The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: March 2017
British defense officials call for more cooperation between NATO, EU on cyber – The Hill
Posted: March 7, 2017 at 10:00 pm
Officials with Britains Defense Ministry on Monday called for greater cooperation on cybersecurity between NATO and the European Union.
The demands come in the wake of Britains vote to leave the EU, which British Defense Secretary Michael Fallon indicated Monday would not affect Britains security cooperation with other European nations.
Fallon and Stephen Lovegrove, the Defense Ministrys permanent secretary, both said in separate remarks on Monday that NATO and EU should strengthen cooperation on cybersecurity.
Against evermore complex problems, we must bring together military and nonmilitary responses, and that means making the most of the agreement at Warsaw last year to invigorate the strategic relationship between NATO and the EU, including cooperation on cybersecurity and boosting cooperation counter-hybrid capabilities, Lovegrove said.
He specifically cited threats from Russias hybrid model of warfare.
Separately, Fallon made a similar call for deepened cyber cooperation between the two partnerships during a meeting of the European Union defense ministers in Brussels on Monday.
Today I have urged the EU to cooperate more closely with NATO, to avoid unnecessary duplication and to work together on new threats, including cyber, Fallon said, according to quotes posted on the ministrys website.
Russias cyber and influence campaign targeting the United States presidential election has stoked fears about the potential for future cyberattacks aimed at European elections.
In February 2016, NATO and the EU agreed to a technical arrangement to boost information sharing on cyber-related matters. NATO member states also recognized cyberspace as a domain of operations in which the alliance must defend itself and pledged to boost their cyber defenses at the Warsaw Summit last July.
More recently, NATO deepened cooperation on cyber defense with Finland, which shares a border with Russia.
NATO has also boosted its traditional defenses in Europe in the face of mounting Russian aggression in Ukraine. Moscow has described the buildup as a threat to its own security.
Read the original here:
British defense officials call for more cooperation between NATO, EU on cyber - The Hill
Posted in NATO
Comments Off on British defense officials call for more cooperation between NATO, EU on cyber – The Hill
Montenegro Awaits Senate Verdict: President Donald Trump Should End NATO Expansion Charade – Forbes
Posted: at 10:00 pm
Forbes | Montenegro Awaits Senate Verdict: President Donald Trump Should End NATO Expansion Charade Forbes The postage stamp country of Montenegro expected to be rushed into NATO during Washington's lame duck period before the unpredictable Donald Trump became president. But Senators Rand Paul and Mike Lee, to their credit more concerned about ... |
More here:
Montenegro Awaits Senate Verdict: President Donald Trump Should End NATO Expansion Charade - Forbes
Posted in NATO
Comments Off on Montenegro Awaits Senate Verdict: President Donald Trump Should End NATO Expansion Charade – Forbes
8,000 NATO troops launch exercise near Russian-Norwegian … – RT
Posted: at 10:00 pm
Published time: 6 Mar, 2017 18:48Edited time: 6 Mar, 2017 21:18
A total of 8,000 NATO soldiers have been deployed to the Finnmark region of northern Norway, 160-300 km from the Russian border, for a series of joint military exercises.
The Joint Viking 2017 exercises, which involve British, American and Norwegian troops, kicked off Monday and are expected to last until March 15. According to the Norwegian Armed Forces website, the exercises primary goals are to practice crisis management and the defense of Norway.
A total of 8,000 troops are taking part, including 700 soldiers from the US Marine Corps, US Army and the British Royal Marines, which have been integrated into Norwegian units. The British and American troops took part in preparatory exercises to acclimatize them to the harsh Norwegian weather.
For the duration of the exercise, drones have been banned from local airspace.
The Armed Forces will have a lot of activity in the air, with fighter jets, helicopters and transport aircraft. To ensure safety in the air, we therefore introduced a drone ban, military spokesman Ivar Moen told the Norwegian public radio station NRK.
