The AI Threat to Privacy

An interview with Daniel Solove

Artificial intelligence now enables the constant observation, aggregation, and analysis of personal data. These capabilities expose the fragility of American privacy protections, which were designed for isolated acts of intrusion rather than continuous data ecosystems. In conversation with TalksOnLaw, Professor Daniel Solove explains how AI systems trained on vast troves of third-party data are erasing the boundary between public and private monitoring—and why the American right to privacy is increasingly vulnerable.

Government and Private Surveillance

Historically, U.S. law has drawn a distinction between government searches (subject to constitutional limits) and private data collection (governed largely by contract or consumer law). AI collapses that divide.

In modern times, however, private companies and data brokers collect location data, communications, and behavioral patterns, which the government can then access indirectly. This allows state actors to benefit from forms of surveillance that would otherwise require a warrant. Solove notes that this “outsourced surveillance” creates a constitutional gap—the government gains investigative power without triggering traditional Fourth Amendment protections.

The Fourth Amendment and the Third-Party Doctrine

The Fourth Amendment prohibits unreasonable searches and seizures, but courts have long held that information shared with a third party is not protected—a principle known as the third-party doctrine.

  • In United States v. Miller (1976), the Supreme Court ruled that bank customers had no reasonable expectation of privacy in their records.
     

  • In Smith v. Maryland (1979), the Court held that individuals lack privacy in phone numbers dialed because that information is voluntarily shared with phone companies.

This doctrine has become a central obstacle to modern privacy claims, as nearly all digital activity involves third-party intermediaries.

Solove argues that AI amplifies the consequences of this rule. Massive datasets, once trivial in isolation, now enable deep behavioral profiling when combined through machine learning. Government use of such data, even when obtained legally, can reveal intimate details well beyond the scope of the original collection.

Reassessment in Carpenter v. United States

In Carpenter v. United States (2018), the Supreme Court signaled a partial retreat from the third-party doctrine, holding that law enforcement’s access to historical cell-site location data constitutes a search requiring a warrant.

While Carpenter was a major step toward recognizing privacy in digital records, Solove observes that it left unresolved how these principles apply to broader AI-driven surveillance, predictive analytics, or large-scale data aggregation. The opinion limited its holding to cell-site data, leaving other forms of algorithmic tracking unaddressed.

Statutory Privacy Protections

Federal privacy law remains fragmented. Statutes such as the Privacy Act of 1974, the Electronic Communications Privacy Act (ECPA), and HIPAA apply only to certain sectors or data types. These laws rely on notice and consent mechanisms that assume individuals can meaningfully control their information—an assumption Solove describes as unrealistic in an era of pervasive digital intermediation.

Because participation in modern life requires engagement with data-collecting services, consent has become effectively coerced. This framework provides little protection against AI systems that analyze or repurpose data beyond its original context.

AI and the Blurring of Legal Accountability

AI technologies make it possible to infer, categorize, and predict individual behavior without direct observation. Solove warns that this capability allows both corporations and government entities to act on algorithmic conclusions without meaningful oversight. When data collected for commercial purposes is later used in criminal investigations, the line between public authority and private enterprise disappears.

This convergence undermines traditional accountability mechanisms: Fourth Amendment warrants, statutory notice requirements, and due process safeguards all depend on identifying who is conducting the surveillance. AI systems obscure that boundary.

The Need for a Modern Privacy Framework

Solove calls for a structural rethinking of U.S. privacy law. He suggests shifting from a reactive model—focused on secrecy and post-hoc remedies—to a proactive framework emphasizing fairness, proportionality, and institutional accountability.

Rather than relying solely on individual consent, a modern framework would impose affirmative duties on data collectors and processors, similar to the General Data Protection Regulation (GDPR) in the European Union. This approach would acknowledge that privacy is less about personal secrecy than about governing the power that data confers.

Relation to Constitutional Principles

The Constitution protects certain dimensions of privacy, but these protections are limited and context-dependent. The Fourth Amendment governs state action; it does not constrain private entities. The First Amendment, meanwhile, can restrict attempts to regulate data collection or expression, creating tension between privacy and free speech.

Solove emphasizes that AI-driven surveillance magnifies this constitutional asymmetry: the state gains access to private data flows without direct intrusion, while individuals retain few enforceable rights. This imbalance demands renewed judicial and legislative attention to the scope and meaning of the constitutional right to privacy in a data-driven society.

