Dog Brothers Public Forum

HOME | PUBLIC FORUM | MEMBERS FORUM | INSTRUCTORS FORUM | TRIBE FORUM

Welcome, Guest. Please login or register.
May 03, 2016, 07:36:34 AM

Login with username, password and session length
Search:     Advanced search
Welcome to the Dog Brothers Public Forum.
94267 Posts in 2307 Topics by 1081 Members
Latest Member: Martel
* Home Help Search Login Register
  Show Posts
Pages: 1 ... 205 206 [207] 208 209 ... 270
10301  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 05:10:08 PM
UNITED STATES V. KNOTTS, 460 U. S. 276 (1983)
Subscribe to Cases that cite 460 U. S. 276
 
--------------------------------------------------------------------------------


Link to the Case Preview: http://supreme.justia.com/us/460/276/

Link to the Full Text of Case: http://supreme.justia.com/us/460/276/case.html

U.S. Supreme Court
United States v. Knotts, 460 U.S. 276 (1983)
United States v. Knotts

No. 81-1802

Argued December 6, 1982

Decided March 2, 1983

460 U.S. 276


Syllabus

Having reason to believe that one Armstrong was purchasing chloroform to be used in the manufacture of illicit drugs, Minnesota law enforcement officers arranged with the seller to place a beeper (a radio transmitter) inside a chloroform container that was sold to Armstrong. Officers then followed the car in which the chloroform was placed, maintaining contact by using both visual surveillance and a monitor which received the beeper signals, and ultimately tracing the chloroform, by beeper monitoring alone, to respondent's secluded cabin in Wisconsin. Following three days of intermittent visual surveillance of the cabin, officers secured a search warrant and discovered the chloroform container, and a drug laboratory in the cabin, including chemicals and formulas for producing amphetamine. After his motion to suppress evidence based on the warrantless monitoring of the beeper was denied, respondent was convicted in Federal District Court for conspiring to manufacture controlled substances in violation of 21 U.S.C. § 846. The Court of Appeals reversed, holding that the monitoring of the beeper was prohibited by the Fourth Amendment.

Held: Monitoring the beeper signals did not invade any legitimate expectation of privacy on respondent's part, and thus there was neither a "search" nor a "seizure" within the contemplation of the Fourth Amendment. The beeper surveillance amounted principally to following an automobile on public streets and highways. A person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements. While respondent had the traditional expectation of privacy within a dwelling place insofar as his cabin was concerned, such expectation of privacy would not have extended to the visual observation from public places of the automobile arriving on his premises after leaving a public highway, or to movements of objects such as the chloroform container outside the cabin. The fact that the officers relied not only on visual surveillance, but also on the use of the beeper, does not alter the situation. Nothing in the Fourth Amendment prohibited the police from augmenting their sensory faculties with such enhancement as science and technology afforded them in this case. There is no indication that the beeper was used in any way to reveal information as to the movement of the chloroform container within the cabin, or in any

Page 460 U. S. 277

way that would not have been visible to the naked eye from outside the cabin. Pp. 460 U. S. 280-285.

662 F.2d 515, reversed.

REHNQUIST, J., delivered the opinion of the Court, in which BURGER, C.J., and WHITE, POWELL, and O'CONNOR, JJ., joined. BRENNAN, J., filed an opinion concurring in the judgment, in which MARSHALL, J., joined, post, p. 460 U. S. 285. BLACKMUN, J., filed an opinion concurring in the judgment, in which BRENNAN, MARSHALL, and STEVENS, JJ., joined, post, p. 460 U. S. 287. STEVENS, J., filed an opinion concurring in the judgment, in which BRENNAN, and MARSHALL, JJ., joined, post, p. 460 U. S. 288.
10302  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 05:06:39 PM
UNITED STATES V KARO, 468 U. S. 705 (1984)
Subscribe to Cases that cite 468 U. S. 705
 
--------------------------------------------------------------------------------

Link to the Full Text of Case: http://supreme.justia.com/us/468/705/case.html

U.S. Supreme Court
United States v Karo, 468 U.S. 705 (1984)
United States v Karo

No. 83-850

Argued April 25, 1984

Decided July 3, 1984

468 U.S. 705


Syllabus

After a Drug Enforcement Administration (DEA) agent learned that respondents Karo, Horton, and Harley had ordered 50 gallons of ether from a Government informant, who had told the agent that the ether was to be used to extract cocaine from clothing that had been imported into the United States, the Government obtained a court order authorizing the installation and monitoring of a beeper in one of the cans of ether. With the informant's consent, DEA agents substituted their own can containing a beeper for one of the cans in the shipment. Thereafter, agents saw Karo pick up the ether from the informant, followed Karo to his house, and determined by using the beeper that the ether was inside the house, where it was then monitored. The ether then moved in succession to two other houses, including Horton's, before it was moved first to a locker in one commercial storage facility and then to a locker in another such facility. Both lockers were rented jointly by Horton and Harley. Finally, the ether was removed from the second storage facility by respondent Rhodes and an unidentified woman and transported in Horton's truck, first to Rhodes' house and then to a house rented by Horton, Harley, and respondent Steele. Using the beeper monitor, agents determined that the beeper can was inside the house, and obtained a warrant to search the house based in part on information derived through use of the beeper. The warrant was executed, and Horton, Harley, Steele, and respondent Roth were arrested, and cocaine was seized. Respondents were indicted for various offenses relating to the cocaine. The District Court granted respondents' pretrial motion to suppress the seized evidence on the grounds that the initial warrant to install the beeper was invalid, and that the seizure was the tainted fruit of an unauthorized installation and monitoring of the beeper. The Government appealed, but did not challenge the invalidation of the initial warrant. The Court of Appeals affirmed, except with respect to Rhodes, holding that a warrant was required to install the beeper in the can of ether and to monitor it in private dwellings and storage lockers, that the warrant for the search of the house rented by Horton, Harley, and Steele, and the resulting seizure, were tainted by the Government's prior illegal conduct, and that therefore the evidence was properly suppressed as to Horton, Harley, Steele, Roth, and Karo.

Page 468 U. S. 706


Held:

1. No Fourth Amendment interest of Karo or of any other respondent was infringed by the installation of the beeper. The informant's consent was sufficient to validate the installation. And the transfer of the beeper-laden can to Karo was neither a search nor a seizure, since it conveyed no information that Karo wished to keep private and did not interfere with anyone's possessory interest in a meaningful way. Pp. 468 U. S. 711-713.