Read more
In previous years, Joint Viking exercises have been held in Hordaland in 2013, Tromso in 2014, Finnmark in 2015 and Trndelag in 2016. The previous exercise in Finnmark was seen as a provocation in Russia, where in response a large-scale exercise was launched in the Kola Peninsula.
This year, however, Moscow was notified of the planned maneuvers in advance, Moen told NRK.
In January, 300 US Marines from Camp Lejeune, North Carolina, were deployed to Norway. Both Norway and the US denied the notion that the deployment was meant to irk Russia as part of NATOs wider campaign to oppose what it calls Russian aggression in Europe, by sending additional troops and weapons closer to the Russian border.
A founding member of NATO, Norway pledged not to host foreign forces to allay Moscows concerns that it could serve as a platform for a surprise attack. For decades, the Scandinavian country only allowed in other allies troops for training purposes. Oslo dismissed the notion that the deployment goes against the old commitment, saying that American troops would be rotated rather than stationed permanently. NATO routinely applies the same reasoning to all its deployments in Eastern Europe as a way of circumventing the alliances agreement with Russia, which bans permanent deployments of significant forces near Russia.
Read this article:
8,000 NATO troops launch exercise near Russian-Norwegian ... - RT
Posted in NATO
Comments Off on 8,000 NATO troops launch exercise near Russian-Norwegian … – RT
Shaky commitments to NATO – North Texas Daily
Posted: at 10:00 pm
The North Atlantic Treaty Organization has long been a symbol of the free world, enforcing humanitarian agendas and committing itself to universalrights for all. Such a noble force has the support of currently 28 of the most powerful countries in the world including the U.S., Germany, France and the U.K., and one would assume that out of all these members, it would be logical and fair that each country contribute the same percentage. After all, not just the U.S. is committed in making the world a better place.
The U.S. government currently contributes almost a quarter of NATOs operating budget, which is weird considering that NATO has 28 member states. One could argue that not all countries can afford such a huge financial burden, but per capita, many richer European countries such as Luxembourg, which has an annual GDP per capita of $110,697.03, twice the amount of Americas do not put forth the required amount to NATO.
Regulations dictate that all NATO members must spend at least 2 percent of their yearly GDP on defense and so far, a measly five of them have met the bare minimum.
Not only does direct contribution to NATO by the states overshadow any other country, indirect spending eclipses even that. It is estimated that nearly 73percentof all NATO spending comes from the U.S.
American presidents have long held resentments for being forced to be the main economic pillar supporting NATO. There is widespread bipartisan resentment for this issue, which draws the support of Barack Obama, Bernie Sanders, George Bush and most recently, President Donald Trump.
While many liberals contest any word that comes out of Trumps mouth, pulling the U.S. out of an obsolete Cold War relicis a cause that everyone should get behind. Having the U.S. spend so muchto act as world police is unnecessary and a remnant of the past.
The money that the U.S. would save, by reinvesting its NATO expenditures back into its economy, would bolster the economy and create more jobs. Direct spending overseas in Americas own military is already more than enough, and we dont need to give even more money to other countries who do the same thing as us.
If other countries dont even care enough about world security to provide for NATO, then the U.S. shouldnt have to pick up the burden. The U.S. should be content in its current overseas involvement, and by staying out of conflicts it doesnt relate to,the nation could save money and lives.
If other countries dont care for the brutalities that occur and arent investing enough to stop it, the U.S. no longer needs to be the paradigm of freedom in the world. Secretary of Defense General Mattis has said that unless other countries can contribute the same as the U.S., then we would be forced to moderate [our] commitment to NATO.
The need for all countries to be free should not rest merely on Americas shoulders. Freedom and liberty for all should be pursued by all countries. If continued U.S. investment is wanted in NATO, then other members must step up their commitments to world peace.
Featured Illustration: Samuel Wiggins
Read this article:
Shaky commitments to NATO - North Texas Daily
Posted in NATO
Comments Off on Shaky commitments to NATO – North Texas Daily
EU Establishes New Military HQ Regardless of Concerns It Compromises NATO – Newsline
Posted: at 10:00 pm
Notwithstanding apprehensions from member nations that the decision would weaken NATO, the European Union (EU) authorized the formation of a new military headquarters.
