Monthly Archives: September 2014

The case against the NSA metadata collection began yesterday – Video

Posted: September 9, 2014 at 8:01 pm


The case against the NSA metadata collection began yesterday

By: mikeroweRules12

Go here to see the original:
The case against the NSA metadata collection began yesterday - Video

Posted in NSA | Comments Off on The case against the NSA metadata collection began yesterday – Video

PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO – Video

Posted: at 8:01 pm


PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO
HERE COMES THE RUDEBOY EP 2014 the ongoing NSA AFFAIR and war on public privacy debate is the frame of this video // 1984-2014= 30 years of surveillance//---the video is a piece of art and...

By: jrPepsiBrown

See the original post:
PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO - Video

Posted in NSA | Comments Off on PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO – Video

Tech industry groups ask US Senate to 'swiftly pass' NSA curbs

Posted: at 8:01 pm

Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.

Disclosures about the U.S. governments surveillance programs since June 2013 have led to an erosion of public trust in the U.S. government and the U.S. technology sector, anti-software piracy group BSA, Computer and Communications Industry Association, Information Technology Industry Council, Reform Government Surveillance and the Software and Information Industry Association wrote to Senate Majority Leader Harry Reid and Republican Leader in the Senate Mitch McConnell on Monday.

Reforms contained in the USA Freedom Act will send a clear signal to the international community and to the American people that government surveillance programs are narrowly tailored, transparent, and subject to oversight, the industry groups added.

In June last year, former NSA contractor Edward Snowden revealed that the NSA was collecting phone metadata of Americans from Verizon, the first of a series of revelations about U.S. surveillance in the country and abroad.

The U.S. House of Representatives passed in May an amended version of the USA Freedom Act that would limit the collection of phone data to certain specific selection terms. But an expanded definition of the specific selection terms that can be used by the NSA to collect data from phone companies was criticized by civil rights groups and the industry, as it would continue to allow the NSA to target a large number of phone records.

The bill introduced in the Senate in July by Senator Patrick Leahy, a Democrat from Vermont, and others aims to tighten the collection of data by the NSA by closing loopholes. In a letter to Leahy last week, U.S. Attorney General Eric Holder and Director of National Intelligence James Clapper expressed support for the bill.

The transparency measures and reform of surveillance proposed in the Freedom Act are expected to send positive signals abroad where U.S. tech companies fear losing business, the tech industry groups said, echoing a concern already expressed by a number of tech companies.

Cisco Systems CEO John Chambers, for example, wrote to U.S. President Barack Obama in May, asking for his intervention so that U.S. technology sales were not affected by a loss in trust.

As a result of the surveillance program revelations, U.S. technology companies have experienced negative economic implications in overseas markets, the tech groups wrote. In addition, other countries are considering proposals that would limit data flows between countries, which would have a negative impact on the efficiencies upon which the borderless Internet relies.

Congress returned from recess on Monday though there may be only a few days of legislative business ahead of campaigning for midterm elections.

See more here:
Tech industry groups ask US Senate to 'swiftly pass' NSA curbs

Posted in NSA | Comments Off on Tech industry groups ask US Senate to 'swiftly pass' NSA curbs

"Fifth Amendment" Defined & Explained – Law

Posted: at 8:01 pm

PREMIUM LEGAL RESOURCES LEGAL FORMS ASK A LAWYER

'No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb, nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use without just compensation.'

The Fifth Amendment 'can be asserted in any proceeding, civil or criminal, administrative or judicial, investigatory or adjudicatory; and it protects against any disclosures which the witness reasonably believes could be used in a criminal prosecution or could lead to other evidence that might be so used.' Kastigar v. U.S., 406 U.S. 441, 44-45 ('72). A reasonable belief that information concerning income or assets might be used to establish criminal failure to file a tax return can support a claim of Fifth Amendment privilege. See U.S. v. Rendahl, 746 F.2d 553, 55-56 (9th Cir.'84).

The only way the Fifth Amendment can be asserted as to testimony is on a question-by-question basis. Rendahl, 746 F.2d at 555, citing with approval U.S. v. Bell, 448 F.2d 40, 42 (9th Cir.'71) (Fifth Amendment challenge premature on appeal from enforcement order; appellant must present himself for questioning after enforcement and as to each question elect to raise or not to raise the defense).

The appropriate device for compelling answers to incriminating questions is a government grant of use immunity. See Sharp, 920 F.2d at 1172.

Google+

More:
"Fifth Amendment" Defined & Explained - Law

Posted in Fifth Amendment | Comments Off on "Fifth Amendment" Defined & Explained – Law

Texas man's conviction overturned because of Fifth Amendment violation

Posted: at 8:01 pm

September 9, 2014 4:45 PM Share with others:

By Torsten Ove / Pittsburgh Post-Gazette

A federal appeals court today overturned the conviction of a Texas man on drug charges, saying the government violated his Fifth Amendment right against self-incrimination during his trial here.

