Archive for the ‘Fourth Amendment’ Category

ACLU and Fort Wayne announce agreed principles in lawsuit on George Floyd protests – WANE

FORT WAYNE, Ind. (WANE) The City of Fort Wayne and the American Civil Liberties Union of Indiana have announced agreed principals to the original lawsuit stemming from the way police responded to local protests over Minneapolis police brutality of George Floyd in May of 2020.

The lawsuit between the two sides continues but the ACLU has agreed to withdraw a motion for a preliminary injunction. They could still end up in court over monetary damage claims if not resolved by a mutual agreement.

This was just sort of an understanding with them. So we worked with a neutral party, a mediator to come to an understanding about our policies, and that we have good policies, and that we will continue to respect peoples right to protest peacefully, said Fort Wayne City Attorney, Carol Helton.

Protesters believe the city was unreasonable in its use of tear gas without sufficient warning which prevented protesters from leaving and prevented peaceful protesters from gathering. The group of 13 individuals claimed their First and Fourth Amendment rights were violated and asked the court to prohibit the city from taking any future actions designed to stop protests, such as tear gas or rubber bullets. They also sought monetary damages. One plaintiff later withdrew from the lawsuit and the ACLU voluntarily dismissed Allen County Sheriff David Gladieux as a defendant.

I think the injunction was designed to get a formal order setting out certain standards, said Ken Falk, legal director for the ACLU of Indiana. I think these principles are not a court order. But they are a recognition by the city of how theyre going to view the constitutional rights of protesters in the future.

The city denied any wrongdoing and said the use of force by Fort Wayne Police officers was reasonable.

While the two parties continue to have disagreements about certain legal standards that apply to actions made by the City of Fort Wayne, they agree this new statement does not mean the city, police or individual officers admit to any wrongdoing.

Theres been no admission from the city that they did anything wrong, nor did we want admission at this point, Falk said. What we want at this point is to set it in place a framework so this does not happen again and as I said, I applaud the city in recognizing that we can go beyond finger-pointing and try and erect a structure that will prevent this from happening again.

Thursdays joint release also included eight points of agreement derived in part by a neutral mediator:

Going forward, there were learning things that we took away that we could do better that are consistent with our current policies but theyre within our consistent policy, said Sgt. Jeremy Webb, a spokesperson for the FWPD. Things are constantly evolving, our policies change and adapt as tactics and equipment change and adapt, and we try to stay on the cutting edge of that.

Since the protests, the department has made the decision to invest in equipment to increase communication during tense situations. They plan on investing in loudspeakers as well as use drones to make announcements. However, Webb said they stand by how they handled the situation.

Everything that we did, we currently do, was found to be pretty, pretty effective and within state and federal law, Webb said. If they dont like our policies, they need to look at the law of the land. Thats what dictates our policies. Our policies dont dictate law.

As of now, the lawsuit will continue in the Hoosier courts, but the ACLU sees the injunction withdrawal as progress.

I think the plaintiffs are very happy to have this resolved with taking some of the law and negotiation to get this far, said Falk. We may disagree as to where the fault lies, but anything that everyone can do to make sure this doesnt happen, again, is a real plus.

CORRECTION: An earlier version reported this agreement was a settlement to the lawsuit. The two sides have only announced agreed principles and the withdrawal of a preliminary injunction by the ACLU.

Read more:
ACLU and Fort Wayne announce agreed principles in lawsuit on George Floyd protests - WANE

Centaurs, Jean Valjean, and a proposed three-sentence ruling on the meaning of favorable termination – SCOTUSblog

ARGUMENT ANALYSIS ByHoward M. Wasserman on Oct 13, 2021 at 5:58 pm

Mythological creatures and French literary heroes appeared during argument in Thompson v. Clark Tuesday, as the justices sought to define favorable termination in certain Fourth Amendment claims under 42 U.S.C. 1983.

Under Section 1983, an individual who is accused of a crime and believes his constitutional rights were violated can sue government actors for civil damages. But the individual must show that the criminal proceeding was terminated in her favor. Thompson involves a Fourth Amendment unreasonable-seizure-through-legal-process claim, and the question is whether the plaintiff must show that the criminal proceeding ended in a way that affirmatively indicates innocence or only that it formally ended in a manner not inconsistent with innocence.

