Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged amendments

Rss Feed Group items tagged

Gary Edwards

A First Look at the Book "The Liberty Amendments", by Mark Levin - Tea Party Command Ce... - 0 views

  •  
    Excellent youtube interview! "Mark Levin has just published his much-anticipated book The Liberty Amendments: Restoring the American Republic. Three of his eleven proposed Constitutional amendments appear below, and a Sean Hannity interview of Levin appears at the bottom of this post. Levin's book is centered around the Constitution's Article V (aka "Article 5″). That article specifies two methods for amending the Constitution. Just briefly - In the first method of creating amendments, Congress proposes and the States dispose. In the second method of creating amendments, the States propose and the States dispose. The second method has never been used successfully, although there have been many attempts.  It is that second method that the Founders provided as a remedy for an overreaching federal government. In the second method, neither Congress, nor the President, nor the Supreme Court have any voting or veto authority whatsoever.  The states are in full control. Period. It is, by design, the ultimate override for an over-spending, over-taxing, over-regulating, and increasingly dictatorial and lawless federal government. Clearly, its time has come. In that second method, Congress has at most a mere ministerial role.  Of course Congress is very protective of its power, and could, through delay and inaction, attempt to convert their mere ministerial role into a de facto veto power, halting any attempt for a state-driven amendment action. Apparently Congress has done exactly that many times, acting in bad faith and contrary to the Framers' spirit and intent for Article V which is clearly expressed in the Federalist Papers. Legal scholars have been trying to find a way around the federal government's intransigence, so far with little success. Now more than ever, it is time for We the People to bring the power of Article V to the center ring of American politics. That starts with awareness, and Levin's book will br
Paul Merrell

One Click Politics - 0 views

  • Senate Joint Resolution 19 is a proposed Constitutional Amendment to overturn Citizens United, but it doesn’t address corporate constitutional rights at all. Please send a message to the authors of SJR19 -- let them know that Corporate Personhood MUST be included in the language of the amendment... What You Can Do: Help movetoamend accomplish these goals by contributing your power of voice. Take action now by sending a message to Congress telling them why these issues are important to you.
  • Formed in September 2009, Move to Amend is a coalition of hundreds of organizations and hundreds of thousands of individuals committed to social and economic justice, ending corporate rule, and building a vibrant democracy that is genuinely accountable to the people, not corporate interests.
  • Senate Joint Resolution 19 is a proposed Constitutional Amendment to overturn Citizens United, but it doesn’t address corporate constitutional rights at all. Please send a message to the authors of SJR19 -- let them know that Corporate Personhood MUST be included in the language of the amendment... What You Can Do: Help movetoamend accomplish these goals by contributing your power of voice. Take action now by sending a message to Congress telling them why these issues are important to you.
  •  
    I have never forwarded action alerts to others by email. The typical action alert winds up sharing your email address with at least one other organization. The next thing you know you're getting donor solicitations from both the Republican and Democratic party central national coordinating committees. It's not just that I'm a political independent; it's an ongoing task to unsubscribe from unwanted mailing lists. Today I got an action alert from Move to Amend, only the second I have received from the organization. This group does not share your email address with anyone. If you choose to participate in this action alert, which is nearing 1 million messages sent, there is a send button near the bottom of the page to participate. That takes you to a page where you can read the message that will be sent. Move to Amend is a non-partisan organization that has been working toward a constitutional amendment for around 4 years that would clear the way for Congress to regulate campaign contributions, in light of Supreme Court decisions declaring that corporations have a First Amendment right to make campaign contributions in any amount they desire. But their amendment would also abolish constitutional rights for all fictional legal "persons" other than human beings and government at the local, state, and national levels. Move to Amend has been going about the process the right way and to date has scored supporting resolutions in 16 state legislatures and hundreds of community governments. That's enough to get oligarchs worried. So there's a bill gathering steam in the U.S. Senate, SJR 19, that's a watered-down version. It grants Congress and the states power to regulate campaign contributions, but it does not speak to the problem of granting human constitutional rights to entities that have existence only in the eyes of the law. The Senate bill is here: http://goo.gl/Nkvfkg Our nation's Founders unmistakably did not contemplate that corporations would have constitution
Paul Merrell

"Campaign Finance Reform" - That'll Shut 'Em Up | Move to Amend - 0 views

  • Remember in 2009, when the way our elections were financed was perfect, corporate power was reined in by Congress, and everything was A-OK and hunky-dory? Me neither. Liberals have been rejoicing over the introduction and recent committee passage of SJR-19, a proposed constitutional amendment to reverse the Supreme Court’s Citizens United vs. FEC and McCutcheon vs. FEC decisions. In essence, the amendment says states have the power to regulate campaign spending, and Congress has the power to regulate outside spending in elections. Sounds good, right? Wrong. Senator Mark Udall’s (D-NM) proposed constitutional amendment is an election-year bone thrown at the masses, who are in a populist rage over the corruption of our government by corporate power and big moneyed interests. In introducing this amendment and passing it in committee, DC politicians are saying that they hear us, understand we’re upset, and are hoping that we’ll be satisfied with a half-measure that any corporate lawyer worth his salt can find his way around.
  • Udall and the 40-plus Democrats who have co-sponsored the legislation are aiming to placate us with an amendment that takes us back to 2009. Even before Citizens United emerged and significantly changed the financing of campaigns, McCain-Feingold, the last significant campaign finance reform bill, which was already riddled with loopholes, had been mostly gutted by the Bush administration’s chief justice of the Supreme Court in 2007. Celebrating SJR-19 as the be-all, end-all constitutional amendment that will make our government accountable to the people again is laughable. It’s akin to the captain of the Titanic applying chewed-up bubble gum on the hole in the ship and calling it good. So how do we fix the gushing head-wound that is our democracy? Udall has it half-right with a constitutional amendment, but his doesn’t go nearly far enough. Instead, we need a constitutional amendment that explicitly defines human beings as people, and corporations as artificial entities not deserving of constitutional rights. And it needs to state that money is not political speech. Any amendment that doesn’t make these two points is a waste of an amendment. You only get one shot with a constitutional amendment, so if you’re going to do it, go all the way or don’t do it at all.
  • A constitutional amendment abolishing constitutional rights for corporations would overturn not only Citizens United vs. FEC, but also Buckley vs. Valeo and Union Pacific Railroad vs. Santa Clara County, which originally established the concept of corporate personhood. It would also, by default, abolish all subsequent Supreme Court cases based on the constitutional rights of corporations, likeBurwell vs. Hobby Lobby, for instance. And abolishing the concept of money as political speech would strip outside interests of the ability to spend unlimited amounts of money on despicable TV ads that perpetuate falsehoods about candidates. Not only would we have clean elections, but we would finally be able to say that fictitious entities like corporations no longer have the right to walk all over people in the name of profit. Luckily, there’s already wide grassroots support for such an amendment. Through Move to Amend’s efforts, 478 local, county, and state government entities have passed resolutions calling for a constitutional amendment to end corporate personhood and money as speech. State legislatures in Delaware, Illinois, and Vermont have all called for such an amendment. Voters in Montana approved a statewide ballot initiative to do the same. The Minnesota and West Virginia Senates both passed resolutions. Resolutions are currently in progress at the Minnesota and Arizona House, the California Senate, and in both the House and Senate in Texas. The people aren’t waiting on Cong! ress to do what needs to be done.
  • ...1 more annotation...
  • Congress should take its lead from the people, who have already made it very clear in both red and blue states that a constitutional amendment is needed, and that campaign finance reform is only scratching the surface. Such an amendment has already been introduced in Congress by Representative Rick Nolan (DFL-Minn.) in February of 2013. Udall and his co-sponsors should take their cues from HJR-29, or the “We the People Amendment,” if they’re serious about representing the people’s interests. Anything else is an election-year bone not to be taken seriously.
Paul Merrell

