{"id":4886,"date":"2018-01-08T10:57:44","date_gmt":"2018-01-08T15:57:44","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/nsj\/?p=4886"},"modified":"2018-01-08T11:04:25","modified_gmt":"2018-01-08T16:04:25","slug":"drones-as-crime-fighting-tools-in-2020-legal-and-normative-considerations","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2018\/01\/drones-as-crime-fighting-tools-in-2020-legal-and-normative-considerations\/","title":{"rendered":"Drones as Crime-Fighting Tools in 2020: Legal and Normative Considerations"},"content":{"rendered":"<p style=\"text-align: center;\">Joseph Rosenberg*<\/p>\n<p>It\u2019s 2020 and Boston has become a haven for homicide. In the past five years, the number of homicides in the city has tripled, and the rate of unsolved homicides has climbed from an already-high 53%<a href=\"#_edn1\" name=\"_ednref1\">[1]<\/a> to nearly 80%. The Boston Police Department (BPD) has seen enough. Believing that an uptick in drug trafficking is responsible for the corresponding uptick in homicides\u2014and left behind by its inability to break into the traffickers\u2019 encrypted devices and communications\u2014the BPD has a potential solution to its unsolved homicide problem: drones.<\/p>\n<p>The BPD wants to use a fleet of up to fifty surveillance drones to fly in public airspace, take twenty-four-hour video footage, and simultaneously follow up to fifty people whom the BPD suspects may be involved in illegal drug sales and responsible for the increased violence. The drones would be equipped with an auto-erase function such that they would retain only the most recent forty-eight hours of surveillance footage. No BPD officer would monitor the auto-piloted drones, which would \u201clock on\u201d to their targets using facial recognition software and soft biometric factors. The drones would be large enough to be seen from the ground with the naked eye, but small enough that one would need binoculars to be sure the drones were not, say, high-flying birds.<\/p>\n<p>Before assigning a drone to surveil a target, the BPD would have to obtain an initial warrant (an \u201cobservation warrant\u201d). A court would issue the observation warrant upon the BPD\u2019s showing of a <em>reasonable and articulable suspicion<\/em>\u2014a standard lower than probable cause\u2014that the drone could be expected to collect evidence of the target\u2019s criminal wrongdoing. An observation warrant would enable a drone, constrained to a virtual perimeter by geofencing its airspace, to surveil its target only in public places and not in constitutionally-protected areas such as homes, religious centers, and political rallies. The observation warrant would expire after fifteen days.<\/p>\n<p>Although the observation warrant would sanction targeted drone surveillance, the BPD would not have contemporaneous access to the surveillance footage. After becoming aware of a crime, the BPD would have to obtain a second warrant (a \u201cviewing warrant\u201d) to view a particular drone\u2019s surveillance footage. A court would issue this viewing warrant only on a showing of probable cause that a particular drone\u2019s footage contained evidence of a crime. The viewing warrant would entitle the BPD to the drone\u2019s previous forty-eight hours of footage, the rest having been erased. Should an observation warrant expire without the BPD\u2019s seeking a viewing warrant, the BPD would be \u201clocked out\u201d of obtaining a second observation warrant on that particular target for ten days. If the BPD later targeted the same individual and the observation warrant were again fruitless, the BPD would be locked out for twenty days, and so on.<\/p>\n<p>The BPD would be the only party with access to the drone surveillance footage and it would not be shared with anyone except in a case of emergency, such as an imminent threat to national security. The sole exception to this rule is as follows: a target himself, with a court order, could request drone footage in the event of an allegation of police misconduct against him. The forty-eight-hour auto-erase feature might limit this exception\u2019s helpfulness. But an observant target might notice the drone surveilling him, and thus know to seek such an order in case of police misconduct against him. Another conceivable remedial measure would involve the drone surveillance footage being sequestered with a third party after forty-eight hours. This footage would be accessible only by citizens seeking to challenge police misconduct.<\/p>\n<p>The BPD anticipates that its proposed drone surveillance scheme will help reduce Boston\u2019s unsolved homicide rate, but acknowledges its cost to Bostonians\u2019 privacy. Thus, the BPD proposes that it be allowed to use its drone scheme only in years when the previous year\u2019s unsolved homicide rate was above a certain percentage, which the state legislature would prescribe (perhaps the average national unsolved homicide rate of about 33%<a href=\"#_edn2\" name=\"_ednref2\">[2]<\/a>).<\/p>\n<p style=\"text-align: center;\">I. Would the BPD\u2019s proposed scheme intrude upon Bostonians\u2019 Fourth Amendment protections?<\/p>\n<p>A Fourth Amendment search is implicated when a person\u2019s subjective expectation of privacy\u2014which society recognizes as reasonable\u2014is violated.<a href=\"#_edn3\" name=\"_ednref3\">[3]<\/a> Thus, law enforcement may conduct warrantless surveillance on a person only when that person has no reasonable expectation of privacy. There is generally no reasonable expectation of privacy in public places,<a href=\"#_edn4\" name=\"_ednref4\">[4]<\/a> and surveillance in public areas is typically not a Fourth Amendment search, even when that surveillance occurs from public airspace, at least up to 1,000 feet.<a href=\"#_edn5\" name=\"_ednref5\">[5]<\/a> Massachusetts law operates under the same standard.<a href=\"#_edn6\" name=\"_ednref6\">[6]<\/a> As long as the BPD\u2019s drones operate only in public airspace and do not peep inside constitutionally protected areas, their collection would be lawful. Accordingly, where a law enforcement officer could obtain the information by naked eye observation, the BPD\u2019s drones would be allowed to do the same.<a href=\"#_edn7\" name=\"_ednref7\">[7]<\/a><\/p>\n<p>Video surveillance by closed circuit television (CCTV) provides a good point of comparison. Today, such surveillance is pervasive and generally does not require a warrant.<a href=\"#_edn8\" name=\"_ednref8\">[8]<\/a> For example, following in the footsteps of London\u2014and Britain, generally<a href=\"#_edn9\" name=\"_ednref9\">[9]<\/a>\u2014New York has instituted a sophisticated video surveillance system that constantly monitors lower Manhattan.<a href=\"#_edn10\" name=\"_ednref10\">[10]<\/a> More cities are sure to follow. The pervasiveness and legality of video surveillance collection suggests, by analogy, that the BPD\u2019s drones would be allowed to take surveillance footage without a warrant, too. Even so, the BPD is committed to obtaining a pre-surveillance observation warrant.