First Amendment (United States Constitution …

First Amendment,amendment (1791) to the Constitution of the United States, part of the Bill of Rights, which reads,

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

The clauses of the amendment are often called the establishment clause, the free exercise clause, the free speech clause, the free press clause, the assembly clause, and the petition clause.

The First Amendment, like the rest of the Bill of Rights, originally restricted only what the federal government may do and did not bind the states. Most state constitutions had their own bills of rights, and those generally included provisions similar to those found in the First Amendment. But the state provisions could be enforced only by state courts.

In 1868, however, the Fourteenth Amendment was added to the U.S. Constitution, and it prohibited states from denying people liberty without due process. Since then, the U.S. Supreme Court has gradually interpreted this to apply most of the Bill of Rights to state governments. In particular, from the 1920s to the 40s the Supreme Court applied all the clauses of the First Amendment to the states. Thus, the First Amendment now covers actions by the federal, state, and local governments. The First Amendment also applies to all branches of government, including legislatures, courts, juries, and executive officials and agencies. This includes public employers, public university systems, and public school systems.

The First Amendment, however, applies only to restrictions imposed by the government, since the First and Fourteenth amendments refer only to government action. As a result, if a private employer fires an employee because of the employees speech, there is no First Amendment violation. There is likewise no violation if a private university expels a student for what the student said, if a commercial landlord restricts what bumper stickers are sold on property it owns, or if an Internet service provider refuses to host certain Web sites.

Legislatures sometimes enact laws that protect speakers or religious observers from retaliation by private organizations. For example, Title VII of the federal Civil Rights Act of 1964 bans religious discrimination even by private employers. Similarly, laws in some states prohibit employers from firing employees for off-duty political activity. But such prohibitions are imposed by legislative choice rather than by the First Amendment.

The freedoms of speech, press, assembly, and petitiondiscussed here together as freedom of expressionbroadly protect expression from governmental restrictions. Thus, for instance, the government may not outlaw antiwar speech, speech praising violence, racist speech, procommunist speech, and the like. Nor may the government impose special taxes on speech on certain topics or limit demonstrations that express certain views. Furthermore, the government may not authorize civil lawsuits based on peoples speech, unless the speech falls within a traditionally recognized First Amendment exception. This is why, for example, public figures may not sue for emotional distress inflicted by offensive magazine articles, unless the articles are not just offensive but include statements that fall within the false statements of fact exception.

The free expression guarantees are not limited to political speech. They also cover speech about science, religion, morality, and social issues as well as art and even personal gossip.

Freedom of the press confirms that the government may not restrict mass communication. It does not, however, give media businesses any additional constitutional rights beyond what nonprofessional speakers have.

Read the original:

First Amendment (United States Constitution ...

NCAA hints at O'Bannon case appeal strategy

The NCAA suggested its main arguments to appeal the Ed O'Bannon ruling allowing college athletes to be paid will focus on amateurism and First Amendment rights on live broadcasts.

In a filing Thursday night with the U.S. Circuit Court of Appeals, the NCAA's lawyers responded to a mandatory mediation questionnaire that asks to briefly describe the issues on appeal. The NCAA wrote, The issues on appeal include but are not limited to whether amateurism is presumptively procompetitive for an amateur sports league and whether plaintiffs' claims based on a property right in the use of their (names, images and likenesses) in live broadcasts of sporting events are foreclosed by the First Amendment. USA Today Sports first reported the filing.

U.S. District Judge Claudia Wilken ruled Aug. 8 that the NCAA's restrictions on what Football Bowl Subdivision players and Division I men's basketball players can receive unreasonably restrain trade and violates antitrust law. Wilken's injunction will allow football and men's basketball players to receive scholarships covering their full cost of attendance and deferred payments for the schools' use of their names, images and likenesses (NILs).

