The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: June 2017
NATO military chief in Canberra for talks – 9news.com.au
Posted: June 14, 2017 at 3:56 am
A top NATO military chief can't see an end date to operations in Afghanistan on the horizon.
Chairman of the NATO Military Committee, General Petr Pavel is in Canberra for talks with Australia's Defence Force Chief Mark Binskin this week.
The Turnbull government recently made a modest boost to Australia's military contribution in Afghanistan - an advisory and mentoring role - at the request of NATO.
This brought Australia's total deployment to 300 defence personnel up by 30.
General Pavel said NATO was doing its best to align military and financial support with the Afghanistan government's next four-year plan.
"We have to take a long-term approach," he told reporters in Canberra on Monday.
"The scope, duration of the mission has not been set, we talk about (a) conditions-based approach."
NATO countries including the US are still considering adjustments to their own military commitments.
General Pavel said as well as discussing Afghanistan, the purpose of his visit was to also better understand regional issues such as the South China Sea dispute.
AAP 2017
Auto News:2017 Mercedes-AMG E63 S - the one we've been waiting for - caradvice.com.au
Career news: Three common career progression questions answered- seek.com.au
Auto news:New BMW M5 detailed - caradvice.com.au
Auto news:Ford Australia vs Holden; who will win the battle on the racetrack? - caradvice.com.au
Auto news:Suzuki is Australia's lovable underdog - caradvice.com.au
Auto news:Jaguar's tough limited-tun XE SW Project 8 sports sedan - caradvice.com.au
Auto news:Battle of the V8 Beasts: 5.0L Ford Mustang vs 6.2L Holden Commodore - caradvice.com.au
Follow this link:
NATO military chief in Canberra for talks - 9news.com.au
Posted in NATO
Comments Off on NATO military chief in Canberra for talks – 9news.com.au
Director General of the NATO International Military Staff addresses the Black Sea and Balkans Security Forum – NATO HQ (press release)
Posted: at 3:56 am
Lieutenant General Jan Broeks, Director General of the NATO International Military Staff (DGIMS) visited Romania on 9-11 June 2017. During his visit, Lieutenant General Broeks addressed the Black Sea and Balkans Security Forum and held staff talks with Romanian officials.
At the Black Sea and Balkans Security Forum, Lieutenant General Broeks participated in a panel on the Security challenges in the Black Sea area and the Balkans. Other participants in the panel included: Mr. Dan Dungaciu, member of the Scientific Council of the New Strategy Center (Chair); General Nicolae Ciuc, Chief of the Romanian General Staff; Mr. Mustafa Aydin, rector of Kadir Has University Istanbul and president of the International Relations Council of Turkey; Mr. Przemysaw urawski vel Grajewski, advisor for defence issues to the Polish Minister of Foreign Affairs; and Mr. Robert Bari, Lecturer at the Croatian Defense Academy.
During his address, Lieutenant General Broeks highlighted the importance of the Black Sea as a key strategic intersection linking NATOs Eastern and Southern flanks and the Balkans role as a gateway to Europe from the Southern Caucuses, the Eastern Mediterranean and the broader Middle East. Lieutenant General Broeks also stressed that the Region has become the central focus of Russias larger strategic ambitions and revisionist agenda, making it a potential flashpoint for future conflict on NATOs border.
While in Bucharest, the Director General met with Romanian military officials to discuss the security environment in the Black Sea region and the Romanian Armed Forces transformation process. Lieutenant General Broeks took the opportunity to thank Romania for hosting and activating the Multinational Division South-East Headquarters as well as its role in strengthening NATOs forward presence with a Romanian-led multinational framework brigade on land. They also discussed the deployment of the British Typhoon fighter aircrafts who will be working alongside the Romanian Air Force to help keep the skies over Romania safe, as part of NATOs Air Policing mission.
Finally, Lieutenant General Broeks praised Romania for its valuable contributions to NATOs Resolute Support Mission in Afghanistan and to the KFOR peacekeeping mission in Kosovo.
See the original post here:
Director General of the NATO International Military Staff addresses the Black Sea and Balkans Security Forum - NATO HQ (press release)
Posted in NATO
Comments Off on Director General of the NATO International Military Staff addresses the Black Sea and Balkans Security Forum – NATO HQ (press release)
Is the Old NATO Dead? – The National Interest Online
Posted: at 3:56 am
When President Donald Trump travels to Poland this week to meet with its embattled president Andrzej Duda, the two will have a lot to talk about. Both are alternately ridiculed and pilloried in the international press and both are intensely disliked at European Union headquarters in Brussels. Both have been labeled nationalists, demagogues and even dictators-in-the-making. And both of them question NATOs capacity to act as an effective defensive force.
Since taking office in 2015, Duda has consistently pushed for a stronger NATO presence in Poland. He used his first major English-language interview as president to push for Poland to replace Germany as the real eastern flank of the alliance, and his government has put real money on the table toward that end. Poland is one of only five NATO members to meet its 2 percent of GDP military spending commitment.
