Article contents
The Scope of the Fourth Amendment: Privacy and the Police Use of Spies, Secret Agents, and Informers
Published online by Cambridge University Press: 27 December 2018
Extract
This article has been produced under the Samuel Pool Weaver Constitutional Law Essay program, which is supported by trust funds given to the American Bar Foundation by the late Samuel Pool Weaver to encourage research and writing about the Constitution and its application to current problems. Under the terms of the program as presently structured, a constitutional law scholar is invited from time to time to write an essay on a subject agreed upon between the scholar and the American Bar Foundation. This is the first essay produced under the program's new format.
- Type
- Research Article
- Information
- Copyright
- Copyright © American Bar Foundation, 1976
References
1 See, e. g., 2 Thomas Erskine May, Constitutional History of England 275 (1863); George E. Dix, Undercover Investigations and Police Rulemaking, 53 Tex. L. Rev. 203, 208-9 n.7 (1975); Richard C. Donnelly, Judicial Control of Informants, Spies, Stool Pigeons, and Agent Provocateurs, 60 Yale L.J. 1091, 1093 (1951).Google Scholar
2 See, e. g., Sorrells v. United States, 287 U.S. 435, 441 (1932); see also Note, Judicial Control of Secret Agents, 76 Yale L.J. 994 (1967).Google Scholar
3 For descriptions of the use of secret agents and informers in Nazi Germany and Stalinist Russia, see William L. Shirer, The Rise and Fall of the Third Reich 273 (New York: Simon & Schuster, 1960); Herbert McClosky & J. E. Turner, The Soviet Dictatorship 467, 479-80 (New York, 1960).Google Scholar
4 See, e. g., III Senate Select Committee to Study Government Operations with Respect to Intelligence Activities, Final Report, S. Rep. No. 755, 94th Cong., 2d Sess. 225-70 (1976); Comp troller General of the United States, Report to the House Committee on the Judiciary on FBI Domestic Intelligence Operations—Their Purpose and Scope: Issues that Need to be Resolved 96-117 (1976); Extended March 1975 Cook County Grand Jury, Report on Improper Police Intelligence Activities (1976).Google Scholar
5 The Fourth Amendment is not the only possible source of legal control of this practice. Sometimes, e. g., the First Amendment might impose restraints. See generally Dix, supra note 1, at 241-46; Comment, Present and Suggested Limitations on the Use of Secret Agents and Informers in Law Enforcement, 41 U. Colo. L. Rev. 261, 278-81 (1969). In other instances, the Sixth Amendment might be relevant. See, e. g., Massiah v. United States, 377 U.S. 201 (1964). Apart from constitutional restraints, the entrapment doctrine places some check on the behavior of secret agents. See, e. g., Hampton v. United States, 96 S. Ct. 1646 (1976); United States v. Russell, 411 U.S. 423 (1973). And, of course, internal police rulemaking might ultimately prove useful. See generally Dix, supra note 1.Google Scholar
6 See, e. g., United States v. White, 401 U.S. 745 (1971); Hoffa v. United States, 385 U.S. 293 (1966); Lewis v. United States, 385 U.S. 206 (1966); On Lee v. United States, 343 U.S. 747 (1951); Gouled v. United States, 255 U.S. 298 (1921).Google Scholar
7 See Gouled v. United States, 255 U.S. 298 (1921).Google Scholar
8 Dix, supra note 1, at 209.Google Scholar
9 The Fourth Amendment provides that:Google Scholar
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.Google Scholar
10 See, e. g., Nelson Bernard Lasson, The History and Development of the Fourth Amendment to the United States Constitution 13-105 (Baltimore: Johns Hopkins Press, 1937); Francis Lieber, On Civil Liberties and Self-Govemment 76-80 (1853); Thomas M. Cooley, A Treatise on the Constitutional Limitations Which Rest Upon the Legislative Power of the States of the American Union 365-68 (Boston: Little, Brown and Co., 5th ed. 1883).Google Scholar
11 Anthony G. Amsterdam, Perspectives on the Fourth Amendment, 58 Minn. L. Rev. 349, 398 (1974).Google Scholar
12 Benjamin Nathan Cardozo, The Nature of the Judicial Process 83 (New Haven: Yale University Press, 1921). See also Weems v. United States, 217 U.S. 349, 373 (1910).Google Scholar
13 See Amsterdam, supra note 11, at 363-64.Google Scholar
14 116 U.S. 616 (1886).Google Scholar
15 Id. at 622.Google Scholar
16 Id. at 630.Google Scholar
17 Id. at 622.Google Scholar
18 277 U.S. 438 (1928).Google Scholar
19 Id. at 464.Google Scholar
20 Shirley M. Hufstedler, The Directions and Misdirections of a Constitutional Right of Privacy, 26 Rec. N.Y.C.B.A. 546, 553 (1971).Google Scholar
21 96 U.S. 727 (1877).Google Scholar
22 277 U.S. at 464.Google Scholar
23 Id. at 469.Google Scholar
24 Id. at 478.Google Scholar
25 See, e. g., Lopez v. United States, 373 U.S. 427, 457-63 (1963) (Brennan, Douglas, & Goldberg, JJ., dissenting); Schwartz v. Texas, 344 U.S. 199, 204-5 (1952) (Frankfurter, J., concurring; Douglas, J., dissenting); On Lee v. United States, 343 U.S. 747, 758-62 (1952) (Frankfurter & Douglas, JJ., dissenting separately); Goldman v. United States, 316 U.S. 129, 136, 141 (1942) (separate opinion of Stone, C.J., & Frankfurter, J.; Murphy, J., dissenting).Google Scholar
26 For example, in Goldman v. United States, 316 U.S. 129 (1942), the Court relied on Olmstead to justify its holding that no search or seizure occurred when federal officers over heard conversations in an individual's office by placing an electronic bugging device against the outside wall of the office.Google Scholar
27 See, e. g., Berger v. New York, 388 U.S. 41, 57, 59 (1967); Lanza v. New York, 370 U.S. 139, 143 (1962); Silverman v. United States, 365 U.S. 505, 512 (1961).Google Scholar
28 389 U.S. 347 (1967).Google Scholar
29 Edmund W. Kitch, Katz v. United States: The Limits of the Fourth Amendment, 1968 Sup. Ct. Rev. 133.Google Scholar
30 Justice Black was the lone dissenter. Justice Marshall did not participate in the decision.Google Scholar
31 389 U.S. at 350.Google Scholar
32 Id. at 351 n.9.Google Scholar
33 Id. at 351.Google Scholar
34 Id. at 353.Google Scholar
35 There are, no doubt, those who would argue that this aspect of the value-oriented approach is in fact its greatest weakness. The point, in short, is that the Court has no business “rewriting” the Constitution to keep it “up to date.” Rather, where ambiguities exist in a constitutional provision, they should be resolved in such a way as to leave to the nonjudicial branches of government flexibility to deal with the relevant problems free of constitutionally imposed constraints. The argument seems particularly unpersuasive to me where, as here, we are dealing with a provision designed to protect individual liberties, and adopted in the first instance because of a distrust of the willingness of those other branches of government adequately to protect these liberties in the absence of constitutional constraint. Indeed, if any presumption is to be adopted with respect to the resolution of legitimate ambiguities in such provisions, it should, in my view, favor expansion rather than contraction of the constitutionally protected right. This is not to say, of course, that judges should be free to rewrite such provisions so as to expand their protections to accord with their own personal values and prejudices. On the contrary, the judicial task is to interpret, not to rewrite, and for the interpretation to be legitimate it must be grounded in the language of the provision, the historical record, and a realistic assessment of our contemporary society. And although the line between rewriting and interpreting may at rimes be a fine one, careful application of the value-oriented approach in the Fourth Amendment context seems to me well within the range of proper judicial interpretation.Google Scholar