Larry Thompson was charged with resisting arrest and obstructing a government investigation when he attempted to stop police from entering his apartment in response to a false call about child abuse. The prosecution dismissed the charges. Thompsons claim before the Supreme Court is against one responding officer, Pagiel Clark, who signed a criminal complaint during Thompsons initial post-arrest detention.

Amir Ali argued for Thompson. He defined favorable termination as a prosecution that ends without a conviction, including by dismissal of the charges. The favorable-termination rule seeks to avoid parallel civil and criminal proceedings, to avoid inconsistent judgments, and to prevent individuals from using civil litigation to collaterally attack convictions. None of those interests are threatened when a civil case is brought following dismissal of criminal charges, Ali argued.

The justices pushed Ali to define the nature of Thompsons civil claim, with Justices Clarence Thomas, Samuel Alito, Neil Gorsuch, and Brett Kavanaugh pushing on the elements of that claim, the timing of the seizure, and whether the court should decide these antecedent issues rather than the question presented. Ali insisted that Thompson was pursuing the claim for unreasonable seizure through legal process described in Manuel v. City of Joliet. He identified two seizures: the almost 40 hours Thompson was held in custody, during which period Clark filed the allegedly false criminal complaint, and the period between his release on his own recognizance and the dismissal of the charges. Ali resisted multiple suggestions that Thompson was bringing a stand-alone malicious-prosecution claim under the Fourth Amendment or that favorable termination attached to the Fourth Amendment as opposed to Section 1983. He also urged the court to avoid numerous issues about the scope and elements of the claim because Clark had not raised them below.

Justice Stephen Breyer introduced Jean Valjean, the protagonist sent to prison for stealing a loaf of bread to feed his family in Victor Hugos Les Miserables. Breyer wondered whether Valjean could bring a claim if the prosecution had dismissed the theft charges as an act of mercy. Breyer and Chief Justice John Roberts questioned whether a dismissal of criminal proceedings should be a favorable termination, given the many reasons that prosecutors might dismiss charges as part of a cooperation agreement, as an act of mercy, or out of prosecutorial caseload concerns. Ali responded that the reason for dismissal affects the success of the Fourth Amendment claim, including whether the plaintiff can prove lack of probable cause and overcome qualified immunity. Ali acknowledged in response to later questions from Alito and Kavanaugh that causation may be difficult to prove in this case, as Thompson must show that he would have been released from custody sooner but for the allegedly false criminal complaint. Those elements lack of probable cause, qualified immunity, and lack of causation weed out weak claims. Favorable termination serves a different purpose preserving the finality of the criminal judgment.

Jonathan Ellis, assistant to the solicitor general, argued for the United States in support of Thompson. The U.S. agreed with Thompson about the claim but identified one actionable seizure the period in custody caused by the unfounded and unwarranted criminal complaint while rejecting the period during the pendency of ordinary criminal charges as an actionable seizure. The U.S. also agreed about the purposes and scope of favorable termination and that it did not require indications of innocence.

Thomas, Gorsuch, and Justice Elena Kagan returned Ellis to the nature of the right, the elements of the claim, and whether the court could assume antecedent issues to focus on the later favorable-termination issue. Ellis argued that Clark had waived many of these issues, but the courts of appeals could benefit from resolution of others. And, he emphasized, favorable termination is easily satisfied here.

Alito then released the centaur. He compared ignoring whether the Fourth Amendment claim exists to asking a medical expert whether a centaur, the mythological creature with the upper body of a human and lower body and legs of a horse, would contract lung cancer from smoking five packs of cigarettes a day; the court cannot define or analyze the claim if the claim is fanciful. Ellis argued that Thompson brought the claim recognized in Manuel and that Fourth Amendment malicious prosecution was not the focus of this case. Favorable termination serves important values independent of other elements of the tort and thus should be retained.