By comparison, Germany spends 1.19 percent of its GDP on defense, sixteenth among the twenty-nine NATO members. Poland also meets the less well-known NATO target that at least 20 percent of defense spending should be on equipment, with 25.8 percent of its budget going to procurement. Germany, by contrast, spends only 13.7 percent of its defense budget on equipment, with the result that some German units are armed with broomsticks instead of guns.
What a change a century makes. Until its virtual dismantling in the 1990s, the German Bundeswehr was NATOs main fighting force. While France cowered safely behind a line of American bases in the United Kingdom, West Germany and Italy, the Bundeswehr contributed the majority of NATOs frontline troops, tanks and airplanes. In the darkest days of the Cold War, West Germany was the bulwark of European defense. No longer. With Germany now lacking the capacity to mount any serious military operationand no other European country ready to step into the breachNATO's vaunted Article 5 commitment to collective defense has become, in effect, a unilateral U.S. security guarantee. Trump has now publicly accepted the mantle of that responsibility. But that doesnt change the fact that all for one and one for all only makes sense if all have the capacity to help the one.
It is becoming clearer by the day that most Europeans now understand Article 5 as a one-way American commitment to their security. It is true that NATO stood by the United States on September 11, with some NATO countries (the UK in particular) making serious commitments and suffering serious casualties in Afghanistan. But the military budgets of Americas NATO allies declined precipitously between 200815. Only a few are now able to defend themselves, never mind come to the aid of others.
In Europe, Poland is now NATOs central front, and the Polish government is aching for a more permanent NATO (read: American) presence in the country. The simple fact is that Poland is now the bulwark of Europe. It needs American help to hold the line. And given its deep involvement in Ukrainian affairs, Poland is likely to be ever more useful to the United States as an outpost at the heart of Eastern Europe.
Neither Trump nor Duda is likely to be impressed by European Commission president Jean-Claude Junckers call for a European defense capability to match those of the United States, China and Russia. Speaking in English at a European security conference in Prague, Juncker proposed what has been called a defense spending spree of 90 million euros over three years. Thats equivalent to just $100 million, or about the cost of a single F-35 fighter. Over three years.
Ironically, European leaders bristled last month in Brussels when Trump publicly and privately berated them for not spending enough on defense. Now, despite their overwhelmingly negative response to Trumps demands, they are calling for more European spending on defense. But calling for and doing are two different things. European leaders specialize in calling for. America is better known for doing.
Read the original post:
Is the Old NATO Dead? - The National Interest Online
Posted in NATO
Comments Off on Is the Old NATO Dead? – The National Interest Online
Serbia to sue NATO for use of depleted uranium munitions in 1999 bombing – Press TV
Posted: at 3:56 am
NATO forces load bombs at Aviano air base, in northeastern Italy, on March 29, 1999. (File photo by AFP)
Serbia has formed an international legal team to file a lawsuit against NATO over its alleged use of depleted uranium munitions during its three-month bombing of Yugoslavia 18 years ago.
Lawyers and doctors from the European Union, Russia, China, India, Britain, Turkey, and Serbia are preparing the lawsuit in an effort to charge 19 countries that were part of the alliance during the 1999 bombing of Yugoslavia.
NATO launched a series of airstrikes against the then-Federal Republic of Yugoslavia in March 1999, during the Kosovo War. The airstrikes, which had no United Nations mandate, claimed the lives of hundreds of civilians.
The alliance launched the military campaign after the then-Yugoslav president Slobodan Milosevic refused to agree to a peace deal to end a crackdown on Kosovo Albanians seeking independence.
Eighteen years on, the bombings still continue to take civilian toll due to the disastrous consequences of the alleged use of uranium.
The NATO bombing of Serbia in 1999 used between 10 and 15 tons of depleted uranium, which caused a major environmental disaster, said Srdjan Aleksic, a Serbian lawyer who leads the legal team.In Serbia, 33,000 people fall sick because of this every year. That is one child every day.
The lawyer said the then-NATO members, including the US, Britain, Turkey, France, and Germany, needed to pay compensation for the financial and non-financial damages... to all the citizens who died or fell sick as a proven result of the NATO bombing.
In addition to providing treatment to our citizens who are suffering from cancer, he said that the alliance must also provide the necessary technology and equipment to remove all traces of the depleted uranium from Serbia.
At least 50 people from the Serbian city of Nis, who have been suffering from cancer and have seemingly relevant medical documentation, have also asked the legal team of the lawyers and professors to represent them in the case against NATO.
NATOs press office said it was aware of the claims by Serbiabut refused to give further comments.
In a report on depleted uranium conducted back in 2000, the alliance admitted the use of the weapons both in Iraq and the Balkans. According to the report, American and British troops fired about 300 metric tons of depleted uranium ammunition in Iraq.
