The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: July 2017
NATO, Russian Troops Rattle Swords Along Hundreds of Miles of Borderland – Foreign Policy (blog)
Posted: July 21, 2017 at 11:56 am
Tens of thousands of troops are on the move from the Baltic to the Black Sea, as NATO and Russia open up a series of massive military exercises the size of which the continent hasnt seen since the Cold War.
Both sides claim the drills, which involve aircraft, warships, tanks and artillery, are purely defensive in nature. But it is clear the exercises are also meant to show off new capabilities and technologies, and display not only the strength of alliances, but how swiftly troops and heavy equipment can move to squash a threat at the frontier.
The most ambitious undertaking on the NATO side is Saber Guardian 17, a series of over a dozen distinct battle drills being carried out by 25,000 troops from 20 countries moving across Hungary, Romania and Bulgaria.
The scenario presented to ground commanders is that a technologically advanced land force has pushed into NATO territory and is threatening the alliance as a whole. The drills include air defense tests, live fire tank engagements, long advances by armored columns, fighter planes and helicopters supporting ground movements, electronic warfare, and airdrops.
Deterrence is about capability, its about making sure that any potential adversary knows that we are prepared to do whatever is necessary, U.S. Army Europe commander Lt. Gen. Ben Hodges told reporters during the exercise. What escalates tensions is when we look weak, not connected, not prepared, that is what invites aggression.
But increasing military capability doesnt have to mean war, he added. The Russians only respect strength, so if we demonstrate cohesion, if we demonstrate that we are together, that we are prepared, then I think we dont have to worry.
The generals blunt comments underscore the planning for Saber Guardian, which doesnt name Russia as the adversary, but clearly has the Kremlin in mind.
The scenario revolves around an incursion into NATO territory by a militarily advanced enemy intent on seizing the economic assets of Black Sea countries. A battle featuring 5,000 NATO troops at the Cincu training range in Romania saw U.S. Apache and Romanian helicopters coordinate with artillery on the ground, U.S. Abrams tanks, and 650 vehicles in support of a large infantry movement to halt the advance.
The U.S. is planning to spend about $23 million on the sprawling Romanian base in order to conduct even larger, more complex battle drills there in the future.
On the other side of the deterrent fence stands Russia, which is preparing to surge as many as 100,000 troops into the field in a series of drills dubbed Zapad, or West in the coming weeks.
The Kremlin claims about 12,700 troops will be active in Belarus and Russia for Zapad. But experts and NATO officials say Moscow is more likely to conduct a series of engagements that will swell those ranks by tens of thousands. Under the Vienna Document agreement of 2011, foreign observers must be present for any exercise that exceeds 13,000 troops.
By coming in under that number while conducting several other large drills at the same time, Moscow can avoid the presence of observers and control the narrative of how its troops performed.
But NATO is wary.
Given that Russia used a massive military exercise in 2014 to obscure its incursion into Crimea, and invaded South Ossetia in Georgia in 2008 during another exercise that covered troop movements, the alliance is keeping a close eye on Zapad.
From previous experiences related to previous exercises, we have every reason to believe there may be substantially more troops participating than the official quoted numbers, NATO Secretary General Jens Stoltenberg said recently when asked about Zapad.
We dont consider this years Zapad exercise in itself to be a direct threat to [NATO] or a cover for an attack, added Kristjan Prikk, undersecretary for defense policy at Estonias Ministry of Defense during a conference in Washington on July 11. But we have to keep in mind that the Russians have the nasty habit of hiding their actual military endeavors behind exercises.
The last Zapad, in 2014, focused on displaying how quickly Russia could move forces from one part of the country to another, and illustrated how the Kremlin underplays the number of troops involved in its intertwined military drills.
Moscow claimed about 22,000 troops took part in 2014, but outside observers later concluded that up to 70,000 were involved, once all of the smaller but related exercises were added up.
Whatever number of troops ultimately take part, Moscow is going to very actively signal what they can and cannot do militarily, said Olga Oliker of the Center for Strategic and International Studies. And the fact that Russia often conducts nuclear exercises in conjunction with conventional movements adds an extra element of uncertainty for NATO and the West.
This year, Im looking to see what Kaliningrads role is in the exercise, and what supporting and concurrent exercises are being held in Belarus and Kaliningrad, the Russian exclave on the Baltic Sea, Oliker said.
Three Chinese warships are slated to arrive in Kaliningrad in July 21 to take part in a series of drills with the Russian navy and air force.
The upcoming weeks worth of activities will include anti-submarine and anti-ship operations, and practice between the two nations communicating and coordinating while fighting. The main aims of the exercise are to increase the efficiency in cooperation of the two fleets to counter threats to security at sea, [and] train compatibility of the crews of Russian and Chinese combat ships, the Russian Defense Ministry said.
The naval activity in the Baltic comes months after NATO established new brigades in Estonia, Lithuania and Latvia, beefed up by prepositioned American tanks and heavy armored vehicles.
In June, the U.S. Air Force also sent B-1 and B-52 bombers to Europe to participate in the massive BALTOPs exercise with Baltic allies, which included 50 allied ships running through a series of defensive maneuvers to protect NATOs northern flanks.
Earlier this month, the U.S. Army deployed a Patriot anti-aircraft missile system in Lithuania for use in yet another NATO wargame, marking the first time the system has been brought to the Baltic region where Russia enjoys a robust air and missile defense capability. The deployment is temporary, U.S. officials cautioned, but officials in Lithuania are looking at purchasing the system. Romania recently committed to a $3.9 billion deal for seven Patriot missile defense systems in July.
Closer to Russias borders and Crimea is another NATO exercise related to Saber Guardian, dubbed Sea Breeze 2017. The 12-day naval exercise currently underway in the Black Sea is co-hosted by the U.S. and Ukraine, and features the U.S. Navy cruiser USS Hue City and the destroyer USS Carney, which join 16 other countries in the Odessa-based undertaking. American surveillance plans and a team of Navy SEALs are also participating.
The naval exercises will be closely watched by Russian forces, who are active in the Black Sea, and have vastly improved their surveillance capabilities in Crimea. Over the past year, Russian aircraft have repeatedly buzzed American warships and aircraft in international waters in the Black Sea, drawing protests from Washington.
