The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: September 2015
NSA warrantless surveillance (200107) – Wikipedia, the …
Posted: September 19, 2015 at 2:44 am
The NSA warrantless surveillance controversy ("warrantless wiretapping") concerns surveillance of persons within the United States during the collection of allegedly foreign intelligence by the U.S. National Security Agency (NSA) as part of the touted war on terror. Under this program, referred to by the Bush administration as the terrorist surveillance program,[1] part of the broader President's Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. However, it has been discovered that all U.S. communications have been digitally cloned by government agencies, in apparent violation of unreasonable search and seizure. The excuse given to avoid litigation[citation needed] was that no data hoarded would be reviewed until searching it would be legal. But no excuse has been offered the initial seizure of the data which is also illegal,[citation needed] according to the U.S. Constitution.[citation needed]
Critics, however, claimed that the program was in an effort to attempt to silence critics of the Bush Administration and its handling of several controversial issues during its tenure. Under public pressure, the Bush administration allegedly ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court.[2] Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.
During the Obama Administration, the NSA has allegedly continued operating under the new FISA guidelines despite campaign promises to end warrantless wiretapping.[3] However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISA court's authority, but claimed that the acts were unintentional and had since been rectified.[4]
All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al-Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an "apparently accidental" "glitch" resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.
The exact scope of the program remains secret, but the NSA was provided total, unsupervised access to all fiber-optic communications going between some of the nation's largest telecommunication companies' major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such "domestic" intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts were not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]
After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13]The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14]Bill Keller, the newspaper's former executive editor, had withheld the story from publication since before the 2004 Presidential Election, and the story that was ultimately published was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004. The delay drew criticism from some in the press, arguing that an earlier publication could have changed the election's outcome.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times.[16] The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.[17]
Gonzales said the program authorized warrantless intercepts where the government had "a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda" and that one party to the conversation was "outside of the United States."[18] The revelation raised immediate concern among elected officials, civil right activists, legal scholars and the public at large about the legality and constitutionality of the program and the potential for abuse. Since then, the controversy has expanded to include the press' role in exposing a classified program, the role and responsibility of the US Congress in its executive oversight function and the scope and extent of presidential powers under Article II of the Constitution.[19]
In mid-August 2007, a three-judge panel of the United States Court of Appeals for the Ninth Circuit heard arguments in two lawsuits challenging the surveillance program. The appeals were the first to reach the court after dozens of civil suits against the government and telecommunications companies over NSA surveillance were consolidated last year before the chief judge of the Northern District of California, Vaughn R. Walker. One of the cases is a class-action lawsuit against AT&T, focusing on allegations that the company provided the NSA with its customers' phone and Internet communications for a vast data-mining operation. Plaintiffs in the second case are the al-Haramain Foundation Islamic charity and two of its lawyers.[20][21]
On November 16, 2007, the three judgesM. Margaret McKeown, Michael Daly Hawkins, and Harry Pregersonissued a 27-page ruling that the charity, the Al-Haramain Islamic Foundation, could not introduce a key piece of evidence in its case because it fell under the government's claim of state secrets, although the judges said that "In light of extensive government disclosures, the government is hard-pressed to sustain its claim that the very subject matter of the litigation is a state secret."[22][23]
In an August 14, 2007, question-and-answer session with the El Paso Times which was published on August 22, Director of National Intelligence Mike McConnell confirmed for the first time that the private sector helped the warrantless surveillance program. McConnell argued that the companies deserved immunity for their help: "Now if you play out the suits at the value they're claimed, it would bankrupt these companies".[24] Plaintiffs in the AT&T suit subsequently filed a motion with the court to have McConnell's acknowledgement admitted as evidence in their case.[25]
The program may face an additional legal challenge in the appeal of two Albany, New York, men convicted of criminal charges in an FBI anti-terror sting operation. Their lawyers say they have evidence the men were the subjects of NSA electronic surveillance, which was used to obtain their convictions but not made public at trial or made available in response to discovery requests by defense counsel at that time.[26]
In an unusual related legal development, on October 13, 2007, The Washington Post reported that Joseph P. Nacchio, the former CEO of Qwest Communications, is appealing an April 2007 conviction on 19 counts of insider trading by alleging that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified National Security Agency program that the company thought might be illegal. According to court documents unsealed in Denver in early October as part of Nacchio's appeal, the NSA approached Qwest about participating in a warrantless surveillance program more than six months before the Sep 11, 2001, attacks which have been cited by the government as the main impetus for its efforts. Nacchio is using the allegation to try to show why his stock sale should not have been considered improper.[27] According to a lawsuit filed against other telecommunications companies for violating customer privacy, AT&T began preparing facilities for the NSA to monitor "phone call information and Internet traffic" seven months before 9/11.[28]
On August 17, 2007, the Foreign Intelligence Surveillance Court said it would consider a request filed by the American Civil Liberties Union which asked the intelligence court to make public its recent, classified rulings on the scope of the government's wiretapping powers. Judge Colleen Kollar-Kotelly, presiding judge of the FISC, signed an order calling the ACLU's motion "an unprecedented request that warrants further briefing."[29] The FISC ordered the government to respond on the issue by August 31, saying that anything involving classified material could be filed under court seal.[30][31] On the August 31 deadline, the National Security Division of the Justice Department filed a response in opposition to the ACLU's motion with the court.[32]
In previous developments, the case ACLU v. NSA was dismissed on July 6, 2007 by the United States Court of Appeals for the Sixth Circuit.[33] The court did not rule on the spying program's legality. Instead, its 65-page opinion declared that the American Civil Liberties Union and the others who brought the case including academics, lawyers and journalists did not have the legal standing to sue because they could not demonstrate that they had been direct targets of the clandestine surveillance.[34] Detroit District Court judge Anna Diggs Taylor had originally ruled on August 17, 2006 that the program is illegal under FISA as well as unconstitutional under the First and Fourth amendments of the United States Constitution.[35][36][37]Judicial Watch, a watchdog group, discovered that at the time of the ruling Taylor "serves as a secretary and trustee for a foundation that donated funds to the ACLU of Michigan, a plaintiff in the case."[38] On February 19, 2008, the U.S. Supreme Court, without comment, turned down an appeal from the American Civil Liberties Union, letting stand the earlier decision dismissing the case.[39]
On September 28, 2006 the U.S. House of Representatives passed the Electronic Surveillance Modernization Act (H.R. 5825).[40] That bill now has been passed to the U.S. Senate, where three competing, mutually exclusive, billsthe Terrorist Surveillance Act of 2006 (S.2455) (the DeWine bill), the National Security Surveillance Act of 2006 (S.2455) (the Specter bill), and the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) (the Specter-Feinstein bill) were themselves referred for debate to the full Senate by the Senate Judiciary Committee on September 13, 2006.[41] Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISA court oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).
