Volokh Conspiracy: Second Amendment and people who had been committed to a mental institution 28 years ago

Under federal law, people who have been involuntarily committed to a mental institution however long ago are barred from possessing guns. Congress agreed that people with long-past mental problems might now be sane, and thus not especially dangerous, and provided for a means to apply for restoration of gun rights. But then in 1992 Congress ordered ATF not to spend any money applying the restoration program. And while it provided, in 2007, that people could get their rights restored by applying to a state that has a qualifying program for evaluating applicants mental fitness, many states have no such program.

This case was brought by a resident of one such state that lacks a relief-from-disabilities program, Michigan. From the courts opinion, Tyler v. Hillsdale County Sheriffs Dept (6th Cir. Dec. 18, 2014):

This case presents an important issue of first impression in the federal courts: whether a prohibition on the possession of firearms by a person who has been committed to a mental institution, 18 U.S.C. 922(g)(4), violates the Second Amendment. Twenty-eight years ago, Clifford Charles Tyler was involuntarily committed for less than one month after allegedly undergoing an emotionally devastating divorce. Consequently, he can never possess a firearm. Tyler filed suit in federal court, seeking a declaratory judgment that 922(g)(4) is unconstitutional as applied to him. The district court dismissed Tylers suit for failure to state a claim. Because Tylers complaint validly states a violation of the Second Amendment, we reverse and remand.

Tyler is a seventy-three-year-old resident of Hillsdale County, Michigan. On January 2, 1986, a state probate court committed Tyler to a mental institution. Tyler alleges that he underwent an emotionally devastating divorce in 1985 and that he was involuntarily committed because of a risk that he might be suicidal.

Tyler submitted a 2012 substance-abuse evaluation containing additional information about his 1985 depression. In 1985, when Tyler was forty-five years old, Tylers wife of twenty-three years served him divorce papers. Prior to filing for divorce, Tylers ex-wife allegedly ran away with another man and depleted Tylers finances. Tyler felt overwhelmed and sat in the middle of the floor at home pounding his head. According to a mental-health evaluation submitted by Tyler, Tyler was crying non-stop, not sleeping, depressed, and suicidal at this time. Tylers daughters became scared and contacted the police. [Tyler was then involuntarily committed. -EV]

In 2012, Tyler underwent a psychological evaluation. Tyler informed the psychologist that he had never experienced a depressive episode other than his 1985 incident. The psychologists report indicated that Tyler has no criminal history. The psychologist contacted Tylers physician who also reported that she had not detected evidence of mental illness in Tyler. The psychologist determined that Tylers prior involuntary commitment appeared to be a brief reactive depressive episode in response to his wife divorcing him. The psychologist determined that there was no evidence of mental illness.

The court concluded quite rightly, I think that Hellers endorsement of restrictions on gun ownership by the mentally ill doesnt dispose of the case:

The Courts assurance that Heller does not cast doubt on prohibitions on the possession of firearms by the mentally ill does not resolve this case. For 922(g)(4) prohibits firearm possession not just by the mentally ill but by anyone who has been committed to a mental institution. Hellers assurance that the state may prohibit the mentally ill from possessing firearms may provide solid constitutional ground for 922(g)(4)s restriction as to an individual adjudicated as a mental defective, but it is insufficient by itself to support the restriction as to individuals who have been involuntarily committed at some time in the past.