S.J.Res.19 - 113th Congress (2013-2014): A joint resolution proposing an amendment to t... - 0 views

  • S.J.Res.19 - A joint resolution proposing an amendment to the Constitution of the United States relating to contributions and expenditures intended to affect elections.
  • 06/18/2014 Committee on the Judiciary Subcommittee on the Constitution, Civil Rights and Human Rights. Approved for full committee consideration with an amendment in the nature of a substitute favorably.
  •  
    A joint resolution to reform campaign finance has been favorably reported out of subcommittee favorably by a subcommittee with an amendment by way of a substitute. The resolution is in the nature of a proposed amendment to the Constitution to overcome Supreme Court precedents allowing virtually unlimited campaign contributions. The substitute amendment is at http://cl.ly/0O3l3w382n2M The substitute, offered by Sen. Durbin, is the result of intense lobbying by Move to Amend, a citizen campaign to pass an amendment that would not only reform campaign spending but also abolish all constitutional rights for corporations. That  campaign has successfull resolutions in support by several states and hundreds of cities. See https://movetoamend.org/ The original senate resolution by Senator Udall was an effort to get out in front of that citizen effort with an extremely watered down version that did not address corporate personhood.   Sen. Durbin's substitute amendment does not go as far as to abolish all constitutional rights of corporations but does provide in section 2 that "Congress  and  the  States  shall  have power to implement and enforce this article by appropriate legislation,  and  may  distinguish  between  natural persons and corporations or other artificial entities created by law, including  by  prohibiting  such  entities  from  spending money to influence elections." Motion to Amend ain't buying it. There in it for the long haul, aiming to pass their amendment by 2030. For the text of their amendment, which has been introduced in the House, see https://movetoamend.org/wethepeopleamendment   
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Paul Merrell

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
Gary Edwards

Possible Constitutional Amendments in the event of an Article V Convention of States - ... - 0 views

  • NUMBER ONE: "Section One:   The Constitution of the United States shall be read and interpreted literally.   No words or phrases shall be changed or substituted and no part of the Constitution shall be used to expand or increase Federal Power or Authority beyond that EXPRESSLY granted and enumerated in the Constitution.   The language of the Constitution shall be interpreted according to the definition of words at the time of their inclusion in the Constitution. Section Two:    Congress shall have, by two thirds vote of both the House of Representatives and the Senate, the power to override individual rulings of the Supreme Court of the United States and/or subordinate Federal Courts.   The President shall not have veto authority over Congressional overrides of Federal Court decisions."
  • NUMBER TWO: "Section One:    No person shall be elected to Congress more than once unless serving in Congress at the time of the ratification of this amendment, in which case members of Congress shall be eligible for re-election to their respective seats one time. Section Two:     In the event the Seventeenth Amendment to the Constitution of the United States is repealed members of the Senate of the United States shall serve at the pleasure and discretion of the Legislature of their respective State. Section Three:  Neither Congress, the President, nor any Federal Court shall make any law, rule, regulation, or order that does not apply equally to themselves and all citizens of the United States.   Nor shall Congress, the President, or any Federal Court cause or allow any law, rule, regulation, or order to be made by any agent or agency of the Federal Government that does not apply equally to themselves and all citizens of the United States.
  • Section Four:    Neither Congress nor the President shall receive any publically-funded retirement or benefit beyond appropriate pay not available to all citizens of the United States. Section Five:    Section Four shall not apply to members of Congress or Presidents, serving or retired, at the time of the ratification of this amendment. Section Six:      The President shall be subject to popular recall by his/her constituency.   Within 90 days of the ratification of this amendment Congress shall pass legislation governing the recall of the President.   In the event Congress fails to pass the required legislation within the required 90 days, the President shall be considered to have been recalled and a new election held within 60 days. Section Seven: Members of Congress shall be subject to popular recall by their respective constituencies, unless the Seventeenth Amendment to the Constitution of the United States is repealed, in which case only members of the House of Representatives shall be subject to popular recall.   Within 90 days of the ratification of this amendment each State shall pass legislation governing the recall of its Congressional Delegation.   In the event a State fails to pass the required legislation within the required 90 days, that State's Congressional Delegation shall be considered to have been recalled and new elections held within 60 days."
  • ...6 more annotations...
  • NUMBER THREE: "Congress shall make and the President shall sign a Balanced Federal Budget every year and before the beginning of the ensuing fiscal year.   In the event Congress and the President fail to make said Balanced Federal Budget before the beginning of the ensuing fiscal year, the last Constitutionally passed and signed Federal Budget shall go into effect and shall be the Federal Budget for the entirety of the ensuing fiscal year.   Balanced shall be defined as expenditures not to exceed revenues except in time of war as declared by Congress.   Revenues shall be defined as monies received; not monies predicted, anticipated, or forecasted.   Unfunded liabilities, obligations, and/or mandates shall be included in the calculation of the Balanced Federal Budget."
  • NUMBER FOUR: "The Fourteenth, Sixteenth, and Seventeenth Amendments to the Constitution of the United States are hereby repealed.   All Federal agencies, programs, laws, rules, regulations, and/or orders created, passed, or handed down as a direct or indirect result of the Fourteenth, Sixteenth, and/or Seventeenth Amendments are hereby stricken from Law, declared null and void, and have no force of effect."
  • NUMBER FIVE: "Section One:     Only persons born of two parents, both of whom are citizens of the United States at the time of the birth of the person, shall be citizens of the United States unless naturalized under the terms and conditions of the Constitution of the United States. Section Two:      Only United States Citizens shall enjoy or receive all rights, benefits, and privileges of United States Citizenship. Section Three:   Non-citizens shall not receive, directly or indirectly, Federal or Constitutional benefits, privileges, or protections."
  • NUMBER SIX:   "The several States are hereby empowered, individually or collectively, to enforce the Constitution of the United States and Federal Law, within their respective borders, regardless of Federal resistance or objections."
  • NUMBER SEVEN:   "Section One:   The Second Amendment to the Constitution of the United States shall be interpreted to mean the FUNDAMENTAL right of individual citizens and/or groups of citizens to keep and bear arms; in their homes and/or other properties, in public and private, and on their persons. Section Two:    Non-citizens and persons convicted of a violent felony by a jury of their peers do not have this right."
  • NUMBER EIGHT: "The First Amendment to the Constitution of the United States shall not be interpreted to prohibit or restrict the peaceful, free exercise or expression of religion, in public or private, or in or on public property."
  •  
    "Possible Constitutional Amendments in the event of an Article V Convention of States Posted by Oren Long on January 12, 2015 at 3:42am in Tea PartyView Discussions ARTICLE V CONVENTION OF STATES; ARE YOU WILLING TO CHANGE THE STATUS QUO IN D.C.?   One of our astute and true conservative members of this site has drafted suggested changes to the Constitution to be proposed in an Article V, Convention of States. I know many of you have seen his postings on here about this issue. Mr. Oren Long is very knowledgeable and well educated and has honorably served our country. He has put a tremendous amount of time and thought into ways to, in his words, "armor and reinforce" the Constitution and return it to its Original Intent, as envisioned by the Founders. Therefore, because I agree with every one of his suggested changes, I am publishing it for him, with his permission. I truly hope that we, as a group, as conservatives and as a people who believe that our country is heading toward disaster, because of the course we are on, I fully endorse his recommended suggestions. I believe that we must take any and every course of action we can to "stop the madness" It is quite long, so PLEASE take the time to read each and every one of them. I am sure that some or many, may have suggestions to this document and they are welcome and open to discussion. If you agree with this, please call your State elected officials and urge them to get on board with an Article V Convention of States. To review or obtain more information of this process, please visit one of these sites:    http://www.conventionofstates.com/           http://www.cosaction.com/              To Whom It May Concern, The following is neither sanctioned by nor proposed by the Article V Convention of States Project.   Rather, it is entirely my work as a volunteer for the Convention of States Project.   To give you an overview of the kinds of amendments that may or may not be consid
Gary Edwards