<\/p>\n<p>One major difference between the BPD\u2019s proposed drone program and a CCTV program is that a CCTV is stationary and picks up whatever is in its view, while a drone is mobile and follows a particular individual. But tracking an individual with surveillance technology in public is not automatically forbidden, even without a warrant. While <em>United States v. Jones<\/em> indicates that there may be some limit on how long such tracking may continue,<a href=\"#_edn11\" name=\"_ednref11\">[11]<\/a> the BPD\u2019s proposed scheme would probably comply with<em> Jones<\/em>. First, the BPD\u2019s observation warrant is limited to fifteen days, which is just over half of the four-week period that the court in <em>Jones<\/em> found to be constitutional. Second, the observation warrant\u2019s invasion of privacy is minimal because the BPD would be unable to view the drone\u2019s footage without obtaining a viewing warrant based on probable cause. Third, the BPD would be \u201clocked out\u201d for increasing increments of time from obtaining an observation warrant for any particular target when previous observation warrants on that target have been fruitless. In other words, the BPD would be unable to follow a target endlessly. Rather, the BPD would be required constantly to show that its targeting is justifiable. The onus would be on the BPD to choose fruitful targets to surveil.<\/p>\n<p>In addition, it is worth noting that roving wiretaps\u2014which follow people rather than devices\u2014on domestic targets are legal under Title III; they have been found to satisfy the Fourth Amendment\u2019s particularity requirement and not to resemble an unconstitutional general search.<a href=\"#_edn12\" name=\"_ednref12\">[12]<\/a> The legality of roving wiretaps, then, also supports the BPD\u2019s drone scheme as outlined above.<\/p>\n<p>The double warrant requirement, operational limitations, and minimization procedures described above would be strong bases on which the BPD can withstand any Fourth Amendment challenges to its drone policy. But the BPD scheme\u2019s probable legality is only one consideration on the scheme\u2019s ledger of pros and cons. In the area of technology and intelligence gathering, \u201cshifting social norms, combined with . . . technological developments, threaten to make laws [governing intelligence gathering] irrelevant\u201d or obsolete.<a href=\"#_edn13\" name=\"_ednref13\">[13]<\/a> The normative tensions in the BPD\u2019s proposed scheme deserve consideration as well.<\/p>\n<p style=\"text-align: center;\">II. Is the BPD\u2019s proposed surveillance scheme justified and palatable?<\/p>\n<p style=\"text-align: center;\"><em>A. How helpful would the BPD\u2019s scheme be, really?<\/em><\/p>\n<p>A threshold consideration is whether the BPD\u2019s surveillance scheme would be helpful enough in solving homicides to justify its intrusion into the privacy of Bostonians. Critics of NSA surveillance programs argue that the benefits of the NSA\u2019s powerful tools of collection in reducing terrorism are insufficient to justify their encroachments on the privacy of a large number of people.<a href=\"#_edn14\" name=\"_ednref14\">[14]<\/a> It is likely that if the BPD\u2019s scheme halved the percentage of unsolved homicides, Bostonians would object less to the scheme\u2019s additional intrusion on their privacy. However, the debate over the scheme\u2019s efficacy should be considered from an <em>ex ante <\/em>perspective in order to get at the normative tensions without the \u201ctaint\u201d of <em>ex post <\/em>success (or failure).<\/p>\n<p>Critics of the BPD\u2019s surveillance scheme are likely to point out that the BPD already has robust CCTV surveillance.<a href=\"#_edn15\" name=\"_ednref15\">[15]<\/a> The BPD\u2019s proposed scheme, they might argue, would succeed simply in generating a further deluge of data to review, which can lead to missing important information and, therefore, a security concern of its own.<a href=\"#_edn16\" name=\"_ednref16\">[16]<\/a> Indeed, in addition to the BPD\u2019s own CCTV surveillance, cooperation with or legal compulsion of private parties with CCTV surveillance at homicide scenes might be just as effective as drone surveillance in identifying a killer.<a href=\"#_edn17\" name=\"_ednref17\">[17]<\/a> And as a technical matter, CCTV cameras are more stable than drones, which need recharging.<\/p>\n<p>But the BPD\u2019s scheme would be at least as good as an aggregated CCTV scheme\u2014and probably better. Drones can fly for practically unlimited periods of time between charges,<a href=\"#_edn18\" name=\"_ednref18\">[18]<\/a> and they can take extremely high-resolution footage (which can even be equipped to recognize faces)<a href=\"#_edn19\" name=\"_ednref19\">[19]<\/a> rather than CCTV\u2019s often grainy footage.<a href=\"#_edn20\" name=\"_ednref20\">[20]<\/a> Additionally, public knowledge of the BPD\u2019s drone scheme, as well as the drones\u2019 slight visibility from the ground, may actually deter crime.<a href=\"#_edn21\" name=\"_ednref21\">[21]<\/a> When investigating a crime, the BPD could still pursue CCTV leads, but would also have a potentially fruitful repository of footage that it could examine after showing probable cause. The repository would not suffer from the deluge-of-data problem, because the BPD would have at most fifty drones in circulation. Moreover, once probable cause was obtained, the drones would provide not only linear video footage but also metadata about their targets\u2019 locations, allowing a BPD officer to sift through the drone footage quickly to the area of interest.<\/p>\n<p>A major additional benefit of the BPD\u2019s drone surveillance scheme concerns the BPD\u2019s human resources. The BPD\u2019s drones would be auto-piloted: they would \u201clock on\u201d to their targets using facial recognition from state-owned photographs such as a driver&#8217;s license, and soft biometric factors<a href=\"#_edn22\" name=\"_ednref22\">[22]<\/a> but would be constrained in space by geofences so that they would not track their targets into a constitutionally-protected area.<a href=\"#_edn23\" name=\"_ednref23\">[23]<\/a> Thus, BPD officers would be free from surveilling dangerous streets and would stay out of harm\u2019s way.<\/p>\n<p>Another consideration justifying the BPD\u2019s proposal is that drones are now used in increasing numbers for many purposes, including commercial delivery,<a href=\"#_edn24\" name=\"_ednref24\">[24]<\/a> agriculture,<a href=\"#_edn25\" name=\"_ednref25\">[25]<\/a> and recreation.<a href=\"#_edn26\" name=\"_ednref26\">[26]<\/a> And even though most states restrict drone usage, local and state law enforcement agencies are undoubtedly allowed to use drones to some extent.