18 Interpreting the Bill of Rights
LEARNING OBJECTIVES
By the end of this section, you will be able to:
- Describe how the Ninth and Tenth Amendments reflect on our other rights
- Identify the two senses of the “right to privacy” embodied in the Constitution
- Explain the controversy over privacy when applied to abortion and same-sex relationships
As this chapter has suggested, the provisions of the Bill of Rights have been interpreted and reinterpreted repeatedly over the past two centuries. However, the first eight amendments are largely silent on the status of traditional common law, which was the legal basis for many of the natural rights claimed by the framers in the Declaration of Independence. These amendments largely reflect the worldview of the time in which they were written. New technology, societal norms, and economic realities furnish challenges that fail to fit neatly into the framework established in the late eighteenth century.
In this section, we consider the final two amendments of the Bill of Rights and the way they affect our understanding of the Constitution as a whole. Rather than protecting specific rights and liberties, the Ninth and Tenth Amendments indicate how the Constitution and the Bill of Rights should be interpreted, and lay out the residual powers of the state governments. We will also examine privacy rights, an area the Bill of Rights does not address directly. Rather, the emergence of defined privacy rights demonstrates how the Ninth and Tenth Amendments have been applied to expand the scope of rights protected by the Constitution.
THE NINTH AMENDMENT
We saw above that James Madison and the other framers were aware they might endanger some rights if they listed a few in the Constitution and omitted others. To ensure that those interpreting the Constitution would recognize that the listing of freedoms and rights in the Bill of Rights was not exhaustive, the Ninth Amendmentstates:
“The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.”
These rights “retained by the people” include the common-law and natural rights inherited from the laws, traditions, and past court decisions of England. To this day, we regularly exercise and take for granted rights that aren’t written down in the federal constitution, like the right to marry, the right to seek opportunities for employment and education, and the right to have children and raise a family. Supreme Court justices over the years have interpreted the Ninth Amendment in different ways, with some arguing that it was intended to extend the rights protected by the Constitution to those natural and common-law rights and others arguing that it does not prohibit states from changing their constitutions and laws to modify or limit those rights as they see fit.
Critics of a broad interpretation of the Ninth Amendment point out that the Constitution provides ways to protect newly formalized rights through the amendment process. For example, in the nineteenth and twentieth centuries, the right to vote was gradually expanded by a series of constitutional amendments (the Fifteenth and Nineteenth), even though at times this expansion was the subject of great public controversy. However, supporters of a broad interpretation of the Ninth Amendment point out that the rights of the people—particularly people belonging to political or demographic minorities—should not be subject to the whims of popular majorities. One right the courts have said may be at least partially based on the Ninth Amendment is a general right to privacy, discussed later in the chapter.
THE TENTH AMENDMENT
The Tenth Amendment is as follows:
“The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”
Unlike the other provisions of the Bill of Rights, this amendment focuses on power rather than rights. The courts have generally read the Tenth Amendment as merely stating, as Chief Justice Harlan Stone put it, a “truism that all is retained which has not been surrendered.”64 In other words, rather than limiting the power of the federal government in any meaningful way, it simply restates what is made obvious elsewhere in the Constitution: the federal government has both enumerated and implied powers, but where the federal government does not (or chooses not to) exercise power, the states may do so. Others read this final “or” as capturing the essential question of U.S. political history: do the states who agreed to unite in a federal system remain sovereign, or once united, is it the federal government’s responsibility to protect the power of the people—including against states that might infringe upon them?