The facility would be manned by a staff of 30, whose responsibility would be the coordination of the EU member states military. A number of members, including Poland, Hungary and the United Kingdom, have disputed the notion of a combined European army. The defense ministers of all the member countries, however, unanimously decided on establishing the new headquarters.
In a statement released Monday, EU Foreign Affairs Minister Federica Mogherini said, Today we decided to establish a MPCC (Military Planning Conduct and Capability facility) which will command the EUs non-executive military missions. This is one of the fields where traditionally we have had in the history of the European Union more divisiveness since the fifties we were struggling in the defense field.
In an effort to achieve less dependence on the United States, France and Germany have advocated for the creation of common military organizations, joint headquarters and combined resources.
While emphasizing NATOs significance to the EU, Mogherini said the new arrangement is not a European army.
Nevertheless, British Defense Minister Michael Fallon vowed that the U.K. would veto any proposals to challenge Natos position, while the country is still a member of EU.
Speaking with Reuters, he said, We have resisted any mission creep. The danger is duplication (with NATO).
Go here to see the original:
EU Establishes New Military HQ Regardless of Concerns It Compromises NATO - Newsline
Posted in NATO
Comments Off on EU Establishes New Military HQ Regardless of Concerns It Compromises NATO – Newsline
After NSA hacking expos, CIA staffers asked where Equation Group went wrong – Ars Technica
Posted: at 10:00 pm
Two days after researchers exposed aNational Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online discussion aimed at preventing the same kind of unwelcome attention. The thread, according to a document WikiLeaks published Tuesday, was titled "What did Equation do wrong, and how can we avoid doing the same?"
Equation Group eventually came to light because of a handful of errors its members made over the years. One was the widespread use of a distinctive encryption function that used the RC5 cipher with negative programming constantsrather than with the positive constants favored by most developers. The nonstandard practice made it easier to identify Equation Group tools. Another mistake: failing to scrub variable names, developer account names, and similar fingerprints left in various pieces of Equation Group malware. A third error was the failure to renew some of the domain name registrations Equation Group-infected computers reported to. When Kaspersky Lab obtained the addresses, the researchers were shocked to find some machines infected by a malware platform abandoned more than 10 years earlier were still connecting to it.
It was this intrigue that set the stage for the online discussion about how CIA hackers could avoid the same pitfalls.
"As for what 'Equation' did wrong... All their tools shared code," one user, who like all the others was identified only by a unique identifier WikiLeaks used in place of a username, concluded on February 18, 2015, two days after the Kaspersky Lab findings were published. "The custom RC5 was everywhere. The techniques for positive ID (hashing) was used in the same way in multiple tools across generations."
The person continued:"The shared code appears to be the largest single factor is [sic] allowing [Kaspersky Lab] to tie all these tools together. The acquisition and use of C&C domains was probably number 2 on the list, and I'm sure the [CIA's computer operations group] infrastructure people are paying attention to this."
The person also suggested peers avoid using non-standard crypto functions, avoid using custom names in code, and scrub code clean of any PDB database information provided by Microsoft's Visual Studio debugger feature. The person wrote:
1. I would argue using custom crypto is always a mistake for two reasons. First, for the obvious problem described in the report. It makes your code look strange on deep RE inspection. Second, a custom routine greatly increases the odds you implemented the algorithm incorrectly and end up with a much weaker encryption scheme than intended.
2. Named kernel objects in general provide an easy signature for detection because it's usually a unique name. Using the same name in multiple tools is catastrophic.
3. This is PDB string, right? The PDB path should ALWAYS be stripped (I speak from experience. Ask me about Blackstone some time.). For Visual Studio user mode stuff, the /DEBUG linker switch should NOT be used. For drivers, it's a bit harder to avoid it, but a post-build step using binplace will strip the path information.
