Friday Follies for May 29, 2015

This story could correctly be entitled, “Cycles.” For most of the 20th Century and the first decade and a half of the 21st, we’ve watched this cycle occur in our foreign and defense policies. It began with Wilson, continued with FDR, Carter, Clinton and now Obama. Each iteration of liberal polices led to disaster. It always seem to require a conservative administration to put our house back in order…until the next liberal administration betrays us once again.

Disavowing the appeal of the appeaser

The next president will be forced to face down tyrants whom Obama ignored

– – Wednesday, May 27, 2015

For a time, reset, concessions and appeasement work to delay wars. But finally, nations wake up, grasp their blunders, rearm and face down enemies.

That gets dangerous. The shocked aggressors cannot quite believe that their targets are suddenly serious and willing to punch back. Usually, the bullies foolishly press aggression, and war breaks out.

It was insane of Nazi Germany and its Axis partners to even imagine that they could defeat the Allied trio of Imperial Britain, the Soviet Union and the United States.

But why not try?

Hitler figured that for a decade America had been unarmed and isolationist. Britain repeatedly had appeased the Third Reich. The Soviets initially collaborated with Hitler.

Hitler met no opposition after militarizing the Rhineland. He annexed Austria with impunity. He gobbled up Czechoslovakia without opposition.

Why shouldn’t Hitler have been stunned in 1939 when exasperated Britain and France finally declared war over his invasion of distant Poland?

Six years of war and some 60 million dead followed, re-establishing what should have been the obvious fact that democracies would not quite commit suicide.

By 1979, the Jimmy Carter administration had drastically cut the defense budget. President Carter promised that he would make human rights govern American foreign policy. It sounded great to Americans after Vietnam — and even greater to America’s enemies.

Then Iran imploded. The American embassy in Tehran was stormed. Diplomats were taken hostage. Radical Islamic terrorism spread throughout the Middle East. Communist insurrection followed throughout Central America. The Soviet Union invaded Afghanistan. China went into Vietnam.

Dictators such as the Soviet Union’s Leonid Brezhnev and Iran’s Ayatollah Ruhollah Khomeini assumed that Mr. Carter no longer was willing to protect the U.S. postwar order. Or perhaps they figured that the inexperienced American president was too weak to respond even had he wished to do so.

Then, Ronald Reagan defeated Mr. Carter in 1980 on the promise of restoring U.S. power. At first, both America’s friends and enemies were aghast at Reagan’s simplistic worldview that free markets were better than communism, that democracy was superior to dictatorship, and that in the ensuing struggle, the West would win and the rest would lose.

Foreign media damned Reagan as a warmonger for beefing up the U.S. defense budget, reassuring America’s allies and going after terrorists with military force.

The column continues onto a second page with Hanson’s analysis of Obama. The pattern is well established. Liberal, i.e., democrat administrations, weaken the nation, creates choas within our military with massive cuts and misappropriation of funds, thus allowing our enemies to become emboldened. The problems resist until a conservative administration is elected to fix the problems the liberals have created.

The column ends with this final statement:

The Obama foreign policy cannot continue much longer without provoking even more chaos or a large war. Yet correcting it will be nearly as dangerous.

Jumping off the global tiger is dangerous, but climbing back on will seem riskier.

Now you know why I said this section could rightfully be titled, “Cycles.”

***

Here is an item where the ACLU and Missouri conservatives agree. The use of ‘StingRay’ technology should be banned within the state. The St Louis Post Dispatch published this editorial on Wednesday.

Editorial: Secret use of StingRay technology could backfire on St. Louis police

May 27, 2015 4:07 pm  • 

http://bloximages.newyork1.vip.townnews.com/stltoday.com/content/tncms/assets/v3/editorial/e/1e/e1e8581f-afef-5885-bf81-13720cd549d9/55319997d8573.image.png?resize=620%2C368

Last summer, as the American Civil Liberties Union was standing side-by-side with Missouri Republicans supporting the passage of a constitutional amendment that sought to protect “electronic communication and data” from unreasonable search and seizure, the St. Louis Metropolitan Police Department was sitting on a secret.

