The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: August 1, 2017
Your Watch Needs a NATO Strap – Fortune
Posted: August 1, 2017 at 5:56 pm
It's the height of summer and that stainless steel bracelet is making your wrist feel uncomfortable and sweaty. (The leather band isn't so lovely, either.) What you need is a stylish solution worn by British spies and watch enthusiasts alike.
You need a NATO strap.
The NATO strap wasn't developed by the defense alliance of the same name but rather the British Ministry of Defence. (The NATO name came from its stock number.) The design of the strap is perfect for rugged conditions. It's a one-piece strap that slides underneath the case so that the skin never touches metal. It's great on hot days because the nylon wicks moisture away from the skin. It also means the strap will stay on the wrist even if a spring bar pops out.
The real beauty of the NATO is its simplicity. It's inexpensive (though fancier leather variants exist), infinitely adjustable, available in dozens of colors and patterns, and is extremely comfortable on the wrist.
Whether it's an Aston Martin, a vodka martini, or a Rolex Submariner an association with the James Bond franchise makes a product all the more desirable. And how did the most iconic Bond (Sean Connery, don't @ me ) in his most iconic movie (1964's Goldfinger) wear his Rolex? On a NATO strap, as any self-respecting British naval commander would.
The strap only features in the movie for a split-second but it was enough to cement the diver's watch/NATO combination as a classic look.
The humble NATO doesn't care about the social standing or bank balance of its owner. It looks just as good on a $40 Timex Weekender as it does on a $5,000 Omega Speedmaster . It even fits perfectly with sportier haute horlogerie pieces like the Patek Phillipe Nautilus .
As with all things watches you can spend as much or little as you like. I've tried many of the brands available on Amazon and found BluShark's Premium Nylon at around $17 to be the best balance of budget and quality. (Skip anything around the $10 mark, the nylon is thin and the buckles are poor quality.)
For those looking for something more special, Omega has launched eight new NATO straps with a handy online tool to match the strap to your timepiece. Theirs start at $180.
Weve included affiliate links in this article. Click here to learn what those are.
Read more here:
Your Watch Needs a NATO Strap - Fortune
Posted in NATO
Comments Off on Your Watch Needs a NATO Strap – Fortune
What do DoD officials think of splitting NSA/CYBERCOM dual hat? – Federal Times
Posted: at 5:56 pm
For the past few years, there has been much discussion regarding the separation of these two agencies as CYBERCOM was co-located with NSA at its standing up to help get the organization on its feet. As their capabilities and capacities mature, there has arisen a heated argument between some in the executive branch and in Congress to split the two, something that was always envisioned with no clear timeline indicated.
According to officials, DoD does not have an official position on the advantages and disadvantages of the dual-hat leadership arrangement of NSA/CSS and CYBERCOM, GAOs report said. As of March 2017, DoD officials informed us that DoD had not determined whether it would end the dual-hat leadership arrangement and was reviewing the steps and funding necessary to meet the requirements established in the law.
Advantages include more in-depth coordination and collaboration, faster decision-making and more efficient use of resources.
Disadvantages, meanwhile, citing comments from officials canvased, include:
Congress has stipulated a series of measures the government must meet prior to severing the dual-hat, one of which is the cyber mission force must reach full operational capability, something that is not slated to occur until September 2018.
The GAO report also outlined, based on conversations with DoD officials, efforts to mitigate risks associated with ending the dual-hat. They include:
Read the original here:
What do DoD officials think of splitting NSA/CYBERCOM dual hat? - Federal Times
Posted in NSA
Comments Off on What do DoD officials think of splitting NSA/CYBERCOM dual hat? – Federal Times
Report: NSA Illegally Surveilled Kim Dotcom in New Zealand – Newsmax
Posted: at 5:56 pm
The National Security Agency used New Zealand government technology to spy on Megaupload founder Kim Dotcom, The New Zealand Herald reports.
New Zealand's Government Communications Security Bureau (GCSB) admitted to the country's high court that it ended surveillance on Dotcom in 2012. However, the Herald obtained the court judgment in July showing that the GCSB "has admitted unlawfully intercepting private communications of Kim and Mona Dotcom (the Dotcoms) and Bram van der Kolk during the period from Dec. 16, 2011 to March 22, 2012."
The documents show that the GCSB ended its active involvement on Jan. 20, 2012, the day Dotcom's mansion was raided by the police. However, "limited interception of some communications continued beyond the detasking date without the knowledge of GCSB staff."
A 2013 review of the GCSB found that it had unlawfully spied on 88 people.
According to the Herold, the GCSB documents contain an admission of NSA involvement, but it was not made outright.
Dotcom told the Herald, "New Zealanders must know how much power a foreign state holds over their private information."
He added, "The NSA has unrestricted access to GCSB surveillance systems. In fact, most of the technology the GCSB uses was supplied by the NSA."
Dotcom also said he expects his legal team to take action in response to this revelation.
"If the GCSB was aiding and abetting the NSA to spy directly on New Zealanders, then the seriousness of the situation has changed dramatically and a truly independent inquiry and a new criminal investigation will be unavoidable."
2017 Newsmax. All rights reserved.
See the article here:
Report: NSA Illegally Surveilled Kim Dotcom in New Zealand - Newsmax
Posted in NSA
Comments Off on Report: NSA Illegally Surveilled Kim Dotcom in New Zealand – Newsmax
ShadowBrokers leak probe looking at NSA insiders: report – The Hill
Posted: at 5:56 pm
Investigators believe the ShadowBrokers leaks were from a National Security Agency insider, thewebsite CyberScoop reports.
Since August of last year, the ShadowBrokers have leaked files apparently stolen from the NSA, primarily source code for NSA hacking tools along with some additional files.