<a href=\"#_edn27\" name=\"_ednref27\">[27]<\/a> To what extent is a gray, developing area of the law. In Massachusetts, for example, the BPD recently purchased three drones to augment security at public demonstrations, help process and clear crime scenes, and aid otherwise-lawful surveillance.<a href=\"#_edn28\" name=\"_ednref28\">[28]<\/a> The purchase was made without public discussion and the ACLU argued vigorously against it.<a href=\"#_edn29\" name=\"_ednref29\">[29]<\/a> In Connecticut, the state legislature recently considered (and rejected) a bill that would have allowed law enforcement to use drones outfitted with deadly weapons.<a href=\"#_edn30\" name=\"_ednref30\">[30]<\/a><\/p>\n<p>While true that there are \u201cmore restrictions on technologies . . . utilized primarily by law enforcement than those that are in wide use,\u201d<a href=\"#_edn31\" name=\"_ednref31\">[31]<\/a> the BPD might argue that\u2014considering the wide civilian and law enforcement use of drones\u2014not allowing the BPD to use drones for surveillance would unfairly hamstring the BPD. As drones become ubiquitous, people\u2019s expectations about potential drone surveillance will shift, and their Fourth Amendment protections from drones might, too: the \u201ccontours of what is reasonable under the Fourth Amendment may adjust as people\u2019s expectations of privacy evolve.\u201d<a href=\"#_edn32\" name=\"_ednref32\">[32]<\/a><\/p>\n<p style=\"text-align: center;\"><em>B. Does restricted access to device content justify an increase in physical surveillance?<\/em><\/p>\n<p>Many prominent law enforcement officers believe that device encryption poses a serious problem for law enforcement\u2019s ability to prevent and solve crime because such encryption is responsible for criminals\u2019 \u201cGoing Dark.\u201d<a href=\"#_edn33\" name=\"_ednref33\">[33]<\/a> Former FBI director James Comey describes the Going Dark problem this way: \u201cWe have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so.\u201d<a href=\"#_edn34\" name=\"_ednref34\">[34]<\/a> And in the wake of last March\u2019s Westminster attacks, U.K. Home Secretary Amber Rudd decried: \u201cWe need to make sure that organizations like WhatsApp . . . don\u2019t provide a secret place for terrorists to communicate with each other.\u201d<a href=\"#_edn35\" name=\"_ednref35\">[35]<\/a> The Paris attackers in 2014 also used WhatsApp to conceal their plans.<a href=\"#_edn36\" name=\"_ednref36\">[36]<\/a> Local law enforcement is affected, too; the New York County District Attorney recently complained that he had 175 phones\u2014with potentially pertinent information to homicide and other investigations\u2014that he couldn\u2019t unlock.<a href=\"#_edn37\" name=\"_ednref37\">[37]<\/a> Similarly, in this hypothetical criminals in Boston have been Going Dark, and the BPD believes that encrypted phones and messaging have hindered its ability to solve homicides. Regardless of the concern\u2019s validity, the Going Dark corollary\u2014that encrypted communications apps are to blame for terrorist attacks\u2014heaps difficult political pressure on device manufacturers and communications software companies.<\/p>\n<p>A robust opposition believes that Going Dark is not accurately termed, and does not present a new and unique problem to law enforcement.<a href=\"#_edn38\" name=\"_ednref38\">[38]<\/a> In a recent article, Orin Kerr and Bruce Schneier suggest encryption workarounds that law enforcement can employ to defeat device encryption.<a href=\"#_edn39\" name=\"_ednref39\">[39]<\/a> Indeed, even if Going Dark were as big of a problem as its proponents claim, law enforcement already has more surveillance power than ever before.<a href=\"#_edn40\" name=\"_ednref40\">[40]<\/a> To name two examples, today over seventy state and local police departments use Stingrays\u2014possibly unlawfully without a warrant<a href=\"#_edn41\" name=\"_ednref41\">[41]<\/a>\u2014to gather information on everyone carrying a cellphone within a certain area,<a href=\"#_edn42\" name=\"_ednref42\">[42]<\/a> and CCTV video surveillance is ubiquitous.<a href=\"#_edn43\" name=\"_ednref43\">[43]<\/a> Finally, history urges caution in surrendering surveillance power to law enforcement agencies; such power has often been abused.<a href=\"#_edn44\" name=\"_ednref44\">[44]<\/a> Thus, the rise of encryption can be seen in some ways as a return to the status quo.<\/p>\n<p>Crime is up in Boston, however, with more than half of homicides going unsolved. Encryption has frustrated the BPD\u2019s attempts to discharge some of its basic duties\u2014preventing homicide and, when it happens, bringing the perpetrators to justice. The BPD will thus argue that Massachusetts should allow a corresponding increase in physical surveillance to help pull back the curtain of encryption. On the other hand, the BPD is also interested in protecting and preserving Bostonians\u2019 civil liberties and does not wish to abuse its proposed drone surveillance program (or even for the program to have the appearance of being abuse-able). It has offered numerous reasonable compromises and minimizations to appease civil liberties groups and to ensure proper use of its drone scheme.<\/p>\n<p style=\"text-align: center;\"><em>C. Minimization Procedures<\/em><\/p>\n<p>The BPD believes that its drone surveillance scheme will help reduce the unsolved-homicide rate in Boston, and does not wish to use the drone footage for any other purpose. The BPD understands, however, the inflammatory nature of drones buzzing about Boston and the appearance of the potential for corruption. In response to these issues, the BPD has proposed minimization procedures to assuage citizens concerned about privacy. As described <em>supra<\/em>, the BPD would commit to: (1) capping the number of drones at fifty; (2) using the drone scheme only when the unsolved homicide rate rises above a certain percentage; (3) requiring observation warrants\u2014on a standard of reasonable and articulable suspicion\u2014which would be limited to fifteen days with step-wise \u201clocking out\u201d; and (5) equipping the drones to follow only their approved target and with geofencing technology.<\/p>\n<p>These <em>ex ante<\/em> restrictions would force the BPD to prioritize the most likely criminals and not to tail fruitless targets forever\u2014conduct that would essentially amount to general, blanket surveillance on thousands of targets.<a href=\"#_edn45\" name=\"_ednref45\">[45]<\/a> Recognizing that actually looking through the surveillance footage is more intrusive on privacy than the initial collection, the BPD also commits to <em>ex post<\/em> minimizations: (1) outfitting drones with an auto-erase function to retain only the most recent forty-eight hours of surveillance;<a href=\"#_edn46\" name=\"_ednref46\">[46]<\/a> (2) requiring viewing warrants based on probable cause; (3) never selling or sharing surveillance video unless in case of emergency, such as a threat to national security; and (4) making available to a plaintiff alleging police misconduct, upon successful application to a judge, video from a surveillance drone pertaining to that alleged misconduct. These restrictions and minimization procedures stand in stark contrast, for example, to the ability of multiple federal agencies to query NSA\u2019s 702 database.