On January 17, 2007, Attorney General Alberto Gonzales informed U.S. Senate leaders by letter that the program would not be reauthorized by the President.[2] "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.[42]
On September 18, 2008, the Electronic Frontier Foundation (EFF), an Internet-privacy advocacy group, filed a new lawsuit against the NSA, President George W. Bush, Vice President Dick Cheney, Cheney's chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales and other government agencies and individuals who ordered or participated in the warrantless surveillance. They sued on behalf of AT&T customers to seek redress for what the EFF alleges to be an illegal, unconstitutional, and ongoing dragnet surveillance of their communications and communications records. An earlier, ongoing suit by the EFF may be bogged down by the recent changes to FISA provisions, but these are not expected to impact this new case.[43][44]
On January 23, 2009, the administration of President Barack Obama adopted the same position as his predecessor when it urged U.S. District Judge Vaughn Walker to set aside a ruling in Al-Haramain Islamic Foundation et al. v. Obama, et al.[45] The Obama administration also sided with the former administration in its legal defense of July 2008 legislation that immunized the nation's telecommunications companies from lawsuits accusing them of complicity in the eavesdropping program, according to testimony by Attorney General Eric Holder.[46]
On March 31, 2010, Judge Vaughn R. Walker, chief judge of the Federal District Court in San Francisco, ruled that the National Security Agency's program of surveillance without warrants was illegal when it intercepted phone calls of Al Haramain. Declaring that the plaintiffs had been "subjected to unlawful surveillance", the judge said the government was liable to pay them damages.[47]
In 2012, the Ninth Circuit vacated the judgment against the United States and affirmed the district court's dismissal of the claim against Mueller.[48]
The Trailblazer Project, an NSA IT project that began in 2000, has also been linked to warrantless surveillance. It was chosen over ThinThread, which had included some privacy protections. Three ex-NSA staffers, William Binney, J. Kirke Wiebe, and Ed Loomis, all of whom had quit NSA over concerns about the legality of the agency's activities, teamed with Diane Roark, a staffer on the House Intelligence Committee, to ask the Inspector General to investigate. A major source for the IG report was Thomas Andrews Drake, an ex-Air Force senior NSA official with an expertise in computers. Siobhan Gorman of The Baltimore Sun published a series of articles about Trailblazer in 20062007.
The FBI agents investigating the 2005 The New York Times story eventually made their way to The Baltimore Sun story, and then to Binney, Wiebe, Loomis, Roark, and Drake. In 2007 armed FBI agents raided the houses of Roark, Binney, and Wiebe. Binney claimed they pointed guns at his head. Wiebe said it reminded him of the Soviet Union. None were charged with crimes except for Drake. In 2010 he was indicted under the Espionage Act of 1917, as part of Obama's unprecedented crackdown on leakers.[49][50] The charges against him were dropped in 2011 and he pled to a single misdemeanor.
The 1978 Foreign Intelligence Surveillance Act (FISA) regulates U.S. government agencies' carrying out of physical searches, and electronic surveillance, wherein a significant purpose is the gathering of foreign intelligence information. "Foreign intelligence information" is defined in 50 U.S.C.1801 as information necessary to protect the U.S. or its allies against actual or potential attack from a foreign power, sabotage or international terrorism. FISA defines a "foreign power" as a foreign government or any faction(s) of a foreign government not substantially composed of US persons, or any entity directed or controlled by a foreign government. FISA provides for both criminal and civil liability for intentional electronic surveillance under color of law except as authorized by statute.
FISA provides two documents for the authorization of surveillance. First, FISA allows the Justice Department to obtain warrants from the Foreign Intelligence Surveillance Court (FISC) before or up to 72 hours after the beginning of the surveillance. FISA authorizes a FISC judge to issue a warrant for the electronic cameras if "there is probable cause to believe that the target of the electronic surveillance is a foreign power or an agent of a foreign power." 50 U.S.C. 1805(a)(3). Second, FISA permits the President or his delegate to authorize warrantless surveillance for the collection of foreign intelligence if "there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party". 50 U.S.C. 1802(a)(1).[51]
Soon after the September 11, 2001 attacks U.S. President George W. Bush issued an executive order that authorized the National Security Agency (NSA) to conduct surveillance of certain telephone calls without obtaining a warrant from the FISC as stipulated by FISA (see 50 U.S.C.1802 50 U.S.C.1809 ). The complete details of the executive order are not known, but according to statements by the administration,[52] the authorization covers telephone calls originating overseas from or to a person suspected of having links to terrorist organizations such as al-Qaeda or its affiliates even when the other party to the call is within the US. The legality of surveillance involving US persons and extent of this authorization is at the core of this controversy which has steadily grown to include:
About a week after the 9/11 attacks, Congress passed the Authorization for Use of Military Force Against Terrorists (AUMF) which authorized the President to "use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons."
The administration has argued that the language used in the AUMF implicitly authorized the President to exercise those powers "incident to the waging of war", including the collection of enemy intelligence, FISA provisions notwithstanding.[8]
On January 20, 2006, Senator Patrick Leahy (D-VT), the ranking Democrat on the Senate Judiciary Committee along with lone co-sponsor Senator Ted Kennedy (D-MA) introduced S. Res. 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens."[55][56] This non-binding resolution died in the Senate without being brought up for debate or being voted upon.[57]
Because of its highly classified status, little is publicly known about the actual implementation of the NSA domestic electronic surveillance program. Mark Klein, a retired AT&T communications technician, submitted an affidavit including limited technical details known to him personally in support of a class-action lawsuit filed by the Electronic Frontier Foundation in federal district court in San Francisco in January 2006 on behalf of AT&T customers who alleged that they had been damaged by the telecommunications corporation's cooperation with the NSA. The lawsuit is called Hepting v. AT&T.[60][61]
A January 16, 2004 statement by Mr. Klein includes additional technical details regarding the secret 2003 construction of an NSA-operated monitoring facility in Room 641A of 611 Folsom Street in San Francisco, the site of a large SBC phone building, three floors of which are occupied by AT&T.[62][63]
According to Klein's affidavit, the NSA-equipped room uses equipment built by Narus Corporation to intercept and analyze communications traffic, as well as perform data-mining functions.[64]
In an article appearing in the January/February 2008 issue of the Institute of Electrical and Electronics Engineers journal of Security and Privacy, noted technology experts from academia and the computing industry analyzed potential security risks posed by the NSA program, based on information contained in Klein's affidavits as well as those of expert witness J. Scott Marcus, a designer of large-scale IP-based data networks, former CTO at GTE Internetworking and at Genuity, and former senior advisor for Internet Technology at the US Federal Communications Commission.[65] They concluded that the likely architecture of the system created serious security risks, including the danger that such a surveillance system could be exploited by unauthorized users, criminally misused by trusted insiders, or abused by government agents.[66]
Journalist Barton Gellman reported in the Washington Post that David Addington who was at that time legal counsel to former Vice President Dick Cheney was the author of the controlling legal and technical documents for the NSA surveillance program, typing the documents on a TEMPEST-shielded computer across from his desk in room 268 of the Eisenhower Executive Office Building and storing them in a vault in his office.[67][68][69]
The NSA surveillance controversy involves legal issues that fall into two broad disciplines: statutory interpretation and Constitutional law. Statutory interpretation is the process of interpreting and applying legislation to the facts of a given case. Constitutional law is the body of law that governs the interpretation of the United States Constitution and covers areas of law such as the relationship between the federal government and state governments, the rights of individuals, and other fundamental aspects of the application of government authority in the United States.[70]
However, there are analogies between the NSA Spying Scandal (20012007) and Hewlett-Packard spying scandal (2006)[71] that may ease to predict the court outcomes. HP, in order to find the leak source of its board strategic minutes revealed to press, employed several contractors to investigate the leak issue but without engaging any external legal firm and supervisory stakeholder. Contractors, under supervision of the HP's internal investigation team, confidentially used false pretense and social security numbers a spying technique namely Pretexting for obtaining phone records of suspicious board members and several journalists. Later on, the HP's surveillance extended beyond the board of directors leaking issue and became a conspiracy for interest of the probe initiators; through which it was claimed that the informational privacy rights of even innocent employees and directors of the board, who had nothing to do with the board leaks, were violated.
In October 2006, HP's chairwoman Patricia Dunn and HP's former chief ethics officer Kevin Hunsaker and several private investigators were charged for criminal cases under California Penal Code such as
All of these charges were dismissed.[72]
18 U.S.C.2511(2)(f) provides in relevant part that "the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in 50 U.S.C.1801(f) ... and the intercept of domestic [communications] may be conducted." The interpretation of this clause is central to the controversy because both sides agree that the NSA program operates outside of the procedural framework provided by FISA. The interpretive conflict arises because other provisions of FISA, including the criminal sanctions subpart 50 U.S.C.1809 include an "unless authorized by statute" provision, raising the issue of statutory ambiguity. The administration's position is that the AUMF is an authorizing statute which satisfies the FISA criteria.