The report also said that NATO confirmed the use of DU [depleted uranium] ammunition in Kosovo battlefields, where approximately 10 metric tons of DU were used.
The UN International Criminal Tribunal for the former Yugoslavia has also admitted the use of depleted uranium projectiles by NATO aircraft during the bombing, but said there was no specific treaty ban on the use of DU projectiles.
The UN General Assembly last year passed a new resolution the sixth to be adopted since 2007 on depleted uranium weapons, which highlighted the concerns of affected countries. The US, UK, France, and Israel have been continuously opposing such resolutions.
Original post:
Serbia to sue NATO for use of depleted uranium munitions in 1999 bombing - Press TV
Posted in NATO
Comments Off on Serbia to sue NATO for use of depleted uranium munitions in 1999 bombing – Press TV
NATO Unveils New Special Livery E-3A AWACS for 35th Anniversary – The Aviationist (blog)
Posted: at 3:56 am
}ksj3K/[Isrg"!6E2|XduVVOCv%z&cOSIh4Fn?|lO]vGh=9}/$+k~j8v5m6cv,*vl6E5^'A^M*d9ZkSe.~'mq$oE9D~.?8pvx8'{|Nn9^9=UZ !ku ;<|_v(skg%_&f#-vxh~X(Gky(l1EAnCDCU-r_{{r^c5E@N1PMsO5LP5u,[ Xbm:U"Q'rIC:/ K &:Hu3&@@Q]"Y5uc.`o4e/N AK )J}alZ rM:`'!rfAOxWY!d
xTZux7U'A?|Wl^1t]Ekl8kE*/|x8 Read more from the original source:
NATO Unveils New Special Livery E-3A AWACS for 35th Anniversary - The Aviationist (blog)
Posted in NATO
Comments Off on NATO Unveils New Special Livery E-3A AWACS for 35th Anniversary – The Aviationist (blog)
Win XP patched to avert new outbreaks spawned by NSA-leaking Shadow Brokers – Ars Technica
Posted: at 3:56 am
On Tuesday, Microsoft took the highly unusual step of issuing security patches for XP and other unsupported versions of Windows. The company did this in a bid to protect the OSes against a series of "destructive" exploits developed by, and later stolen from, the National Security Agency.
According to this updated Microsoft post, Tuesday's updates include fixes for three other exploits that were also released by the Shadow Brokers. A Microsoft blog post announcing the move said the patches were prompted by an "elevated risk of destructive cyberattacks" by government organizations.
"In reviewing the updates for this month, some vulnerabilities were identified that pose elevated risk of cyberattacks by government organizations, sometimes referred to as nation-state actors, or other copycat organizations," Adrienne Hall, general manager of crisis management at Microsoft, wrote. "To address this risk, today we are providing additional security updates along with our regular Update Tuesday service. These security updates are being made available to all customers, including those using older versions of Windows."
The down-level patches come in addition to the normal Patch Tuesday releases. Normal releases are delivered automatically through the Windows Update mechanism to devices running supported Windows versions, including 10, 8.1, 7, and post-2008 Windows Server releases. The down-level patches, by contrast, must be manually downloaded and installed. They are available in the Microsoft Download Center or, alternatively, in the Update Catalog and can be found here.
In a separate blog post, Eric Doerr, general manager of the Microsoft Security Response Center, said the move was designed to fix "vulnerabilities that are at [heightened] risk of exploitation due to past nation-state activity and disclosures." He went on to urge users to adopt new Microsoft products, which are significantly more resistant to exploits, and not to expect regular security fixes in the future.
"Our decision today to release these security updates for platforms not in extended support should not be viewed as a departure from our standard servicing policies," he wrote. "Based on an assessment of the current threat landscape by our security engineers, we made the decision to make updates available more broadly."
The only other time in recent memory Microsoft has patched an unsupported version of Windows was in 2014, when it issued a critical update for Windows XP during the same week it decommissioned the version. Tuesday's move suggests Microsoft may have good reason to believe attackers are planning to use EsteemAudit, ExplodingCan, and EnglishmanDentist in attacks against older systems. Company officials are showing that, as much as they don't want to set a precedent for patching unsupported Windows versions, they vastly prefer that option to a potential replay of the WCry outbreak.
Read more here:
Win XP patched to avert new outbreaks spawned by NSA-leaking Shadow Brokers - Ars Technica
Posted in NSA
Comments Off on Win XP patched to avert new outbreaks spawned by NSA-leaking Shadow Brokers – Ars Technica
Intel Chief Says He Cannot Reveal How Many Americans the NSA … – Gizmodo
Posted: at 3:56 am
Americas top intelligence official is reneging on a promise made under the Obama administration to estimate how many Americans have been spied on using a warrant-less surveillance law intended to target foreigners. The decision to abandon that commitment isnt sitting well with civil liberties advocates who formed a coalition this week in protest.