<a href=\"#_edn47\" name=\"_ednref47\">[47]<\/a><\/p>\n<p>Combined, the BPD\u2019s <em>ex ante<\/em> restrictions and <em>ex post<\/em> minimizations are comparable to those approved in a recent Northern Illinois case.<a href=\"#_edn48\" name=\"_ednref48\">[48]<\/a> There, the court imposed three requirements on the requesting law enforcement agency\u2019s use of a Stingray: first, law enforcement would have to ensnare as few incidental people as possible; second, all extraneous data had to be destroyed within forty-eight hours; and third, no information about third parties was to be used in any way.<a href=\"#_edn49\" name=\"_ednref49\">[49]<\/a><\/p>\n<p>The BPD\u2019s mitigations and minimizations would ensure accountability and proper oversight. A common critique of the U.S. intelligence community is that, even though all three branches are nominally involved, those charged with overseeing the intelligence community\u2019s activities are not informed enough to do so effectively in practice.<a href=\"#_edn50\" name=\"_ednref50\">[50]<\/a> The BPD\u2019s scheme would not suffer the same problem; rather than relying on murky statistics<a href=\"#_edn51\" name=\"_ednref51\">[51]<\/a> and courts that proceed in secret, the BPD would obtain warrants in public courts for drones flying only in public airspace (although targets of warrants would remain sealed until the warrants expired).<a href=\"#_edn52\" name=\"_ednref52\">[52]<\/a> The two-step warrant process would properly involve Massachusetts courts, and, because the public would be aware of the BPD\u2019s scheme (and because state legislatures actively regulate law enforcement\u2019s drone use),<a href=\"#_edn53\" name=\"_ednref53\">[53]<\/a> the Massachusetts state legislature, too, would serve as an efficient check, resulting in a scheme that both privacy and security advocates would respect.<\/p>\n<p>The BPD\u2019s misconduct concession, in particular, is a nod to the civil liberties community and a strong, built-in check on the BPD\u2019s scheme. A particularly close analog is law enforcement body cameras, which are gaining popularity among law enforcement agencies.<a href=\"#_edn54\" name=\"_ednref54\">[54]<\/a> Civil liberties groups generally support body cameras for their function of holding police officers accountable.<a href=\"#_edn55\" name=\"_ednref55\">[55]<\/a> But body cameras can pose problems to privacy, too, such as incidentally taping unwitting non-targets, recording particularly sensitive situations, and retaining data for long periods of time.<a href=\"#_edn56\" name=\"_ednref56\">[56]<\/a> The BPD\u2019s scheme provides the benefits of body cameras and addresses many of the downsides. For example, the BPD already wants to adopt minimizations limiting the retention of video surveillance to forty-eight hours and restricting its drones to public spaces, erasing the threat of catching particularly intimate and sensitive moments on tape.<\/p>\n<p style=\"text-align: center;\"><em>D. Finally, is there a First Amendment concern with the BPD\u2019s program?<\/em><\/p>\n<p>Government surveillance can chill First Amendment rights, both explicitly\u2014by actually attempting to influence politics<a href=\"#_edn57\" name=\"_ednref57\">[57]<\/a>\u2014 and less explicitly, such as by monitoring political rallies or tracking people\u2019s movements.<a href=\"#_edn58\" name=\"_ednref58\">[58]<\/a> This chilling effect has long been a worry: the Church Committee noted it in 1976.<a href=\"#_edn59\" name=\"_ednref59\">[59]<\/a> More recently, in <em>Jones<\/em>, Justice Sotomayor described the effect:<\/p>\n<p>GPS monitoring generates a precise, comprehensive record of a person\u2019s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations . . . . Awareness that the government may be watching chills associational and expressive freedoms.<a href=\"#_edn60\" name=\"_ednref60\">[60]<\/a><\/p>\n<p>Critics of the BPD\u2019s scheme might levy a similar worry: drones zipping around the sky, even if monitoring only public places and not especially visible to the naked eye from ground level, are creepy, and merely knowing they are there, somewhere, will affect people\u2019s behavior. These effects can be measurable, such as by tracking the Google search trends of questionable words that ensued after the Snowden revelations<a href=\"#_edn61\" name=\"_ednref61\">[61]<\/a> and surveying writers\u2014who must feel free to share unpopular ideas for the proper functioning of our democracy\u2014about their self-censorship.<a href=\"#_edn62\" name=\"_ednref62\">[62]<\/a><\/p>\n<p>While it is possible that the BPD\u2019s scheme would contribute to a chilling effect, so, too, would a uniformed police officer standing on a corner. Indeed, the First Amendment does not impose substantive or procedural limitation on good faith criminal investigations beyond those guaranteed by the Fourth and Fifth Amendments.<a href=\"#_edn63\" name=\"_ednref63\">[63]<\/a> Often, too, claims of a chilling effect that result from a fear of surveillance and that require a court to \u201creview actions of the political branches in the field[] of intelligence gathering\u201d are not actionable.<a href=\"#_edn64\" name=\"_ednref64\">[64]<\/a> Thus, as a purely legal matter, the BPD\u2019s drone scheme would likely not be subject to a First Amendment challenge.<\/p>\n<p>Normative considerations, though, require more attention: the important question is whether the marginal benefit of the BPD\u2019s scheme would outweigh its marginal cost in potential chilling effect. In truth, the BPD\u2019s scheme is comparatively modest: some other police departments already use drones for more invasive and less targeted uses than the BPD proposes.<a href=\"#_edn65\" name=\"_ednref65\">[65]<\/a> Furthermore, in incorporating geofence technology,<a href=\"#_edn66\" name=\"_ednref66\">[66]<\/a> the BPD is amenable to preventing its drones from traveling near sites particularly sensitive to a chilling effect, such as places of worship and political rallies. The state legislature or courts would articulate what those places might be.<\/p>\n<p>In addition, people might worry that drones zipping overhead would catch them doing legal things they simply do not want known, such as walking into a sex shop or visiting a particular type of doctor. Even people who say they have nothing to hide and so support robust surveillance might balk at these activities being caught on camera.