Monthly Archives: June 2017

Who were the authors of the so-called Gnostic gospels, and what did they believe? – Aleteia EN

Posted: June 24, 2017 at 2:01 pm

In order to understand the origin and doctrine of the so-called Gnostic gospels, written between the 2nd and 4th centuries and found in Nag Hammadi (Egypt), we first need to be introduced briefly to the movement that was behind them, and thus understand why Christians rejected these texts and how they have no connection with the historical Jesus.

Gnosticism (gnosis = knowledge [in Greek]) is a pre-Christian spiritual movement born of a syncretistic combination of elements of Iranian religion with other Mesopotamian traditions, ideas from Greek philosophical schools such as Platonism and Pythagoreanism, and the Jewish apocalyptic tradition. It bursts onto the public stage in the mid-2nd century as a powerful trend, coming to be represented by many teachers and various schools, and enjoying ample growth (Palestine, Syria, Arabia, Egypt, Italy and Gaul) (Garca Bazn).

It is characterized by seeking salvation through knowledge reserved for a chosen few, and by a distinct cosmological and anthropological dualism. The knowledge they were seeking was not intellectual, but spiritual and intuitivenamely, the discovery of divine nature itself: eternal, hidden, and imprisoned in the body and the psyche. This knowledge was reserved for an elite group of spiritual men.

When it came into contact with Christianity, Gnosticism gave rise to a long list of sects that mixed Gnostic and Christian elements, confusing the early Christian communities. Ancient Gnosticism, while not homogeneous in all its teachings, generally had significant contempt for the material world and for the body.

Gnostics believed that the material world in which we live is a cosmic catastrophe, and that, in some way or another, sparks of divinity have fallen into and been trapped in matter, from whence they need to escape and return to their source. They escape from matter when they gain full consciousness of their situation and their divine origin. This knowledge is called gnosis.

Therefore, the only way to achieve salvation is not by Gods action, but by acquiring personal awareness of having that divine spark in oneself. Many of these doctrines take the form of self-salvation, self-divinization, or reincarnation, with a touch of pantheism, and they see Jesus and Christ as two separate realities. These ideas appear again in New Age movements such as Conny Mendezs Christian Metaphysics, the Ishayas, and modern Gnostic and esoteric sects.

It is important to emphasize that Gnostic beliefs are strongly anti-Christian and deny the central beliefs of Christianity: the Incarnation of the Word, and the death and resurrection of Jesus Christ. Their vision of the world is, furthermore, pessimistic.

Thanks to the testimony of many Christian writings against Gnostics, we know a great deal about their beliefs. The dogmas proclaimed by early Christianity were established in order to save the original faith from contamination by the Gnostic ideas that began to proliferate in the Hellenistic world and within the Roman Empire from the 2nd to the 5th centuries.

It is not true that Gnosticism was a marginal form of Christianity, as various writers of the esoteric world often affirm; rather, the two were separate and mutually deprecating. Not only did Christians reject the Gnostics for distorting the message and life of Jesus with oriental doctrines and strange philosophies; the Gnostics also rejected and attacked orthodox Christians, because the Gnostics viewed them as spiritually inferior beings.

The attacks were mutual, but Gnosticism, due to its syncretistic nature that mixed together elements of any religion, assimilated aspects of Christianity into its teachings, and gave the impression of being a tolerant religion. This is easy to see by reading the mutual doctrinal attacks from that period.

Historian Paul Johnson writes the following in this regard: Gnostic groups adopted fragments of Christianity, but they tended to separate these elements from their historical origins. They were Hellenizing them, in the same way that they Hellenized other oriental cults (often amalgamating the results). Paul fought with all his strength against Gnosticism, since he realized that it could devour Christianity and destroy it. In Corinth, he met educated Christians who had reduced Jesus to a myth. Among the Colossians, he discovered Christians who adored intermediate spirits and angels. It was difficult to combat Gnosticism because, like the hydra, it had many heads, and was always changing. Of course, all the sects had their own codes, and they generally hated each other. Some conflated Platos cosmogony with the story of Adam and Eve, and they interpreted it in different ways; thus, the Ophites venerated serpents and cursed Jesus in their liturgy

Some authors have written that Christian dogmas changed the doctrine of early Christianity, but that is not true. Christian dogmas do not introduce any doctrinal novelty; rather, they formulate the faith clearly and explicitly in a precise theological language, so as to free it from ambiguous expressions and arbitrary interpretations that could distance it from the faith of the apostles.

