Amendments ,’ and imposes ‘a heavier responsibility on this Court in its supervision of the fairness of procedures . . . .‘” 388 U. S., at 56, quoting from Osborn v. United States, 385 U. S. 323, 329 n. 7.
Nor did the Court waver in resolve in the face of respondent‘s dire prediction that “neither a warrant nor a statute authorizing eavesdropping can be drawn so as to meet the
If Berger did not flatly sound a dirge for Olmstead, it articulated principles that led MR. JUSTICE DOUGLAS, by way of concurrence, to comment on its quiet burial. 388 U. S., at 64. While it was left to Katz to perform the last rites, that decision inevitably followed from Osborn and Berger. The Berger majority‘s affirmative citation of On Lee for the principle that “under specific conditions and circumstances” eavesdropping may be lawful, 388 U. S., at 63, serves only to underscore the emerging operative assumptions: that the particular circumstances of each case will be scrutinized to the end of ascertaining the reasonableness of the search, and that will depend in large measure on whether prior judicial authorization, based on a particularized showing, has been obtained. Katz v. United States, supra.
Viewed in perspective, then, Katz added no new dimension to the law. At most it was a formal dispatch of Olmstead and the notion that such problems may usefully be resolved in the light of trespass doctrine, and, of course, it freed from speculation what was already evident, that On Lee was completely open to question.
B
But the decisions of this Court since On Lee do more than demonstrate that the doctrine of that case is wholly open for reconsideration, and has been since well before Katz was decided. They also establish sound general principles for application of the
Especially when other recent
In Camara the Court brought under the
In bringing such searches within the ambit of the warrant requirement, Camara rejected the notion that the “less hostile” nature of the search relegated this invasion of privacy to the “periphery” of
The scope and meaning of the rule have emerged with even greater clarity by virtue of our holdings setting the boundaries for the exceptions. Recently, in Chimel v. California, 395 U. S. 752 (1969), we reiterated the importance of the prior independent determination of a neutral magistrate and underscored its centrality to the reasonableness requirement of the
To complete the tapestry, the strands of doctrine reflected in the search cases must be interwoven with the Court‘s other contemporary holdings. Most signifi-
III
A
That the foundations of On Lee have been destroyed does not, of course, mean that its result can no longer stand. Indeed, the plurality opinion today fastens upon our decisions in Lopez, Lewis v. United States, 385 U. S. 206 (1966), and Hoffa v. United States, 385 U. S. 293 (1966), to resist the undercurrents of more recent cases emphasizing the warrant procedure as a safeguard to privacy. But this category provides insufficient support. In each of these cases the risk the general populace faced was different from that surfaced by the instant case. No surreptitious third ear was present, and in each opinion that fact was carefully noted.
The plurality opinion seeks to erase the crucial distinction between the facts before us and these holdings by the following reasoning: if A can relay verbally what is revealed to him by B (as in Lewis and Hoffa), or record and later divulge it (as in Lopez), what difference does it make if A conspires with another to betray B by contemporaneously transmitting to the other all that is said? The contention is, in essence, an argument that the distinction between third-party monitoring and other undercover techniques is one of form and not substance. The force of the contention depends on the evaluation of two separable but intertwined assumptions: first, that there is no greater invasion of privacy in the third-party situation, and, second, that uncontrolled consensual surveillance in an electronic age is a tolerable technique of law enforcement, given the values and goals of our political system.21
Since it is the task of the law to form and project, as well as mirror and reflect, we should not, as judges, merely recite the expectations and risks without examining the desirability of saddling them upon society. The critical question, therefore, is whether under our system of government, as reflected in the
This question must, in my view, be answered by assessing the nature of a particular practice and the likely extent of its impact on the individual‘s sense of security balanced against the utility of the conduct as a technique of law enforcement. For those more extensive intrusions that significantly jeopardize the sense of security which is the paramount concern of
B
The impact of the practice of third-party bugging, must, I think, be considered such as to undermine that confidence and sense of security in dealing with one another that is characteristic of individual relationships between citizens in a free society. It goes beyond the impact on privacy occasioned by the ordinary type of “informer” investigation upheld in Lewis and Hoffa. The argument of the plurality opinion, to the effect that it is irrelevant whether secrets are revealed by the mere tattletale or the transistor, ignores the differences occasioned by third-party monitoring and recording which insures full and accurate disclosure of all that is said, free of the possibility of error and oversight that inheres in human reporting.