<a href=\"#_edn67\" name=\"_ednref67\">[67]<\/a> The BPD\u2019s scheme, though, would not present a major problem of catching non-targets doing anything, because the BPD\u2019s minimization of 48-hour mandatory erasure and its highly-tailored targeting ensure that incidental collection would almost never be viewed. In fact, the BPD\u2019s scheme is less invasive than a stationary CCTV\u2019s video surveillance, which can be retained for long periods of time.<\/p>\n<p style=\"text-align: center;\">III. Conclusion<strong>\u00a0<\/strong><\/p>\n<p>The BPD\u2019s scheme is well-intentioned, contains numerous <em>ex ante <\/em>restrictions and <em>ex post <\/em>minimizations, and will likely help to solve serious crime. It thus balances privacy and security. Although in some ways intrusive on privacy and possibly chilling on Bostonians\u2019 behavior, a balance must be struck, and the BPD\u2019s scheme strikes it reasonably. The adoption of technologies like drones and plans like the BPD\u2019s should be the subject of an open and robust conversation among law enforcement, civil liberties groups, and the legislative branch. That conversation\u2014along with ongoing, neutral, and open judicial oversight\u2014should ensure that law enforcement, privacy advocates, and ordinary citizens can be both safe and free.<\/p>\n<hr \/>\n<p>*Joseph Rosenberg is a second-year student at Harvard Law School.<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[1]<\/a> In 2015 and 2016 combined, the BPD did not solve 46 of 87 homicides. <em>See<\/em><em> Unsolved Homicides 2016<\/em>, BPD News, http:\/\/bpdnews.com\/2016-unsolved-homicides (last visited Dec. 22, 2017); <em>Unsolved Homicides 2015<\/em>, BPD News, http:\/\/bpdnews.com\/solved-homicides http:\/\/bpdnews.com\/2015-unsolved-homicides (last visited, Dec. 17, 2017); <em>Solved Homicides 2016<\/em>, BPD News, http:\/\/bpdnews.com\/2016-solved-homicides (last visited Dec. 28, 2017); <em>Solved Homicides 2015<\/em>, BPD News, http:\/\/bpdnews.com\/2015-solved-homicides (last visited Dec. 28, 2017).<\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[2]<\/a> <em>Getting Away with Murder<\/em>, Economist (July 4, 2015), http:\/\/www.economist.com\/news\/united-states\/21656725-police-fail-make-arrest-more-third-nations-killings-getting-away.<\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[3]<\/a> Katz v. United States, 389 U.S. 347, 361 (1967); <em>see also <\/em>Mancusi v. DeForte, 392 U.S. 364, 368 (1968) (applying the \u201creasonable expectation\u201d test).<\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[4]<\/a> <em>See <\/em>United States v. Knotts, 460 U.S. 276, 281 (1983) (\u201cA person travelling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.\u201d); Rachel Levinson-Waldman, <em>Hiding in Plain Sight: A Fourth Amendment Framework for Analyzing Government Surveillance in Public<\/em>, 66 Emory L.J. 527, 529 (2017).<\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[5]<\/a> <em>See <\/em>California v. Ciraolo, 476 U.S. 207, 213 (1986); <em>see also <\/em>Florida v. Riley, 488 U.S. 445, 450 (1989); Richard M. Thompson II, Cong. Res. Serv., R42701, Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses 7 (2013); Levinson-Waldman, <em>supra<\/em> note 4, at 541.<\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[6]<\/a> <em>See <\/em>Commonwealth v. One 1985 Ford Thunderbird Auto<em>.<\/em>, 416 Mass. 603, 604 (1993) (refusing to exclude evidence that police obtained\u2014through naked-eye observation and the use of binoculars and cameras\u2014during three helicopter fly-overs at altitudes of 1,500, 800, and 700 feet).<\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\">[7]<\/a> Even though sense-enhancing technology that is not in general public use cannot be used without a warrant to search a constitutionally-protected area, <em>see <\/em>Kyllo v. United States, 533 U.S. 27, 34 (2001), the BPD\u2019s drones would be monitoring only public places with an observation warrant and so would not be searching constitutionally-protected areas. It is possible, then, that the BPD\u2019s drone footage could be zoomed and enhanced beyond the power of a human eye and still be legal. Further, because drones are arguably in general public use, <em>see infra<\/em> notes 24\u201326, the BPD might even have an argument under<em> Kyllo<\/em> for using the drones to search constitutionally protected areas (even though the BPD would not seek to do so).<\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[8]<\/a> <em>See, e.g.<\/em>, <em>Katz<\/em>, 389 U.S. at 351 (\u201cWhat a person knowingly exposes to the public . . . is not a subject of Fourth Amendment protection.\u201d); <em>see also<\/em> United States v. Jones, 565 U.S. 400, 428 (2012) (Alito, J., concurring) (noting that the ubiquity of CCTV monitoring itself influences peoples\u2019 reasonable expectation of privacy). While there is no dispute regarding warrantless video surveillance in particularly public places like squares and thoroughfares, some states do limit long-term video surveillance in more sensitive\u2014but still public\u2014areas. <em>See, e.g.<\/em>, State v. Jones, 903 N.W.2d 101, 113 (S.D. 2017) (holding that police were required to obtain a warrant to install a pole camera that monitored the entrance to the defendant\u2019s home for two months). In any event, the BPD is in the clear because it proposes obtaining a warrant for its drone scheme.<\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[9]<\/a> <em>See<\/em> David Barrett<em>, One Surveillance Camera for Every 11 People in Britain, says CCTV survey<\/em>, Telegraph (July 10, 2013), http:\/\/www.telegraph.co.uk\/technology\/10172298\/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html.<\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[10]<\/a> Chris Francescani, <em>NYPD Expands Surveillance Net to Fight Crime as well as Terrorism<\/em>, Reuters (June 21, 2013), http:\/\/www.reuters.com\/article\/usa-ny-surveillance-idUSL2N0EV0D220130621.<\/p>\n<p><a href=\"#_ednref11\" name=\"_edn11\">[11]<\/a><em> See Jones<\/em>, 565 U.S. at 412 (acknowledging that temporal limits on warrant-less monitoring may exist, but declining to determine what those limits would be).<\/p>\n<p><a href=\"#_ednref12\" name=\"_edn12\">[12]<\/a> United States v. Petti, 973 F.2d 1441 (9th Cir. 1992), <em>cert. denied<\/em>, 507 U.S. 1035 (1993).<\/p>\n<p><a href=\"#_ednref13\" name=\"_edn13\">[13]<\/a> Omer Tene &amp; Jules Polonetsky,\u00a0<em>A Theory of Creepy: Technology, Privacy and Shifting Social Norms<\/em>, 16 Yale J. L. &amp; Tech. 59, 74 (2014).<\/p>\n<p><a href=\"#_ednref14\" name=\"_edn14\">[14]<\/a> <em>See, e.g.