Dogmas came to the aid of the faithful so that they could avoid being confused by new doctrines that were foreign to the Gospel. In a way, those Gnostic currents of thought are promulgated anew today in teachings such as those spread by the New Age movement, the Urantia Book, Sixto Paz with his books like cosmic soap operas, J.J. Bentez with his The Trojan Horse series, the followers of The DaVinci Code, and other supposed new revelations by extraterrestrials regarding Jesus. They present their fantasies as the hidden, secret, apocryphal version of history.

In times of cultural crisis, new forms of Gnosticism awaken from the depths of history with their illusions, their multicolored games, and their contortions, and they lavish their ideas on a vast public hungry for spiritual secrets and exotic mysticism. Its important to clarify that todays Gnostic movements and Gnostic churches have no historical continuity with ancient Gnosticism; rather, they are modern-day re-packagings or reinventions using elements similar to ancient forms of Gnosticism, but with ever-changing new traits in accordance with each new socio-cultural and religious context.

View original post here:
Who were the authors of the so-called Gnostic gospels, and what did they believe? - Aleteia EN

Posted in Pantheism | Comments Off on Who were the authors of the so-called Gnostic gospels, and what did they believe? – Aleteia EN

Belgium: NATO agrees to help build security institutions in Libya – AMN Al-Masdar News (registration)

Posted: at 1:59 pm

BEIRUT, LEBANON (5:05 P.M.) NATO Secretary General Jens Stoltenberg said that NATO will help the Libyan government build effective defence and security institutions in the northern African country, speaking to press in Brussels, Thursday, following a meeting with Prime Minister of the Libyan Government of National Accord (GNA) Fayez Al-Sarraj earlier that day.

Stoltenberg said that it is essential to find a political solution to the Libyan crisis and that therefore NATO has agreed to help the northern African state. He explained that a team of NATO experts recently met with Libyan government representatives to discuss what we can do to help you build an effective defence and security institutions in Libya, including a modern Ministry of Defence, a joint military staff, and intelligence services under civilian control.

The NATO Secretary General added that the main purpose of the meeting today [was] to make sure our experts will sit down as soon as possible, hopefully within a few weeks.

Advertisement

Libya has been wracked by security issues since former President Muammar Gaddafi was ousted from power in 2011, with international diplomats making a plea to stop hostilities between the LNA, led by General Khalifa Haftar, and the GNA, in a bid to avoid escalation between the two sides.

Continued here:
Belgium: NATO agrees to help build security institutions in Libya - AMN Al-Masdar News (registration)

Posted in NATO | Comments Off on Belgium: NATO agrees to help build security institutions in Libya – AMN Al-Masdar News (registration)

U.S., NATO wrap up Saber Strike 17 > U.S. Air Force > Article Display – Air Force Link

Posted: at 1:59 pm

ADAZI MILITARY BASE, Latvia (AFNS) -- Saber Strike 17, a month-long exercise including 11,000 U.S. and NATO military members from 20 countries, wraps up June 24.The exercise took place in various regions in the Baltics and Poland beginning May 28.

Saber Strike 17 is this years iteration of a long-standing Joint Chiefs of Staff-directed, U.S. European Command-scheduled, U.S. Army Europe-led cooperative training exercise.

Participating nations included Belgium, Canada, Croatia, Denmark, Estonia, Finland, France, Germany, Italy, Latvia, Lithuania, Luxembourg, Netherlands, Norway, Poland, Portugal, Slovenia, Slovakia, and the United Kingdom.

This years key training objective was to exercise with NATOs enhanced Forward Presence Battlegroups as part of a multinational division, while conducting an integrated, synchronized, deterrence-oriented field training exercise designed to improve the interoperability and readiness of participating nations armed forces.

Less than one year ago, our alliance said we were going to transition from assurance to deterrence, said Lt. Gen. Ben Hodges, the U.S. Army Europe commanding general. One of the manifestations of that transition was the creation of the eFP Battlegroups. In less than one year, these battlegroups are exercising already in Estonia, Latvia, Lithuania, and Poland. That is an amazing accomplishment for our great alliance.

Deterrence means you have to have the capability to compel or defeat a potential adversary, he continued. You have to demonstrate that capability and the will to use it, and these exercises are that demonstration.