2. The monitoring of a beeper in a private residence, a location not opened to visual surveillance, violates the Fourth Amendment rights of those who have a justifiable interest in the privacy of the residence. Here, if a DEA agent had entered the house in question without a warrant to verify that the ether was in the house, he would have engaged in an unreasonable search within the meaning of the Fourth Amendment. The result is the same where, without a warrant, the Government surreptitiously uses a beeper to obtain information that it could not have obtained from outside the curtilage of the house. There is no reason in this case to deviate from the general rule that a search of a house should be conducted pursuant to a warrant. Pp. 468 U. S. 713-718.

3. The evidence seized in the house in question, however, should not have been suppressed with respect to any of the respondents. The information that the ether was in the house, verified by use of the beeper without a warrant, would be inadmissible against those respondents with privacy interests in the house, and would invalidate the search warrant, if critical to establishing probable cause. But because locating, without prior monitoring, the ether in the second storage facility was not an illegal search (use of the beeper not identifying the specific locker in which the ether was located and the locker being identified only by the smell of ether emanating therefrom), and because the ether was seen being loaded into Horton's truck, which then traveled the highways, it is evident that there was no violation of the Fourth Amendment as to anyone with or without standing to complain about monitoring the beeper while it was located in the truck. United States v. Knotts, 460 U. S. 276. Under the circumstances, the warrant affidavit, after striking the facts about monitoring the beeper while it was in the searched house, contained sufficient untainted information to furnish probable cause for issuance of the search warrant. Pp. 468 U. S. 719-721.

710 F.2d 1433, reversed.

WHITE, J., delivered the opinion of the Court, in which BURGER, C.J., and BLACKMUN and POWELL, JJ., joined, in Parts I, II, and IV of which REHNQUIST and O'CONNOR, JJ., joined, and in Part III of which BRENNAN, MARSHALL, and STEVENS, JJ., joined. O'CONNOR, J., filed an opinion concurring in part and concurring in the judgment, in which

Page 468 U. S. 707

REHNQUIST, J., joined, post, p. 468 U. S. 721. STEVENS, J., filed an opinion concurring in part and dissenting in part, in which BRENNAN and MARSHALL, JJ., joined, post, p. 468 U. S. 728.
10303  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 04:48:20 PM
The right of the people to be secure in their persons, houses, papers, and effects, against searches and seizures, shall not be violated, and no Warrants shall issue.

Better?
10304  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 04:42:18 PM
Does the 1st amd. only apply to town criers and wood block printing? Does the 2nd. only apply to muskets? Does the 4th apply to cell phones and the intertubes, or are they somehow immune from reasonable search and seizure?
10305  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 01:54:31 PM
So, the policy solution to technology is....
10306  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 09:26:47 AM
From the first link:

Quote
The spokesman wouldn’t disclose how many of Sprint’s 48 million customers had their GPS data shared, or indicate the number of unique surveillance requests from law enforcement.

Why as customers aren't we allowed to evaluate how willing a carrier is to provide locational data without a users' consent?

**Without wading through all the applicable laws and caselaw, I'm guessing that Sprint has no legal obligation to do so. Keep in mind that this data is being accessed by court order/subpeona/warrant and is subject to judicial review.**

From the second link:

Quote
Conclusion

The only thing certain with respect to the legal requirements for acquisition of cell site information by the government for purposes of identifying the location of a cellular telephone and its user is that nothing is certain at this moment. The path that the use of cell site tracking is headed down is likely toward a legislative solution. In the interim, law enforcement should track judicial developments closely within their jurisdictions. State and local law enforcement also should take a proactive role with respect to legislative solutions to this uncertainty within their own state electronic surveillance statutes.

Sounds far less than definitive to me.




**It's not definitive. As technology advances and new laws are written and caselaw develops, the rules and procedures get fleshed out. Still, this is being shaped as we speak by those legislatures and courts that are part of that participatory democracy/republic. Phones have come a long way since the FBI was sitting in AT&T switching operator stations, recording conversations on wax. Laws and law enforcement has to reflect that.**
10307  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Afghanistan-Pakistan on: December 02, 2009, 09:11:48 AM
That would be funny, were it not so painfully true.  undecided
10308  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 02, 2009, 08:59:21 AM
**Assuming that someone from the EFF actually has some technical ability to grasp the "electronic frontier, I'm assuming some AGW-esque book-cooking in the above post. Below is a more technically accurate and honest article:

http://www.wired.com/threatlevel/2009/12/gps-data

**Now, I assume the EFF has heard of something certain internet insiders call "google". Using this mostly unheard of website, I was able to bring up this article that was published by taxpayers money and exists as an open source document viewable by any member of said participatory democracy/republic.**

http://www.fbi.gov/publications/leb/2006/may2006/may2006leb.htm#page25

10309  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: December 01, 2009, 10:39:06 PM
Oh wow, uninformed hysteria from the EFF. Shocking.  rolleyes

Here is the supersecret countermeasure to protect yourself from malevolent gov't snooping.

1. Pick up cellphone.

2. Remove battery.

10310  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Israel, and its neighbors on: December 01, 2009, 08:13:51 PM
Twenty years at the feet of his Farrakhan loving "them jews" pastor, we'll just see what Barry does when Israel moves against Iran's nukes.
10311  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Taqiyya and Nukes on: November 30, 2009, 04:57:10 AM
from the November 20, 2009 edition - http://www.csmonitor.com/2009/1120/p09s03-coop.html

The real reason Iran can't be trusted
As they confront Iran's nuclear aims, negotiators must mind the Shiite doctrine of deceit called 'taqiyya.'
By Mamoun Fandy
 
London
In the run-up to talks with Iran last month, many in Europe and the United States asked whether Iran would, or even could, come clean on its nuclear activities.

Should the West trust Iranian promises? The short answer is "no." But the underlying question is "Why not?"

The answer lies in Iranian belief systems – notably the doctrine of taqiyya, a difficult concept for many non-Muslims to grasp. Taqiyya is the Shiite religious rationale for concealment or dissimulation in political or worldly affairs. At one level it means that President Mahmoud Ahmadinejad and his regime can tell themselves that they are obliged by their faith not to tell the truth.

This doctrine has not been discussed much in the West, but it should be. How should the world deal with taqiyya in Shiite Islam in the context of Iran's nuclear file?

**Read it all.**
10312  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Pathological Science on: November 29, 2009, 10:46:07 AM
http://hotair.com/archives/2009/11/29/weird-science-east-anglia-cru-threw-out-their-raw-data/

Uhhhhhh......