<\/em>, Michael Isikoff, <em>NSA Program Stopped No Terror Attacks, says White House Panel Member<\/em>, NBC News (Dec. 20, 2013), http:\/\/www.nbcnews.com\/news\/other\/nsa-program-stopped-no-terror-attacks-says-white-house-panel-f2D11783588 (explaining the non-existent benefits of \u201cSection 215\u201d collection); <em>see also Oversight and Reauthorization of the FISA Amendments Act: The Balance Between National Security, Privacy and Civil Liberties: Hearing Before the S<\/em><em>ubcomm<\/em><em>. On the Judiciary<\/em>, 114th Cong. 17 (2016) (statement of Ms. Elizabeth Goitein, Co-Director, Brennan Center for Justice at New York University School of Law) [hereinafter \u201cGoitein Testimony\u201d] (pointing out that efficacy of \u201cSection 702\u201d collection might be overblown).<\/p>\n<p><a href=\"#_ednref15\" name=\"_edn15\">[15]<\/a> Heather Kelly, <em>After Boston: The Pros and Cons of Surveillance Cameras<\/em>, CNN (Apr. 26, 2013), http:\/\/www.cnn.com\/2013\/04\/26\/tech\/innovation\/security-cameras-boston-bombings\/.<\/p>\n<p><a href=\"#_ednref16\" name=\"_edn16\">[16]<\/a> <em>See<\/em> Goitein Testimony, <em>supra <\/em>note 14, at 10 (\u201c[T]here is a risk to national security in acquiring too much data . . . [because] [w]hen [humans] . . . are presented with an excess of data, real threats can get lost in the noise,\u201d such as the Underwear Bomber in 2009); <em>see also<\/em> Bruce Schneier, <em>Why Data Mining Won\u2019t Stop Terror<\/em>, Schneier On Security (Mar. 9, 2005), https:\/\/www.schneier.com\/essays\/archives\/2005\/03\/why_data_mining_wont.html (noting that even an unrealistically optimistic data mining system would \u201cgenerate 1 billion false alarms for every real terrorist plot it uncovers\u201d).<\/p>\n<p><a href=\"#_ednref17\" name=\"_edn17\">[17]<\/a> For example, in the wake of the Boston Marathon Bombing in 2013, one of law enforcement\u2019s first moves was to acquire surveillance footage from the approximately 200 businesses near the bombs\u2019 detonations. <em>See<\/em> Patrick J. Kiger, <em>How They Identified the Bombers: A Timeline from Event to Capture<\/em>, Nat\u2019l Geographic (Apr. 1, 2014), http:\/\/channel.nationalgeographic.com\/inside-the-hunt-for-the-boston-bombers\/articles\/how-they-identified-the-bombers\/.<\/p>\n<p><a href=\"#_ednref18\" name=\"_edn18\">[18]<\/a> <em>See, e.g.<\/em>, Will Knight, <em>This Surveillance Drone Never Needs to Land<\/em>, MIT Tech. Rev. (Nov. 5, 2015), https:\/\/www.technologyreview.com\/s\/543196\/this-surveillance-drone-never-needs-to-land\/; Evan Rodgers, <em>Laser Charging Gives Lockheed Martin\u2019s Stalker Drone \u2018Practically Unlimited\u2019 Flight Time<\/em>, Verge (July 12, 2012), http:\/\/www.theverge.com\/2012\/7\/12\/3154543\/lockheed-martin-stalker-drone-48-hour-laser-power.<\/p>\n<p><a href=\"#_ednref19\" name=\"_edn19\">[19]<\/a> Levinson-Waldman, <em>supra<\/em> note 4, at 540.<\/p>\n<p><a href=\"#_ednref20\" name=\"_edn20\">[20]<\/a> <em>Id.<\/em> at 542\u201343.<\/p>\n<p><a href=\"#_ednref21\" name=\"_edn21\">[21]<\/a> <em>Cf.<\/em> Edward K. Cheng, <em>Structural Laws and the Puzzle of Regulating Behavior<\/em>, 100 Nw. U. L. Rev. 655, 681 (2006) (discussing deterrent effect of \u201cspeed traps\u201d). This observation gives rise to a potential drone usage which is largely beyond the scope of this article: the introduction of dummy drones that would not be equipped with video surveillance technology but which would be visible to the target. Perhaps such a scheme would deter or prevent a target from engaging in crime.<\/p>\n<p><a href=\"#_ednref22\" name=\"_edn22\">[22]<\/a> <em>See<\/em> Levinson-Waldman, <em>supra<\/em> note 4, at 542\u201343; <em>see also <\/em>Sandee LaMotte, <em>The Other \u2018Fingerprints\u2019 You Don\u2019t Know About<\/em>, CNN (Dec. 4, 2015), http:\/\/www.cnn.com\/2015\/12\/04\/health\/unique-body-parts\/; Dan Moren, <em>7 Surprising Biometric Identification Methods<\/em>, Popular Sci. (Dec. 30, 2014), http:\/\/www.popsci.com\/seven-surprising-biometric-identification-methods.<\/p>\n<p><a href=\"#_ednref23\" name=\"_edn23\">[23]<\/a> <em>See<\/em> Levinson-Waldman, <em>supra<\/em> note 4, at 607\u201308; <em>see also <\/em>Eddie Schmid, <em>Geofences and Responsible Drone Flight<\/em>, Autel Robotics (Dec. 17, 2016), https:\/\/www.autelrobotics.com\/blog\/geofences-and-responsible-drone-flight\/.<\/p>\n<p><a href=\"#_ednref24\" name=\"_edn24\">[24]<\/a> Amazon\u2019s Prime Air drone made its first demo delivery on March 24, 2017. <em>See <\/em>James Vincent, <em>Watch Amazon\u2019s Prime Air Drone Make its First Demo Delivery in the US<\/em>, Verge (Mar. 24, 2017), http:\/\/www.theverge.com\/2017\/3\/24\/15047424\/amazon-prime-air-drone-delivery-public-us-test-mars.<\/p>\n<p><a href=\"#_ednref25\" name=\"_edn25\">[25]<\/a> <em>See, e.g.<\/em>, Michal Mazur, <em>Six Ways Drones are Revolutionizing Agriculture<\/em>, MIT Tech. Rev. (July 20, 2016), https:\/\/www.technologyreview.com\/s\/601935\/six-ways-drones-are-revolutionizing-agriculture\/.<\/p>\n<p><a href=\"#_ednref26\" name=\"_edn26\">[26]<\/a> <em>See, e.g.<\/em>, Troy A. Rule, <em>Drone Zoning<\/em>, 95 N.C. L. Rev. 133, 137\u201338 (2016) (\u201cGlobal sales of small drones increased by 167% from 2013 to 2015, and sales are only expected to climb over the next several years.\u201d).<\/p>\n<p><a href=\"#_ednref27\" name=\"_edn27\">[27]<\/a> <em>See<\/em> <em>Local and State Drone Laws<\/em>, Ctr. for the Study of the Drone at Bard Coll., http:\/\/dronecenter.bard.edu\/state-and-local-drone-laws\/ (last visited December 19, 2017) (counting 31 states by March 2017 that had enacted drone rules, some of which restricted permissible law enforcement usage).<\/p>\n<p><a href=\"#_ednref28\" name=\"_edn28\">[28]<\/a> Molly Boigon, <em>Bill Evans Defends the Police Department\u2019s Purchase of Drones<\/em>, WGBH News (October 17, 2017), https:\/\/news.wgbh.org\/2017\/10\/17\/local-news\/bill-evans-defends-police-departments-purchase-drones.<\/p>\n<p><a href=\"#_ednref29\" name=\"_edn29\">[29]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ednref30\" name=\"_edn30\">[30]<\/a> Barbara Goldberg, <em>Connecticut May Become First U.S. State to Allow Deadly Police Drones<\/em>, Reuters (Mar. 31, 2017), http:\/\/www.reuters.com\/article\/us-connecticut-drones-idUSKBN1722SO.<\/p>\n<p><a href=\"#_ednref31\" name=\"_edn31\">[31]<\/a> <em>See <\/em>Levinson-Waldman, <em>supra<\/em> note 4, at 551.<\/p>\n<p><a href=\"#_ednref32\" name=\"_edn32\">[32]<\/a> Thompson II, <em>supra <\/em>note 5, at \u201cSummary.\u201d<\/p>\n<p><a href=\"#_ednref33\" name=\"_edn33\">[33]<\/a> James B. Comey, Dir., Fed. Bureau of Investigation, Address at the Brookings Institution: Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? (Oct. 16, 2014), https:\/\/www.fbi.gov\/news\/speeches\/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course.<\/p>\n<p><a href=\"#_ednref34\" name=\"_edn34\">[34]<\/a> <em>Id<\/em>.<\/p>\n<p><a href=\"#_ednref35\" name=\"_edn35\">[35]<\/a> Gregory Katz, <em>UK: Attacker <\/em><em>used<\/em><em> WhatsApp, <\/em><em>firm must help police get access<\/em>, Associated Press (Mar. 26, 2017), https:\/\/apnews.com\/52aa182132724f5b8656af4c052673d3\/uk-police-still-think-westminster-attacker-acted-alone.