At times, politicians and state governments have argued that the Tenth Amendment means states can engage in interposition or nullification by blocking federal government laws and actions they deem to exceed the constitutional powers of the national government. But the courts have rarely been sympathetic to these arguments, except when the federal government appears to be directly requiring state and local officials to do something. For example, in 1997 the Supreme Court struck down part of a federal law that required state and local law enforcement to participate in conducting background checks for prospective gun purchasers, while in 2012 the court ruled that the government could not compel states to participate in expanding the joint state-federal Medicaid program by taking away all their existing Medicaid funding if they refused to do so.65
However, the Tenth Amendment also allows states to guarantee rights and liberties more fully or extensively than the federal government does, or to include additional rights. For example, many state constitutions guarantee the right to a free public education, several states give victims of crimes certain rights, and eighteen states include the right to hunt game and/or fish.66 A number of state constitutions explicitly guarantee equal rights for men and women. Starting with Wyoming in 1869, some some states permitted women to vote before the Nineteenth Amendment secured the franchise for all women in 1920. Similarly, people aged 18–20 could vote in a few states before the Twenty-Sixth Amendment came into force in 1971. As we will see below, several states also explicitly recognize a right to privacy. State courts at times have interpreted state constitutional provisions to include broader protections for basic liberties than their federal counterparts. For example, though people do not generally have the right to free speech and assembly on private property owned by others without their permission, California’s constitutional protection of freedom of expression was extended to portions of some privately owned shopping centers by the state’s supreme court (Figure 4.18).67
These state protections do not extend the other way, however. If the federal government passes a law or adopts a constitutional amendment that restricts rights or liberties, or a Supreme Court decision interprets the Constitution in a way that narrows these rights, the state’s protection no longer applies. For example, if Congress decided to outlaw hunting and fishing and the Supreme Court decided this law was a valid exercise of federal power, the state constitutional provisions that protect the right to hunt and fish would effectively be meaningless. More concretely, federal laws that control weapons and drugs override state laws and constitutional provisions that otherwise permit them. While federal marijuana policies are not strictly enforced, state-level marijuana policies in Colorado and Washington provide a prominent exception to that clarity.
GET CONNECTED!
Student-Led Constitutional Change
Although the United States has not had a national constitutional convention since 1787, the states have generally been much more willing to revise their constitutions. In 1998, two politicians in Texas decided to do something a little bit different: they enlisted the help of college students at Angelo State University to draft a completely new constitution for the state of Texas, which was then formally proposed to the state legislature.68 Although the proposal failed, it was certainly a valuable learning experience for the students who took part.
Each state has a different process for changing its constitution. In some, like California and Mississippi, voters can propose amendments to their state constitution directly, bypassing the state legislature. In others, such as Tennessee and Texas, the state legislature controls the process of initiation. The process can affect the sorts of amendments likely to be considered; it shouldn’t be surprising, for example, that amendments limiting the number of terms legislators can serve in office have been much more common in states where the legislators themselves have no say in whether such provisions are adopted.
What rights or liberties do you think ought to be protected by your state constitution that aren’t already? Or would you get rid of some of these protections instead? Find a copy of your current state constitution, read through it, and decide. Then find out what steps would be needed to amend your state’s constitution to make the changes you would like to see.
THE RIGHT TO PRIVACY
Although the term privacy does not appear in the Constitution or Bill of Rights, scholars have interpreted several Bill of Rights provisions as an indication that James Madison and Congress sought to protect a common-law right to privacy as it would have been understood in the late eighteenth century: a right to be free of government intrusion into our personal life, particularly within the bounds of the home. For example, one could see the Second Amendment as standing for the common-law right to self-defense in the home; the Third Amendment as a statement that government soldiers should not be housed in anyone’s home; the Fourth Amendment as setting a high legal standard for allowing agents of the state to intrude on someone’s home; and the due process and takings clauses of the Fifth Amendment as applying an equally high legal standard to the government’s taking a home or property (reinforced after the Civil War by the Fourteenth Amendment). Alternatively, one could argue that the Ninth Amendment anticipated the existence of a common-law right to privacy, among other rights, when it acknowledged the existence of basic, natural rights not listed in the Bill of Rights or the body of the Constitution itself.69 Lawyers Samuel D. Warren and Louis Brandeis (the latter a future Supreme Court justice) famously developed the concept of privacy rights in a law review article published in 1890.70
Although several state constitutions do list the right to privacy as a protected right, the explicit recognition by the Supreme Court of a right to privacy in the U.S. Constitution emerged only in the middle of the twentieth century. In 1965, the court spelled out the right to privacy for the first time in Griswold v. Connecticut, a case that struck down a state law forbidding even married individuals to use any form of contraception.71 Although many subsequent cases before the Supreme Court also dealt with privacy in the course of intimate, sexual conduct, the issue of privacy matters as well in the context of surveillance and monitoring by government and private parties of our activities, movements, and communications. Both these senses of privacy are examined below.