Director of National Intelligence Dan Coats told a Senate panel last week that it was infeasible to generate an exact, accurate, meaningful, and responsive methodology to show how many Americans have been spied on under Section 702 of the Foreign Intelligence Surveillance Actthe law which enables intelligence agencies to spy on the communications of foreigners with the help of American companies such as AT&T.
Coats said the National Security Agency had already undergone a Herculean effort to determine the number, but somehow failed miserably.
Given that the NSA claims to be the largest employer of mathematicians in the country (the exact number is classified), Coatss explanation that counting is really hard seemed fairly absurd. One can only conclude that the number of Americans being spied on incidentally under 702 is so shockingly high that announcing it would endanger any chance of renewing 702's authority before it expires on January 1, 2018.
Either way, the official President Trump appointed to lead the Intelligence Community seems to have thrown his hands in the air with regard to this simple accountability request. Its astonishing, really, that the White House was able to find someone who is less inclined to be straightforward with the American public than James Clapper, the former director, whose New York Times obituary will undoubtedly contain an accusation of perjury.
Late Monday, the American Civil Liberties Unionalong with more than two dozen other digital and civil rights groupssigned a letter [PDF] criticizing Coats decision to leave the public in the dark, and with justifiable and significant concerns about the effect of Section 702 surveillance on Americans privacy and civil liberties. The letter was sent to Office of the Director of National Intelligence and then forwarded [PDF] to the chairman and ranking member of the House Judiciary CommitteeRepresentatives Bob Goodlatte and John Conyers, respectively.
Members of Congress should be outraged that the NSA has reneged on its commitment to provide an estimate of the number of Americans that the NSA spies on under Section 702, and should use every tool at their disposal to demand that this information be provided, Neema Singh Guliani, ACLU legislative counsel, said in a statement.
The executive branch has provided no credible explanation for their abrupt reversal in position, which comes after months of discussions with Congressional staff on methodologies to obtain the exact information that they now claim is impossible to determine, Guliani continued. This decision is not rooted in practicalities, but rather part of an overall effort to withhold key information about Section 702 while the program is being debated in Congress.
Aside from the ACLU, 32 other groups signed on to the letter, including the Brennan Center for Justice, the Electronic Frontier Foundation, Demand Progress, and the Sunlight Foundation. The groups charge Coats with backtracking specifically for political reasons (as opposed to practical ones). It is critical to allow the American people and their representatives to fully understand the impact Section 702 has on their privacy and civil liberties as Congress considers reauthorization of the law, they said.
Rep. Conyers did not immediately respond to a request for comment. An aide to Rep. Goodlatte referred questions to a Judiciary Committee spokesperson, who likewise did not return a request for comment.
Update, 1:56pm: A Republican House Judiciary Committee aide provided Gizmodo the following comment:
As the House Judiciary Committee seeks to reauthorize and reform FISA Section 702, it is imperative that Members of Congress understand the impact of this intelligence-gathering program on U.S. persons. While Director Coats has indicated that it is not feasible to provide this information, the Committee will continue to explore with the agencies various options for obtaining the desired information. Chairman Goodlatte looks forward to working with Director Coats and others on efforts to reauthorize this critical intelligence-gathering program and to ensure it protects Americans civil liberties.
Read more:
Intel Chief Says He Cannot Reveal How Many Americans the NSA ... - Gizmodo
Posted in NSA
Comments Off on Intel Chief Says He Cannot Reveal How Many Americans the NSA … – Gizmodo
How should an originalist rule in the Fourth Amendment cell-site case? – Washington Post
Posted: at 3:55 am
The Supreme Court recently agreed to hear Carpenter v. United States, a case on whether the Fourth Amendment protects historical cell-site records. In this post, I want to focus on a small but potentially important part of the Carpenter litigation: How should an originalist Justice vote in the case? There are many different flavors of originalism, of course, and originalist arguments often can be used to argue for different outcomes. But in this post I want to discuss one originalist argument that I think is significant. Ill then ask readers to weigh in on it.
Lets start with the obvious: The Framers could not have imagined a world of cell-site records. And the original public meaning of the Fourth Amendment is open to a wide range of interpretations at different levels of generality. With that said, the text of the Fourth Amendment does have an important clue about what the Fourth Amendment was originally understood to mean that might be important to the Carpenter case.
Heres the opening text of the Fourth Amendment:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated[.]
As Justice Antonin Scalia emphasized in his concurrence in Minnesota v. Carter, the word their can be understood as important in historical context. It signals that to assert a Fourth Amendment violation, a persons own self, houses, papers or effects must be unreasonably searched or seized.
