Warrantless searches are
searches and seizures
Search and seizure is a procedure used in many civil law and common law legal systems by which police or other authorities and their agents, who, suspecting that a crime has been committed, commence a search of a person's property and confiscat ...
conducted without court-issued
search warrant
A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find. In most countries, ...
s.
In the United States, warrantless searches are restricted under the
Fourth Amendment to the
United States Constitution
The Constitution of the United States is the Supremacy Clause, supreme law of the United States, United States of America. It superseded the Articles of Confederation, the nation's first constitution, in 1789. Originally comprising seven ar ...
, part of the
Bill of Rights
A bill of rights, sometimes called a declaration of rights or a charter of rights, is a list of the most important rights to the citizens of a country. The purpose is to protect those rights against infringement from public officials and pri ...
, which states, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon
probable cause
In United States criminal law, probable cause is the standard by which police authorities have reason to obtain a warrant for the arrest of a suspected criminal or the issuing of a search warrant. There is no universally accepted definition or f ...
, supported by
oath
Traditionally an oath (from Anglo-Saxon ', also called plight) is either a statement of fact or a promise taken by a sacrality as a sign of verity. A common legal substitute for those who conscientiously object to making sacred oaths is to ...
or
affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
History
In the
Thirteen Colonies
The Thirteen Colonies, also known as the Thirteen British Colonies, the Thirteen American Colonies, or later as the United Colonies, were a group of Kingdom of Great Britain, British Colony, colonies on the Atlantic coast of North America. Fo ...
, agents of the
British Empire
The British Empire was composed of the dominions, colonies, protectorates, mandates, and other territories ruled or administered by the United Kingdom and its predecessor states. It began with the overseas possessions and trading posts esta ...
utilized
general warrant
A writ of assistance is a written order (a writ) issued by a court instructing a law enforcement official, such as a sheriff or a tax collector, to perform a certain task. Historically, several types of writs have been called "writs of assistance ...
s to authorize searches in the homes of colonists. Such warrants allowed the holder to search any place for any thing at any time. They were viewed as abuses of power, contributing to increased tensions that ultimately led to the
American Revolution
The American Revolution was an ideological and political revolution that occurred in British America between 1765 and 1791. The Americans in the Thirteen Colonies formed independent states that defeated the British in the American Revolut ...
. The Fourth Amendment barred all warrantless searches and all general warrants; nevertheless, the interpretation and limitations of the Fourth Amendment and the permissibility of warrantless searches under certain circumstances, such as wartime, have been important in the history of executive and
judicial
The judiciary (also known as the judicial system, judicature, judicial branch, judiciative branch, and court or judiciary system) is the system of courts that adjudication, adjudicates legal disputes/disagreements and interprets, defends, and app ...
power in the United States.
During the
American Revolutionary War
The American Revolutionary War (April 19, 1775 – September 3, 1783), also known as the Revolutionary War or American War of Independence, was a major war of the American Revolution. Widely considered as the war that secured the independence of t ...
, "the
Continental Congress
The Continental Congress was a series of legislative bodies, with some executive function, for thirteen of Britain's colonies in North America, and the newly declared United States just before, during, and after the American Revolutionary War. ...
regularly received quantities of intercepted
British
British may refer to:
Peoples, culture, and language
* British people, nationals or natives of the United Kingdom, British Overseas Territories, and Crown Dependencies.
** Britishness, the British identity and common culture
* British English, ...
and
Tory
A Tory () is a person who holds a political philosophy known as Toryism, based on a British version of traditionalism and conservatism, which upholds the supremacy of social order as it has evolved in the English culture throughout history. Th ...
mail". See
intelligence in the American Revolutionary War
During the American Revolutionary War, the Continental Army and British Army conducted espionage operations against one another to collect military intelligence to inform military operations. In addition, both sides conducted political action, c ...
.
In 1975, the
Church Committee
The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
, a
United States Senate
The United States Senate is the upper chamber of the United States Congress, with the House of Representatives being the lower chamber. Together they compose the national bicameral legislature of the United States.
The composition and pow ...
select committee chaired by
Frank Church
Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an Americans, American politician and lawyer. A member of the Democratic Party (United States), Democratic Party, he served as a United States Senate, United States senator from Idah ...
of
Idaho
Idaho ( ) is a state in the Pacific Northwest region of the Western United States. To the north, it shares a small portion of the Canada–United States border with the province of British Columbia. It borders the states of Montana and Wyom ...