Clarks attorney, John Moore, argued that the U.S. Court of Appeals for the 2nd Circuit got it right in defining favorable termination to mean criminal charges terminated in favor of the criminal defendant in a way reflecting on the merits of those charges. The rule, he said, has strong support in common law and exists for good reason. But he urged the court to resolve the case on the foundational issue that Thompson brought a claim for malicious prosecution that is not cognizable under the Fourth Amendment.

Breyer and Kavanaugh pushed Moore on how this definition of favorable termination fits with the criminal-justice process and how plaintiffs can meet that requirement. Kavanaugh called it an upside down rule those falsely accused whose claims are dismissed early cannot sue unless they can dig into the prosecutors mindset, while those who go to trial can sue. Breyer suggested that actual practice runs contrary to Clarks position, because normal proceedings do not affirmatively indicate innocence; prosecutors dismiss cases, and the accused does not object to dismissal. Moore cited statistics from an NAACP amicus brief showing that 85% to 90% of dismissals are for reasons wholly independent of the merits. But because the prosecutor decides whether to dismiss criminal charges and the police officer is the defendant in the Section 1983 action, an indication of innocence connects the elements to the officers conduct.

Moore had lengthy exchanges with Roberts, Justice Sonia Sotomayor, and Kagan about whether the court can and should resolve the downstream issues of favorable termination without resolving the upstream issues of identifying the precise claim, the constitutional source for the claim, and the elements of the claim. Moore argued that the court cannot define the scope and meaning of favorable termination without determining the existence and elements of the claim, which in turn depend on the constitutional source of the right. A Fourth Amendment claim challenging an unreasonable seizure does not impugn convictions or criminal proceedings, so the reasons for a favorable-termination requirement are absent. Those reasons were present in the courts prior favorable-termination cases, which considered due process claims. Moore conceded in response to a question from Justice Amy Coney Barrett that his arguments are stronger on the upstream issues than on the downstream issue in the question presented.

Ali argued that the court could resolve the case in three sentences; two, if you like semi-colons.

He urged the court to write that the 2nd Circuit decided that the favorable-termination requirement for some Section 1983 claims requires indications of innocence, but it does not; a criminal proceeding terminates in favor of the accused when it ends without a conviction.

Read the original:
Centaurs, Jean Valjean, and a proposed three-sentence ruling on the meaning of favorable termination - SCOTUSblog

Allied Healthcare Products : Fourth Amendment to Loan and Security Agreement – Form 8-K – Marketscreener.com

Fourth Amendment to Loan and Security Agreement

This Fourth Amendment to Loan and Security Agreement (the "Amendment") is made and entered into by and between SUMMIT FINANCIAL RESOURCES, LLC, a Delaware limited liability company and the successor in interest to SUMMIT FINANCIAL RESOURCES, L.P., a Hawaii limited partnership ("Lender"), and ALLIED HEALTHCARE PRODUCTS, INC., a Delaware corporation ("Borrower").

Recitals

A. Lender's predecessor in interest and Borrower have entered into a Loan and Security Agreement dated February 27, 2017 (together with any and all exhibits, schedules, addenda or riders hereto, as amended, modified, supplemented, substituted, extended or renewed from time to time, the "Loan and Security Agreement").

B. Lender and Borrower have agreed to further amend the Loan and Security Agreement to increase the dollar sublimit amount with respect to Inventory Advances.

Amendment

For good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged, Lender and Borrower agree as follows:

1. Definitions. Except as otherwise expressly provided herein, terms assigned defined meanings in the Loan and Security Agreement shall have the same defined meanings in this Amendment. The term "Amendment," as defined in the preamble to this Amendment, is incorporated by reference into the Loan and Security Agreement

2. Modification and Amendment of Loan and Security Agreement. Effective as of the date of this Amendment, the Loan and Security Agreement is amended and modified as follows:

The first paragraph of subsection (b) (Inventory Advances) of Section 2.6 (Inventory Advances) of the Loan and Security Agreement is hereby amended to increase the dollar sublimit as follows:

"b. Inventory Advances. Notwithstanding anything to the contrary in the Loan Documents, no Inventory Advances shall be made on the Loan if, after making the requested Inventory Advance, the total, aggregate principal amount of all Inventory Advances will exceed the lowest of: (i) the total cost of Eligible Inventory (as determined by Lender in its sole discretion) multiplied by the Inventory Advance Rate; (ii) one hundred percent (100%) of the amount of outstanding Account Advances; (iii) Two Million Dollars ($2,000,000); and (iv) together with the aggregate amount of all outstanding Account Advances, the Maximum Loan Amount."