In February, an armed Russian aircraft buzzed the USS Porter, and in May armed Russian jets came within feet of U.S. surveillance planes operating over the waterway.
Photo Credit: DIMITAR DILKOFF/AFP/Getty Images
Twitter Facebook Google + Reddit
Read this article:
NATO, Russian Troops Rattle Swords Along Hundreds of Miles of Borderland - Foreign Policy (blog)
Posted in NATO
Comments Off on NATO, Russian Troops Rattle Swords Along Hundreds of Miles of Borderland – Foreign Policy (blog)
NATO alliance helping dictators – Washington Times
Posted: at 11:56 am
ANALYSIS/OPINION:
President Trump found NATO wanting. Then true to form, he acted like a CEO, not a president, serving notice that things had to change, or else. The or else he left undefined, creating angst among politicians and policy elites who, sensing their own failures, chose to focus on his manners not his message. Mr. Trumps poor political decorum notwithstanding, his policy judgment is right. NATO has to change.
NATO is at risk, not from without, but from within. Vladimir Putins geopolitical maneuvering is cause for concern to be sure, but the real danger comes from the erosion of NATOs core values, and the rise of a dictator within its ranks. They pose a far greater risk than Russias current meddling.
The North Atlantic Treaty commits every NATO member to the principles of democracy, individual liberty, and the rule of law, but a growing number of NATO autocrats ignore these core values. Political expression in particular has taken a beating. Every European country but two is less tolerant of opposing viewpoints today than it was in 2013.
Autocrats shut down public debate, and bureaucrats harass anyone who disagrees. Its happened in Romania, Lithuania, Poland, Bulgaria, Hungary and the U.S., where the IRS subjected conservative NGOs to questionable tactics. Political and media ideologues use identity politics and political correctness to facilitate the crackdowns by condemning as hateful any views with which they disagree.
Weve forgotten the Helsinki Accords, and their making respect for individual liberty a requirement for international legitimacy. Dictators still arrest, and imprison, and torture, to be sure, but today they must have a whiff of freedom about them to avoid the worlds condemnation. Helsinkis effect helped defeat the Soviet Union. It is why the world condemns ISIS. And it is why Ankara is pushing back against reports of Turkeys gulag.
Every members protection under Article V should depend on its commitment to NATOs core values, but the alliance is giving everyone a pass, honoring its reason to exist more in the breach. If the trend continues, then NATO will become a mutual defense pact for dictators posing as democrats.
No NATO member has spurned its values and security interests more flagrantly than Turkey. President Erdogan used Vladimir Putins playbook to establish himself as an equally dominant and despotic ruler in Turkey. Democracy is staggering under government oppression, oligarchs rule the economy, and Erdogan sycophants maintain a cult of personality around him. Turkish media calls him the Great Master,and he lives sultan-like in a 1,100 room White Palace he built for himself as president.
Turkeys drift from freedom accelerated after the failed military coup in July 2016. Mr. Erdogan launched a continuing purge that has so far snared about 118,000 Turks, at least 50,000 jailed, and the rest suppressed with various state sanctions. The stories coming out of Turkey are horrific; people disappearing, children and spouses arrested to punish political opponents, mass arrest of journalists, criminal charges based on spurious allegations that remind one of the Soviet Unions darkest days. While Mr. Erdogan Putinized his countrys democracy, NATO remained silent.
Turkey ignores NATOs security interests as well. For years, aid, weapons, and volunteers flowed across Turkeys southern border to ISIS, and ISIS oil flowed out. A train of Hezbollah-bound, Iranian-supplied rockets derailed in southeast Turkey in 2007. Police stopped Turkish intelligence service trucks carrying mortars, artillery shells, and ammunition to al Qaeda near the Syrian border in 2014. Mr. Erdogans response? Arrest the police and claim it was humanitarian aid. When newspaper editors published photos disproving his claim, they were also arrested.
The Turkey that protected NATOs flank for 50 years is gone, replaced by a replica of Vladimir Putins Russia. Mr. Erdogans silent supervision of peaceful protesters beaten on Washingtons streets by his armed security thugs speaks volumes about his respect for NATOs values. The alliance should not accept the risk of war for an ally with such values, nor should the U.S. sell Turkey sophisticated F35A fighter aircraft for him to use against our Kurdish allies.
Bruce M. Lawlor, a retired U.S. Army major general, is a former member of the Homeland Security Advisory Council and chief of staff of the Department of Homeland Security.
Follow this link:
NATO alliance helping dictators - Washington Times
Posted in NATO
Comments Off on NATO alliance helping dictators – Washington Times
Much Ado About Nothing? Cyber Command and the NSA – War on the Rocks
Posted: at 11:55 am
Last week, word began to spread that the Trump administration was considering granting new powers to U.S. Cyber Command. Lolita Baldor of the Associated Press had the scoop, discussing two related but separate steps under consideration: first, to elevate U.S. Cyber Command to the status of a unified command and second, to break the current dual-hat arrangement with the National Security Agency (NSA), whereby the commander of U.S. Cyber Command is the same individual as the director of the NSA.
It is worth noting, however, four things: First, these two steps (elevation and separation) have been under consideration for years. Second, there were good reasons at the time why the Obama administration didnt act on them. Third, elevation and separation should, in theory, operationally empower U.S. Cyber Command, but in practice Cyber Command may ironically find itself with less capability to offer. And finally, Cyber Command has already quietly amassed non-operational power and authority within the Department of Defense, making it one of the most independent commands, second only to the U.S. Special Operations Command. As such, while this weekends news is a good sign of the continued maturation of Cyber Command (and the acknowledgment of that maturation by the White House), theres less here than meets the eye.