The dog ate my global warming evidence.
10313  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Nuclear War, WMD issues on: November 28, 2009, 09:43:37 AM
China will do nothing to increase it's energy costs. Iran shutting down the Persian Gulf's oil exports would jack up the price for Russia's oil exports. Obama has already sold out Poland and the others in eastern europe in exchange for ill defined promises from Russia. Russia has already achieved it's goals in this matter.
10314  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Nuclear War, WMD issues on: November 28, 2009, 09:20:24 AM
Any signficance to the IAEA finally admitting that Iran is going for nukes?

**No. They kept anyone in the west from acting back when something less that military action might have worked. Mission accomplished.**

Any significance to the Russians and, for the first time, the Chinese signing a resolution against the Iranian nuke program?

**About as useful as a resolution to rearrainge the deckchairs on the Titanic.**
10315  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Glen Beck on: November 27, 2009, 10:54:11 PM
Funny how the same people that can so easily link Father Coughlin to Glen Beck are still at a loss as what motivated Maj. Hasan.  rolleyes
10316  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Glen Beck on: November 27, 2009, 09:17:03 PM
Typical leftist smear tactics. Glen Beck has been the one effective watchdog over this adminisitration. Of course he's being targeted.
10317  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: November 25, 2009, 05:18:24 PM
The US has laws that forbid such things, and rightly so.

http://www.ojp.usdoj.gov/BJA/topics/CI_Paper_0703.pdf

While intelligence plays a key role in law enforcement operations,
history tells us that it can also be the instrument of abuse if
such operations are not properly organized, focused and directed.
Particularly during times of national emergency, one must be
particularly vigilant to prevent aggressive enforcement and intelligence
gathering from becoming incursions upon constitutional
rights. Aggressive intelligence gathering operations that resemble
fishing expeditions have been employed improperly in the
past to garner sensitive or confidential information on individuals
for whom there is no reasonable suspicion of criminal activity.
Once documented, such information can develop a life of its
own if sufficient safeguards are not built into screening, review
and management of intelligence files. If passed on to other law
enforcement agencies as intelligence, it can form the basis for
abuse of civil liberties and potential civil liability.
In the same manner, intelligence operations are misguided
that directly or indirectly gather information on persons based
solely on their dissident political activities or views, because they
espouse positions or philosophies that are perceived to threaten
conventional social or political doctrine, traditionally accepted
social mores or similar societal values or institutions, or because
they have cultural connections with terrorists. Use of law
enforcement intelligence resources to intimidate, inhibit or suppress
such activities or harass such individuals under the pretext
of legitimate police concern for maintaining social order are at
best misguided and, in the worst case scenario, constitute a threat
to the principles of law enforcement in a democratic society.
Additionally, misguided intelligence gathering is a waste of valuable
resources that are desperately needed to ferret out wrongdoers
and persons who pose real threats to national and local
security.
10318  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Political Economics on: November 24, 2009, 07:47:33 PM
http://thehill.com//homenews/house/69295-dems-push-wall-street-150b-stock-tax

More from the Cloward-Piven playbook.
10319  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Pathological Science on: November 24, 2009, 06:32:54 PM
http://iowahawk.typepad.com/iowahawk/2009/11/iowahawk-geographic-the-secret-life-of-climate-researchers.html

Iowahawk rules!  grin
10320  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: The vast left wing conspiracy: BO's friends, appts, and running dogs on: November 24, 2009, 12:47:21 PM

http://www.discoverthenetworks.org/groupProfile.asp?grpid=6967

Strategy for forcing political change through orchestrated crisis


First proposed in 1966 and named after Columbia University sociologists Richard Andrew Cloward and Frances Fox Piven, the “Cloward-Piven Strategy” seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands, thus pushing society into crisis and economic collapse.

Inspired by the August 1965 riots in the black district of Watts in Los Angeles (which erupted after police had used batons to subdue a black man suspected of drunk driving), Cloward and Piven published an article titled "The Weight of the Poor: A Strategy to End Poverty" in the May 2, 1966 issue of The Nation. Following its publication, The Nation sold an unprecedented 30,000 reprints. Activists were abuzz over the so-called "crisis strategy" or "Cloward-Piven Strategy," as it came to be called. Many were eager to put it into effect.

In their 1966 article, Cloward and Piven charged that the ruling classes used welfare to weaken the poor; that by providing a social safety net, the rich doused the fires of rebellion. Poor people can advance only when "the rest of society is afraid of them," Cloward told The New York Times on September 27, 1970. Rather than placating the poor with government hand-outs, wrote Cloward and Piven, activists should work to sabotage and destroy the welfare system; the collapse of the welfare state would ignite a political and financial crisis that would rock the nation; poor people would rise in revolt; only then would "the rest of society" accept their demands.

The key to sparking this rebellion would be to expose the inadequacy of the welfare state. Cloward-Piven's early promoters cited radical organizer Saul Alinsky as their inspiration. "Make the enemy live up to their (sic) own book of rules," Alinsky wrote in his 1972 book Rules for Radicals. When pressed to honor every word of every law and statute, every Judaeo-Christian moral tenet, and every implicit promise of the liberal social contract, human agencies inevitably fall short. The system's failure to "live up" to its rule book can then be used to discredit it altogether, and to replace the capitalist "rule book" with a socialist one.

The authors noted that the number of Americans subsisting on welfare -- about 8 million, at the time -- probably represented less than half the number who were technically eligible for full benefits. They proposed a "massive drive to recruit the poor onto the welfare rolls."  Cloward and Piven calculated that persuading even a fraction of potential welfare recipients to demand their entitlements would bankrupt the system. The result, they predicted, would be "a profound financial and political crisis" that would unleash "powerful forces … for major economic reform at the national level."

Their article called for "cadres of aggressive organizers" to use "demonstrations to create a climate of militancy." Intimidated by threats of black violence, politicians would appeal to the federal government for help. Carefully orchestrated media campaigns, carried out by friendly, leftwing journalists, would float the idea of "a federal program of income redistribution," in the form of a guaranteed living income for all -- working and non-working people alike. Local officials would clutch at this idea like drowning men to a lifeline. They would apply pressure on Washington to implement it. With every major city erupting into chaos, Washington would have to act.

