Broadly speaking, both privacy doctrine and public discourse suggest that the right to privacy is significantly diminished once one enters the public realm or once one’s information is shared with others.Footnote 1 In fact, certain doctrines provide that the right to privacy while in public is nearly nonexistent, that privacy is more or less “dead” once you walk out your front door or expose your activities to anyone else – even if you are fortunate enough to have your own property and still be on it.Footnote 2 Pursuant to this conception of the right to privacy, privacy is synonymous with secrecy – and, as described by Daniel Solove, this “secrecy paradigm” greatly limits legal protection for privacy.Footnote 3 As it stands, without lived privacy, one has no claim to legal privacy or privacy rights – and without legal privacy, one has no ability to protect or maintain lived privacy.Footnote 4
But in a world of over seven billion people and almost constant surveillance by governments, corporations, and other individuals, keeping one’s activities and information completely secret (and thus entitled to a right to privacy under the traditional “secrecy paradigm”) is impossible.Footnote 5 Even more so for certain marginalized communities who are more likely to live in conditions where their information is exposed to others and who are more likely to be subject to and targeted for government surveillance in the first instance.Footnote 6
This chapter discusses the current doctrinal and discursive barriers preventing a meaningful right to privacy while navigating both physical and online space, and once information has been exposed to others, and also highlights how this prevailing anti-privacy ethos creates unique problems for members of different marginalized groups. The narrow conception of privacy as being largely nonexistent in public spaces (sometimes referred to as “situated privacy”)Footnote 7 serves as a background rule or norm that enables and sanctions greater surveillance of marginalized communities.Footnote 8 The cramped legal frame leads to further loss of lived privacy with tangible consequences. It creates a self-fulfilling prophecy of privacy loss – once information is exposed to the “public” (even marginally), greater surveillance and loss of privacy is then often legally permissible. As another has put it, so long as legal privacy “is parasitical on private-sphere privacy, the former must die as its host dies, and this host is undoubtedly faltering today in the networked, monitored and digitized world we are calling our own.”Footnote 9 And the secrecy paradigm is increasingly debilitating as privacy-invading technologies expand the reach of state and private, corporate surveillance regimes (which often work hand in hand).
The physical and informational zone of what is truly secret – known to no one else – is shrinking dramatically.Footnote 10 As such, under the “privacy-only-in-private” theory, the law protects very little indeed. Paradoxically, as government, corporate, and citizen surveillance regimes expand (decreasing what can functionally be kept secret), the right to privacy is extinguished along with it.Footnote 11 Instead of serving as a bulwark against encroachments on privacy, the “privacy-only-in-private” theory is defined in such a way to ensure that privacy will, in fact, be dead. And this constricted legal definition of privacy permits privacy-invading technologies and criminal, administrative, corporate, and interpersonal/individual surveillance systems to have relatively free rein.
But there is nothing a priori about this definition of private and public – instead, it is an ideology; a normative architecture that has profound implications for who is protected, and who is not; who has room to flourish, and who is squashed.Footnote 12 The limited conception of what is legally protected as “private” is a form of social control, helping to buttress hegemonic social norms and ways of being; ways of existing, with devastating implications for many marginalized communities whose lives are too often overdetermined by government and corporate attempts to render their lives observable.
To be sure, while the secrecy paradigm plays a prominent role in erasing both the lived privacy and legal privacy rights of many marginalized communities, it is reinforced by other background rules and rhetorical frames, such as those that frame privacy as a commodity or an element of property rights. As powerfully underscored by others,Footnote 13 the commodification of personal information encourages and endorses a transactional approach to privacy rights, countenancing the trading away of privacy for other material goods, ranging from government benefits to social media accounts. Such a frame also devalues privacy as a mere object of commerce, rather than a foundational, material right critical to human flourishing. But before a person can even trade away their information, they must be deemed to control that information in the first instance. Hence this book’s focus on legal rules and rhetorical frames that suggest people lack rights over their information at all once it is exposed to others.
Law: Privacy and Public Are Contradictory Terms
In several different doctrinal contexts, the law provides that privacy does not meaningfully exist in public space or once the information has been shared outside of limited confines. While what counts as “public” and “private” is driven by normative value judgments and choices, the law contributes to making them “seem to be preconceptual, almost instinctual” and powerfully shapes how we learn public and private, making the fixed conceptions “hard to challenge.”Footnote 14
Fourth Amendment criminal procedure law is a prime example. In theory, the Fourth Amendment prevents the government from conducting searches for the purpose of investigating alleged criminal wrongdoing without first securing a warrant from a judge after showing that there is “probable cause” to believe that evidence of a crime will be discovered. But no protected “search” requiring a warrant and a showing of probable cause occurs if the person did not have a “reasonable expectation of privacy” in the area or thing being searched in the first instance.Footnote 15
With regard to physical privacy or observation of people as they move about their lives, the Supreme Court has largely provided (with some exceptions when targeted, law enforcement surveillance occurs over a prolonged period of time) that no reasonable expectation of privacy exists and therefore no warrant is required for the police to surveil people when their movements are otherwise observable from a public location. This principle has manifested in several, specific Fourth Amendment doctrines. For example, the open fields doctrine has been used to curtail the right to privacy – even on an individual’s own property, traditionally the place where the right to privacy is most sacrosanct. The open fields doctrine provides that an individual has no reasonable expectation of privacy for activities conducted out of doors, in fields, or property not within the “curtilage” – the area directly adjacent to the home. The Supreme Court has relied on the open fields doctrine to hold, for example, that no warrant was required for police to walk past a locked gate and “No Trespassing” signs and into secluded property in order to investigate reports that marijuana was being grown.Footnote 16 Interpreting the open fields doctrine on multiple occasions, the Supreme Court has taken a broad view of when privately owned property is exposed or open to the public and thus entitled to minimal Fourth Amendment privacy protections.
The cases in many ways speak for themselves. The Court has held that no warrant was required for police to inspect a predominately enclosed but partially open greenhouse within the curtilage of a home from a helicopter 400 feet above the ground, notwithstanding that the greenhouse could not been seen into from the street.Footnote 17 Similarly, no warrant was required for police to enter onto a 198-acre property, cross over a perimeter fence as well as multiple interior fences, and peer into a locked barn located half a mile from the public road and in close proximity to the property’s residence.Footnote 18 Nor was a warrant required for an aerial search of a backyard within the curtilage of a home that was enclosed by two separate fences, one 6 feet tall and the other 10 feet tall.Footnote 19 Based on this line of authority, a United States Court of Appeals recently held that there was no Fourth Amendment violation where police recorded an individual’s activity outside his home for ten weeks with a camera mounted on a utility pole by the utility company without a warrant. According to the court, “it is only the possibility that a member of the public may observe activity from a public vantage point – not the actual practicability of law enforcement’s doing so without technology – that is relevant for” determining whether a privacy violation has occurred under the Fourth Amendment.Footnote 20
The Court has also held that when an individual places garbage on the street curb for collection, even if temporarily and opaquely packaged, such “public exposure” defeats any reasonable privacy expectation.Footnote 21 A similar criminal procedure concept, the “plain view” doctrine, provides that police officers may seize evidence of contraband when visible from a lawful vantage point.Footnote 22 This rule serves to sanction the widespread proliferation and use of police-worn body cameras and dash cameras as a means of surveillance and evidence gathering (often under the guise of police accountability).
With regard to privacy over information or communications, the Supreme Court has significantly weakened the protections provided by the Fourth Amendment through reliance on the so-called third-party doctrine. The third-party doctrine stipulates that, in certain situations, an individual’s “reasonable expectation of privacy” (again, the precondition for Fourth Amendment coverage) often evaporates once an individual shares the relevant information with another person or entity, sometimes referred to as a “third party.”Footnote 23 So, while the government may be required to obtain a warrant if it wants to directly intercept the content of a conversation between two people (for example, through a wiretap), if the information at issue (for example, that a call did in fact take place) is shared with a phone company (a third party), no warrant may be required to obtain that information either from the third party or through direct interception because the fact of the call is not one that was kept private in the first instance – the phone company was aware of the call, not just the two conversants, excusing the government from obtaining a warrant.Footnote 24 Correspondingly, under what has been dubbed “assumption of the risk,” the Supreme Court has concluded that when individuals volunteer information to others, they are assuming the risk that the other party may be an informant who may relay the information to law enforcement.Footnote 25 In such situations, the Court has often held that no “search” occurred and therefore the Fourth Amendment’s warrant requirement is not triggered.