Lets review Cyber Commands origins and its assigned missions before tackling the news. (Please accept my apologies in advance for some acronym salad.) For the short-story long, see chapter 8 of Playing to the Edge by Michael Hayden and the early parts of Jay Healeys Fierce Domain. Long-story short, the NSA had been the nations leading signals intelligence agency for decades. But after 9/11, as new opportunities emerged to create effects against adversaries during declared hostilities, Pentagon leadership became uncomfortable with the notion that the intelligence missions of collection and analysis would be conducted by the same organization that would disrupt or degrade, even destroy, targets through cyber-attacks during an armed conflict. In 2002, U.S. Strategic Command was given responsibility for cyberspace, and two little-known subordinate organizations emerged to manage it: Joint Task Force-Global Network Operations (JTF-GNO) would handle guarding the Defense Departments networks while Joint Functional Component Command-Network Warfare (JFCC-NW) would be responsible for missions wed think of as offense. Because there was so much overlap between the NSA and the emerging JFCC-NW, the Department of Defense created the dual-hat by making the NSA director (then Hayden) the commander of JFCC-NW. As the threats to the Department of Defense in cyberspace increased throughout the 2000s, Secretary of Defense Robert Gates consolidated JTF-GNO and JFCC-NW under a new U.S. Cyber Command in 2010, but it was still subordinate to U.S. Strategic Command and still dual-hatted with the NSA director. Thats more or less where we find ourselves today.
Since then, U.S. Cyber Command has been charged with three missions: defend the Defense Departments networks and systems, provide offensive support to other commands in the event of a contingency, and defend the nation from a cyber-attack of significant consequence (less than two percent of incidents would qualify as significant).
Advocates of more autonomy and authority for U.S. Cyber Command have often bemoaned its subordinate status to U.S. Strategic Command. The theory is that having to work through Strategic Command slows down operational approval, coordination, or whatever else needs to happen. Based on my experience in the Cyber Policy office of the Office of the Secretary of Defense, I am of the view that a stove-piped Joint Staff had more to do with delays and miscommunication than anything else; nor could I ever find a function Cyber Command might be asked to execute that could only be performed by a full, unified command (like Strategic Command) but not by a sub-unified command (like Cyber Command). We looked at this several times during the last administration: If the secretary of defense wanted the sub-unified command to execute, they could and would. It wasnt a problem, so elevating the command wasnt necessary. So, while I dont think there are any big wins to be had by the recent news about the Trump administration wanting to elevate Cyber Command, I dont think it hurts to do it either. And it might not ultimately be up to the White House: The 2017 NDAA requires the administration to elevate Cyber Command.
Breaking the dual-hatted relationship with the NSA is more complicated. There are very good reasons why JFCC-NW was born with the NSA as its commander, as there is a lot of overlap between the organizations. This overlap is intuitive to those whove worked in the business, but hard to explain in brief here. Ill just quote Hayden on this point: [I]n the cyber domain the technical and operational aspects of defense, espionage, and cyberattack are frankly indistinguishable they are all the same thing. Its obviously more complicated than this, but at a high level, I think this was the rationale.
There were studies undertaken about the implications of breaking the dual-hat before the Snowden affair, but his disclosures forced policymakers to confront the issue head-on. At that time, it was thought that breaking the dual-hat could improve perceptions about privacy and civil liberties at the NSA, but in December 2013 the Obama administration decided to maintain the arrangement. Senior leaders felt it was too soon to separate Cyber Command. Its readiness and resources were growing but insufficient, and it was still too reliant on NSA talent and services for its missions.
Working with the two organizations, I found that the relationship between the two was akin to a mix between hostage-taking and Stockholm syndrome except each organization kept mixing up which was the hostage and which was the hostage-taker. One day, U.S. Cyber Command would demand NSA support due to the latters responsibility as a combat support agency. The next day, the command would cave and say that NSA had other, more important priorities. And NSA too would resist a request from Cyber Command, then embrace it, and then fight it. The overlap and dependence was that tight.
For that reason, among others, I understand the argument about needing to separate Cyber Command from NSA so that the former can pursue its missions (especially to defend the nation and to support other commands) with greater independence from signals intelligence. But theres a risk here that would be dangerous to miss: When Cyber Command needs NSA support, the fact that its the same person in charge of both organization can break what might otherwise be a log-jam. Splitting the dual-hat could result in the NSA isolating itself and refocusing on its own core missions (the collection of signals intelligence and providing information assurance) while minimizing its support to Cyber Command.
Just because there are risks does not mean the Trump administration should leave the current arrangement in place. The question is not whether, but when and how, to break the dual-hat. One priority for the White House and Secretary Mattis will be to have a clear understanding with the new NSA director (who may well be a civilian for the first time) about how he or she sees the relationship with Cyber Command, and then how the administration monitors the relationship to ensure the NSA doesnt abandon Cyber Command outright.
The selection of who will next lead Cyber Command will also be a priority. Someone like the current commander of Army Cyber Command, Lt. Gen. Paul Nakasone, is an ideal candidate: He has years of experience in the cyber effects business, time in the Pentagon and the field, and he understands the roles of civilians, fellow military officers, and senior political types. Another name thats been floated is Lt. Gen. William Mayville, currently the Director of the Joint Staff. His time as the Joint Staffs chief information officer and with Joint Special Operations Command would make him a strong leader for Cyber Command as well.
The good news for the future of the U.S. militarys cyber operations is that, regardless of whether or not Cyber Command is elevated as a unified command or separated from the NSA, Congress has quietly been empowering Cyber Command with greater authorities and independence through legislation. My colleague Charley Snyder and I assessed all the additional powers conferred in the 2017 NDAA over at Lawfare, but Id like to single out the authority related to requirements: Being able to set its own requirements for the conduct of cyber operations, as well as validating the requirements of other defense components, matters more than this bland bureaucratic language might suggest. With the independent acquisition authority Congress gave it in a previous NDAA, Cyber Command can now accelerate acquisition and procurement to keep up with new requirements without the usual deliberations chaired by the Joint Staff. Special Operations Command is the only other military outfit with that kind of freedom, and it makes a big difference.
But the big question will be this: Regardless of these crucial authorities and any new command arrangements, what will Cyber Commands role be in protecting the country from threats like Russian information operations? Maybe its time we get away from using cyber as the description of what needs to be done, and instead think about what an Information Warfare Command would look like. How should the United States wage such a fight, and how should it protect itself? I am pleased the Trump administration is considering organizational changes to support a higher profile for cyber operations, but we really need answers to these bigger policy questions.
Michael Sulmeyer is the Director of the Cyber Security Project at the Harvard Kennedy Schools Belfer Center for Science and International Affairs. He also served in the Office of the Secretary of Defense, Cyber Policy, from 2012-2015. Follow him on Twitter @SultanOfCyber.
