Archive for the ‘Fourth Amendment’ Category

Section 702 Surveillance Authority: No Extension Unless Fourth … – HuffPost

Section 702 of the Foreign Intelligence Surveillance Act Amendments of 2008 (FAA) authorizes the government to seize and search the international communications of American citizens without probable cause or warrants in violation of the Fourth Amendment. Section 702 should not be extended beyond its current expiration date of December 31, 2017 unless Congress cures its constitutional infirmity.

Members of Congress are bound by oath or affirmation to uphold and defend the Constitution period, with no commas, semicolons, or question marks. The 9/11 murderous abominations changed nothing on that score. The Supreme Court admonished in Ex Parte Milligan:

The Constitution of the United States is a law for rulers and people, equally in war and in peace, and covers with the shield of its protection all classes of men, at all times and under all circumstances. No doctrine involving more pernicious consequences was ever invented by the wit of man than that any of its provisions can be suspended during any of the great exigencies of government. Such a doctrine leads directly to anarchy or despotism

As a cornerstone of our liberty-centered constitutional universe, the Fourth Amendment makes citizen privacy the rule and government encroachments the exception. Warrants issued by neutral magistrates based upon probable cause with particularized evidence that crime is afoot are ordinarily required to justify government invasions of privacy. In the narrow circumstances that excuse warrants, a government search or seizure must still satisfy a standard of reasonableness. Justice Louis D. Brandeis elaborated in Olmstead v. United States (dissenting):

The makers of our Constitutionsought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone -- the most comprehensive of rights, and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.

The American Revolution was ignited by opposition to hated British Writs of Assistance or general search warrants that empowered every petty colonial official to rummage through homes or businesses in search of smuggled goods. An address by William Pitt the Elder to the British Parliament thundered throughout the colonies, and epitomized the spirit of the Amendment:

The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail, its roof may shake; the wind may blow through it; the storms may enter, the rain may enter,but the King of England cannot enter; all his forces dare not cross the threshold of the ruined tenement.

Speaking through Justice Antonin Scalia, the Supreme Court decreed in Kyllo v. United States that the Fourth Amendment today should be interpreted should be adapted to secure that degree of privacy against government that existed when the Fourth Amendment was adopted notwithstanding staggering advances in technology. At that time, government encroachments on privacy were minimal. Federal criminal laws were few. Investigations were minimal. And no intelligence community existed to snoop on Americans to gather foreign intelligence.

Section 702 authorizes invasions of citizen privacy orders of magnitude beyond the degree of privacy that existed when the Fourth Amendment was ratified in 1791. It empowers the National Security Agency singly or in conjunction with sister intelligence agencies to intercept, store, and search the international communications of U.S. persons with a targeted communicant reasonably thought to be located outside the United States and in possession of foreign intelligence information.

The Foreign Intelligence Surveillance Court (FISC) does not review each discrete NSA interception to insure the target is a foreigner outside the United States or that the communications intercepted relate to foreign intelligence, including international terrorism. Instead, the FISC simply approves annually surveillance procedures that the Attorney General and Director of National Intelligence certify are calculated to target only foreigners located abroad for foreign intelligence purposes. The latter is broadly defined to include any information that relates to the foreign affairs of the United States.

The government has employed section 702 to collect more than 250 million Internet transactions annually as of 2011, which includes communications between two foreigners as well as those involving a U.S. person. According to an affidavit of Bill Binney, former high level NSA official and perhaps the foremost expert in the world on electronic surveillance:

When I was at the NSA, each analyst was theoretically required to review 40,000 to 50,000 questionable records each day. The analyst gets overwhelmed, and the actual known targets -- from the metadata analysis -- get ignoredThe NSA cannot identify future terrorism because 99.9999% of what it collects and analyzes is foreseeably irrelevant.

The intelligence community is clueless as to how many of the 250 million annual Internet warrantless interceptions under section 702 involve the international communications of U.S. persons. But the Fourth Amendment vice does not cease after the seizures. The communications are typically stored for at least five years and searched without warrants or probable cause for either to discover foreign intelligence or evidence of crimea second Fourth Amendment transgression.

Supreme Court decisions establish that the government must obtain a warrant that satisfies the Fourth Amendment to intercept or search the contents of communications of U.S. persons for either criminal justice or domestic security purposes. The High Court has not approved an exception when the communications are seized and searched pursuant to section 702 for law enforcement or foreign intelligence purposes.

Title III wiretap orders under the Omnibus Crime Control Act is vastly less intrusive on privacy. They require a warrant that satisfies the Fourth Amendment by specifying the phone line to be tapped, the conversations to be seized, and the crime under investigation. Moreover, reasonable measures must be taken by the government to avoid recording innocent conversations. And the targets of the warrants and their communicants are typically notified of the wiretap within 90 days of its termination to enable them to challenge its legality.

In contrast, surveillance under section 702 does not require a warrant. It does not require probable cause. It does not require suspicion of criminality. It is not confined to communications involving only foreign powers or their agents. There is no mechanism for monitoring the seizure of the communications to exclude those portions irrelevant to foreign intelligence. And the communicants whose conversations are intercepted, stored, and searched are not notified of the invasions of privacy unless they are lead to a criminal prosecution. In the vast majority of cases, U.S. persons will never learn that the privacy of their international communications had been compromised.