The theme that links the third-party doctrine, the open fields doctrine, the plain view doctrine, assumption of the risk, and the secrecy paradigm more broadly, is the underlying notion that there is no meaningful right to privacy in public – if information is even slightly exposed to others, the government and private parties are often permitted broad access.
While in 2018 the Supreme Court imposed an important but modest limitation on the third-party doctrine in Carpenter v. United States, the doctrine is far from being a dead letter.Footnote 26 In Carpenter, the Court concluded that a person’s historical cell-site location information revealing encyclopedic data regarding the person’s physical movements over a period of several days was not voluntarily shared with the service providers and therefore free game for government collection from the service providers without a warrant. Although the Court emphasized that Fourth Amendment doctrine must be attentive to technological changes (as it had in the past),Footnote 27 the Court also noted that its decision was a narrow one, that the third-party doctrine endured, and that it was the expansive scope of the search revealing “an all-encompassing record of the holder’s whereabouts” over a sustained period of time that ran afoul of the Fourth Amendment. Indeed, post-Carpenter, many courts have continued to enforce the secrecy paradigm in the same old way notwithstanding the continued development and deployment of privacy-invading technologies by law enforcement.Footnote 28 In other words, though the Court in Carpenter expressed that a “person does not surrender all Fourth Amendment protection by venturing into the public sphere,” under prevailing law they do surrender an astounding degree of protection, as outlined above.Footnote 29
The secrecy paradigm’s strictures are not unique to the Fourth Amendment context, which limits law enforcement’s ability to conduct a search for the purpose of a criminal investigation without a warrant and probable cause, but also extends to the constitutional informational privacy context. In theory, the constitutional right to informational privacy, rooted in guarantees for substantive due process, limits the government’s ability to disclose or “out” certain information regarding us.Footnote 30 But, as with the Fourth Amendment, several courts have concluded that if the information at issue has previously been exposed to anyone else, then there is no constitutional violation when the government further broadcasts the information.Footnote 31 For example, in Doe v. Lockwood, the Sixth Circuit Court of Appeals ruled that there was no violation of constitutional informational privacy where a municipal health commissioner allegedly disclosed that the plaintiff was HIV-positive to a local newspaper who then published the plaintiff’s identity because the plaintiff had disclosed his status to a court when requesting medical leave from prison to receive treatment for his HIV.Footnote 32 Notwithstanding that the plaintiff’s prior “disclosure” to a court was not the source where the defendant health commissioner obtained the private information and notwithstanding the compelling reasons for the plaintiff’s disclosure (seeking medical treatment while in captivity), the Sixth Circuit concluded that the information at issue was already “public.” Therefore, the health commissioner’s alleged broadcast of the information to a local newspaper who published the information was not actionable.
The secrecy paradigm also extends beyond constitutional privacy law to privacy tort doctrine, which, in principle, is designed to secure privacy rights against other private-party actors – including corporations. For example, the Restatement (Second) of Torts provides with regard to the tort of publication of private facts that “there is no liability for giving further publicity to what the plaintiff [themself] leaves open to the public.”Footnote 33 The Restatement, in essence, embraces the idea that there is no privacy in public. And this premise has been advanced by the Supreme Court, which has held, for example, that no actionable privacy tort violation occurred where the press published information about a rape victim that was already in the public domain via court records.Footnote 34
Lower courts have followed suit, even in egregious situations. For example, in Doe v. Peterson, plaintiff sued operators of a nude photograph website, where nude photos of plaintiff taken when she was a teenager and sent privately to her then boyfriend were posted. The court dismissed plaintiff’s public disclosure claim, reasoning that because the photos had been previously posted by a different website, they were not private facts.Footnote 35 Similarly, in Lentz v. City of Cleveland, the court held that the plaintiff police officer could not successfully bring a public disclosure claim pertaining to publication of his mental health history when, during the lawsuit, evidence was unearthed indicating that four years prior to the publication, the plaintiff’s mental health information had been discussed at a public Civil Service Commission hearing.Footnote 36 More precisely, the disclosure was excused because, after the alleged disclosure, evidence was found indicating that the information had previously been disclosed. As will be outlined in more detail in Chapter 6, these examples are part of a long list over a recent decade-long period (2006–16) where courts have rigorously enforced the secrecy paradigm in public disclosure tort cases brought by plaintiffs of marginalized social status.
Indeed, they arguably represent an even stricter application of the secrecy paradigm than that imposed in one of the most high-profile (and highly criticized) public disclosure tort cases – the case of Oliver “Billy” Sipple.Footnote 37 Sipple had intervened to help prevent a would-be assassin from shooting then President Gerald Ford. In the aftermath of the attempted assassination, a newspaper reporting on the event suggested that Sipple was gay and that assertion was further reported by other newspapers. Sipple sued for public disclosure of private facts, but the Court of Appeal of California affirmed the grant of summary judgment in the defendants’ favor. The court concluded that even though Sipple’s family members learned of his sexual orientation for the first time because of the publication, his orientation was known to “hundreds” of others through, among other activities, his participation in gay parades, because he “spent a lot of time in [the] ‘Tenderloin’ and [the] ‘Castro,’” and because of “his friendship with Harvey Milk, another prominent gay.” The Sipple decision, while ignoring that information such as one’s minority sexual orientation can be extremely sensitive and damaging depending on the context in which it is shared, is in one sense less drastic than the cases discussed above because Sipple’s orientation was, purportedly, known to “hundreds.”
These examples underscore that for many living at the margins of society who (as will be demonstrated) are subjected to high levels of government and private surveillance and transparent living quarters, keeping any information – much less sensitive information – completely secret as privacy law is often interpreted to require is a practical impossibility. This narrow, warped doctrine disproportionately burdens marginalized communities who may share information as a form of bonding, identity exploration, or resistance, and who are, in certain contexts, less able to keep information secret ex ante, and thus entitled to legal protection. That is, these legal rules serve as the background conditions facilitating the diminished lived privacy of marginalized groups, which in turn leads to further diminished legal protections.
Extensive research now documents the degree to which marginalized communities experience less lived privacy, are subject to greater degrees of surveillance, and feel the burdens of any surveillance more acutely. These patterns emerge across a variety of intersectional, demographic factors (or what bell hooks referred to as “interlocking systems of domination”) including poverty, employment sector, race, religion, gender, sexuality, gender identity, and immigration status.Footnote 38 As Mary Anne Franks has observed, “[t]he surveillance of marginalized populations has a long and troubling history. Race, class, and gender have all helped determine who is watched in society, and the right to privacy has been unequally distributed according to the same factors.”Footnote 39
And “surveillance” of marginalized communities takes many, diffuse, and often subtle forms. As surveillance studies scholars have emphasized, surveillance systems include much more than just law enforcement searches for the purpose of criminal investigations, but include administrative, bureaucratic, corporate, social, and law enforcement networks “that afford control of people through identification, tracking, monitoring, or analysis of individuals, data or systems.”Footnote 40 Surveillance systems also include outsourced, citizen-on-citizen surveillance that further erode lived privacy and provide fertile surveillance data for law enforcement and corporate regimes. Many of these tools/systems of surveillance have deep roots in constituting and maintaining the colonial state. I turn, now, to an examination of some of the ways – just some – that the privacy of marginalized groups is sacrificed by background legal rules, including the requirement for complete secrecy. This discussion is intended to be illustrative rather encyclopedic. Unfortunately, comprehensively cataloguing all the myriad ways in which marginalized communities are surveilled would be an impossible task. Instead, my aim here is to accentuate the many diverse ways in which the privacy of marginalized communities is invaded, in part as a result of the background secrecy paradigm framework. To be clear, not all of the examples discussed are necessarily a direct product of the secrecy paradigm, but those that aren’t illustrate the scope of surveillance of marginalized groups (in other words, the lack of lived privacy for such groups), and how any given exposure or privacy invasion will sanction further privacy invasions pursuant to the secrecy paradigm. The following discussion is broken down by different demographic characteristics in order to highlight that surveillance of the marginalized is widespread, but the deployment of these categories should not detract from the fact that many people live at the intersections of these classifications.