Image:Airman 1st Class Christopher Maldonado/Shaw Air Force Base
View post:
Much Ado About Nothing? Cyber Command and the NSA - War on the Rocks
Posted in NSA
Comments Off on Much Ado About Nothing? Cyber Command and the NSA – War on the Rocks
Defense in accused NSA leaker case opposes prosecutors proposed order of protection – The Augusta Chronicle
Posted: at 11:55 am
The attorneys for the Fort Gordon contractor accused of leaking national defense information have filed their own proposed order regarding how classified documents are handled in her espionage case.
Reality Leigh Winner, 25, has pleaded not guilty in U.S. District Court to a single count of willful retention and transmission of national defense information.
While the federal prosecutors have proposed an order of protection that prohibits the defense from revealing any classified information, even if it had been included in published reports, Winners attorneys propose not treating any document as classified if it has been the subject of media reports. Violation of the final order of protection can result in sanctions and even criminal prosecution.
The case against Winner, which is tentatively set for trial the week of Oct. 23, is to proceed under the Classified Information Security Act, a law enacted to protect a defendants right to a fair trial while allowing the government to protect classified information on matters of national security.
The federal prosecutors contend it is the executive branch of government that determines what is a classified document.
In Winners case, the document suspected as being the one sent anonymously to the online news publication The Intercept was the subject of an June 5 article. It was an analysis of the Russian governments meddling in the presidential election. Since Winners arrest, the subject has been reported on extensively, especially in light of the investigations by the independent special counsel, and the Senate and House intelligence committees.
Winners defense attorneys also seek a provision in the order of protection that allows her to review the discovery material, confer with attorneys about it and to assist in her defense.
The defense team also wants the proposed order to allow defense experts with the prosecutors security clearance to review the discovery material without any pre-clearance by the prosecution.
U.S. Magistrate Court Judge Brian K. Epps will determine what the final order of protection will contain. The government, however, has the right to appeal, under the Classified Information Security Act.
Winner has had a top security clearance since serving for six years in the Air Force. In February, she began working for the National Security Agency contractor, Pluribus International Corp. at Fort Gordon.
She is accused of taking a classified document in May and mailing it to The Intercept.
Federal agents allegedly followed clues to Augusta and to Winner after an Intercept reporter showed an intelligence source the document to determine its authenticity.
Reach Sandy Hodson at (706) 823-3226 or sandy.hodson@augustachronicle.com.
See original here:
Defense in accused NSA leaker case opposes prosecutors proposed order of protection - The Augusta Chronicle
Posted in NSA
Comments Off on Defense in accused NSA leaker case opposes prosecutors proposed order of protection – The Augusta Chronicle
Interactive Constitution: The Twenty-Fifth Amendment – Constitution Daily (blog)
Posted: at 11:55 am
As part of the National Constitution CentersInteractive Constitution project, leading scholars across the legal and philosophical spectrum find common ground on the Constitutions articles, amendments and provisions. In this essay, Brian C. KaltandDavid Pozen look at how the Twenty-Fifth Amendment seeks to answer questions raised by the original Constitutions treatment of presidential and vice-presidential vacancies and presidential disability.
The Twenty-Fifth Amendment seeks to answer a series of questions raised by the original Constitutions treatment of presidential and vice-presidential vacancies and presidential disability.
First, what happens when a presidential vacancy arises? Article II, Section 1, Clause 6 of the Constitution states that in case of the removal of the President from office, or of his death, resignation, or inability to discharge the powers and duties of the said office, the same shall devolve on the Vice President. The line of succession from President to Vice President is clear, but what exactly devolves on the Vice President? Is it the office of President or just its powers and duties? When President William Henry Harrison died in 1841, Vice President John Tyler forcefully asserted that he had become President. Although Congress accepted this result, some disputed Tylers reading of the Presidential Succession Clause.
Second, what should happen when a vice-presidential vacancy arises? The original Constitution did not provide for filling such a vacancy. Prior to the adoption of the Twenty-Fifth Amendment, one Vice President resigned, seven died in office, and eight took over for Presidents who died in office: all in all, the vice presidency was unoccupied more than 20 percent of the time. This was less of a problem when the office was held in low regard, which it mostly was until the mid-twentieth century. But as the vice presidency began to grow into its modern forma sort of deputy presidencyit became more worrisome for the office to be vacant. These worries were sharpened by Congresss design of the 1947 Presidential Succession Act, which places the Speaker of the House and the President Pro Tempore of the Senate immediately behind the Vice President in line for the presidency, even when they do not belong to the Presidents political party.
Third, what happens if the President becomes unable to discharge the powers and duties of the office? Several Presidents suffered debilitating illnesses and injuries. For weeks and months at a time, the country was left without effective or accountable presidential leadership. Article II, Section 1, Clause 6 provided for the Vice President to step in when the President had an inability to discharge [his] powers and duties, but it provided no decision-maker, no procedures, and no definition of inability. Nor did it make clear whether the Vice President would act as President only until the President recovered, or instead would become President for the duration of the term. No Vice President wanted to seem like a usurper. In practice, power was never transferred and presidential inner circles typically concealed the Presidents condition. This pattern came to be seen as increasingly irresponsible with the advent of nuclear weapons during the Cold War; the nation needed a fully functioning presidency at all times. In 1958, President Dwight D. Eisenhower sought to break the pattern by being more open about his health and by entering into an agreement with Vice President Richard Nixon that provided for Nixon to serve as Acting President in the event of presidential inability.
The assassination of President John F. Kennedy on November 22, 1963 brought renewed attention to these questions. Led by Senator Birch Bayh, Congress gave them focused consideration and, in July of 1965, sent the Twenty-Fifth Amendment to the states for ratification. Less than two years later, the necessary thirty-eighth state legislature ratified it.
In response to the first question, regarding presidential vacancies, Section 1 of the Twenty-Fifth Amendment formalizes the Tyler precedent. It confirms that when the President is removed from office, dies, or resigns, the Vice President becomes President. When President Nixon resigned in 1974, Vice President Gerald Ford became President under Section 1.
