Technological Tattletales and Constitutional Black Holes: Communications Intermediaries and Constitutional Constraints

Main Article Content

Lisa M. Austin

Abstract

In this Article I argue that the emerging public/private nexus of surveillance involves the augmentation of state power and calls for new models of constitutional constraint. The key phenomenon is the role played by communications intermediaries in collecting the information that the state subsequently accesses. These intermediaries are not just powerful companies engaged in collecting and analyzing the information of users and the information they hold are not just business records. The key feature of these companies is that, through their information practices and architecture, they mediate other relationships. I argue that this mediating function, and its underlying technological form, interacts with legal and social norms in ways that can lead to the erosion of constraints on state power. This Article maps two stories of erosion, rooted in two kinds of community displacement. The first involves the displacement of community participation in law enforcement and the emergence of “technological tattletales” where intermediaries cooperate with the state. Unlike citizen cooperation, this practice augments state power and undermines more traditional informal modes of constraint on state power. The second involves the displacement of national legal and political community. Communications intermediaries are often large multinational companies that operate in multiple jurisdictions and move their data to various datacenters across the world even as the individual data subject remains in one geographical location. Laws that treat nonresident aliens differently from residents and citizens can create “constitutional black holes” where the communications data of an individual is not protected by any constitutional constraints.

Article Details

Section
Articles
Author Biography

Lisa M. Austin, University of Toronto Faculty of Law

University of Toronto Faculty of Law. I would like to thank the participants of The Constitution of Information Conference, May 2015, for their comments on an earlier version of this Article.