4. For other strings generally, yeah, search the binary for them. Don't use internal tool names in your code. It's less of a problem if leave-behind code doesn't have any exploit code in it.
The person went on to say, "The 'custom' crypto is more of [an] NSA falling to its own internal policies/standards which came about in response to prior problems. The problems included misconfigured crypto implementations that were corrected by using a single, optimized library.
"Unfortunately, this implementation used the pre-computed negative versions of constants instead of the positive constants in the reference implementation," the person wrote. "I think this is something we need to really watch and not standardize our selves into the same problem."
Other suggestions included the use, when possible, of publicly available crypto libraries, such as Microsoft Encryption Libraries, OpenSSL, and PolarSSL; creating a warning that would be displayed when unique names are embedded in the final binary file; and using a tool that would scan binaries for any usernames used on the local network.
The thread is part of a cache of 8,761 documents and files that WikiLeaks said were "obtained from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia." The discussion provides a fly-on-the-wall account of some of the reactions to what must have been one of the more embarrassing exposures of NSA hacking. It wouldn't be surprising if members of NSA hacking units are having discussions of their own speculating on the cause of Tuesday's leak.
Read the original here:
After NSA hacking expos, CIA staffers asked where Equation Group went wrong - Ars Technica
Posted in NSA
Comments Off on After NSA hacking expos, CIA staffers asked where Equation Group went wrong – Ars Technica
Ex-NSA analyst: Intel sources say White House ‘targeting journalists’ with ‘help from Russian intel’ – Raw Story
Posted: at 10:00 pm
CNN's Jim Acosta confronts Donald Trump at a White House press conference (screen grab)
Former NSA analyst John Schindler, who now is a national security columnist for the Observer, reported on Tuesday that his sources in the intelligence community believe that President Donald Trumps White House is colluding with Russian intelligence to target journalists.
In a tweet on Tuesday, Schindler revealed: Learned fm very reliable IC sources that Trump WH, w/help fm Russian intel, is targeting US journalists.
Learned fm very reliable IC sources that Trump WH, w/help fm Russian intel, is targeting US journalists. Rough road ahead. Get ready, peeps
John Schindler (@20committee) March 7, 2017
Although Schindler provided no additional details, its no secret that Trump has all but declared war on the media during his first 45 days in office. However, the president has embraced conservative media sources like Fox News, Breitbart and various right-wing blogs.
In one case, the White House tried to punish Politico reporter Alex Isenstadt by planting a false story accusing him of laughing at the death of a Navy SEAL. Trump has called the media fake news and an enemy of the people.
The fake news doesnt tell the truth, Trump told a group of conservatives last month. It doesnt represent the people, it doesnt and never will represent the people, and were going to do something about it.
Original post:
Ex-NSA analyst: Intel sources say White House 'targeting journalists' with 'help from Russian intel' - Raw Story
Posted in NSA
Comments Off on Ex-NSA analyst: Intel sources say White House ‘targeting journalists’ with ‘help from Russian intel’ – Raw Story
Tucker, Jim Himes Spar Over Alleged NSA Surveillance [VIDEO … – Daily Caller
Posted: at 10:00 pm
5518152
Rep.Jim Himes stopped by Fox News Monday broadcast ofTucker Carlson Tonight todiscuss surveillance of Trump Tower, which President Trump claimedwas carriedout by the Obama administration during the 2016 election.
Only minutes into the interview, the Connecticut Democrataccused Carlson of mis-categorizing anysurveillanceperformed on private citizensas spying, when its really law enforcement. (VIDEO: Josh Earnest Wont Deny Trump Tower Was Surveilled By Obama Administration)
WATCH:
You used the word spying, and I dont know what that means, Himes, who sits on the House Intelligence Community, told Carlson. Is that what police do when theyre listening in on drug dealers and child molesters?
Yes, and sometimes its justified, and sometimes it isnt, Carlson responded. But lets call it what it is.