The U.S. Supreme Court faced a similar issue in Hamdi v. Rumsfeld where the government claimed that the AUMF authorized the President to detain U.S. citizens designated as an enemy combatant despite its lack of specific language to that intent and notwithstanding the provisions of 18 U.S.C.4001(a) which requires that the United States government cannot detain an American citizen except by an act of Congress. In that case, the Court ruled:
[B]ecause we conclude that the Government's second assertion ["that 4001(a) is satisfied, because Hamdi is being detained "pursuant to an Act of Congress" [the AUMF] is correct, we do not address the first. In other words, for the reasons that follow, we conclude that the AUMF is explicit congressional authorization for the detention of individuals ... and that the AUMF satisfied 4001(a)'s requirement that a detention be "pursuant to an Act of Congress"
In Hamdan v. Rumsfeld however, the court rejected the government's argument that the AUMF implicitly authorized the President to establish military commissions in violation of the UCMJ. The opinion of the Court held:
Neither of these congressional Acts, [AUMF or ATC] however, expands the President's authority to convene military commissions. First, while we assume that the AUMF activated the President's war powers, see Hamdi v. Rumsfeld, 542 U.S. 507 (2004)) (plurality opinion), and that those powers include the authority to convene military commissions in appropriate circumstances, see id., at 518; Quirin, 317 U. S., at 2829; see also Yamashita, 327 U. S., at 11, there is nothing in the text or legislative history of the AUMF even hinting that Congress intended to expand or alter the authorization set forth in Article 21 of the UCMJ. Cf. Yerger, 8 Wall., at 105 ("Repeals by implication are not favored")
Determining when explicit congressional authorization is and is not required appears by this decision to require a court to first determine whether an implicit authorization would amount to a "repeal by implication" of the governing Act.
The exclusivity clause also raises a separation of powers issue. (See Constitutional law issues below)
The arguments against the legality of the NSA fall into two broad categories, those who argue that FISA raises no Constitutional issues and therefore the NSA program is illegal on its face
Common to both of these views is the argument that the participation of "US persons" as defined in FISA 50 U.S.C.1801 renders the objectional intercepts "domestic" in nature.[73] Those advocating the "no constitutional issue" position, argue that Congress has the authority it needs to legislate in this area under Article I and the Fourth Amendment[74] while those who see a constitutional conflict[75] acknowledge that the existing delineation between Congressional and Executive authority in this area is not clear[76] but that Congress, in including the exclusivity clause in FISA, meant to carve out a legitimate role for itself in this arena.
The administration holds that an exception to the normal warrant requirements exists when the purpose of the surveillance is to prevent attack from a foreign threat. Such an exception has been upheld at the Circuit Court level when the target was a foreign agent residing abroad,[77][78] a foreign agent residing in the US,[79][80][81][82] and a US citizen abroad.[83] The warrantless exception was struck down when both the target and the threat was deemed domestic.[84] The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed by the US Supreme Court, but has occurred at least once, in the case of Aldrich Ames.[85]
The Administration's position with regard to statutory interpretation, as outlined in the DOJ whitepaper, is to avoid what it has termed the "difficult Constitutional questions" by
This argument, as outlined in the DOJ whitepaper, is based on the language of the AUMF, specifically, the acknowledgment of the President's Constitutional authority contained in the preamble; "Whereas, the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States", and the language in the resolution itself;
[Be it resolved] [t]hat the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.
The administration also adds that the program is legal under Title II of the USA PATRIOT Act entitled Enhanced Surveillance Procedures,[citation needed] although it is not relying upon the domestic law enforcement provisions of the PATRIOT Act for authorization of any of the NSA program activities.[citation needed] The President had said prior to this, that Americans' civil liberties were being protected and that purely domestic wiretapping was being conducted pursuant to warrants under applicable law, including the Patriot Act.[87]
These arguments must be compared to the language of the FISA itself, which states:
Notwithstanding any other law, the President, through the Attorney General, may authorize electronic surveillance without a court order under this subchapter to acquire foreign intelligence information for a period not to exceed fifteen calendar days following a declaration of war by the Congress.[88]
Because the law only authorizes the President to bypass the FISA court during the first 15 days of a war declared by Congress (see "Declaration of war"), the administration's argument rests on the assumption that the AUMF gave the President more power than was understood as absolutely implicit in any Congressional "declaration of war" at the time of the statute's enactment. However, as a "declaration of war by the Congress" encompasses all military actions so declared, no matter how small, brief or otherwise constrained by Congress, the above citation could be seen as setting not a default or typical level of Presidential wartime authority, but instead a presumptive minimum, which might more often than not be extended (explicitly or implicitly) by Congress's war declaration.
According to Peter J. Wallison, former White House Counsel to President Ronald Reagan: "It is true, of course, that a president's failure to report to Congress when he is required to do so by law is a serious matter, but in reality the reporting requirement was a technicality that a President could not be expected to know about."[89] In regard to this program, a Gang of Eight (eight key members of Congress, thirteen in this case between the 107th and 109th Congressional Sessions) have been kept informed to some degree:
Under the National Security Act of 1947, 501503, codified as 50 USC 413-413b,[90] the President is required to keep Congressional intelligence committees "fully and currently" informed of U.S. intelligence activities, "consistent with ... protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters." For covert actions, from which intelligence gathering activities are specifically excluded in 413b(e)(1), the President is specifically permitted to limit reporting to the so-called "Gang of Eight".[91]
The administration contends that with regard to the NSA surveillance program, the administration fulfilled its notification obligations by briefing key members of Congress (thirteen individuals in this case between the 107th and 109th Congressional sessions) have been briefed on the NSA program more than a dozen times[citation needed] but they were forbidden from sharing information about the program with other members or staff.[citation needed]
On January 18, 2006 the Congressional Research Service released a report, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions".[92][93] That report found that "[b]ased upon publicly reported descriptions of the program, the NSA surveillance program would appear to fall more closely under the definition of an intelligence collection program, rather than qualify as a covert action program as defined by statute", and, therefore, concluded there was no specific statutory basis for limiting briefings on the terrorist surveillance program to the Gang of Eight.[94] However, the report goes on to note in its concluding paragraph that limited disclosure is also permitted under the statute "in order to protect intelligence sources and methods".[95]
Thus, although the specific statutory "Gang of Eight" notification procedure for covert action would not seem to apply to the NSA program, it is not clear if a limited notification procedure intended to protect sources and methods is expressly prohibited. Additionally, should the sources and methods exception apply it will require a factual determination as to whether it should apply to disclosure of the program itself or only to specific sensitive aspects.
The constitutional debate surrounding executive authorization of warrantless surveillance is principally about separation of powers ("checks and balances"). If, as discussed above, no "fair reading" of FISA can be found in satisfaction of the canon of avoidance, these issues will have to be decided at the appellate level, by United States courts of appeals. It should be noted that in such a separation of powers dispute, the burden of proof is placed upon the Congress to establish its supremacy in the matter: the Executive branch enjoys the presumption of authority until an Appellate Court rules against it.[citation needed]
Article I vests Congress with the sole authority "To make Rules for the Government and Regulation of the land and naval Forces" and "To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." The U.S. Supreme Court has used the "necessary and proper" clause of Article I to affirm broad Congressional authority to legislate as it sees fit in the domestic arena[citation needed] but has limited its application in the arena of foreign affairs. In the landmark Curtiss-Wright decision, Justice Sutherland writes in his opinion of the Court:
The ["powers of the federal government in respect of foreign or external affairs and those in respect of domestic or internal affairs"] are different, both in respect of their origin and their nature. The broad statement that the federal government can exercise no powers except those specifically enumerated in the Constitution, and such implied powers as are necessary and proper to carry into effect the enumerated powers, is categorically true only in respect of our internal affairs.
Article II vests the President with power as "Commander in Chief of the Army and Navy of the United States," and requires that he "shall take Care that the Laws be faithfully executed".