<\/p>\n<p><a href=\"#_ednref36\" name=\"_edn36\">[36]<\/a> Sebastian Rotella, <em>ISIS via WhatsApp: \u2018Blow Yourself Up, O Lion\u2019<\/em>, ProPublica (July 11, 2016), https:\/\/www.propublica.org\/article\/isis-via-whatsapp-blow-yourself-up-o-lion.<\/p>\n<p><a href=\"#_ednref37\" name=\"_edn37\">[37]<\/a> <em>See<\/em> Alyssa Newcomb, <em>New York DA Says He Can\u2019t Access 175 iPhones From Criminal Cases Due to Encryption<\/em>, ABC News (Feb. 18, 2016), http:\/\/abcnews.go.com\/Technology\/york-da-access-175-iphones-criminal-cases-due\/story?id=37029693; <em>see also The Encryption Tightrope: Balancing Americans\u2019 Security and Privacy: Hearing Before the H. Comm. on the Judiciary<\/em>, 114th Cong. 133\u201345 (2016) (statement of Cyrus R. Vance, Jr., Dist. Att\u2019y, N.Y. Cty.).<\/p>\n<p><a href=\"#_ednref38\" name=\"_edn38\">[38]<\/a> Matt Olsen et al., Berkman Klein Ctr. for Internet &amp; Soc\u2019y Don\u2019t Panic. Making Progress on the \u201cGoing Dark\u201d Debate, 2 (2016), https:\/\/cyber.harvard.edu\/pubrelease\/dont-panic\/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf (\u201c[C]ommunication channels resistant to surveillance will always exist.\u201d).<\/p>\n<p><a href=\"#_ednref39\" name=\"_edn39\">[39]<\/a> <em>See generally <\/em>Orin S. Kerr &amp; Bruce Schneier, <em>Encryption Workarounds<\/em>, Geo. L. J. (forthcoming), https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2938033.<\/p>\n<p><a href=\"#_ednref40\" name=\"_edn40\">[40]<\/a> Peter Swire, <em>The Golden Age of Surveillance<\/em>, Slate (July 15, 2015), http:\/\/www.slate.com\/articles\/technology\/future_tense\/2015\/07\/encryption_back_doors_aren_t_necessary_we_re_already_in_a_golden_age_of.html.<\/p>\n<p><a href=\"#_ednref41\" name=\"_edn41\">[41]<\/a> United States v. Lambis, 197 F. Supp. 3d 606, 611 (S.D.N.Y. 2016) (\u201c[E]ven though the DEA believed that the use of the cell-site simulator would reveal the location of a phone associated with criminal activity, the Fourth Amendment requires the Government to obtain a warrant from a neutral magistrate to conduct that search.\u201d).<\/p>\n<p><a href=\"#_ednref42\" name=\"_edn42\">[42]<\/a> <em>Stingray Tracking Devices: Who\u2019s Got Them?<\/em>, ACLU, https:\/\/www.aclu.org\/map\/stingray-tracking-devices-whos-got-them (last visited Nov. 8, 2017).<\/p>\n<p><a href=\"#_ednref43\" name=\"_edn43\">[43]<\/a> <em>See<\/em> <em>supra<\/em> notes 9 and 15.<\/p>\n<p><a href=\"#_ednref44\" name=\"_edn44\">[44]<\/a> <em>See<\/em> Beverly Gage, <em>What an Uncensored Letter to M.L.K. Reveals<\/em>, N.Y. Times Mag. (Nov. 11, 2014), https:\/\/www.nytimes.com\/2014\/11\/16\/magazine\/what-an-uncensored-letter-to-mlk-reveals.html (uncovering fraudulent letter from FBI to Dr. Martin Luther King, Jr. in 1964 urging him to commit suicide and threatening him if he did not); <em>see generally <\/em><em>American Big Brother: A Century of Political Surveillance and Repression,<\/em> Cato Inst., https:\/\/www.cato.org\/american-big-brother (last visited Nov. 8, 2017) (documenting a long history of surveilling domestic political activities).<\/p>\n<p><a href=\"#_ednref45\" name=\"_edn45\">[45]<\/a> This aspect of the BPD\u2019s scheme responds to Justice Alito\u2019s worry in <em>Jones<\/em><em>. <\/em><em>See <\/em>565 U.S. at 430 (\u201cWe need not identify with precision the point at which the tracking of this vehicle became a search, for the line was surely crossed before the 4-week mark.\u201d).<\/p>\n<p><a href=\"#_ednref46\" name=\"_edn46\">[46]<\/a> This forty-eight-hour minimization is eminently reasonable and stands in stark contrast to periods of five years or longer for some types of NSA collection<em>. <\/em><em>See <\/em>Rachel Levinson-Waldman, What the Government Does with Americans\u2019 Data, Brennan Ctr. for Just. 4 (2013).<\/p>\n<p><a href=\"#_ednref47\" name=\"_edn47\">[47]<\/a> <em>See, e.g.<\/em>, Goitein Testimony, <em>supra <\/em>note 14, at 12.<\/p>\n<p><a href=\"#_ednref48\" name=\"_edn48\">[48]<\/a> <em>See In re <\/em>Application of the United States of America for an Order Relating to Telephones Used by Suppressed, No. 15 M 0021, 2015 WL 6871289, at *3 (N.D. Ill. Nov. 9, 2015).<\/p>\n<p><a href=\"#_ednref49\" name=\"_edn49\">[49]<\/a> <em>See id<\/em>.<\/p>\n<p><a href=\"#_ednref50\" name=\"_edn50\">[50]<\/a> L. Britt Snider\u2019s account of the Church Committee\u2019s investigation into Operation Shamrock provides an example of the problems for legislative oversight. <em>See<\/em> L. Britt Snider, <em>Recollections from the Church Committee\u2019s Investigation of NSA<\/em>, CIA, https:\/\/www.cia.gov\/library\/center-for-the-study-of-intelligence\/csi-publications\/csi-studies\/studies\/winter99-00\/art4.html (last visited Nov. 8, 2017). There have also been more recent calls for Section 702 oversight. <em>See<\/em> Arthur Rizer &amp; Daniel Semelsberger, <em>Is Reform on the Horizon for Section 702 Surveillance?<\/em>, The Hill (Apr. 12, 2017), http:\/\/thehill.com\/blogs\/pundits-blog\/technology\/328351-is-reform-on-the-horizon-for-section-702-surveillance. The secrecy of the FISC adds another layer of opacity that is particularly eyebrow-raising when one considers that the FISC might act mostly as a rubber stamp. <em>See<\/em> Dustin Volz, <em>U.S. Spy Court Rejected Zero Surveillance Orders in 2015: Memo<\/em>, Reuters (Apr. 29, 2016), http:\/\/www.reuters.com\/article\/us-usa-cybersecurity-surveillance-idUSKCN0XR009 (noting that the FISC rejected zero surveillance orders in 2015).<\/p>\n<p><a href=\"#_ednref51\" name=\"_edn51\">[51]<\/a> <em>See, e.g.<\/em>, Goitein Testimony, <em>supra <\/em>note 14, at 17\u201318 (\u201cPerhaps most strikingly, despite multiple requests . . . the NSA has yet to disclose an estimate of how many Americans\u2019 communications are collected under Section 702.\u201d).<\/p>\n<p><a href=\"#_ednref52\" name=\"_edn52\">[52]<\/a> <em>See<\/em> Nola K. Breglio, <em>Leaving FISA Behind: The Need to Return to Warrantless Foreign Intelligence Surveillance<\/em>, 113 Yale L.J. 179, 181 (2003) (arguing that the \u201csupersecret domain of the FISC\u201d shields the Attorney General from liability, denies targets the opportunity to challenge investigations, and limits constitutional search considerations).<\/p>\n<p><a href=\"#_ednref53\" name=\"_edn53\">[53]<\/a> The interplay of Federal Aviation Administration and state drone regulations is mixed and still in flux. <em>See, e.g.