No, spying is when we go to Russia andtry to recruit Russiangenerals into giving us Russiansecrets, Himes countered. When law enforcement is listening to anybody, its law enforcement.
You can watch the entire interview below.
WATCH:
Follow Datoc on Twitter and Facebook
Follow this link:
Tucker, Jim Himes Spar Over Alleged NSA Surveillance [VIDEO ... - Daily Caller
Posted in NSA
Comments Off on Tucker, Jim Himes Spar Over Alleged NSA Surveillance [VIDEO … – Daily Caller
Burns files bill to protect property owners – Cleburne Times-Review
Posted: at 9:59 pm
The Fifth Amendment grants the federal government the right to exercise its power of eminent domain the power to take private property for public use by a state, municipality, private person or corporation authorized to exercise functions of public character, following the payment of just compensation to the owner of that property.
State Rep. DeWayne Burns, R-Cleburne, filed House Bill 2684 on Thursday, which aims to level the playing field for property owners when they face off with government entities and corporations with infinitely greater resources.
Burns said it was his personal experience with eminent domain that prompted him to file the bill.
I know first hand the burden that the eminent domain process places on landowners, he said. You climb off a tractor and there is a person there telling you they are there to negotiate a fair price for land you didnt want to sell and at the end of the day if you dont want to sell it, it will be taken from you.
Burns said his family owns property in the southwest part of Johnson County and several years ago when the Barnett shale was really active, he and many other landowners in the area found themselves in negotiations for eminent domain.
We had multiple pipeline companies that were wanting to come across our property, he said. Some of the companies were easy to deal with and some were not. Sometimes we felt threatened by them. I felt like landowners at the time had no information and nowhere to turn and were dealing from a position of not knowing what is going on.
That is why I am fighting to ensure property owners are in the best possible position when faced with the taking of their property. In Texas, private property rights are a sacred principle, and I believe this legislation will help preserve that right without adversely affecting the businesses that are helping to grow our economy.
Malachi Solomon Tomlinson posted on the Times-Review Facebook page that he is in favor of the proposed bill.
In theory, Burns plan would give people more power over their own property against corporations, he said. Sad that we had to get to this point to make a bill when the constitution and the clause already give those rights. But what about when the state turns around and finds loopholes to seize land or work on it like they often do highways or roads? Still powerless.
Jennifer Hamblin said she thinks HB 2684 might not be effective.
We never truly own [our property] anyway even after the loan is paid off you still pay taxes, she said. You dont pay taxes they take your property either way. The government will take it like they do everything else. Plus they only give you barely what it is worth which if you try to find the same amount of property it costs double what you already had. Not very fair.
Burns said Texas is a growing state with a strong appetite for new development which has put a target on Texas property, leaving landowners searching for a fair offer and process in eminent domain cases.
The new legislation will provide for the reimbursement of landowner expenses if they are sued by a condemner and are ultimately awarded significantly more than the final offer, he said, It will also spell out the use and restriction details required within a condemners bona fide offer to ensure the entity will properly use and maintain the property.
Burns legislation was met with approval from individuals and organization who advocate on behalf of property owners across Texas.
This new legislation is a tremendous step toward fixing a faulty process that places landowners at a huge disadvantage when navigating the condemnation process, said Richard Thorpe, president of the Texas and Southwestern Cattle Raisers Association. We are grateful to have strong allies like Burns who are committed to defending the rights of private landowners and preserving our future.
HB 2684 will level the playing field
The rest is here:
Burns files bill to protect property owners - Cleburne Times-Review
Posted in Fifth Amendment
Comments Off on Burns files bill to protect property owners – Cleburne Times-Review
Secret Court Orders Aren’t Blank Checks for General Electronic Searches – EFF
Posted: at 9:59 pm
Imagine this: the government, for reasons you don't know, thinks you're a spy. You go on vacation and, while you're away, government agents secretly enter your home, search it, make copies of all your electronic devices, and leave. Those agents then turn those devices upside down, looking through decades worth of your files, photos, and online activity saved on your devices. They don't find any evidence that you're a spy, but they find something elseevidence of another, totally unrelated crime. You're arrested, charged, and ultimately convicted, yet you're never allowed to see what prompted the agents to think you were a spy in the first place.