One set of files leaked by the group contained tools to hack into the Windows operating system. Those tools were eventually used in the devastating international ransomware attacks known as WannaCry and NotPetya.
WannaCry infected between hundreds of thousands and millions of systems, causing such damage to the United Kingdoms hospitals that some patients were turned away. NotPetya caused significant damage to a major Russian energy firm and the U.S.-based pharmaceutical giant Merck.
Citing multiple sources familiar with the investigation, CyberScoop reports that ex-NSA employees have been contacted by investigators concerning how the ShadowBreakers obtained their cache of files.
The report claims that the leadingtheory is that an inside actor was at the helm but that other theories are still in the mix, including a foreign hacker.
Sources also told CyberScoop that the investigation "goes beyond" Harold Martin, the NSA contractor arrested for hoarding classified documents at his home last year.
The ShadowBrokers claim to have leaked files to raise interest for a planned sale of the remaining cache of documents. Currently, the group is offering a subscription, leak-of-the-month service.
The rest is here:
ShadowBrokers leak probe looking at NSA insiders: report - The Hill
Posted in NSA
Comments Off on ShadowBrokers leak probe looking at NSA insiders: report – The Hill
Second Circuit: Fifth Amendment Bars Testimony Compelled by Foreign Governments – Lexology (registration)
Posted: at 5:55 pm
The court vacates LIBOR convictions with significant implications for US criminal cases involving cross-border investigations.
Key Points: The Fifth Amendment also limits the use a defendants statements compelled by a foreign power. The government bears the heavy burden of showing all evidence is derived from a source
wholly independent of a defendants statements compelled by a foreign power. The governments reliance on tainted evidence before a grand jury was not harmless and
warrants dismissal of indictment.
Introduction Parallel investigations involving the US Department of Justice (DOJ) have been a part of the white-collar landscape for half a century. When financial or similar crimes are involved, the target of a grand jury investigation can also face peril from multiple civil agencies, like the US Securities and Exchange Commission (SEC), the US Commodities Futures Trading Commission (CFTC), or other federal and state regulators. Over time, DOJ and civil agencies have developed procedures that allow those proceedings to advance simultaneously and to share information consistent with the important protections imposed by the Federal Rules of Criminal Procedure, such as the grand jury secrecy requirement of Rule 6(e), and constitutional protections, such as the Fifth Amendments protection against self-incrimination.1
DOJ involvement in parallel or cross-border investigations that involve coordination with foreign financial regulators has risen dramatically in the past decade. Many of the most significant DOJ investigations in the past several years involved parallel investigations by foreign regulators, and that trend only seems to be accelerating. As was the case for parallel civil-criminal proceedings in the US, parallel DOJ- international investigations require DOJ to develop procedures for cross-border investigations that adequately protect key statutory and constitutional protections when working with foreign counterparts, many of whom have very different models of investigation and prosecution.
The Second Circuits decision in United States v. Allen highlights the challenge the prosecution of crimes transcending US borders can pose for DOJ.2 In Allen, the Second Circuit vacated two LIBOR-related convictions and dismissed the underlying indictments based on a cooperating witness exposure to the defendants statements compelled by a UK regulatory authority.3 The Second Circuit held that, pursuant to the Fifth Amendment, where a defendant has been compelled to provide testimony by a foreign power, the government bears the heavy burden of proving that it has not relied on that testimony.4
Latham & Watkins July 31, 2017 | Number 2188 | Page 2
The LIBOR Investigations Allen is the first criminal prosecution in the US related to the London Interbank Offered Rate (LIBOR) manipulation scheme to reach a US Court of Appeals.5 Beginning in 2011, the US and UK were investigating banks for manipulating their LIBOR submissions to benefit themselves in LIBOR-tied transactions.6 As widely reported, and as noted by the Allen court, by 2012, DOJ and the UK Financial Conduct Authority (FCA) had begun to investigate the bank then known as Coperatieve Centrale Raiffeisen-Boerenleenbank B.A. (Rabobank) for LIBOR manipulation.7
The bank was a LIBOR contributor for the US Dollar (USD) and Japanese Yen (JPY). One of the Allen defendants, Allen, was responsible for the banks USD LIBOR submissions and the supervision of other LIBOR-responsible personnel. The other defendant, Conti, was also responsible for USD submissions. A third trader, Robson, was responsible for JPY LIBOR submissions.8 FCA interviewed Allen, Conti and Robson. The FCA interviews were compulsory, as witnesses faced imprisonment if they refused to testify. Recognizing the Fifth Amendment risks associated with these compelled statements, DOJ and FCA implemented a wall between their respective investigations, and DOJ conducted interviews prior to the FCA.9
The FCA brought an enforcement action against Robson and, following normal FCA procedure, disclosed relevant evidence, including Allen and Contis compelled testimony. Robson reviewed, annotated and took handwritten notes regarding that testimony. The FCA thereafter stayed its enforcement action in favor of Robsons criminal prosecution in the US.