36 389 U.S. at 350.Google Scholar
37 United States v. Ortiz, 95 S. Ct. 2585, 2588 (1975). See also Davis v. Mississippi, 394 U.S. 721, 726 (1969); Terry v. Ohio, 392 U.S. 1, 16-17, 25 (1968).Google Scholar
38 See, e. g., Boyd v. United States, 116 U.S. 616, 630 (1886).Google Scholar
39 See, e. g., Schmerber v. California, 384 U.S. 757, 767 (1966); Mapp v. Ohio, 367 U.S. 643, 656 (1961); Wolf v. Colorado, 338 U.S. 25, 27 (1949); Boyd v. United States, 116 U.S. 616, 630 (1886).Google Scholar
40 Wolf v. Colorado, 338 U.S. 25, 27 (1949).Google Scholar
41 Arthur Raphael Miller, The Assault on Privacy 25 (Ann Arbor: University of Michigan Press, 1971). See also Hufstedler, supra note 20, at 547-48.Google Scholar
42 403 U.S. 15 (1971).Google Scholar
43 Id. at 21 (emphasis added). See also Rowan v. Post Office Dept., 397 U.S. 728 (1970).Google Scholar
44 See Geoffrey R. Stone, Fora Americana: Speech in Public Places, 1974 Sup. Ct. Rev. 233, 263.CrossRefGoogle Scholar
45 410 U.S. 113 (1973).Google Scholar
46 Id. at 153.Google Scholar
47 For the sake of clarity, the Court in such cases might more appropriately speak in terms of the individual's interest in personal autonomy, or a right to be let alone, rather than attempt to absorb those interests within an all-embracing concept of privacy. See note 49 infra.Google Scholar
48 See 389 U.S. at 350-51.Google Scholar
49 In recent years, legal scholars, social scientists, and others concerned with the problem of privacy have almost consistently concluded that its basic feature is not autonomy, but the individual's ability to control the flow of information about him. See, e. g., Miller, supra note 41, at 25; Charles Fried, An Anatomy of Values: Problems of Personal and Social Choice 140 (Cambridge: Harvard University Press, 1970); Alan F. Westin, Privacy and Freedom 7 (New York: Atheneum Press, 1967); Edward Shils, Privacy: Its Constitution and Vicissitudes, 31 Law & Contemp. Prob. 281, 282 (1966); Hufstedler, supra note 20, at 550; Oscar M. Ruebhausen & Orville G. Brim, Jr., Privacy and Behavioral Research, 65 Colum. L. Rev. 1184, 1189-90 (1965); Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193, 198 (1890).Google Scholar
50 Note, Privacy in the First Amendment, 82 Yale L.J. 1462, 1474 (1973).Google Scholar
51 Cf. James B. White, The Fourth Amendment as a Way of Talking About People: A Study of Robinson and Matlock, 1974 Sup. Ct. Rev. 165, 229; Lloyd L. Weinreb, The General ities of the Fourth Amendment, 42 U. Chi. L. Rev. 47, 85 (1974).Google Scholar
52 See, e. g., Fried, supra note 49, at 140-42.Google Scholar
53 Marcus v. Search Warrant, 367 U.S. 717, 724 (1961); accord, United States v. United States District Court, 407 U.S. 297, 313-14 (1972). See Cooley, supra note 10, at 366-69 n.1; Lasson, supra note 10, at 24-33.Google Scholar
54 See, e. g., Entick v. Carrington, 19 Howell's St. Tr. 1030 (C.P. 1765); see also Huckle v. Money, 95 Eng. Rep. 768 (1763); Wilkes v. Wood, 98 Eng. Rep. 489 (1765); Money v. Leach, 97 Eng. Rep. 1050 (1765).Google Scholar
55 Boyd v. United States, 116 U.S. 616, 626-27 (1886). See Marcus v. Search Warrant, 367 U.S. 717, 729 (1961).Google Scholar
56 Burdeau v. McDowell, 256 U.S. 465, 475 (1921). See also Barnes v. United States, 373 F.2d 517 (5th Cir. 1967); United States v. Goldberg, 330 F.2d 30 (3d Cir. 1964).Google Scholar
57 As Professor White has suggested, however, there may be some instances in which “there can be a kind of after-the-fact ratification of the [private] conduct by” governmental officials that may be sufficient to bring the amendment into play. See White, supra note 51, at 221 n.107.Google Scholar
58 This conclusion is applicable only with respect to the storage or dissemination of law fully obtained information. The storage or dissemination of unconstitutionally obtained information should properly be viewed as unconstitutional also–as an extension of the initial illegality.Google Scholar
59 Although government's own storage of lawfully obtained information may not be governed by the Fourth Amendment, a different result may be called for when government requires a private citizen to store information about others so that government might at some future time be able to obtain it. See California Bankers Ass'n v. Schultz, 416 U.S. 21, 95-96 (1974) (Marshall, J., dissenting).Google Scholar
60 As already noted, the Court held in Katz that conversations could be “seized.” See 389 U.S. at 353. See also United States v. United States District Court, 407 U.S. 297, 313-15 (1972). The Court had at least seemingly reached a similar conclusion in several prior decisions. See, e. g., Berger v. New York, 388 U.S. 41 (1967); Wong Sun v. United States, 371 U.S. 471 (1963); Silverman v. United States, 365 U.S. 505 (1961).Google Scholar
61 Cf. United States v. Miller, 96 S. Ct. 1619, 1623 (1976).Google Scholar
62 Even if such a limitation is adopted, the “actual physical intrusion” requirement of Olmstead should nevertheless be abandoned, for the extent to which one's security in the privacy of a place is threatened by government efforts to obtain information as to what goes on in that place is not in any way dependent upon the presence or absence of an actual physical intrusion.Google Scholar
63 United States v. On Lee, 193 F.2d 306, 315-16 (2d Cir. 1951) (Frank, J., dissenting).Google Scholar
64 Weinreb, supra note 51, at 52-53. See also Edmond Cahn, The Sense of Injustice–An Anthropocentric View of Law 151 (New York: New York University Press, 1949); Cooley, supra note 10, at 365 n.4.Google Scholar
65 389 U.S. at 351.Google Scholar
66 This, indeed, seems to be the approach suggested by Judge Hufstedler. See Hufstedler, supra note 20, at 562. See also Note, Police Surveillance of Political Dissidents, 4 Colum. Hum. Rts. L. Rev. 101, 135 (1972).Google Scholar
67 389 U.S. at 353.Google Scholar
68 In his separate concurring opinion in Katz, Justice Harlan offered a somewhat more precise statement of a limiting principle. In his view, governmental information-gathering activity constitutes a search and seizure if the person subjected to the activity “exhibited an actual (subjective) expectation of privacy” and the expectation is “one that society is prepared to recognize as ‘reasonable.'” 389 U.S. at 361 (Harlan, J., concurring).Google Scholar