Heres what Scalia wrote in Carter, with emphasis in the original:
The Fourth Amendment protects [t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures . . . . U. S. Const., Amdt. 4 (emphasis added). It must be acknowledged that the phrase their . . . houses in this provision is, in isolation, ambiguous. It could mean their respective houses, so that the protection extends to each person only in his own house. But it could also mean their respective and each others houses, so that each person would be protected even when visiting the house of someone else. As todays opinion for the Court suggests, however, ante, at 88-90, it is not linguistically possible to give the provision the latter, expansive interpretation with respect to houses without giving it the same interpretation with respect to the nouns that are parallel to housespersons, . . . papers, and effectswhich would give me a constitutional right not to have your person unreasonably searched. This is so absurd that it has to my knowledge never been contemplated. The obvious meaning of the provision is that each person has the right to be secure against unreasonable searches and seizures in his own person, house, papers, and effects.
The founding-era materials that I have examined confirm that this was the understood meaning. . . . Like most of the provisions of the Bill of Rights, the Fourth Amendment was derived from provisions already existing in state constitutions. Of the four of those provisions that contained language similar to that of the Fourth Amendment, two used the same ambiguous their terminology. See Pa. Const., Art. X (1776) (That the people have a right to hold themselves, their houses, papers, and possessions free from search and seizure . . .); Vt. Const., ch. I, XI (1777) (That the people have a right to hold themselves, their houses, papers, and possessions free from search or seizure. . .). The other two, however, avoided the ambiguity by using the singular instead of the plural. See Mass. Const., pt. I, Art. XIV (1780) (Every subject has a right to be secure from all unreasonable searches, and seizures of his person, his houses, his papers, and all his possessions); N. H. Const., XIX (1784) (Every subject hath a right to be secure from all unreasonable searches and seizures of his person, his houses, his papers, and all his possessions).
The New York Convention that ratified the Constitution proposed an amendment that would have given every freeman a right to be secure from all unreasonable searches and seizures of his person his papers or his property, 4 B. Schwartz, The Roots of the Bill of Rights 913 (1980) (reproducing New York proposed amendments, 1778) (emphases added), and the Declaration of Rights that the North Carolina Convention demanded prior to its ratification contained a similar provision protecting a freemans right against unreasonable searches and seizures of his person, his papers and property, id., at 968 (reproducing North Carolina proposed Declaration of Rights, 1778) (emphases added). There is no indication anyone believed that the Massachusetts, New Hampshire, New York, and North Carolina texts, by using the word his rather than their, narrowed the protections contained in the Pennsylvania and Vermont Constitutions.
That their . . . houses was understood to mean their respective houses would have been clear to anyone who knew the English and early American law of arrest and trespass that underlay the Fourth Amendment. The peoples protection against unreasonable search and seizure in their houses was drawn from the English common-law maxim, A mans home is his castle. As far back as Semaynes Case of 1604, the leading English case for that proposition (and a case cited by Coke in his discussion of the proposition that Magna Carta outlawed general warrants based on mere surmise, 4 E. Coke, Institutes 176-177 (1797)), the Kings Bench proclaimed that the house of any one is not a castle or privilege but for himself, and shall not extend to protect any person who flies to his house. 5 Co. Rep. 91a, 93a, 77 Eng. Rep. 194, 198 (K. B.).
Thus Cooley, in discussing Blackstones statement that a bailiff could not break into a house to conduct an arrest because every mans house is looked upon by the law to be his castle, 3 W. Blackstone, Commentaries on the Laws of England 288 (1768), added the explanation: [I]t is the defendants own dwelling which by law is said to be his castle; for if he be in the house of another, the bailiff or sheriff may break and enter it to effect his purpose. . . . 3 W. Blackstone, Commentaries on the Laws of England 287, n. 5 (T. Cooley 2d rev. ed. 1872). See also Johnson v. Leigh, 6 Taunt. 246, 248, 128 Eng. Rep. 1029, 1030 (C. P. 1815) ([I]n many cases the door of a third person may be broken where that of the Defendant himself cannot; for though every mans house is his own castle, it is not the castle of another man).
Of course this is not to say that the Fourth Amendment protects only the Lord of the Manor who holds his estate in fee simple. People call a house their home when legal title is in the bank, when they rent it, and even when they merely occupy it rent freeso long as they actually live there. That this is the criterion of the peoples protection against government intrusion into their houses is established by the leading American case of Oystead v. Shed, 13 Mass. 520 (1816), which held it a trespass for the sheriff to break into a dwelling to capture a boarder who lived there. The court reasoned that the inviolability of dwelling-houses described by Foster, Hale, and Coke extends to the occupier or any of his family . . . who have their domicile or ordinary residence there, including a boarder or a servant who have made the house their home. Id., at 523 (emphasis added). But, it added, the house shall not be made a sanctuary for one such as a stranger, or perhaps a visitor, who upon a pursuit, take[s] refuge in the house of another, for the house is not his castle; and the officer may break open the doors or windows in order to execute his process. Ibid. (emphasis in original).