, a
Democrat
Democrat, Democrats, or Democratic may refer to:
Politics
*A proponent of democracy, or democratic government; a form of government involving rule by the people.
*A member of a Democratic Party:
**Democratic Party (United States) (D)
**Democratic ...
, investigated domestic and foreign
Cold War
The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because the ...
area intelligence-gathering by the
federal government
A federation (also known as a federal state) is a political entity characterized by a union of partially self-governing provinces, states, or other regions under a central federal government (federalism). In a federation, the self-governin ...
, including warrantless surveillance on anti-war advocates inside America. The committee report found the "Americans who violated no criminal law and represented no genuine threat to the '
national security
National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
' have been targeted, regardless of the stated predicate. In many cases, the implementation of
wiretaps
Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol s ...
and
bugs has also been fraught with procedural violations, even when the required procedures were meager, thus compounding the abuse. The inherently intrusive nature of electronic surveillance, moreover, has enabled the Government to generate vast amounts of information – unrelated to any legitimate governmental interest – about the personal and political lives of American citizens."
The "potential criminal liability of the
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
and the
Central Intelligence Agency
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
for operations such as
SHAMROCK
A shamrock is a young sprig, used as a symbol of Ireland. Saint Patrick, Ireland's patron saint, is said to have used it as a metaphor for the Christian Holy Trinity. The name ''shamrock'' comes from Irish (), which is the diminutive of ...
(interception of all international cable traffic from 1945 to 1975) and
MINARET
A minaret (; ar, منارة, translit=manāra, or ar, مِئْذَنة, translit=miʾḏana, links=no; tr, minare; fa, گلدسته, translit=goldaste) is a type of tower typically built into or adjacent to mosques. Minarets are generall ...
(use of watchlists of U.S. dissidents and potential civil disturbers to provide intercept information to law enforcement agencies from 1969 to 1973)" helped persuade president
Gerald Ford
Gerald Rudolph Ford Jr. ( ; born Leslie Lynch King Jr.; July 14, 1913December 26, 2006) was an American politician who served as the 38th president of the United States from 1974 to 1977. He was the only president never to have been elected ...
in 1976 to seek surveillance legislation, which was ultimately enacted as
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign po ...
in 1978.
Abuses of power by the federal government led to reform legislation in the 1970s.
Advancing technology began to present questions not directly addressed by the legislation as early as 1985.
In its 1985 report "Electronic Surveillance and Civil Liberties", the nonpartisan Congressional
Office of Technology Assessment
The Office of Technology Assessment (OTA) was an office of the United States Congress that operated from 1974 to 1995. OTA's purpose was to provide congressional members and committees with objective and authoritative analysis of the complex scien ...
suggested legislation be considered for a surveillance oversight board. Congress disbanded this agency in 1995.
Clinton administration
On July 14, 1994, President Clinton's Deputy Attorney General and later
9/11 Commission
The National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission, was set up on November 27, 2002, "to prepare a full and complete account of the circumstances surrounding the September 11 attacks", includin ...
member
Jamie Gorelick
Jamie S. Gorelick (; born May 6, 1950) is an American lawyer who served as the Deputy Attorney General of the United States from 1994 to 1997, during the Clinton administration. She has been a partner at WilmerHale since 2003 and has served on ...
testified to the
Senate Intelligence Committee
The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government of ...
that "The Department of Justice believes, and the case law supports, that the president has inherent authority to conduct warrantless physical searches for foreign intelligence purposes … and that the president may, as has been done, delegate this authority to the Attorney General." This "inherent authority" was used to search the home of CIA spy
Aldrich Ames
Aldrich Hazen "Rick" Ames (; born May 26, 1941) is a former Central Intelligence Agency (CIA) officer turned KGB double agent, who was convicted of espionage in 1994. He is serving a life sentence, without the possibility of parole, in the Federa ...
without a warrant. "It is important to understand", Gorelick continued, "that the rules and methodology for criminal searches are inconsistent with the collection of foreign intelligence and would unduly frustrate the president in carrying out his foreign intelligence responsibilities".
George W. Bush administration
NSA warrantless surveillance controversy
On December 16, 2005, the ''
New York Times
''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid d ...