In response to the second question, regarding vice-presidential vacancies, Section 2 of the Twenty-Fifth Amendment requires the President to nominate a replacement Vice President when that office becomes vacant, subject to confirmation by a majority of both the House and Senate. In 1973, Gerald Ford became Vice President through Section 2 after Vice President Spiro Agnew resigned. When Ford took over the presidency the following year, he promptly invoked Section 2 to nominate Nelson Rockefeller to fill the resulting vice-presidential vacancy.
In response to the third question, regarding presidential inability, Sections 3 and 4 of the Twenty-Fifth Amendment establish two procedures for transferring authority to the Vice President as Acting President. Building on the Eisenhower-Nixon precedent, Section 3 allows the President to transfer authority temporarily, by submitting a written declaration that he is unable to discharge the powers and duties of his office. The President can reclaim those powers and duties later by submitting a second declaration to the contrary. President Ronald Reagan (once) and President George W. Bush (twice) transferred authority to their Vice Presidents under Section 3 for a matter of hours while they underwent planned surgeries.
Section 4 addresses the dramatic case of a President who may be unable to fulfill his constitutional role but who cannot or will not step aside. It provides both a decision-maker and a procedure. The initial deciding group is the Vice President and a majority of either the Cabinet or some other body that Congress may designate (though Congress has never done so). If this group declares a President unable to discharge the powers and duties of his office, the Vice President immediately becomes Acting President. If and when the President pronounces himself able, the deciding group has four days to disagree. If it does not, the President retakes his powers. But if it does, the Vice President keeps control while Congress quickly meets and makes a decision. The voting rule in these contested cases favors the President; the Vice President continues acting as President only if two-thirds majorities of both chambers agree that the President is unable to serve.
Section 3 and (especially) Section 4 are long and complicated by constitutional standards. Nevertheless, they leave a number of issues unsettledmost significantly, what counts as presidential inability. At the Constitutional Convention in 1787, delegate John Dickinson asked, What is the extent of the term disability in the proposed presidential succession clause, and who is to be the judge of it? No response is recorded. By giving the President, Vice President, and Congress important and distinct roles, the Framers of the Twenty-Fifth Amendment went a long way toward answering the second part of Dickinsons question, rather than try to resolve the first part.
Brian C. Kalt is Professor of Law and The Harold Norris Faculty Scholar at Michigan State University College Of Law. David Pozen is Professor of Law at Columbia Law School.
For further discussion between Kaltand Pozenon the Twenty-Fourth Amendment, read the following Matters Of Debate:
The Unusual, Imperfect, Excellent Twenty-Fifth Amendment By Brian C. Kalt
The Deceptively Clear Twenty-Fifth Amendment By David Pozen
Filed Under: 25th Amendment
Here is the original post:
Interactive Constitution: The Twenty-Fifth Amendment - Constitution Daily (blog)
Posted in Fifth Amendment
Comments Off on Interactive Constitution: The Twenty-Fifth Amendment – Constitution Daily (blog)
Fifth Amendment Concerns Result in Overturned Convictions in First Criminal LIBOR Appeal – Lexology (registration)
Posted: at 11:55 am
The Second Circuit yesterday became the first court of appeals to address a criminal appeal regarding the governments investigation into the manipulation of the London Interbank Offered Rate (LIBOR). Its decision in United States v. Allen reversed the convictions of two former Rabobank employees accused of using their roles in the banks LIBOR submission process to rig the global interest benchmark, and not only reversed the convictions but dismissed the operative grand jury indictment. The court concluded that the government had improperly used the defendants compelled testimony against them, holding that the Fifth Amendments prohibition on the use of compelled testimony applies even when the testimony was compelled by a foreign sovereign. The decision may well have a significant impact on the increasing number of extra-territorial investigations conducted by the United States Department of Justice (DOJ), in which it partners with foreign agencies to investigate and prosecute cross-border activity.
The pair Anthony Allen and Anthony Conti were initially investigated by the United Kingdoms Financial Conduct Authority (FCA). During the investigation Allen, Conti, and other Rabobank employees were interviewed by the FCA; Allens and Contis interviews were compelled by threat of imprisonment, though they were granted direct use immunity. The FCA later brought an enforcement action against one of their co-workers, Paul Robson, disclosing relevant evidence against him, including Allens and Contis compelled testimony. During this exchange, Robson reviewed the materials over the course of two or three successive or nearly successive days, admitting to having underlined, annotated, and circled certain passages of both Allens and Contis testimony. But, in short order, the FCA then dropped the case and the DOJ stepped in.
A grand jury returned indictments against Allen and Conti in 2014, charging both with one count of conspiracy to commit wire fraud and bank fraud, and several counts of wire fraud. Robson was the sole source of certain material information for the indictment, including the source of testimony provided by FBI agent to the grand jury that Allen and Conti had participated in rigging LIBOR.
Before trial, the defendants moved under Kastigar v. United States, 406 U.S. 441 (1972), to dismiss the indictment or suppress Robsons testimony. The Supreme Courts decision in Kastigar held that the government may compel testimony from witnesses, in spite of their invoking the Fifth Amendment privilege against self-incrimination, where it confers immunity from use of that testimony and evidence derived therefrom in a subsequent criminal case. The upshot is that the government must show in cases where such testimony is at issue that its proof rests on evidence other than the compelled statements and the fruits thereof. The district court in this case resolved that it would instead address any Kastigar concerns i.e., issues regarding the use of compelled testimony under Fifth Amendments Self-Incrimination Clause at trial.
The pair were convicted. After a post-trial Kastigar hearing, the district court held that Robsons reading, marking up, and annotating the compelled testimony, and the fact that material parts of the FBI agents grand jury hearsay testimony had been derived solely from Robson, were not enough to taint the evidence Robson provided because the government had shown an independent source for such evidence, to wit, [Robsons] personal experience.
The Second Circuit disagreed. It held first that the Fifth Amendments prohibition on government use of compelled testimony in American criminal proceedings applies, even when a foreign sovereign is the actor that compelled the testimony, noting that Amendment protects against the use and derivative use of compelled testimony against an accused in such a proceeding.
Second, it held that when the government attempts to use a witness like Robson, who has been substantially exposed to a defendants compelled testimony, it is the governments burden under Kastigar to show, at a minimum, that the witnesss review of the compelled testimony did not shape, alter, or affect the evidence used by the government.