Authority is hardly required to support the proposition that words would be measured a good deal more carefully and communication inhibited if one suspected his conversations were being transmitted and transcribed. Were third-party bugging a prevalent practice, it might well smother that spontaneity—reflected in frivolous, impetuous, sacrilegious, and defiant discourse—that liberates daily life.23 Much off-hand exchange is easily for-
It matters little that consensual transmittals are less obnoxious than wholly clandestine eavesdrops. This was put forward as justification for the conduct in Boyd v. United States, 116 U.S. 616 (1886), where the Government relied on mitigating aspects of the conduct in question. The Court, speaking through Mr. Justice Bradley, declined to countenance literalism:
“Though the proceeding in question is divested of many of the aggravating incidents of actual search and seizure, yet, as before said, it contains their substance and essence, and effects their substantial purpose. It may be that it is the obnoxious thing in its mildest and least repulsive form; but illegitimate and unconstitutional practices get their first footing in that way, namely, by silent approaches and slight deviations from legal modes of procedure.” 116 U. S., at 635.
Finally, it is too easy to forget—and, hence, too often forgotten—that the issue here is whether to interpose a search warrant procedure between law enforcement agencies engaging in electronic eavesdropping and the public generally. By casting its “risk analysis” solely in terms of the expectations and risks that “wrongdoers” or “one contemplating illegal activities” ought to bear, the plurality opinion, I think, misses the mark entirely. On Lee does not simply mandate that criminals must daily run the risk of unknown eavesdroppers prying into their private affairs; it subjects each and every law-abiding member of society to that risk. The very purpose of interposing the
The
IV
I reach these conclusions notwithstanding seemingly contrary views espoused by both Congress and an American Bar Association study group.25 Both the ABA
I find in neither the ABA study nor
The
“The principles laid down in this opinion [speaking of Entick v. Carrington, 19 How. St. Tr. 1029 (1765)] affect the very essence of constitutional liberty and security. They reach farther than the concrete form of the case then before the court, with its adventitious circumstances; they apply to all invasions on the part of the government and its employes of the sanctity of a man‘s home and the privacies of life. It is not the breaking of his doors, and the rummaging of his drawers, that constitutes the essence of the offence; but it is the invasion of his indefeasible right of personal security....”
What this means is that the burden of guarding privacy in a free society should not be on its citizens; it is the Government that must justify its need to electronically eavesdrop.
V
Not content to rest upon the proposition that On Lee remains sound law, the plurality opinion would also hold that the Court of Appeals erred further in disposing “of this case based on its understanding of the principles announced in the Katz case,” ante, at 754, because Desist v. United States, 394 U.S. 244 (1969), held that Katz governed only governmental conduct occurring after the decision in Katz. It is difficult to know where to begin to analyze such a truly extraordinary assertion respecting the operation of the judicial process.
Because this case is here on direct review, even were the issues squarely controlled by Katz, I would unhesitatingly apply here the rule there adopted, for the reasons first expressed in my dissent in Desist, 394 U. S., at 256, and elaborated in my separate opinion in Mackey
Indeed, I find this decision even more troubling than Desist. For the errors of Desist are not merely repeated here; they are plainly compounded. Upon the plurality opinion‘s own analysis of the instant case, it is clear that Katz has no direct relevance to the present viability of On Lee. ”Katz involved no revelation to the Government by a party to conversations with the defendant nor did the Court indicate in any way that a defendant has a justifiable and constitutionally protected expectation that a person with whom he is conversing will not then or later reveal the conversation to the police.” Ante, at 749. As I have already shown, one need not cite Katz to demonstrate the inability of On Lee to survive recent developments without at least substantial reformulation. To hold, then, that a mere citation of Katz, or drawing upon the philosophical underpinnings of that case in order to employ a general constitutional approach in tune with that of the decisions of this Court, conflicts with the holding of Desist is to let this obsession with prospectivity run riot.
I would hold that On Lee is no longer good law and affirm the judgment below.
MR. JUSTICE MARSHALL, dissenting.
I am convinced that the correct view of the
Notes
The relaxing of constitutional requirements by the Executive Branch is apparent from the Appendices to this dissent.
I agree with the plurality opinion, ante, at 747 n. 1, that the issue of the informer‘s consent to utilization of this technique is not properly before us. Whether persons can, consistent with constitutional prohibitions, be tricked or coerced into transmitting their conversations, with or without prior judicial approval, and, if not, whether other parties to the conversation would have standing to object to the admission against them of evidence so obtained, cf. Alderman v. United States, 394 U. S. 165 (1969), are questions upon which I express no opinion.The tyranny of surveillance that is not supervised in the Fourth Amendment manner is told by Judge Gesell in United States v. Jones, 292 F. Supp. 1001, 1008–1009; where the competition between agencies and the uncontrolled activities of subordinates ended up with Government itself playing an ignoble role.
Cf. American Bar Association, Project on Standards for Criminal Justice, Electronic Surveillance §§ 4.1, 5.2 (Approved Draft 1971).