For decades, the NCAA's legal defense to avoid paying players has relied upon a landmark 1984 Supreme Court ruling that stripped the NCAA of TV rights and allowed conferences to sell their games. The NCAA has clung to a line from that decision: In order to preserve the character and quality of the (NCAA's) 'product,' athletes must not be paid, must be required to attend class, and the like.

In her October 2013 summary judgment ruling, Wilken wrote the Supreme Court opinion does not stand for the sweeping proposition that student-athletes must be barred, both during their college years and forever thereafter, from receiving any monetary compensation for the commercial use of their names, images and likenesses. In her August judgment after a three-week trial, Wilken noted that the O'Bannon plaintiffs provided enough evidence to show the college sports industry has changed substantially in 30 years.

Wilken also wrote that the Supreme Court opinion stating athletes must not be paid differed from the NCAA's own lawyers in the case. The NCAA's lawyers in 1984 said during an oral argument that the NCAA was not relying on amateurism as a procompetitive justification and might be able to get more viewers and so on if it had semi-professional clubs rather than amateur clubs,' Wilken wrote. In addition, Wilken wrote that the NCAA has inconsistently applied its amateurism rules throughout the association's history and to this day.

Wilken's injunction allows the NCAA to create a cap on the deferred licensing money as long as the cap is not less than $5,000 per year. It's what's called a less-restrictive alternative to the antitrust violation found.

By appealing based on amateurism, the NCAA could find relief or perhaps an even more damaging ruling. Conceivably, the appeals court could determine that amateurism is so illegitimate that it's unreasonable for there to be any cap. That's the argument attorney Jeffrey Kessler makes in his class-action lawsuit against the NCAA and the five major conferences.

Another issue the NCAA suggested it will appeal in O'Bannon relates to the First Amendment and live TV broadcasts -- an area that generates billions of dollars for schools. The O'Bannon plaintiffs have sought to share that licensing revenue.

Earlier in the O'Bannon case, the NCAA claimed that the First Amendment and various state laws prevent college athletes from asserting any rights of publicity during game broadcasts. Wilken rejected that argument in April, writing that the First Amendment does not guarantee media organizations an unlimited right to broadcast entire college football games and questioned whether college athletes validly transfer their rights of publicity to another party.

See the original post here:

NCAA hints at O'Bannon case appeal strategy

Volokh Conspiracy: Thuggery wins, free speech rights lose

The free speech rights here were as in many free speech cases the rights of pretty rude speakers, certainly ones whose message and manners I do not endorse. But the First Amendment protects the rude as well as the polite, especially given how subjective government judgments of rudeness usually end up being.

Here are the facts, from the majority opinion in Bible Believers v. Wayne County (6th Cir. Aug. 27, 2014) (some paragraph breaks added throughout the block quotes below):

The City of Dearborn in Wayne County, Michigan, has hosted the Arab International Festival every summer from 1995 until 2012. A three-day event that was free and open to the public, the Festival welcomed roughly 250,000 attendees and featured carnival attractions, live entertainment, international food, and merchandise sales. [The panel later agreed that the festival was a "traditional public forum" at which public speech is fully constitutionally protected, rather than private property or even public property that was temporarily exclusively leased by a public organization. -EV]

[T]he Bible Believers came bearing strongly worded t-shirts and banners:

[Chavez] wore a t-shirt with the message, Fear God on the front and Trust Jesus, Repent and Believe in Jesus on the back. Fisher wore a t-shirt with the message, Trust Jesus on the front and Fear God and Give Him Glory on the back, and he carried a banner that said on one side, Only Jesus Christ Can Save You From Sin and Hell, and on the other side it said, Jesus Is the Judge, Therefore, Repent, Be Converted That Your Sins May Be Blotted Out. Other messages conveyed on t-shirts, signs, or banners displayed by the [other Bible Believers] included, among others, Fear God, Trust Jesus, Repent and Believe in Jesus, Prepare to Meet Thy God Amos 4:12, Obey God, Repent, Turn or Burn, Jesus Is the Way, the Truth and the Life. All Others Are Thieves and Robbers, and Islam Is A Religion of Blood and Murder.