100th Anniversary of the Beginning of the End? (Part 1) - The Patriot Post - 1 views

  • I take the Oath of John Galt and put action to it: "I swear by my life and my love of it, that I will never live for the sake of another person, nor ask another to live their life for me."
  • In this dark day of the former republic, I stand in Resistance to the premier means of acquisition by the State, the Income Tax.
  • "They that can give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety." (Ben Franklin)
  • ...2 more annotations...
  • "A Constitution of Government once changed from Freedom, can never be restored. Liberty, once lost, is lost forever." (John Adams)
  • "Our cause is noble; it is the cause of mankind!" (George Washington)
  •  
    Excellent history of how America lost it's Constitutional Republic.  The author tags the first progressive (marxist/socialist) President, Woodrow Wilson, as the culprit.  In 1913 Wilson shoved through the 16th and 17th Amendments.  He also pushed through the midnight express known as the Federal Reserve.  And as if that was not enough damage, he pushed for the "League of Nations" - a precursor to the present day United Nations Globalist New World Order. Oh yeah, the first progressive president also jacked us into humanities first World War. Wilson was a Manchurian stooge for the Globalist Rothschild Banksters, and the USA Bankster contingent led by Rockefeller, Morgan and Carnegie.   Note that in the election of 1896, the Banksters banked the corporatist McKinley against the GOLD standard populist, William Jennings Bryan.  McKinley was assassinated in 1901, and his VP, Teddy Roosevelt, became President.  Roosevelt successfully went after the Robber Bankster Barons; Rockefeller, Carnegie and Morgan, passing the Sherman Anti Trust laws and bringing the criminal corporations to trial.  This set the stage for the Bankster coup in 1913, where, with the election of Wilson the Banksters ended the great Consttitutional Republic and ushered in a century of ever encroaching socialist tyranny. ........................... excerpt: "One hundred years ago, our federal government, under control of the progressive Woodrow Wilson, took actions that have since become a disaster for these United States. Looking back, these actions were the beginning of what could be the end of our Constitutional Republic. With progressives in control in 2013, similar actions are underway that could complete a sinister view by progressives then and now to "transform" us into something our Founders never intended, and most Americans through the years never wanted and still don't. In 1913 our Constitution was amended by the ratification of two amendments, the Sixteenth and Seventeenth, an
Gary Edwards

Liberty's backlash -- why we should be grateful to Edward Snowden | Fox News - 1 views

  •  
    Liberty's backlash -- why we should be grateful to Edward Snowden By Judge Andrew P. Napolitano Published August 01, 2013 FoxNews.com Last week, Justin Amash, the two-term libertarian Republican congressman from Michigan, joined with John Conyers, the 25-term liberal Democratic congressman from the same state, to offer an amendment to legislation funding the National Security Agency (NSA). If enacted, the Amash-Conyers amendment would have forced the government's domestic spies when seeking search warrants to capture Americans' phone calls, texts and emails first to identify their targets and produce evidence of their terror-related activities before a judge may issue a warrant. The support they garnered had a surprising result that stunned the Washington establishment. It almost passed. The final vote, in which the Amash-Conyers amendment was defeated by 205 to 217, was delayed for a few hours by the House Republican leadership, which opposed the measure. The Republican leadership team, in conjunction with President Obama and House Minority Leader Nancy Pelosi, needed more time for arm-twisting so as to avoid a humiliating loss. But the House rank-and-file did succeed in sending a message to the big-government types in both parties: Nearly half of the House of Representatives has had enough of government spying and then lying about it, and understands that spying on every American simply cannot withstand minimal legal scrutiny or basic constitutional analysis. The president is deeply into this and no doubt wishes he wasn't. He now says he welcomed the debate in the House on whether his spies can have all they want from us or whether they are subject to constitutional requirements for their warrants. Surely he knows that the Supreme Court has ruled consistently since the time of the Civil War that the government is always subject to the Constitution, wherever it goes and whatever it does. As basic as that sounds, it is not a universally held belief am
Gary Edwards