Thus, in deciding the question presented today we write upon a slate that is far from clean. The text of the Fourth Amendment, the common-law background against which it was adopted, and the understandings consistently displayed after its adoption make the answer clear. We were right to hold in Chapman v. United States, 365 U. S. 610 (1961), that the Fourth Amendment protects an apartment tenant against an unreasonable search of his dwelling, even though he is only a leaseholder. And we were right to hold in Bumper v. North Carolina, 391 U. S. 543 (1968), that an unreasonable search of a grandmothers house violated her resident grandsons Fourth Amendment rights because the area searched was his home, id., at 548, n. 11 (emphasis added). We went to the absolute limit of what text and tradition permit in Minnesota v. Olson, 495 U. S. 91 (1990), when we protected a mere overnight guest against an unreasonable search of his hosts apartment.
I think we can all agree that the cellphone companys records of which of its cell towers were associated with its customers phone at some point in the past are, in the abstract, papers or effects. I would think that an originalist would then want to ask the Carter question: Whose papers or effects are they? Presumably they are the papers or effects of the phone company. But are they also the papers or effects of the customer?
The idea of papers and effects presumably was understood to include situations such asEntick v. Carrington (1765), the case that helped inspire the Fourth Amendments enactment, in which the kings officials broke into Enticks home. Inside the home, the officials removed all the private papers, books, etc. of the plaintiff there found, . . . and took and carried away 100 printed charts, 100 printed pamphlets, etc. etc. of the plaintiff there found, and other 100 charts etc etc took and carried away. In that setting, papers and effects likely meant something like a persons private property. Indeed, the first draft of the Fourth Amendment used property instead of effects.
The question is, can cell-site records be the users own papers or effects? It seems like an uphill battle. Cell-site records are a phone companys internally generated records ofhow its network connected a communicationbetween a customer and someone else. Cellphone customers dont know what cell towers their phones are connecting to, or where the towers are located. They dont know what the phone companys records say. Thats information that the phone company generates describing how its own network service operated that the phone company keeps in the ordinary course of its business. Whether those records are retained, and for how long, is up to the phone company. Its the phone companys business and its network, and users wouldnt see or access the records that the phone company creates and stores.
Given that, to say that cell-site records belong to the user that they are the users papers or effects you would need some kind of theory by which a person has some kind of property or property-like rights in another persons records of what they did on your behalf.
There are ways to get there, but Im not aware of any of those theories being recognized in the past much less the late 18th century. For example, one option would be to look to contract law or agency law. Perhaps signing the agreement makes the phone company the agent of the user, such that the phone company is working for the user and its company records belong, at least in some sense, to the user. This is creative, but at least at this point I dont see support for this theory in the historical caselaw or other materials.
Id be happy to be corrected, but Im not aware of an early court or even just a litigant suggesting that the contractual or agency relationship made the providers records in some sense the customers own, triggering the Fourth Amendment, its state equivalents, or common law search and seizure principles. There presumably were situations in the 18th or 19th century in which two parties would enter into a contractual agreement and the government would want records or testimony from the provider of those goods or services concerning what the recipient of the goods or service had done. A possibly interesting example is hotel guest lists, which are at least somewhat analogous to cell-site records records by a business of who was using a particular service and when. My understanding is that hotel guest lists were traditionally left open to inspection by anyone. See Jefferson Williamson, The American Hotel: An Anecdotal History 181 (1930). The records apparently werent considered the guests own papers, even though they were created in the course of providing a service to the guest.
It would be a different case, I think, with the contents of communications. In the case of contents, the network provider is merely holding the private communications of the user on the users behalf. The communications are still the users communications. The user wrote them, or, on receipt, received them. If I decide to store my emails on Gmails servers, for example, they are still my emails, just as my letters are still my letters when I send them through the postal mail. See Ex Parte Jackson, 96 US 727, 733 (1877) (Letters and sealed packages of this kind in the mail are as fully guarded from examination and inspection, except as to their outward form and weight, as if they were retained by the parties forwarding them in their own domiciles.).
If Im right, an originalist might plausibly conclude that the contents of communications are protected by the Fourth Amendment as the users papers or effects but that the business records of the company as to how those papers or effects were delivered would be the companys records, not the users.
Anyway, thats my tentative thinking. Im very interested to know whether readers who are interested in originalism find this thinking persuasive. And my apologies in advance if I have offered a wrong or naive view of originalism. It sometimes seems that one must be a sophisticated theorist of originalism to truly understand what originalism means, and I admit I am only a simple country Fourth Amendment lawyer.