One Bible Believer carried a severed pigs head on a stick, which Chavez explained protected the Bible Believers by repelling observers who feared it. Appellants soon began preaching using a megaphone, and a small crowd formed around them almost immediately. [The police eventually told the speakers that megaphone use was forbidden by ordinance, and the speakers stopped; that restriction is not challenged here. -EV] Chavez castigated the crowd for following a pedophile prophet and warned of Gods impending judgment. As this evangelizing continued, the crowd yelled back. At this point, a ribbon-cutting at the opposite end of the Festival occupied a majority of the [Wayne County Sheriff's Office] officers, but one officer watched from the outskirts of the crowd.

As the Bible Believers moved deeper into the Festival, the crowd a good portion of which appeared to be minors continued to gather and yell. Some people started throwing debris including rocks, plastic bottles, garbage, and a milk crate at the Bible Believers. Someone in the crowd also shoved one Bible Believer to the ground. Some WCSO officers detained debris-throwers while other officers hovered at the edges of the crowd. Eventually, after about thirty-five minutes, the Bible Believers temporarily stopped preaching and stood as the crowd harangued them and hurled objects. Several officers, including some mounted units, attempted to quell the crowd.

After about five minutes of standing quietly, the Bible Believers began to move and preach again. As they did so, the cascade of objects intensified. Deputy Chiefs Richardson and Jaafar approached them a few minutes later. Jaafar explained that they could leave and that their safety was in jeopardy because not enough officers were available to control the crowd.

The Bible Believers, however, continued to preach, followed by what had swelled into a large crowd. Richardson and Jaafar then took Chavez aside to speak with him. Richardson noted his concern that Chavez was bleeding from where a piece of debris had cut his face. Richardson explained that he was responsible for policing the entire Festival, that Chavezs conduct was inciting the crowd, and that he would escort the Bible Believers out of the Festival

As Richardson insisted that the Bible Believers leave lest someone a Bible Believer, a Festival goer, or an officer be injured, Chavez asked if they would be arrested if they refused; Richardson replied, Probably we will cite you. This conversation replayed several times, with Chavez pressing for an answer and Richardson replying that the Bible Believers were a danger to public safety. Chavez eventually snapped, I would assume a few hundred angry Muslim children throwing bottles would be more of a threat than a few guys with signs.

See more here:

Volokh Conspiracy: Thuggery wins, free speech rights lose

Jitsi (Mac) – Download – Softonic

Jitsi is a free messenger client for Mac, which supports most major protocols and even supports video and audio conversations.

Simply choose the IM protocol that you'd like to connect to including SIP, Google Talk, XMPP/Jabber, MSN or Windows Live Messenger, AIM, Bonjour, ICQ, Yahoo Messenger and Facebook chat. In the main window, you'll find all your personal contacts.

In the Jitsi chat window, you can exchange IM messages or initiate video or audio chats including group chats. There are a limited number of emoticons and the Jitsi keeps a history of your chats. Although the interface isn't quite as intuitive as Adium. However, the fact that you can initiate audio and video chats gives it a serious advantage.

Note that this download link takes you to the nightly build page because Jitsi is being updated so regularly, that you can choose the latest version more easily.

Jitsi might not be quite as slick as other IM clients but wide support of IM protocols plus audio and video chatting makes it a very interesting option.

Note that this download link takes you to the nightly build page because Jitsi is being updated so regularly, that you can choose the latest version more easily

The rest is here:

Jitsi (Mac) - Download - Softonic

Review: Tor Browser Bundle lets you browse in anonymity …

If you want to beef up and anonymize your Internet browsing experience as well, Tor Browser Bundle (free) is the way to go. The Tor network provides a way to browse anonymously.

The Tor Browser Bundle is a portable, self-extracting package which contains a special version of Firefox, along with an application for connecting to Tor. You extract the bundle, and double-click "Start Tor Browser." A connection window comes up and steps through an initialization sequence. You don't have to do anything; just wait a moment while the progress bar fills up. As soon as a secure connection with Tor is established, Firefox loads and you can start browsing.