In cooperation with the FBI, the St. Louis police had been using a cellphone tracking device known generically by the brand name of one such device: StingRay. The high-tech gadgets allow police to mimic a cell tower. They screen and track nearby digital data, determining the specific location in a building, for instance, of the cell phone they are tracking.

Last month, as first reported by the Post-Dispatch’s Robert Patrick, prosecutors dropped more than a dozen charges against three defendants in a case where the technology was employed. Defense attorneys believe the charges were dropped because police don’t want to reveal details about their new high-tech toy.

But in Missouri, there may be a bigger problem. It has to do with that constitutional amendment that the strange bedfellows of the ACLU and Missouri Republicans were promoting.

A plain reading of the language of Amendment 9, passed by 75 percent of the voters who turned out on Aug. 5, suggests that it is now unconstitutional in Missouri to use a StingRay device — at least without a warrant that offers significantly more detail about the data being sought.

The column continues at the website. As the editorial admits, the Post-Dispatch opposed the passage of Amendment 9 last year. They are reconsidering that opposition now that it appears the St Louis Police Department is actually using StingRay technology in defiance to Federal, and now, Missouri law.

Take that!

Well…it’s a start. What am I talking about? A US Appeals Court is limited the Patriot Act. Specifically, limiting the NSA authority to collect telephone data without a warrant. No more mass collection.

Top federal court rules against NSA’s phone records program

By Julian Hattem05/07/15 09:25 AM EDT

A federal court has decided that the National Security Agency’s (NSA) bulk, warrantless collection of millions of Americans’ phone records is illegal.

The sweeping decision from the Second Circuit Court of Appeals on Thursday represents a major court victory for opponents of the NSA, and comes just as Congress begins a fight over whether to renew the underlying law used to justify the program.  

That program “exceeds the scope of what Congress has authorized,” Judge Gerard Lynch wrote on behalf of the three-judge panel.

The law “cannot be interpreted in a way that defies any meaningful limit,” he added.

The key section of the Patriot Act that ‘allows’ the government to collection information has been interpreted too broadly according to the bill’s author, Rep, Jim Sensenbrenner (R-Wis.). It is §215 that is flawed and the section that the 2nd Appellate Court is limiting.

But, the win in court may be moot. Despite efforts by the White House, the NSA and statists in Congress, §215 is due to expire within a month.

***

Chris Cuomo, son of the late New York Governor Mario Cuomo, displayed his stupidity on Twitter. His liberal buddies piled on. Not to defend him, but to ridicule him. It couldn’t happen to a better, ‘stuck on stupid’ liberal.

CNN’s Chris Cuomo gets Twitter-spanked after boneheaded First Amendment gaffe

His claim that the “fighting words” exception applies to hate speech made for “fighting words” on Twitter

It is increasingly difficult for those who identify on the left and right to find anything they agree upon, but this morning CNN anchor and law school graduate Chris Cuomo provided those across the political spectrum with some common ground.

Cuomo was hosting a Twitter conversation about the constitutionality of hate speech and wrote:

First Amendment experts, self-styled and actual and of all political stripes, jumped in to inform him of his wrongness:

Such a painfully dumb tweet! @ChrisCuomo: can you point to where this free speech “exception” is in US Constitution? https://twitter.com/ChrisCuomo/status/595934009764487168 

Ass. You are a disgrace to Fordham Law School, which only admitted you because of your famous father. https://twitter.com/ChrisCuomo/status/595934009764487168 

it doesn’t. hate speech is excluded from protection. dont just say you love the constitution…read it https://twitter.com/TweetBrettMac/status/595931074477305856 

@ChrisCuomo hey, long time listener first time caller, looking for this in this constitution you speak of. Got a link?

it doesn’t. hate speech is excluded from protection. dont just say you love the constitution…read it https://twitter.com/TweetBrettMac/status/595931074477305856 

@ChrisCuomo I did read the First Amendment, and still can’t find the “hate speech” exception to free speech. Can you point it out for us?