Indictment, Trial, and Kastigar Hearing A grand jury in the Southern District of New York (SDNY) returned an indictment charging Robson with, inter alia, wire fraud. Robson pleaded guilty and signed a cooperation agreement with DOJ. Thereafter, the government charged Allen and Conti with conspiracy to commit wire and bank fraud, and substantive wire fraud. Robsons testimony, which an FBI agent presented to the grand jury, was the grand jurys sole source of material evidence regarding Allen and Contis alleged role in the LIBOR manipulation scheme.10
Prior to trial, defendants moved to dismiss the indictments and suppress Robsons testimony based on Kastigar v. United States.11 In Kastigar, the Supreme Court held that, when a witness has invoked his or her Fifth Amendment privilege, the government can compel that witness testimony only by granting immunity against both direct and derivative use of that testimony.12 When an immunized witness later becomes a defendant, a hearing is held in which prosecutors are required to establish that the governments case is not based on the compelled testimony. This burden of proof ... is not limited to a negation of taint; rather, it imposes on the prosecution the affirmative duty to prove that the evidence it proposes to use is derived from a legitimate source wholly independent of the compelled testimony.13
At trial, Robson testified and (again) was the sole source of material evidence regarding Allen and Contis role in the alleged scheme. Allen and Conti were convicted of all charges.14 The Court then held a two- day hearing on the defendants Kastigar motions.15 The extent of Robsons exposure to Allen and Contis compelled statements was disclosed by the government, but Robson testified that his trial testimony was not impacted by that exposure.16 The government argued, inter alia, that the Courts ruling in United States v. Balsys,17 which held that the Fifth Amendment did not foreclose the government compelling testimony that might incriminate the witness in a foreign criminal prosecution, likewise permits the governments use of testimony compelled by a foreign power.18 The government further argued that Kastigars independent source doctrine19 applies only to testimony compelled by US federal or state authorities, not foreign powers.20 Finally, the government emphasized the steps that DOJ and FCA took to ensure that FCA-compelled testimony would not taint DOJs investigations, including a DOJ
Latham & Watkins July 31, 2017 | Number 2188 | Page 3
presentation to FCA representatives on the Fifth Amendment, Kastigar, and the importance of maintaining a wall between their investigations.21 DOJ also obtained written assurances from UK investigators that they would not share information derived from compelled testimony, and established a day one/day two approach for interviews by which DOJ would interview Rabobank personnel prior to FCA.22 The District Court denied the Kastigar motions, assuming that even if the Fifth Amendment applied to statements compelled by a foreign power, the government had satisfied its burden under Kastigar.23
The Second Circuit Decision Allen and Conti appealed arguing, inter alia, that the District Court erred in denying the Kastigar motion. The Second Circuit agreed, finding that the governments reliance on Robsons testimony necessitated vacatur of defendants convictions and dismissal of their indictments.24
The Second Circuit held that the Fifth Amendment precludes the governments reliance on a defendants testimony compelled by a foreign power at trial.25 When such testimony exists, the government bears the heavy burden of proving that all of the evidence it proposes to use was derived ... from a legitimate source wholly independent of the compelled testimony.26 In Allen, this required the government to prove that Robsons exposure to Allen and Contis compelled statements did not shape, alter, or affect the information that [Robson] provided and that the Government used.27 The Second Circuit found that Robsons conclusory denials at the Kastigar hearing were insufficient to carry that burden in light of the fact that Robsons pre-exposure FCA testimony was materially inconsistent with his post-exposure testimony before the grand jury and at trial.28 The Second Circuit further stated, in dicta, that the most effective way for the government to carry this burden would be by demonstrating that [the witness] testimony was unchanged from comparable testimony given before the exposure.29
The Second Circuit further found that the governments reliance on Robsons testimony was not harmless, thus necessitating that defendants convictions be vacated.30 Reliance on tainted evidence is harmless, and a conviction will survive, when a court is persuaded beyond a reasonable doubt that the jury would have reached the same verdict without consideration of the tainted evidence.31 The Second Circuit refused to find that reliance on Robsons testimony was harmless when he was the unique source of particularly significant and incriminating evidence.32
The Court further found that defendants indictments required dismissal based on the governments reliance on Robsons testimony before the grand jury.33 In doing so, the Second Circuit held that if the government has presented immunized testimony to the grand jury, the indictment should be dismissed unless the government established that the grand jury would have indicted even absent that testimony.34 The Court could not conclude the grand jury would have indicted but-for Robsons testimony, because that testimony was not merely material, but essential, and provided the grand jury with definitive, clear-cut testimony that Allen and Conti had directly participated in the scheme.35 The Second Circuit further refused to maintain those indictments based on documentary evidence presented to the grand jury, when such evidence was available prior to Robsons cooperation but DOJ chose to charge Allen and Conti only after obtaining Robsons post-exposure testimony.36
Significance of the Allen Decision In Allen, the Second Circuit has sent a strong signal that it will guard the procedural protections afforded all defendants in the US, even if both DOJ and its foreign counterparts acted in good faith and lawfully in their respective jurisdictions when conducting the investigation. In so doing, the Court has placed the onus on DOJ to continue to develop procedures for working with DOJ foreign counterparts to ensure evidence developed in foreign investigations does not compromise prosecutions in the US.
Latham & Watkins July 31, 2017 | Number 2188 | Page 4
The consequences of DOJ and its foreign counterparts developing the additional procedures give rise to new risks, however. The possibility that statements from a parallel proceeding may trigger a Fifth Amendment violation will likely lead to still closer and earlier collaboration between DOJ and its foreign counterparts, ex ante. This may force DOJ to bring its resources and expertise to bear at an earlier stage of cross-border investigations to minimize the risk of adverse consequences in those multiple jurisdictions, ex post. As the Court noted in Allen, this kind of deeper collaboration has already begun, as evidenced by the recent placement of DOJ prosecutors with Eurojust in The Hague and INTERPOL in France, and the detailing of DOJ anti-corruption prosecutors to the UKs Serious Fraud Office (SFO) and FCA.37
Defense counsel, in particular US lawyers representing individuals under scrutiny in cross-border investigations, should consider coordinating closely with counsel in each jurisdiction to gain a complete understanding of the processes and risks attendant to each parallel investigation. Counsel should also note the Second Circuit panels skepticism regarding the governments decision to prosecute these defendants in the US. At oral argument, Judge Jos A. Cabranes asked both sides to explain why Main Justice had brought charges against two UK nationals who were young, relatively low-level employees working at a Dutch bank in London.38 Judge Cabranes described the circumstances as a puzzlement.39 Appellant counsel noted that a critical witness, whose exonerating testimony would have been available in the UK, proved unavailable to defendants because the government opposed, and the District Court denied, their motion to order that witness deposition.40 Judge Gerard E. Lynch questioned whether this resulted in the jury ... not [being] permitted to hear all of the evidence that bears on the question of whether defendants had engaged in unlawful conduct.41 Through this prism, the Second Circuit then considered whether the governments use of defendants FCA-compelled testimony ran afoul of the Fifth Amendment.