A. Westin, Privacy and Freedom 131 (1967). This investigative technique is also used to unearth “political” crimes. “Recordings of the private and public meetings of suspect groups [have] been growing. Police in Miami, Florida, used a hidden transmitter on a police agent to record statements made at meetings of a right-wing extremist group suspected of planning acts of terrorism. In 1964 a police undercover agent obtained recordings of incendiary statements by the leader of a Communist splinter movement in Harlem, at private meetings and at a public rally, which served as the basis for his conviction for attempting to overthrow the state government.” Ibid.Congressman Mikva of Illinois, in speaking of the spread of military surveillance of civilians—another facet of the problem in the instant case—recently said:
“At one pont they referred to ‘infiltrating public meetings’ at which Senator Stevenson and I spoke, and I wondered how you ‘infiltrate’ a public meeting. Perhaps they wanted to compile evidence to be used in some future military court—evidence that I was disloyal to the military establishment because I suggested that we cut manpower by ten per cent last year, or because I voted against their appropriations in the two years I‘ve been here.
“When they start investigating political figures, there is no place you can draw the line and maintain any kind of civilian control. . . .
“We have become a fearful people. There was a time when we feared only our enemies abroad. Now we seem to be as fearful of our enemies at home, and depending on whom you talk to, those enemies can include people under thirty, people with foreign names, people of different races, people in the big cities. We have become a suspicious nation, as afraid of being destroyed from within as from without.
“Unfortunately, the manifestations of that kind of fear and suspicion are police-state measures.” A Nation in Fear, The Progressive, Feb. 1971, pp. 18, 19–20.
Prior to Osborn v. United States, 385 U. S. 323 (1966), and Katz the issue before us, if raised, was usually dismissed in a routine fashion with a citation to On Lee, buttressed by a citation to Lopez v. United States, 373 U. S. 427 (1963), with no attempt to distinguish the two cases despite the narrow rationale of the latter. See, e. g., United States v. Pasquinzo, 334 F. 2d 74, 75 (CA6 1964); Maddox v. United States, 337 F. 2d 234 (CA5 1964); but cf. United States v. Stone, 232 F. Supp. 396 (ND Tex. 1964). The few authorities post-dating Katz have divided on the continued viability of the On Lee result, compare, e. g., United States v. Jones, 292 F. Supp. 1001 (DC 1968), and cases cited therein, 292 F. Supp., at 1008, with Dancy v. United States, 390 F. 2d 370 (CA5 1968) (Judge Fahy dissenting); United States v. Kaufer, 406 F. 2d 550 (CA2 1969); People v. Fiedler, 30 App. Div. 2d 476, 294 N. Y. S. 2d 368 (1968) (Justices Goldman and Bastow dissenting), aff‘d without opinion, 24 N. Y. 2d 960, 250 N. E. 2d 75 (1969). Perhaps the most comprehensive treatments, examining both the case law and policy considerations underlying the precise issue—electronic surveillance with the consent of one of the parties—are by Professor Greenawalt, The Consent Problem in Wiretapping & Eavesdropping: Surreptitious Monitoring With the Consent of a Participant in a Conversation, 68 Col. L. Rev. 189 (1968), and Professor Kitch, Katz v. United States: The Limits of the Fourth Amendment, 1968 Sup. Ct. Rev. 133. For an interesting analysis of the impact of nonconsensual bugging on privacy and the role of prior judicial authorization see Spritzer, Electronic Surveillance By Leave of the Magistrate: The Case in Opposition, 118 U. Pa. L. Rev. 169 (1969). In addition, see American Bar Association, Project on Standards for Criminal Justice, Electronic Surveillance § 4.1 (Approved Draft 1971); J. Landynski, Search and Seizure and the Supreme Court 198-244 (1966); Schwartz, The Legitimation of Electronic Eavesdropping: The Politics of “Law and Order,” 67 Mich. L. Rev. 455, 495-496 (1969); S. Dash, R. Schwartz, & R. Knowlton, The Eavesdroppers 421-441 (1959); Comment, Eavesdropping, Informers, and the Right of Privacy: A Judicial Tightrope, 52 Cornell L. Q. 975 (1967); King, Electronic Surveillance and Constitutional Rights: Some Recent Developments and Observations, 33 Geo. Wash. L. Rev. 240 (1964); Note, Wiretapping and Electronic Surveillance—Title III of the Crime Control Act of 1968, 23 Rutgers L. Rev. 319 (1969); Blakey & Hancock, A Proposed Electronic Surveillance Control Act, 43 Notre Dame Law. 657 (1968); Kamisar, The Wiretapping-Eavesdropping Problem: A Professor‘s View, 44 Minn. L. Rev. 891 (1960); Note, From Private Places to Personal Privacy: A Post-Katz Study of Fourth Amendment Protection, 43 N. Y. U. L. Rev. 968, 973-974 (1968); Scoular, Wiretapping and Eavesdropping Constitutional Development from Olmstead to Katz, 12 St. Louis L. J. 513 (1968); 20 Syracuse L. Rev. 791 (1969); 14 Vill. L. Rev. 758 (1969).Senator Edward Long, who intensively investigated wiretapping and “bugging” said:
“You would be amazed at the different ways you can now be ‘bugged.’ There is today a transmitter the size of an aspirin tablet which can help transmit conversations in your room to a listening post up to 10 miles away.