The U.S. Supreme Court has historically used Article II to justify wide deference to the President in the arena of foreign affairs.[citation needed] Two historical and recent Supreme Court cases define the secret wiretapping by the NSA. Quoting again from the Curtiss-Wright decision:
It is important to bear in mind that we are here dealing not alone with an authority vested in the President by an exertion of legislative power, but with such an authority plus the very delicate, plenary and exclusive power of the President as the sole organ of the federal government in the field of international relationsa power which does not require as a basis for its exercise an act of Congress, but which, of course, like every other governmental power, must be exercised in subordination to the applicable provisions of the Constitution.
The extent of the President's power as Commander-in-Chief has never been fully defined, but two U.S. Supreme Court cases are considered seminal in this area:[96][97]Youngstown Sheet and Tube Co. v. Sawyer and Curtiss-Wright.
In addition, two relatively new cases, Hamdi v. Rumsfeld and Hamdan v. Rumsfeld, have clarified, and in the case of Hamdan limited, the scope of executive power to detain and try suspected terrorists as enemy combatants.
In Hamdan, the Court's opinion in footnote 23, rejected the notion that Congress is impotent to regulate the exercise of executive war powers:
Whether or not the President has independent power, absent congressional authorization, to convene military commissions, he may not disregard limitations that Congress has, in proper exercise of its own war powers, placed on his powers. See Youngstown Sheet & Tube Co. v. Sawyer, 343 U. S. 579, 637 (1952) (Jackson, J., concurring). The Government does not argue otherwise.
Whether "proper exercise" of Congressional war powers includes authority to regulate the gathering of foreign intelligence, which in other rulings[citation needed] has been recognized as "fundamentally incident to the waging of war", is a historical point of contention between the Executive and Legislative branches.[8][98]
As noted in "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", published by The Congressional Research Service:
A review of the history of intelligence collection and its regulation by Congress suggests that the two political branches have never quite achieved a meeting of the minds regarding their respective powers. Presidents have long contended that the ability to conduct surveillance for intelligence purposes is a purely executive function, and have tended to make broad assertions of authority while resisting efforts on the part of Congress or the courts to impose restrictions. Congress has asserted itself with respect to domestic surveillance, but has largely left matters involving overseas surveillance to executive self-regulation, subject to congressional oversight and willingness to provide funds.
The same report makes clear the Congressional view that intelligence gathered within the U.S. and where "one party is a U.S. person" qualifies as domestic in nature and as such completely within their purview to regulate, and further that Congress may "tailor the President's use of an inherent constitutional power":
The passage of FISA and the inclusion of such exclusivity language reflects Congress's view of its authority to cabin the President's use of any inherent constitutional authority with respect to warrantless electronic surveillance to gather foreign intelligence.
The Senate Judiciary Committee articulated its view with respect to congressional power to tailor the President's use of an inherent constitutional power:
The Fourth Amendment to the United States Constitution is part of the Bill of Rights and helps guard against "unreasonable" searches and seizures by agents of the government. It is solely a right of the people that neither the Executive nor Legislative branch can lawfully abrogate, not even if acting in concert: no statute can make an unreasonable search reasonable, nor a reasonable search unreasonable.
The term "unreasonable" is deliberately imprecise but connotes the sense that there is a rational basis for the search and that it is not an excessive imposition upon the individual given the motivation for and circumstances of the search, and is in accordance with customary societal norms. It is conceived that a judge will be sufficiently distanced from the authorities seeking a warrant that they can render an impartial decision unaffected by any prejudices or improper motivations they (or the legislators who enacted a law they are seeking to enforce) may harbor.
An individual who believes their Fourth Amendment rights have been violated by an unreasonable search or seizure may file a civil suit for monetary compensation and seek a court-ordered end to a pattern or practice of such unlawful activities by government authorities, although the plaintiff will need to have evidence that such a wiretap is taking place in order to show standing (Amnesty International v. Clapper). Such civil rights violations are sometimes punishable by state or federal law. Evidence obtained in an unlawful search or seizure is generally inadmissible in a criminal trial.
The law countenances searches without warrant as "reasonable" in numerous circumstances, among them (see below): the persons, property, and papers of individuals crossing the border of the United States and those of paroled felons; in prisons, public schools and government offices; and of international mail. Although these are undertaken as a result of statute or Executive order, they should not be seen as deriving their legitimacy from these, rather, the Fourth Amendment explicitly allows reasonable searches, and the government has instituted some of these as public policy.
The Supreme Court held in Katz v. United States (1967), that the monitoring and recording of private conversations within the United States constitutes a "search" for Fourth Amendment purposes, and therefore the government must generally obtain a warrant before undertaking such domestic recordings.
The Supreme Court has also held in Smith v Maryland (1979) that citizens have no Fourth Amendment expectation of privacy in the business records (sometimes termed metadata) of their communications. This means that the court can subpoena data such as the numbers that an individual has phoned, when and, to a limited degree, where (subject to Jones v. United States) the phone conversation occurred, although a full judicial warrant would be required for the government to acquire or admit audio content from the telephone call. Under Section 215 of the PATRIOT act, the FBI can subpoena some or all such records from a business record holder using a warrant applied for in the Foreign Intelligence Surveillance Court.
The protection of "private conversations" has been held to apply only to conversations where the participants have not only manifested a desire but also a reasonable expectation that their conversation is indeed private and that no other party is listening in. In the absence of such a reasonable expectation, the Fourth Amendment does not apply, and surveillance without warrant does not violate it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war.
The law also recognizes a distinction between domestic surveillance taking place within U.S. borders and foreign surveillance of non-U.S. persons either in the U.S. or abroad.[99] In United States v. Verdugo-Urquidez, the Supreme Court reaffirmed the principle that the Constitution does not extend protection to non-U.S. persons located outside of the United States, so no warrant would be required to engage in even physical searches of non-U.S. citizens abroad.
The U.S. Supreme Court has never ruled on the constitutionality of warrantless searches targeting foreign powers or their agents within the US. There have been, however, a number of Circuit Court rulings upholding the constitutionality of such warrantless searches.[100] In United States v. Bin Laden, the Second Circuit noted that "no court, prior to FISA, that was faced with the choice, imposed a warrant requirement for foreign intelligence searches undertaken within the United States."[101] Assistant Attorney General William Moschella in his written response to questions from the House Judiciary Committee explained that in the administration's view, this unanimity of pre-FISA Circuit Court decisions vindicates their argument that warrantless foreign-intelligence surveillance authority existed prior to FISA and since, as these ruling indicate, that authority derives from the Executive's inherent Article II powers, they may not be encroached by statute.[102] In 2002, the United States Foreign Intelligence Surveillance Court of Review (Court of Review) met for the first time and issued an opinion (In re: Sealed Case No. 02-001) which seems to echo that view. They too noted all the Federal courts of appeal having looked at the issue had concluded that there was constitutional power for the president to conduct warrantless foreign intelligence surveillance. Furthermore, based on these rulings it "took for granted such power exits" and ruled that under this presumption, "FISA could not encroach on the president's constitutional power." Professor Orin Kerr argues in rebuttal that the part of In re: Sealed Case No. 02-001 that dealt with FISA (rather than the Fourth Amendment) was nonbinding obiter dicta and that the argument does not restrict Congress's power to regulate the executive in general.[103]
Harold Koh, dean of Yale Law School, Suzanne Spaulding, former general counsel for the Intelligence Committees of the House and Senate, and former Counsel to the President John Dean, contend that FISA clearly makes the wiretapping illegal and subject to the criminal penalties of FISA,[104] (in seeming disagreement with the FISA Court of Review finding above) and that the president's own admissions already constitute sufficient evidence of a violation of the Fourth Amendment, without requiring further factual evidence. Professor John C. Eastman, in his analysis, prepared at the behest of the House Judiciary Committee, comparing the CRS and DOJ reports, concluded instead that under the Constitution and ratified by both historical and Supreme Court precedent, "the President clearly has the authority to conduct surveillance of enemy communications in time of war and of the communications to and from those he reasonably believes are affiliated with our enemies. Moreover, it should go without saying that such activities are a fundamental incident of war."[105]
Orin S. Kerr, associate professor of law at The George Washington University Law School[106] and a leading scholar in the subjects of computer crime law and internet surveillance,[107] points to an analogy between the NSA intercepts and searches allowed by the Fourth Amendment under the border search exception.