69 See, e. g., United States v. Dionisio, 410 U.S. 1, 8, 14-15 (1973); Couch v. United States, 409 U.S. 322, 335, 336 n.19 (1973); United States v. White, 401 U.S. 745, 751-52 (1971) (plurality opinion); Alderman v. United States, 394 U.S. 165, 179 n.11 (1969); Terry v. Ohio, 392 U.S. 1, 9 (1968).Google Scholar
70 Such a requirement was first suggested in Justice Marian's concurring opinion in Katz. See 389 U.S. at 361. Justice Harlan subsequently expressed second thoughts about his initial formulation, however. See United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting).Google Scholar
71 See Amsterdam, supra note 11, at 384; Book Review of Westin, Privacy and Freedom, 15 U.C.L.A.L. Rev. 1586, 1597-98 (1968).Google Scholar
72 The Court seems to have reached a similar conclusion. See United States v. United States District Court, 407 U.S. 297, 314-15 (1972); Terry v. Ohio, 392 U.S. 1, 18 n.15, 21 (1968); Camara v. Municipal Court, 387 U.S. 523, 533, 535 (1967); but see United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting).Google Scholar
73 For an example of this phenomenon, see text at notes 150-66 infra.Google Scholar
74 See Comment, Electronic Eavesdropping and the Right to Privacy, 52 B.U.L. Rev. 831, 838-39 (1972). Cf. Cooley, supra note 10, at 373.Google Scholar
75 For an interesting example of this sort of analysis, see United States v. Holmes, 521 F.2d 859 (5th Cir. 1975).Google Scholar
76 See Cooley, supra note 10, at 365. Lord Chatham made the point rather dramatically: “The poorest man may, in his cottage, bid defiance to all the forces of the Crown. It may be frail; its roof may shake; the wind may blow through it; the storm may enter; the rain may enter; but the King of England may not enter; all his force dare not cross the threshold of the ruined tenement.” Quoted in Cooley, supra note 10, at 365 n.4.Google Scholar
77 389 U.S. at 351.Google Scholar
78 410 U.S. 1 (1973).Google Scholar
79 Id. at 14. See also United States v. Mara, 410 U.S. 19, 21 (1973) (handwriting).Google Scholar
80 If the officer entered the store outside normal business hours, his conduct could not be justified on an “exposure to the public” theory, for the shopkeeper may do things then that have not been exposed to the public and with respect to which he therefore retains a legitimate privacy interest. See, e. g., Amos v. United States, 255 U.S. 313 (1921); Villano v. United States, 310 F.2d 680 (10th Cir. 1962); Hughes v. Johnson, 305 F.2d 67 (9th Cir. 1962).Google Scholar
81 See, e. g., United States v. Williams, 328 F.2d 887 (2d Cir. 1964); Fisher v. United States, 205 F.2d 702 (D.C. Cir. 1953); Ludwig v. United States, 3 F.2d 231 (7th Cir. 1924).Google Scholar
82 See, e. g., Fraternal Order of Eagles v. United States, 57 F.2d 93 (3d Cir. 1932); Stagecrafters Club, Inc. v. District of Columbia, 89 A.2d 876 (D.C. 1952); Kansas v. Seven Slot Machines, 203 Kan. 833, 457 P.2d 97 (1969).Google Scholar
83 See, e. g., Magda v. Benson, 536 F.2d 111 (6th Cir. 1976); United States v. Mustone, 469 F.2d 970 (1st Cir. 1972); United States v. Dzialak, 441 F.2d 212 (2d Cir. 1971); State v. Smith, 510 P.2d 793 (Alas. 1973); People v. Krivda, 5 Cal. 3d 357, 486 P.2d 1262, 96 Cal. Rptr. 62 (1971) (In Bank); State v. Purvis, 249 Ore. 404, 438 P.2d 1002 (1968).Google Scholar
84 Similarly, an individual who parks his automobile on the street and therefore assumes the risk that it will be broken into by others cannot fairly be said to have exposed the contents of his automobile to public view within the meaning of this doctrine.Google Scholar
85 I do not mean to imply that the fact that the effect is primarily or even exclusively upon the ordinariness of life is in any sense dispositive of the scope issue. Rather, it is simply one factor to be considered. Moreover, the seriousness of the impact on this interest is also relevant. This would clearly be true, for example, when government officers peek into open windows. As Professor Amsterdam has noted, the question in that context is whether in a free society we should be compelled “to draw the blinds every time we enter a room, under pain of surveillance if we do not.” Amsterdam, supra note 11, at 403.Google Scholar
86 For example, another factor that might at times be relevant is the extent to which the practice results in the revelation of information other than that specifically sought. This is a primary characteristic of the paradigm, for when a government officer enters a home to look for evidence of crime he necessarily learns a great deal about the occupants that is unrelated to the purpose of the search. Consider, however, the situation in which a trained dog sniffs packages to determine whether they contain marijuana. The only information gained through that practice is whether the package is likely to contain the substance sought. The “narrowness” of the infor mation revealed would seem to cut in favor of a finding that this practice does not intrude upon reasonable expectations of privacy. See generally United States v. Bronstein, 521 F.2d 459 (2d Cir. 1975); United States v. Fulero, 498 F.2d 748 (D.C. Cir. 1974); United States v. Solis, 393 F. Supp. 325 (D.C. Cal. 1975).Google Scholar
87 255 U.S. 298 (1921).Google Scholar
88 The Court's statement of the facts in Gouled declares, rather ambiguously, that after gaining entry Cohen, in Gouled's absence, “seized and carried away” the document in question. 255 U.S. at 304. The details of the seizure, as described in the text, are set forth in the Brief for the United States at 8, 58-59. In subsequent decisions the Court has seen fit to characterize Cohen's conduct as a “secret and general ransacking” of Gouled's office. See, e. g., Lewis v. United States, 385 U.S. 206, 210 (1966).Google Scholar
89 255 U.S. at 301.Google Scholar
90 Id. at 305-6.Google Scholar
91 343 U.S. 747 (1952).Google Scholar
92 Justice Black dissented on the ground that the agent's testimony should be inadmissible under the Court's supervisory power and therefore did not reach the constitutional issue. Justices Frankfurter, Douglas, and Burton dissented on Fourth Amendment grounds.Google Scholar
93 This issue had previously been left open in Goldman v. United States, 316 U.S. 129 (1942), and was finally resolved in Silverman v. United States, 365 U.S. 505 (1961).Google Scholar
94 343 U.S. at 752.Google Scholar
95 Id. at 754.Google Scholar
96 373 U.S. 427 (1963).Google Scholar
97 Although concurring in the result, Chief Justice Warren did not join Justice Marian's opinion. Unlike Harlan, Warren argued that On Lee should be overruled because Chin Poy did not himself testify at On Lee's trial. In Warren's view, electronic devices could properly be used, as in Lopez, to corroborate the testimony of the government agent but not as a substitute for the agent's live testimony. See 373 U.S. at 441-46 (Warren, C.J., concurring).Google Scholar
98 373 U.S. at 438.Google Scholar
99 By the time of the decision in Lopez, the Court had specifically held that use of electronic devices to record or transmit conversations was governed by the Fourth Amendment if accompanied by a trespass on the suspect's premises. See Silverman v. United States, 365 U.S. 505 (1961).Google Scholar