Morning Twitter Update, 5.6.15: Chris Cuomo is getting the fighting words doctrine and First Amendment hilariously wrong.

Chris Cuomo phonically learned the dit-dit of law but has no basic understanding of law and rights. That’s why all the dumb.

Cuomo replied:

@ChrisCuomo I did read the First Amendment, and still can’t find the “hate speech” exception to free speech. Can you point it out for us?

@EdMorrissey I will keep saying one word: chaplinsky

That word, “chaplinsky,” refers to Chaplinsky v. New Hampshire, in which the Supreme Court decided that some speech — like “fighting words,” or other statements that incite violence — aren’t protected by the First Amendment. Unfortunately for Cuomo:

FYI, the case @ChrisCuomo keeps citing (a) has been subsequently so gutted it’s basically a dead letter & (b) IS NOT ABOUT HATE SPEECH.

And you will still be entirely wrong. ReTweet: @ChrisCuomo @EdMorrissey I will keep saying one word: chaplinsky

@EdMorrissey So, basically, @ChrisCuomo‘s expert fact-based legal opinion is a single word chanted repeatedly like a talisman against evil?

I love how Cuomo screams READ THE CONSTITUTION then cites case law (incorrectly).

Also, of course, @ChrisCuomo completely overlooks the face-to-face requirement as he alleges that fighting words doctrine somehow applies.

As a followup to Cuomo’s use of, “Chaplinski,” it has largely been reversed. You can follow the link above to see how limited it was. The limitation with ‘Chaplinski’ is that it requires a face-to-face confrontation. None of those requirements are met contrary to Cuomo’s assertions.
Not even über-liberal Salon can stomach Cuomo’s idiotcy.

Rut Roh!

Obama has given his minions marching orders to give up control of the Internet. Up until this time, the global internet has been controlled by a quasi-governmental organization of the US government, ICANN. ICANN is the governing body for domain names and IP addresses. In short, what ICANN governs are the A-level domain servers around the world. Without the A-level domain servers, much of the internet would not work—you could not enter: http://crucis-court.com and find my server…nor could you find google.com, microsoft.com, yahoo.com, foxnews.com, nor any website by name.

Consider what could—would happen if Vladimir Putin was in control of those domain servers…or Iran, the PRC (China), or any of the other dictatorship around the world? Would you have heard about the events in the Ukraine or the Crimea? No, the freedom of the internet would be gone. That is what Obama has planned for us.

Obama is giving up US control of the internet and giving it to…who knows? Rest assured, however, if it goes to…say the UN, you want to bet they’d immediately put barriers to that internet freedom? Block those sites, like mine, who are critical of the establishment of any given country?

You bet they would. Perhaps, that is why Obama is giving up US control of the internet. His dictator buds could block my website, or FOX News, or the AFP‘s website, the NRA’s site if asked. Think on that. Internet censorship in the hands of the UN.

Defining Success for the ICANN Transition

By Monday, March 24, 2014 at 8:15 AM

Last week, the Administration announced its plan to devolve governance of the Internet’s naming function (which goes by the acronym IANA) to a non-profit organization, the Internet Corporation for Assigned Names and Numbers (or ICANN).  If implemented, the Administration’s plan will remove the last vestiges of direct American legal control over the Internet.  This is, as I have said, a pretty big deal.

Given the magnitude of the proposed change, the Administration needs to proceed with some caution, and with a willingness to pull the plug if the transition looks to go awry.  How, then, to define “awry?”

In announcing the proposed transition, the Department of Commerce insisted that it would only cede control if ICANN could demonstrate the ability to maintain the network, consistent with five principles:  They insisted that ICANN would have to “support and enhance the mult-istakeholder model”; “maintain the security, stability, and resiliency of the Internet DNS”; “meet the needs and expectation of the global customers and partners of the IANA services”; and “maintain the openness of the Internet.” The NTIA also clarified that it would “not accept a proposal that replaces the NTIA role with a government-led or an inter-governmental organization solution.”