The border search exception permits searches at the border of the United States "or its functional equivalent." (United States v. Montoya De Hernandez, 473 U.S. 531, 538 (1985)). The idea here is that the United States as a sovereign nation has a right to inspect stuff entering or exiting the country as a way of protecting its sovereign interests, and that the Fourth Amendment permits such searches. Courts have applied the border search exception in cases of PCs and computer hard drives; if you bring a computer into or out of the United States, the government can search your computer for contraband or other prohibited items at the airport or wherever you are entering or leaving the country. See, e.g., United States v. Ickes, 393 F.3d 501 (4th Cir. 2005) (Wilkinson, J.)...At the same time, I don't know of a rationale in the case law for treating data differently than physical storage devices. The case law on the border search exception is phrased in pretty broad language, so it seems at least plausible that a border search exception could apply to monitoring at an ISP or telephone provider as the "functional equivalent of the border," much like airports are the functional equivalent of the border in the case of international airline travel...the most persuasive case on point: United States v. Ramsey, [held] that the border search exception applies to all international postal mail, permitting all international postal mail to be searched.
Evidence gathered without warrant may raise significant Fourth Amendment issues which could preclude its use in a criminal trial. As a general rule of law, evidence obtained improperly without lawful authority, may not be used in a criminal prosecution.[citation needed] The U.S. Supreme Court has never addressed the constitutionality of warrantless searches (which has been broadly defined by the court to include surveillance) targeting foreign powers or their agents, the admissibility of such evidence in a criminal trial nor whether it is permissible to obtain or use evidence gathered without warrant against US persons acting as agents of a foreign power.[citation needed]
The National Security Act of 1947[108] requires Presidential findings for covert acts. SEC. 503. [50 U.S.C. 413b] (a) (5) of that act states: "A finding may not authorize any action that would violate the Constitution or any statute of the United States."
On August 17, 2006, Judge Anna Diggs Taylor of the United States District Court for the Eastern District of Michigan ruled in ACLU v. NSA that the Terrorist Surveillance Program was unconstitutional under the Fourth and First Amendments and enjoined the NSA from using the program to conduct electronic surveillance "in contravention of [FISA or Title III]".[36] In her ruling,[109] she wrote:
The President of the United States, a creature of the same Constitution which gave us these Amendments, has indisputably violated the Fourth in failing to procure judicial orders as required by FISA, and accordingly has violated the First Amendment Rights of these Plaintiffs as well.
Even some legal experts who agreed with the outcome have criticized the reasoning set forth in the opinion.[110] Others have argued that the perceived flaws in the opinion in fact reflect the Department of Justice's refusal to argue the legal merits of the program (they chose to focus solely on arguments about standing and state secrets grounds).[111]
On October 4, 2006, a panel of the United States Court of Appeals for the Sixth Circuit unanimously ruled that the government can continue the program while it appeals the lower court decision.[112][113]
On July 6, 2007 the Sixth Circuit dismissed the case, finding that the plaintiffs had no standing.
The Court found that:[114]
[T]he plaintiffs do not and because of the State Secrets Doctrine cannot produce any evidence that any of their own communications have ever been intercepted by the NSA, under the TSP, or without warrants. Instead, they assert a mere belief, which they contend is reasonable and which they label a well founded belief,...
Implicit in each of the plaintiffs' alleged injuries is the underlying possibility which the plaintiffs label a "well founded belief" and seek to treat as a probability or even a certainty that the NSA is presently intercepting, or will eventually intercept, communications to or from one or more of these particular plaintiffs, and that such interception would be detrimental to the plaintiffs' clients, sources, or overseas contacts. This is the premise upon which the plaintiffs' entire theory is built.
But even though the plaintiffs' beliefs based on their superior knowledge of their contacts' activities may be reasonable, the alternative possibility remains that the NSA might not be intercepting, and might never actually intercept, any communication by any of the plaintiffs named in this lawsuit.
Corporate secrecy is also an issue. Wired reported: In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "used to 'hack' into the AT&T network, compromising its integrity."[115] However, Chief Judge Vaughn Walker stated, during the September 12, 2008 hearing in the class-action lawsuit filed by the EFF, that the Klein evidence could be presented in court, effectively ruling that AT&T's trade secret and security claims were unfounded.
The majority of legal arguments supporting the NSA warrantless surveillance program have been based on the War Powers Resolution. There have not been any other noteworthy types of supporting legal arguments. The War Powers Resolution has been questioned as unconstitutional since its creation, and its adaptation to the NSA warrantless surveillance program has been questionable.
Here is the original post:
NSA warrantless surveillance (200107) - Wikipedia, the ...
Posted in NSA
Comments Off on NSA warrantless surveillance (200107) – Wikipedia, the …
Tor Browser Bundle – Web Upd8: Ubuntu / Linux blog
Posted: September 18, 2015 at 2:46 pm
Tor Browser Bundle is a web browser based on Firefox ESR (Firefox with extended support), configured to protect users' privacy and anonymity by using Tor and Vidalia, tools that come bundled with it. The bundle also includes 4 Firefox extensions: TorButton, TorLauncher, NoScript and HTTPS-Everywhere.
When launching TorBrowser, it automatically starts the bundled Tor, anonymizing the origin of your traffic and encrypting everything inside the Tor network. Because the traffic between the Tor network and its final destination is not encrypted, Tor Browser ships with HTTPS-Everywhere, an extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation that encrypts your communications with many major websites, making your browsing more secure.
Once you close TorBrowser, the list of visited websites and the cookies are deleted.
Tor Browser Bundle is easy to run on Ubuntu / Linux, but to make it integrate with the menu / Dash and for easier updates (since you must manually download and install newer versions), I've created an Ubuntu PPA so you can easily install and stay up to date with the latest Tor Browser Bundle.
But that's not something you need to worry about, as everything is done in the background so all you have to do is add the PPA, install Tor Browser Bundle and start the browser from the menu / dash, like with any other application.
To add the WebUpd8 Tor Browser Bundle PPA and install the application in Ubuntu / Linux Mint and derivatives, use the following commands in a terminal:
Removing Tor Browser Bundle requires, besides removing the installed package, to also remove the ~/.tor-browser-en folder - that's where the package is installed after you run it from the menu / Dash for the first time. So if you want to remove Tor Browser Bundle, close it and use the following commands:
Read the rest here:
Tor Browser Bundle - Web Upd8: Ubuntu / Linux blog
Posted in Tor Browser
Comments Off on Tor Browser Bundle – Web Upd8: Ubuntu / Linux blog
There’s a new way to invest in Bitcoin — But buyer beware …
Posted: at 2:46 pm
Buying actual bitcoins has proven dangerous, to say the least. Just look at the unbelievable turbulence in Bitcoin prices -- the currency's value shot up 6,000% in one year before collapsing in value -- and the alleged fraud at the Mt. Gox Bitcoin exchange that led many investors to lose money.
In theory, an exchange-traded fund, or ETF, that mirrors the price of Bitcoin would offer a somewhat safer alternative. Think: something akin to SPDR Gold Shares ETF (GLD), which tracks gold prices.
But no Bitcoin ETFs have been created. An effort by the twins Cameron and Tyle Winklevoss to do just that has been waiting two years to receive approval from regulators. The Securities and Exchange Commission is still trying to figure out how to define and oversee Bitcoin.
This week, ARK Investment Management announced a full embrace of the digital currency. Its ARK Web x.0 ETF (ARKW) became the first ETF to invest in bitcoins.