100 373 U.S. at 439.Google Scholar
101 Id. at 450.Google Scholar
102 Id. at 465.Google Scholar
103 Id. at 450.Google Scholar
104 Id. at 465-66.Google Scholar
105 Id. at 466.Google Scholar
106 Id. at 450.Google Scholar
107 385 U.S. 206 (1966).Google Scholar
108 385 U.S. 293 (1966). The Court on that day also handed down its decision in Osborn v. United States, 385 U.S. 323 (1966). Osbom, a lawyer, was convicted of attempting to bribe a juror. Osborn had hired Vick, a member of the local police department, to conduct background investigations of prospective jurors. Unbeknownst to Osborn, Vick had agreed to report any illegal activities to federal agents. Equipped with a recording device, Vick had a conversation with Osborn in the latter's office during which Osbom made several incriminating statements. Osborn contended that use of the recording device violated his rights under the Fourth Amend ment. In a seven-to-one decision, the Court disagreed. In reaching mat result, however, the Court found it unnecessary to rely on Lopez, concluding instead that, even if use of the device constituted a search and seizure, the probable cause, warrant, and reasonableness requirements of the amendment had been satisfied. See 385 U.S. at 327-31. Interestingly, this approach was predicated on the unspoken assumption that the information on which the warrant was based–all of which had been gathered through Vick's earlier undercover conversations with Osborn–was obtained without violating Osbom's rights.Google Scholar
109 A second telephone call and sale of marijuana occurred two weeks later. Lewis was finally arrested some four months after the second sale.Google Scholar
110 Lewis did not contend that the initial telephone call was unconstitutional. Moreover, Lewis specifically conceded that, based in part upon that call, the agent had probable cause to believe that a narcotics offense would be committed in his home. See 385 U.S. at 208-9 n.4.Google Scholar
111 385 U.S. at 212.Google Scholar
112 Id. at 210. See note 88 supra.Google Scholar
113 Id. at 210.Google Scholar
114 Id, at 211. At the same time, Justice Warren cautioned that this does not mean the “agent is authorized to conduct a general search for incriminating materials.”Google Scholar
115 Id. at 212.Google Scholar
116 Justice Brennan, joined by Justice Fortas, concurred on the grounds that, by turning his home into a commercial center and inviting “anyone willing to enter to come in to trade with him,” Lewis had waived “his right to privacy in the premises.” As a result, the seller cannot complain “so long as the agent does no more than buy his wares.” 385 U.S. at 213. Justice Douglas dissented on the ground that any deceptive entry by a government agent into a home constitutes a search and seizure whether or not the home is used as a commercial center See 385 U.S. at 344-47.Google Scholar
117 385 U.S. at 299.Google Scholar
118 Hoffa also argued that Partin's conduct violated his rights under the Fifth and Sixth Amendments.Google Scholar
119 Justices White and Fortas did not participate in the consideration or decision of Hoffa. Chief Justice Warren dissented on the grounds that Partin's testimony should have been held inadmissible under the Court's supervisory powers. Justices Douglas and Clark were of the view that the writs of cerriorari should have been dismissed as improvidently granted.Google Scholar
120 385 U.S. at 301.Google Scholar
121 Id. at 302.Google Scholar
122 Id. at 301. Justice Stewart made this statement only a year before his declaration in Katz that the Fourth Amendment “protects people, not places.”Google Scholar
123 Id. at 302.Google Scholar
124 Id. at 303, citing Lopez v. United States, 373 U.S. 427, 465 (1963) (Brennan, J., dissenting). See text at note 102 supra.Google Scholar
125 385 U.S. at 302.Google Scholar
126 Id. at 302 n.6.Google Scholar
127 401 U.S. 745 (1971).Google Scholar
128 The Court also held, as an alternative ground of decision, that the principles announced in Kan were inapplicable to this case since the conversations overheard in White took place prior to the decision in Katz. The Court was split five-to-four on this issue as well, with Justice Brennan joining Justices White, Burger, Stewart, and Blackmun to form a majority.Google Scholar
129 401 U.S. at 749.Google Scholar
130 Id. at 752.Google Scholar
131 See 401 U.S. at 754.Google Scholar
132 401 U.S. at 786.Google Scholar
133 See id. at 788 n.24. Justice Marian did suggest, however without much conviction, that there might be a difference between the use of transmitters and recorders.Google Scholar
134 401 U.S. at 787.Google Scholar
135 Id. at 789.Google Scholar
136 Id. at 787.Google Scholar
137 Id. at 789.Google Scholar
138 Dix, supra note 1, at 209.Google Scholar
139 See, e. g., United States v. White, 401 U.S. 745, 752 (1966) (plurality opinion); id. at 777 (Harlan, J., dissenting); Hoffa v. United States, 385 U.S. 293 (1966); Lopez v. United States, 343 U.S. 747 (1952); id. at 465-66 (Brennan, J., dissenting). See also Olmstead v. United States, 277 U.S. 438, 468 (1928).Google Scholar
140 See text at notes 59-64 supra.Google Scholar
141 See text at notes 66-70 supra.Google Scholar
142 For descriptions of the role of undercover agents and informers in Nazi Germany and Stalinist Russia, see Shirer, supra note 3, at 273; McClosky, supra note 3, at 467, 479-80.Google Scholar
143 United States v. United States District Court, 407 U.S. 297, 314 (1972).Google Scholar
144 Kent Greenawalt, The Consent Problem in Wiretapping and Eavesdropping: Surrepti tious Monitoring with the Consent of a Participant in a Conversation, 68 Colum. L. Rev. 189, 216 (1968).Google Scholar
145 Louis B. Schwartz, On Current Proposals to Legalize Wire Tapping, 103 U. Pa. L. Rev. 157, 162 (1954).Google Scholar
146 See, e. g., Charles Fried, Privacy, 77 Yale L.J. 475, 482 (1968); Comment, The Applica bility of the “New” Fourth Amendment to Investigations by Secret Agents: A Proposed Deline ation of the Emerging Fourth Amendment Right to Privacy, 45 Wash. L. Rev. 785, 792 (1970).Google Scholar
147 The potential inhibiting effect is similar to that experienced by a member of the NAACP in Alabama who fears that the fact of his membership will be publicized. See NAACP v. Alabama, 357 U.S. 449, 562 (1958). See also Louisiana v. NAACP, 366 U.S. 293 (1961); Watkins v. United States, 354 U.S. 178, 197-98 (1957). And, in a related context, the Court has explicitly recognized the role anonymity serves in a system of free expression. See Talley v. California, 362 U.S. 60 (1960).Google Scholar
148 President's Commission on Law Enforcement and Administration of Justice, Task Force Report: Organized Crime 18 (1967).Google Scholar
149 United States v. United States District Court, 407 U.S. 297, 314 (1972).Google Scholar
150 See May, supra note 1, at 275-78.Google Scholar
151 See text preceding note 73 supra.Google Scholar
152 See text at notes 73-75 supra.Google Scholar