What the hell just happened? 'Tyranny By Executive Order' | by Constitutional Attorney ... - 0 views

  •  
    "What the hell just happened? That is the question that many Americans should be asking themselves following the news conference where Obama unveiled his plan for destroying the Bill of Rights to the U.S. Constitution. At first glance it appeared to be a case of Obama shamelessly using the deaths of innocents, and some live children as a backdrop, to push for the passage of radical gun control measures by Congress. Most of these have no chance of passing, yet, Obama's signing of Executive orders initiating 23 so called Executive actions on gun control seemed like an afterthought. Unfortunately, that is the real story, but it is generally being overlooked. The fact is that with a few strokes of his pen Obama set up the mechanisms he will personally use to not only destroy the Second Amendment to the Constitution, but also the First, Fourth, and Fifth Amendments. It will not matter what Congress does, Obama can and will act on his own, using these Executive actions, and will be violating both the Constitution and his oath of office when he does it. Here are the sections of the Executive Order that he will use: "1. Issue a Presidential Memorandum to require federal agencies to make relevant data available to the federal background-check system." What exactly is relevant data? Does it include our medical records obtained through Obamacare, our tax returns, our political affiliations, our military background, and our credit history? I suggest that all of the above, even if it violates our fourth Amendment right to privacy will now be relevant data for determining if we are allowed to purchase a firearm. "2. Address unnecessary legal barriers, particularly relating to the Health Insurance Portability and Accountability Act, that may prevent states from making information available to the background-check system." This should be read in conjunction with section 16 of the order that says: "16. Clarify that the Affordable Care Act does not prohibit doctors
Paul Merrell

Report on the Free Flow of Information Act - 0 views

  • 113th Congress Report SENATE 1st Session 113-118 ====================================================================== FREE FLOW OF INFORMATION ACT OF 2013 _______ November 6, 2013.--Ordered to be printed _______ Mr. Leahy, from the Committee on the Judiciary, submitted the following R E P O R T together with ADDITIONAL AND MINORITY VIEWS [To accompany S. 987]
  • Senator Cornyn offered an amendment (ALB13708) that would ensure that all persons or entities that are protected under the Free Press Clause of the First Amendment are covered by the bill's privilege. The Committee rejected the amendment by a roll call vote. The vote record is as follows: Tally: 4 Yeas, 13 Nays, 1 Pass Yeas (4): Cornyn (R-TX), Lee (R-UT), Cruz (R-TX), Flake (R- AZ) Nays (13): Leahy (D-VT), Feinstein (D-CA), Schumer (D-NY), Durbin (D-IL), Whitehouse (D-RI), Klobuchar (D-MN), Franken (D- MN), Coons (D-DE), Blumenthal (D-CT), Hirono (D-HI), Grassley (R-IA), Hatch (R-UT), Graham (R-SC) Pass (1): Feinstein (D-CA)
  • ADDITIONAL MINORITY VIEWS FROM SENATORS CORNYN, SESSIONS, LEE, AND CRUZ On December 15, 1791, the United States of America ratified the Bill of Rights--the first ten amendments to the U.S. Constitution. The first among them states: ``Congress shall make no law . . . abridging the freedom . . . of the press[.]'' United States Constitution, amend. I. The freedom of the press does not discriminate amongst groups or individuals--it applies to all Americans. As the Supreme Court has long recognized, it was not intended to be limited to an organized industry or professional journalistic elite. See Branzburg v. Hayes, 408 U.S. 665, 704 (1972) (the ``liberty of the press is the right of the lonely pamphleteer who uses carbon paper or a mimeograph just as much as of the large metropolitan publisher who utilizes the latest photocomposition methods. Freedom of the press is a fundamental personal right[.]''); Lovell v. Griffin, 303 U.S. 444, 452 (1938) (``The liberty of the press is not confined to newspapers and periodicals. It necessarily embraces pamphlets and leaflets. . . . The press in its historic connotation comprehends every sort of publication which affords a vehicle of information and opinion.''). The Founders recognized that selectively extending the freedom of the press would require the government to decide who was a journalist worthy of protection and who was not, a form of licensure that was no freedom at all. As Justice White observed in Branzburg, administering a privilege for reporters necessitates defining ``those categories of newsmen who qualified for the privilege.'' 408 U.S. at 704 That inevitably does violence to ``the traditional doctrine that liberty of the press is the right of the lonely pamphleteer who uses carbon paper or a mimeograph just as much as of the large metropolitan publisher who utilizes the latest photocomposition methods.'' Id.
  • ...2 more annotations...
  • The First Amendment was adopted to prevent--not further-- the federal government licensing of media. See Lovell, 303 U.S. at 451 (striking an ordinance ``that . . . strikes at the very foundation of the freedom of the press by subjecting it to license and censorship. The struggle for the freedom of the press was primarily directed against the power of the licensor.''). But federal government licensing is exactly what the Free Flow of Information Act would create. The bill identifies favored forms of media--``legitimate'' press--by granting them a special privilege. That selective grant of privilege is inimical to the First Amendment, which promises all citizens the ``freedom of the press.'' See Branzburg, 408 U.S. at 704 (``Freedom of the press is a fundamental personal right[.]'') (emphasis added). It also threatens the viability of any other form of press. The specially privileged press will gain easier access to news. That will tip the scales against its competitors and make it beholden to the government for that competitive advantage. A law enacted to protect the press from the state will, in fact, make that press dependent upon the federal government--anything but free.
  • Proponents of this bill suggest that, because the Constitution does not provide a reporter's privilege, Congress's provision of a limited privilege cannot raise any constitutional concerns. Those proponents misunderstand--and thus run afoul of--the First Amendment. The First Amendment was adopted to prevent press licensure. While it does not create a ``reporter's privilege'' on its own, it abhors the selective grant of privilege to one medium over another. The American Revolution was stoked by renegade pamphleteers and town criers who used unlicensed presses to overthrow tyranny. Today, ``any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox. Through the use of Web pages, mail exploders, and newsgroups, the same individual can become a pamphleteer.'' Reno v. Am. Civil Liberties Union, 521 U.S. 844, 870 (1997). If today's town crier or pamphleteer must meet a test set by the federal government to avail themselves of liberty, we have gone less far from tyranny than any of us want to admit. This bill runs afoul of the First Amendment to the United States Constitution and amounts to de facto licensing. It would weaken the newly-illegitimate press, render the specially privileged press supplicant to the federal government and ultimately undermine liberty. This legislation also raises a number of serious national security concerns, as discussed in the minority views authored by Senator Sessions. For these reasons, we oppose this bill. John Cornyn. Jeff Sessions. Michael S. Lee. Ted Cruz.
  •  
    The Senate Committee on the Judiciary reports with a do-pass recommendation a bill to grant a "covered journalist" a limited testimonial privilege against revealing news sources. But the attempt to grant such a shield to mainstream media reporters not only runs afoul of the First Amendment as indicated by the quoted minority view, but also a denial of equal protection of the law for non-mainstream media investigators and lowly citizens. The core problem is the Supreme Court has invariably held that members of the press have no greater protection under the first amendment than the lowly pamphleteer, hence the denial of Equal Protection of the law in this legislation.  The legislation is in direct response to government surveillance of the press and reporters being required by the courts to reveal their sources of classified information. 
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