The court then concluded that strict scrutiny (not intermediate scrutiny) was generally the proper test to apply to gun restrictions, outside those categories excluded from Second Amendment scrutiny by Heller. The court, however, predict[ed] that the application of strict scrutiny over intermediate scrutiny will not generally affect how circuits decide various challenges to federal firearm regulations; this might seem surprising, but the courts explanation of this prediction on pp. 26-27 strikes me as quite plausible. And the court then applied strict scrutiny here are some excerpts from the analysis, which focuses largely on the fact that Congress (1) chose to create a system for people with past mental commitments to regain their Second Amendment rights, but (2) then defunded the federal system and decided to rely on state choices whether to set up their own state systems:

At issue here is only 922(g)(4)s prohibition on possession by persons previously committed to a mental institution. Not all previously institutionalized persons are mentally ill at a later time, so the law is, at least somewhat, overbroad. But is it impermissibly so? Congress, in its efforts to keep firearms away from the mentally ill, may cast a wider net than is necessary to perfectly remove the harm. A prophylactic approach thus obviate[s] the necessity for large numbers of individualized determinations. But is 922(g)(4)s net too wide? Are previously institutionalized persons sufficiently dangerous, as a class, that it is permissible to deprive permanently all such persons of the Second Amendment right to bear arms?

View post:

Volokh Conspiracy: Second Amendment and people who had been committed to a mental institution 28 years ago

First Amendment Center news, commentary, analysis on …

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

The Newseum Institutes First Amendment Center in Nashville, Tenn., serves as a forum for the study and exploration of free-expression issues through education, information and entertainment.

Founded by John Seigenthaler on Dec. 15, 1991, the 200th anniversary of the ratification of the Bill of Rights to the U.S. Constitution, the Newseum Institutes First Amendment Center has offices in the John Seigenthaler Center at Vanderbilt University in Nashville, Tenn., and at the Newseum in Washington, D.C.

The Center provides education and information to the public and groups, including First Amendment scholars and experts, educators, government policy makers, legal experts and students. The Center is nonpartisan and does not lobby, litigate or provide legal advice. It has become one of the most authoritative sources of news, information and commentary in the nation on First Amendment-related developments, as well as detailed reports about U.S. Supreme Court cases involving the First Amendment, and commentary, analysis and special reports on free expression, press freedom and religious-liberty issues.

Find First Amendment research articles by topic or keyword.

More

Download or order publications on First Amendment issues.

More

Original post:

First Amendment Center news, commentary, analysis on ...

Tor Browser Download – Softpedia

6 Screenshots

The application's main attempt is to put a web browser at your disposal with the help of which you can both enjoy a friendly interface and keep your system safe. All available features come in the form of a custom-made version of Mozilla Firefox, which is not necessarily bad because it lets you quickly accommodate.

One of the key features in keeping your data safe the integrated HTTPS Everywhere addon, which basically encrypts communication between your computer and various web pages you access. This can easily be configured to allow or restrict access to specific content.

Before being able to fully enjoy a safe browsing experience, the application requires you to select connection type. You can opt for a standard connection, which works in most cases, or configure settings in if you computer uses a proxy or goes through a firewall in order to reach the information superhighway.

Most available options are similar to the one you find in Firefox, with a few additions. The Torbutton puts several settings at your disposal, such as the possibility to fully configure connection settings, handle cookie protection, or even choose a new identity for enhanced security.

Taking everything into consideration, we can say that Tor Browser Bundle comes equipped with all necessary tools you need in order to stay safe while online. It can be used by beginners and experts alike, due to the various advanced settings that are not mandatory in order for the application to properly offer its services.

Read the original post:

Tor Browser Download - Softpedia

Tor Browser – Download Tor Browser 4.0 in english on …

Tor Browser Bundle is a free and simple software that enables users to protect their online identity and maintain it anonymously from online attacks and traffic. Tor software prevents other users watching your Internet connection from learning what sites you visit. Besides, it doesnt let the sites you visit learn your physical location. One of the distinctive advantages of Tor Browser Bundle is that it allows you to access earlier blocked sites. Tor Browser Bundle can be installed on Windows, Mac OS X, or Linux without any additional software. As a matter of fact, it can run off a USB flash drive and is very self-sufficient.

Features and Capabilities:

Tor Browser Bundle works with a number of application including web browsers, instant messaging systems, remote access clients and other apps that use TCP protocol. Thousands of people from all the corners of the world use Tor Browser Bundle for various reasons: journalists and bloggers, law enforcement officials, military people, corporations, citizens of the countries with a repressive regime and just regular people.