Key training events of the exercise included a convoy by Battlegroup Poland from Orysz, Poland, to southern Lithuania; a maritime prepositioned offload of pre-staged supplies and equipment in Latvia; a Marine amphibious assault in Latvia; two combined arms live-fire exercises, one each in Poland and Lithuania; an air assault by the British Royal Marines at the Polish and Lithuanian border; and a river crossing in the same area.

If you would like to have skilled soldiers, you have to train every day, said Maj. Gen. Leonids Kalnins, the Latvian army chief of defense. If you would like to be safe as a state, you have to find allies; but if you would like to be the winner and create a great future for all countries, for all society, you have to participate in such exercises as this one.

The Saber Strike program facilitates cooperation between the U.S, allied, and partner nations to improve joint operational capability in a variety of missions and prepare participating nations and units for future operations while enhancing the NATO Alliance. During the exercise, U.S. and NATO distinguished visitors attended a demonstration of the joint and combined capabilities of the U.S. and NATO at Adazi Military Base, Latvia.

One of the visitors was Nancy Bikoff Pettit, the U.S. ambassador to Latvia, who spoke about the importance of the exercise.

I think exercises like this send a very strong message, Bikoff Pettit said. Its not only the U.S. who is interested in security and defense here in the Baltic region, its all of our NATO allies working together.

This exercise demonstrates what happens when many NATO allies come together to cooperate and demonstrate the interoperability that we have, she continued. We are really pleased with the quality of the exercises.

Saber Strike 17 promotes regional stability and security, while strengthening partner capabilities and fostering trust. The combined training opportunities that it provided greatly improve interoperability among participating NATO Allies and key regional partners.

The U.S. is here, Hodges said. Were going to continue to participate in exercises; American soldiers love serving with Latvian soldiers. This is a great place to train and were excited about doing that for as [long] as I can see.

Follow this link:
U.S., NATO wrap up Saber Strike 17 > U.S. Air Force > Article Display - Air Force Link

Posted in NATO | Comments Off on U.S., NATO wrap up Saber Strike 17 > U.S. Air Force > Article Display – Air Force Link

NSA Advocates Data Sharing Framework – Threatpost

Posted: at 1:58 pm

NEW YORKThe economics of cybersecurity are skewed in favor of attackers, who invest once and can launch thousands of attacks with a piece of malware or exploit kit. Thats why Neal Ziring, technical director for the NSAs Capabilities Directorate, wants to flip the financial equation on bad guys.

We need to conduct defenses in a way that kills an adversarys ROI, Ziring said. I want to get it down to the point where a threat actor says, I better choose carefully where I throw this malware first, because Im not going to get a third or fourth try. Today they dont have that concern.

In order to decimate a cybercriminals ROI on developing tools and attack playbooks, Ziring is calling on public agencies, companies and the security community to radically change the way they respond to cyberattacks.

In a keynote address Thursday at the Borderless Cyber conference, he said the cybersecurity community needs to work cooperatively to collectively respond to attacks in the same spirit they share threat intelligence. He argues, doing so will deprive cyber threat actors of the ability to use tools and tradecraft multiple times and starve criminals financially.

The future of cyber defense is having a shared response or coordinated response, Ziring said. We need to break out of todays enterprise mentality of every person for themselves.

The type of framework Ziring describes doesnt exist today, but two standards come close. Those are STIX (Structured Threat Information Expression) and TAXII (Trusted Automated eXchange of Indicator Information) which both deal with sharing data ahead of an attack. Neither address a key component that Ziring is calling for which is a public-private framework that creates a type of autoimmune system. If one node on the network is attacked, all other connected nodes are warned within seconds to defend against a similar attack.

There is no technological reason why this couldnt work. There are only practical obstacles like the need for interoperable standards that will enable us to do this in todays heterogeneous environments. And thats the bit we are solving right now with STIX and OpenC2, he said.

Still early in development, OpenC2 is a language that would enable the coordination and execution of command and control of defense components between domains and within a domain.

Universal support for that type of framework will take a major shift in industry mindsets. As one conference attendee noted, today breach data is a carefully guarded secret for many companies. Ninety-five percent of the dozens of breaches the attendee said he helped mitigate over the past year were kept private for fear it might hurt share prices and the companies reputation.