NSA phone surveillance program likely unconstitutional, federal judge rules | World new... - 0 views

  • A federal judge in Washington ruled on Monday that the bulk collection of Americans’ telephone records by the National Security Agency is likely to violate the US constitution, in the most significant legal setback for the agency since the publication of the first surveillance disclosures by the whistleblower Edward Snowden. Judge Richard Leon declared that the mass collection of metadata probably violates the fourth amendment, which prohibits unreasonable searches and seizures, and was "almost Orwellian" in its scope. In a judgment replete with literary swipes against the NSA, he said James Madison, the architect of the US constitution, would be "aghast" at the scope of the agency’s collection of Americans' communications data. The ruling, by the US district court for the District of Columbia, is a blow to the Obama administration, and sets up a legal battle that will drag on for months, almost certainly destined to end up in the supreme court. It was welcomed by campaigners pressing to rein in the NSA, and by Snowden, who issued a rare public statement saying it had vindicated his disclosures. It is also likely to influence other legal challenges to the NSA, currently working their way through federal courts.
  • In Monday’s ruling, the judge concluded that the pair's constitutional challenge was likely to be successful. In what was the only comfort to the NSA in a stinging judgment, Leon put the ruling on hold, pending an appeal by the government. Leon expressed doubt about the central rationale for the program cited by the NSA: that it is necessary for preventing terrorist attacks. “The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” he wrote.
  • Leon’s opinion contained stern and repeated warnings that he was inclined to rule that the metadata collection performed by the NSA – and defended vigorously by the NSA director Keith Alexander on CBS on Sunday night – was unconstitutional. “Plaintiffs have a substantial likelihood of showing that their privacy interests outweigh the government’s interest in collecting and analysing bulk telephony metadata and therefore the NSA’s bulk collection program is indeed an unreasonable search under the fourth amendment,” he wrote. Leon said that the mass collection of phone metadata, revealed by the Guardian in June, was "indiscriminatory" and "arbitrary" in its scope. "The almost-Orwellian technology that enables the government to store and analyze the phone metadata of every telephone user in the United States is unlike anything that could have been conceived in 1979," he wrote, referring to the year in which the US supreme court ruled on a fourth amendment case upon which the NSA now relies to justify the bulk records program.
  • ...5 more annotations...
  • In a statement, Snowden said the ruling justified his disclosures. “I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts," he said in comments released through Glenn Greenwald, the former Guardian journalist who received leaked documents from Snowden. "Today, a secret program authorised by a secret court was, when exposed to the light of day, found to violate Americans’ rights. It is the first of many.”
  • In his ruling, Judge Leon expressly rejected the government’s claim that the 1979 supreme court case, Smith v Maryland, which the NSA and the Obama administration often cite to argue that there is no reasonable expectation of privacy over metadata, applies in the NSA’s bulk-metadata collection. The mass surveillance program differs so much from the one-time request dealt with by the 1979 case that it was of “little value” in assessing whether the metadata dragnet constitutes a fourth amendment search.
  • In a decision likely to influence other federal courts hearing similar arguments from the ACLU, Leon wrote that the Guardian’s disclosure of the NSA’s bulk telephone records collection means that citizens now have standing to challenge it in court, since they can demonstrate for the first time that the government is collecting their phone data.
  • Leon also struck a blow for judicial review of government surveillance practices even when Congress explicitly restricts the ability of citizens to sue for relief. “While Congress has great latitude to create statutory schemes like Fisa,” he wrote, referring to the seminal 1978 surveillance law, “it may not hang a cloak of secrecy over the constitution.”
  • In his ruling on Monday, Judge Leon predicted the process would take six months. He urged the government to take that time to prepare for an eventual defeat. “I fully expect that during the appellate process, which will consume at least the next six months, the government will take whatever steps necessary to prepare itself to comply with this order when, and if, it is upheld,” wrote Leon in his opinion. “Suffice it to say, requesting further time to comply with this order months from now will not be well received and could result in collateral sanctions.”
  •  
    This is the case I thought was the weakest because of poor drafting in the complaint. The judge noted those issues in dismissing the plaintiffs' claims under the Administrative Procedures Act, but picked his way through what remained to find sufficient allegations to support the 4th Amendment challenge. Because he ruled for the plaintiffs on the 4th Amendment count, the judge did not reach the plaintiffs' arguments under the First and Fifth Amendments. This case is about cellphone call metadata, which the FISA Court has been ordering cell phone companies to provide every day, with the orders updated every 90 days. The judge's 68-page opinion is at https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0881-40 (cleaner copy than the Guardian's, which was apparently faxed). Notably, the judge, Richard Leon, is a Bush II appointee and one of the plaintiffs is a prominent conservative civil libertarian lawyer. The other plaintiff is the father of an NSA cryptologist who worked closely with SEAL Team 6 and was killed along with members of that team when their helicopter crashed in Afghanistan. I'll add some more in a comment. But digital privacy is not yet dead.
  •  
    Unfortunately, DRM is not dead yet either and the court's PDF file is locked. No easy copying of its content. If you want to jump directly to the discussion of 4th Amendment issues, go to page 35. That way, you can skip past all the dreary discussion of the Administrative Procedures Act claim and you won't miss much that's memorable. In ruling on the plaintiffs' standing to raise the 4th Amendment claim, Judge Leon postulated two possible search issues: [i] the bulk daily collection of metadata and its retention in the database for five years; and [ii] the analysis of that data through the NSA's querying process. The judge had no difficulty with the first issue; it definitely qualifies as a search. But the judge rejected the plaintiffs' argument on the second type (which was lame), demonstrating that at least one federal judge understands how computers work. The government's filings indicated that a "seed" telephone number or other identifier is used as the query string. Judge Leon figured out for himself from this fact that the NSA of necessity had to compare that number or identifier to every number or identifier in its database looking for a match. The judge concluded that the plaintiffs' metadata --- indeed everyone's metadata --- had to be searched for comparison purposes *every* time the NSA analysts ran any query against the database. See his incisive discussion at pp. 39-41. So having established that two searches were involved, one every time the NSA queried the database, the judge moved on to the next question, whether "the plaintiffs had a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephony metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains that metadata for five years, and then queries, analyzes, and investigates that data without prior judicial approval of the investigative targets." pg. 43. More later
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Gary Edwards