153 In 1967 Professor Westin, after studying the problem at some length, concluded that participant monitoring, in which a secret agent or informer makes use of a concealed recording or transmitting device, is used “tens of thousands of times” annually. Westin, supra note 49, at 131. It seems reasonable to believe that unbugged spies and informers are used at least several times that often. See also Holmes v. Burr, 486 F.2d 55, 68 (9th Cir. 1973) (Hufstedler, J., dissenting); Jerome H. Skolnick, Justice Without Trial: Law Enforcement in Democratic Society 112-38 (New York: John Wiley & Sons, 1966). It is also worth noting that in 1975 the FBI alone employed approximately 1,500 informants solely for domestic intelligence investigations. See Senate Select Committee, supra note 4, at 228.Google Scholar
154 See generally Senate Select Committee, supra note 4, at 225-70; Federal Bureau of Investigation, Annual Report 6 (1970).Google Scholar
155 See May, supra note 1, at 275-78.Google Scholar
156 Amsterdam, supra note 11, at 401.Google Scholar
157 See Paul Chevigny, Cops and Rebels 249-76 (New York: Pantheon Books, 1972).Google Scholar
158 See, e. g., Westin, supra note 49, at 131; Skolnick, supra note 153, at 115.Google Scholar
159 As to the particular relevance of the victimless nature of the offenses, see The Presi dent's Commission on Law Enforcement and Administration of Justice, The Challenge of Crime in a Free Society 218 (1967).Google Scholar
160 That the incentive to use the practice is understandable does not in itself end the matter, for it is equally understandable why police agencies might want to wiretap telephones or be permitted to search the homes and offices of persons even remotely suspected of engaging in criminal conduct. But however understandable this desire, the problem remains that its wide spread use poses a danger to other, constitutionally more important, interests.Google Scholar
161 In 1790 only 6 percent of the population lived in urban areas. In 1970, 73 percent of the population lived in such areas. See U.S. Bureau of the Census, Statistical Abstract of the United States: 1972, at 5, 24.Google Scholar
162 Indeed, even today the practice is rarely employed in small towns and rural commun ities. See Daniel L. Rotenberg, The Police Detection Practice of Encouragement: Lewis v. United States and Beyond, 4 Hous. L. Rev. 609, 629 (1967).Google Scholar
163 See note 161 supra.Google Scholar
164 As a result, it can no longer plausibly be argued that the financial constraints on the use of this practice will themselves keep its use within reasonable limits. For except insofar as the police prefer to use full-time regular agents in particular situations, the financial constraints are now virtually nonexistent.Google Scholar
165 See, e. g., Lawrence P. Tiffany, Donald M. McIntyre, Jr., & Daniel L. Rotenberg, Detection of Crime 253 (Boston: Little, Brown and Co., 1967); The President's Commission on Law Enforcement and Administration of Justice, supra note 159, at 218; Skolnick, supra note 153, at 123-24; Malachi L. Hamey & John C. Cross, The Informer in Law Enforcement 33 (Springfield, Ill.: Charles C. Thomas, 1960).Google Scholar
166 Hoffa v. United States, 385 U.S. 293, 303 (1966), quoting Lopez v. United States, 373 U.S. 427, 465 (1963) (Brennan, J., dissenting).Google Scholar
167 Lopez v. United States, 373 U.S. 427, 450 (1963) (Brennan, J., dissenting).Google Scholar
168 See United States v. White, 401 U.S. 745, 749, 751, 752 (1971) (plurality opinion); Hoffa v. United States, 385 U.S. 293, 302 (1966); cf. Lopez v. United States, 373 U.S. 427, 439 (1963).Google Scholar
169 See Amsterdam, supra note 11, at 406-7.Google Scholar
170 See Dix, supra note 1, at 217.Google Scholar
171 Lopez v. United States, 373 U.S. 427, 450 (1963) (Brennan, J., dissenting).Google Scholar
172 See Arnold Enker, Controls on Electronic Eavesdropping–A Basic Distinction, 2 Israel L. Rev. 461, 462-63 (1967).Google Scholar
173 White, supra note 51, at 229.Google Scholar
174 As Professor Amsterdam has observed, “under electronic surveillance you are afraid to talk to anybody in your office or over the phone, while under a spy system you are afraid to talk to anybody at all.” Amsterdam, supra note 11, at 407.Google Scholar
175 In some instances, the degree of actual governmental involvement in the activities of the would-be spy may arguably be so slight as not to amount to “state action.” This might perhaps be true, for example, if the would-be spy simply informs the police of his activities and they do no more than express a willingness to accept any additional information he might gather. Once the police even without offering any inducement begin taking an active role in the would-be spy's activities, however, state action should be found to exist. The discussion in the text relates only to those instances where police involvement is sufficient to justify such a finding.Google Scholar
176 See authorities cited in note 1 supra.Google Scholar
177 See White, supra note 51, at 224, 229-30.Google Scholar
178 A similar analysis should prevail in the third-party consent situation. Suppose, for example, that × and Y are roommates, sharing possession of an apartment. × permits the police to search the premises. Insofar as X's rights are concerned, the search clearly is lawful as long as he voluntarily consented. The legality of the search with respect to Y is more problematic. The Court has held that when two or more persons share “joint access or control” of the premises for most purposes, “it is reasonable to recognize that any of the co-inhabitants has the right to permit the inspection in his own right and that the others have assumed the risk that one of their number might permit the common area to be searched.” United States v. Matlock, 415 U.S. 164, 171 n.7 (1974). As in the secret agent context, it seems to me that the proper standard for measuring the legality of the search with respect to Y is not whether × voluntarily consented but, rather, whether he did so without any monetary or other material inducement from the authorities. For what is ultimately at stake here is not only X's right to be free of unlawful coercion, but also Y's “own interest in the security of the private relationships he is entitled to establish.” White, supra note 51, at 227. And although it may be reasonable to ask Y to assume the risk that × is generally untrustworthy, it is far more dangerous to impose upon him the additional risk that government will affirmatively attempt to induce a betrayal of his trust.Google Scholar
179 See Amsterdam, supra note 11, at 408.Google Scholar
180 Comment, supra note 146, at 810.Google Scholar
181 Greenawalt, supra note 144, at 220.Google Scholar
182 See id. at 220.Google Scholar
183 As indicated earlier, these requirements might not apply if the agent is a private citizen whose cooperation with the authorities was not in any way induced by express or implied offers of material reward. See text at notes 175-77 supra. It might also be noted that the applicability of the Fourth Amendment in those situations where the target individual is actually aware of the agent's official status, as in Osborn v. United States, 385 U.S. 323 (1966), raises somewhat different questions from the situations here under discussion.Google Scholar