Even if no warrant were required under the Fourth Amendment for the seizure, storage, and search of the international communications of U.S. persons under section 702, it would still fail the reasonableness test. While the government interest in national security is of the highest order, section 702 sweeps far more broadly to include anything relevant to the foreign policy of the United States, for example, the emission of greenhouse gases or free trade agreements. It also authorizes searches of citizen communications for crimes unrelated to national security and not based on probable cause. And as Bill Binneys affidavit underscored, the stupendous volume of communications capture by section 702 cripples the NSAs ability to separate the wheat from the chaff.

Proponents of extending section 702 argue that government officials have refrained from using its alarming powers to oppress U.S. persons. But as Thomas Jefferson advised, In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution. Moreover, Justice Brandeis correctly taught that, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.

In sum, section 702 should not be extended unless it requires a warrant to seize or search international communications of U.S. persons based upon probable cause to believe they contain evidence of international terrorism and with particularity describe the means of seizing or searching the communications. Further, U.S. persons should be notified within 90 days of any interception or search.

The Fourth Amendment is too important to be left to the intelligence community.

The Morning Email

Wake up to the day's most important news.

Original post:
Section 702 Surveillance Authority: No Extension Unless Fourth ... - HuffPost

Supreme Court: Vehicle Impoundment Did Not Violate Fourth Amendment – WisBar

Supreme Court: Vehicle Impoundment Did Not Violate Fourth Amendment
WisBar
The majority concluded that police possessed a bona fide community caretaker justification for impounding the car and thus were not required to obtain a warrant despite the constitutional Fourth Amendment right against unreasonable seizures.

Read more:
Supreme Court: Vehicle Impoundment Did Not Violate Fourth Amendment - WisBar

Drunk Driver Gave Consent, Blood Test was Voluntary, Supreme Court Says – WisBar


WisBar
Drunk Driver Gave Consent, Blood Test was Voluntary, Supreme Court Says
WisBar
Two justices agreed that Brar expressly consented but did not join the conclusion that his implied consent was sufficient for Fourth Amendment purposes. Two other justices dissented, concluding that Brar did not freely and voluntarily consent to a ...

Excerpt from:
Drunk Driver Gave Consent, Blood Test was Voluntary, Supreme Court Says - WisBar

The Fourth Amendment Implications of Sharing Server Space – JD Supra (press release)

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Privacy Policy (Updated: October 8, 2015):

hide

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.

JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide

See the original post:
The Fourth Amendment Implications of Sharing Server Space - JD Supra (press release)

Civil asset forfeiture: Un-natural law – UT The Daily Texan

Recently, Attorney General Jeff Sessions announced the revival of civil asset forfeiture practices. Such a phrase is ambiguous enough to disinterest average citizens, yet anyone whose assets have been sized through this method may attest to its truly malevolent and un-natural ramifications.

Effectively, civil asset forfeiture allows law enforcement to confiscate possessions from anyone suspected of illegal activity without filing any criminal charges; cases are between law enforcement and alleged criminally-connected assets, not owners. Notorious case names include Texas v. .39 Acres and Texas v. One 2004 Chevrolet Silverado. During such cases, 59.02 (c) of the Texas Code of Criminal Procedure requires forfeiters to prove their innocence instead of requiring law enforcement to prove guilt.

One stark example of abuse was endured by Austin resident Javier Gonzalez in 2005. The Texas Observer reported Gonzalez was traveling from Austin to Brownsville with approximately $10,000 budgeted for his aunts funeral; however, despite no contraband, after Jim Wells County sheriff deputies stopped him for missing a front license plate, he was arrested and coerced into forfeiting the funds. Javier was told forfeiture represented the only way to prevent felony money laundering charges. Similarly, under Sessions direction, any UT student could experience disenfranchisement and have their possessions removed under the pretense of mere suspicion.

Civil asset forfeiture exists as an un-natural legal practice. The term un-natural reflects Ciceros timeless observation that, true law is right reason in agreement with nature; it is of universal application, unchanging and everlasting; it summons to duty by its commands and averts from wrongdoing by its prohibitions. And it does not lay its commands or prohibitions upon good men in vain Civil asset forfeiture, conversely, represents wrong reason in disagreement with nature. Imagine no property laws, or any laws whatsoever, existed: Would theft suddenly become acceptable? One does not need statutes to grasp the concept that taking from another without cause is not tolerable.

Unfortunately, even the Texas Supreme Court has ostensibly sanctioned civil asset forfeiture by holding in Texas v. Richards that the Texas Constitution does not protect owners from having assets forfeited, and in El-Ali v. Texas the Court refused to review its previous ruling. Courts, attorneys general and other entities may attempt to defend civil asset forfeiture, yet they stand in perpetual contempt of natural law enshrined within the Bill of Rights. The Fourth Amendment states, the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, which represents a restatement of natural law existing before ratification.

Sessions has promised reforms to curb previous abuses, yet law enforcement will still have perverse incentives to seize assets, which they regularly retain for local funding. Nonetheless, a ray of hope has emerged through Rep. Beto O'Rourke and Rep. Randy Webers bipartisan sponsorship of legislation guaranteeing legal representation for those whose assets have been seized, and redirecting seized assets into the U.S. Treasurys general fund. One hopes bipartisan legislative opposition and an engaged citizenry will quickly stymie civil asset forfeitures, because un-natural laws cannot be gradually reformed: They must be actively abolished.

Wayne R. Beckermann is a member of the Texas Law Class of 2020 from Brenham, Texas.

The rest is here:
Civil asset forfeiture: Un-natural law - UT The Daily Texan