But those principles, while salutary in nature, are (save for the last one) more in the nature of aspirations than concrete requirements.  It is useful, I think, to ask the question with greater specificity and granularity – what affirmative commitments should the US government require from ICANN before finalizing its transition of control of the IANA function?

To answer that question, we must first consider what our concerns with the transition might be.  It is useful to lump those concerns into three distinct buckets:

  • Competence – Can ICANN do the job?
  • Candor – Is ICANN sufficiently transparent and accountable?
  • Control – Do the mechanisms ICANN puts in place support its independence from authoritarian control?

If we contextualize our concerns along those lines, then we can begin to think of some of the commitments that out to be required of ICANN.

Now we come to the critical part of that plan—placing controls on the UN. Does anyone really think that massively corrupt organization won’t put their graft-sticky fingers in this? When there is money to be stolen, the UN is first in line. You can bet that any agreements with the UN and the US will be tossed out the window the first time there is an opportunity for a power-grab by the UN.

First, the multi-stakeholder model developed by ICANN for management of the IANA function should (as the Administration notes) prohibit any governmental, inter-governmental or U.N. control.  Indeed, sovereign or quasi-sovereign multilateral organizations should have only an advisory role in any process.  Instead, the multi-stakeholder control system should reflect the interests of those who develop and use the network – a representative sampling of large, medium, and small businesses and industry groups should either manage the IANA or have authority to veto ICANN decisions that threaten the openeess or viability of the Internet.   There will be difficulties (and politics, with a  small “p”) in defining the composition of the new institution, but at a minimum it needs to be a) broadly representative; and b) peopled only by those with a demonstrable and verifiable commitment to a free and open network.

Second, ICANN will need to be fully accountable for its actions and its operations.  It will need to accept the establishment of an independent auditing body comprised of government, business, and NGO representatives to monitor its finances and activities.  The authority to manage the IANA function brings with it significant financial benefits.  We should not allow ICANN to, in effect, develop a taxation authority over network expansion without, at the same time, demanding a public accounting of how the money received is spent.  ICANN should, likewise, be required to implement an Inspector General-equivalent function with authority to discipline its own officers and employees – for there is no other institution to which that authority could be given and the lack of an internal checking mechanism would be problematic.

Third, before the root zone management function is transitioned to ICANN (or to a subcontractor employed by ICANN) it will need to demonstrate to our satisfaction its technical capability to manage the root zone.  This will mean a highly technical examination of ICANN’s capabilities, including, for example, the process controls it requires before implementing any root zone change, and the security and redundancy of its root zone facilities.

Finally, we need to think of a mechanism for locking in any mandatory requirements.  After all, they would be useless if six months after committing to them ICANN were free to disregard the obligations it had undertaken.  Since the most obvious means of enforcing such commitments (through a contractual obligation to the US government) is, per force, no longer on the table, other, more creative binding mechanisms need to be developed.

That’s easier said than done.   Indeed it may not be possible at all – and that thought is, itself concerning.  For, as I’ve noted, though the US influence over the network has not been wholly benign, I am convinced it has been a net positive.  In the absence of that influence, we will have to trust that the governance architecture we develop to constrain ICANN is effective.  And that’s a bit of a risky bet.

About the only creative thought I have right now is the implementation of dual-key authority to modify the IANA function – in other words, split the IANA function off completely from ICANN into a separate organization and require both ICANN and the new-IANA organization to concur in any significant policy modifications.  Or leave the IANA function with ICANN but create a second IANA-oversight body that must concur in any changes (sort of like a House of Lords).  That sounds cumbersome and perhaps even unwise, but it’s the best idea I have right now.