People Who Are Economically Disadvantaged
A system without protections for public privacy affords more protection to the affluent, who can afford to build higher walls – both literally and technologically – to keep surveillance regimes at bay.Footnote 41 Put differently by Neal Katyal, “[p]rivacy in America today is a luxury good that the poor often lack the resources to secure.”Footnote 42 The affronts to the privacy of poor communities are manifold, as documented by the important work of Michele Gilman and others.Footnote 43
Without some modicum of privacy in public, the millions of people who are housing insecure or homeless are particularly vulnerable.Footnote 44 The lack of privacy while in public furthers the material deprivation of homeless people’s lives. Because privacy law is extremely home-centric,Footnote 45 it privileges those who are able to secure property for a home, particularly those who can own their own home (as opposed to rent and/or obtain government-subsidized housing). Indeed, under the most conservative and limited understandings of privacy rights, privacy violations occur when there is trespass, which is predicated on ownership or control over private property.Footnote 46 Without a home, an individual lives their life in public – on the streets or in shelters – in effect having to forfeit not just their health and safety, but privacy over their entire lives – including the most intimate aspects of their lives such as personal hygiene and sexual activity.Footnote 47 If an act is banned in public space, for the homeless it amounts to a total and complete ban because they have no private space in which to perform the action.Footnote 48 So privacy for the homeless is a critical first-order right that ensures that a whole host of embodied acts – including the most basic and intimate – are able to be performed at all. In addition to lack of privacy over sanitary and sexual practices, public health scholars and housing advocates have observed that “housing is healthcare” and, among other limitations, the lack of secure shelter diminishes the ability of people to safely and securely store medications, including, for example, those needed to combat HIV which may need to be refrigerated.Footnote 49
Several kinds of laws regulating people who are housing insecure all but ensure that they experience no lived privacy, therefore, no legal privacy rights pursuant to the secrecy paradigm and, therefore, no ability to exist and perform the most mundane, but critical, of human tasks.Footnote 50
Anti-camping and sit–lie laws are a heartbreaking illustration.Footnote 51 Many homeless people live in tents or makeshift shelters on public land that is otherwise unoccupied (under highways, on piers, next to railways, for example), or simply sleep on public sidewalks or in parks because they have nowhere else to go. When individual tents or shelters are grouped together, they are sometimes referred to as “tent cities.” Several municipal governments have outlawed such survival practices to varying degrees.Footnote 52 These include purportedly “progressive” cities, such as Boulder, Colorado, and San Francisco.Footnote 53 The government’s ability not just to search but to forcibly remove, detain, and destroy the possessions of homeless people who attempt to subsist while on public land is made possible, in part, by background rules providing that there is no privacy in public. If a person enjoyed a legal right to privacy in public, then you could imagine their shelter being constitutionally protected from destruction by the government. Instead of protecting privacy, the law in many jurisdictions permits and encourages the government to criminalize efforts to maintain privacy and sanctuary while in public space – which is what anti-camping laws do.
In addition to anti-camping ordinances, homeless encampments are not infrequently swept and wholesale destroyed by city governments in the name of public health – tactics that have been endorsed by the Trump administration. Rather than provide services to the homeless, the government attacks individual efforts to survive. Because of the lack of privacy rights in public, efforts to maintain privacy are themselves criminalized and targeted.Footnote 54 In effect, the existence of homeless people is criminalized through a series of laws regulating public space that Jeremy Waldron has described as “one of the most callous and tyrannical exercises of power in modern times by a (comparatively) rich and complacent majority against a minority of their less fortunate fellow human beings.”Footnote 55
While some courts have recognized some limited privacy interests of homeless people even while in public space,Footnote 56 others have reached the opposite conclusionFootnote 57 and anti-camping and sit–lie ordinances remain prevalent and frequently enforced.Footnote 58 And, of course, homeless people are barred from building shelter on privately owned land because of trespass law that protects the privacy and property rights of the privileged – those able to own (or rent) property.Footnote 59
Homeless people are policed and surveilled in public not just by the government, but also by social gaze and feelings of shame and disenfranchisement. The lack of private space can also make it difficult to form friendships and intimate relationships. As sociologists Matthew Taylor and Eileen Walsh put it, “[t]he homeless person, in this way, has a unique relation to privacy. Public spaces, by default, are the only places they can exist in, and yet the people in these public places want little to do with them. They are interminably in a confusing environment that neither welcomes nor integrates them.”Footnote 60
Should people who are housing insecure desire and be able to find a bed in a housing shelter, their privacy rights are still greatly diminished. According to Taylor and Walsh’s ethnographic study, some homeless people prefer to remain on the street because homeless shelters are “privacy-starved environments.”Footnote 61 The lack of personal space in shelters amplifies the ability of anyone else (staff or fellow shelter-seeker) to make another person physically or emotionally uncomfortable. The same study also documented that many people who had visited shelters felt they were asked too many prying questions. Nor do homeless shelters necessarily offer a place to store and access personal items on a long-term basis, or offer solitude where one can gather and develop one’s thoughts. Of course, there is nothing that dictates that homeless shelters be built without privacy (or that our society refuse to provide adequate shelter for all). As with many purported privacy problems, it’s a design choice.Footnote 62 And certain shelters have provided more privacy by creating individual “sleeping pods” for homeless people.Footnote 63
Moreover, while the Department of Housing and Urban Development (HUD) under the Obama administration issued rules requiring shelters receiving federal funds to house transgender individuals based on their gender identity, giving transgender people the ability to access sex-segregated spaces consistent with their identity, in 2020 the Trump administration proposed a rule that would allow shelter providers to define and determine an individual’s sex, giving them the power to invade the privacy of and exclude transgender people.Footnote 64
Beyond issues of accommodation (either on the streets or in shelters), people who are housing insecure may be subject to privacy violations even when the government is attempting to provide services (as opposed to criminalize) the homeless. As Virginia Eubanks has emphasized, public assistance programs have long intruded into people’s lives, using means-testing and income limits as rationalizations for “all manner of surveillance and policing of applicants and beneficiaries.”Footnote 65 But technology is being deployed to amplify and automate the scope of this surveillance, including with respect to the homeless. For example, as documented by Eubanks, Los Angeles launched a “coordinated entry system” (CES) designed to match the most vulnerable people living without housing with public resources. In order to identify and triage the most vulnerable (and the purportedly most “deserving” of housing assistance), social workers, outreach workers, and shelters collect a host of intimate information in order to input it into the “Vulnerability Index-Service Prioritization Assistance Tool” (VI-SPDAT).Footnote 66 Survey questions include inquiries into whether an individual had a history of sexual assault, mental health crises, sex work, or suicide, in addition to personal identifying information. The collected information is then made available to over 100 different organizations, including local governments. And while Eubanks documents examples of people being successfully matched to services under the largely automated program, she also uncovered examples where people divulged intimate data enabling them to be monitored and tracked by the government without ever receiving services.Footnote 67 Indeed, the scope of the privacy invasions involved in Los Angeles’s CES and VI-SPDAT system was flagged by the United Nations Special Rapporteur on Extreme Poverty and Human Rights Philp Alston as extremely troubling.Footnote 68
Consequently, through a network of laws that criminalize their presence in public space, sacrifice privacy in homeless shelters, and monitor and surveil homeless people when they seek social services, homeless people are literally pushed from the public square and made invisible. As Loic Wacquant has put it, the poor are either disciplined or disappeared (and, consequently, so are the underlying failures of our social structures to care for members of our communities).Footnote 69 Such laws have a disproportionate effect on black, Latinx, and Native communities, as well as LGBTQ youth, who are overrepresented in the homeless population.Footnote 70
People living on the streets or in shelters are not the only economically disadvantaged people subject to extensive surveillance and deprived of privacy. Those living in public housing – for example, federal housing projects or Section 8 subsidized housing – are subject to meaningful privacy loss in purported exchange for the housing assistance. For example, the “one strike, you’re out” policy permitting the eviction of federally subsidized housing tenants when any guest or visitor engages in illegal activity on the premises encourages third-party policing within communities in need.Footnote 71 And such policies have been extended to private housing not subject to federal subsidized housing requirements through local laws requiring housing leases to include a “crime-free lease addendum.”Footnote 72 This is an example of the outsourcing of surveillance by governments – and how decreased lived privacy and lack of privacy vis-à-vis other individuals is utilized by lawmakers to advance draconian surveillance and regulatory policies. It takes policies such as the New York Metropolitan Transit Authority’s “If You See Something, Say Something” campaign for citizen surveillance of subways (which disproportionally impacts people who must take mass transit as opposed to driving) and applies it to people’s own living quarters, making them suspects in their own homes.