 


  • Attorney CLE accreditation 

Additional Resources

Related Books

Key Cases Referenced

  • United States v. Miller, 425 U.S. 435 (1976)

  • Smith v. Maryland, 442 U.S. 735 (1979)

  • Carpenter v. United States, 138 S. Ct. 2206 (2018)
     

Key Statutes

  • Fourth Amendment – Protection against unreasonable searches and seizures

  • Privacy Act of 1974 – Federal limits on agency collection and use of personal data

  • Electronic Communications Privacy Act (1986) – Regulates interception and access to electronic communications

  • HIPAA (1996) – Protects medical information and health data

  • General Data Protection Regulation (EU, 2018) – Illustrative foreign model emphasizing accountability and data minimization

Michelle A. Reed discusses After the Data Breach
After the Data Breach
Professor Shyam Balganesh discusses AI Models & Copyright Battles
AI Models & Copyright Battles
Prof. John J. Donohue III discusses Analyzing Death - Race and Bias in Capital Punishment
Analyzing Death - Race and Bias in Capital Punishment
Prof. Darrell A. H. Miller discusses A Race to the 2nd Amendment
A Race to the 2nd Amendment
Prof. Douglas NeJaime discusses Assisted Reproduction and Parental Rights
Assisted Reproduction and Parental Rights
Barbara McQuade discusses Confronting the Disinformation Engine
Confronting the Disinformation Engine
Prof. Dorit Reiss discusses COVID-19 Vaccine Mandates
COVID-19 Vaccine Mandates
Lee Rowland discusses Cyberbullying and the First Amendment
Cyberbullying and the First Amendment
Michelle A. Reed discusses Cyber Defense: Private Funds & Banks
Cyber Defense: Private Funds & Banks
Michelle A. Reed discusses Cyber Defense: Private Funds & Banks (Part 2)
Cyber Defense: Private Funds & Banks (Part 2)
Ira Kustin and Sherrese Smith discusses Cyber Risk at Private Funds
Cyber Risk at Private Funds
Prof. Naomi R. Cahn discusses Digital Asset Planning
Digital Asset Planning
Alexia Korberg discusses Dobbs v. Jackson, a Battleground for Abortion Rights
Dobbs v. Jackson, a Battleground for Abortion Rights
Judge Andrew Napolitano discusses Domestic Spying and the NSA
Domestic Spying and the NSA
Prof. Kate Shaw discusses Donald Trump and the Weight of Presidential Speech
Donald Trump and the Weight of Presidential Speech
James Anderson discusses Driverless Cars—A Shift in Risk
Driverless Cars—A Shift in Risk
Prof. Nadine Strossen discusses Free Speech in a Social Media World
Free Speech in a Social Media World
Prof. Nadine Strossen discusses Free Speech vs Hate Speech on Campus
Free Speech vs Hate Speech on Campus
Prof. Richard Briffault discusses From Super PACs to Dark Money
From Super PACs to Dark Money
Prof. Richard Briffault discusses From Super PACs to Dark Money (Part 2)
From Super PACs to Dark Money (Part 2)
Prof. Samuel Issacharoff discusses Gerrymandering: The Art of Redrawing Elections
Gerrymandering: The Art of Redrawing Elections
Prof. Sarah Barringer Gorden discusses God & Football after Bremerton
God & Football after Bremerton
Prof. Jeffrey Rosen discusses Government Surveillance: Privacy & Technology
Government Surveillance: Privacy & Technology
Prof. Joseph Blocher discusses Gun Rights under Rahimi & Cargill
Gun Rights under Rahimi & Cargill
Lee Rowland discusses Hate Speech in America
Hate Speech in America
Lee Rowland discusses Hate Speech in America (Part 2)
Hate Speech in America (Part 2)
Prof. Neil Richards discusses Human Information Privacy
Human Information Privacy
Prof. Neil Richards discusses Human Information Privacy (Part 2)
Human Information Privacy (Part 2)
Prof. Susan N. Herman discusses Individual Liberty in Post-9/11 America
Individual Liberty in Post-9/11 America
Prof. Stephen Vladeck discusses Inside the Shadow Docket
Inside the Shadow Docket
Phillip Miller discusses Jailhouse Law—Lawyering as an Inmate
Jailhouse Law—Lawyering as an Inmate
Phillip Miller discusses Jailhouse Law—Lawyering from Inside Prison
Jailhouse Law—Lawyering from Inside Prison
Prof. Richard H. Fallon, Jr. discusses Justice Forever – Life Tenure
Justice Forever – Life Tenure
Prof. Richard H. Fallon, Jr. discusses Justice Forever – Life Tenure  (Part 2)
Justice Forever – Life Tenure (Part 2)
Judge Andrew Napolitano discusses Mass Quarantines in the COVID-19 Crisis
Mass Quarantines in the COVID-19 Crisis
Prof. John J. Donohue III discusses Mass Shootings and Gun Laws
Mass Shootings and Gun Laws
Prof. John J. Donohue III discusses Mass Shootings and Gun Laws (Part 2)