Ziring said the industry does not need new regulations to mandate breach transparency. The upside to information sharing is the carrot that he hopes will lure companies, sectors and communities to be part of the sharing framework. He notes there are already several critical infrastructure sectors that are required to report breaches to the DHS.

It would be better if we didnt have to create more regulation. Well have to take a wait and see approach for now, he said.

Currently, the type of framework Ziring describes is extremely rare. Within the financial services sector breach data is shared between members of a FS-ISAC (Financial Services Information Sharing and Analysis Center). When one member is attacked all other members are alerted and can fend off similar attacks before they happen.

Meanwhile, attack surfaces are growing with the rapid expansion of cloud, IoT and third-party services. Ziring said current defenses are not as scaleable as they need to be and cant match the automated nature of cyberattacks.

Using FS-ISAC as a model, Ziring envisions a future where industry-focused communities share visibility into threats. When an attack occurred, top-level community members would analyze the threat and send out counter measures to community members inoculating them within seconds or minutes from similar attacks. Its unreasonable to ask small business to be ready fight off a nation state attack themselves, he said.

To many in attendance, that top-level community member is the government. To that end, Ziring told attendees that NSA and DHS are committed to be a trusted partner in the framework through the development of standards such as OpenC2.

The government has a unique authority in this area. We are doing a lot today within the DHS and FBI. I believe government has a responsibility to share. Culturally, its going to be tough. But we need to do it, he said.

Read more from the original source:
NSA Advocates Data Sharing Framework - Threatpost

Posted in NSA | Comments Off on NSA Advocates Data Sharing Framework – Threatpost

Prior to Snowden, NSA Had No Clue How Many Were Approved to Download Top Secret Info – Washington Free Beacon

Posted: at 1:58 pm

Edward Snowden / Getty Images

BY: Natalie Johnson June 24, 2017 5:00 am

The National Security Agency did not know how manyofficials were authorized to download and transfer top secret data from its servers prior tothe high-profile leaks by former contractor Edward Snowden, according to a recently declassified government report.

The NSA was also unsuccessful in attempts to meaningfully cut the number of officials with "privileged" access to its most sensitive databases, the Department of Defense's inspector general determined in the 2016 investigation. The heavily redacted report was obtained by the New York Times through a Freedom of Information Act lawsuit.

The agency struggled to achieve the mandated reductions because it had no idea how many employees or contractors were designated data transfer agents or privileged access users prior to the leaks.

NSA officials told the inspector general they lost a "manually kept spreadsheet" that tracked the number of privileged users after receiving multiple requests from the inspector general to provide documents identifying the initial number. The lapse made it impossible for the agency to determine its baseline of privileged users from which reductions would be made.

The report said the NSA then "arbitrarily removed" privileged access from users, who were told to reapply for the authorization. While this enabled the agency to determine how many personnel were granted special access, the NSA still had no way of measuring how many privileged users had lost the clearance.

The inspector general said the NSA should have used this new baseline as a "starting point" to reduce privileged users instead of using the number to declare a reduction in those personnel.

In the case of data transfer agents, the NSA's "manually kept list" tracking the number of officials authorized to use removable devices, such as thumb drives, to transfer data to and from the agency's servers was "corrupted" in the months leading up to the Snowden leaks, the report said.

Without a baseline to measure potential reductions, the NSA then mandated data transfer agents to reapply for the authorization. Again, though this allowed the agency to determine how many personnel were given the authority, the NSA still had no way of gauging how many reductions were made, if any.

The threat proved ongoing earlier this month when former contractor Reality Winner was charged with removing classified information from NSA facilities regarding the Russian election hacks and leaking it to the press.

The initiatives to cut the number of people with access to classified data were part of a broader post-Snowden measure, called "Secure the Net," to strengthen protections of its sensitive surveillance and hacking methods.

The report determined that while the NSA made some progress in achieving reform, the agency "did not fully meet the intent of decreasing the risk of insider threats to its operations and the ability of insiders to exfiltrate data."

NSA spokeswoman Vanee Vines acknowledged the report's conclusions in a statement issued to the New York Times last week.

"We welcome the observations and opportunities for improvement offered by the U.S. Defense Department's Inspector General," she said. "NSA has never stopped seeking and implementing ways to strengthen both security policies and internal controls."

It is unclear what steps the NSA has taken since the report was finalized in August 2016 to reduce the number of employees and contractors with access to its top-secret databases.