Sexual Privacy
Although the Griswold case originally pertained only to married couples, in 1972 it was extended to apply the right to obtain contraception to unmarried people as well.72 Although neither decision was entirely without controversy, the “sexual revolution” taking place at the time may well have contributed to a sense that anti-contraception laws were at the very least dated, if not in violation of people’s rights. The contraceptive coverage controversy surrounding the Hobby Lobby case shows that this topic remains relevant.
The Supreme Court’s application of the right to privacy doctrine to abortion rights proved far more problematic, legally and politically. In 1972, four states permitted abortions without restrictions, while thirteen allowed abortions “if the pregnant woman’s life or physical or mental health were endangered, if the fetus would be born with a severe physical or mental defect, or if the pregnancy had resulted from rape or incest”; abortions were completely illegal in Pennsylvania and heavily restricted in the remaining states.73 On average, several hundred American women a year died as a result of “back alley abortions” in the 1960s.
The legal landscape changed dramatically as a result of the 1973 ruling in Roe v. Wade,74 in which the Supreme Court decided the right to privacy encompassed a right for women to terminate a pregnancy, at least under certain scenarios. The justices ruled that while the government did have an interest in protecting the “potentiality of human life,” nonetheless this had to be balanced against the interests of both women’s health and women’s right to decide whether to have an abortion. Accordingly, the court established a framework for deciding whether abortions could be regulated based on the fetus’s viability (i.e., potential to survive outside the womb) and the stage of pregnancy, with no restrictions permissible during the first three months of pregnancy (i.e., the first trimester), during which abortions were deemed safer for women than childbirth itself.
Starting in the 1980s, Supreme Court justices appointed by Republican presidents began to roll back the Roedecision. A key turning point was the court’s ruling in Planned Parenthood v. Casey in 1992, in which a plurality of the court rejected Roe’s framework based on trimesters of pregnancy and replaced it with the undue burden test, which allows restrictions prior to viability that are not “substantial obstacle[s]” (undue burdens) to women seeking an abortion.75 Thus, the court upheld some state restrictions, including a required waiting period between arranging and having an abortion, parental consent (or, if not possible for some reason such as incest, authorization of a judge) for minors, and the requirement that women be informed of the health consequences of having an abortion. Other restrictions such as a requirement that a married woman notify her spouse prior to an abortion were struck down as an undue burden. Since the Casey decision, many states have passed other restrictions on abortions, such as banning certain procedures, requiring women to have and view an ultrasound before having an abortion, and implementing more stringent licensing and inspection requirements for facilities where abortions are performed. In Whole Woman’s Health v. Hellerstedt (2016), the Court reinforced Roe 5–3 by disallowing two Texas state regulations regarding the delivery of abortion services.76 And the 2022 Dobbs v. Jackson Women’s Health Organization decision, the Supreme Court ruled that abortion is not a right and that states had power to pass laws restricting abortion—overruling Roe v. Wade. The decision did not make abortion illegal, but some states were able to begin enforcing existing abortion bans (that had been on hold based on legal challenges) while other states immediately took action to enact new abortion bans.
Beyond the issues of contraception and abortion, the right to privacy has been interpreted to encompass a more general right for adults to have noncommercial, consensual sexual relationships in private. However, this legal development is relatively new; as recently as 1986, the Supreme Court ruled that states could still criminalize sex acts between two people of the same sex.77 That decision was overturned in 2003 in Lawrence v. Texas, which invalidated state laws that criminalized sodomy.78
The state and national governments still have leeway to regulate sexual morality to some degree; “anything goes” is not the law of the land, even for actions that are consensual. The Supreme Court has declined to strike down laws in a few states that outlaw the sale of vibrators and other sex toys. Prostitution remains illegal in every state except in certain rural counties in Nevada; both polygamy (marriage to more than one other person) and bestiality (sex with animals) are illegal everywhere. And, as we saw earlier, the states may regulate obscene materials and, in certain situations, material that may be harmful to minors or otherwise indecent; to this end, states and localities have sought to ban or regulate the production, distribution, and sale of pornography.
Privacy of Communications and Property
Another example of heightened concerns about privacy in the modern era is the reality that society is under pervasive surveillance. In the past, monitoring the public was difficult at best. During the Cold War, regimes in the Soviet bloc employed millions of people as domestic spies and informants in an effort to suppress internal dissent through constant monitoring of the general public. Not only was this effort extremely expensive in terms of the human and monetary capital it required, but it also proved remarkably ineffective. Groups like the East German Stasi and the Romanian Securitate were unable to suppress the popular uprisings that undermined communist one-party rule in most of those countries in the late 1980s.