Mass Shootings and Gun Laws (Part 2)
Prof. Emily Murphy discusses Memory Evidence (Part 2)
Memory Evidence (Part 2)
Hina Shamsi discusses Military Drones and Targeted Killing
Military Drones and Targeted Killing
john a. powell discusses Modern Discrimination, Race & Inequality
Modern Discrimination, Race & Inequality
Prof. Rachel Harmon discusses Police Commands & Police Coercion
Police Commands & Police Coercion
Prof. Daniel Capra discusses Police Power and Personal Rights
Police Power and Personal Rights
Prof. Daniel Capra discusses Police Power and Personal Rights (Part 2)
Police Power and Personal Rights (Part 2)
Prof. I. Bennett Capers discusses Police Technology - From Body Cameras to Facial Recognition
Police Technology - From Body Cameras to Facial Recognition
Prof. Rachel Harmon discusses Policing the Police (Part 2)
Policing the Police (Part 2)
Prof. Amy Gajda discusses Press Freedom vs. Privacy
Press Freedom vs. Privacy
Prof. Amy Gajda discusses Press Freedom vs. Privacy (Part 2)
Press Freedom vs. Privacy (Part 2)
Prof. Joel Reidenberg discusses Privacy & Technology in Today's Schools
Privacy & Technology in Today's Schools
Prof. Jeffrey Rosen discusses Privacy vs. Government Tech
Privacy vs. Government Tech
Alicia Bannon discusses Recusal & the Bounds of Judicial Bias
Recusal & the Bounds of Judicial Bias
Professor Jody Madeira discusses Red Flag Laws & Domestic Violence Orders
Red Flag Laws & Domestic Violence Orders
Professor Tejas Narechania discusses Regulating AI as a Natural Monopoly
Regulating AI as a Natural Monopoly
Chairman Christopher Giancarlo discusses Regulating Cryptocurrency after FTX
Regulating Cryptocurrency after FTX
Prof. John J. Donohue III discusses Regulating Guns: Smart Laws & Dumb Laws
Regulating Guns: Smart Laws & Dumb Laws
Prof. John J. Donohue III discusses Regulating Guns: Smart Laws & Dumb Laws (Part 2)
Regulating Guns: Smart Laws & Dumb Laws (Part 2)
Judge Andrew Napolitano discusses Replacing Scalia - Filling a Vacancy on the Supreme Court
Replacing Scalia - Filling a Vacancy on the Supreme Court
Judge Andrew Napolitano discusses SCOTUS 2016 - A Year without a Justice
SCOTUS 2016 - A Year without a Justice
Scott Skinner-Thompson discusses Sexual Privacy and Government "Outing"
Sexual Privacy and Government "Outing"
Profs Adam Cox and Cristina Rodriguez discusses Shadow Immigration and the Power of the Presidency
Shadow Immigration and the Power of the Presidency
Profs Adam Cox and Cristina Rodriguez discusses Shadow Immigration and the Power of the Presidency (Part 2)
Shadow Immigration and the Power of the Presidency (Part 2)
Judge Andrew Napolitano discusses State-Sanctioned Targeted Killing
State-Sanctioned Targeted Killing
Prof. Dorit Reiss discusses The COVID-19 Vaccine and the Role of the State
The COVID-19 Vaccine and the Role of the State
John Heitmann and Jameson Dempsey discusses The Internet of Things – The Latest Frontier
The Internet of Things – The Latest Frontier
John Heitmann and Jameson Dempsey discusses The Internet of Things – The Latest Frontier (Part 2)
The Internet of Things – The Latest Frontier (Part 2)
Prof. Eric Goldman discusses The Law of Deplatforming
The Law of Deplatforming
Joel Cohen discusses The Leaked Opinion, Dobbs v. Jackson
The Leaked Opinion, Dobbs v. Jackson
Seymour James discusses The Right to an Attorney - Currently Under Threat
The Right to an Attorney - Currently Under Threat
Prof. Richard Pildes discusses The Shifting Power of Political Parties
The Shifting Power of Political Parties
Prof. Richard Pildes discusses The Shifting Power of Political Parties (Part 2)
The Shifting Power of Political Parties (Part 2)
Prof. John Morley discusses Trump Orders: Law Firms on the Line
Trump Orders: Law Firms on the Line
Prof. Theodore M. Shaw discusses Understanding SFFA v. Harvard
Understanding SFFA v. Harvard
Prof. Dorit Reiss discusses Vaccine Mandates for Children
Vaccine Mandates for Children
Columbia Law School Faculty discusses Vulnerable Populations in a Pandemic
Vulnerable Populations in a Pandemic
Prof. Marci Hamilton discusses When Religious Freedom Harms Children
When Religious Freedom Harms Children
Prof. Marci Hamilton discusses When Religious Freedom Harms Children (Part 2)
When Religious Freedom Harms Children (Part 2)
Prof. Lisa Heinzerling discusses WV v. EPA and the Major Questions Doctrine
WV v. EPA and the Major Questions Doctrine