View post:
Prior to Snowden, NSA Had No Clue How Many Were Approved to Download Top Secret Info - Washington Free Beacon

Posted in NSA | Comments Off on Prior to Snowden, NSA Had No Clue How Many Were Approved to Download Top Secret Info – Washington Free Beacon

Privileged user management trips up NSA – TechTarget

Posted: at 1:58 pm

A recently declassified report revealed the U.S. National Security Agency failed to fully secure its systems since the Edward Snowden leaks in 2013.

The report detailed the findings of the Department of Defense inspector general's 2016 assessment of the NSA's security efforts around privileged user management. The heavily redacted report was declassified after Charlie Savage, a Washington correspondent for The New York Times, filed a Freedom of Information Act lawsuit. The assessment looked at how the NSA handles privileged access management, and, according to the report, the NSA was found wanting.

After Edward Snowden leaked over a million files in 2013, the NSA began an initiative, dubbed Secure the Net (STN), with seven privileged user management goals. The inspector general's assessment found that the NSA met only four out of the seven goals: developing and documenting a plan for a new system administration model; assessing the number of system administrators across the enterprise; implementing two-factor access controls over data centers and machine rooms; and implementing two-factor authentication controls for system administration.

According to the report, dated Aug. 29, 2016, not all of the four privileged user management initiatives were fully met. "[The] NSA did not have guidance concerning key management and did not consistently secure server racks and other sensitive equipment in the data centers and machine rooms in accordance with the initiative requirements and policies, and did not extend two-stage authentication controls to all high-risk users," the report read.

Additionally, the assessment found that three of the seven STN initiatives for strong privileged user management were not accomplished. The NSA was supposed to "fully implement technology to oversee privileged user activities; effectively reduce the number of privileged access users; and effectively reduce the number of authorized data transfer agents."

There were 40 STN initiatives in total, though the assessment focused on the seven related to privileged access management. The conclusion reached in the assessment was, while the NSA was successful in part, it "did not fully address all the specifics of the recommendations."

Learn everything you need to know about privileged access management in the enterprise

Find out how to manage and monitor privileged user accounts

Test your privileged user management knowledge with this quiz

Original post:
Privileged user management trips up NSA - TechTarget

Posted in NSA | Comments Off on Privileged user management trips up NSA – TechTarget

NSA Names Whatcom as One of Four Centers of Academic Excellence in Cyberdefense National Resource Centers – whatcomtalk.com

Posted: at 1:58 pm

Submitted by:Whatcom Community College

Whatcom Community College (WCC) has been selected by the National Security Agency (NSA) to lead efforts to improve and expand cybersecurity education nationwide as one of four Centers of Academic Excellence in Cyberdefense (CAE-CD) National Resource Centers. In this role, WCC will function as a super hub, helping to support and guide 10 regional centers. Whatcom will lead the CAE-CD mentor program, guiding university and college administrators and faculty through the rigorous application for the CAE-CD designation. The NSA bestows the designation, which recognizes colleges and universities that meet industry-recognized standards of education and training in the cyberdefense field, with curriculum mapped to the NSAs latest requirements.

The College will receive up to $1 million in federal grant funding, which will significantly expand the number of participating institutions in the United States. As one of four national centers funded to support various aspects of the initiative, WCC was designated as a National Center of Academic Excellence in Information Assurance/Cyber Defense 2-year education (CAE2Y) in 2011 and, again, in 2014. Whatcom was among the first community colleges in the nation to earn the designation.

WCC has years of experience and is a national leader in cybersecurity education. Our CIS and cybersecurity programs are models of excellence, WCC President Kathi Hiyane-Brown said. Were honored to share our program models with other academic institutions to help prepare qualified employees for the cyberdefense workforce, which is vital to our national security.

The grant project will leverage the mentor model program that WCC developed under previous grants. The program will connect candidate institutions with a qualified mentor who will assist the applicant in improving their cybersecurity program and completing the CAE-CD application. This process helps to ensure that the application is of high quality and meets NSA standards prior to submission. Through this process, colleges and universities can save time, effort, resources and frustration, and achieve a meaningful designation that will help attract faculty and students and even spur economic development in their region.