Why is Tor Browser Bundle so popular on the web? Its been produced to make your life simpler. Now you dont need to worry about your digital track that you leave every time whilst surfing the Internet.

Take over control over the data you produce and download Tor Browser Bundle absolutely free of charge!

http://tor-browser.joydownload.com/ - Tor Browser is a product developed by The Tor Project. This site is not directly affiliated with The Tor Project. All trademarks, registered trademarks, product names and company names or logos mentioned herein are the property of their respective owners. Our download manager distributes the original unmodified software, obtained directly from The Tor Project website, and does not modify it in any way.

More here:

Tor Browser - Download Tor Browser 4.0 in english on ...

tor browser | The Tor Blog

In May, the Open Technology Fund commissioned iSEC Partners to study current and future hardening options for the Tor Browser. The Open Technology Fund is the primary funder of Tor Browser development, and it commissions security analysis and review for all of the projects that it funds as a standard practice. We worked with iSEC to define the scope of the engagement to focus on the following six main areas:

The complete report is available in the iSEC publications github repo. All tickets related to the report can be found using the tbb-isec-report keyword. General Tor Browser security tickets can be found using the tbb-security keyword.

The report had the following high-level findings and recommendations.

Due to our use of cross-compilation and non-standard toolchains in our reproducible build system, several hardening features have ended up disabled. We have known about the Windows issues prior to this report, and should have a fix for them soon. However, the MacOS issues are news to us, and appear to require that we build 64 bit versions of the Tor Browser for full support. The parent ticket for all basic hardening issues in Tor Browser is bug #10065.

iSEC recommended that we find a sponsor to fund a Pwn2Own reward for bugs specific to Tor Browser in a semi-hardened configuration. We are very interested in this idea and would love to talk with anyone willing to sponsor us in this competition, but we're not yet certain that our hardening options will have stabilized with enough lead time for the 2015 contest next March.

The Microsoft Enhanced Mitigation Experience Toolkit is an optional toolkit that Windows users can run to further harden Tor Browser against exploitation. We've created bug #12820 for this analysis.

PartitionAlloc is a memory allocator designed by Google specifically to mitigate common heap-based vulnerabilities by hardening free lists, creating partitioned allocation regions, and using guard pages to protect metadata and partitions. Its basic hardening features can be picked up by using it as a simple malloc replacement library (as ctmalloc). Bug #10281 tracks this work.

The iSEC vulnerability review found that the overwhelming majority of vulnerabilities to date in Firefox were use-after-free, followed closely by general heap corruption. In order to mitigate these vulnerabilities, we would need to make use of the heap partitioning features of PartitionAlloc to actually ensure that allocations are partitioned (for example, by using the existing tags from Firefox's about:memory). We will also investigate enabling assertions in limited areas of the codebase, such as the refcounting system, the JIT and the Javascript engine.

A large portion of the report was also focused on analyzing historical Firefox vulnerability data and other sources of large vulnerability surface for a planned "Security Slider" UI in Tor Browser.

The Security Slider was first suggested by Roger Dingledine as a way to make it easy for users to trade off between functionality and security, gradually disabling features ranked by both vulnerability count and web prevalence/usability impact.

Original post:

tor browser | The Tor Blog

Clustering bitcoin accounts using heuristics

Editors note: well explore present and future applications of cryptocurrency and blockchain technologies at our upcoming Radar Summit: Bitcoin & the Blockchain on Jan. 27, 2015, in San Francisco.

A few data scientists are starting to play around with cryptocurrency data, and as bitcoin and related technologies start gaining traction, I expect more to wade in. As the space matures, there will be many interesting applications based on analytics over the transaction data produced by these technologies. The blockchain the distributed ledger that contains all bitcoin transactions is publicly available, and the underlying data set is of modest size. Data scientists can work with this data once its loaded into familiar data structures, but producing insights requires some domain knowledge and expertise.