"Current prices present an attractive entry point for our investors," Cathie Wood, ARK's founder and chief investment officer, said in a statement.
But before taking a leap, it would be smart to read the fine print of the ETF, which trades under the ticker symbol "ARKW."
First, it's not a pure play on Bitcoin. Even though it announced the Bitcoin play, the ETF is actually an investment in what it calls disruptive technologies. The crypto currency represents just a slice of its holdings, packaged along with Netflix (NFLX, Tech30), LinkedIn (LNKD, Tech30) and athenahealth (ATHN), a cloud-based provider of electronic health records.
Related: Chinese gamblers are all about Bitcoin trading
It's investing in pink sheet security, not actual Bitcoin
Second, the ARK ETF is not actually investing directly in bitcoins. It's buying shares of something called the Bitcoin Investment Trust. Most people haven't even heard of that.
That trust started trading in May on the pink sheets under the ticker symbol "GBTC." It's got a market valuation of under $40 million and very little trading volume.
The pink sheets, also known as the over-the-counter market, provide less transparency and oversight from regulators. They're like a Wild West alternative to the New York Stock Exchange and Nasdaq.
"Pink sheets are where most investors aren't willing to tread," said Matt Hougan, CEO of ETF.com, a research firm.
GrayScale, which sponsored the Bitcoin trust, defended the decision to list on the pink sheets and noted that a number of major foreign companies such as Adidas (ADDDF) and Roche (RHHBF) list their U.S. shares there.
Related: Winklevoss twins say Bitcoin will explode beyond $1 trillion
Spotty track record at mirroring Bitcoin
Another problem is that the investment hasn't really mirrored the price of Bitcoin, which defeats the purpose. At times the trust's shares have spiked or surged -- even though underlying Bitcoin prices were relatively calm.
"You're not really getting Bitcoin here. You're getting a Bitcoin derivative that kind of tracks the price of Bitcoin -- but not really well," said Hougan. "There are a bunch of leaps of faith in that chain of command."
The ETF company brushed away these concerns, suggesting that price volatility is actually a good sign.
Another risk for the investment is regulatory. The trust warns investors in disclosure documents that its future may be jeopardized by looming regulation from the SEC.
Related: Former fed in Silk Road case stole $820,000 in bitcoins
Bitcoin is not for the faint of heart
All of this is on top of the inherent risk that goes into investing in anything that has volatility of Bitcoin.
Founded in 2009, Bitcoin burst onto the financial scene this decade as investors looked for an alternative to traditional currencies. Prices skyrocketed more than 6,000% in 2013 before peaking at nearly $1,250.
And then prices collapsed, losing two-thirds of their value last year alone. While Bitcoin has actually calmed down a lot lately, it's still down 27% this year to $230 apiece.
Related: Greeks rushed to Bitcoin as Grexit loomed
CNNMoney (New York) September 18, 2015: 11:53 AM ET
Read the rest here:
There's a new way to invest in Bitcoin -- But buyer beware ...
Posted in Bitcoin
Comments Off on There’s a new way to invest in Bitcoin — But buyer beware …
Can Humans Live Forever? Longevity Research Suggests …
Posted: at 2:45 pm
Scientists may be able to make substantial gains in extending not only the length of human life, but the quality of life as we age, according to many researchers. That won't be limited to breakthroughs in the laboratory. To a significant extent, it will depend on how we live our lives.
As for the scientists, first they have to answer a very basic question. Why do humans live longer than any other mammals?
For starters, we are big. Long ago scientists recognized a relationship between body size and longevity. Humans just narrowly edge out the elephant (so size isn't the whole story) to win the Olympic gold for living longer, but recent research reveals that's just part of the story.
We also have huge brains compared to the size of our bodies. We are mobile, have few predators except for other humans, and there's a drugstore on every corner.
It wasn't always that way. During most of recorded history any human who reached the mid thirties had beaten the system. Over the past century we gained a global average of 30 years, about 25 of which are attributed to improvements in public health, according to federal statistics.
Today, the global life expectancy is 67.2 years. It's around 78 years in the United States, and a few years more in Japan, the world leader for sticking around.
Genetics, of course, play a key role in longevity. In recent years, when we entered the golden age of genetics, many hoped to discover the "longevity gene" that allowed an increasing number of humans to live more than a century. For awhile, they thought they had found it.
One gene produces sirtuins, a protein thought to increase lifespan in several organisms, and that protein quickly became the darling of producers of anti-aging creams. But last year an international team of researchers found that sirtuins have no effect on animal longevity.
That came as no surprise to scientists at the University of California, San Francisco, who had determined that there is no longevity gene. As has often been the case in genetics in recent years, it's much more complicated than that.
It turns out that there are many genes that affect lifespan, but each of those genes has a very limited role. The San Francisco researchers found that some genes make proteins that fight bacterial infections, while others ward off oxidative stress and protein damage, commonly associated with aging. But all these genes don't just do their own thing. They are apparently controlled by at least two other genes that act as drill sergeants. Research by these scientists found that when all these genes work right, the lifespan of the roundworm, C. elegans, doubled. That worm is used in much research because it is a simple organism that shares many genes with humans.
But will the same thing work for humans? Maybe.
In a related study, scientists at the University of Liverpool reported earlier this year that some proteins change over time in long living species, including humans. Joao Pedro Magalhaes and his colleagues studied 30 mammals and found that these proteins evolve during the course of the lifetime "to cope with biological processes impacted by aging, such as DNA damage." In other words, animals that live longer are better equipped to make repairs in tissues and organs that help them fight the aging process.
There is a huge body of evidence showing that size really does matter, both in terms of body mass and cerebral tissue. Researchers in Barcelona studied 493 mammal species and found that a larger brain leads to a longer life.
A smarter animal is better equipped to deal with environmental challenges and less likely to take silly chances, like picking a fight with a much bigger animal. That may seem obvious, but it's less clear why body size should contribute to longer lifespan. Among mammals, the top four are humans, followed by elephants, horses and hippopotamuses, but most likely the hippo wouldn't score all that high on an IQ test.
The turkey buzzard tops the list for birds at 118 years, maybe because it's smart enough to wait for road kill instead of attacking a live animal.
But the giant tortoise is the real champ. The world mourned the passing of Lonesome George in the Galapagos Islands earlier this year. The actual age of old George is unknown, although it's clear he made it well past the century mark. Among the superachievers was Tu'I Malila, who was presented to the royal family of Tonga by Capt. James Cook in 1777. He was thought to be 188 when he died in 1965. That still leaves the question of why size matters. Adrian Bejan, a mechanical engineering professor at Duke University, has spent years studying the relationship between size and lifespan, and he is out with a new idea.
Bejan argues in a paper published this week in Nature Scientific Reports that big animals live longer because they travel farther, thus giving them access to more resources. Mobility is the key. Get off the couch.
If he's right, then that leaves longevity largely in our own hands. Do the right thing and you'll live longer. Physicians tell us that all the time. Don't smoke. Get plenty of exercise. Eat right. Researchers at Newcastle University in England think they have figured out why something like eating a low calorie diet can increase lifespan. Aging is strongly influenced by senescence, the end of a cell's ability to replicate itself. They fed mice a low calorie diet and the accumulation of senescent cells plummeted, thus defeating much of the aging process.
It worked even for older mice, suggesting that eating less or at least fewer calories may be our best defense against aging and an early death.
No more ice cream? I'm waiting for a magic pill.
See the rest here:
Can Humans Live Forever? Longevity Research Suggests ...
Posted in Human Longevity
Comments Off on Can Humans Live Forever? Longevity Research Suggests …
Genetics of Human Longevity
Posted: at 2:45 pm
Genetics of Human Longevity: New Ideas & Findings
Natalia Gavrilova
Center on Aging, NORC at the University of Chicago
(Abstract of presentation at the International Conference on Longevity, Sydney, Australia, March 5-7, 2004)
In contrast to the remarkable progress in the genetics of yeast and nematode aging, little is known about genes that control human longevity. What is behind the records of extreme human longevity: just lucky chance, favorable environment, or 'good' genes? How to resolve the apparent controversy between strong familial clustering of human longevity, and poor resemblance in lifespan among blood relatives?