In consideration of Lender's agreement to increase the dollar sublimit on Inventory Advances, Borrower agrees to pay to the Lender a modification fee of Five Thousand Dollars ($5,000) (the "Modification Fee") on the date hereof. The Modification Fee shall include the legal fees of Lender's in-house counsel to prepare this Amendment.

3. Representations and Warranties. Borrower affirms and again makes the representations and warranties set forth in Section 6 (Representations and Warranties) of the Loan and Security Agreement as of the date of this Amendment.

4. Payment of Expenses and Attorneys' Fees. Borrower shall pay all reasonable expenses of Lender related to the negotiation, drafting of documents, and documentation of this Amendment, including, without limitation, the Modification Fee (which shall include all reasonable attorneys' fees and legal expenses, including allocated fees of in-house counsel, in connection with the drafting and revising this Amendment). Lender is authorized and directed to disburse a sufficient amount of funds under the Loan to pay these expenses in full.

Allied Healthcare - Fourth Amendment to Loan and Security Agreement

5. Loan Documents Remain in Full Force and Effect. Except as expressly amended or modified by this Amendment, the Loan Documents remain in full force and effect. Borrower confirms that the security interests granted by the Loan Documents also secure the Loan and Security Agreement as amended by this Amendment.

6. Borrower Covenants. Borrower covenants with Lender that Borrower shall execute, deliver, and provide to Lender such additional agreements, documents, and instruments as reasonably required by Lender to effectuate the intent of this Amendment.

7. Release. Borrower and its successors and assigns hereby fully, finally, and forever release and discharge Lender and its successors, assigns, directors, officers, employees, agents, and representatives from any and all actions, causes of action, claims, debts, demands, liabilities, obligations, and suits of whatever kind or nature, in law or in equity, that Borrower has or in the future may have, whether known or unknown, in respect of the Loan Documents, the Loan, or the actions or omissions of Lender in respect to the Loan Documents or the Loan and arising from events occurring prior to the date hereof.

8. Authorization. Borrower represents and warrants that the execution, delivery, and performance by Borrower of this Amendment, and all agreements, documents, obligations, and transactions herein contemplated, have been duly authorized by all necessary corporate action on the part of Borrower and are not inconsistent with Borrower's organizational documents or any resolution of the board of directors, members, managers, or other governing body of Borrower and do not and will not contravene any provision of, or constitute a default under, any indenture, mortgage, contract, or other instrument to which Borrower is a party or by which it is bound, and that upon execution and delivery hereof and thereof, this Amendment will constitute legal, valid, and binding agreements and obligations of Borrower, enforceable in accordance with its respective terms.

9. Integrated Agreement; Amendment. This Amendment, together with the Loan and Security Agreement and the other Loan Documents, constitute the entire agreement and understanding between the parties hereto and supersede all other prior and contemporaneous agreements. This Amendment and the Loan and Security Agreement shall be read and interpreted together as one agreement and shall be governed by and construed in accordance with the laws of the State of Utah without regard to its conflict of laws principles. This Amendment shall be deemed to have been executed by the parties hereto in the State of Utah and may not be altered or amended except by written agreement signed by Lender and Borrower. All other prior and contemporaneous agreements, arrangements, and understandings between the parties hereto as to the subject matter hereof are, except as otherwise expressly provided herein, rescinded.

Borrower acknowledges and agrees that this Amendment is a final expression of the agreement between Lender and Borrower and this Amendment may not be contradicted by evidence of any alleged oral agreement.

[Signatures on Next Page]

Allied Healthcare - Fourth Amendment to Loan and Security Agreement

Dated: October 7, 2021.

Allied Healthcare - Fourth Amendment to Loan and Security Agreement

Disclaimer

Allied Healthcare Products Inc. published this content on 13 October 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 13 October 2021 21:21:19 UTC.