The Allen opinion also highlights DOJs need to maintain sufficient procedural protections when private US industry regulators, such as the Financial Industry Regulatory Authority (FINRA), conduct parallel investigations of a criminal defendant. The Fifth Amendment does not preclude private self-regulatory organizations (SRO) like FINRA from compelling testimony from its members,42 and typically, the government can use that testimony in US criminal proceedings.43 But, the Second Circuit has stated, in dicta, that the Fifth Amendment could limit use of SRO-compelled testimony in criminal proceedings if there is a sufficiently close nexus between the State and the challenged action of the SRO.44 Based on Allen, where such nexus exists and the SRO has compelled a defendants testimony, the government likely will bear the burden of satisfying Kastigars wholly independent standard. Thus, much like its foreign counterparts, DOJ must consider carefully how to avoid triggering a Fifth Amendment violation due to use, even indirectly, of a defendants compelled statements from a parallel SRO proceeding. Whether they involve foreign jurisdictions, domestic regulators, or both, the increasing occurrence of investigations pursued in multiple jurisdictions and simultaneously under administrative, regulatory, and criminal procedures requires careful handling and a thorough understanding of the issues and risks involved.
<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Dot Gain 20%) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 50SWOP 51 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.4 /CompressObjects /Tags /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /CMYK /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams false /MaxSubsetPct 100 /Optimize true /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness true /PreserveHalftoneInfo false /PreserveOPIComments true /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 300 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /ColorImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 300 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /GrayImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile () /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description << /ARA
This article is made available by Latham & Watkins for educational purposes only as well as to give you general information and a general understanding of the law, not to provide specific legal advice. Your receipt of this communication alone creates no attorney client relationship between you and Latham & Watkins. Any content of this article should not be used as a substitute for competent legal advice from a licensed professional attorney in your jurisdiction.
Here is the original post:
Second Circuit: Fifth Amendment Bars Testimony Compelled by Foreign Governments - Lexology (registration)
Posted in Fifth Amendment
Comments Off on Second Circuit: Fifth Amendment Bars Testimony Compelled by Foreign Governments – Lexology (registration)
Reich Says Former GOP Congressman Said Trump is ‘Fritzing Out’ – Roll Call
Posted: at 5:55 pm
It isnt any secret that Robert Reich would love to see President Donald Trump leave office. Now he saysRepublicans would, too.
In apost on his websiteand Facebook page, Reich shared a transcript ofa conversation he said he had with aformer GOP member of Congress, in which the unnamed lawmakersaid Trump is fritzing out.
The economist and former Labor secretary under President Bill Clinton, has an active social media presence, often sharing his opinions on the Trump administration through blog posts and videos. In the post shared Monday, Reich saidRepublicans are afraid Trump will hurt them in the 2018 midterm elections as well as in 2020.
The ex-GOP lawmakerdidnt hold back in his assessment of Trumps administration, calling it a banana republic, according to Reich.
Reichs anonymous source alluded to a Republican Partythat regrets aiding Trump.
They planned to use Trumps antics for cover, to get done what they most wanted big tax cuts, rollbacks of regulations, especially financial, the source said. Theyd work with Pence behind the scenes and forget the crazy uncle in the attic.
Republicans are upset about Trumps behavior, especially his tweets about Attorney General Jeff Sessions and his hiring of Anthony Scaramucci as communications director, the former lawmakersaid. (The transcript was posted before Scaramuccis removal was announced Monday.)
The source also saidRepublicans are maneuvering behind the scenes to put up another candidatefor president in 2020.
Meanwhile, Trump is worried his Cabinet is plotting against him, according to the transcript.
Twenty-fifth amendment!, the ex-lawmaker toldReich. Read it! A Cabinet can get rid of a president whos nuts. Trump thinks theyve been preparing a palace coup. So one by one, hes firing them.
But the source made clear that Trumps Cabinet will not overthrow him.
Its ludicrous, he said. Sessions is a loyal lapdog. [Secretary of State Rex] Tillerson doesnt know where the bathroom is. Thats my point. Trump is fritzing out. Having manic delusions. Hes actually going nuts.
The former GOP lawmakersaid it is only a matter of time before it becomesapparent to everyone that Trump is off his rocker.
Thats where the twenty-fifth amendment really does comes in, he added.
And it could come sooner than predicted, the source added.
My betting is hes out of office before the midterms, hesaid. And Pence is president.
Reich has posted conversation transcripts with a sourcehe identified as aformer Republican member of Congressin the past, including one in the days leading up to the 2016 election. In that post, the unnamed lawmakercalled Trump a maniac and said most Republicans thought hewas deplorable.
But theyre not gonna speak out, the source said at the time. Some dont want to end their political careers. Most dont want to risk their lives. The Trump crowd is just too dangerous. Trump has whipped them up into a g*ddamnfrenzy.
Get breaking news alerts and more from Roll Call on your iPhone or your Android.