'' printed a story asserting that following 9/11, "President
Bush
Bush commonly refers to:
* Shrub, a small or medium woody plant
Bush, Bushes, or the bush may also refer to:
People
* Bush (surname), including any of several people with that name
**Bush family, a prominent American family that includes:
*** ...
secretly authorized the
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying", as part of the
War on Terrorism
The war on terror, officially the Global War on Terrorism (GWOT), is an ongoing international counterterrorism military campaign initiated by the United States following the September 11 attacks. The main targets of the campaign are militant I ...
:
The revelation of this program caused a widespread controversy, with legal experts and politicians concluding that it violates the
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign po ...
and other legal experts saying that the FISA law only applied to domestic calls and not to overseas calls and communications that involved a foreign intelligence threat. Bush administration officials such as the Attorney General defended the program by citing that this was a part of the justification that the Clinton administration used in its warrantless search of
Aldrich Ames
Aldrich Hazen "Rick" Ames (; born May 26, 1941) is a former Central Intelligence Agency (CIA) officer turned KGB double agent, who was convicted of espionage in 1994. He is serving a life sentence, without the possibility of parole, in the Federa ...
. They claimed that since Ames was spying for a foreign power, presidential power applied and FISA did not.
NSA call database
In May 2006, it was revealed that the Bush administration had also been compiling a
database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases sp ...
of telephone calls, created by the
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) with the cooperation of three of the largest telephone carriers in the United States:
AT&T
AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile tel ...
,
Verizon
Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas in ...
, and
BellSouth
BellSouth, LLC (stylized as ''BELLSOUTH'' and formerly known as BellSouth Corporation) was an American telecommunications holding company based in Atlanta, Georgia. BellSouth was one of the seven original Regional Bell Operating Companies after ...
. All three companies were paid to provide the information to the NSA. It is speculated that the database contains over 1.9
trillion
''Trillion'' is a number with two distinct definitions:
* 1,000,000,000,000, i.e. one million million, or (ten to the twelfth power), as defined on the short scale. This is now the meaning in both American and British English.
* 1,000,000,000,0 ...
call-detail records of phone calls made after September 11, 2001. The database's existence prompted fierce objection from those who viewed it as a warrantless or illegal search – nevertheless, the collection of such third-party information has been authorized by the
USA PATRIOT Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of Congress, Act of the United States Congress, signed into law by President of the United States, President George W. Bush. The formal name of the statute is the Uniti ...
, and has been upheld by the courts.
=US Foreign Intelligence Surveillance Court of Review
=
In a 2002 opinion entitled ''
In re: Sealed Case No. 02-001'', the
examined all the significant appellate decisions. The court noted all the Federal courts of appeal having looked at the issue had concluded that there was such constitutional power. Furthermore, if there was such power, "FISA could not encroach on the president's constitutional power", However, In Re Sealed Case "
ook
Ook, OoK or OOK may refer to:
* Ook Chung (born 1963), Korean-Canadian writer from Quebec
* On-off keying, in radio technology
* Toksook Bay Airport (IATA code OOK), in Alaska
* Ook!, an esoteric programming language based on Brainfuck
* Ook, th ...
for granted" that these cases are correct:
The "balancing test drawn from ''Keith''" is a reference to ''
United States v. U.S. District Court
''United States v. U.S. District Court'', 407 U.S. 297 (1972), also known as the now famous Keith Case, was a landmark Supreme Court of the United States, United States Supreme Court decision that upheld, in a unanimous 8-0 ruling, the requirements ...
'', in which the
Supreme Court of the United States
The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. federal court cases, and over state court cases that involve a point o ...
established a legal test to determine whether the primary use of the warrantless search was to collect foreign intelligence, as per presidential authority, or whether that primary use is to gather evidence for use in a criminal trial.
['']United States v. U.S. District Court
''United States v. U.S. District Court'', 407 U.S. 297 (1972), also known as the now famous Keith Case, was a landmark Supreme Court of the United States, United States Supreme Court decision that upheld, in a unanimous 8-0 ruling, the requirements ...
(Keith)'', .
Exceptions to the search warrant requirement
The warrant requirement of the
Fourth Amendment is not absolute, and a number of exceptions to that requirement have been recognized by the courts, based upon such factors as whether it is reasonable under the circumstances for officers to obtain a warrant, and whether evidence might be lost or destroyed before a warrant can be obtained.
Common exceptions include:
*Administrative searches: Routine administrative searches;
*
Border search
In United States criminal law, the border search exception is a doctrine that allows searches and seizures at international borders and their functional equivalent without a warrant or probable cause. The doctrine is not regarded as an exceptio ...