WCC offers a bachelor of applied science (BAS) in IT Networking as well as two-year degrees and certificates in computer information systems and cybersecurity (with opportunities to transfer to regional universities). WCC is also the lead institution for CyberWatch West a National Science Foundation (NSF) regional center for cybersecurity education and for C5 (Catalyzing Computing and Cybersecurity at Community Colleges), also funded by the NSF. More than 110 universities, colleges, high schools and educational organizations belong to the CyberWatch West consortium. For more information about WCCs computer information systems and cybersecurity programs, visit whatcom.edu/cis.

Read this article:
NSA Names Whatcom as One of Four Centers of Academic Excellence in Cyberdefense National Resource Centers - whatcomtalk.com

Posted in NSA | Comments Off on NSA Names Whatcom as One of Four Centers of Academic Excellence in Cyberdefense National Resource Centers – whatcomtalk.com

In Murr V. Wisconsin, SCOTUS deals another blow to the Fifth Amendment – Hot Air

Posted: at 1:57 pm

A number of sane people around the commentariat have been up in arms over the recent decision handed down by the Supreme Court in Murr v. Wisconsin. And with very, very good reason. Weve dealt with this case here before as its played out through the lower courts, but as a refresher it deals with the situation encountered by Donna Murr and her siblings in Wisconsin. The family owned two small parcels of land along the St. Croix River. They had a cabin on one of the lots and the adjoining property was left vacant as an investment. But when they attempted to finally sell the vacant lot in 2004 they learned that the state had changed the rules on them, making it impossible to sell the land to anyone other than the county unless they combined the properties and relinquished the entire package.

The property in question had been valued at $400K. The county the only entity legally entitled to buy it offered them $40K.

Because the state, through changes in laws which did not apply when the family acquired the land, had completely gutted its worth, the Murr family sued to be properly compensated under the Takings Clause. With this weeks decision, those hopes are dashed. Eric Boehm at Reason explains what this is doing to the rights of property owners.

When governments issue regulations that undermine the value of property, bureaucrats dont necessarily have to compensate property holders, the Supreme Court ruled Friday

The ruling could have implications that go well beyond the 2.5 acres of land in Wisconsin.

Several western states filed amicus briefs in the case on behalf of the Murr family (as did the Reason Foundation, which publishes this blog). Though states like Nevada and Arizona did not have a direct interest in the Murrs ability to sell their vacant land, they saw the case as having important implications for conflicts over federal lands.

Many state governments own contiguous lots and large bodies of water near areas owned by the federal government (military bases, national parks, etc). If those government bodies are allowed to merge contiguous lots for regulatory purposes, the federal government could impose severe restrictions on state land and wouldnt have to pay consequences, warned Ilya Somin, a professor of law at George Mason University who authored the amicus brief on behalf of those western states.

What we are seeing here is a continuation of what I still maintain is possible the worst ruling from the Supreme Court in the history of the nation, Kelo v. City of New London. That was the dark day when the Supremes ruled that the idea of public use in the Takings Clause could be reinterpreted into a Reverse Robin Hood scenario by defining it as the far more ambiguous public benefit. When that case was decided in 2005 the principal dissent was written by OConnor, but in a separate dissent, Associate Justice Clarence Thomas wrote the following:

Something has gone seriously awry with this Courts interpretation of the Constitution. Though citizens are safe from the government in their homes, the homes themselves are not.

This ruling is yet another weakening of the Takings Clause. And the reason I say this is a continuation of Kelo is that you need only look at who is voting on these rulings. In Kelo, the 5-4 decision was delivered by Stevens, Souter, Ginsburg and Breyer with the tie-breaking vote cast by Kennedy. Now, In Murr, the 5-3 decision came from Breyer, Ginsberg, Kagan, (who replaced Stevens under Obama) and Sotomayor (who replaced Souter under Obama) with both the tie-breaking decision and the written opinion coming once again from Kennedy. Anyone seeing a pattern here?

It was 5-3 because Gorsuch wasnt involved with the original hearing and didnt vote. But even if he had, the Fifth Amendment still would have lost 5-4 yet again. Its not enough just to keep hold of the seat that Justice Scalia occupied. Kennedy is unreliable in too many instances when given a choice between more power for the government over the individual or less. The other four liberals are lost causes, apparently never having seen a case of bigger government which they couldnt celebrate. We need a real majority on the Supreme Court with conservative, small government principles in their hearts or these erosions of fundamental rights will continue.