We applied methods of genetic epidemiology and survival analysis to family-linked data on human lifespan. Special efforts were undertaken to collect detailed and reliable human genealogies an important data source for genetic studies of human longevity. We found that the dependence of offspring lifespan on parental lifespan is essentially non-linear, with very weak resemblance before parental lifespan of 80 years and very steep offspring-parent dependence (high narrow-sense heritability) for longer lived parents. There is no correlation between lifespan of spouses, who share familial environment. These observations suggest that chances to survive beyond age 80 are significantly influenced by genetic factors rather than shared familial environment. These findings explain the existing longevity paradox: although the heritability estimates for lifespan are rather low, the exceptional longevity has a strong familial association.
We also tested the prediction of mutation theory of aging that accumulation of mutations in parental germ cells may affect progeny lifespan when progeny was conceived to older parents. We found that daughters conceived to older fathers live shorter lives, while sons are not affected. Maternal age effects on lifespan of adult progeny are negligible compared to effects of paternal age, which is consistent with the notion of higher rates of DNA copy-errors in paternal germ cells caused by more intensive cell divisions during spermatogenesis.
Genealogical data also are useful for testing the prediction of the disposable soma theory that human longevity comes with the cost of impaired reproductive success. We found that in contrast to previous reports by other authors, woman's exceptional longevity is not associated with infertility. Thus, the concept of heavy infertility cost for human longevity is not supported by data, when these data are carefully cross-checked, cleaned and reanalyzed. These results demonstrate the importance of high quality genealogical data for genetic studies of human longevity.
Relevant Publications:
Gavrilov, L.A., Gavrilova, N.S. Early-life factors modulating lifespan. In: Rattan, S.I.S. (Ed.).Modulating Aging and Longevity. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2003, 27-50.
Gavrilova, N.S., Gavrilov, L.A. Evolution of Aging. In: David J. Ekerdt (eds.) Encyclopedia of Aging, New York, Macmillan Reference USA, 2002, vol. 2, 458-467.
Gavrilov, L.A., Gavrilova, N.S. Human longevity and parental age at conception. In: J.-M.Robine et al. (eds.) Sex and Longevity: Sexuality, Gender, Reproduction, Parenthood, Berlin, Heidelberg: Springer-Verlag, 2000, 7-31.
Gavrilova N.S., Gavrilov L.A., Evdokushkina, G.N., Semyonova, V.G. Early-life predictors of human longevity: Analysis of the 19th Century birth cohorts. Annales de Demographie Historique, 2003, 2: 177-198.
Gavrilova NS, Gavrilov LA, Semyonova VG, Evdokushkina GN. Does Exceptional Human Longevity Come With High Cost of Infertility? Testing the Evolutionary Theories of Aging. Biogerontology. 4(Suppl.1): 35-35, 19 Sep 2003
Gavrilov, L.A., Gavrilova, N.S. Evolutionary theories of aging and longevity. TheScientificWorldJOURNAL, 2002, 2: 339-356. Available: http://www.thescientificworld.com/
Gavrilova, N.S., Gavrilov, L.A. When does human longevity start?: Demarcation of the boundaries for human longevity. Journal of Anti-Aging Medicine, 2001, 4(2): 115-124.
Gavrilov L.A., Gavrilova N.S. Epidemiology of human longevity: The search for appropriate methodology. Journal of Anti-Aging Medicine, 2001, 4(1): 13-30.
Gavrilov, L.A., Gavrilova, N.S. Biodemographic study of familial determinants of human longevity. Population: An English Selection, 2001, 13(1): 197-222.
Gavrilova, N.S., Gavrilov, L.A. Consanguinity and human longevity: Findings from the International Centenarian Study. Gerontologist, 2001, 41 (Sp. issue): 87-87.
Gavrilov, L.A., Gavrilova, N.S. Is there a reproductive cost for human longevity? Journal of Anti-Aging Medicine, 1999, 2(2): 121-123.
Gavrilova, N.S., Gavrilov, L.A., Evdokushkina G.N., Semyonova, V.G., Gavrilova, A.L., Evdokushkina, N.N., Kushnareva, Yu.E., Kroutko, V.N., Andreyev, A.Yu. Evolution, mutations and human longevity. Human Biology, 1998, 70(4): 799-804.
Gavrilov, L.A., Gavrilova, N.S. Parental age at conception and offspring longevity. Reviews in Clinical Gerontology, 1997, 7: 5-12.
Gavrilov L.A., Gavrilova, N.S., Kroutko, V.N., Evdokushkina, G.N., Semyonova, V.G., Gavrilova, A.L., Lapshin, E.V., Evdokushkina N.N., Kushnareva, Yu.E. Mutation load and human longevity. Mutation Research, 1997, 377(1): 61-62.
Gavrilov, L.A., Gavrilova, N.S. When Fatherhood Should Stop? Letter. Science, 1997, 277(5322): 17-18.
Read the original:
Genetics of Human Longevity
Posted in Human Longevity
Comments Off on Genetics of Human Longevity
Sony says China’s censorship laws are stifling PS4 sales …
Posted: at 2:44 pm
Sarah Tew/CNET
Following dipping sales, Sony this week announced a price drop for the PS4 in Japan. But the company's home turf isn't the only Asian country giving it grief, with China presenting a unique set of challenges.
"We are still challenged somewhat with a censorship regime that we have to work with," Sony Computer Entertainment CEO Andrew House told Reuters at the Tokyo Game Show on Thursday. "This can be time-consuming."
The PS4 launched in China back in March, a little over a year after the country's government revoked a ban on gaming consoles that had been in place for 14 years. However, China's censorship minefield has proven difficult for Sony to traverse: Only six launch titles accompanied the PS4 upon its release.
"I don't think it has been a kind of rocket launch start," House admitted, but added that he thinks there's "tremendous potential for gaming as an entertainment medium in China." The numbers certainly agree -- last year China's gaming population exceeded the entire population of the USA.
Titles released alongside the console, which retails for 2,899 yuan ($455), include Rayman Legends, Knack, and Dynasty Warriors 8: Xtreme Legends Complete Edition. Noticeably absent are mega-popular western titles like Grand Theft Auto 5 or Call of Duty: Advanced Warfare.
The slim gaming portfolio officially available to Chinese gamers is not surprising given the country's censorship regulations. Any game deemed to promote drug use, violence, gambling or obscenity is immediately withdrawn from consideration of distribution.
Sony isn't the only one struggling though -- Microsoft last year launched the Xbox One in the country along with around 10 titles. However, though the Xbox has a few more games available, it's region locked, while the PS4 is not. This means that Chinese players can import and play games from around the world for Sony's console (at the risk of a fine) but not Microsoft's.
In July, research institute Niko Partners estimated that the combined number of Xbox Ones and PS4s sold in 2015 would be under 550,000, though this doesn't take into account sales of gaming hardware and software sold in China's widely used grey market.
Read more here:
Sony says China's censorship laws are stifling PS4 sales ...
Posted in Censorship
Comments Off on Sony says China’s censorship laws are stifling PS4 sales …
Censorship – Conservapedia
Posted: at 2:44 pm
Censorship is the suppression of statements or information for ideological reasons. Current examples of censorship include:
Political censorship involves a government preventing information from reaching its citizens. Perhaps the best-known contemporary example of this is China's censorship of the Google search engine, known as the "Golden Shield Project", which prevents Google from displaying search results of some human rights websites, websites promoting Tibetan independence, references to the 1989 Tianamen Square protests, and others. A famous example in fiction is George Orwell's novel Nineteen Eighty-Four, in which the main character works as a civil servant in the department responsible for altering or destroying historical information which the government wishes to keep secret. The rationale behind political censorship is that the political party in power can protect itself from revolution if the public is kept uninformed.