When you connect to Tor, all of your Internet traffic is encrypted and routed through a complex network of anonymous nodes until it reaches its final destination. It's not 100% secure, but then again, no security solution is. Tor has been around since 2002, and has been field-tested in rough situations in Egypt and other oppressive regimes that restrict Internet access. It works.

Since Tor routes your data through so many layers and random endpoints, it's not exactly blazing fast. Then again, most of us don't require Tor as a necessary part of our daily browsing routines. For occasional use, it's an elegant solution that simplifies a complex security system down to a double-click.

Note: The Download button on the Product Information page takes you to the vendor's site, where you can download the latest version of the software. This file is donationware; it is free to use, but the developer welcomes donations toward future development.

View original post here:

Review: Tor Browser Bundle lets you browse in anonymity ...

Tor Browser – Problem Connecting?

So this is odd - i've been using TOR Browser for a while now with no issue, but then tonight I tried to connect and I get the following error message -

"Firefox can't establish a connection to the server at check.torproject.org."

I haven't changed any settings, and my log file contains the following:

Mar 07 00:41:46.678 [Notice] Tor v0.2.3.25 (git-17c24b3118224d65) running on Windows 7. Mar 07 00:41:46.678 [Notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 07 00:41:46.678 [Notice] Read configuration file "C:UsersMyNameDesktopTor BrowserDataTortorrc". Mar 07 00:41:46.678 [Notice] Initialized libevent version 2.0.21-stable using method win32. Good. Mar 07 00:41:46.678 [Notice] Opening Socks listener on 127.0.0.1:9150 Mar 07 00:41:46.678 [Notice] Opening Control listener on 127.0.0.1:9151 Mar 07 00:41:46.791 [Notice] Parsing GEOIP file .DataTorgeoip. Mar 07 00:41:49.461 [Notice] No AES engine found; using AES_* functions. Mar 07 00:41:49.461 [Notice] This OpenSSL has a good implementation of counter mode; using it. Mar 07 00:41:49.461 [Notice] OpenSSL OpenSSL 1.0.0k 5 Feb 2013 looks like version 0.9.8m or later; I will try SSL_OP to enable renegotiation Mar 07 00:41:49.461 [Notice] Reloaded microdescriptor cache. Found 3175 descriptors. Mar 07 00:41:49.461 [Notice] We now have enough directory information to build circuits. Mar 07 00:41:49.461 [Notice] Bootstrapped 80%: Connecting to the Tor network. Mar 07 00:41:49.461 [Notice] New control connection opened. Mar 07 00:41:50.328 [Notice] Heartbeat: Tor's uptime is 0:00 hours, with 1 circuits open. I've sent 0 kB and received 0 kB. Mar 07 00:41:50.440 [Notice] Bootstrapped 85%: Finishing handshake with first hop. Mar 07 00:41:51.546 [Notice] Bootstrapped 90%: Establishing a Tor circuit. Mar 07 00:41:52.319 [Notice] Tor has successfully opened a circuit. Looks like client functionality is working. Mar 07 00:41:52.319 [Notice] Bootstrapped 100%: Done.

I'm not finding much help online - what could be the problem?

More here:

Tor Browser - Problem Connecting?

Softonic – Tor Browser – Download

Preserving your privacy on the net is no easy task nowadays with so many security risks and potential prowlers out there.

Tor Browser is a toolset that's designed for anyone who wants to improve their safety and security on the Internet. It can help you anonymize web browsing and publishing, instant messaging, and other applications that use the TCP protocol. For business users, it means that confidential exchanges of information can be kept from prying eyes and for more general users, it means that ISPs, keyloggers and other types of malware can't track your activities easily.