This was an example of what are commonly called Trojan Horse movements -- mass movements whose outward purpose seems to be providing material help to the downtrodden, but whose real objective is to draft poor people into service as revolutionary foot soldiers; to mobilize poor people en masse to overwhelm government agencies with a flood of demands beyond the capacity of those agencies to meet. The flood of demands was calculated to break the budget, jam the bureaucratic gears into gridlock, and bring the system crashing down. Fear, turmoil, violence and economic collapse would accompany such a breakdown -- providing perfect conditions for fostering radical change. That was the theory.

Cloward and Piven recruited a militant black organizer named George Wiley to lead their new movement. In the summer of 1967, Wiley founded the National Welfare Rights Organization (NWRO). His tactics closely followed the recommendations set out in Cloward and Piven's article. His followers invaded welfare offices across the United States -- often violently -- bullying social workers and loudly demanding every penny to which the law "entitled" them. By 1969, NWRO claimed a dues-paying membership of 22,500 families, with 523 chapters across the nation.

Regarding Wiley's tactics, The New York Times commented on September 27, 1970, "There have been sit-ins in legislative chambers, including a United States Senate committee hearing, mass demonstrations of several thousand welfare recipients, school boycotts, picket lines, mounted police, tear gas, arrests - and, on occasion, rock-throwing, smashed glass doors, overturned desks, scattered papers and ripped-out phones."These methods proved effective. "The flooding succeeded beyond Wiley's wildest dreams," writes Sol Stern in the City Journal.  "From 1965 to 1974, the number of single-parent households on welfare soared from 4.3 million to 10.8 million, despite mostly flush economic times. By the early 1970s, one person was on the welfare rolls in New York City for every two working in the city's private economy."As a direct result of its massive welfare spending, New York City was forced to declare bankruptcy in 1975. The entire state of New York nearly went down with it. The Cloward-Piven strategy had proved its effectiveness.

The Cloward-Piven strategy depended on surprise. Once society recovered from the initial shock, the backlash began. New York's welfare crisis horrified America, giving rise to a reform movement which culminated in "the end of welfare as we know it" -- the 1996 Personal Responsibility and Work Opportunity Reconciliation Act, which imposed time limits on federal welfare, along with strict eligibility and work requirements. Both Cloward and Piven attended the White House signing of the bill as guests of President Clinton.

Most Americans to this day have never heard of Cloward and Piven. But New York City Mayor Rudolph Giuliani attempted to expose them in the late 1990s. As his drive for welfare reform gained momentum, Giuliani accused the militant scholars by name, citing their 1966 manifesto as evidence that they had engaged in deliberate economic sabotage. "This wasn't an accident," Giuliani charged in a 1997 speech. "It wasn't an atmospheric thing, it wasn't supernatural. This is the result of policies and programs designed to have the maximum number of people get on welfare."

Cloward and Piven never again revealed their intentions as candidly as they had in their 1966 article. Even so, their activism in subsequent years continued to rely on the tactic of overloading the system. When the public caught on to their welfare scheme, Cloward and Piven simply moved on, applying pressure to other sectors of the bureaucracy, wherever they detected weakness.

In 1982, partisans of the Cloward-Piven strategy founded a new "voting rights movement," which purported to take up the unfinished work of the Voting Rights Act of 1965. Like ACORN, the organization that spear-headed this campaign, the new "voting rights" movement was led by veterans of George Wiley's welfare rights crusade. Its flagship organizations were Project Vote and Human SERVE, both founded in 1982. Project Vote is an ACORN front group, launched by former NWRO organizer and ACORN co-founder Zach Polett. Human SERVE was founded by Richard A. Cloward and Frances Fox Piven, along with a former NWRO organizer named Hulbert James.

All three of these organizations -- ACORN, Project Vote and Human SERVE -- set to work lobbying energetically for the so-called Motor-Voter law, which Bill Clinton ultimately signed in 1993. The Motor-Voter bill is largely responsible for swamping the voter rolls with "dead  wood" -- invalid registrations signed in the name of deceased, ineligible or non-existent people -- thus opening the door to the unprecedented  levels of voter fraud and "voter disenfranchisement" claims that followed in subsequent elections.

The new "voting rights" coalition combines mass voter registration drives -- typically featuring high levels of fraud -- with systematic intimidation of election officials in the form of frivolous lawsuits, unfounded charges of "racism" and "disenfranchisement," and "direct action" (street protests, violent or otherwise). Just as they swamped America's welfare offices in the 1960s, Cloward-Piven devotees now seek to overwhelm the nation's understaffed and poorly policed electoral system. Their tactics set the stage for the Florida recount crisis of 2000, and have introduced a level of fear, tension and foreboding to U.S. elections heretofore encountered mainly in Third World countries. 

Both the Living Wage and Voting Rights movements depend heavily on financial support from George Soros's Open Society Institute and his "Shadow Party," through whose support the Cloward-Piven strategy continues to provide a blueprint for some of the Left's most ambitious campaigns.
10321  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Political Economics on: November 24, 2009, 09:22:12 AM
http://www.cnbc.com/id/34040009

The 'Real' Jobless Rate: 17.5% Of Workers Are Unemployed
Published: Thursday, 19 Nov 2009
CNBC.com

As experts debate the potential speed of the US recovery, one figure looms large but is often overlooked: nearly 1 in 5 Americans is either out of work or under-employed.
10322  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 24, 2009, 09:07:36 AM
I get the impression from the first of your two posts that

a) they were specifically watching his particular email, and
b) the email communication was international.

It seems so.
10323  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: November 24, 2009, 08:40:03 AM
Do I want a GPS tracker on everyone's car? No. For law enforcement purposes, it would normally be used as a tool to assist in a physical surveillance, not a substitute for "tailing" a suspect in a crime. You need to be able to testify that your suspect was the driver of the car at the time the car was used in a criminal act. Otherwise your surveillance is worthless because of the "soddi" defense.
10324  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Brits interfere in privacy, religious expression on: November 24, 2009, 02:03:21 AM
http://www.telegraph.co.uk/news/uknews/6533021/British-intelligence-cracks-trans-Atlantic-terrorist-network.html


They are reticent on how Zazi was identified but admit it was through an “intercepted communication."