There are also examples of rent-stabilized housing landlords seeking to install facial recognition entry systems in order to control who can access their homes.Footnote 73 Such systems would give landlords unprecedented real-time surveillance of tenants and access to the tenants’ biometric data. And, as has been well documented, facial recognition systems are inaccurate, particularly when trying to identify people of color.Footnote 74 (In summer 2019, federal legislation was introduced to ban federally subsidized housing from using facial recognition technology, but as of spring 2020 had not been enacted.)Footnote 75
In addition to laws designed to surveil people of limited means while they navigate “public” spaces (and, as noted, sometimes while in their homes), widespread and sophisticated administrative welfare surveillance further permits the state to have a deep and broad view of the lives of those seeking state assistance – including their informational privacy. In other words, the administrative welfare surveillance documented by Eubanks is not limited to the homeless, but extends to many seeking some measure of state assistance (however modest). For example, as documented by John Gilliom, so-called welfare bureaucracies collect, store, and collate massive amounts of information about people seeking public benefits, including information regarding their health, intimate relationships, and living situations, often treating people as objects to be known rather than individuals with agency.Footnote 76 Similarly, Khiara Bridges has underscored the “devastating absence of privacy” for “marginalized, indigent women who must turn to the state for assistance if they are to achieve healthy pregnancies and infants.”Footnote 77 Bridges highlights how women that seek care under Medicaid’s Prenatal Care Assistance Program (PCAP), are required by law to undergo several intrusive consultations that can include wholesale questioning of women’s lives, including their romantic relationships, relationships with parents, domestic violence, use of controlled substances, etc. As explained by Bridges, “wealth is the condition of possibility for privacy.”Footnote 78
The threats posed by widespread surveillance of economically marginalized communities are amplified in a big data society.Footnote 79 As highlighted by researchers affiliated with Data & Society, low-income individuals are uniquely hampered by privacy threats posed by big data.Footnote 80 Impoverished individuals are burdened in multiple ways. First, as suggested above, they are subject to greater amounts of surveillance and data collection by government agencies, law enforcement agencies, and through social media. But beyond that, patterns of device use, decreased privacy literacy, and lack of financial access to devices with built-in privacy-enhancing technology further endanger poor communities.Footnote 81 For example, iPhones, which offer more privacy protections compared to other smartphone platforms (such as phones using Google’s Android operating system), are also significantly more expensive than other market options.Footnote 82 Moreover, poor communities are less able to bear the cost associated with any privacy violation, whether it be the disclosure of stigmatizing information preventing them from obtaining a job or having the resources to combat identity theft.Footnote 83 Put succinctly by Bridges, “[p]ower differentials will leave us differently exposed” and even assuming that there is equal observation (which there is not), any “equal observation will not result in equal exposure.”Footnote 84
In short, the lack of protections afforded to public space have direct, material impacts on the lives of people who are economically disadvantaged, permitting the state and corporations greater insight into their lives and, in turn, greater regulatory and punitive impact.
Racial Minorities
Racial minorities are also subjected to less lived privacy and therefore diminished privacy rights under the secrecy paradigm, paving the way for yet further surveillance of minority communities.
Indeed, heightened surveillance of racial minorities, particularly black people, has in many ways been a defining condition of both America itself and the lives of black people. As explained by Khiara Bridges, “it is an empirically demonstrated truth that the state focuses its gaze most specifically on the bodies of people of color.”Footnote 85 Put powerfully by sociologist Simone Browne in her important work on racialized surveillance, “Surveillance is nothing new to black folks. It is the fact of antiblackness.”Footnote 86 Surveillance of black people not only has served as a tool of monitoring and social control, but also serves to produce “blackness” as a category further enabling monitoring and categorization based on such “blackness.” This process has been referred to by Browne as “racializing surveillance” – whereby “enactments of surveillance reify boundaries along racial lines, thereby reifying race . . . where the outcome of this is often discriminatory and violent treatment.”Footnote 87 As explained by Browne, racialized surveillance helps structure social relations along racial lines, thereby privileging whiteness.Footnote 88
Some of the historical examples of racialized surveillance documented by Browne include government, corporate, or individualized branding of black people as chattel slaves, the use of ships logs to categorize black people as commodities along with other cargo, the use of “overseers” to inspect and torment black slaves, the use of slave passes to identify and categorize people, fugitive slave advertisements, the census, and lantern laws which required black people out at night to carry a lantern so as to literally shine a light on them and expose them to view. Each of these surveillance practices helped produce blackness as a category enabling further surveillance and subjugation based on that category. They are examples of what Browne, drawing from Frantz Fanon and others, calls “epidermalization” – the imposition (sometimes literally, in the case of branding) of race on the body that produced a person of African descent as “black,” as “slave,” as “commodity,” and as “inferior.”Footnote 89
But, of course, strategies of racialized surveillance are not a historical artifact. They continued apace with Jim Crow and FBI surveillance of black activists and intellectuals, and they continue today. Ta-Nehisi Coates’s contemporary description of the degree to which black bodies are targeted for surveillance and control is the most direct, and among the most stirring: “white America is a syndicate arrayed to protect its exclusive power to dominate and control [black] bodies.”Footnote 90 Coates’s disturbing account of the violence visited upon black bodies echoes that of James Baldwin and many others.Footnote 91 Surveillance – the erosion of public privacy – plays a prominent part in this syndicate.
The use of police floodlights to illuminate areas where people of color live and congregate, whether it be outside New York City Housing Authority developments or outside transit stations where people of color (many of them queer) enter lower Manhattan from New Jersey are, in effect, a modern instantiation of lantern laws – illuminating racial minorities while they try to move in public space at night.
A related high-profile contemporary example of the role of surveillance in the toolbox of control over racial minorities is New York City’s “stop-and-frisk” program, wherein black and Latinx people were targeted on public streets for police questioning, detention, and often body frisks.Footnote 92 Over 80 percent of the 4.4 million stop-and-frisk detentions made by the New York Police Department (NYPD) between 2004 and 2012 were of black or Hispanic individuals. The policy was an example of racial profiling, wherein people were explicitly targeted for stops based on their race, and discriminatory impact of a facially neutral policy that permitted frisks based, in part, on presence in a high crime area. The evidence of discrimination included the fact that the NYPD both carried out more stops in neighborhoods where there were more black and Latinx people than white people and, within any given neighborhood, officers were more likely to stop black and Latinx individuals than white folk. The practice was ruled unconstitutional in violation of the Fourteenth Amendment, ultimately leading New York to reform its written policies, but it’s emblematic of the degree to which dark bodies are targeted for additional scrutiny – and time will tell whether reform is instituted on the streets.
