{"id":198540,"date":"2017-06-14T03:55:40","date_gmt":"2017-06-14T07:55:40","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/constitution-and-fourth-amendment-gettysburg-times\/"},"modified":"2017-06-14T03:55:40","modified_gmt":"2017-06-14T07:55:40","slug":"constitution-and-fourth-amendment-gettysburg-times","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/constitution-and-fourth-amendment-gettysburg-times\/","title":{"rendered":"Constitution and Fourth Amendment &#8211; Gettysburg Times"},"content":{"rendered":"<p><p>    The Fourth Amendment states, \"The    right of the people to be secure in their persons, houses,    papers, and effects, against unreasonable searches and seizures    shall not be violated, and no Warrants shall issue, but upon    probable cause, supported by Oath or affirmation, and    particularly describing the place to be searched, and the    persons or things to be seized.\" Pretty straightforward, right?    It was, until something labeled the \"Foreign Intelligence    Surveillance Act\" (FISA). Today, every electronic communication    of every kind -- e-mail, telephone conversation, radio or TV    communication, in any medium -- is routinely overheard,    recorded, stored and available for use against any American    citizen by the FBI, the CIA, the NSA, the IRS, the Social    Security Administration and every information and intelligence    gathering agency government-wide. Your cell phone isn't just a    telephone any more: it's a GPS for government trackers; it    stores your phone records and conversations; and the \"your\"    telephone company routinely provides that Government whatever    it asks about what we say, to whom, and when. So do our    computers. The result? There is no longer any reasonable    expectation of privacy, anywhere, anytime, for anyone.  <\/p>\n<p>    One might ask, \"How did this come to    be?\" In 1978, under President Jimmy Carter, Congress enacted    something called the \"Foreign Intelligence Surveillance Act\"    (FISA), whose nominal purpose was to enable the federal    government to eavesdrop, wiretap, or otherwise capture the    contents of communications and\/or conversations involving    people from other nations around the world whom our government    believed might be plotting or conspiring to do America harm. Of    course, some of those nefarious plotters might also be doing so    in conjunction with Americans; therefore, it was necessary to    \"listen in\" on everyone, lest our defenders in the intelligence    community not be able to detect all they could. Which in turn    meant that a mechanism needed to exist to honor the 4th    Amendment - if only in form. Thus came about what is now known    as the \"FISA Court,\" whose two-fold purpose was to approve the    \"listening\" while maintaining a cover for violating the 4th    Amendment, and appearing to provide protection for American    citizens against the very Government behavior things that Court    was approving. (No, it doesn't make sense, but it's the way it    is.) All this, of course, was long before cell phones, personal    computers, laptops and even the internet.  <\/p>\n<p>    kAmwF>2? ?2EFC6 36:?8 H92E :E :D[ H92E6G6C q:8 v@G6C?>6?E    42? 86E 2H2J H:E9[ D>2== 8@G6C?>6?E H:== 7@==@H] $@ ?@H    H6 92G6 2== <:?5D @7 6=64EC@?:4 DFCG6:==2?46[ ac^f[ @?    6G6CJ@?6 E9C@F89@FE E96 =2?5[ 7C@> E96 (9:E6 w@FD6 2== E96    H2J E@ r:EJ w2==] u@C E9@D6 C6256CD 72>:=:2C H:E9 v6@C86    ~CH6==[ Q`hgcQ \ud83d\ude00 2=:G6 2?5 H6==j 2?5[ J6D[ q:8 qC@E96C \ud83d\ude00    H2E49:?8] p?5 =:DE6?:?8] p?5 C64@C5:?8] p?5 H2:E:?8 \\ E@ FD6    H92E6G6C 96 92D 282:?DE 2?J@?6] xEVD ?@ =@?86C D4:6?467:4E:@?j    :EVD 724E  2?5 56D4C:36D E92E A2CE @7 E96 x?E6==:86?46    4@>>F?:EJ E92E 92D 4@>6 E@ 36 =236=65 E96 Qs66A    $E2E6]Qk^Am  <\/p>\n<p>    kAmp82:?