184 As suggested earlier, the extent to which application of the Fourth Amendment's protections to any particular information-gathering practice might unduly frustrate legitimate law enforcement interests is a relevant concern in deciding the ultimate question of “reasonableness.” See text at note 72 supra.Google Scholar
185 See, e. g., Terry v. Ohio, 392 U.S. 1 (1968) (stop and frisk); United States v. Robinson, 414 U.S. 218 (1973) (search incident to arrest); Camara v. Municipal Court, 387 U.S. 523 (1967) (administrative searches); Davis v. Mississippi, 394 U.S. 721 (1969) (detentions for fingerprinting) (dictum); Chambers v. Maroney, 399 U.S. 42 (1970) (automobile searches).Google Scholar
186 See Amsterdam, supra note 11, at 387-95.Google Scholar
187 Even if such an approach is adopted, a warrant ordinarily should be required unless the agent can demonstrate that the reality of the situation rendered such a course impracticable. Cf. Rotenberg, supra note 162, at 620. Thus, even in cases like Lewis v. United States, 385 U.S. 206 (1966), a warrant would be required.Google Scholar
188 Comment, supra note 146, at 810. See also Note, Judicial Control of Secret Agents, 76 Yale L.J. 994, 1015-17 (1967).Google Scholar
189 Use of the mutual acquaintance technique to gain the target's confidence is fairly commonplace. See, e. g., Lewis v. United States, 385 U.S. 206 (1966); United States v. Test, 486 F.2d 922 (10th Cir. 1973); United States v. Smith, 43 F.2d 173 (S.D. Tex. 1930); United States v. Hurst, 302 F. Supp. 714 (E.D. Tenn. 1969).Google Scholar
190 There may be situations, for example, in which it is difficult to determine whether, in light of a hiatus in the conversation, we are really dealing with one or two “contacts.” These problems are likely to be relatively infrequent, however.Google Scholar
191 It may be, of course, that the actual benefits to be gained in effective law enforcement from the adoption of such an approach are so slight as not to be worth the bother. My own suspicion, however, is that the added flexibility that the reasonable suspicion standard–even as modified by the “first contact” approach–offers law enforcement officials when compared with a straight probable cause standard is not insubstantial. And this seems particularly true in relation to the types of offenses with which this technique ordinarily is employed.Google Scholar
192 See Comment, supra note 5, at 261; cf. White, supra note 51, at 230.Google Scholar
193 White, supra note 51, at 230.Google Scholar
194 Although it might seem doubtful that this tactic would actually prove successful, a review of the cases indicates that, with respect to at least some forms of criminal activity, it is in fact markedly effective. See, e. g., United States v. Russell, 411 U.S. 423 (1973); Lewis v. United States, 385 U.S. 206 (1966); United States v. Bush, 283 F.2d 51 (6th Cir. 1960); Warren v. Hawaii, 119 F.2d 936 (9th Cir. 1941); United States v. Hurst, 302 F. Supp. 714 (E.D. Tenn. 1969); United States v. Smith, 43 F.2d 173 (S.D. Tex. 1930); People v. St. Ives, 110 Ill. App. 2d 37, 249 N.E.2d 97 (1969). One apparent explanation for the effectiveness of this technique is that, in approaching the target with the unlawful proposition, the agent, as in Lewis, often attempts to gain the target's confidence by reference to some real or feigned mutual acquaintance. And although, as noted earlier, this means of gaining the target's confidence should ordinarily be prohibited in the absence of probable cause, it seems less troublesome here, where the inherent nature of the underlying tactic tends to minimize the threat to the target's legitimate privacy interest.Google Scholar
195 See note 211 infra.Google Scholar
196 See, e. g., People v. Collier, 85 Misc. 2d 529, 376 N.Y.S.2d 954 (Sup. Ct. 1975).Google Scholar
197 See Berger v. New York, 388 U.S. 41, 60-63 (1967).Google Scholar
198 The discussion in the text is not intended to deal specifically with the situation in which an individual's friend or associate is coerced, deceived, or induced into revealing information previously disclosed to him in confidence. Unlike the problem addressed in the text, this situation involves governmental efforts to obtain information about X, not direcdy from × but, rather, from Y. In at least some instances it is settled that this practice can violate X's rights under the Fourth Amendment. For example, if × gives Y temporary possession of some object without relinquishing ownership, it is clear that government seizure of that object in an unlawful search of Y's person or premises is violative of X's rights. See, e. g., Jones v. United States, 362 U.S. 257 (1960). In that context, X's property rights as well as his privacy interests are at stake. The result should not necessarily be different, however, when only privacy is at issue. For example, if × mails a letter to Y and government officials intercept and read that letter while it is in transit without complying with the Fourth Amendment, X's rights have been violated. See, e. g., Ex parte Jackson, 96 U.S. 277 (1877). If Y receives the letter, and it is then seized in an unlawful search of Y, it seems to me that X's rights are no less violated even though he no longer has a property interest in the letter. Similarly, if government agents unlawfully wiretap a telephone conversation between Y and Z, during which Y reveals information previously disclosed to him by X, × should have standing to complain. In each of these situations, X's “reasonable expectations of privacy” have been frustrated by government's unlawful searches of Y.Google Scholar
The analysis is more complex, however, when government obtains the information from Y without violating Y's own rights under the Fourth Amendment. This might arise, for example, when the government gives Y immunity in return for his disclosure of information revealed to him previously by X. Although the interests at stake in this situation are similar, if not identical, to those involved in the secret agent context, there are several potentially significant differences in terms of the degree to which the respective practices infringe on the individual's expectations of privacy. Unlike the secret agent situation, for example, this practice involves no deception of the person about whom the information is obtained. Moreover, this practice is somewhat less likely to result in disclosure of detailed personal information than the use of secret agents. Because of the ongoing nature of the secret agent-target relationship, the agent can guide conversations so as to gain access to information that might not otherwise be revealed. And, of course, the secret agent can record or report that information while it is still fresh in his memory. Those aspects of the information-gathering process are not present, however, when a friend or associate is coerced or induced into revealing information previously disclosed to him. Thus, although the mode of analysis of these two practices is the same, the results might arguably differ.Google Scholar