Continued here:
Reich Says Former GOP Congressman Said Trump is 'Fritzing Out' - Roll Call
Posted in Fifth Amendment
Comments Off on Reich Says Former GOP Congressman Said Trump is ‘Fritzing Out’ – Roll Call
Symposium: Justices poised to consider, or reconsider, Fourth Amendment doctrines as they assess the scope of … – SCOTUSblog (blog)
Posted: at 5:54 pm
John Castellano is Deputy Executive Assistant District Attorney and Chief Appellate Attorney in the office of Richard A. Brown, District Attorney of Queens County, New York.
The Supreme Courts grant of certiorari in United States v. Carpenter highlights the clash between established Fourth Amendment doctrines and what many argue are the heightened privacy concerns of a digital era. The court will consider the scope of the Fourth Amendments protection of information contained in a cellular carriers records that reflects the location of cell towers used to complete customers phone calls and convey their texts. At stake will be at least two traditional notions underlying the courts Fourth Amendment jurisprudence. The first is the general understanding that information voluntarily exposed to others is not protected by the Fourth Amendment, and the second is the more specific third-party doctrine, which holds that government access to information collected by a private business in order to provide a service to a customer does not constitute a search.
In this case, the government obtained court orders under Section 2703 of the Stored Communications Act for a total of 127 days of historical cell-site information regarding phones used by defendant Timothy Carpenter, who had been named by an accomplice as the mastermind of a string of nine commercial burglaries committed in and around Detroit. As the governments expert testified, the records provided the location of cell towers that handled the defendants calls and texts, and indicated that the defendants phone was within one-half to two miles of the specified tower and within a one-third or one-sixth radial wedge, or sector, of the tower. The U.S. Court of Appeals for the 6th Circuit applied the third-party doctrine to hold that the Fourth Amendment did not protect this information, because the records obtained were those of the cellphone provider and reflected information collected by the provider in order to provide a service to the defendant. The court of appeals also noted that cellphone customers generally understand that when they use their cellphones for calls or texts, they are employing nearby cell towers and thus providing information to the carrier, including their general whereabouts.
The issue may not be so clear cut for some members of the Supreme Court, however. In a 2011 concurrence in United States v. Jones, Justice Sonia Sotomayor wrote that, although the third-party doctrine was not at issue in that case, it might in the future be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. And Justice Samuel Alito, writing for himself and three other members of the court, noted in Jones that long-term monitoring of specific GPS-location data could impinge on expectations of privacy, but suggested that legislative solutions might be best suited to balance these concerns with public safety in an era of dramatic technological change.
The way in which the Supreme Court resolves these issues in Carpenter will undoubtedly revolve around how the justices view the scope of the issue presented. If the question is, as some suggest, whether the Fourth Amendment does anything to regulate government access to the nearly limitless information stored by telecommunications companies and internet service providers, many of the justices are likely to be reluctant to sign on to an expansive application of traditional doctrines. But if the issue is confined to the particular type of information involved in this case, the specific privacy interests at stake, the judicial mechanism Congress provided to restrict access to the information and the legitimacy of the governments interest in the information, the outcome may well be different.
The privacy concerns raised by the specific information at stake in this case may be far less significant than those attached to other types of information a digital consumer provides to carriers or internet providers. The information obtained in Carpenters case involved only the location of towers used to convey calls and messages, and not, notably, the content of any communication. As the 6th Circuit noted, in the telecommunications context, the Supreme Court has traditionally distinguished between content-related information and information about the mechanisms used to convey the message. And, whatever the precise contours of the line between content and non-content, in this case there seems little doubt that the information was not content-related.
Moreover, unlike the specific GPS coordinates in Jones, accurate to within 100 feet, the information in Carpenter was non-specific, placing the phone as far away as two miles from the towers, and only within a one-third or one-sixth sector of the tower. Nor is the tower identified in records like those at issue in this case necessarily the closest one to the caller, because two people making calls from the same car at the same time may be employing two different towers, depending on, among other things, whether one tower has reached its capacity.
This difference in specificity between GPS data and cell-site information would appear to be significant. Rather than allowing the government to observe what businesses or residences a phone subscriber visits, and thus, as Sotomayor feared, compile a comprehensive record of a persons public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations, the records in this case identified at best a general neighborhood or group of neighborhoods, which, in an urban context, potentially covers hundreds or thousands of businesses and residences.
Nor is the privacy interest in location information, something traditionally exposed to the public and observable by the government, greater than the privacy interest in other types of documents clearly covered by the third-party doctrine. Numbers dialed from a phone, for example, which are far more specific and in many ways more revealing than the location of cell towers, fall squarely within the third-party doctrine and may be accessed without resort to any court order, as the Supreme Court held in Smith v. Maryland. According to United States v. Miller, the same is true of bank records and other financial information, which many consider to be highly personal and private.
And although some litigants and commentators have challenged the voluntariness of a cellphone customers disclosure of location information, cellphone users, as the 6th Circuit noted, generally understand that the phone company completes calls by the use of cell towers and knows what towers are being used to complete a customers calls. Moreover, all carriers provide notice of their privacy policies, which routinely include warnings that information is collected in connection with the provision of a carriers services and that this information may be provided to law enforcement.
The notion that prosecutors routinely abuse their access to this type of information, effectively tracking the whereabouts of citizens for weeks or months and for little or no reason, lacks a legitimate foundation. For one thing, the government conducts no tracking when it gains access to this type of information: The phone company collects cell-site location information for its own purposes and the government, retrospectively, views it based on a court order. For another, prosecutors do not routinely access such information. In fact, in 2016, prosecutors in Queens, New York, the 10th most populous county in the nation with 2.3 million inhabitants, obtained historical cell-cite information only 92 times, each through a court order, out of the more than 54,000 prosecutions in the county that year. And most of those orders covered periods far less extensive than those in this case. Indeed, more than half of the Queens County orders covered 10 days or less, and an additional 22 percent covered 30 days or less. Only seven orders for the entire year exceeded 90 days, and most of those were issued in pattern robbery or burglary investigations like the one in Carpenter, in which a review of records over a longer time period was warranted.