More here:
Allied Healthcare Products : Fourth Amendment to Loan and Security Agreement - Form 8-K - Marketscreener.com

What Are the Limits on Congressional Surveillance? – Lawfare

Congressional authority to request user data from communications service providers is in the spotlight once again thanks to recent requests made by the Houses select committee on the Jan. 6 attack on the Capitol for providers to preserve the data of individuals believed to be connected to the attack. Requests for user dataranging from basic subscriber information and metadata to location information and the contents of communicationshave become standard congressional practice in recent years, as Congress has begun to use its Article I authorities to engage in what I have called congressional surveillance. These requests raise serious questions about the legal boundaries and normative implications of this congressional authority.

Congress has long enjoyed the authority to compel evidence from third parties using its Article I subpoena power. The Supreme Court reaffirmed that power in its Mazars decision last year. But only recently have congressional committees leveraged their subpoena authority to collect electronic evidence in ways that implicate the surveillance power of the digital world.

At first blush, it would seem that surveillance by government authorities has been studied and discussed at length. In reality, however, only executive surveillance authority has received any significant attention. Congressional surveillancethat is, Congresss ability to use its broad subpoena authority as a form of electronic surveillanceremains largely unexplored, and the corresponding limits on that authority are not well understood.

This is unfortunate. Congressional surveillance exhibits hybrid features of both government surveillance and congressional political power, and as a result, challenges traditional thinking about government surveillance. This duality has several important implications, in terms of both what the limits on congressional surveillance are and what they should be.

The Limits on Congressional Surveillance

As I have argued elsewhere, congressional surveillance derives from Congresss Article I subpoena authority, and it is therefore shaped by the interaction of three kinds of limits on congressional power: external limits, meaning sources of law that constrain otherwise valid exercises of congressional surveillance; internal limits, meaning the inherent boundaries of Congresss surveillance authority; and process limits, meaning the procedural and political constraints on how Congress may choose to exercise its surveillance authority. Each of these limits varies from the limits on other, more common forms of government surveillance, and as a whole, they reflect an uneasy convergence of individual privacy with the separation of powers.

External Limits

In the traditional world of government surveillance, compulsory demands for user data tend to adhere to certain constitutional and statutory rules: The government must get a warrant for content and other data with heightened privacy interests and a court order or subpoena for anything less. But the sources of these external limitsmeaning legislative and constitutional constraintson government surveillance apply to Congress in profoundly different ways than they do to the executive. As a result, congressional surveillance is treated in a starkly different manner under key provisions of the SCA; it is also not clear that Congress is subject to the Fourth Amendments warrant requirement, at least not in the categorical sense.

The Stored Communications Act

At a very general level, the SCA (a) prohibits voluntary disclosures of user data to third parties and (b) provides a mechanism through which a governmental entity can compel the production of that data, notwithstanding these prohibitions. It is well established that the SCA applies to requests from the executive branch. As to Congress, however, it is less clear: Is Congresss subpoena power limited by the SCAs prohibitions?

As to some categories of data, this should be an easy question. Specifically, the SCA provides that non-content informationthat is, data that does not include the substance, purport, or meaning of a communication, such as basic subscriber information or other metadata, like session logsmay not be disclosed to any governmental entity. A governmental entity is defined as any department or agency of the United States or political subdivision thereof. But courts have held that this definition excludes Congress, including in the similarly worded Right to Financial Privacy Act, meaning that the SCA does not prohibit providers from voluntarily disclosing non-content information to Congress. Likewise, nothing in the SCA prohibits providers from responding to a congressional subpoena for that information.

Content datasuch as the text of an email or a direct messagepresents a thornier question. Some observers take the perspective that the prohibition on disclosure of content information is absolute, because the statute precludes disclosure to any person or entity. Is Congress an entity? Maybe so. But it may not be so straightforward.

This is because Congress treats itself differently when it legislates and avoids categorical limits on its own authority. It very rarely curtails its Article 1 subpoena power because that authority is so critical to its constitutional responsibilities. The Supreme Court recognized these principles as early as 1927 in McGrain v. Daugherty, saying that Congress cannot legislate wisely or effectively without access to relevant information held by others. The court held that some means of compulsion are essential because mere requests for such information often are unavailing, and also that information which is volunteered is not always accurate or complete. This sensibility has persisted over time: For example, the U.S. Court of Appeals for the D.C. Circuit has repeatedly held that the Federal Trade Commission could disclose confidential information in response to Congresss investigative demands, including through subpoenas, even though it was statutorily prohibited from disclosing that same information to the public.