Why the "Balanced Budget Amendment" is a Hoax - and a Deadly Trap - 0 views

  •  
    Wonderfully written argument AGAINST the proposed Balanced Budget Amendment.  Publius Huldah makes a very compelling and convincing legal argument that the BBA is not what it appears.  She argues that we should first restore the Constitution.  Doing that will balance the budget and much more.  The BBA actually expands the power and reach of Big Government, transfering even more spending to the Executive Branch! excerpt: Will the Balanced Budget Amendment (BBA) really "reign in" the federal government? Will it really "show them" that they have to balance their budget the same as we do? Or does it actually legalize spending which is now unconstitutional? Is it actually a massive grant of new constitutional powers to the President and the federal courts - a grant which will cut the Heart out of The Constitution our Framers gave us? Amending the Constitution is serious business - and you are morally bound to get informed before you jump on The Amendment Bandwagon. So, lay aside your giddy joy at the fact that all 47 U.S. Senate Republicans are co-sponsoring the Balanced Budget Amendment, Senate Joint Resolution 10 (March 31, 2011). Let's go through it. What you believe the BBA will do, and what it will actually do, are two very different things indeed. 
Gary Edwards

1913: The Blow That Killed America 100 Years Ago - 0 views

  •  
    "There is a lot of ruin in a nation," wrote Adam Smith. His point was that it takes a long time for nations to fall, even when they're dead on their feet. And he was certainly right. America took its fatal blow in 1913, one hundred years ago; it just hasn't hit the ground yet. This is a slow process, but it's actually fast compared to the Romans. It took them several centuries to collapse . The confusing thing about our current situation is that America - and by that I mean the noble America that so many of us grew up believing was real - has long been poisoned. Its liver, kidneys, and spleen have all stopped functioning. Its heart beats slowly and irregularly. But it still stands on its feet and presents itself as alive to all those who would let their eyes fool them. And I'm not without sympathy for those who want to believe. They find themselves in a world where politics is almighty, and where their comfort, prosperity, and perhaps their survival all hang in a delicate balance. They don't want to upset anything, and questioning the bosses is a good way to get yelled at. But just because someone wants to believe doesn't make it so. We are not children and we are not powerless. We Producers should never be intimidated by those who live at our expense. So let's start looking at the facts. 1913: The Horrible Year For all the problems America had prior to 1913 (including the unnecessary and horrifying Civil War), nothing spelled the death of the nation like the horrors of 1913. Here are the key dates: February 3rd : The 16th Amendment to the United States Constitution was ratified, authorizing the Federal government to impose income taxes on individuals. An amendment to a tariff act in 1894 had attempted to do this, but since it was clearly unconstitutional, the Supreme Court struck it down. As a result - and mostly under the banner of bleeding the rich - the 16th amendment was promoted and passed. As a result, the Revenue Act of 1
Paul Merrell

History of the Federal Judiciary - 0 views

  •  Olmstead v. United States: The Constitutional Challenges of Prohibition Enforcement Historical Documents Dissenting opinion of Justice Louis D. Brandeis in Olmstead v. United States Justice Brandeis’s dissenting opinion is one of the more notable dissents in Supreme Court history. He attempted to define a general right of privacy based on the Fourth and Fifth Amendments. Brandeis had long been interested in the problem of privacy in the modern age; years earlier he and his law partner, Samuel Warren, published what many consider the seminal article on the topic (Samuel Warren & Louis D. Brandeis, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890)). Brandeis’s opinion in Olmstead attempted to apply to the current era what he said were the principles of the Fourth and Fifth Amendments. Historians often overlook how much his approach draws on the dissenting opinion of Judge Rudkin in the circuit court, but Brandeis himself acknowledged his debt to Rudkin in the text. The quotation about “the form that evil had theretofore taken” referred to the Supreme Court decision in Weems v. United States, in which Justice Joseph McKenna wrote of the need for the Court to apply the general principles of the Constitution to new problems.
  • Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security? . . .
  • In Ex parte Jackson, 96 U.S. 727, it was held that a sealed letter entrusted to the mail is protected by the Amendments. The mail is a public service furnished by the Government. The telephone is a public service furnished by its authority. There is, in essence, no difference between the sealed letter and the private telephone message. As Judge Rudkin said below: “True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed, but these are distinctions without a difference.” The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and, although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.
  • ...2 more annotations...
  • Time and again, this Court in giving effect to the principle underlying the Fourth Amendment, has refused to place an unduly literal construction upon it. This was notably illustrated in the Boyd case itself. Taking language in its ordinary meaning, there is no “search” or “seizure” when a defendant is required to produce a document in the orderly process of a court’s procedure. “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” would not be violated, under any ordinary construction of language, by compelling obedience to a subpoena. But this Court holds the evidence inadmissible simply because the information leading to the issue of the subpoena has been unlawfully secured. . . . The provision against self-incrimination in the Fifth Amendment has been given an equally broad construction. . . .
  • Decisions of this Court applying the principle of the Boyd case have settled these things. Unjustified search and seizure violates the Fourth Amendment, whatever the character of the paper; whether the paper when taken by the federal officers was in the home, in an office, or elsewhere; whether the taking was effected by force, by fraud, or in the orderly process of a court’s procedure. From these decisions, it follows necessarily that the Amendment is violated by the officer’s reading the paper without a physical seizure, without his even touching it; and that use, in any criminal proceeding, of the contents of the paper so examined—as where they are testified to by a federal officer who thus saw the document, or where, through knowledge so obtained, a copy has been procured elsewhere—any such use constitutes a violation of the Fifth Amendment. The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.
  •  
    The linked opinion is Justice Brandeis' dissent in Olmstead v. U.S., the first Supreme Court decision to approve the use of secret wiretap evidence in a criminal proceeding, even though gathered without a search warrant. The warrant requirement would later be imposed in 1967 by the decision in Katz v. U.S., which established that the Fourth Amendment the privacy of people, not places, reviving the Brandeis dissent to a large degree. Since Katz and the advent of broad government surveillance, Justice Brandeis' dissent is gaining still more attention. 
Paul Merrell