View post:
How should an originalist rule in the Fourth Amendment cell-site case? - Washington Post
Posted in Fourth Amendment
Comments Off on How should an originalist rule in the Fourth Amendment cell-site case? – Washington Post
Constitution and Fourth Amendment – Gettysburg Times
Posted: at 3:55 am
The Fourth Amendment states, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Pretty straightforward, right? It was, until something labeled the "Foreign Intelligence Surveillance Act" (FISA). Today, every electronic communication of every kind -- e-mail, telephone conversation, radio or TV communication, in any medium -- is routinely overheard, recorded, stored and available for use against any American citizen by the FBI, the CIA, the NSA, the IRS, the Social Security Administration and every information and intelligence gathering agency government-wide. Your cell phone isn't just a telephone any more: it's a GPS for government trackers; it stores your phone records and conversations; and the "your" telephone company routinely provides that Government whatever it asks about what we say, to whom, and when. So do our computers. The result? There is no longer any reasonable expectation of privacy, anywhere, anytime, for anyone.
One might ask, "How did this come to be?" In 1978, under President Jimmy Carter, Congress enacted something called the "Foreign Intelligence Surveillance Act" (FISA), whose nominal purpose was to enable the federal government to eavesdrop, wiretap, or otherwise capture the contents of communications and/or conversations involving people from other nations around the world whom our government believed might be plotting or conspiring to do America harm. Of course, some of those nefarious plotters might also be doing so in conjunction with Americans; therefore, it was necessary to "listen in" on everyone, lest our defenders in the intelligence community not be able to detect all they could. Which in turn meant that a mechanism needed to exist to honor the 4th Amendment - if only in form. Thus came about what is now known as the "FISA Court," whose two-fold purpose was to approve the "listening" while maintaining a cover for violating the 4th Amendment, and appearing to provide protection for American citizens against the very Government behavior things that Court was approving. (No, it doesn't make sense, but it's the way it is.) All this, of course, was long before cell phones, personal computers, laptops and even the internet.
kAmwF>2? ?2EFC6 36:?8 H92E :E :D[ H92E6G6C q:8 v@G6C?>6?E 42? 86E 2H2J H:E9[ D>2== 8@G6C?>6?E H:== 7@==@H] $@ ?@H H6 92G6 2== <:?5D @7 6=64EC@?:4 DFCG6:==2?46[ ac^f[ @? 6G6CJ@?6 E9C@F89@FE E96 =2?5[ 7C@> E96 (9:E6 w@FD6 2== E96 H2J E@ r:EJ w2==] u@C E9@D6 C6256CD 72>:=:2C H:E9 v6@C86 ~CH6==[ Q`hgcQ 😀 2=:G6 2?5 H6==j 2?5[ J6D[ q:8 qC@E96C 😀 H2E49:?8] p?5 =:DE6?:?8] p?5 C64@C5:?8] p?5 H2:E:?8 \ E@ FD6 H92E6G6C 96 92D 282:?DE 2?J@?6] xEVD ?@ =@?86C D4:6?467:4E:@?j :EVD 724E 2?5 56D4C:36D E92E A2CE @7 E96 x?E6==:86?46 4@>>F?:EJ E92E 92D 4@>6 E@ 36 =236=65 E96 Qs66A $E2E6]Qk^Am