So it cannot simply be assumed that congressional surveillance fares the same under the traditional external statutory limits that apply to government surveillance when it involves the executive branch. Because Congresss authorities come from a different source, the possibility that they may be constrained in different ways must be taken seriously.

The Fourth Amendment

Several cases in recent years have brought seeming clarity to whether the Fourth Amendments warrant requirement applies to the governments constructive searches of digital information. In Carpenter v. United States, the Supreme Court confirmed that compelled production of some provider-held location information may constitute a search for the purposes of the Fourth Amendment. And it held that law enforcement officers must obtain a warrant to compel the production of that data. In Warshak v. United States, the U.S. Court of Appeals for the Sixth Circuit held similarly as to the contents of emails.

But both cases (like much of the Fourth Amendment case law on digital searches) were limited to law enforcement requests, and the implications for congressional subpoenas are less clear. Traditionally, the Supreme Court has held that the Fourth Amendment requires that congressional subpoenas meet only a reasonableness standard. Under this approach, there is no categorical warrant requirement for Congress. That is, law enforcement must generally have a probable cause warrant, issued by a magistrate judge, before engaging in a searchconstructive or otherwiseto satisfy the Fourth Amendment. But a congressional subpoena need only be relevant to an authorized investigation and reasonably specify the materials to be produced; no magistrate judge, no probable cause, no suppression remedy.

It is certainly possible that a constructive search of digital information would merit heightened judicial scrutiny because of increased privacy interests. But this would require the recipient (or subject) of a subpoena to challenge the subpoena in courta possibility I discuss belowbecause there is no legal requirement for a congressional committee to seek authorization from a judge in advance.

It is also possible that, as a practical matter, the recipient of a congressional subpoena would negotiate restrictions on, say, segregating nonpertinent information or how long Congress can retain information in its records. But all these adjustmentsheightened judicial scrutiny in the event of a court challenge, or negotiated protocolswould supplement, not replace, the current regime, which is a permissive and highly context-dependent inquiry, and not an area of hard and fast rules.

Internal Limits

In the absence of external limits, Congress is free to exercise its surveillance authority as far as its internal limitsthat is, the inherent boundaries of congressional powerpermit. And there are few internal limits here. Based on McGrains rule that Congresss investigative authority is co-extensive with its expressed Article I powers, Congresss surveillance capacity extends in theory as far as its authority to legislate, conduct oversight, appropriate or impeach.

Indeed, courts have historically granted significant deference to Congresss legislative and investigative decisions. For example, the Supreme Court has generally avoided a requirement that Congressat the outset of an investigationidentify a legislative topic of interest, or even indicate that it intends to legislate. Instead, the court has tended to indulge a presumption that Congresss investigative demands are in pursuit of a legitimate purpose. Article Is Speech or Debate Clausewhich has been held to provide absolute immunity to members of Congress and their staff for legislative actsserves as a further cloak for Congresss investigative decisions, limiting a courts ability to peek behind the curtain of Congresss stated purpose. As a result, courts may not examine Congresss underlying motives.

There are also few limits on Congresss ability to disclose the information it obtains through its investigations. In fact, certain aspects of Congresss work necessitate the freedom to share information with the public. The informing function plays a valuable role in Congresss core legislative and oversight duties, among others. To fulfill those responsibilities, committees and members of Congress regularly publish investigative reports and legislative findings, issue press releases, engage with the media, and communicate with constituents. And under the Speech or Debate Clause, a court may not block disclosure to the public of information that is part of the legislative process.

Process Limits

Despite these surprisingly weak constraints on Congresss ability to direct its investigative powers toward surveillance, Congress has not (as an empirical matter) exercised its surveillance tools until recently. And when it has, Congress has generally (though perhaps not always) restrained the number and scope of its requests. This self-restraint arises from procedural rules that govern the issuance and enforcement of congressional subpoenas and political checks, or process limits. These process limits can offer meaningful, even if imperfect, constraints on congressional surveillance, compensating for the otherwise weak internal limits and supplementing the external limits discussed above.