After Vinas was detained, a number of arrests followed in Belgium in December and in April this year Greater Manchester Police arrested 12 Pakistani students after GCHQ intercepted emails about girls and cars that were allegedly code for a planned attack.
10325  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Brits interfere in privacy, religious expression on: November 24, 2009, 01:42:31 AM
**Help ! Help ! I'm being oppressed !"**

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/6529436/British-spies-help-prevent-al-Qaeda-inspired-attack-on-New-York-subway.html

10326  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: November 24, 2009, 01:26:40 AM
http://www.policeone.com/law-enforcement-and-the-economy

A recent poll by the Police Executive Research Forum found that more than half the agencies questioned had been "bracing for funding cuts during the upcoming year."
10327  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: The vast left wing conspiracy: BO's friends, appts, and running dogs on: November 24, 2009, 01:17:06 AM
November 23, 2009
Cloward-Piven Government
By James Simpson

It is time to cast aside all remaining doubt. President Obama is not trying to lead America forward to recovery, prosperity and strength. Quite the opposite, in fact.


In September of last year, American Thinker published my article, Barack Obama and the Strategy of Manufactured Crisis. Part of a series, it connected then-presidential candidate Barack Obama to individuals and organizations practicing a malevolent strategy for destroying our economy and our system of government. Since then, the story of that strategy has found its way across the blogosphere, onto the airwaves of radio stations across the country, the Glenn Beck television show, Bill O'Reilly, and now Mark Levin.


The methodology is known as the Cloward-Piven Strategy, and we can all be grateful to David Horowitz and his Discover the Networks for originally exposing and explaining it to us. He describes it as:


The strategy of forcing political change through orchestrated crisis. The "Cloward-Piven Strategy" seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands, thus pushing society into crisis and economic collapse.


Richard Cloward and Frances Fox Piven were two lifelong members of Democratic Socialists of America who taught sociology at Columbia University (Piven later went on to City University of New York). In a May 1966 Nation magazine article titled "The Weight of the Poor," they outlined their strategy, proposing to use grassroots radical organizations to push ever more strident demands for public services at all levels of government.


The result, they predicted, would be "a profound financial and political crisis" that would unleash "powerful forces ... for major economic reform at the national level."


They implemented the strategy by creating a succession of radical organizations, most notable among them the Association of Community Organizations for Reform Now (ACORN), with the help of veteran organizer Wade Rathke. Their crowning achievement was the "Motor Voter" act, signed into law by Bill Clinton in 1993 with Cloward and Piven standing behind him.


As we now know, ACORN was one of the chief drivers of high-risk mortgage lending that eventually led to the financial crisis. But the Motor Voter law was another component of the strategy. It created vast vulnerabilities in our electoral system, which ACORN then exploited.

ACORN's vote registration scandals throughout the U.S. are predictable fallout.


The Motor Voter law has also been used to open another vulnerability in the system: the registration of vast numbers of illegal aliens, who then reliably vote Democrat. Herein lies the real reason Democrats are so anxious for open borders, security be damned.


It should be clear to anyone with a mind and two eyes that this president and this Congress do not have our interests at heart. They are implementing this strategy on an unprecedented scale by flooding America with a tidal wave of poisonous initiatives, orders, regulations, and laws. As Rahm Emmanuel said, "A crisis is a terrible thing to waste."


The real goal of "health care" legislation, the real goal of "cap-and-trade," and the real goal of the "stimulus" is to rip the guts out of our private economy and transfer wide swaths of it over to the government to control. Do not be deluded by the propaganda. These initiatives are vehicles for change. They are not goals in and of themselves except in their ability to deliver power. They and will make matters much worse, for that is their design.


This time, in addition to overwhelming the government with demands for services, Obama and the Democrats are overwhelming political opposition to their plans with a flood of apocalyptic legislation. Their ultimate goal is to leave us so discouraged, demoralized, and exhausted that we throw our hands up in defeat. As Barney Frank said, "the middle class will be too distracted to fight."


These people are our enemies. They don't use guns, yet, but they are just as dangerous, determined, and duplicitous as the communists we faced in the Cold War, Korea, Vietnam, and bush wars across the globe, and the Nazis we faced in World War II.


It is time we fully internalized and digested this fact, with all its ugly ramifications. These people have violated countless laws and could be prosecuted, had we the political power. Not only are their policies unconstitutional, but deliberately so -- the goal being to make the Constitution irrelevant. Their spending is off the charts and will drive us into hyperinflation, but it could be rescinded, had we the political power. These policies are toxic, but they could be stopped and reversed, had we the political power. Their ideologies are poisonous, but they could be exposed for what they are, with long jail sentences as an object lesson, had we the political power.


Every single citizen who cares about this country should be spending every minute of his or her spare time lobbying, organizing, writing, and planning. Fight every initiative they launch. It is all destructive. If we are to root out this evil, it is critical that in 2010 we elect  competent, principled leaders willing to defend our Constitution and our country. Otherwise, the malevolent cabal that occupies the government today will become too entrenched.


After that, all bets are off.


Businessman and Examiner.com columnist Jim Simpson is a former White House staff economist and budget analyst. You may read more of his articles on his blog, Truth and Consequences.

Page Printed from: http://www.americanthinker.com/2009/11/clowardpiven_government.html at November 24, 2009 - 12:02:36 AM EST
10328  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: November 24, 2009, 01:00:26 AM
What state? No matter the technology involved, it boils down to flesh and blood humans doing the job. Now more than ever, there are less doing law enforcement and greater demands on those doing the job. My state invests little in law enforcement in the best of times, as a result, outlaw motorcycle gangs have set up shop here as they discuss how it's a safe state from them to operate in.
10329  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Lime Jello, Sardines, Buttermilk, & Tomato Paste on: November 23, 2009, 11:47:41 PM
Nah, I think they should be forced to wrestle members of Code Pink in a vat full of lime jello, sardines, buttermilk, and tomato paste. Work for you?

And are you ceding that the NSA peruses American originating sigint? Or are we talking about disbanding the NSA for things they haven't done?

**Given that neither one of us get to wander through the bowels of Ft. Meade and that the intertubes don't have clearly demarcated borders, it's not possible to know what has happened and hasn't. Yes? Although it's my understanding is that friendly foreign intel agencies do sift through US domestic sigint and tip off US law enforcement on the federal level when they spot something worth investigating. What are you going to do to stop GCHQ from reading your global warming posts?**

I've got an uncle (second cousin, actually) who was a Wisco politician who palled around w/ Proxmire and at one point was considering a run from governor. He use to argue with me about my Libertarian ways, claiming that you needed to work within a party structure to achieve your ends, doing a lot of compromising along the way. I replied that there was a long, honorable history of citizens fighting losing battles in defense of unadulterated liberty and, in losing, making sure those who play fast and loose with the nation's founding principles understand their shenanigans are understood and being monitored.