Newly declassified documents reveal how U.S. agreed to Israel's nuclear program - Diplo... - 0 views

  • The Obama administration this week declassified papers, after 45 years of top-secret status, documenting contacts between Jerusalem and Washington over American agreement to the existence of an Israeli nuclear option. The Interagency Security Classification Appeals Panel (ISCAP), which is in charge of approving declassification, had for decades consistently refused to declassify these secrets of the Israeli nuclear program. The documents outline how the American administration worked ahead of the meeting between President Richard Nixon and Prime Minister Golda Meir at the White House in September 1969, as officials came to terms with a three-part Israeli refusal – to sign the Non-Proliferation Treaty; to agree to American inspection of the Dimona nuclear facility; and to condition delivery of fighter jets on Israel’s agreement to give up nuclear weaponry in exchange for strategic ground-to-ground Jericho missiles “capable of reaching the Arab capitals” although “not all the Arab capitals.”
  • The officials – cabinet secretaries and senior advisers who wrote the documents – withdrew step after step from an ambitious plan to block Israeli nuclearization, until they finally acceded, in internal correspondence – the content of the conversation between Nixon and Meir is still classified – to recognition of Israel as a threshold nuclear state. In fact, according to the American documents, the Nixon administration defined a double threshold for Israel’s move from a “technical option” to a “possessor” of nuclear weapons. The first threshold was the possession of “the components of nuclear weapons that will explode,” and making them a part of the Israel Defense Forces operational inventory.
  • The second threshold was public confirmation of suspicions internationally, and in Arab countries in particular, of the existence of nuclear weapons in Israel, by means of testing and “making public the fact of the possession of nuclear weapons.” Officials under Nixon proposed to him, on the eve of his conversation with Meir, to show restraint with regard to the Israeli nuclear program, and to abandon efforts to get Israel to cease acquiring 500-kilometer-range missiles with one-ton warheads developed in the Marcel Dassault factory in France, if it could reach an agreement with Israel on these points.
  • ...2 more annotations...
  • The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both “explicit and implicit” that “Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.”
  • According to the documents, the Nixon administration believed that Israel’s acquisition of nuclear weapons would spur the Arab countries to acquire their own such weapons within 10 years, through private contracts with scientists and engineers in Europe. Moreover, “deeply rooted in the Arab psyche is the concept that a settlement will be possible only when there is some parity in strength with Israel. A ‘kamikaze’ strike at the Dimona facilities cannot be ruled out,” the document states.
  •  
    "The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both 'explicit and implicit' that 'Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.'" Which just goes to show that Israel's leadership was very bit as looney-tunes as the U.S. leadership was with its "MAD" Mutually Assured Destruction strategy. What is there about democracy that permits psychopaths to acquire the power they so insanely crave? Humanity would have far better odds of surviving the next 100 years if all members of Congress now chosen by voting were instead chosen from the general population at random and limited to a single term. Then let Congress choose the President and Vice President from five people also randomly chosen. That would also result in a Congress far more representative of the People's interests. Anyone with a rudimentary understanding of Statistics could prove that mathematically. To boot, that would take care of the campaign finance issues, since there wouldn't be any elections for federal office. Give me 24 hours notice and I'll have the necessary constitutional amendments written. Let's call them the No More Lunatics Running This Asylum Amendments. Or with a bit more thought we could have a name with an acronym that's more descriptive, something like the SANE Amendments. Let's see: the Save America from Nutjobs Evermore Amendments, or ....   Never mind for now. You do the political organizing to get the Amendments adopted and let me know when. I'll crank out the wordsmith work product for the Amendments.  Sheesh! As I've said for years, if it be true that Man was was created in the image of the Creator, that is irrefutable proof that the Creator is as dumb as a doornail and insane to boot. "[I]t it is not really possible to deter Arab leaders when they themse
Paul Merrell