199 For a fuller discussion of those decisions, see part II supra.Google Scholar
200 The assumption of risk notion is discussed more fully in text at notes 166-78 supra.Google Scholar
201 Katz v. United States, 389 U.S. 347 (1967).Google Scholar
202 United States v. White, 401 U.S. 745 (1971). See text at notes 127-37 supra.Google Scholar
203 In effect, White concluded that Hoffa“was left undisturbed by Katz.” 401 U.S. at 749.Google Scholar
204 401 U.S. at 752.Google Scholar
205 Justices Douglas, Harlan, and Marshall dissented. Justice Brennan concurred in the result on technical grounds but expressly rejected Justice White's conclusions on the issue here under discussion and is treated here as a dissenter for that purpose. See 401 U.S. at 755.Google Scholar
206 401 U.S. at 787.Google Scholar
207 Id. at 788.Google Scholar
208 Id. at 787.Google Scholar
209 See, e. g., Enker, supra note 172, at 463; Comment, supra note 74, at 842; Note, The Supreme Court-1970 Term, 85 Harv. L. Rev. 38, 255-56 (1971).Google Scholar
210 See text at notes 74-75 supra. See also Cooley, supra note 10, at 373; Comment, supra note 74, at 838-39. Cf. United States v. Holmes, 521 F.2d 859, 864-68 (5th Cir. 1975).Google Scholar
211 At least three such situations were identified: (1) where a private citizen acting without any implied or express material inducement from government officials decides to serve as a secret agent; (2) where an agent approaches an individual as a “total stranger” and reasonably suspects that the individual has committed or is about to commit a criminal offense, or that he is in possession of some information in which the authorities have a legitimate interest; and (3) where the conversation is “criminal at its inception.”Google Scholar
212 United States v. On Lee, 193 F.2d 306, 315 (2d Cir. 1951) (Frank, J., dissenting), quoting in Silverman v. United States, 365 U.S. 505, 511-12 n.4 (1961). See also Cooley, supra note 10, at 365.Google Scholar
213 Silverman v. United States, 365 U.S. 505, 511 (1961). See Johnson v. United States, 333 U.S. 10, 14 (1948).Google Scholar
214 See text at note 76 supra. Indeed, the Court itself has allowed searches of the individual's home or office without full compliance with the Fourth Amendment probable cause and warrant requirements in only the most carefully circumscribed circumstances. See, e. g., Warden v. Hayden, 387 U.S. 294 (1967) (hot pursuit); Chimel v. California, 395 U.S. 752 (1969) (incident to arrest); Camara v. Municipal Court, 387 U.S. 523 (1967) (administrative searches).Google Scholar
215 In effect, then, the analysis accepts arguendo the Court's view of the problem in the absence of entry rather than the approach suggested in part III of this paper.Google Scholar
216 See United States v. Mitchneck, 2 F. Supp. 225 (D.C. Mont. 1933).Google Scholar
217 See Gatewood v. United States, 209 F.2d 789 (D.C. Cir. 1953).Google Scholar
218 See United States v. Epstein, 240 F. Supp. 80 (S.D.N.Y. 1965).Google Scholar
219 See Leahy v. United States, 272 F.2d 487 (9th Cir. 1960).Google Scholar
220 See People v. Veloz, 22 Cal. App. 3d 499, 99 Cal. Rptr. 519 (Dist. Ct. App. 1971).Google Scholar
221 See Whiting v. United States, 321 F.2d 72 (1st Cir. 1963).Google Scholar
222 See also United States v. Guidry, 534 F.2d 1220 (6th Cir. 1976); United States v. Novello, 519 F.2d 1078 (5th Cir. 1975); Fraternal Order of Eagles v. United States, 57 F.2d 93 (3d Cir. 1932); In re Robert T., 8 Cal. App. 3d 990, 88 Cal. Rptr. 37 (Dist. Ct. App. 1970); People v. Porter, 227 Cal. App. 2d 211, 38 Cal. Rptr. 621 (Dist. Ct. App. 1964).Google Scholar
223 See, e. g., Lewis v. United States, 385 U.S. 206, 211 (1966); United States v. Jeffers, 342 U.S. 48, 51 (1951).Google Scholar
224 The extensiveness of the intrusion will, of course, vary depending upon the nature of the role the agent assumes.Google Scholar
225 It has generally been held, for example, that it constitutes a “search” within the meaning of the Fourth Amendment for a government officer, relying upon either force of authority or trickery, to induce an individual to open the door of his home to enable the officer to see into the premises. See, e. g., Johnson v. United States, 333 U.S. 10 (1948); People v. Rives, 61 Cal. 2d 268, 391 P.2d 393, 38 Cal. Rptr. 1 (1964) (In Bank); People v. Miller, 248 Gal. App. 2d 731, 56 Cal. Rptr. 865 (Dist. Ct. App. 1967). Similarly, although the Supreme Court has not as yet decided the issue, see United States v. Watson, 96 S. Ct. 820 (1976), several courts have held that the entry of a government officer into an individual's home to make an arrest constitutes a “search” requiring full compliance with the probable cause and warrant requirements. See, e. g., Dorman v. United States, 435 F.2d 385 (D.C. Cir. 1970) (en bane); England v. State, 488 P.2d 1347 (Okla. Crim. App. 1971). Moreover, even those courts that have held the warrant requirement inapplicable have nevertheless insisted that the officer at least reasonably believe that the suspect is on the premises. See, e. g., People v. Eddington, 23 Mich. App. 210, 178 N.W.2d 686 (1970), aff'd, 198 N.W.2d 297 (1972).Google Scholar
226 See, e. g., Camara v. Municipal Court, 387 U.S. 523 (1967); United States v. Ryles, 291 F. Supp. 492, 494 (D. Del. 1968); People v. Mesaris, 14 Cal. App. 3d 71, 91 Cal. Rptr. 837 (Dist. Ct. App. 1970).Google Scholar
227 See On Lee v. United States, 343 U.S. 747, 751-52 (1951). In On Lee, however, the agent entered the portion of the laundry that was open to the general public. As a consequence, the entry itself would be permissible under the “commercial center” doctrine, and the Court's reference to “consent” should probably be interpreted in that light.Google Scholar
228 See, e. g., Schneckloth v. Bustamonte, 412 U.S. 218 (1973); Zap v. United States, 328 U.S. 624 (1946); Davis v. United States, 328 U.S. 582 (1946).Google Scholar
229 See, e. g., Bumper v. North Carolina, 391 U.S. 543 (1968); Amos v. United States, 255 U.S. 313 (1921).Google Scholar
230 See, e. g., United States v. General Pharmacal Co., 205 F. Supp. 692 (D.N.J. 1962); United States v. Guerrina, 112 F. Supp. 126 (E.D, Pa. 1953); People v. Mesaris, 14 Cal. App. 3d 71, 91 Cal. Rptr. 837 (Dist. Ct. App. 1970); Commonwealth v. Wright, 411 Pa. 81, 190 A.2d 709 (1963). See also Weinreb, supra note 51, at 67.Google Scholar
231 This conclusion is not inconsistent with the Court's decision in SchneckJoth v. Bustamonte, 412 U.S. 218 (1973). Whatever the merits of Schneckloth, in which the Court held that “consent” can be valid even if the individual does not actually know he has a right to refuse, the ignorance of the “consenter” in this context is more extreme and, moreover, is induced by the government's own deceptive and misleading conduct.Google Scholar