**Ah yes, the Libertarians, changing the world, one losing candidate at a time.**  grin

I suffer no illusion that my mewlings will cause the NSA to change its course, and here and now the benefit cost analysis perhaps favors the status quo. It's my hope, however, that defining the issues to small audiences in my inimitable fashion will help to ensure I'm not the only one monitoring these concerns.

Steeling myself for the next stark question. . . .

Edited to add: Off to KY in the a.m. where I'm second in command and cook for an expedition where the leader just came down w/ H1N1. Have a bunch of balls in the air most of the week so I'm not sure when I'll be back to the fray.

Be careful when in a part of the country where "Deliverance" is in the romantic-comedy sections of the video stores.
10330  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: November 23, 2009, 11:36:34 PM
American law enforcement is being hollowed out as we speak. Lots of veteran investigators are pulling the pin and taking their institutional knowledge with them and those that remain are being put back into uniform. As a result, only the low hanging fruit of stupid street criminals will face investigation and complex/organized crime will face little to no prosecution.

Surveillance is how you will tend to establish probable cause that a crime was/is being committed. You can raise the bar so that all but the most basic police services are impossible to provide. It's good news for the real world Tony Sopranos/Avon Barksdales out there.
10331  Politics, Religion, Science, Culture and Humanities / Politics & Religion / A dose of reality from the POTH on: November 23, 2009, 12:08:31 PM
http://www.nytimes.com/2009/11/23/business/23rates.html?pagewanted=print

November 23, 2009
Payback TimeWave of Debt Payments Facing U.S. Government By EDMUND L. ANDREWS

WASHINGTON — The United States government is financing its more than trillion-dollar-a-year borrowing with i.o.u.’s on terms that seem too good to be true.

But that happy situation, aided by ultralow interest rates, may not last much longer.

Treasury officials now face a trifecta of headaches: a mountain of new debt, a balloon of short-term borrowings that come due in the months ahead, and interest rates that are sure to climb back to normal as soon as the Federal Reserve decides that the emergency has passed.

Even as Treasury officials are racing to lock in today’s low rates by exchanging short-term borrowings for long-term bonds, the government faces a payment shock similar to those that sent legions of overstretched homeowners into default on their mortgages.

With the national debt now topping $12 trillion, the White House estimates that the government’s tab for servicing the debt will exceed $700 billion a year in 2019, up from $202 billion this year, even if annual budget deficits shrink drastically. Other forecasters say the figure could be much higher.
10332  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Homeland Security and American Freedom on: November 23, 2009, 12:07:16 PM
No, but with this president, it might as well be.
10333  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 23, 2009, 11:58:26 AM
So the answer is to scrap the NSA?

http://www.nolo.com/legal-encyclopedia/article-29610.html

A nice primer on the topic of privacy and email.
10334  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Issues in the American Creed (Constitutional Law and related matters) on: November 23, 2009, 11:45:30 AM
Should a warrant be required to physicallly surveil a suspect? If not, why? What's the difference?
10335  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Nuclear War, WMD issues on: November 23, 2009, 11:43:02 AM
To get us to concede East Europe to its sphere again, and to control the gas supplies of Central Asia (the Georgia issue can be seen in this context).

===================

Exactly.
10336  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Homeland Security and American Freedom on: November 23, 2009, 11:41:27 AM
Am I surprised?

Not. One. Bit.
10337  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 20, 2009, 09:02:54 AM
Crafty,

Without seeing all the reports, and especially seeing all the crime scene photos, it's impossible to say that it's not a suicide unless the GSW was positioned in such a manner as to make it impossible that it was self inflicted. A contact GSW looks the same, no matter if it was self inflicted or done by someone else. Now if it wasn't a contact/close range GSW, then you have something....
10338  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 20, 2009, 08:27:19 AM
No I don't have a better method, though it annoys me to be told someone is dishing up tasty omelets while being assured no eggs were broken in the process. You can't have it both ways by posting all the constraints intelligence agencies are supposedly operating under and then bragging on results that clearly had to involve a lot of sifting before archiving the data for several years.

**What are the 4th amendment protections enjoyed by British nationals emailing Pakistanis?**
10339  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 19, 2009, 10:41:43 PM
Can you show me the source docs? People TEND to shoot themselves with their dominant hand, however that alone is not evidence of homicide.
10340  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Homeland Security and American Freedom on: November 19, 2009, 10:24:20 PM
http://www.jihadwatch.org/2009/11/american-convert-to-islam-says-it-is-not-permissible-for-muslims-to-join-an-infidel-army.html

American convert to Islam says it is not permissible for Muslims to join an Infidel army


Wait a minute. I thought only greasy Islamophobes believed that there was any problem with Muslims in the military. Will Honest Ibe Hooper of CAIR denounce Umar Lee as an "Islamophobe"?

Glossary: Kaafir, kufr = Infidel. Deen = religion. Ummah = global Islamic community. Ulamaa = Islamic scholars. Al wala wal bara = "Love and hate," i.e., love for Muslims and hatred for non-Muslims.
10341  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 19, 2009, 08:14:48 PM
And you've got a better method you'd wish to be used? I'd love to hear it.
10342  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Legal Issues created by the War with Islamic Fascism on: November 19, 2009, 04:15:52 PM
Power Line Blog: John Hinderaker, Scott Johnson, Paul Mirengoff
http://www.powerlineblog.com

Trying KSM: Why? An insane protocol
   
November 18, 2009 Posted by Scott at 3:18 PM
In his press conference this past Friday and in his testimony before the Senate Judiciary Committee today, Attorney General Holder has explained his decision to refer KSM and his 9/11 co-conspirators to trial based on a "protocol" released in July.

What protocol? I don't recall reading anything about it at the time it was released, or seeing anything about it in connection with Holder's decision to deliver KSM et al. to federal court in New York for trial cloaked with the constitutional rights of American citizens.

I called the Justice Department this morning to ask for a copy of the protocol and was directed to the document in issue. It is titled "Determination of Guantanamo Cases Referred for Prosecution." The first paragraph describes a process for determining which cases are to be referred for criminal prosecution. The second paragraph sets forth the "Factors for Determination of Prosecution." It reads as follows:

There is a presumption that, where feasible. referred cases will be prosecuted in an Article III [federal] court, in keeping with traditional principles of federal prosecution. Nonetheless, where other compelling factors make it more appropriate to prosecute a case in a reformed military commission, it may be prosecuted there. That inquiry-turns on the following three broad sets of factors, which are based on forum-selection factors traditionally used by federal prosecutors:

A. Strength of Interest. The factors to be considered here are the nature of the offenses to be charged or any pending charges; the nature and gravity of the conduct underlying the offenses; the identity of victims of the offense; the location in which the offenses occurred; the location and context in which the individual was apprehended; and the manner in which the case was investigated and evidence gathered, including the investigating entities.