The stop-and-frisk program is part of broader approach to law enforcement that has disproportionately targeted black and Latinx communities for police patrols of public space – even when the law enforcement practice appears, at first glance, race neutral.Footnote 93 For instance, so-called broken windows policing posits that minor instances of property crime – such as vandalism – can create an atmosphere of lawlessness, sowing the conditions for more serious activity, such as violence. As the theory goes, one of the best ways to reduce or prevent violent crime (or crime that has a victim), is to have police focus on order maintenance in addition to criminal investigation. Order can be maintained through the use of police patrols in areas with “disreputable or obstreperous or unpredictable people: panhandlers, drunks, addicts, rowdy teenagers, prostitutes, loiterers, the mentally disturbed.”Footnote 94 Again, or so the theory goes.Footnote 95
Relatedly, the use of actuarial tools to predict where crime will occur and the related designation of so-called high crime areas to justify continued over-policing in those areas, creates a feedback loop (or a ratchet effect) reinforcing justifications for heightened patrolling and surveillance of racial minority communities.Footnote 96 In other words, the more you put police in public areas (where privacy rights are slim to none), the more crime you’ll find because of that surveillance, justifying further surveillance.
As applied, the deployment of broken windows policing and actuarial practices has led to greater police presence and surveillance in communities of color (often communities that are also socioeconomically disadvantaged).Footnote 97 To be clear, the greater police presence is itself a public privacy harm, subjecting those in public space – walking down the street – to observation, surveillance, frisking, and social control by the police.Footnote 98 This is all the more true with the rapid proliferation of police-worn body cameras by law enforcement departments across the United States, and policies requiring police to activate their cameras more regularly, creating a vast repository of “evidence” that can be used against minority communities.Footnote 99
But that police presence qua surveillance, in turn, leads to additional privacy harms, including, as discussed above, stops, frisks, searches, and, potentially, arrest and incarceration, with the attendant loss of privacy they entail. As the Movement for Black Lives continues to effectively highlight, the harms visited upon communities of color by police surveillance of their communities are not limited to privacy harms – too often the patrols and surveillance lead to police brutality and death. In other words, it is the greater police presence in communities of color that contributes to and makes inevitable higher rates of arrest, conviction, and violence toward people of color. As explained by The Sentencing Project, the “rise of mass incarceration begins with disproportionate levels of police contact with African Americans.”Footnote 100
As the NYPD stop-and-frisk policy highlights at scale, the disproportionate surveillance created by policies such as broken windows and actuarial policing – again, purportedly race-neutral forms of policing – is amplified by race-conscious and explicitly biased surveillance methods, such as racial profiling wherein people are targeted for surveillance and detention because of their race.Footnote 101 For example, there are recent examples where police departments have allegedly targeted Black Lives Matter (BLM) members for photographic surveillance while engaged in First Amendment protected protest activityFootnote 102 and for surveillance via social media,Footnote 103 with no basis for suspicion. The FBI has also targeted BLM members for surveillance.Footnote 104 And several recent studies document the ubiquity of racial profiling of motorists, leading to a disproportionate number of black people being pulled over and subsequently searched by police. A 2019 analysis conducted by the Stanford Computational Policy Lab of over 100 million municipal and state traffic stops conducted in jurisdictions across the country revealed “evidence of widespread discrimination in decisions to stop and search drivers.”Footnote 105 According to the study, there was “evidence that the bar for searching black and Hispanic drivers is lower than for searching whites.” So prevalent is the practice of racial profiling that in popular parlance it has been dubbed the criminalization of “driving while black.”Footnote 106 Or, as put by one of author Tayari Jones’s characters in her moving novel highlighting the devastating role of policing on black relationships, “[a]pparently, make plus model plus race equaled drug dealer, even in Atlanta.”Footnote 107
Religious Minorities
Like other minority communities, religious minorities – particularly Muslim communities – have been subjected to greater surveillance and diminished lived privacy.Footnote 108 For example, law enforcement agencies such as the NYPD created specific initiatives targeting Muslim communities for surveillance.Footnote 109 These surveillance initiatives included video monitoring of who enters and exits mosques and embedding undercover officers in Muslim community organizations, among other tactics. Like the racially applied stop-and-frisk program, the legality of the NYPD program was successfully challenged in federal court as a violation of constitutional guarantees of equal protection and free exercise, resulting in a settlement and commitment to end suspiciousness surveillance on the basis of religion or ethnicity.Footnote 110 But it was initially enabled by the lack of privacy in public, permitting police to, in effect, stake out Muslims.
There are also laws, particularly prevalent in Europe, that prevent Muslim women from wearing head veils in public and forcibly expose part of these women’s bodies to public surveillance. In 2018, Denmark became the sixth European country to ban certain Muslim head and face coverings from being worn in public, and in 2019 the Canadian province of Quebec banned the wearing of face coverings by some government employees. But likewise in the United States, there are instances where government actors have targeted those wearing Muslim clothing for discriminatory treatment. Muslim women and youth have been subject to discrimination and harassment on the basis of their head veils at work,Footnote 111 while playing high school sports,Footnote 112 and simply trying to exist and enjoy public space by, for example, going for a swim at a city pool.Footnote 113 And certain law enforcement practices within the United States at the federal and local levels have focused surveillance on those that do wear a veil.Footnote 114 Such policies impose obstacles on Muslim women’s ability to be seen and heard in the public square. Veil restrictions “condition the entrance to the public sphere” on compulsory rejection of one’s religion, and, I would add, a surrender of one’s privacy.Footnote 115 Rather than representing a purported feminist liberation of Muslim women, veil restrictions operate as a form of surveillance of Muslim women, forcing them to expose themselves to society in a conforming way or forcing women out of public spaces and into the home,Footnote 116 ignoring the veil’s potential as a liberating, empowering symbol.Footnote 117 Indeed, veil restrictions take their place within a long – and brutal – history of Western attempts to surveil, reveal, know, control and thereby produce the “dangerous” and “oriental” feminine other.Footnote 118
Queer Communities
As with racial and religious minorities, surveillance and policing of lesbian, gay, bisexual, transgender, queer, and gender nonconforming people has been extensively documented and affectingly described.Footnote 119 The harms of surveillance are particularly acute for those who are both queer and racial minorities. Predating the advent of contemporary administrative means for policing transgender identities (such as banning transgender access to bathrooms comporting with an individual’s gender identity), the state and police have long surveilled, criminalized, and harassed queer individuals.