Furthermore, prosecutors access to cell-site location information is limited by judicial intervention. The Stored Communications Act requires a court order based on specific and articulable facts establishing that the information requested is relevant and material to an investigation. Both the citizens affected and the time period covered by the records can be limited in this manner. This is precisely the type of statutory mechanism that Alito suggested in his concurrence in Jones would operate to protect any perceived privacy interest at stake. Indeed, subpoenas for potentially far more personal information, like bank information, credit card statements and call detail information, can be issued in most states without any such check.
Moreover, the legitimate interest of law enforcement in historical cell-site location information in certain cases is very compelling, because it provides an important investigative tool when it may be difficult or impossible to show probable cause. Orders may be used, for example, to obtain the location history of homicide victims to determine their whereabouts immediately prior to their deaths, thereby aiding in the investigation of relevant events and possible causes. Similarly, when multiple legitimate suspects could have motives for committing a crime, location information may exclude some or all of these suspects. Historical cell-site information can also be used to check the reliability of information provided by informants or contained in the statements of accomplices. And, when pattern crimes are alleged, review of cell-site location data can provide critical evidence of, for example, an individuals commission of serial killings or a persons participation in pattern robberies or burglaries like the one in this case, because presence at multiple crime scenes or other relevant locations over a period of many days or weeks is not likely to be mere coincidence. In this way, a Section 2703 order provides an essential investigative tool, often used in conjunction with subpoena requests and other investigative techniques, that imposes minimal intrusions on any legitimate expectations of privacy.
The Supreme Courts decision in Carpenter will thus likely turn on how broadly the justices view the question presented in the case. Whatever the outcome, the Supreme Courts decision is likely to be merely the opening salvo in the legal debate rather than a definitive resolution of the issues raised by law-enforcement access to cell-site location information.
Posted in Carpenter v. U.S., Summer symposium on Carpenter v. United States, Featured, Merits Cases
Recommended Citation: John Castellano, Symposium: Justices poised to consider, or reconsider, Fourth Amendment doctrines as they assess the scope of privacy in a digital age, SCOTUSblog (Aug. 1, 2017, 2:49 PM), http://www.scotusblog.com/2017/08/symposium-justices-poised-consider-reconsider-fourth-amendment-doctrines-assess-scope-privacy-digital-age/
Posted in Fourth Amendment
Comments Off on Symposium: Justices poised to consider, or reconsider, Fourth Amendment doctrines as they assess the scope of … – SCOTUSblog (blog)
The justices return to cellphones and the Fourth Amendment: In Plain English – SCOTUSblog (blog)
Posted: at 5:54 pm
In 1976, in United States v. Miller, the Supreme Court ruled that the bank records of a man accused of running an illegal whiskey-distilling operation were not obtained in violation of the Fourth Amendment, even though law-enforcement officials did not have a warrant, because the bank records contained only information voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business. Three years later, in Smith v. Maryland, the justices ruled that no Fourth Amendment violation had occurred when, without a warrant and at the request of the police, the phone company installed a device to record all of the phone numbers that a robbery suspect called from his home, leading to his arrest.
These cases are often cited as examples of the third-party doctrine the idea that the Fourth Amendment does not protect records or information that someone voluntarily shares with someone or something else. But does the third-party doctrine apply the same way to cellphones, which only became commercially available a few years after the courts decisions in Miller and Smith? Justice Sonia Sotomayor, at least, has suggested that it should not: In 2012, she argued that the doctrine is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. That question is at the heart of Carpenter v. United States, in which the justices will hear oral argument this fall.
The petitioner in the case, Timothy Carpenter, was accused of being the mastermind behind a series of armed robberies in Ohio and Michigan. Law-enforcement officials asked cellphone providers for the phone records for 16 phone numbers, including Carpenters, that had been given to them by one of Carpenters partners in crime. They relied on the Stored Communications Act, a 1986 law that allows phone companies to disclose records when the government provides them with specific and articulable facts showing that there are reasonable grounds to believe that records at issue are relevant and material to an ongoing criminal investigation; the government does not need to show that there is probable cause to believe that a crime has been committed. Such requests have become a common tool for police officers investigating crimes according to Carpenter, they are made in thousands of cases each year.
Investigators received several months worth of historical cell-site records, which indicate which cell towers a cellphone connected with while it was in use. Based on those records, investigators were able to determine that, over a five-month span in 2010 and 2011, Carpenters cellphone connected with cell towers in the vicinity of the robberies. After his arrest, Carpenter argued that the records should be suppressed because the government had not obtained a warrant for them. But the district court disagreed, and Carpenter was convicted and sentenced to almost 116 years in prison.
A federal appeals court upheld his convictions. Applying the Supreme Courts decision in Smith (among others), it ruled that the government was not required to obtain a warrant because Carpenter could not have expected that cellphone records maintained by his service provider would be kept private. Carpenter then asked the justices to weigh in, which they agreed to do in June.
Carpenter contends that the disclosure of his cellphone records to the federal government was a search for which the government needed a warrant. At the heart of this argument is the idea that, as Sotomayor has suggested, times have changed, and cellphones are different from the more primitive phone technology and bank records at issue in Smith and Miller. Therefore, he tells the justices, they should not mechanically apply their earlier decisions, but should instead use a more nuanced approach that accounts for both the volume and precision of the data that is now available for cellphones. And, in particular, the fact that a third party, such as Carpenters cellphone provider, has access to his cellphone records does not automatically mean that he cannot expect those records to remain private.