I recently spoke with Sarah Meiklejohn, a lecturer at UCL, and an expert on computer security and cryptocurrencies. She was part of an academic research team that studied pseudo-anonymity (pseudonymity) in bitcoin. In particular, they used transaction data to compare potential anonymity to the actual anonymity achieved by users. A bitcoin user can use many different public keys, but careful research led to a few heuristics that allowed them to cluster addresses belonging to the same user:

In theory, a user can go by many different pseudonyms. If that user is careful and keeps the activity of those different pseudonyms separate, completely distinct from one another, then they can really maintain a level of, maybe not anonymity, but again, cryptographically its called pseudo-anonymity. So, if they are a legitimate businessman on the one hand, they can use a certain set of pseudonyms for that activity, and then if they are dealing drugs on Silk Road, they might use a completely different set of pseudonyms for that, and you wouldnt be able to tell that thats the same user.

It turns out in reality, though, the way most users and services are using bitcoin, was really not following any of the guidelines that you would need to follow in order to achieve this notion of pseudo-anonymity. So, basically, what we were able to do is develop certain heuristics for clustering together different public keys, or different pseudonyms. Im happy to get into the technical details, but Im not sure how relevant they are. The point is that, if you think these are good heuristics, then basically they provided evidence that a certain set of pseudonyms were called into the same owner. In that owner could be a single individual or it could be an entire service, like bit scams or another exchange.

In the course of their research, Sarah and her collaborators realized that addresses used to collect excess bitcoins (change addresses) provided a good clustering mechanism:

If you think about making change with physical cash, if I walk into a physical store and I hand the clerk a $20 bill, and my thing only costs $5, then Im going to get $15 back in change, right? And in bitcoin, that process of making change is actually completely transparent, so you can observe the change public key in the blockchain.

What we tried to do is distinguish change addresses, as we called them, from the legitimate recipient in the transaction. So, in my example in the store, youd see two public keys as the out in that transaction, one of them would receive $5, and the other would receive $15. What we tried to do is develop a heuristic for distinguishing that $15 part of the transaction from the legitimate $5 recipient. That turned out to be much trickier, but that really was the bulk of the work in the project, just trying to make that heuristic as safe as possible.

Once they settled on heuristics with which to cluster addresses, the research project still required a data set for testing their theories. This entailed conducting and following transactions through the bitcoin ledger:

Image courtesy of Sarah Meiklejohn.

Go here to read the rest:

Clustering bitcoin accounts using heuristics

Time Magazine Bitcoin — Worst Investment of 2014 — Gavin Andresen in SF Tonight! – Video


Time Magazine Bitcoin -- Worst Investment of 2014 -- Gavin Andresen in SF Tonight!
sponsored by http://www.Kinetics.cc Donate: https://blockchain.info/address/1LAYuQq6f11HccBgbe6bx8DiwKwzuYkPR3 Subscribe: http://patreon.com/madbitcoins Sponsor: http://MadBitcoins.com ...

By: MadBitcoins

See the article here:

Time Magazine Bitcoin -- Worst Investment of 2014 -- Gavin Andresen in SF Tonight! - Video

Bitcoin Talk Show #37 (Live) – Call 1-708-23-COINS (26467) or Skype BitcoinTalkShow – Video


Bitcoin Talk Show #37 (Live) - Call 1-708-23-COINS (26467) or Skype BitcoinTalkShow
Some stories discussed on this show: Change Tip Must Die http://hackingdistributed.com/2014/12/17/changetip-must-die/ Pirate Bay Shut Down, Has No Effect on Piracy https://www.yahoo.com/m...

By: MadBitcoins

Read the original here:

Bitcoin Talk Show #37 (Live) - Call 1-708-23-COINS (26467) or Skype BitcoinTalkShow - Video