B. Efficiency. The factors to be considered here are protection of intelligence sources and methods; the venue in which the case would be tried; issues related to multiple-defendant trials; foreign policy concerns; legal or evidentiary problems that might attend prosecution in the other jurisdiction: and efficiency and resource concerns.

C. Other Prosecution Considerations. The factors to be considered here are the extent to which the forum, and the offenses that could be charged in that forum, permit a full presentation of the wrongful conduct allegedly committed by the accused, and the available sentence upon conviction of those offenses.




Despite the bare bones nature of the enumerated factors and the lack of detail regarding how they are to applied, this is a shocking document. The operative presumption is a rule in favor of criminal prosecution. Nothing could more clearly indicate the Obama administration's treatment of the war on terrorism as a venture in aw enforcement. In the words of the late John Lennon: "WAR IS OVER! (if you want it)."

Given the referral of the case against KSM et al. for prosecution in federal court, we can do a little reverse engineering to figure out how the enumerated factors are apparently applied by the Obama administration. If the attack occurred in the United States, it weighs in favor of criminal prosecution. If the attack focused on American civilians, it weighs in favor of criminal prosecution. (It is less clear to me how the other factors are weighed and applied in practice.) Application of these factors can convert heinous acts of war and war crimes into criminal offenses with respect to which the perpetrators are subject to the protections of the Constitution of the United States.

That way madness lies. The Obama administration is engaged in a venture that will simultaneously undermine the prosecution of the war in which we are engaged while it blurs the distinction between war and crime. It is a venture that works a great burden on the federal courts and prosecutors. To what end?

With a few exceptions, Attorney General Holder has been exceedingly wary of articulating the application of the "factors" to KSM et al. other than by general reference to the "protocol." As we pointed out, what Holder has said about application of the factors makes no sense at all. Attacks on Americans in the United States are presumably to be treated as crimes subject to prosecution in federal court. Why? What is the underlying rationale? Again, Holder has been wary of articulating it.

Whatever it is, notice should be taken. The Obama administration's "protocol" sends up a red flag signaling a great danger to the people of the United States.

UPDATE: Andrew McCarthy comments here.
10343  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 19, 2009, 03:42:47 PM
http://www.wired.com/threatlevel/2009/09/nsa-email/

NSA-Intercepted E-Mails Helped Convict Would-Be Bombers
By Kim Zetter  September 8, 2009  |  6:26 pm  |  Categories: Surveillance

The three men convicted in the United Kingdom on Monday of a plot to bomb several transcontinental flights were prosecuted in part using crucial e-mail correspondences intercepted by the U.S. National Security Agency, according to Britain’s Channel 4.

The e-mails, several of which have been reprinted by the BBC and other publications, contained coded messages, according to prosecutors. They were intercepted by the NSA in 2006 but were not included in evidence introduced in a first trial against the three last year.

**HMMMMMMMMMMMMMMM**
10344  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Homeland Security and American Freedom on: November 19, 2009, 09:08:17 AM
http://www.washingtonpost.com/wp-dyn/content/gallery/2009/11/10/GA2009111000920.html

See it yourself.
10345  Politics, Religion, Science, Culture and Humanities / Politics & Religion / Re: Homeland Security and American Freedom on: November 19, 2009, 08:58:50 AM
http://www.humanevents.com/article.php?id=34479

Nidal Hasan’s Ominous Islam
by  Robert Spencer

11/19/2009


Before he killed or wounded 54 Americans at Fort Hood on November 5, army psychiatrist Nidal Hasan had raised eyebrows with his Islamic proselytizing, which he carried on even when he was supposed to be conducting medical briefings. One such presentation has come to light: the June 2007 briefing which Hasan gave to other doctors at the Walter Reed Army Medical Center. Hasan’s PowerPoint slides say many of the same things found in jihadist literature and propaganda throughout the Middle East and among its apologists here in America.   

Hasan’s Islam is rooted in traditional understandings of the faith as taught by the authoritative schools of Sunni Muslim jurisprudence. It also is the same Islam that is taught by groups such as the Muslim Brotherhood, Hamas and Al-Qaeda.
10346  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 18, 2009, 10:49:38 PM
http://www.chicagotribune.com/news/chi-michael-scott-deathnov18,0,3218383.story

Just reading this, it doesn't seem atypical.
10347  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 18, 2009, 05:26:58 PM




TITLE 50 > CHAPTER 36 > SUBCHAPTER I § 1809. Criminal sanctions
 (a) Prohibited activities

A person is guilty of an offense if he intentionally—
(1) engages in electronic surveillance under color of law except as authorized by statute; or
(2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by statute.
(b) Defense
It is a defense to a prosecution under subsection (a) of this section that the defendant was a law enforcement or investigative officer engaged in the course of his official duties and the electronic surveillance was authorized by and conducted pursuant to a search warrant or court order of a court of competent jurisdiction.
(c) Penalties
An offense described in this section is punishable by a fine of not more than $10,000 or imprisonment for not more than five years, or both.
(d) Federal jurisdiction
There is Federal jurisdiction over an offense under this section if the person committing the offense was an officer or employee of the United States at the time the offense was committed.