It third held that a witnesss bare, generalized incantations that reviewing those materials did not taint his or her testimony (as was the case here via leading questions of Robson at the Kastigar hearing, which produced nothing more than bare, self-serving denials from Robson) are insufficient to meet this burden of proof.
And it lastly it had no trouble concluding that introducing testimony provided by Robson a key cooperator and prominent witness before the trial and grand jury (via a hearsay presentation) was not harmless error beyond a reasonable doubt. Robsons had been the only testimony refuting Allens and Contis central argument that they had not actually engaged in rigging the LIBOR benchmark. This finding as to testimony both at trial and before the grand jury resulted in the dismissal of the indictments against Allen and Conti.
The Court rejected the governments counterarguments, including that prohibiting the use in United States Courts of testimony compelled by a foreign authority could seriously hamper the prosecution of criminal conduct that crosses international borders, by among other things, inadvertently or negligently obstructing federal prosecutions. The court noted that this risk already exists within our own constitutional structure, and that the practical outcome of our holding today is that the risk of error in coordination falls on the U.S. Government (should it seek to prosecute foreign individuals), rather than on the subjects and targets of cross-border investigations.
Read the rest here:
Fifth Amendment Concerns Result in Overturned Convictions in First Criminal LIBOR Appeal - Lexology (registration)
Posted in Fifth Amendment
Comments Off on Fifth Amendment Concerns Result in Overturned Convictions in First Criminal LIBOR Appeal – Lexology (registration)
Are There Limits To Trump’s Pardon Power? – HuffPost
Posted: at 11:55 am
Originally published on Just Security.
Over the weekend, one of President Donald Trumps personal lawyers, Jay Sekulow, refused to rule out the possibility that the president would pardon his associates, or even himself, in the Russia investigation. SekulowtoldABCsThis Week: He can pardon individuals, of course. Thats because the founders of our country put that in the United States Constitution: the power to pardon. But I have not had those conversations, so I couldnt speculate on that.
The issue of whether Trump could use his pardon power returns us to thedebateover whether a sitting president may be indicted or whether the Constitution requires impeachment and removal prior to indictment. Assomehave noted, that is almost a purely academic question because it is highly unlikely that Special Counsel Robert Mueller would indict Trump while still in office. In any event, there is the potential for post-presidency criminal exposure. In addition, Trumps family members and close associates could also be under investigation. This means Trump could be tempted to insulate them by granting pardons before theyre convicted of anything.
Presidents tend to save their most controversial grants of clemency for the end of their term in order to avoid the ensuing political firestorm while in office. But a Russia-related pardon would be particularly incendiary politically. That may not mean much to Trump given that a defining element of his rise has been his willingness to disregard longstanding norms and upend convention. He has mocked the disabled, attacked a Gold Star family, joked about sexual assault, savaged the free press, and fired the FBI director investigating Russian interference.
Aside from the political dynamics, granting a pardon in the context of the Russia investigation also raises fundamental questions of constitutional law.
Presidential pardon power derives from a specific grant in theConstitution. Article II, Section 2 vests the president with the Power to grant Reprieves and Pardons for Offenses against the United States, except in Cases of Impeachment. The Presidents pardon power is limited to federal offenses, which include federal prosecutions in U.S. territories like the District of Columbia and Puerto Rico. Clemency requests, which include both requests for a pardon and requests that a sentence be commuted, typically flow through the Office of the Pardon Attorney at the Department of Justice (see the Justice DepartmentsFAQs). The Justice Department evaluates clemency requests pursuant tostandardsset forth in the U.S. Attorneys Manual. However, the president may bypass that process given that it is a power expressly reserved for the president.
A president can prospectively pardon individuals for crimes that have occurred but have not been charged. In the most famous example, President Gerald Ford pardoned Richard Nixon even though he was not under indictment. President Fordsproclamationincluded a full, free and absolute pardon unto Richard Nixon for all offenses against the United States which he, Richard Nixon, has committed or may have committed or taken part in during his presidency. Similarly, President George H.W. Bush issued full pardons to six people implicated in the Iran-Contra Affair,some of whom still faced trial.
The Nixon pardon was a political disaster that ended Fords presidential honeymoon, but it also sparked a debate among legal commentators about whether it was constitutional. Mark Rozell gives a brief and interestingtreatmentof the debate. Some argued it was beyond the power of the president to relieve a person of criminal liability for hypothetical offenses (see Edwin Brown Firmage and R. Collin Magnumhere). However most sources suggest a prospective pardon is within the presidents constitutional authority. InEx Parte Garland, 71 U.S. 333, 380 (1867), the Supreme Court described the power in broad temporal terms:
The [pardon] power extends to every offense known to the law, andmay be exercised at any time after its commission, eitherbefore legal proceedings are taken, or during their pendency, or after conviction and judgment. (emphasis added).
A 1995 Office of Legal Counsel (OLC) opinionnotesthat presidents throughout U.S. history have asserted the power to issue pardons prior to conviction, and the consistent view of the Attorneys General has been that such pardons have as full an effect as pardons issued after conviction. It cites an Attorney General opinion from the 1850s, which defends the presidents preemptive power on the grounds that the act of clemency and grace is applied to the crime itself, not to the mere formal proof of the crime. Members of Congress have occasionally contemplated a constitutional amendment to preclude a future pardon like Nixon received, which itself suggests Congress acquiesces to the Executive Branchs view. Most legal authorities indicate President Trump has the power to grant prospective pardons for criminal acts not subject to formal charge.
Three days before Nixon resigned, OLC issued anopinionthat [u]nder the fundamental rule that no one may be a judge in his own case, the President cannot pardon himself. Most legal experts supported that view, although the arguments as to why vary from natural law (first principles such as no man can be a judge in his own case) to constitutional structure (a self-pardon would defeat the purposes of Article I, Section 4, which expressly allows officeholders removed by impeachment to be subject to criminal prosecution). A handful of Republican members of Congress cited the possibility of self-pardon as a justification for their votes to impeach President Bill Clinton, which is discussed in the introduction to this Oklahoma Law Reviewarticle. While some doubt remains about whether the president has the authority to pardon himself, a self-pardon is most likely legally ineffective from shielding a president from future federal prosecution.