Gathon Shannon, 48, of Houston, described by the U.S. Drug Enforcement Administration as a courier in a Texas-to-Beaver County cocaine ring, was convicted by a federal jury and sentenced in 2013 to 20 years.

But a three-judge panel of the U.S. 3rd Circuit Court of Appeals today ruled that the prosecution violated his rights in cross-examining him about his silence following his arrest in 2011.

The circuit judges vacated the sentence imposed by U.S. District Judge Alan Bloch and ordered that Mr. Shannon receive a new trial.

Mr. Shannon was among a group of accused conspirators targeted by the U.S. attorney's Organized Crime and Drug Enforcement Task Force, which said the ring supplied much of Beaver County's cocaine demand from 2009 to 2011.

Read this article:
Texas man's conviction overturned because of Fifth Amendment violation

Posted in Fifth Amendment | Comments Off on Texas man's conviction overturned because of Fifth Amendment violation

GWB probe: Christie says he's not satisfied with unanswered questions

Posted: at 8:01 pm

September 9, 2014, 2:42 PM Last updated: Tuesday, September 9, 2014, 3:45 PM

AP

Gov. Chris Christie

Governor Christie said Tuesday he is not pleased that several questions remain unanswered a year after local access lanes to the George Washington Bridge were closed tying up traffic in Fort lee for more than four days.

Chief among those questions is who ordered cones to be placed across the access lanes and why.

Christie was asked by a reporter during a news conference in Camden if he was satisfied by the answers obtained so far by the various investigations into the matter including one he called for by a team of lawyers that has so far cost taxpayers $7.2 million.

Related: GWB probe: New email exchange raises more questions

Some people havent answered questions, so I guess the answer would be no, Christie told a roomful of reporters.

The internal investigation Christie ordered of his office resulted in a report that found the governor did not know about the lane closures and placed the blame on Bridget Anne Kelly, the deputy chief of staff Christie fired after The Record reported in January that she sent the email, Time for some traffic problems in Fort Lee. The report also blamed David Wildstein, the former Christie appointee at the Port Authority, who Kelly sent the e-mail to. It raised questions about Bill Stepien, Christies two-time campaign manager though it didnt offer any conclusive evidence to tie him to the closures.

Wildstein provided documents to a legislative panel investigating the incident but cited the Fifth Amendment when he appeared before lawmakers, refusing to answer questions including whether he worked at the Port Authority. Both Kelly and Stepien successfully fought legislative subpoenas seeking documents in court by arguing their constitutional right to protect themselves against self incrimination.

More:
GWB probe: Christie says he's not satisfied with unanswered questions

Posted in Fifth Amendment | Comments Off on GWB probe: Christie says he's not satisfied with unanswered questions

Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?

Posted: at 8:01 pm

The U.S. Department of Justice is current prosecuting Ross Ulbricht for being the apparent mastermind of the illegal narcotics website Silk Road, which was run for years on a hidden website. In defending the prosecution, the U.S. Attorneys Office recently filed a very interesting brief explaining how investigators found the computer server that was hosting the Silk Road (SR) server. Although the brief is about the Fourth Amendment, it has very interesting implications for the Computer Fraud and Abuse Act, the federal computer hacking statute.

The brief explains how the FBI found the SR server:

The Internet protocol (IP) address of the SR Server (the Subject IP Address) was leaking from the site due to an apparent misconfiguration of the user login interface by the site administrator i.e., Ulbricht. FBI agents noticed the leak upon reviewing the data sent back by the Silk Road website when they logged on or attempted to log on as users of the site. A close examination of the headers in this data revealed a certain IP address not associated with the Tor network (the Subject IP Address as the source of some of the data). FBI personnel entered the Subject IP Address directly into an ordinary (non-Tor) web browser, and it brought up a screen associated with the Silk Road login interface, confirming that the IP address belonged to the SR Server.

The FBIs declaration explains that the investigating agent entered miscellaneous information into the login prompt of the Silk Road server and received an error message. A forensic analysis of the error message found that it contained an IP address not associated with Tor. That IP address was the address of the Silk Road server.

The DOJ brief argues that there was nothing unconstitutional or otherwise unlawful about obtaining the inadvertently leaked IP address from the Silk Road server:

There was nothing unconstitutional or otherwise unlawful in the FBIs detection of that leak. The Silk Road website, including its user login interface, was fully accessible to the public, and the FBI was entitled to access it as well. See United States v. Meregildo, 883 F. Supp. 2d 523, 525 (S.D.N.Y. 2012) (noting that web content accessible to the public is not protected by the Fourth Amendment and can be viewed by law enforcement agents without a warrant). The FBI was equally entitled to review the headers of the communications the Silk Road website sent back when the FBI interacted with the user login interface, which is how the Subject IP Address was found.