Process limits on congressional surveillance derive in large part from the subpoena enforcement mechanism. In the world of government surveillance, voluntary disclosures are the exception rather than the rule, leading many providers to insist on a subpoena even if they intend to comply with a committees demand. But issuing and enforcing subpoenas against service providers creates significant transaction costs for committees, especially when requests push the envelope. These costs can arise in several ways.

First, there are procedural checks within Congress. Perhaps most importantly, there are significant transaction costs to pursuing a subpoena enforcement action, even before it ever reaches court. To enforce a subpoena in the Senate, a committee must approve and send a resolution to the floor, at which point it must secure a majority vote of the full chamber to authorize civil enforcement. The proof is in the pudding: Since 1979, the Senate has authorized civil enforcement only six times. In the House, the full chamber can authorize its committees to pursue enforcement actions even in the absence of an explicit enforcement statute, but until 2008, there had been some uncertainty as to whether federal courts would have jurisdiction to hear such a case.

Second, there are political checks on the periphery of the enforcement process. Views on government access to private data tend not to follow strict partisan lines, meaning that party control may not translate to party support. In addition, each party risks a tit-for-tat escalation when the chamber changes hands. Further, even once Congress authorizes a suit, it can still take months or years to resolve a case once it arrives in court, not to mention an extensive appeals process if the case has precedential value. Given time-sensitive political pressures and the real possibility that a chamber will change hands every two years, a committee may not be willing to tolerate this kind of delay. This suggests that procedural checks on congressional surveillance, especially with enforcement, are a crucial supplement to the traditional external limits.

Third, some process limits exist beyond the chamber and enforcement process. Congressional surveillance involves seeking information from a legally sophisticated entity that can create significant checks on government demands for data through a variety of actions, including public transparency, litigation, lobbying and technological mechanisms such as encryption. In addition, congressional subpoenas are not issued in secret, and Congress does not have the legal authority to gag providers from disclosing such requests, no matter how sensitive they may appear. By comparison, such nondisclosure orders are standard in the law enforcement context. As a result, providers are able to disclose a potentially overbroad or abusive request to the public, as well as the subject of the request. In theory, then, public opinion may have an effect on enforcement and create push back on overbroad or abusive demands.

The Duality of Congressional Surveillance

Congressional surveillance stands at the intersection of two areas of law: government surveillance and separation of powers. As to the first, congressional surveillance raises issues relating to how individual privacy interests should be balanced against Congresss interest in accessing information. As it stands, congressional surveillance is constrained by a balance of limits that differs from other areas of government surveillance, with a less prominent role played by the privacy-protecting SCA and Fourth Amendment and a more prominent role played by internal politics and procedure. Some observers might see this as a reason to impose new constraints.

Yet as to the separation of powers, congressional access to information depends instead on the relative interests and rights of two co-equal branches. From this second perspective, congressional surveillance represents an important way for Congress to compete for authority within the separation of powers, meaning that the usual approach under external limits shouldnt apply. That is, congressional surveillance can serve as a potent component of checks and balances, necessary to counter executive authority and maintain Congresss position as a co-equal branch. Some might see this as a reason to preserve congressional authority, not constrain it.

The framing matters, as illustrated by the Supreme Courts most recent and most robust evaluation of these issues in Mazars. There, confronted with congressional subpoenas to financial institutions for the presidents financial information, the court embraced a separation of powers model. That is, it weighed the committees interest in third-party data not against an individual privacy interest but, rather, against the competing interests of the executive. The Supreme Court cautioned that, absent new limits, Congress could declare open season on the Presidents information held by schools, archives, internet service providers, email clients, and financial institutions. The court then imposed a new balancing testnot one based on privacy considerations but, rather, one that reflects the weighty concerns regarding the separation of powers when congressional surveillance targets the president.

As a consequence, the Supreme Court rendered a decision that is ultimately indifferent to privacy considerations. The reasoning in Mazars protects only the presidents information. And the decision does not distinguish at all between differing levels of privacy interests in different categories of information.