In its Watergate opinion, OLC also suggested that the president could invoke Section 3 of the Twenty-Fifth Amendment to allow the vice president, in his role as acting president, to pardon the president. If the President declared that he was temporarily unable to perform the duties of his office, the Vice President would become Acting President and as such he could pardon the President. Thereafter the President could either resign or resume the duties of his office, the opinion stated. However, if the president and vice president conspired to launder away the presidents criminal liability, it would trigger a seismic political event. It would also tarnish the vice presidents standing as a politically viable successor in the event of impeachment. However, I have not yet seen a legal obstacle to that kind of scheme.
As for the special counsel, a prospective pardon would have a narrowing effect on his authority, as it would end any criminal jeopardy arising from his investigation. However, provided there are still active leads and targets, the special counsel mandate would continue. It would raise interesting legal questions. For example, a pardoned individual could still potentially serve as an unindicted coconspirator, which triggers benefits to a prosecution such as a hearsayexceptionfor co-conspirator statements.
Congressional investigations serve legislative policy and oversight goals rather than criminal enforcement goals, so a pardon does not end an Article I inquiry. But there could be other counterintuitive effects of a pardon on the ongoing congressional investigations into Russias interference in the 2016 election and whether there was any coordination with the Trump campaign. For example, it could potentially remove federal legal jeopardy in a manner that may defeat an assertion of the Fifth Amendment privilege against self-incrimination. Were Trump to pardon his former national security adviser, Michael Flynn, tomorrow, Congress might be able to get a court order requiring Flynn to testify before the committees because he no longer faces federal criminal prosecution. That court order or resulting congressional contempt finding, in turn, could theoretically be enforced by coercive contempt (i.e., jailing until such time as the witness provides ordered testimony). Because coercion serves process integrity goals rather than criminal goals, that enforcement power probably could not be defeated by another presidential pardon.
The criminal and congressional Russian investigations should proceed with integrity and without interference. With Trump at the helm and his family under scrutiny, pardon power hangs over the investigations like a sword of Damocles. The pardon sword is largely held overhead by a thread made of political, rather than legal, fiber.
Read more:
Are There Limits To Trump's Pardon Power? - HuffPost
Posted in Fifth Amendment
Comments Off on Are There Limits To Trump’s Pardon Power? – HuffPost
The Bill of Rights – Courier-Gazette & Camden Herald (subscription)
Posted: at 11:54 am
By Dale Landrith Sr. | Jul 20, 2017
On July 4 we celebrated Independence Day. This holiday represents the concepts enumerated in the Declaration of Independence of basic freedoms. That Declaration emphatically states that, We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty, and the pursuit of Happiness.
When the Constitution of our country was adopted, these unalienable rights were not specifically included. Freedom-loving people demanded that they be a part of our Constitution. Thus, through a process of amendments, 10 items were added to ensure these freedoms and ratified Dec. 15, 1791. The first 10 amendments to the Constitution became known as the Bill of Rights.
The First Amendment includes provisions that there shall be no dictated national religion and that there shall not be any restrictions on the exercise of religious beliefs. This amendment follows with guaranteeing the right of free speech and a free press. Our country today faces untold instances of expressions of ugly and hurtful speech. We see outlandish examples of and seeming abuses of these freedoms in todays society. Does this mean that we should now pass laws that limit religion or speech? Absolutely not! Any law limiting others who seemingly abuse these freedoms can then be used to limit our right to express our views. There are many times when our inner self would say, shut them up, and then we realize that we would not want to be shut up.
The Fourth Amendment guarantees the right against unreasonable search and seizures. We see obviously guilty criminals set free as a result of authorities violating this freedom, and sometimes become very angry at some not being held accountable for their deeds. Should the restrictions on search and seizure be changed so that the obviously guilty not be set free? Absolutely not! There are already government abuses of this freedom, and they must stop. SWAT team tactics for political purposes have recently been observed in Wisconsin. Such government conduct threatens the freedoms of the Fourth Amendment in a major way.
The Fifth Amendment provides that no person shall be deprived of life, liberty, or property, without due process of law. There are evidences of government overreach, such as civil forfeiture laws currently in use that abuse the Fifth Amendment and should be deemed unconstitutional. This amendment guards against actions that characterize a police state. We are protected against a government's going rogue.
Space does not permit a review of all 10 amendments of the Bill of Rights. However, even with a minority of people or government taking advantage of these freedoms and abusing their intent, the general populous is better served by having these protections. This same type of protection is embedded in another amendment.
The Second Amendment provides that, the right of the people to keep and bear Arms, shall not be infringed. In virtually every incident of gun violence, there is a cry to limit firearms, ammunition, and/or their accessories and infringe on this Second Amendment guarantee. When surveyed, the American people do not want the Second Amendment violated. Gun owners and non-gun owners do not want restrictions on their ability to possess firearms.
While there is disagreement on certain restrictions, Americans agree that firearm possession is part of American culture, according to my reading of a survey published in June by the Pew Research Center on its website, pewsocialtrends.org.
The Second Amendment is just as important to American freedom as are the other amendments. There are people who abuse and misuse firearms, and this can have tragic consequences. However, there are people who abuse and misuse the freedoms from the other nine amendments in the Bill of Rights.
Misuse of free speech or the free press can also kill, injure and cause lasting harm. We need to be conscious of protecting all the freedoms that our Constitution guarantees, including the Second Amendment. The freedoms expressed in the Bill of Rights are there to protect Americans, and while there are certainly abuses, they are the basis of who we are as the greatest nation ever to exist.
Visit link:
The Bill of Rights - Courier-Gazette & Camden Herald (subscription)
Posted in Fourth Amendment
Comments Off on The Bill of Rights – Courier-Gazette & Camden Herald (subscription)
Editorial, 7/21: Sessions wrong to reinstate forfeiture practice – Lincoln Journal Star
Posted: at 11:54 am
The Fourth Amendment of the Constitution protects Americans against unreasonable searches and seizures. The same can no longer be said about the Justice Department.