How Edward Snowden Changed Everything | The Nation - 0 views

  • Ben Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.” Ad Policy On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
  • en Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.” Ad Policy On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
  • Many of the technologies, both military technologies and surveillance technologies, that are developed for purposes of policing the empire find their way back home and get repurposed. You saw this in Ferguson, where we had military equipment in the streets to police nonviolent civil unrest, and we’re seeing this with surveillance technologies, where things that are deployed for use in war zones are now commonly in the arsenals of local police departments. For example, a cellphone surveillance tool that we call the StingRay—which mimics a cellphone tower and communicates with all the phones around—was really developed as a military technology to help identify targets. Now, because it’s so inexpensive, and because there is a surplus of these things that are being developed, it ends up getting pushed down into local communities without local democratic consent or control.
  • ...4 more annotations...
  • SG & TP: How do you see the current state of the right to privacy? BW: I joked when I took this job that I was relieved that I was going to be working on the Fourth Amendment, because finally I’d have a chance to win. That was intended as gallows humor; the Fourth Amendment had been a dishrag for the last several decades, largely because of the war on drugs. The joke in civil liberties circles was, “What amendment?” But I was able to make this joke because I was coming to Fourth Amendment litigation from something even worse, which was trying to sue the CIA for torture, or targeted killings, or various things where the invariable outcome was some kind of non-justiciability ruling. We weren’t even reaching the merits at all. It turns out that my gallows humor joke was prescient.
  • The truth is that over the last few years, we’ve seen some of the most important Fourth Amendment decisions from the Supreme Court in perhaps half a century. Certainly, I think the Jones decision in 2012 [U.S. v. Jones], which held that GPS tracking was a Fourth Amendment search, was the most important Fourth Amendment decision since Katz in 1967 [Katz v. United States], in terms of starting a revolution in Fourth Amendment jurisprudence signifying that changes in technology were not just differences in degree, but they were differences in kind, and require the Court to grapple with it in a different way. Just two years later, you saw the Court holding that police can’t search your phone incident to an arrest without getting a warrant [Riley v. California]. Since 2012, at the level of Supreme Court jurisprudence, we’re seeing a recognition that technology has required a rethinking of the Fourth Amendment at the state and local level. We’re seeing a wave of privacy legislation that’s really passing beneath the radar for people who are not paying close attention. It’s not just happening in liberal states like California; it’s happening in red states like Montana, Utah, and Wyoming. And purple states like Colorado and Maine. You see as many libertarians and conservatives pushing these new rules as you see liberals. It really has cut across at least party lines, if not ideologies. My overall point here is that with respect to constraints on government surveillance—I should be more specific—law-enforcement government surveillance—momentum has been on our side in a way that has surprised even me.
  • Do you think that increased privacy protections will happen on the state level before they happen on the federal level? BW: I think so. For example, look at what occurred with the death penalty and the Supreme Court’s recent Eighth Amendment jurisprudence. The question under the Eighth Amendment is, “Is the practice cruel and unusual?” The Court has looked at what it calls “evolving standards of decency” [Trop v. Dulles, 1958]. It matters to the Court, when it’s deciding whether a juvenile can be executed or if a juvenile can get life without parole, what’s going on in the states. It was important to the litigants in those cases to be able to show that even if most states allowed the bad practice, the momentum was in the other direction. The states that were legislating on this most recently were liberalizing their rules, were making it harder to execute people under 18 or to lock them up without the possibility of parole. I think you’re going to see the same thing with Fourth Amendment and privacy jurisprudence, even though the Court doesn’t have a specific doctrine like “evolving standards of decency.” The Court uses this much-maligned test, “Do individuals have a reasonable expectation of privacy?” We’ll advance the argument, I think successfully, that part of what the Court should look at in considering whether an expectation of privacy is reasonable is showing what’s going on in the states. If we can show that a dozen or eighteen state legislatures have enacted a constitutional protection that doesn’t exist in federal constitutional law, I think that that will influence the Supreme Court.
  • The question is will it also influence Congress. I think there the answer is also “yes.” If you’re a member of the House or the Senate from Montana, and you see that your state legislature and your Republican governor have enacted privacy legislation, you’re not going to be worried about voting in that direction. I think this is one of those places where, unlike civil rights, where you saw most of the action at the federal level and then getting forced down to the states, we’re going to see more action at the state level getting funneled up to the federal government.
  •  
    A must-read. Ben Wizner discusses the current climate in the courts in government surveillance cases and how Edward Snowden's disclosures have affected that, and much more. Wizner is not only Edward Snowden's lawyer, he is also the coordinator of all ACLU litigation on electronic surveillance matters.
Paul Merrell

US v. Warshak, 631 F. 3d 266 - Court of Appeals, 6th Circuit 2010 - Google Scholar - 0 views

  • While a letter is in the mail, the police may not intercept it and examine its contents unless they first obtain a warrant based on probable cause. Ibid. This is true despite the fact that sealed letters are handed over to perhaps dozens of mail carriers, any one of whom could tear open the thin paper envelopes that separate the private words from the world outside. Put another way, trusting a letter to an intermediary does not necessarily defeat a reasonable expectation that the letter will remain private. See Katz, 389 U.S. at 351, 88 S.Ct. 507 ("[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."). Given the fundamental similarities between email and traditional forms of communication, it would defy common sense 286*286 to afford emails lesser Fourth Amendment protection. See Patricia L. Bellia & Susan Freiwald, Fourth Amendment Protection for Stored E-Mail, 2008 U. Chi. Legal F. 121, 135 (2008) (recognizing the need to "eliminate the strangely disparate treatment of mailed and telephonic communications on the one hand and electronic communications on the other"); City of Ontario v. Quon, ___ U.S. ___, 130 S.Ct. 2619, 2631, 177 L.Ed.2d 216 (2010) (implying that "a search of [an individual's] personal e-mail account" would be just as intrusive as "a wiretap on his home phone line"); United States v. Forrester, 512 F.3d 500, 511 (9th Cir.2008) (holding that "[t]he privacy interests in [mail and email] are identical"). Email is the technological scion of tangible mail, and it plays an indispensable part in the Information Age.
  • Over the last decade, email has become "so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification." Quon, 130 S.Ct. at 2630. It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve. See U.S. Dist. Court, 407 U.S. at 313, 92 S.Ct. 2125; United States v. Waller, 581 F.2d 585, 587 (6th Cir.1978) (noting the Fourth Amendment's role in protecting "private communications"). As some forms of communication begin to diminish, the Fourth Amendment must recognize and protect nascent ones that arise. See Warshak I, 490 F.3d at 473 ("It goes without saying that like the telephone earlier in our history, e-mail is an ever-increasing mode of private communication, and protecting shared communications through this medium is as important to Fourth Amendment principles today as protecting telephone conversations has been in the past.").
  • If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment. An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company. As we have discussed above, the police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant, that is. See Jacobsen, 466 U.S. at 114, 104 S.Ct. 1652; Katz, 389 U.S. at 353, 88 S.Ct. 507. It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception. In Warshak I, the government argued that this conclusion was improper, pointing to the fact that NuVox contractually reserved the right to access Warshak's emails for certain purposes. While we acknowledge that a subscriber agreement might, in some cases, be sweeping enough to defeat a reasonable expectation of privacy in the contents of an email account, see Warshak I, 490 F.3d at 473; Warshak II, 532 F.3d at 526-27, we doubt that will be the case in most situations, and it is certainly not the case here.
  • ...1 more annotation...
  • Accordingly, we hold that a subscriber enjoys a reasonable expectation of privacy in the contents of emails "that are stored with, or sent or received through, a commercial ISP." Warshak I, 490 F.3d at 473; see Forrester, 512 F.3d at 511 (suggesting that "[t]he contents [of email messages] may deserve Fourth Amendment protection"). The government may not compel a commercial ISP to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak's emails. Moreover, to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.
  •  
    A 2010 decision by the U.S. 6th Circuit Court of Appeals that I had missed up to now. It finds the Stored Communications Act's section that excuses email in the possession of an ISP for more than 180 days from the 4th Amendment's judicial warrant clause. There may yet be hope for cloud computing in the U.S. 
1 - 20 of 435 Next › Last »
Showing 20 items per page