TITLE 50 > CHAPTER 36 > SUBCHAPTER I > § 1801
(a) “Foreign power” means—
(1) a foreign government or any component thereof, whether or not recognized by the United States;
(2) a faction of a foreign nation or nations, not substantially composed of United States persons;
(3) an entity that is openly acknowledged by a foreign government or governments to be directed and controlled by such foreign government or governments;
(4) a group engaged in international terrorism or activities in preparation therefor;
(5) a foreign-based political organization, not substantially composed of United States persons; or
(6) an entity that is directed and controlled by a foreign government or governments.
(b) “Agent of a foreign power” means—
(1) any person other than a United States person, who—
(A) acts in the United States as an officer or employee of a foreign power, or as a member of a foreign power as defined in subsection (a)(4) of this section;
(B) acts for or on behalf of a foreign power which engages in clandestine intelligence activities in the United States contrary to the interests of the United States, when the circumstances of such person’s presence in the United States indicate that such person may engage in such activities in the United States, or when such person knowingly aids or abets any person in the conduct of such activities or knowingly conspires with any person to engage in such activities; or
(C) engages in international terrorism or activities in preparation therefore; or
(2) any person who—
(A) knowingly engages in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States;
(B) pursuant to the direction of an intelligence service or network of a foreign power, knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, which activities involve or are about to involve a violation of the criminal statutes of the United States;
(C) knowingly engages in sabotage or international terrorism, or activities that are in preparation therefor, for or on behalf of a foreign power;
(D) knowingly enters the United States under a false or fraudulent identity for or on behalf of a foreign power or, while in the United States, knowingly assumes a false or fraudulent identity for or on behalf of a foreign power; or
(E) knowingly aids or abets any person in the conduct of activities described in subparagraph (A), (B), or (C) or knowingly conspires with any person to engage in activities described in subparagraph (A), (B), or (C).
(c) “International terrorism” means activities that—
(1) involve violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or of any State, or that would be a criminal violation if committed within the jurisdiction of the United States or any State;
(2) appear to be intended—
(A) to intimidate or coerce a civilian population;
(B) to influence the policy of a government by intimidation or coercion; or
(C) to affect the conduct of a government by assassination or kidnapping; and
(3) occur totally outside the United States, or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum.
(d) “Sabotage” means activities that involve a violation of chapter 105 of title 18, or that would involve such a violation if committed against the United States.
(e) “Foreign intelligence information” means—
(1) information that relates to, and if concerning a United States person is necessary to, the ability of the United States to protect against—
(A) actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;
(B) sabotage or international terrorism by a foreign power or an agent of a foreign power; or
(C) clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of a foreign power; or
(2) information with respect to a foreign power or foreign territory that relates to, and if concerning a United States person is necessary to—
(A) the national defense or the security of the United States; or
(B) the conduct of the foreign affairs of the United States.
(f) “Electronic surveillance” means—
(1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes;
(2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511 (2)(i) of title 18;
(3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or
(4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.
(g) “Attorney General” means the Attorney General of the United States (or Acting Attorney General), the Deputy Attorney General, or, upon the designation of the Attorney General, the Assistant Attorney General designated as the Assistant Attorney General for National Security under section 507A of title 28.
(h) “Minimization procedures”, with respect to electronic surveillance, means—
(1) specific procedures, which shall be adopted by the Attorney General, that are reasonably designed in light of the purpose and technique of the particular surveillance, to minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information;
(2) procedures that require that nonpublicly available information, which is not foreign intelligence information, as defined in subsection (e)(1) of this section, shall not be disseminated in a manner that identifies any United States person, without such person’s consent, unless such person’s identity is necessary to understand foreign intelligence information or assess its importance;
(3) notwithstanding paragraphs (1) and (2), procedures that allow for the retention and dissemination of information that is evidence of a crime which has been, is being, or is about to be committed and that is to be retained or disseminated for law enforcement purposes; and
(4) notwithstanding paragraphs (1), (2), and (3), with respect to any electronic surveillance approved pursuant to section 1802 (a) of this title, procedures that require that no contents of any communication to which a United States person is a party shall be disclosed, disseminated, or used for any purpose or retained for longer than 72 hours unless a court order under section 1805 of this title is obtained or unless the Attorney General determines that the information indicates a threat of death or serious bodily harm to any person.
(i) “United States person” means a citizen of the United States, an alien lawfully admitted for permanent residence (as defined in section 1101 (a)(20) of title Cool, an unincorporated association a substantial number of members of which are citizens of the United States or aliens lawfully admitted for permanent residence, or a corporation which is incorporated in the United States, but does not include a corporation or an association which is a foreign power, as defined in subsection (a)(1), (2), or (3) of this section.
(j) “United States”, when used in a geographic sense, means all areas under the territorial sovereignty of the United States and the Trust Territory of the Pacific Islands.
(k) “Aggrieved person” means a person who is the target of an electronic surveillance or any other person whose communications or activities were subject to electronic surveillance.
(l) “Wire communication” means any communication while it is being carried by a wire, cable, or other like connection furnished or operated by any person engaged as a common carrier in providing or operating such facilities for the transmission of interstate or foreign communications.
(m) “Person” means any individual, including any officer or employee of the Federal Government, or any group, entity, association, corporation, or foreign power.
(n) “Contents”, when used with respect to a communication, includes any information concerning the identity of the parties to such communication or the existence, substance, purport, or meaning of that communication.
(o) “State” means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, the Trust Territory of the Pacific Islands, and any territory or possession of the United States.
_____________________________________________________________________________________


But hey, they are from the government and are here to help. No doubt I should cease my ruminations and find a public teat to suckle on or something.

**Suckle on whatever you wish. It's a free country.   grin **
10348  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 18, 2009, 05:08:41 PM
Ah, I see. I'm 'sposed to be comforted by their incompetence and misallocation of resources. Got it.

**Well, unless you think Maj. Hasan was missed because the N-VA. JTTF was too busy parsing through your posts on global warming, yes.**
10349  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 18, 2009, 04:52:09 PM
The current administration makes a lot of hay out of right wing extremists. The spook agencies work for that administration. Do you need me to connect the dots?

**You're going to need a lot more dots to bridge that gap between those two data points. As much as Barry and Rahm would love to do something to quiet the critics, us individuals on the interwebs can say what we will, short of violating an actual law. The CIA, NSA or other such entity can't arrest us. KSM is getting a lovely show trial with full discovery of all sorts of vital national security secrets to be burned, with ACLU types chomping at the bit to spin legalistics webs around the federal prosecution.
With the terrorists that butchered 3000 of us on one morning getting the full measure of protection usually afforded to shoplifters, I'm not going to worry about how the new Stasi will be coming for me anytime soon.**
10350  Politics, Religion, Science, Culture and Humanities / Science, Culture, & Humanities / Re: Legal issues on: November 18, 2009, 04:38:53 PM
Perhaps here, perhaps now. It certainly not the case in Russia, China, and many other places. Are you of the opinion it could never happen here?

**It could happen anywhere, including here. Thankfully, we are far away from any real threat of it happening here anytime soon. Let me know when Glen Beck gets frogmatched off to the gulag.**
Pages: 1 ... 205 206 [207] 208 209 ... 270
Powered by MySQL Powered by PHP Powered by SMF 1.1.21 | SMF © 2015, Simple Machines Valid XHTML 1.0! Valid CSS!