232 Katz v. United States, 389 U.S. 347, 351 (1967).Google Scholar
233 Air Pollution Variance Bd. v. Western Alfalfa Corp., 416 U.S. 861, 865 (1974). See, e. g., United States v. Dionisio, 410 U.S. 1 (1973); United States v. Mara, 410 U.S. 19 (1973). See also text at notes 256-60 infra.Google Scholar
234 United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting).Google Scholar
235 See, e. g., Air Pollution Variance Bd. v. Western Alfalfa Corp., 416 U.S. 861 (1974), United States v. Dionisio, 410 U.S. 1 (1973); United States v. Mara, 410 U.S. 19 (1973). See also text at notes 256-60 infra.Google Scholar
236 See text at notes 56-57 supra.Google Scholar
237 Hoffa v. United States, 385 U.S. 293, 302 (1966), accord, United States v. White, 401 U.S. 745, 749 (1971) (plurality opinion).Google Scholar
238 See text at notes 166-74 supra.Google Scholar
239 United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting).Google Scholar
240 Fraternal Order of Eagles v. United States, 57 F.2d 93, 94 (3d Cir. 1932).Google Scholar
241 See Gouled v. United States, 255 U.S. 298, 305-6 (1921).Google Scholar
242 Indeed, virtually every court that has considered this issue since Gouled has reached a similar conclusion. See, e. g., Fraternal Order of Eagles v. United States, 57 F.2d 93 (3d Cir. 1932); United States v. General Pharmacal Co., 205 F. Supp. 692 (D.N.J. 1962); United States v. Reckis, 119 F. Supp. 687 (D. Mass. 1954); United States v. Mitchneck, 2 F. Supp. 225 (D.C. Mont. 1933); People v. Mesaris, 14 Cal. App. 3d 71, 91 Cal. Rptr. 837 (Dist. Ct. App. 1970).Google Scholar
243 See text at notes 171-74 supra.Google Scholar
244 With respect to those situations in which a meterman or similar person is induced after his visit to disclose his prior observations, see note 198 supra.Google Scholar
245 See text at notes 174-78 supra.Google Scholar
246 Hoffa v. United States, 385 U.S. 293 (1966).Google Scholar
247 See, e. g., United States v. White, 401 U.S. 745, 749 (1971) (plurality opinion); Hoffa v. United States, 385 U.S. 293, 302 (1966).Google Scholar
248 Cf. United States v. Locklear, 237 F. Supp. 895 (N.D. Cal. 1965).Google Scholar
249 Moreover, an assumption that the agent's sole motivation in such circumstances is to converse is, at best, speculative. For in many, if not most, instances the agent is likely to have mixed motives. That is, although the agent may wish to enter the premises in order to converse, he may also hope to see things of interest, and in any event would certainly note whatever he happened to see. Any effort to sort out those motives is likely to prove futile.Google Scholar
250 See Hoffa v. United States, 385 U.S. 293, 302 (1966); see also Lewis v. United States, 385 U.S. 206, 212 (1966).Google Scholar
251 Weinreb, supra note 51, at 67.Google Scholar
252 See, e. g., Johnson v. United States, 333 U.S. 10 (1948).Google Scholar
253 See Note, supra note 2, at 1012.Google Scholar
254 Cf. United States v. Lane, 230 F. Supp. 950 (S.D.N.Y. 1964); People v. Albert, 182 Cal. App. 2d 729, 6 Cal. Rptr. 473 (Dist. Ct. App. 1960). This same point, it should be noted, would apply even if the analysis suggested in part III of this paper is adopted.Google Scholar
255 See, e.g., Lewis v. United States, 385 U.S. 206 (1966); United States v. Bradley, 455 F.2d 1181 (1st Cir. 1972); United States v. Bush, 283 F.2d 51 (6th Cir. 1960); United States v. Lane, 230 F. Supp. 950 (S.D.N.Y. 1964); United States v. Smith, 43 F.2d 173 (S.D. Tex. 1930).Google Scholar
256 See, e. g., United States v. Williams, 328 F.2d 887 (2d Cir. 1964); Fisher v. United States, 205 F.2d 702 (D.C. Cir. 1953); Smith v. United States, 105 F.2d 778 (D.C. Cir. 1939); Ludwig v. United States, 3 F.2d 231 (7th Cir. 1924).Google Scholar
257 See, e. g., Amos v. United States, 255 U.S. 313 (1921).Google Scholar
258 See, e. g., Villano v. United States, 310 F.2d 680 (10th Cir. 1962); Hughes v. Johnson, 305 F.2d 67 (9th Cir. 1962); Baysden v. United States, 271 F.2d 325 (4th Cir. 1959). See also Lewis v. United States, 385 U.S. 206, 211 (1966).Google Scholar
259 See text at notes 227-31 supra.Google Scholar
260 See Katz v. United States, 389 U.S. 347, 351 (1967).Google Scholar
261 United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting). The difficulties inherent in the application of this concept are well illustrated by the “private club” cases. See, e. g., Fraternal Order of Eagles v. United States, 57 F.2d 93 (3d Cir. 1932); Stagecrafters Club, Inc. v. District of Columbia, 89 A.2d 876 (D.C. 1952); Kansas v. Seven Slot Machines, 203 Kan. 833, 457 P.2d 97 (1969).Google Scholar
262 Lewis v. United States, 385 U.S. 206 (1966).Google Scholar
263 385 U.S. at 211. See also id. at 213 (Brennan, J., concurring).Google Scholar
264 See, e. g., United States v. Ryles, 451 F.2d 190 (3d Cir. 1971); United States v. Boggus, 411 F.2d 110 (9th Cir. 1969); State v. Roy, 54 Haw. 513, 510 P.2d 1066 (1973); People v. St. Ives, 110 Ill. App. 2d 37, 249 N.E.2d 97 (1969).Google Scholar
265 For a possible example of such a situation, see, e. g., United States v. Harris, 534 F.2d 207 (10th Cir. 1975). It should also be noted that the commercial center theory, by its very nature, makes no distinction between lawful and unlawful businesses. As a consequence, one potential danger of a broad interpretation of the doctrine is that it would govern not only the Lewis-type situation but also those situations in which an individual invites others into his home for lawful purposes. It would, therefore, be a ready vehicle for all sorts of abuses.Google Scholar
266 This discussion presupposes that the agent does not himself unnecessarily suggest or otherwise induce the invitation to enter. See text at note 254 supra.Google Scholar
267 For a discussion of the warrant requirement generally, see White, supra note 51, at 181-82 n.34; Weinreb, supra note 51, at 71-72.Google Scholar
268 See, e. g., Coolidge v. New Hampshire, 403 U.S. 443, 455 (1971) (plurality opinion); Warden v. Hayden, 387 U.S. 294 (1967); Schmerber v. California, 384 U.S. 757 (1966).Google Scholar
269 As explained earlier at some length, the failure to obtain a warrant in such a situation cannot fairly be justified on grounds of consent, exposure to the public, misplaced confidence, or assumption of risk. Moreover, although the nature and scope of the searches in the two situations may differ, this does not justify different results. See text at notes 223-26 supra.Google Scholar
270 Needless to say, the “exigent circumstances” exception should be strictly construed. It should not apply, for example, in cases like Lewis, where the agent had ample opportunity to obtain a warrant in the rime between the initial telephone call and the visit to Lewis's home. In short, the warrant requirement should be waived only if the agent's effort to obtain a warrant would disrupt the normalcy of the situation in such a way as to endanger the investigation itself.Google Scholar
271 May, supra note 1, at 275. See also Cooley, supra note 10, at 372 n.2.Google Scholar
- 3
- Cited by