For instance, the so-called Lavender Scare of the 1950s involved the highest levels of the US government – including President Dwight Eisenhower and the US Senate under the influence of Joseph McCarthy – outing and firing thousands of gay federal government employees. More viscerally, in the 1960s, New York City police would enter clubs, line up, and check all gender nonconforming people to ensure that people “were wearing the legally mandated three pieces of ‘gender appropriate clothing.’”Footnote 120 And, of course, until the Supreme Court’s 2003 decision in Lawrence v. Texas, states were permitted to criminalize same-sex intimacy – even in the privacy of one’s own home.Footnote 121 As Eric Stanley puts it, “[t]rans/gender-non-conforming and queer people, along with many others, are born into webs of surveillance.”Footnote 122 As with profiling of people based on race, the pervasiveness with which transgender people – particularly trans women of color – are targeted for police scrutiny has been described aptly as the criminalization of “walking while trans.”Footnote 123 Tragically, sometimes the policing of trans women of color and trans youth has occurred with the acquiescence (and sometimes support) of more privileged members of the queer community. For example, trans people of color have been subjected to heightened police surveillance in Greenwich Village, New York City, and Boystown, Chicago with the support of some affluent, white gay property owners who live in these neighborhoods.Footnote 124
But in addition to historic and continued over-policing of LGBTQ individuals, the administrative state also subjects queer people to additional, more subtle forms of surveillance – surveillance that is enabled in part by background rules providing that there is no privacy for information already exposed to the public. Rules regulating when and how a person can change their name and gender marker on government identification documents are a prime example. The complex rules that vary across different jurisdictions are difficult to navigate, often necessitating a lawyer and sometimes a court order. As Dean Spade has underscored, the classifications are not neutral and there is nothing preternatural about them; instead, they operate as a form of productive surveillance, reinscribing normative, state-sponsored iterations of gender identity (much in the same way the racialized surveillance documented by Simone Browne produces norms or associations around race).Footnote 125
Categories themselves are a form of disciplinary power. As explained by Spade:
The invention of various categories of proper and improper subjects is a key feature of disciplinary power that pervades society. The creation and maintenance of such categories of people (e.g., the homosexual, the criminal, the welfare dependent mother, the productive citizen, the terrorist) establish guidelines and norms . . . These norms and codes of behavior reach into the most minute details of our bodies, thoughts, and behaviors. The labels and categories generated through our disciplined behavior keep us in our places and help us know how to be ourselves properly.Footnote 126
Put similarly by Lisa Jean Moore and Paisley Currah, “identity documents do not so much confirm identity as produce and authorize it legally.”Footnote 127 And this is just as true for any purportedly “new” category or expanded definition created by those resisting limited identity rubrics, for example those who challenge the scope of current categories (e.g., who counts as “male” or “female”) and create “new” categories/labels (e.g., “genderqueer”). As Michael Warner has explained, “almost everything about sex, including the idea of sexuality itself, depends on historical conditions, though perhaps at deep levels of consciousness that change slowly.”Footnote 128 The category of “transgender” is case and point. As one forward-thinking court recognized, “Transgender is ‘[a]n umbrella term that may be used to describe people whose gender expression does not conform to cultural norms and/or whose gender identity is different from their sex assigned at birth. Transgender is a self-identity, and some gender nonconforming people do not identify with this term.’”Footnote 129
So, while recent public attention has been brought to the existence and importance of people who are transgender, in discussing “transgender” rights it is equally important not to ignore identities that do not fit neatly into “new” categories being socially and legally enshrined, and appeals for privacy, invisibility, or “going stealth,” in some ways privilege those who can and want to conform to binary expressions of gender.Footnote 130 As author Maggie Nelson underscored in her social theory memoir, “‘[T]rans’ may work well enough as a shorthand, but the quickly developing mainstream narrative it evokes (‘born into the wrong body,’ necessitating an orthopedic pilgrimage between two fixed destinations) is useless for some . . . ? [F]or some, ‘transitioning’ may mean leaving one gender entirely behind, while for others . . . it doesn’t?”Footnote 131 Indeed, as Eve Kosofsky Sedgwick observed, “no matter what cultural construction, women and men are more like each other than chalk is like cheese.”Footnote 132
That said, while categories – even new categories or expansions of existing categories – have their own disciplining, surveilling impact, any definitional expansion does have real emancipatory effect. Absolutely, as underscored by Audre Lorde, “[m]uch of western European history conditions us to see human differences in simplistic opposition to each other: dominant/subordinate, good/bad, up/down, superior/inferior.”Footnote 133 And such oppositional constructions of “difference” should be resisted. But while there is good reason to be skeptical of the oppositional construction of certain identities (male versus female; gay versus straight; trans versus cis), the emerging categories “have a real power to organize and describe their experience of their own sexuality and identity . . . If only for this reason, the categorization commands respect.”Footnote 134 Judith Butler, who was at the vanguard of theorizing how our sexual and gender identities are socially constructed, similarly recognized the instrumental, short-term political value of identity categories notwithstanding their long-term disciplinary risks.Footnote 135
In short, when a person resists prevailing classifications or fails to conform to them and helps produce new forms of identity, the social tableau is beautifully expanded (even if imperfectly), but there can also be tremendous personal costs for each individual – including privacy costs. A closer examination of the myriad laws regulating government identification documents highlights how.
While progress is being made to liberalize name change laws in some communities across the United States, many jurisdictions impose significant barriers to changing one’s name on government identification documents. For example, certain states forbid people convicted of felonies from changing their name for long periods of time and people convicted of certain crimes (such as identity theft) may be permanently barred from changing their names. Particularly given the over-policing and profiling of trans people of color, these laws represent a significant barrier for trans and gender nonconforming people seeking to live consistently with their gender identity.Footnote 136 As advocates have emphasized, such laws result in “forced outing that takes place every time [they are] required to present a government-issued identification or [are] called by [their] legal name in public.”Footnote 137
But even where name changes are technically permitted, the process can be cumbersome and involve forced outing of intimate information. In New York State, for instance, a person must seek a court order changing their name (which absent an order to seal remains a public record open to all) and must also publish the fact that they changed their name in a local newspaper (though the publication requirement can be waived).Footnote 138 There are fees associated with both requesting the court order and publishing the notice in a newspaper. Should a name change petition be granted, the individual then still needs to provide the order to each different agency, such as the social security administration, where they want their name changed. Thus, while in theory many states permit name changes for transgender people, the barriers to obtaining accurate identifications across the panoply of government bureaucracies are substantial in terms of cost, privacy, and logistics.
Compared to name change requirements, there are often even higher hurdles for changing gender markers on government identification documents. A handful of jurisdictions, such as Tennessee and Ohio, do not permit the gender marker on one’s birth certificate to be changed under any circumstances. And many jurisdictions require that in order for an individual to change their gender marker on their birth certificate or driver’s license, an individual must first present medical documentation indicating that they have undergone gender confirmation surgery (sometimes referred to as sex reassignment surgery).Footnote 139 But from a medical perspective, gender identity – someone’s inner sense of belonging to a particular gender (such as man or woman), or not belonging to a particular category (nonbinary or gender nonconforming) – is the most appropriate determinant of someone’s “sex” classification, not so-called “biological sex.” Indeed, frequent legal and vernacular references to so-called “biological sex” are often imprecise because “sex-related characteristics include external genitalia, internal reproductive organs, gender identity, chromosomes, secondary sex characteristics [such as body hair,] genes” and hormones.Footnote 140 For the many who choose not to undergo surgery either because it (1) is not medically indicated, (2) is not necessary for the person to live consistently with their gender identity, or (3) is economically prohibitive,Footnote 141 such laws publicly out sensitive, intimate information to the public, including potential employers, who may note the potential dissonance between the person’s ID and gender presentation, increasing the likelihood of discrimination. As explained by Dean Spade, “[p]eople whose identity documents do not match their self-understanding or appearance also face heightened vulnerability in interactions with police and other public officials.”Footnote 142
Even in jurisdictions that do permit changes to gender markers without rigorous medical documentation, most bureaucracies confine the choices available to the male–female binary.Footnote 143 Consequently, for those that wonderfully complicate the binary, their documentation does not accurately reflect their identity and they will continue to confront discomfort and problematic outing when required to present their identifications (or, as will be discussed below, when forced to use binary bathrooms). And in many of these more forward-thinking jurisdictions, the nonbinary option is usually limited to a single, third-gender category (often denominated with “X”), rather than multiple additional categories, a blank spot permitting individuals the expressive freedom to self-describe, or the absence of gender classification altogether.Footnote 144
Given these barriers to accurate identification documents, it’s no surprise that according to a national survey of transgender and gender nonconforming people published in 2012, only one-fifth of the people surveyed had been able to update all of their identification documents and records with accurate gender markers, one-third had updated none of their documents or records, and 41 percent lived without an accurate driver’s license or state ID. Of those who had presented an ID that did not match their gender identity, 40 percent reported being harassed based on the dissonance between their appearance/expression and their identification.Footnote 145 Similarly, according to a 2015 survey, only 11 percent of respondents reported that all of their IDs included the name and gender they preferred, and more than two-thirds reported that none of the identification documents were accurate.Footnote 146
