{"id":39324,"date":"2014-09-25T11:47:25","date_gmt":"2014-09-25T15:47:25","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/e-o-12333-end-running-the-fourth-amendment-the-dissenter\/"},"modified":"2014-09-25T11:47:25","modified_gmt":"2014-09-25T15:47:25","slug":"e-o-12333-end-running-the-fourth-amendment-the-dissenter","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/e-o-12333-end-running-the-fourth-amendment-the-dissenter\/","title":{"rendered":"E.O. 12333: End-Running the Fourth Amendment | The Dissenter"},"content":{"rendered":"<p><p>      Most collection of U.S. domestic communications and data is      done underE.O. 12333, signed byRonald Reagan    <\/p>\n<p>    Historians of the Constitutional Era of the United States    (1789-2001, RIP) will recall the     Fourth Amendmentto the Constitution, the one that used to    protect Americans against unreasonable and unwarranted    searches.  <\/p>\n<p>    The Supreme Court had generally held that searches required a    warrant. That warrant could be issued only after law    enforcement showed they had probable cause. That in turn had    been     defined by the Court to require a high standard of proof,    a fair probability that contraband or evidence of a crime will    be found in a particular place.  <\/p>\n<p>    The basic idea for more or less over 200 years: unless the    government has a good, legal reason to look into your business,    it couldnt. As communications changed, the Fourth evolved to    assert extend those same rights of privacy to phone calls,    emails and texts, the same rules applying there as to physical    searches.  <\/p>\n<p>    That was Then  <\/p>\n<p>    It was a good run. The Bill of Rights was designed to protect    the people from their government. If the First Amendments    right to speak out publicly was the peoples wall of security,    then the Fourth Amendments right to privacy was its buttress.    It was once thought that the government should neither be able    to stop citizens from speaking nor peer into their lives.    Folks, as our president now refers to us, should not have to    fear the Knock on the Door in either their homes or The    Homeland writ large.  <\/p>\n<p>    In Post-Constitutional America (2001-Present), the government    has taken a bloody box cutter to the original copy of the    Constitution and thrown the Fourth Amendment in the garbage.    The NSA revelations of Edward Snowden are, in that sense, not    just a shock to the conscience but to the concept of privacy    itself: Our government spies on us. All of us. Without    suspicion. Without warrants. Without probable cause. Without    restraint.  <\/p>\n<p>    The government also invades our privacy in multiple other ways,    all built around end-runs of the Fourth Amendment, clever    wordplay, legal hacks and simple twisting of words. Thus you    get illegally obtained information recycled into material    usable in court via what is called     parallel construction. You have the creation of Constitution    Free zones at the U.S. border. The Department of Justice    created a Post-Constitutional interpretation of the Fourth    Amendment that allows it to access millions of records of    Americans using only     subpoenas, not search warrants, to grab folks emails by    searching one web server instead of millions of individual    homes. Under a twist of an old privacy    law, doctors disclose your medical records to the NSA    without your permission or knowledge. SWAT raids by local    police designed to     break into African-American businesses on harassment    expeditions are also now OK.  <\/p>\n<p>    The Center of It All: Executive Order 12333  <\/p>\n<p>    The most egregious example of such word-twisting and sleazy    legal manipulations to morph illegal government spying under    the Fourth Amendment into topsy-turvy quasi-legal spying is the    use of     Executive Order 12333, E.O. 12333, what the spooks call    twelve triple three. The Order dates from 1981, signed by    Ronald Reagan to buff up what his predecessors limited in    response to overzealous law enforcement activities. The Gipper    would be mighty proud that his perhaps most lasting    accomplishment was legalizing surveillance of every American    citizen.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/dissenter.firedoglake.com\/2014\/09\/22\/e-o-12333-end-running-the-fourth-amendment\/\" title=\"E.O. 12333: End-Running the Fourth Amendment | The Dissenter\">E.O. 12333: End-Running the Fourth Amendment | The Dissenter<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Most collection of U.S. domestic communications and data is done underE.O. 12333, signed byRonald Reagan Historians of the Constitutional Era of the United States (1789-2001, RIP) will recall the Fourth Amendmentto the Constitution, the one that used to protect Americans against unreasonable and unwarranted searches <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/e-o-12333-end-running-the-fourth-amendment-the-dissenter\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94879],"tags":[],"class_list":["post-39324","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/39324"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=39324"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/39324\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=39324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=39324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=39324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}