It works by bouncing traffic around a distributed network of servers which it calls "onion routers" (hence the logo). The Tor Browser interface allows you to easily toggle it on and off based on when you need to go online anonymously - there's no need to restart your computer when you've done so. If you want, you can also choose from various proxy tunnels based on a world map which displays exactly where each one is located.

To check it's working, you can use the online "Tor detector" to see if you're surfing anonymously or not. Connection can take some time depending on how many users are logged onto the network at any one time but usually its very quick. The Tor onion logo turns from yellow to green in your taskbar when a successful connection has been made.

Tor is simple, well organized and effective tool for anyone worried about security or invasions of privacy online.

See the original post:

Softonic - Tor Browser - Download

What is the Tor Browser? – Tor Project: Anonymity Online

Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk.

Click Install (3) Wait until the installer finishes. This may take a few minutes to complete.

Once the installation is complete, click Finish to launch Tor Browser's wizard.

Once you see Tor Browser's wizard click Connect

Alternatively, you can launch Tor Browser by going to the folder Tor Browser which can be found at the location you saved the bundle at (Default: Desktop) and double click on the Start Tor Browser application.

Once Tor is ready, Tor Browser will automatically be opened. Only web pages visited through Tor Browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected.

Once you are finished browsing, close any open Tor Browser windows by clicking on the (6). For privacy reasons, the list of web pages you visited and any cookies will be deleted.

Continue reading here:

What is the Tor Browser? - Tor Project: Anonymity Online

Federal Cybersecurity Director Found Guilty on Child Porn Charges

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images.

But DeFoggiconvicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child pornmust have believed his use of the Tor anonymizing network shielded him from federal investigators.

Hes the sixth suspect to make this mistake in Operation Torpedo, an FBI operation that targeted three Tor-based child porn sites and that used controversial methods to unmask anonymized users.

But DeFoggis conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services. DeFoggi worked for the department from 2008 until January this year. A department official told Business Insider that DeFoggi worked in the office of the assistant secretary for administration as lead IT specialist but a government budget document for the department from this year (.pdf) identifies a Tim DeFoggi as head of OS IT security operations, reporting to the departments chief information security officer.

The porn sites hes accused of usingincluding one called PedoBookwere hosted on servers in Nebraska and run by Aaron McGrath, who has already been convicted for his role in the sites. The sites operated as Tor hidden servicessites that have special .onion URLs and that cannot normally be traced to the physical location where they are hosted.

Although anyone could use the sites, registered users like DeFoggiwho was known online under the user names fuckchrist and PTasseatercould set up profile pages with an avatar, often child porn images, and personal information and upload files. The site archived more than 100 videos and more than 17,000 child porn and child erotica images, many of them depicting infants and toddlers being sexually abused by adults.

The FBI seized the sites in late 2012, after McGrath failed to secure his administrative account with a password. Agents were able to log in and uncover the IP address of the Nebraska server where he was hosting two of them. McGrath worked at the server farm, and hosted the third site from his home. The FBI monitored him for a year and after arresting him in November 2012 continued to operate his child porn sites secretly from a federal facility in Omaha for several weeks before shutting them down. During this time, they monitored the private communications of DeFoggi and others and engaged in various investigative techniquesto defeat the anonymous browsing technology afford by the Tor network and identify the real IP addresses of users.

These techniques successfully revealed the true IP addresses of approximately 25 domestic users who accessed the sites (a small handful of domestic suspects were identified through other means, and numerous foreign-based suspect IPs were also identified), prosecutors wrote in a court document. In March 2013, twenty suspects were indicted in Nebraska; followed by two others who were indicted the following August.

One of these techniques involved drive-by downloads that infected the computers of anyone who visited McGraths web sites. The FBI has been using malicious downloads in this way since 2002, but focused on targeting users of Tor-based sites only in the last two years.

Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates.

View original post here:

Federal Cybersecurity Director Found Guilty on Child Porn Charges

Cybersecurity official uses Tor but still gets caught with child porn

The former acting cybersecurity director for the US Department of Health and Human Services, Tim DeFoggi, was convicted yesterday on three child porn charges.