A related, nascent effort at gender surveillance has occurred in a number of states and localities over the last few years: so-called “bathroom bills” or “papers-to-pee” laws have been proposed, and in some instances (e.g., North Carolina), enacted. Certain iterations of these bills would have penalized transgender people for using restrooms inconsistent with the sex they were assigned at birth or inconsistent with an identification document. As outlined above, accurate identification documents may be difficult to obtain because of onerous medical and procedural requirements. Some of the laws that have been proposed would charge owners of public accommodations with enforcement of the laws and punish those proprietors with fines for permitting patrons to use the “wrong” restroom, outsourcing surveillance of transgender people to the private sector.Footnote 147 A ballot initiative proposed in California would have imposed a $4,000 fine on any government entity or person who permitted a person to use a restroom inconsistent “with their sex as determined at birth, through medical examination, or court judgment recognizing a change of gender.”Footnote 148 These laws are the literal public policing of people’s gender identity.Footnote 149
Other jurisdictions – often local school districts – have passed or regularly consider regulations targeting queer youth, forbidding students from using bathrooms or locker-rooms consistent with their gender identity.Footnote 150 And the Trump administration Department of Education recently concluded an investigation where it interpreted Title IX of the Education Amendments Act to require schools to exclude trans students from sports teams consistent with their gender identity.Footnote 151 More broadly, the Trump administration is considering or in some contexts has already proposed regulations that would define sex under federal law narrowly as an immutable condition determined by external genitalia at birth, restricting transgender people’s ability to be themselves and navigate a whole host of societal settings beyond bathrooms and including dormitories, homeless shelters, and prisons.Footnote 152
The significance of these bathroom regulations and their role as one of the next battlegrounds for LGBTQ rights prompted one New York Times commentator to deem 2015 the “Year of the Toilet.”Footnote 153 But the laws are about much more than toilets; they involve questions about whether society will recognize the existence of transgender lives and permit transgender people to fully participate in public life. As powerfully explained by the lawyers for Gavin Grimm, who was excluded from using the bathrooms consistent with his gender identity by his high school in Virginia, Gavin’s “case is about much more than bathrooms. It’s about a boy asking his school to treat him just like any other boy. It’s about protecting the rights of transgender people in public spaces and not forcing them to exist on the margins.”Footnote 154
By dictating that people use the bathroom (or any other sex-segregated space) corresponding to their so-called “biological sex,” often defined as the sex listed on one’s birth certificate, such laws discriminate against transgender people on the basis of their sex and gender identity.Footnote 155 But, as with restrictive gender marker laws, they also potentially operate as a form of biometric, normalizing surveillanceFootnote 156 that also out intimate information about trans people every time they are forced to use public restrooms or sex-segregated spaces that do not correspond to the individual’s gender identity, subjecting them to ridicule and violence. In opposition to bathroom bills, some transgender people posted photos of themselves in bathrooms required by the bills, attempting to highlight the potential privacy implications of the laws for trans people. Others creatively created cards to hand out to those who they encountered in restrooms, explaining their presence.Footnote 157
By invading their privacy, the restrictive bathroom regulations deter transgender people from entering the public square in the first instance and suggest that, to do so, they must accede to the state’s arbitrary and inaccurate determination of who they are. These laws deny trans people agency over their own identity and foreclose access to the very venues where they could contest the state’s determination, burdening their ability to participate in public life and denying their existence. As emphasized by Chase Strangio, laws targeting transgender people are “part of a coordinated effort at all levels of government to challenge trans existence, criminalize our bodies, and push us into the shadows.”Footnote 158
Quite right. And when paired with restrictive gender marker laws, laws forbidding transgender people from using public restrooms that comport with their gender identity put many trans people in an impossible double bind and infringe on their autonomous decisions over medical treatment. Although some proponents of bathroom bills claim that trans people who have surgery will be able to change their birth certificate and therefore use the public bathroom corresponding with their gender identity, transgender people will often be impeded from having surgery and will therefore be barred from accessing bathrooms consistent with their gender identity.
How so? Restrictive bathroom regulations often either explicitly condition entrance to a multi-occupancy single-sex facility on some kind of surgical transitionFootnote 159 or on the existence of a birth certificate that has a gender marker corresponding to the sex of the restroom. For example, both HB2 passed (and partially repealed) in North Carolina and SB6 proposed in Texas conditioned entrance to sex-segregated facility on the sex listed on a birth certificate.Footnote 160 As discussed, many states only permit gender markers on a birth certificate to be modified if an individual has undergone surgery so, in effect, the birth certificate requirement often amounts to a surgery requirement. But under the prevailing medical recommendations, an individual only qualifies for genital surgery if they have reached the age of majority (most commonly, 18 years old in the United States) and if they have lived consistently for twelve months in the gender role that conforms with their gender identity.
According to the standards of care developed by the World Professional Association for Transgender Health, it is recommended that adult individuals needing metoidioplasty or phalloplasty (procedures to create a penis) or a vaginoplasty (a procedure to create a vagina) live for twelve continuous months “in a gender role that is congruent with their gender identity” before obtaining those surgeries.Footnote 161 Pursuant to the standards of care, “[d]uring this time, patients should present consistently, on a day-to-day basis and across all settings of life, in their desired gender role. This includes coming out to partners, family, friends, and community members (e.g., at school, work, other settings).” Presenting consistently on a day-to-day basis often includes using the restroom that corresponds with one’s gender identity. Therefore, restrictive bathroom regulations interfere with the medical requirements for obtaining certain surgeries in the first instance because they restrict people’s ability to use a single-sex public restroom until after having surgery. Using a single-sex public restroom is probably one of the few activities in many people’s daily lives that is, in fact, segregated by sex. How, then, is a person supposed to live consistently for a year in their true gender role if they are forbidden from doing one of the principle social activities that is sex-segregated?
In other words, restrictive bathroom regulations create a catch-22 even for those transgender individuals who do feel the need for certain kinds of surgery. The regulations often require surgery before using a single-sex bathroom but erect significant barriers to compliance with the recommended medical prerequisites for having certain surgeries. The double bind for transgender people who do not need particular gender confirmation surgeries to live comfortably and consistently with their gender identity and for youth who are often not eligible for surgery is even more apparent. Because such people are forbidden from using the public restrooms that correspond to their gender identity and expression because they have not had the required surgery, every time they use a single-sex bathroom that does not match their gender expression, sensitive, intimate information about their identities and their bodies will be publicly disclosed. If they want to avoid such outing, they will be forced to undergo some sort of surgical intervention – surgery they may not need to live comfortably with their gender identity, that may not be medically indicated, or that may be prohibitively expensive for a particular individual.Footnote 162
The costs of restrictive gender classification laws are magnified for the disproportionate number of trans and genderqueer people that are incarcerated. Many jails, prisons, juvenile detention centers, and immigrant detention centers in the United States do not house trans folk in ways consistent with their gender identity. In other words, trans women will often be housed in male facilities. For example, while the Obama administration had provided that initial housing designations for the federal Bureau of Prisons could be made based on the individual’s gender identity, the Trump administration predictably reversed course, providing that the initial determination of where an individual should be housed should be based on so-called biological sex.Footnote 163 These administrative policies create surveillance violence, outing trans people as such within prison, and potentially subjecting them to sexual violence by other inmates or correctional officers. According to the 2015 US Transgender Survey conducted by the National Center for Transgender Equality of over 27,000 transgender people, one in five respondents who had been incarcerated in a jail, prison, or juvenile detention center in the past year reported being sexually assaulted by facility staff or other inmates – five to six times higher than the overall incarcerated population.Footnote 164 The lack of appropriate identification combined with restrictive housing policies leads to privacy violations and violence.
Women
Despite privacy’s critical role in advancing gender equity, women also face unique privacy threats and are subjected to a substantial amount of gendered and sexualized surveillance gaze, many instances of which are abetted by the secrecy paradigm.Footnote 165 For example, women are disproportionately targeted for cyber harassment, including the nonconsensual disclosure of intimate images, or so-called “revenge porn.”Footnote 166 According to a recent study of nonconsensual pornography websites across the United States, 91.8 percent of images examined featured female victims, and only 7.4 percent feature male victims.Footnote 167 (Queer folk are also disproportionately threatened by nonconsensual disclosure of their intimate images.)Footnote 168 Nonconsensual disclosure of intimate images can visit concrete material harms by creating a cycle of online harassment, leading to further sexual coercion, exacting devastating mental health harms, preceding physical violence, and endangering employment opportunities.Footnote 169 Activist and revenge porn victim Holly Jacobs has courageously discussed the impact that nonconsensual disclosure of nude images had on her life: the disclosure directly led to online harassment and terrorization, mental health harms, and employment barriers, among other harms.Footnote 170 While increased attention is being paid to the harms of nonconsensual disclosure of intimate images and new legislation enacted in many states thanks to courageous activists and scholars,Footnote 171 attempts to obtain legal redress are sometimes thwarted by the secrecy paradigm.Footnote 172
For instance, as described above, in Doe v. Peterson, plaintiff sued operators of a nude photograph website, where nude photos of plaintiff taken when she was a teenager and sent privately to her then boyfriend were posted. The court dismissed plaintiff’s public disclosure claim, reasoning that because the photos had been previously posted by a different website, they were not private facts. Put differently, the bad act of another excused subsequent bad acts of disclosure.
