Archive for the ‘Fourth Amendment’ Category

Call Yourself a Hacker and Lose Fourth Amendment Rights – Video


Call Yourself a Hacker and Lose Fourth Amendment Rights
By: Tech Feed Net Published on Nov 2, 2013 Call yourself a hacker and lose your 4th amendment rights, Congress responds to NSA diplomat spying, the USA FREED...

By: redteamusa

Follow this link:
Call Yourself a Hacker and Lose Fourth Amendment Rights - Video

Fourth Amendment – Video


Fourth Amendment
Leave a like please.

By: Dfigster

More here:
Fourth Amendment - Video

Fourth Amendment (United States Constitution …

Fourth Amendment,amendment (1791) to the Constitution of the United States, part of the Bill of Rights, that forbids unreasonable searches and seizures of individuals and property. For the text of the Fourth Amendment, see below.

Introduced in 1789, what became the Fourth Amendment struck at the heart of a matter central to the early American experience: the principle that, within reason, Every mans house is his castle, and that any citizen may fall into the category of the criminally accused and ought to be provided protections accordingly. In U.S. constitutional law, the Fourth Amendment is the foundation of criminal law jurisprudence, articulating both the rights of persons and the responsibilities of law-enforcement officials. The balance between these two forces has undergone considerable public, political, and judicial debate. Are the amendments two clauses meant to be applied independently or taken as a whole? Is the expectation of privacy diminished depending on where and what is suspected, sought, and seized? What constitutes an unreasonable search and seizure?

The protections contained in the amendment have been determined less on the basis of what the Constitution says than according to what it has been interpreted to mean, and, as such, its constitutional meaning has inherently been fluid. The protections granted by the U.S. Supreme Court have expanded during periods when the court was dominated by liberals (e.g., during the tenure of Chief Justice Earl Warren [195369]), beginning particularly with Mapp v. Ohio (1961), in which the court extended the exclusionary rule to all criminal proceedings; by contrast, during the tenure of the conservative William Rehnquist (19862005) as chief justice, the court contracted the rights afforded to the criminally accused, allowing law-enforcement officials latitude to search in instances when they reasonably believed that the property in question harboured presumably dangerous persons.

The full text of the amendment is:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Read more here:
Fourth Amendment (United States Constitution ...

FBI demands new powers to hack into computers and carry out surveillance

A protest against government surveillance in Washington DC. Civil liberties groups denounced the FBIs move as brazen and potentially dangerous. Photograph: Xinhua /Landov/Barcroft Media

The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement that would grant it significant new powers to hack into and carry out surveillance of computers throughout the US and around the world.

Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violating first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight.

The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.

This is a giant step forward for the FBIs operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move, said Ahmed Ghappour, an expert in computer law at UC Hastings college of the law who will be addressing next weeks hearing.

The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district.

But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been anonymized that is, their location has been hidden using tools such as Tor.

The amendment inserts a clause that would allow a judge to issue warrants to gain remote access to computers located within or outside that district (emphasis added) in cases in which the district where the media or information is located has been concealed through technological means. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.

Were the amendment to be granted by the regulatory committee the FBI would have the green light to unleash its capabilities known as network investigative techniques on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.

This is an extremely invasive technique, said Chris Soghoian, principal technologist of the American Civil Liberties Union, who will also be addressing the hearing. We are talking here about giving the FBI the green light to hack into any computer in the country or around the world.

More here:
FBI demands new powers to hack into computers and carry out surveillance

EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN’S FOURTH AMENDMENT RIGHT – Video


EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN #39;S FOURTH AMENDMENT RIGHT
EL MONTE POLICE OFFICER VIOLATES AMY VETERAN #39;S FOURTH AMENDMENT RIGHT. UNLAWFUL AND ILLEGAL SEARCH.

By: Wheel Dynaimcs

See the article here:
EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN'S FOURTH AMENDMENT RIGHT - Video