But even under Smith and Miller, Carpenter continues, he would still prevail. To determine whether he can expect his records to be kept private, he contends, the justices should look at whether he voluntarily gave the records to his service provider. Here, he stresses, he did not do so in any meaningful way, because he did not affirmatively give information about his location to his service provider by either making or receiving a call. Moreover, he suggests, another factor that the justices should consider his privacy interest in the information revealed by the records weighs heavily in his favor. Most people have their phones with them all the time, he emphasizes, which means that cellphone records can show where someone was and what he was doing at any given time, even in places most notably, at home where he would expect privacy.
In a friend of the court brief, the Electronic Frontier Foundation and other privacy groups echo Carpenters arguments. In particular, the groups highlight how times have changed since the courts third-party-doctrine decisions in the 1970s. Here, they observe, the SCA gives law-enforcement officials access to much more information than just the few days worth of dialed phone numbers at issue in Smith. Moreover, the data that can be obtained under the SCA are generated simply by the act of carrying a phone that has been turned on: It is created whenever the phone tries to send and receive information, generally without forethought or conscious action by the owner.
For the federal government, this case is a straightforward one, regardless of any new technologies like cellphones that may be involved. First, the government contends, Carpenter does not have any ownership interest in the cellphone records turned over to police by his service providers. Those providers, the government reasons, simply collected the information for their own purposes, which included a desire to find weak spots in their network and to determine whether roaming charges should apply.
Second, the government adds, Carpenter does not have any reasonable expectation of privacy in the cellphone records, which only tell the government where his cellphone connected with the towers, without giving it any information about what was said in his calls a core distinction, according to the government. What Carpenters argument really boils down to, the government argues, is that law-enforcement officers could infer from his service-providers records that he was near a particular cell tower at a particular time. But, the government counters, an inference is not a search.
The federal government also pushes back against Carpenters suggestion that broader privacy concerns weigh in favor of Fourth Amendment protection for his cellphone records. Cellphone users like Carpenter know (or at least should know) how their phones work: by giving off signals that are sent to the cellphone providers through the closest tower. Therefore, the government contends, Carpenter assumed the risk that the information would be divulged to police.
Carpenters argument that cellphone records are somehow more private than the financial information that was not protected in Miller has no real support, the government tells the justices. And the information at issue in Carpenters case is more limited than in United States v. Jones, in which the Supreme Court ruled that the installation of a GPS tracking device on a suspects car, without a warrant, violated the Fourth Amendment. In Jones, the government points out, the police used the GPS device to follow the cars movements continuously for 28 days, allowing them to pinpoint the cars location to within 50 to 100 feet. Here, the government emphasizes, the only information that the government received was which tower connected with Carpenters phone when he was making the calls.
Carpenters case is not the Supreme Courts first foray into the intersection of cellphone technology and the Fourth Amendment. In 2014,the justices ruled that police must obtain a warrantto search information stored on the cellphone of someone who has been arrested. In his opinion for the court, Chief Justice John Roberts emphasized that todays phones are based on technology nearly inconceivable just a few decades ago and are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy. And the justices made clear that their decision did not render the information on a cellphone completely off limits to police; it just meant that police officers will normally have to get a warrant. The justices may ultimately conclude that, as the federal government argues, giving law-enforcement officials access to information about where a particular cellphone has been is not the same as allowing them to review the kind of detailed personal facts available on the phone itself. But no matter what they decide, their ruling could shed significant new light on what limits the Fourth Amendment will impose on efforts by police to benefit from the significant technological advances in the 21st century.
Posted in Carpenter v. U.S., Summer symposium on Carpenter v. United States, Plain English / Cases Made Simple, Featured, Merits Cases
Recommended Citation: Amy Howe, The justices return to cellphones and the Fourth Amendment: In Plain English, SCOTUSblog (Jul. 31, 2017, 10:57 AM), http://www.scotusblog.com/2017/07/justices-return-cellphones-fourth-amendment-plain-english/
Originally posted here:
The justices return to cellphones and the Fourth Amendment: In Plain English - SCOTUSblog (blog)
Posted in Fourth Amendment
Comments Off on The justices return to cellphones and the Fourth Amendment: In Plain English – SCOTUSblog (blog)
Digital privacy bill still abandons probable cause for our papers – The Hill (blog)
Posted: at 5:54 pm
The bipartisan ECPA Modernization Act of 2017 introduced by Sens. Patrick LeahyPatrick LeahyDigital privacy bill still abandons probable cause for our papers Overnight Tech: Driverless car bill advances in House | Bezos now world's richest person | Tech groups hail new email privacy bill Senate panel advances measure to protect medical marijuana states MORE (D-Vt.) and Mike LeeMike LeeDigital privacy bill still abandons probable cause for our papers McConnell faces questions, but no test to his leadership Overnight Cybersecurity: Senate sends Russia sanctions bill to Trump | Senators unveil email privacy bill | Russia tried to spy on Macron with Facebook MORE (R-Utah) is a welcome correction to a legislative flaw in the Fourth Amendment protections of emails stored in the cloud. Because of a law created before the cloud came to be, emails stored longer than 18 months could be accessed by government agencies without a warrant signed by a neutral judicial officer after presentation of probable cause of unlawful activity.
Citing the most basic Fourth Amendment protocols against warrantless access to emails, the bill was introduced under the premise of fixing that flaw for these older emails in the cloud. The bill, though, still leaves open probable cause-free access to emails and other papers through use of judgeless administrative subpoenas.
A rule of construction in the ECPA Modernization Act that is entirely inconsistent with the sacrosanct warrant and probable cause provisions of the Fourth Amendment is that it shall [not] limit an otherwise lawful authority of a governmental entity to use an administrative subpoena authorized by Federal or State statute.