Sounds like something from dystopian fiction, right? Yet it's exactly what happened to Keith Gartenlaub. In January 2014, the FBI secretly entered Gartenlaub's home while he and his wife were on vacation in China. Agents scoured the home, taking pictures, searching through boxes and books, andcriticallymaking wholesale copies of his hard drives.
Agents were authorized by the secret Foreign Intelligence Surveillance Court ("FISC") to search for evidence that Gartenlaub was spying for the Chinese government. Theres only one problem with that theory: the government has never publicly produced any evidence to support it. Nevertheless, Gartenlaub now sits in jail. Not for spying, but because the FBIs forensic search of his hard drives turned up roughly 100 files containing child pornography, buried among thousands of other files, saved on an external hard drive.
Gartenlaub was tried and convicted, and he appealed his conviction to the Ninth Circuit Court of Appeals. EFF (along with our friends at the ACLU) recently filed an amicus brief in support of his appeal.
There are plenty of troubling aspects to Gartenlaubs prosecution and conviction. For one, and unlike normal criminal prosecutions, neither Gartenlaub nor his lawyers have ever seen the affidavit and order issued by the FISC that authorized the search of his home. There are also legitimate concerns about the sufficiency of the evidence used to convict him.
But we got involved for a different reason: to weigh in on the Fourth Amendment implications of the FBIs searches of Gartenlaubs electronic devices. The unusual facts of this case gave us an unusually good opportunity to push for greater Fourth Amendment protections in all searches of electronic devices.
Heres why: when agents copied and searched Gartenlaubs devices, they were only authorized to search for national security-related information. But the prosecution that resulted from those searches and seizures had nothing to do with national security at all. So, either the FBI seized information that was outside of the warrant (which the Fourth Amendment prohibits); or it was relying on an exception to the warrant requirement, like plain viewan exception that allows law enforcement to seize immediately obvious contraband when the government is in a place to lawfully observe it.
Plain view makes sense in the physical world. If cops are executing a search warrant for a home to search for drugs, they shouldnt have to ignore the dead body lying in the living room. But the way plain view works in the digital contextespecially forensic computer searchesis not at all clear. How far can cops rummage around our computers for the evidence theyre authorized to look for? Does a warrant to search for evidence of drug dealing allow cops to open all the photos stored on our computer? Does an order authorizing a search for national security information let the government rifle through a digital porn collection? And where do we draw the line between a specific search, based on probable cause for specific information stored on a computerwhich the Fourth Amendment allows and a general search for evidence of criminal activitywhich the Fourth Amendment prohibits?
Our electronic devices contain decades' worth of personal information about us. And, in many ways, searches of our electronic devices can be more intrusive than searches of our homes: there is information stored on our phones, computers, and hard drives, about our interests, our political thoughts, our sexual orientations, or religious beliefs, that might never have been previously stored in our homesor, for that matter, anywhere at all. Because of the sensitivity of this data, we need clear restrictions on law enforcement searches of our electronic devices, so that every search doesn't turn into the type of general rummaging the Fourth Amendment was designed to prevent.
In our brief, we argued this case gave the Court a perfect opportunity to set a clear rule. We argued that the FBIs search of Gartenlaubs hard drives for evidence of regular, domestic crimes violated the Fourth Amendment, and we urged the Court to adopt a rule that would prohibit the FBI from using evidence that it obtained that was outside the scope of the initial search authorization. This would be a promising first step in limiting law enforcements electronic search powers and in protecting our right to privacy in the digital age.
Continued here:
Secret Court Orders Aren't Blank Checks for General Electronic Searches - EFF
Posted in Fourth Amendment
Comments Off on Secret Court Orders Aren’t Blank Checks for General Electronic Searches – EFF