The term censorship derives from censor, the title of the Roman official who conducted the census and supervised public morality.
In the United States, the First Amendment states that "Congress shall make no law... abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances." Broadly speaking, the First Amendment is designed to prevent the government from exercising censorship. However, the government sometimes censors political and religious speech anyway.
More specifically, the government should not exercise "prior restraint." That is, a citizen should not need advance permission from the government in order to publish something, unless it threatens national security. This does not mean that publication may not have consequences: a citizen can be sued for publishing libel, or incarcerated for disclosing military secrets, but the consequences typically occur after publication, not before.
Censorship is sometimes applied to prohibit obscenity that goes against common standards of public morality; under US law the first amendment does not protect material considered legally obscene. The definition of obscenity has and continues to vary, with the current Supreme Court definition being the Miller test. In practical terms, this allows harmful material such as pornography to be criminalized without violating the First Amendment.
Censorship may also be directed at religious ideas, as in the Saudi Arabian prohibition on preaching Christianity, liberal restrictions on public expressions of religion, or the Roman Catholic Church's now-recinded Index Librorum Prohibitorum.
Certain language and images that may have been censored in the past are typically common fare in the American media today. On the other hand, while nudity, for example, may be acceptable on mainstream French television, that is much less likely to be accepted in American television and even less acceptable in conservative Muslim countries.
Contrast with:
Original post:
Censorship - Conservapedia
Posted in Censorship
Comments Off on Censorship – Conservapedia
censorship – Dictionary Definition : Vocabulary.com
Posted: at 2:44 pm
Censorship blocks something from being read, heard, or seen. If you've ever heard the sound of bleeping when someone is speaking on television, that's censorship.
To "censor" is to review something and to choose to remove or hide parts of it that are considered unacceptable. Censorship is the name for the process or idea of keeping things like obscene word or graphic images from an audience. There is also such a thing as self-censorship, which is when you refrain from saying certain things or possibly re-wording them depending on who is listening.
Definitions of censorship
1
censorship in the form of prudish expurgation
censorship because of perceived obscenity or immorality
the act of deleting something written or printed
all types of censorship conducted by personnel of the armed forces
censorship under civil authority of communications entering or leaving of crossing the borders of the United States or its territories or possessions
military censorship of civilian communications (correspondence or printed matter of films) entering or leaving of circulating within territories controlled by armed forces
security review of news (including all information or material intended for dissemination to the public) subject to the jurisdiction of the armed forces
military censorship of communication to and from prisoners of war and civilian internees held by the armed forces
military censorship of personal communications to or from persons in the armed forces
intelligence activities concerned with identifying and counteracting the threat to security posed by hostile intelligence organizations or by individuals engaged in espionage or sabotage or subversion or terrorism
Read more here:
censorship - Dictionary Definition : Vocabulary.com
Posted in Censorship
Comments Off on censorship – Dictionary Definition : Vocabulary.com
Debate Issue: Censorship | Debate.org
Posted: at 2:44 pm
For clarification of my quote, "Anything posted of REAL (mind the emphases on REAL) activity of illegal actions that would be considered a federal crime such as child pornography isn't really in the realm of being censored or not, it's simply not even within the question.", the reasoning behind this is that of which it is a federal crime. Being a federal crime generally excepts the ideal principal that the vast majority see's it to be wrong and without question filtered. However, because this action is done out of the will of the vast majority of people, it would not be considered censorship because of its highly undemocratic characteristic.
Now, my opponent brings into the light of how the UK has treated certain kinds of hate speech causing him to rather agree with their actions. First of all, I hypocritically applaud the UK for banning Michael Savage and his arrogant racist bigotry. Unfortunately I feel it's the wrong approach by a government to blacklist an ideology. Even IF that said ideology was racist, hateful, and outright false. I guess this would be a reflection of me living in my country as well. You see we have a party here in our country that is hateful and outright false all the time but we as a nation do nothing to restrict there speech because we feel it is their democratic right, to speak their minds. I'm talking of course about the republican party. (zing)
Needless to say that just because I feel these parties should have protected speech does not mean that I feel that they should be above the law. Its really just a matter of free speech, press and assembly. If these particular parties actually commit acts of hate than that's another story.
Seems we've stumbled upon a semantics debate. It really comes down to what you view censorship as. For me, censorship is the restriction of speech, press etc. committed by a 2nd party to a specific group or persons against their will. Pro believes censorship can be an act of voluntarism.
<"Being a federal crime generally excepts the ideal principal that the vast majority see's it to be wrong"
It actually reflects the fact that the government see it as wrong; Governments create laws, not the general public.
<"because this action is done out of the will of the vast majority of people, it would not be considered censorship because of its highly undemocratic characteristic."
Anything a democratically elected government does is technically democratic, including censorship.
___
<"I feel it's the wrong approach by a government to blacklist an ideology."
No ideology is blacklisted by UK hate speech laws, (see sources in debate I linked above,) it's legal to be a bigot, it's only when you start encouraging others to perform violence that you break the laws. Con wants politicians speech protected, but would this still be the case if a party openly preached a doctrine of murder or genocide?
Free speech laws don't and shouldn't protect those who commit fraud through verbal dishonesty, those who shout out "bomb!" in a crowded airport, or those who incite violence and hate.
___
<"Seems we've stumbled upon a semantics debate. It really comes down to what you view censorship as. For me, censorship is the restriction of speech, press etc. committed by a 2nd party to a specific group or persons against their will. Pro believes censorship can be an act of voluntarism."
The definition we have is indeed a very broad one. Suppression of harmful material by the government would clearly include child porn etc., while "media outlets" suggests it covers voluntary self-censorship.
Since Con supplied the definition himself and is in favour of both of these forms of censorship, it seems he has conceded his position as Con towards the resolution. If he wanted to limit the debate to exterior, enforced censorship of legal activity, he should really have made it clear at the outset.
Thanks.
See the article here:
Debate Issue: Censorship | Debate.org
Posted in Censorship
Comments Off on Debate Issue: Censorship | Debate.org
Debate Argument: Censorship | Debate.org
Posted: at 2:44 pm
First of all, my opponent is trying to turn this debate into a moral issue. Morality should never be the basis of government. Justice and fairness should be.
Pro, argues that this debate is no about "Can the government censor?" but about "Should they?" As I stated previously no they shouldn't. Just because something is allowed, doesn't mean we should do it. I can stuff my face with 10 slices of pizza, does it mean I should? No
Pro, also mentioned I have not given example why censorship is bad. As you can read, I did.
I can give a list why censorship is bad in all corners. Here we go.
1. Dictators use censorship to promote a flattering image of themselves and for removing any information that goes against them. Whose to say the government can't do this too?
2. Political parties around the world already use media censorship for their own benefit. It stifles the opposition, broadcasting only a particular point of view.
3. Censorship makes us believe what were are told, not what we are not. Why do conspiracy theorists exist? Because they believe the government isn't telling us something.
4. Area 51, 9/11, New World Order. Do you really think the gorvernment should keep all those things censored.
5. It makes the US complete hyprocite. The Constitution says we have Freedom of Speech, Press, Religion, Petition and Protest, so why does the gorvernment censor this? For there own benefit.
Thank you. By the way, the voters can vote for whoever they want. Vote whatever you like! 🙂
As to his rebuttals, they are also contradictory. I have not said that he did not give instances of bad censorship, I merely pointed out that a few bad examples does not imply that censorship in all circumstances is immoral. I would like to point out that my opponent has done nothing to refute my ethical system of utilitarianism or propose one of his own that is not logically contradictory. Under my ethical system, government should censor when the results of said censorship maximize happiness or minimize pain. Until my opponent addresses this point, I should be considered the winner.
Go here to read the rest:
Debate Argument: Censorship | Debate.org
Posted in Censorship
Comments Off on Debate Argument: Censorship | Debate.org