“An expert can devise a bug to fit into almost any piece of furniture in your room. And even if you find the bug, you will have no evidence of who put it there. A United States Senator was bugged by a transmitter secretly placed into a lamp which his wife was having fixed at the shop. When experts searched for the transmitter, it was gone.
“A leading electronics expert told my Subcommittee last year that wiretapping and bugging in industrial espionage triples every year. He said that new bugging devices are so small and cleverly concealed that it takes search equipment costing over one hundred thousand dollars and an expert with 10 years of field experience to discover them. Ten years ago, the same search for bugs could have been done with equipment costing only one-fourth as much.
“In California we found a businessman who had been so frightened by electronic eavesdropping devices which had been concealed in his
See Goldman v. United States, 316 U. S. 129 (1942). Silverman v. United States, 365 U. S. 505 (1961), made explicit that which was still unclear after Goldman: words overheard by trespass are subject to“The conduct of Chin Poy and agent Lee did not amount to an unlawful search and seizure such as is proscribed by the
“But petitioner cannot raise the undecided question, for here no trespass was committed. Chin Poy entered a place of business with the consent, if not by the implied invitation, of the petitioner.”
“The requirements of the
Judge Gesell in reviewing the precedents has recently concluded that it was Katz, read in conjunction with Osborn, that buried On Lee. United States v. Jones, 292 F. Supp. 1001, 1008 (DC 1968).
“The point of the
See also Terry v. Ohio, 392 U. S. 1 (1968); United States v. Ventresca, 380 U. S. 102 (1965); Aguilar v. Texas, 378 U. S. 108 (1964); Wong Sun v. United States, 371 U. S. 471 (1963); Chapman v. United States, 365 U. S. 610 (1961); Jones v. United States, 362 U. S. 257 (1960); Jones v. United States, 357 U. S. 493 (1958); Giordenello v. United States, 357 U. S. 480 (1958); United States v. Jeffers, 342 U. S. 48 (1951); McDonald v. United States, 335 U. S. 451 (1948); Trupiano v. United States 334 U. S. 699 (1948); United States v. Lefkowitz, 285 U. S. 452 (1932); Agnello v. United States, 269 U. S. 20 (1925).
The warrant procedure need not always entail an inquiry into the existence of probable cause in the usual sense. Cf. Camara v. Municipal Court. For example, where an informer is being sent in to investigate a dangerous crime, and there is reason to believe his person would be in danger, monitoring might be justified and a warrant issued even though no probable cause existed to believe the particular meeting would provide evidence of particular criminal activity. Cf. Warden v. Hayden, 387 U. S. 294, 298 (1967); McDonald v. United States, 335 U. S., at 455-456; Johnson v. United States, 333 U. S., at 14-15; Ker v. California, 374 U. S. 23 (1963); Trupiano v. United States, 334 U. S. 699 (1948), all taking the view that exceptions to the warrant requirement may be made in narrowly defined special circumstances.
“It is obvious that the political system in each society will be a fundamental force in shaping its balance of privacy, since certain patterns of privacy, disclosure, and surveillance are functional neces-
sities for particular kinds of political regime. This is shown most vividly by contrasting privacy in the democratic and the totalitarian state.” Westin, supra, n. 3, at 23.Professor Westin, in projecting the consequences of unsupervised participant monitoring, has observed:
... “[E]avesdropping with the consent of one party has been the basic charter for private-detective taps and bugs, for ‘owner’ eavesdropping on facilities that are used by members of the public, and for much free-lance police eavesdropping. Allowing eavesdropping with the consent of one party would destroy the statutory plan of limiting the offenses for which eavesdropping by device can be used and insisting on a court-order process. And as technology enables every man to carry his micro-miniaturized recorder everywhere he goes and allows every room to be monitored surreptitiously by built-in equipment, permitting eavesdropping with the consent of one party would be to sanction a means of reproducing conversation that could choke off much vital social exchange.”
See also separate views of Senator Hart set forth in S. Rep. No. 1097, 90th Cong., 2d Sess., 175 (1968); Proposed Legislation on Wiretapping and Eavesdropping after Berger v. New York and Katz v. United States, 7 Bull. No. 2 of the Association of the Bar of the City of New York 1, 3, 22-26 (Aug. 1968).