: The person or property of a person is searched when they attempt to enter the United States from a foreign nation or territory;
*Consent: The person who is searched, or who is in control of property that is searched, agrees to the search;
*
Exigent circumstance In criminal procedure law of the United States, an exigent circumstance allows law enforcement (under certain circumstances) to enter a structure without a search warrant, or if they have a "knock and announce" warrant, allows them to enter without ...
s: A pressing need to act without delay;
*Inventory search: A search is conducted of items taken into police custody pursuant to a formal policy;
*Plain feel: Contraband or evidence of criminal activity can be recognized through a suspect's clothing during a lawful pat down;
*
Plain view: Evidence of criminal activity can be observed by a police officer from a lawful vantage point;
*Probation search: A person on probation may be required to consent to searches of their person, property and home as a condition of probation;
*Safety checks: Entry is made into premises to ensure that people inside are not in danger or in need of medical assistance, with evidence of criminal activity observed incidentally to the safety check; and
*Search incident to arrest: A
suspect
In law enforcement jargon, a suspect is a known person accused or suspected of committing a crime. Police and reporters in the United States often use the word suspect as a jargon when referring to the perpetrator of the offense (perp in dated U ...
and the suspect's immediate surroundings are searched at the time the suspect is arrested.
See also
*
NSA warrantless surveillance controversy
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
*
Signing statement
A signing statement is a written pronouncement issued by the President of the United States upon the signing of a bill into law. They are usually printed along with the bill in ''United States Code Congressional and Administrative News'' (USCCAN). ...
*
Imperial Presidency
Imperial presidency is a term applied to the modern presidency of the United States. It became popular in the 1960s and served as the title of a 1973 book by historian Arthur M. Schlesinger, Jr., who wrote ''The Imperial Presidency'' to address ...
*
ECHELON
ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
*
Information Awareness Office
The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
*
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign po ...
*
Unitary executive theory
The unitary executive theory is a theory of United States constitutional law which holds that the President of the United States possesses the power to control the entire federal executive branch. The doctrine is rooted in Article Two of the Un ...
*
Cabinet noir
In France, the ''cabinet noir'' ( French for " black room", also known as the "dark chamber" or "black chamber") was a government intelligence-gathering office, usually within a postal service, where correspondence between persons or entities wa ...
*
Executive Order 2604 –
Woodrow Wilson
Thomas Woodrow Wilson (December 28, 1856February 3, 1924) was an American politician and academic who served as the 28th president of the United States from 1913 to 1921. A member of the Democratic Party, Wilson served as the president of ...
(
text
Text may refer to:
Written word
* Text (literary theory), any object that can be read, including:
**Religious text, a writing that a religious tradition considers to be sacred
**Text, a verse or passage from scripture used in expository preachin ...
)
*
Executive Order 12036 –
Jimmy Carter
James Earl Carter Jr. (born October 1, 1924) is an American politician who served as the 39th president of the United States from 1977 to 1981. A member of the Democratic Party (United States), Democratic Party, he previously served as th ...
(
text
Text may refer to:
Written word
* Text (literary theory), any object that can be read, including:
**Religious text, a writing that a religious tradition considers to be sacred
**Text, a verse or passage from scripture used in expository preachin ...
)
*
Executive Order 12139 – Jimmy Carter (
text
Text may refer to:
Written word
* Text (literary theory), any object that can be read, including:
**Religious text, a writing that a religious tradition considers to be sacred
**Text, a verse or passage from scripture used in expository preachin ...
)
*
Executive Order 12949 –
Bill Clinton
William Jefferson Clinton ( né Blythe III; born August 19, 1946) is an American politician who served as the 42nd president of the United States from 1993 to 2001. He previously served as governor of Arkansas from 1979 to 1981 and agai ...
(
text
Text may refer to:
Written word
* Text (literary theory), any object that can be read, including:
**Religious text, a writing that a religious tradition considers to be sacred
**Text, a verse or passage from scripture used in expository preachin ...
)
*
Minimally-intrusive warrantless search In United States Constitutional Law, a minimally intrusive/invasive warrantless search is a type of search and seizure, search that does not breach the boundaries of the property and is performed without any prerequisite search warrant. These search ...
*
''United States v. Davis'' (2014)
References
{{DEFAULTSORT:Warrantless Searches In The United States
United States national security policy
Privacy of telecommunications
Privacy law in the United States