Administrative subpoenas, also called civil investigative demands, are search writs issued by government agencies and state attorneys general or prosecutors to disgorge private papers. They may be issued without probable cause, and require no before-the-fact review by neutral judicial officers. They may be enforced in court under threat of contempt and other penalties, and courts give Chevron deference to these writs, meaning the issuers of them may in large degree determine the scope of the laws they claim to be enforcing.
In these regards, administrative subpoenas are worse than the general warrants banned by the Fourth Amendment after Americas colonial experience with the Writs of Assistance, which in fact helped foster the American Revolution. The Writs of Assistance targeted colonial merchants, but were at least issued by judges who could determine that legitimate laws were being enforced. These colonial Writs required returns before judicial officers, and government searchers were subject to legislative penalties and even private lawsuits for exceeding the scope of the judicially authorized searches. Some colonial judges even refused to issue these Writs when government officials refused to provide facts under oath.
The administrative subpoena regime abandons the requirement of probable cause both before issuance by the searchers themselves and in after-the-fact judicial hearings to enforce them. Unlike the general warrants under which judges determined the scope of the searches in advance, although leaving the persons, businesses, and places to be searched up to the discretion of the government searchers, administrative subpoenas may be issued based on flawed interpretations of the law and without independently verified facts indicating law may have been violated by the targets.
Administrative subpoenas therefore lack the separation of powers found even in the Writs of Assistance regime. The discretion of searchers under the administrative subpoena regime is therefore broader and in many ways more dangerous to the Fourth Amendment right of security than the Writs of Assistance.
The Boston Globe recently reported that the American Civil Liberties Union of Massachusetts is calling out the explosion in the use of these sanctioned fishing expedition tool[s], and how some state prosecutors have refused to disclose how many they issue. This mirrors my own experience with one state attorney general who ducked a Freedom of Information Act request about the quantity she issues, claiming attorney-client privilege among other excuses not to comply.
Administrative subpoenas are in fact impossible to reconcile with the Fourth Amendment. The very premise of the ECPA Modernization Act is that government may not violate the security of private records unless a judge has issued a warrant after hearing probable cause under oath that facts indicate a law is being broken. Government officials will exploit this expressly sanctioned loophole in the bill and subpoena emails directly from their targets in this probable cause-free administrative subpoena regime. Neither digital nor hard records will be safe from unreasonable government searches and compelled disgorgement.
Mark J. Fitzgibbons is President of Corporate Affairs at American Target Advertising, Inc.
The views expressed by this author are their own and are not the views of The Hill.
View original post here:
Digital privacy bill still abandons probable cause for our papers - The Hill (blog)
Posted in Fourth Amendment
Comments Off on Digital privacy bill still abandons probable cause for our papers – The Hill (blog)
Rep. Collins introduces Second Amendment Guarantee Act – 13WHAM-TV
Posted: at 5:54 pm
Congressman Chris Collins (R, NY-24) said Monday he will introduce a bill to repeal the portions of the SAFE Act which most impact sportsmen and women. (WHAM photo)
Honeoye Falls, N.Y. (WHAM) - Opponents of New York state's controversial SAFE Act are turning to Congress for help.
Congressman Chris Collins (R, NY-24) said he will introduce a bill to repeal the portions of the SAFE Act which most impact sportsmen and women.
The SAFE Act - which became law in 2013 - lumps the shotguns and rifles used by hunters and sportsmen in with all handguns, including those Governor Cuomo called assault weapons.
"This is the first time I can remember any legislation that was more harmful to law-abiding citizens - legally - than it is to criminals," said Tim Andrews of SCOPE.
"Governor, you are on notice. We are going to repeal and declare, null-and-void, your SAFE Act," Collins told a cheering crowd at Rochester Brooks Gun Club in Honeoye Falls.
On Monday afternoon, Collins unveiled the bill, which he refers to as SAGA - the Second Amendment Guarantee Act.
"Knowing the members as I do, we will have overwhelming support on this bill," Collins said while visiting the Rochester Brooks Gun Club. "Certainly, the minute they find out that the NRA and SCOPE may well be scoring this related to their Congressional score card, we'll get universal support."
SAGA seeks to limit a state's ability to regulate or impose penalties on rifles and shotguns. For example, the SAFE Act Provision limiting rifles to 10 rounds would be replaced with federal standards which currently do not have a limit. Yet it will have no impact on magazine restrictions for handguns.
"It's a good start and better than trying to wait for the whole enchilada," said Gary Zelinski of Canandaigua. "You've got to do something at this point."
New York courts have upheld the SAFE Act, and Republican proposals at the state level - including one to exempt upstate - will not pass without the support of Assembly Democrats from downstate.
"They have a different view on gun ownership," said Senator Rob Ortt (R) Niagara County. "Many of them equate it with crime. We equate the Second Amendment with freedom."
State Senator Rich Funke said, "This federal legislation may well be what we need to restore the freedom New Yorkers have enjoyed for centuries."
The bill asks conservative Republicans to limit the rights of states, but Collins predicted the bill will have the support it needs. "We're not going to allow a state to stomp on your rights for religion, and we're not going to let them stomp on the Second Amendment, and that's the difference," said Collins. "It is state's rights until they override a constitutional amendment."
New York Governor Andrew Cuomo issued a statement Monday afternoon, blasting the bill as a, "blatant political ploy," and, "disturbing."
See the article here:
Rep. Collins introduces Second Amendment Guarantee Act - 13WHAM-TV
Posted in Second Amendment
Comments Off on Rep. Collins introduces Second Amendment Guarantee Act – 13WHAM-TV