There are important cases going the other direction and holding perpetuators of revenge porn accountable in civil actions,Footnote 173 but one of the principal arguments advanced against holding people accountable for nonconsensual image distribution is “that a woman’s consensual sharing of sexually explicit photos with a trusted confidant should be taken as wide-ranging permission to share them with the public. Said another way, a victim’s consent in one context is taken as consent for other contexts.”Footnote 174
Tragically, female victims of sexual violence have also been unable to stop documentation pertaining to assaults against them from proliferating without their consent. In fact, several of the Supreme Court’s key rulings establishing the secrecy paradigm in the tort context involve the Court concluding that because the identity of sexual assault victims were in publicly available court records or police reports, further publication of that information was free game.Footnote 175 One extreme example of this is the case of Anderson v. Suiters.Footnote 176 There, the court relied on the “newsworthiness” principle, a closely related doctrinal cousin of the secrecy paradigm, also grounded in the First Amendment. Newsworthiness refers to the rule that if a certain topic is of legitimate public concern, discussion of it by society, including the press, is insulated from liability. In Suiters, the Tenth Circuit (in a decision joined by then Judge, now Justice, Neil Gorusch) affirmed the grant of summary judgment in favor of media defendants who published limited portions of a video of a woman allegedly being raped while unconscious by her husband. The woman allegedly provided the tape to law enforcement on the condition that it not be shared, but the court concluded that because the tape was relevant to the prosecution of the woman’s husband for sexual assault, including assault on other victims, the video was newsworthy and therefore free game for publication by the media. (Absurdly, the court also downplayed the extent of the privacy violation, noting the woman “was never identified by name, and the excerpted portion of the videotape was limited to a few movements of the alleged attacker’s naked body without disclosing the sexual acts in great detail; only [the woman’s] feet and calves were clearly visible, and they bore no identifying characteristics.”)Footnote 177
While rape shield laws may protect the identity of assault victims from being disclosed in the course of a criminal proceeding,Footnote 178 think of the incentives created by a regime that essentially immunizes downstream disclosure once the identity has been disclosed in the first instance or if it is related to a law enforcement concern (which are almost always deemed “newsworthy”): if a woman is subject to sexual assault and they come forward, their identity may be free game for discussion. While victims of assault should of course feel no stigma, the decision about whom to disclose any such assault is highly personal and should remain with each individual.
Relatedly, the secrecy paradigm has also stymied efforts to protect women from privacy intrusions (as opposed to disclosures) in public. For example, in Gary v. State, a Georgia appellate court overturned the criminal invasion of privacy conviction of a grocery store employee who aimed his cellphone camera up the skirt of a woman on at least four occasions, recording video. The court concluded that the conviction was improper because the woman was in a public place and therefore could not “reasonably expect to be free from intrusion or surveillance.”Footnote 179 The absence of privacy in public works with technological advances to render women more vulnerable: while the physical lifting of someone’s skirt to view intimate areas would, undoubtedly, be deemed a privacy violation, the same view captured via camera, perhaps with telephoto lens, is ignored because it occurs in “public.”Footnote 180 When juxtaposed to regulatory efforts to unveil Muslim women, discussed above, such cases suggest a perverse trend: women are at times forced by the law not to take efforts to shield their bodies in public and, once their bodies are exposed, they lose any ability to limit the degree to which their bodies are further documented and disseminated.
The lack of privacy in public emboldens not just the public, objectifying gaze of women by other people, it also facilitates catcalling and verbal harassment of women in public space. As explained by JoAnne Sweeny, “[b]oth street and cyber-harassment carry significant harms for their victims, resulting in women often leaving or reducing their exposure to the public sphere out of fear . . . The right to speak [in public], to say harassing, hateful things, should not outweigh a woman’s right to some privacy and peace when she enters the public sphere.”Footnote 181
The reality of the ubiquitous and gendered surveillance gaze is amplified by the fact that though certain surveillance regimes, such as video/CCTV “security” cameras, are sometimes justified as a means of protecting women from harassment, such cameras can just as plausibly serve as a means of harassment by peeping toms.Footnote 182 Even assuming that these cameras are not perverted for gender harassment, while video cameras may in certain instances protect privileged women from sexual assault, video surveillance of public space (and the lack of privacy while in public), is just as often used to police women from marginalized backgrounds: sex workers, poor women, queer women, and women of color.Footnote 183 Consequently, rather than viewing “security” cameras as a form of protection, women from marginalized backgrounds often remain wary of these cameras.
The lack of protection for privacy in public also enables the videotaping, harassment, and doxing of women who attempt to exercise their right to reproductive healthcare, including the right to obtain an abortion, and those that provide healthcare services to women.Footnote 184 (Doxing is the posting of personally identifiable information about a person for purposes of galvanizing social opprobrium – or worse – toward the individual.)Footnote 185 Women have been videotaped and harassed by antiabortion activists both as they enter and exit clinics, sometimes even in instances where the patient is being transported via stretcher to an ambulance for more urgent medical care. When women have attempted to hold accountable those who record them as they enter/exit abortion clinics, such attempts have sometimes been thwarted because the women were in “public” as they entered the healthcare office.Footnote 186 Harassment outside of abortion clinics has led some women attempting to exercise their rights and doctors providing reproductive healthcare to hood or conceal their identity as they enter abortion clinics.Footnote 187
Even should a woman not be videotaped and harassed while entering an abortion provider’s office, she may face immense privacy hurdles in order to obtain an abortion – particularly if she is economically deprived. For instance, the Hyde Amendment prohibits the use of federal funds for abortion unless the abortion is necessary for the life of the mother, or if the pregnancy is the result of rape or incest. Many women who are impoverished rely on Medicaid for their healthcare. If a state follows the Hyde Amendment and restricts Medicaid funding for abortions to pregnancies resulting from rape or incest, indigent women will have to disclose their assault to healthcare providers (which, in turn, may deter them from seeking an abortion at all). The attacks on poor women’s privacy is not limited to the abortion context – as noted above when discussing the privacy of people who are economically disadvantaged and the important work of Khiara Bridges, women who rely on state assistance are subjected to manifold privacy invasions in order to secure modest public benefits, including reproductive healthcare. And as meticulously documented by Michele Goodwin, women’s reproductive health is also surveilled and controlled through the criminal law system where, for example, fetal drug laws are used to control the reproductive choices of women (often people of color and people of limited means), including through disclosure of information pertaining to their medical and reproductive health.Footnote 188
Thus, in a variety of contexts, women’s privacy is endangered by various surveillance regimes, and the background legal rules that support those regimes.
* * *
All told, when weak doctrinal protections for privacy in public, which are premised on the ability to keep the information secret in order to have a right to privacy are overlaid with the lack of lived privacy of many marginalized groups, these marginalized groups are left with little in the way of remedies if they want to fight any privacy invasion inflicted by the government or a private party. While the above discussion has focused on issues of poverty, race, sexuality, gender identity, gender, and religion, certainly other forms of marginalization are also exacerbated by the interaction between lived exposure and the secrecy paradigm. Such is the case for immigrants targeted with laws permitting their arrest based on suspicion of being removable and who are otherwise subject to surveillance that is now pervasive and decoupled from examination at the border.Footnote 189 It’s true for people living with disabilities whose impairments may be disclosed or made more visible due to socially constructed ableist architectures.Footnote 190 For workers who are subject to intensive monitoring and tracking by their employers, the secrecy paradigm also leaves them vulnerable.Footnote 191 Equally so for formerly incarcerated individuals who may lack protection over their “public” criminal record, exposing them to employment discrimination.Footnote 192 And for Native Americans who continue to be subjected to government and privatized surveillance for their activism.Footnote 193 There are many other examples (some of which are interspersed in the chapters that follow). But my hope is that this chapter has shed some light on why privacy matters for the marginalized, and the doctrinal rules that facilitate the lack of privacy for these groups.