It does not matter that Ulbricht intended to conceal the IP address of the SR Server from public view. He failed to do so competently, and as a result the IP address was transmitted to another party which turned out to be the FBI who could lawfully take notice of it. See United States v. Borowy, 595 F.3d 1045, 1048 (9th Cir. 2010) (finding that defendant had no legitimate privacy interest in child pornography files posted on peer-sharing website, notwithstanding that defendant had made ineffectual effort to use site feature that would have prevented his files from being shared); United States v. Post , __ F. Supp. 2d __, 2014 WL 345992, at *2-*3 (S.D. Tex. Jan. 30, 2014) (finding that defendant had no legitimate privacy interest in metadata used to identify him that was embedded in file he had posted on Tor website, notwithstanding that he did not realize he was releasing that information and he intended to remain anonymous).

In short, the FBIs location of the SR Server was lawful, and nothing about the way it was accomplished taints any evidence subsequently recovered in the Governments investigation.

I wonder: Does DOJs position that there is nothing . . . unlawful about this procedure mean that DOJ concedes that it would not violate the Computer Fraud and Abuse Act, 18 U.S.C. 1030, the federal computer hacking statute?

The FBIs location of the SR server brings to mind the prosecution of my former client Andrew Auernheimer, aka weev, who readers may recall was criminally prosecuted for his role in visiting website addresses on an AT&T server that AT&T had thought and hoped would not be found by the public. Auernheimers co-conspirator found that AT&T had posted e-mail addresses on its server at IP addresses that the public was not expected to find.

Here is the original post:
Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?

Posted in Fourth Amendment | Comments Off on Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?

Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained

Posted: at 8:01 pm

NEW YORK, N.Y. - Lawyers for a San Francisco man charged with operating an online marketplace for illegal drugs are asking a judge to toss out most of the evidence against him, saying the Fourth Amendment protects their client from "indiscriminate rummaging" through his entire online history.

The lawyers, Joshua Dratel and Lindsay Lewis, said in court papers that the government violated the ban on illegal search and seizure when it scoured the computers, servers and websites 30-year-old Ross Ulbricht used.

They said applications for search warrants described an investigation that began in early 2013 with a server hosting the Silk Road website in a foreign country.

"The wholesale collection and study of Mr. Ulbricht's entire digital history without limitation expressly sought in the warrants and granted represent the very type of indiscriminate rummaging that caused the American colonists so much consternation," according to the papers filed late Friday in federal court in Manhattan.

Ulbricht has pleaded not guilty to charges of narcotics trafficking, computer hacking, running a continuing criminal enterprise and money laundering. His trial is scheduled to begin Nov. 3.

Prosecutors say Ulbricht went by the online handle the Dread Pirate Roberts, an apparent reference to a character in the movie "The Princess Bride," and turned the underground site into a place where anonymous users could buy or sell contraband and illegal services.

Authorities say Silk Road, which had nearly 1 million registered users by July 2013, generated more than $1 billion in illicit business from January 2011 through September. Federal investigators say Silk Road users anonymously browsed through nearly 13,000 listings under such categories as cannabis, psychedelics and stimulants.

The website used Bitcoin, the tough-to-track digital currency, before it was shut down.

Ulbricht was arrested last year at a public library in San Francisco, where he lived. Authorities said he was chatting online at the time with a co-operating witness. He remains incarcerated without bail.

A prosecutor's spokeswoman declined to comment Monday.

See the original post:
Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained

Posted in Fourth Amendment | Comments Off on Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained

Ep 1 : DayZ – The Second Amendment – Video

Posted: at 8:00 pm


Ep 1 : DayZ - The Second Amendment
Today I will be discussing the right to bear arms in Dayz.

By: GeorgeAgainstTheMachine

More:
Ep 1 : DayZ - The Second Amendment - Video

Posted in Second Amendment | Comments Off on Ep 1 : DayZ – The Second Amendment – Video

Nolan is for Second Amendment rights

Posted: at 8:00 pm

Posted: Tuesday, September 9, 2014 6:00 am

Nolan is for Second Amendment rights

Stewart Mills III is trying to scare gun owners. Weve seen this trick before. Dont buy into it.

Ive been seeing some really angry mail pieces recently, accusing Rep. Nolan of not standing up for our Second Amendment rights.

An online service is needed to view this article in its entirety. You need an online service to view this article in its entirety.

To become a new online only subscriber, and have your payment automatically charged every four weeks, please choose this option. By doing so, you will first proceed to a registration form. Upon completion of the registration form you will then continue by completing the subscription form. For assistance please call (218) 262-1011. Thank you.

Please note - If you have already registered during a previous visit to this web site go to directly to the login button at the top right and then proceed to the subscription form.

To become a new online only subscriber, and have your payment automatically charged every four weeks, please choose this option. By doing so, you will first proceed to a registration form. Upon completion of the registration form you will then continue by completing the subscription form. For assistance please call (218) 262-1011. Thank you.

Please note - If you have already registered during a previous visit to this web site go to directly to the login button at the top right and then proceed to the subscription form.

To become a new print and online subscriber, please choose this option. By doing so, you will first proceed to a registration form. Upon completion of the registration form you will then continue by completing the subscription form. For assistance please call (218) 262-1011. Thank you.

Excerpt from:
Nolan is for Second Amendment rights

Posted in Second Amendment | Comments Off on Nolan is for Second Amendment rights