Read more from the original source:
In Murr V. Wisconsin, SCOTUS deals another blow to the Fifth Amendment - Hot Air

Posted in Fifth Amendment | Comments Off on In Murr V. Wisconsin, SCOTUS deals another blow to the Fifth Amendment – Hot Air

Former AG Kane takes Fifth in wiretap case – Philly.com – Philly.com

Posted: at 1:57 pm

Former Pennsylvania Attorney General Kathleen G. Kane, free on bail while she appeals her perjury conviction, invoked her Fifth Amendment right not to testify this week in a court hearing in which an accused Pittsburgh killer is challenging wiretap evidence against him.

In a complicated pretrial legal fight, Price Montgomery, an alleged drug dealer charged with fatally shooting a witness, is seeking to exploit a feud between Kane and one of her top deputies that broke out in 2014, at the same time the Attorney Generals Office had tapped Montgomerys cellphone.

Kane went on a vacation to Haiti at that time, and because of the feud had refused to sign routine paperwork authorizing deputy Adrian King to make key decisions in her absence. Nonetheless, King approved the wiretap, using an autopen to add Kanes signature to the document; the recorded conversations allegedly implicate Montgomery.

Now, Montgomery and his codefendants want the wiretap evidence barred on grounds that the tap was approved without proper legal authority.

The hearing showed howKanes tumultuous tenure as attorney general continues to have a ripple effect, almost a year after she stepped down.

Kane, who has kept a low profile since her conviction, took the stand briefly Tuesday in federal court in Pittsburgh only to decline to answer questions, according to several courtroom observers. King had testified the day before, saying that Kane approved the wiretap in a call from the airport as she left for her trip. King provided cellphone records and his notes from the call to back up his account.

King was a key witness against Kane in her criminal case. The former attorney general took note of that in explaining why she took the Fifth.

I know how this works: I say one thing. Adrian King says another. I get charged with perjury, Kane told federal prosecutors a few days before the hearing, according to defense attorney Michael DeRiso, who represents one of Montgomerys codefendants. He said prosecutors had shared notes of Kanes remarks with them.

Kane could not be reached for comment; a call to her home this week went unanswered.

Kanes lawyer for the hearing, Thomas J. Farrell, refused to say whether he was her lawyer. Federal prosecutors also declined comment. U.S. District Judge Mark R., Hornak will rule on the suppression motion in the fall.

Montgomery, 36, is charged with the Aug. 22, 2014, killing of Tina Crawford, 34, also of Pittsburgh, who was shot 10 times at her home as she was leaving to talk with federal prosecutors. Her mother was wounded in the same attack.

Two months before the shootings, Montgomery had been arrested on drug-dealing charges after police seized 1,500 bricks of heroin, more than $100,000, and 16 handguns, shotguns, and rifles in a raid.

Though the wiretap was placed by the Attorney Generals Office, federal prosecutors are pursuing the case. DeRiso said that knocking out the wiretap evidence would undermine the drug charges, but was uncertain about its impact on the charge involving the killing of the witness.

In legal papers defending Kanes right to invoke her constitutional right against self-incrimination, Farrell noted that even innocent people may cite the Fifth Amendment so as not to provide any information to authorities.

He also noted that Kanes conflict with King was explored during the 2016 trial in Montgomery County that ended with her conviction on perjury and obstruction charges.

A jury found that she lied under oath in denying that she had unlawfully leaked confidential investigative material to a newspaper in a bid to embarrass a political enemy. King, now a lawyer in Philadelphia, was a key prosecution witness, testifying that he had warned Kane not to leak material. His relationship with Kane grew chilly after he provided that advice.

Kane was sentenced to serve 10 to 23 months in jail. She has appealed her conviction to Superior Court.

Published: June 24, 2017 11:32 AM EDT

We recently asked you to support our journalism. The response, in a word, is heartening. You have encouraged us in our mission to provide quality news and watchdog journalism. Some of you have even followed through with subscriptions, which is especially gratifying. Our role as an independent, fact-based news organization has never been clearer. And our promise to you is that we will always strive to provide indispensable journalism to our community. Subscriptions are available for home delivery of the print edition and for a digital replica viewable on your mobile device or computer. Subscriptions start as low as 25 per day. We're thankful for your support in every way.