kAmp82:?[ 9F>2? ?2EFC6 36:?8 H92E :E :D[ 2?5 9F>2?D 36:?8 E96 :?96C6?E=J 4FC:@FD A@=:E:42= 2?:>2=D E92E H6 2C6[ D@>6 😕 E96 :?E6==:86?46 4@>>F?:EJ 92G6 EFC?65 E96:C 2FE9@C:K2E:@?D 7C@> 8F2C5:?8 282:?DE @FC 6IE6C?2= E9C62ED[ E@ 2EE24<:?8 2?5 56DEC@J:?8 E9@D6 E96J A6C46:G6 2D A2CE:D2? A@=:E:42= 6?6>:6D 7FCE96C G:@=2E:?8 E96 cE9 p>6?5>6?E[ 3@E9 😕 DA:C:E 2?5 😕 724E]k^Am
kAmp== @7 E9:D 😀 ?@E @?=J 😕 5:C64E G:@=2E:@? @7 E96 cE9 p>6?5>6?E[ :EVD E@E2==J 56DECF4E:G6 E@ 2 7C66 2?5 @A6?[ D6=78@G6C?:?8 D@4:6EJ[ :]6][ @FC 7@F?5:?8 AC:?4:A=6D] x7 E96 u@F?56CD 2?5 uC2>6CD 5:5?VE H2?E E96 rC@H? DAJ:?8 @? FD[ H9J 5@ H6 2==@H @FC 8@G6C?>6?E 2E 6G6CJ =6G6= E@n u@C 36EE6C D64FC:EJn q6? uC2?<=:? D2:5 :E H6==i Q%9@D6 H9@ EC256 7C665@> 7@C D64FC:EJ 56D6CG6 ?6:E96C]Qk^Am
kAm(92E 42? (6[ E96 !6@A=6[ 5@ E@ EFC? E9:D 2C@F?5n ~3G:@FD=J[ ECFDE:?8 E96 v@G6C?>6?E E@ 4@CC64E :ED6=7 >2<6D ?@ D6?D6 2E 2== 8@G6C?>6?ED[ 3J E96:C G6CJ ?2EFC6[ 24BF:C6 A@H6Cj E96J ?6:E96C D92C6 ?@C J:6=5] qFE[ H6 DE:== 92G6 😕 A=246 2 WD@>6H92EX C6AC6D6?E2E:G6 8@G6C?>6?E2= DECF4EFC6j H9J ?@E >2<6 :E ECF=J C6AC6D6?E2E:G6n *6D[ :E >62?D A2J:?8 4=@D6C 2EE6?E:@? E@ H92E E92E 8@G6C?>6?E 😀 24EF2==J 5@:?8] p?5 :E >62?D A2J:?8 6G6? 4=@D6C 2EE6?E:@? E@ 9@H H92E :E 5@6D 27764ED FD[ 3@E9 4FCC6?E=J 2?5 5@H? E96 C@25] p?5 :E >62?D A2J:?8 6G6? >@C6 2EE6?E:@? E@ @H:?8 H96E96C H92E E9@D6 H9@ 4=2:> E@ H2?E E@ C6AC6D6?E FD H:== 24EF2==J 5@ E92E[ @C 72== :?E@ >@C6 @7 E96 :?E6C?64:?6 A2CE:D2?D9:A E92E H:?D A@=:E:42= G:4E@C:6D 3FE 56DEC@JD E96 723C:4 @7 @FC #6AF3=:4] xE >62?D[ 2D !=2E@ H2C?65 a[d__ J62CD 28@[ E92E (6[ E96 !6@A=6[ >FDE 86E :?G@=G65 2?5 A2CE:4:A2E6 😕 E9:D D6=78@G6C?2?46 AC@;64Ej @E96CH:D6 H6V== D:>A=J 4@?E:?F6 EC2?D:E:@?:?8 E@ :ED @AA@D:E6[ :]6][ EJC2??J] p?5 H6 D66 EJC2??J 3=@DD@>:?8 6G6CJH96C6[ 7C@> D49@@=D E@ 8@G6C?>6?ED 2?5 6G6CJH96C6 😕 36EH66?[ =2C86=J 3642FD6 (6[ E96 !6@A=6[ 92G6 2DDF>65 E96 36DE 2?5 6?23=65 E96 H@CDE]k^Am
kAm#6>6>36C[ E96 r@?DE:EFE:@? ?6:E96C 8F2C2?E66D ?@C 6?7@C46D @FC C:89ED 2?5 AC@E64E:@?Dj :E D:>A=J 277:C>D E96>[ 2?5 7F?4E:@?D 2D 2 >6492?:D> 7@C FD E@ 6I6C4:D6 2?5 AC@E64E E96> @FCD6=G6D] v@G6C?>6?E[ 3J :ED G6CJ ?2EFC6[ ?6:E96C D92C6D ?@C J:6=5D A@H6Cj :E E2<6D :E] %92EVD H9J %9@>2D y6776CD@?VD Qx? BF6DE:@?D @7 A@H6C E96?[ =6E ?@ >@C6 36 962C5 @7 4@?7:56?46 😕 >2? 3FE 3:?5 9:> 5@H? 7C@> >:D49:67 3J E96 492:?D @7 E96 r@?DE:EFE:@?[Q 😀 D@ :>A@CE2?E] qF5 }2D@? =:G6D 😕 {:EE=6DE@H?[ 😀 2 r@?D6CG2E:G6 %9:?<6C 2?5 2? p52>D r@F?EJ '@E6C] t>2:= 9:> 2E k2 9C67lQ>2:=E@i3F5?2D@?o2@=]4@>Qm3F5?2D@?o2@=]4@>k^2m]k^Am
Read the rest here:
Constitution and Fourth Amendment - Gettysburg Times
Posted in Fourth Amendment
Comments Off on Constitution and Fourth Amendment – Gettysburg Times
With Cell Phone Record Case on SCOTUS Horizon, Originalist Analysis on IV Amendment Is Helpful – CNSNews.com
Posted: at 3:55 am
With Cell Phone Record Case on SCOTUS Horizon, Originalist Analysis on IV Amendment Is Helpful CNSNews.com On June 5, the Supreme Court agreed to hear a case involving Fourth Amendment protections for cell phone records, Carpenter v. U.S. This case features a much-criticized judicial creation called the third-party doctrine and how it applies to an ... |
Excerpt from:
With Cell Phone Record Case on SCOTUS Horizon, Originalist Analysis on IV Amendment Is Helpful - CNSNews.com
Posted in Fourth Amendment
Comments Off on With Cell Phone Record Case on SCOTUS Horizon, Originalist Analysis on IV Amendment Is Helpful – CNSNews.com