Attorney General Jeff Sessions issued a directive Wednesday reinstating the controversial practice of adoptive forfeiture, expanding the ability of law enforcement to take possession of assets belonging to suspects even if they havent been or wont be charged with a crime under civil law and later profit from the assets so long as the low bar of probable cause is met.
This is why adoptive forfeiture is a bad deal for Americans, and more than two dozen states restricted the process in recent years. In few places will Sessions change be felt more acutely than Nebraska, a leader in forfeiture reform.
Last year, the Legislature passed a laudable measure that banned permanent asset seizures by law enforcement until a suspect was convicted of a crime and limited when the less-restrictive civil forfeiture process could be used.
Now, its all but moot, as local law enforcement can skirt more restrictive state laws in favor of the far more permissive federal standards.
Although Sessions directive includes modest safeguards against abuse most notably, requiring more detail from law enforcement on probable cause and notifying people of their rights his agency took a net step backward. His document doesnt address the major concerns about the practice of forfeiture:
* The Constitution requires the presumption of innocence until a person is found guilty in court. By requiring those whose assets are seized to sue for their return, the courts are essentially holding those people as guilty until being proved innocent.
* Equitable sharing, which was suspended along with adoptive forfeiture at the federal level in 2015, allows law enforcement agencies to keep up to 80 percent of proceeds while sharing at least 20 percent with federal authorities. This federal policy encourages local law enforcement to seize assets and police for profit.
* By allowing law enforcement agencies to circumvent state laws and instead operate under the far less onerous federal guidelines, the Justice Department has overruled the local control Republicans vociferously defend.
This sudden pivot in favor of restoring the adoptive forfeiture runs counter to the platform adopted at last summers Republican National Convention, which accurately notes: When the rights of the innocent can be so easily violated, no ones rights are safe. We call on Congress and state legislatures to enact reforms to protect law-abiding citizens against abusive asset forfeiture tactics.
Seizing the ill-gotten gains of a person tried and convicted in court is wholly defensible for local, state and federal law enforcement agencies. But Sessions directive reopens a dangerous Pandoras box that disregards both the due process rights of Americans and self-rule of state governments.
See more here:
Editorial, 7/21: Sessions wrong to reinstate forfeiture practice - Lincoln Journal Star
Posted in Fourth Amendment
Comments Off on Editorial, 7/21: Sessions wrong to reinstate forfeiture practice – Lincoln Journal Star
Anti-Second Amendment Academics Shot Down in Texas Case – AmmoLand Shooting Sports News
Posted: at 11:54 am
By Dean Weingarten
Arizona -(Ammoland.com)- In August, 2016, two professors from the University of Austin, Texas, and an Associate Teaching Assistant Professor, sued the Attorney General of Texas, Ken Paxton, the President of the University of Texas, Austin, and the Members of the Board of Regents of the University of Texas at Austin.
A number of frivolous claims were offered in an attempt to stop the Texas statute allowing exercise of the Second Amendment on Campus from going into effect.
The claims included that the law is vague, the law violated the plaintiffs' First Amendment, Second Amendment, and Fourteenth Amendment rights. The arguments were childish, irrational, emotional rants.
Here is an example:
48. The Texas statutes and university policies that prohibit Plaintiffs from exercising their individual option to forbid handguns in their classrooms violate the Second Amendment to the United States Constitution, as applied in Texas through the Due Process Clause of the Fourteenth Amendment. These policies and procedures deprive Plaintiffs of their Second Amendment right to defend themselves and others in their classrooms from handgun violence by compelling them as public employees to passively acquiesce in the presence of loaded weaponry in their place of public employment without the individual possession and use of such weaponry in public being well-regulated. This infringement lacks any important justification and is imposed without any substantial link between the objectives of the policies and the means chosen to achieve them.
Judge Lee Yeakel heard the claims, read the suit, and concluded that the plaintiffs had no standing because they had not suffered any harm.
From reporternews.com:
A federal judge has dismissed a long-shot lawsuit filed by three University of Texas at Austin professors seeking to overturn the state's 2015 campus carry law, which allows people to carry concealed handguns inside most public university buildings.
District Judge Lee Yeakel wrote in his decision that the professors Jennifer Lynn Glass, Lisa Moore and Mia Carter couldn't present any concrete evidence to substantiate their fears that campus carry would have a chilling effect on free speech.
From the decision, at texasattorneygeneral.gov(pdf):
The court concludes that Plaintiffs have not established an injury-in-fact, nor that the alleged injury is traceable to any conduct of Defendants. Friends of the Earth, 528 U.S. at 180-81. Accordingly, the court will dismiss this cause for lack of subject-matter jurisdiction. Crane v. Johnson, 783 F.3d 244,251 (5th Cir. 2015). (Because [appellants] have not alleged a sufficient injury in fact to satisfy the requirements of constitutional standing, we dismiss their claims for lack of subject matter jurisdiction.)
III. CONCLUSION
IT IS ORDERED that UT Defendants' Motion to Dismiss Plaintiffs' Amended Complaint (Clerk's Doc. No. 64) and Defendant Ken Paxton's Motion to Dismiss the First Amended Complaint (Clerk's Doe. No. 65) are GRANTED
The results of the lawsuit are were expected. The claims were frivolous to those who actually read them.
It took nearly a year for the court to reach that conclusion. Some Minnesota students attempted to duplicate the Texas protests. No serious incidents have been associated with the restoration of Second Amendment freedoms on Campus. Other than the Minnesota copy cat protests, protests related to Texas Campus Carry have withered away. 2017 by Dean Weingarten: Permission to share is granted when this notice is included.
Link to Gun Watch
About Dean Weingarten:
Dean Weingarten has been a peace officer, a military officer, was on the University of Wisconsin Pistol Team for four years, and was first certified to teach firearms safety in 1973. He taught the Arizona concealed carry course for fifteen years until the goal of constitutional carry was attained. He has degrees in meteorology and mining engineering, and recently retired from the Department of Defense after a 30 year career in Army Research, Development, Testing, and Evaluation.
View post:
Anti-Second Amendment Academics Shot Down in Texas Case - AmmoLand Shooting Sports News
Posted in Second Amendment
Comments Off on Anti-Second Amendment Academics Shot Down in Texas Case – AmmoLand Shooting Sports News