As reported byWired,DeFoggi is the sixth suspect to be caught by the FBI's Operation Torpedo, which used controversial methods of defeating the Tor anonymizing software in order to find child porn suspects.

One site frequented byDeFoggi wasPedoBook, hosted by Aaron McGratha Nebraska man who was convicted earlier for his role in the operations. The websites were only accessible to users who installed Tor on their browsers. DeFoggi used names such as "fuckchrist" and "PTasseater"to register on thesites, where he could view more than 100 videos and more than 17,000 child porn images.

The FBI seized McGrath's site in late 2012 after monitoring him for a year. Then they kept it up and running for several more weeks, gathering private communications from DeFoggi and other users. The FBI used "various investigative techniques to defeat the anonymous browsing technology afforded by the Tor network."

The techniques used include "drive-by downloads," in which a website installs malware on every visitor's computer.

Such a deployment "can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computers name and address, and then evaporates," explained Wired in an earlier piece on Operation Torpedo.

Having set up such atrap, FBI agents got to know DeFoggi better. Wired's Kim Zetter explains:

During chats DeFoggi described using Tor to access PedoBook early in the morning hours and between 4 and 6 pm. Among the evidence seized against him was pen register/trap trace data obtained from Verizon showing someone at his Maryland residence using Tor during these hours as well as the IP addresses used by an AOL account under the username ptasseater, which pointed to DeFoggis home.

When agents arrived at his home early one morning to execute a search warrant, they had to pry him from his laptop, which was in the process of downloading a child porn video from a Tor web site called OPVA, or Onion Pedo Video Archive. In addition to child porn images stored on his computer, authorities also found evidence of his Tor browser history, showing some of his activity at PedoBook and OPVA.

DeFoggi worked for the Department of Health and Human Services from 2008 until January of this year. He's scheduled to be sentenced in November.

Read the original:

Cybersecurity official uses Tor but still gets caught with child porn

Selling products / services / fiat money for cryptocurrency – Coinkite PoS Terminal – Video


Selling products / services / fiat money for cryptocurrency - Coinkite PoS Terminal
A tutorial on how to sell products / services / fiat money in exchange for cryptocurrency, using the Coinkite Point of Sale Terminal. ...so that means the cu...

By: EasyBit LLC

Here is the original post:

Selling products / services / fiat money for cryptocurrency - Coinkite PoS Terminal - Video

Cryptocurrency Round-Up: Bitcoin Pioneer Dies and Digital Currency's Status in Australia

Cryptocurrency markets have slipped up once more as they struggle to recover from the recent downturn(IBTimes UK)

Bitcoin and other major cryptocurrencies fell in value for the second day in a row, as the market-wide recovery that began earlier this week appears to have come to an end.

Bitcoin, litecoin, peercoin, dogecoin and namecoin all dropped in price by between 1% and 8% over the last 24 hours.

Once again, darkcoin bucked the trend of other major markets by moving against the general trend. The anonymity-focused altcoin climbed by 2% since yesterday to take its price to $2.50 (1.50).

Bitcoin pioneer Hal Finney dies

Bitcoin pioneer Hal Finney, widely accredited as the number-two developer behind Satoshi Nakamoto on the world's most valuable cryptocurrency, has passed away following a five-year battle with amyotrophic lateral sclerosis (ALS).

Finney was the recipient of the world's first bitcoin transaction in 2008, having come across the peer-to-peer technology on an online cryptography forum.

According to Wired magazine, Finney requested for his body to be cryogenically preserved through the Alcor Life Extension Foundation.

"That's where he'll remain until such time as we have technologies to repair the problems he had such as ALS and the aging process," Max More, Alcor's director, told the publication. "And then we can bring Hal back happy and whole again."

Bitcoin could be legal tender in Australia

Here is the original post:

Cryptocurrency Round-Up: Bitcoin Pioneer Dies and Digital Currency's Status in Australia