<\/em>, Rule, <em>supra<\/em> note 26, at 135\u201337. But as of July 25, 2017, forty states have enacted laws regulating drone usage and three more states have enacted resolutions regulating the same. <em>See<\/em> <em>Current Unmanned Aircraft State Law Landscape<\/em>, Nat\u2019l Conf. of St. Legislatures (July 25, 2017), http:\/\/www.ncsl.org\/research\/transportation\/current-unmanned-aircraft-state-law-landscape.aspx. Although states regulate many aspects of drones, law enforcement is often required to obtain a probable cause warrant, subject to various exceptions, to use a drone. <em>See<\/em> Michael J. Smith, <em>Regulating Law Enforcement\u2019s Use of Drones: The Need for State Legislation<\/em>, 52 Harv. J. on Legis. 423, 427\u201332 (2015).<\/p>\n<p><a href=\"#_ednref54\" name=\"_edn54\">[54]<\/a> Law enforcement officers in some forty-one of sixty-nine major United States cities use body cameras in some form. A major manufacturer recently pledged to give all United States police departments body cameras and software for free for a year. <em>See<\/em> Rachel Lerman, <em>Axon Offers 1-year Free Trial of Body Cameras to All U.S. Police Departments; Rival Vievu Rips Plan<\/em>, Seattle Times (Apr. 5, 2017), http:\/\/www.seattletimes.com\/business\/technology\/axon-offers-to-give-police-free-body-cameras-to-speed-companys-growth\/.<\/p>\n<p><a href=\"#_ednref55\" name=\"_edn55\">[55]<\/a> <em>See<\/em> Jay Stanley, <em>Police Body-Mounted Cameras: With Right Policies in Place, a Win for All<\/em>, ACLU (Mar. 2015), https:\/\/www.aclu.org\/other\/police-body-mounted-cameras-right-policies-place-win-all (\u201cAlthough we at the ACLU take a dim view of the proliferation of surveillance cameras in American life, police on-body cameras are different because of their potential to serve as a check against the abuse of power by police officers.\u201d).<\/p>\n<p><a href=\"#_ednref56\" name=\"_edn56\">[56]<\/a> <em>See <\/em>Richard Lin, <em>Police Body Worn Cameras and Privacy: Retaining Benefits While Reducing Public Concerns<\/em>, 14 Duke L. &amp; Tech. Rev. 346, 353\u201357 (Sept. 12, 2016); <em>see also Police Body Camera Policies: Retention and Release<\/em>, Brennan ctr. for Just. (Aug. 3, 2016), https:\/\/www.brennancenter.org\/analysis\/police-body-camera-policies-retention-and-release.<\/p>\n<p><a href=\"#_ednref57\" name=\"_edn57\">[57]<\/a> <em>See, e.g.<\/em>, Gage,<em> supra<\/em> note 44 (note from FBI to MLK).<\/p>\n<p><a href=\"#_ednref58\" name=\"_edn58\">[58]<\/a> For a recent example relating to NYPD\u2019s surveilling Muslim communities, see Hassan v. City of New York, 804 F.3d 277 (3d Cir. 2015); <em>see also<\/em> Levinson-Waldman, <em>supra<\/em> note 4, at 553\u201354 (documenting law enforcement encroachments on First Amendment rights in California, Colorado, Illinois, Michigan, New York, and Virginia).<\/p>\n<p><a href=\"#_ednref59\" name=\"_edn59\">[59]<\/a> Select Comm. to Study Gov\u2019t Operations with Respect to Intelligence Activities, Final Report, S. Rep. No. 94-755, bk. III, at 778 (1976) (noting that although certain information gathered by the NSA was \u201cuseful in many ways to conducting successfully NSA\u2019s legitimate communications intelligence functions . . . [t]he massive centralization of this information creates a temptation to use it for improper purposes, threatens to \u2018chill\u2019 the exercise of First Amendment rights, and is inimical to the privacy of citizens\u201d).<\/p>\n<p><a href=\"#_ednref60\" name=\"_edn60\">[60]<\/a> <em>Jones<\/em>, 565 U.S. at 415\u201316.<\/p>\n<p><a href=\"#_ednref61\" name=\"_edn61\">[61]<\/a> <em>See<\/em> Goitein Testimony, <em>supra <\/em>note 14, at 8 (\u201cAfter Edward Snowden\u2019s revelations in June 2013, an analysis of Google Trends data showed a significant five percent drop in U.S.-based searches for government-sensitive terms . . . .\u201d).<\/p>\n<p><a href=\"#_ednref62\" name=\"_edn62\">[62]<\/a> <em>Id.<\/em> (\u201cIn 2013, PEN America surveyed 528 American writers to learn how the [Snowden] disclosures affected their behavior. Twenty-eight percent reported curtailing social media activities; 24 percent avoided certain topics by phone or email; 16 percent chose not to write or speak on a certain topic; and 16 percent avoided Internet searches or website visits on controversial or suspicious topics.\u201d).<\/p>\n<p><a href=\"#_ednref63\" name=\"_edn63\">[63]<\/a> Reporters Comm. for Freedom of the Press v. Am. Tel. &amp; Tel. Co., 593 F.2d 1030, 1054 (D.C. Cir. 1978).<\/p>\n<p><a href=\"#_ednref64\" name=\"_edn64\">[64]<\/a> Clapper v. Amnesty Int\u2019l USA, 568 U.S. 398, 409 (2013) (citing Laird v. Tatum, 408 U.S. 1, 11\u201316 (1972)).<\/p>\n<p><a href=\"#_ednref65\" name=\"_edn65\">[65]<\/a> <em>See<\/em> Abby Sewell, Richard Winton &amp; Melissa Leu, <em>Lancaster Takes to the Skies to Get a View on Crime<\/em>, L.A. Times (Aug. 25, 2012) (describing L.A. County Sheriff\u2019s Dept. using drone to monitor indiscriminately Lancaster residents), http:\/\/articles.latimes.com\/2012\/aug\/25\/local\/la-me-0825-lancaster-aircraft-20120825.<\/p>\n<p><a href=\"#_ednref66\" name=\"_edn66\">[66]<\/a> Lily Hay Newman, <em>Here\u2019s How To Set Up a No-Fly Zone Over Your House<\/em>, Slate (Feb. 10, 2015), http:\/\/www.slate.com\/blogs\/future_tense\/2015\/02\/10\/noflyzone_org_lets_you_geofence_the_area_over_your_house_for_drones_to_avoid.html.<\/p>\n<p><a href=\"#_ednref67\" name=\"_edn67\">[67]<\/a> <em>S<\/em>ee<em>, e.g.,<\/em> Daniel J. Solove, <em>\u201cI\u2019ve Got Nothing to Hide\u201d and Other Misunderstandings of Privacy<\/em>, 44 San Diego L. Rev. 745, 751 (2007) (asserting that even those who claim no interest in their own privacy \u201ccannot withstand even a few minutes\u2019 questioning about intimate aspects of their lives without capitulating to the intrusiveness of certain subject matters\u201d) (internal quotation marks omitted).<\/p>\n<p>Image by <a href=\"https:\/\/www.flickr.com\/photos\/ajturner\/15685514648\/\">Andrew Turner<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s 2020 and Boston has become a haven for homicide. Believing that an uptick in drug trafficking is responsible for the uptick in homicides\u2014and left behind by its inability to break into the traffickers\u2019 encrypted devices and communications\u2014the Boston Police Department has a potential solution to its unsolved homicide problem: drones.<\/p>\n","protected":false},"author":20,"featured_media":4887,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24,29],"tags":[],"class_list":["post-4886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-online","category-student-articles"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/Screen-Shot-2018-01-08-at-9.55.49-AM.png?fit=724%2C513&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-1gO","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=4886"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4886\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/4887"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=4886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=4886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=4886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}