How then to approach the limits on congressional surveillance? There are, to be sure, different ways (and institutions) to balance the many competing interests, from both privacy and separation of powers perspectives. Congress could regulate itself on these matters and take steps to mitigate potential abuses of its own surveillance authority, creating new rules at the chamber or committee level or perhaps passing clarifying legislation. Or, if providers choose to dispute Congresss authority in this area, the fate and scope of congressional authority could be decided (and potentially limited) by the judiciary. There could be a renewed emphasis on external limits with a more significant role for courts, or a refining of the process limits within each chamber or committee. Either way, this is likely just the start of a broader conversation about an important issue, with implications for both government surveillance and the separation of powers.

See the original post here:
What Are the Limits on Congressional Surveillance? - Lawfare

Big brother banking on you | | standardspeaker.com – Standard Speaker

Your jobs payroll taxes, and your annual 1040 federal tax return, just is not enough.

The Biden administration wants the IRS to document the totals deposited and withdrawn, but not the individual transactions, from personal and business bank accounts annually if more than $600.

In this COVID era, Rahm Emanuels infamous quip about never allowing a serious crisis go to waste echoes throughout the $3.5 to $5 trillion budget bill that seeks more government control.

Treasury Secretary Janet Yellen is leading the charge requiring banks to report cash transactions totaling $600 or more of their account holders. Yellen claimed such reporting would catch tax cheats and disclose opaque income streams that disproportionately accrue to the top.

Tucked away in the bill is $80 billion that would fund an army of IRS auditors to collect what the Treasury Department said would amount to $700 billion over the next decade. Rather than auditors, they should hire folks to answer their telephones.

When the political bureaucracy targets banks, you lose.

This is about total control, and it is working.

Americans complied on endless lockdowns that were to flatten the curve, the ubiquitous mask mandates that continue and now how everyone must be vaccinated.

Why should your bank account be any different?

What could possibly go wrong?

Dr. Anthony Fauci funnels millions of taxpayer dollars to the Wuhan Institute of Virology. President Joe Biden claims the military never advised him to keep a 2,500 residual force in Afghanistan and that our southern border is secure.

Casting a wide net over personal finances has always been a longstanding ploy of the left. There is no evidence of anything here that could be labeled Build Back Better.

Instead, the left doubles-down.

This scheme is nothing but another privacy breach waiting to happen. Twenty-three state treasurers and auditors signed a letter opposing the legislation describing it as one of the largest infringements of data privacy in our nations history.

Yellen and her leftist allies need to acquaint themselves with the Fourth Amendment that was passed to protect the quintessential American right to be left alone. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

What else about the Constitution does the Biden administration not comprehend?

Granted, since the Bank Secrecy Act of 1970, all bank transactions over $10,000 are reported. In actuality, that amount needs to be adjusted for inflation, which would make todays limit $70,000. Congress needs to include that in the legislation but wont.

Leveraging the banking system to track down terrorists is not new, but including you is. Perhaps, such zeal could be employed to find the 40 million here illegally and all the welfare, disability and COVID unemployment fraud circulating nationwide.

Any politician supporting this is oblivious to the concepts of freedom and liberty. Socialism has arrived and this bill will only serve to expand it. This is a power grab to confiscate personal wealth and redistribute it to those whose only work history is running their mouths and playing the victim.

Affording the IRS access to your bank transactions provides them access to snoop into your financial affairs; what church, if any, you support, the charities and political causes you aid, while creating a data profile where your privacy is replaced with surveillance.

Ultimately, politicians will push legislation that regulates how you save and invest.

How soon until the IRS requires your ATM withdrawal receipt and questions where you spent it?

Along with the White House, Democrats own a razor-thin majority in the Congress. Not to be deterred, the left will stop at nothing in their brazen pursuit of power and control.

Who is the menace to freedom and privacy now?

Everyone, including the economy, will be much better off provided this bill does a MacArthur and fades away, forever.

GREGORY MARESCA writes from Northumberland County

Read more here:
Big brother banking on you | | standardspeaker.com - Standard Speaker