Continued here:
Former AG Kane takes Fifth in wiretap case - Philly.com - Philly.com

Posted in Fifth Amendment | Comments Off on Former AG Kane takes Fifth in wiretap case – Philly.com – Philly.com

Should regulatory takings doctrine be reconsidered from the ground up? – Washington Post

Posted: at 1:57 pm

Justice Clarence Thomas is well known for writing separate opinions highlighting the gap between the Supreme Courts contemporary jurisprudence in a given area and the original constitutional understanding or original public meaning of the relevant constitutional provisions. Earlier this week, for example, Thomas suggested that the court should reconsider its qualified immunity jurisprudence.

Friday, inMurr v. Wisconsin, Thomas suggested that the court shouldreconsider the constitutional foundation of regulatory takings doctrine. Although he joined the dissent authored by Chief Justice John G. Roberts Jr., Thomas also wrote separately to highlight the tension between the courts doctrine and the original meaning of the Fifth Amendments takings clause. He wrote:

I join THE CHIEF JUSTICEs dissent because it correctly applies this Courts regulatory takings precedents, which no party has asked us to reconsider. The Court, however, has never purported to ground those precedents in the Constitution as it was originally understood. In Pennsylvania Coal Co. v. Mahon, 260 U. S. 393, 415 (1922), the Court announced a general rule that if regulation goes too far it will be recognized as a taking. But we have since observed that, prior to Mahon, it was generally thought that the Takings Clause reached only a direct appropriation of property, Legal Tender Cases, 12 Wall. 457, 551 (1871), or the functional equivalent of a practical ouster of [the owners] possession, Transportation Co. v. Chicago, 99 U. S. 635, 642 (1879). Lucas v. South Carolina Coastal Council, 505 U. S. 1003, 1014 (1992). In my view, it would be desirable for us to take a fresh look at our regulatory takings jurisprudence, to see whether it can be grounded in the original public meaning of the Takings Clause of the Fifth Amendment or the Privileges or Immunities Clause of the Fourteenth Amendment. See generally Rappaport, Originalism and Regulatory Takings: Why the Fifth Amendment May Not Protect Against Regulatory Takings, but the Fourteenth Amendment May, 45 San Diego L. Rev. 729 (2008) (describing the debate among scholars over those questions).

The paper Thomas cites at the end of his opinion is by University of San Diego law professor Michael Rappaport, a prominent originalist scholar (and contributor to the Originalism Blog). Here is the abstract to Rappaports paper:

This article explores the widely disputed issue of whether Takings Clause protects against regulatory takings, offering a novel and intermediate solution. Critics of the regulatory takings doctrine have argued that the original meaning of the Fifth Amendment Takings Clause does not cover regulatory takings. They have quickly moved from this claim to the conclusion that the incorporated Takings Clause under the Fourteenth Amendment also does not cover regulatory takings.

In this article, I accept the claim that the Fifth Amendment Takings Clause does not cover regulatory takings, but then explore the possibility that the incorporated Takings Clause does cover such takings. Applying Akhil Amars theory of incorporation, I argue that there are strong reasons, based on history, structure, and purpose, to conclude that the Takings Clause had a different meaning under the Fourteenth Amendment. Amar argues that the Bill of Rights was dominated by republican ideas, but that the Fourteenth Amendment was founded on more liberal notions intended to protect individual rights. This would suggest that a broad reading of the Takings Clause would further the principles underlying the Fourteenth Amendment.

Moreover, that some state courts had come to apply takings principles to regulatory and other nonphysical takings in the period between the enactment of the Bill of Rights and the Fourteenth Amendment provides additional support for the possibility that the Fourteenth Amendment enactors would have understood it to apply to regulatory takings. While the paper does not attempt to prove that the Fourteenth Amendment Takings Clause applies to regulatory takings, leaving that task to others, it argues that critics of regulatory takings doctrine should no longer simply assume that the Constitutions original meaning does not apply to state regulatory takings.

Regulatory takings is not the only context in which property rights activists may be asking the Fifth Amendment to do the constitutional work better done by the 14th Amendment (if it is to be done at all). Eminent domain may be another (for reasons I briefly sketch in this exchange).

If there is to be greater clarity about regulatory takings, it might help if the entire doctrine rested on a more secure and constitutionally sound foundation.

Continue reading here:
Should regulatory takings doctrine be reconsidered from the ground up? - Washington Post

Posted in Fifth Amendment | Comments Off on Should regulatory takings doctrine be reconsidered from the ground up? – Washington Post