[ 9F>2? ?2EFC6 36:?8 H92E :E :D[ 2?5 9F>2?D 36:?8    E96 :?96C6?E=J 4FC:@FD A@=:E:42= 2?:>2=D E92E H6 2C6[    D@>6 \ud83d\ude15 E96 :?E6==:86?46 4@>>F?:EJ 92G6 EFC?65 E96:C    2FE9@C:K2E:@?D 7C@> 8F2C5:?8 282:?DE @FC 6IE6C?2= E9C62ED[    E@ 2EE24<:?8 2?5 56DEC@J:?8 E9@D6 E96J A6C46:G6 2D A2CE:D2?    A@=:E:42= 6?6>:6D  7FCE96C G:@=2E:?8 E96 cE9    p>6?5>6?E[ 3@E9 \ud83d\ude15 DA:C:E 2?5 \ud83d\ude15 724E]k^Am  <\/p>\n<p>    kAmp== @7 E9:D \ud83d\ude00 ?@E @?=J \ud83d\ude15 5:C64E G:@=2E:@? @7 E96 cE9    p>6?5>6?E[ :EVD E@E2==J 56DECF4E:G6 E@ 2 7C66 2?5 @A6?[    D6=78@G6C?:?8 D@4:6EJ[ :]6][ @FC 7@F?5:?8 AC:?4:A=6D] x7 E96    u@F?56CD 2?5 uC2>6CD 5:5?VE H2?E E96 rC@H? DAJ:?8 @? FD[ H9J    5@ H6 2==@H @FC 8@G6C?>6?E  2E 6G6CJ =6G6=  E@n u@C 36EE6C    D64FC:EJn q6? uC2?<=:? D2:5 :E H6==i Q%9@D6 H9@ EC256    7C665@> 7@C D64FC:EJ 56D6CG6 ?6:E96C]Qk^Am  <\/p>\n<p>    kAm(92E 42? (6[ E96 !6@A=6[ 5@ E@ EFC? E9:D 2C@F?5n ~3G:@FD=J[    ECFDE:?8 E96 v@G6C?>6?E E@ 4@CC64E :ED6=7 >2<6D ?@    D6?D6 2E 2==  8@G6C?>6?ED[ 3J E96:C G6CJ ?2EFC6[ 24BF:C6    A@H6Cj E96J ?6:E96C D92C6 ?@C J:6=5] qFE[ H6 DE:== 92G6 \ud83d\ude15    A=246 2 WD@>6H92EX C6AC6D6?E2E:G6 8@G6C?>6?E2= DECF4EFC6j    H9J ?@E >2<6 :E ECF=J C6AC6D6?E2E:G6n *6D[ :E >62?D    A2J:?8 4=@D6C 2EE6?E:@? E@ H92E E92E 8@G6C?>6?E \ud83d\ude00 24EF2==J    5@:?8] p?5 :E >62?D A2J:?8 6G6? 4=@D6C 2EE6?E:@? E@ 9@H H92E    :E 5@6D 27764ED FD[ 3@E9 4FCC6?E=J 2?5 5@H? E96 C@25] p?5 :E    >62?D A2J:?8 6G6? >@C6 2EE6?E:@? E@ <?@H:?8 H96E96C    H92E E9@D6 H9@ 4=2:> E@ H2?E E@ C6AC6D6?E FD H:== 24EF2==J    5@ E92E[ @C 72== :?E@ >@C6 @7 E96 :?E6C?64:?6 A2CE:D2?D9:A    E92E H:?D A@=:E:42= G:4E@C:6D 3FE 56DEC@JD E96 723C:4 @7 @FC    #6AF3=:4] xE >62?D[ 2D !=2E@ H2C?65 a[d__ J62CD 28@[ E92E    (6[ E96 !6@A=6[ >FDE 86E :?G@=G65 2?5 A2CE:4:A2E6 \ud83d\ude15 E9:D    D6=78@G6C?2?46 AC@;64Ej @E96CH:D6 H6V== D:>A=J 4@?E:?F6    EC2?D:E:@?:?8 E@ :ED @AA@D:E6[ :]6][ EJC2??J] p?5 H6 D66    EJC2??J 3=@DD@>:?8 6G6CJH96C6[ 7C@> D49@@=D E@    8@G6C?>6?ED 2?5 6G6CJH96C6 \ud83d\ude15 36EH66?[ =2C86=J 3642FD6 (6[    E96 !6@A=6[ 92G6 2DDF>65 E96 36DE  2?5 6?23=65 E96    H@CDE]k^Am  <\/p>\n<p>    kAm#6>6>36C[ E96 r@?DE:EFE:@? ?6:E96C 8F2C2?E66D ?@C    6?7@C46D @FC C:89ED 2?5 AC@E64E:@?Dj :E D:>A=J 277:C>D    E96>[ 2?5 7F?4E:@?D 2D 2 >6492?:D> 7@C FD E@ 6I6C4:D6    2?5 AC@E64E E96> @FCD6=G6D] v@G6C?>6?E[ 3J :ED G6CJ    ?2EFC6[ ?6:E96C D92C6D ?@C J:6=5D A@H6Cj :E E2<6D :E] %92EVD    H9J %9@>2D y6776CD@?VD Qx? BF6DE:@?D @7 A@H6C E96?[ =6E ?@    >@C6 36 962C5 @7 4@?7:56?46 \ud83d\ude15 >2? 3FE 3:?5 9:> 5@H?    7C@> >:D49:67 3J E96 492:?D @7 E96 r@?DE:EFE:@?[Q \ud83d\ude00 D@    :>A@CE2?E] qF5 }2D@? =:G6D \ud83d\ude15 {:EE=6DE@H?[ \ud83d\ude00 2 r@?D6CG2E:G6    %9:?<6C 2?5 2? p52>D r@F?EJ '@E6C] t>2:= 9:> 2E k2    9C67lQ>2:=E@i3F5?2D@?o2@=]4@>Qm3F5?2D@?o2@=]4@>k^2m]k^Am  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.gettysburgtimes.com\/opinion\/staff_columns\/article_56d3d69f-0464-5fdd-86a6-10a7636d3a23.html\" title=\"Constitution and Fourth Amendment - Gettysburg Times\">Constitution and Fourth Amendment - Gettysburg Times<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Fourth Amendment states, \"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.\" Pretty straightforward, right? It was, until something labeled the \"Foreign Intelligence Surveillance Act\" (FISA) <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/constitution-and-fourth-amendment-gettysburg-times\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94879],"tags":[],"class_list":["post-198540","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198540"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=198540"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198540\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=198540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=198540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=198540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}