Technology has now made it much easier to track and monitor people. Police cars and roadways are equipped with cameras that can photograph the license plate of every passing car or truck and record it in a database; while allowing police to recover stolen vehicles and catch fleeing suspects, this data can also be used to track the movements of law-abiding citizens. But law enforcement officials don’t even have to go to this much work; millions of car and truck drivers pay tolls electronically without stopping at toll booths thanks to transponders attached to their vehicles, which can be read by scanners well away from any toll road or bridge to monitor traffic flow or any other purpose (Figure 4.20). The pervasive use of GPS (Global Positioning System) raises similar issues.
Even pedestrians and cyclists are relatively easy to track today. Cameras pointed at sidewalks and roadways can employ facial recognition software to identify people as they walk or bike around a city. Many people carry smartphones that constantly report their location to the nearest cell phone tower and broadcast a beacon signal to nearby wireless hotspots and Bluetooth devices. Police can set up a small device called a Stingray that identifies and tracks all cell phones that attempt to connect to it within a radius of several thousand feet. With the right software, law enforcement and criminals can remotely activate a phone’s microphone and camera, effectively planting a bug in someone’s pocket without the person even knowing it.
These aren’t just gimmicks in a bad science fiction movie; businesses and governments have openly admitted they are using these methods. Research shows that even metadata—information about the messages we send and the calls we make and receive, such as time, location, sender, and recipient but excluding their content—can tell governments and businesses a lot about what someone is doing. Even when this information is collected in an anonymous way, it is often still possible to trace it back to specific individuals, since people travel and communicate in largely predictable patterns.
The next frontier of privacy issues may well be the increased use of drones, small preprogrammed or remotely piloted aircraft. Drones can fly virtually undetected and monitor events from overhead. They can peek into backyards surrounded by fences, and using infrared cameras they can monitor activity inside houses and other buildings. The Fourth Amendment was written in an era when finding out what was going on in someone’s home meant either going inside or peeking through a window; applying its protections today, when seeing into someone’s house can be as easy as looking at a computer screen miles away, is no longer simple.
In the United States, many advocates of civil liberties are concerned that laws such as the USA PATRIOT Act(i.e., Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act), passed weeks after the 9/11 attacks in 2001, have given the federal government too much power by making it easy for officials to seek and obtain search warrants or, in some cases, to bypass warrant requirements altogether. Critics have argued that the Patriot Act has largely been used to prosecute ordinary criminals, in particular drug dealers, rather than terrorists as intended. Most European countries, at least on paper, have opted for laws that protect against such government surveillance, perhaps mindful of past experience with communist and fascist regimes. European countries also tend to have stricter laws limiting the collection, retention, and use of private data by companies, which makes it harder for governments to obtain and use that data. Most recently, the battle between Apple Inc. and the National Security Agency (NSA) over whether Apple should allow the government access to key information that is encrypted has made the discussion of this tradeoff salient once again. A recent court outcome in the United States suggests that America may follow Europe’s lead. In Carpenter v. United States (2018), the first case of its kind, the U.S. Supreme Court ruled that, under the Fourth Amendment, police need a search warrant to gather phone location data as evidence to be used in trials.79
LINK TO LEARNING
Several groups lobby the government, such as The Electronic Frontier Foundation and The Electronic Privacy Information Center, on issues related to privacy in the information age, particularly on the Internet.
All this is not to say that technological surveillance tools do not have value or are inherently bad. They can be used for many purposes that would benefit society and, perhaps, even enhance our freedoms. Spending less time stuck in traffic because we know there’s been an accident—detected automatically because the cell phones that normally whiz by at the speed limit are now crawling along—gives us time to spend on more valuable activities. Capturing criminals and terrorists by recognizing them or their vehicles before they can continue their agendas will protect the life, liberty, and property of the public at large. At the same time, however, the emergence of these technologies means calls for vigilance and limits on what businesses and governments can do with the information they collect and the length of time they may retain it. We might also be concerned about how this technology could be used by more oppressive regimes. If the technological resources that are at the disposal of today’s governments had been available to the East Germany Stasi and the Romanian Securitate, would those repressive regimes have fallen? How much privacy and freedom should citizens sacrifice in order to feel safe?