And we do need a good idea.  Put simply, not only is this transition a “big deal” but it is also a vitally important one.  It may, indeed, prove to be one of the most consequential decisions this Administration has made.  It would be terribly tragic if the decision went wrong – if the openness of the Internet were to suffer or if control of the network function were to devolve to irresponsible (or, worse, venal) hands.  Caution is required.  More importantly, the Administration needs to clearly articulate its objectives and set a “red line” standard that ICANN must meet before the transition occurs.

***

Can you, or anyone, give up their Constitutional rights? There are a number of governmental agencies, from the NSA, the FBI, the CIA, down to your local Police and Sheriff’s departments, that assume you can.

What about other entities? Can a corporation force you to give up your rights, either voluntarily or not? There is some case law here that says, no, corporations can’t (see the cases of exercising 2nd Amendment rights by keeping a weapon in you car when parked in your employer’s parking lot.)

What about a smartphone app? Think it can’t be done? Want to bet your Constitutional rights on that answer?

I thought not.

Smartphone Apps: Are They Constitutional?

By Michael Bargo Jr., March 25, 2014

When Edward Snowden revealed to the world that the NSA, an agency of the U.S. government, was using its technology to retrieve and store information from cell phone calls and e-mails, it immediately provoked concerns that the Fourth Amendment was being violated.  The Fourth Amendment clearly states that information can be obtained from individuals only when the government has a very clear legal reason to do so, and law enforcement authorities can seize this information only when authorized by a warrant.

The recent explosion of applications for smartphones, or apps, suggests a new and perhaps far more serious challenge to the protections guaranteed all citizens by the Constitution.

Nowhere in the U.S. Constitution does it state that an individual has the authority to  give up, sell, trade, or negotiate away the protections granted to him by the Bill of Rights.  In other words, the protections provided to an individual by the Constitution exist at all times and can no more be forfeited than they can be violated by the NSA.

This new concern is provoked by smartphone apps.  The question the Supreme Court must eventually decide is whether or not an individual American can, by accepting to download a free app, give away his right to privacy, his copyright rights to text and photos, and his right to be protected from unlawful search and seizure.

If these rights can be given away in exchange for free apps, then a new and more dangerous principle may be introduced into the framework of constitutional rights.  The important question is whether the Constitution allows Americans to give away their constitutional rights.  Are these app agreements legal?

Right now, many apps contain computer code that allow the app developer to use the cell phone’s camera or microphone at any time, and record cell phone conversations at any time.  Listening to a cell phone conversation in the past would require that the police take evidence to a court and ask a judge to sign a warrant allowing a police wiretap.  Yet today, many apps effectively usurp the privacy of downloaders at the push of a phone button.

Recently John McAfee introduced an app that analyzes the code of apps and detects software that can, for example, turn on the smartphone’s camera or microphone.  It then alerts the user to the fact that the code written into the app allows this sort of Fourth Amendment intrusion.

Those who produce the Apps would argue that they gave users proper notice that  downloading the app and pressing the “accept” button would be giving away these rights.

But if allowed, this practice opens the door to other horrendous possibilities.  If someone can give away his right to privacy, or the copyright protection to the photos he takes with his smartphone camera, then other rights can be given away.  The implications of this are dangerous for the future of the U.S.  For example, a state may then say that if someone applies for a driver’s license, he must first agree to allow his car to be searched by a police officer at any time, and that all occupants may be detained for three days for drug and alcohol testing.  Or by a driver’s license could require that the licensee give away his right to vote for any political party other than the one in power at the time the requirement is made.  Then someone may give away his right to vote in national elections in return for money.

Right now these rights can be taken away by the state only after a long and arduous legal process.  A convicted felon, for example, will lose his right to vote.

Up to now, a person could give away copyright rights to a photograph, for example, only by physically signing a photo release.  Or he could sign away the copyright protections for a piece of music to a record company.  But apps today could sneak in language that states that any music transmitted by a smartphone becomes the property of the person who developed the app.  This was all made possible because written signatures were replaced by the e-signature, and now only a click of the “accept” button is required.

Just because those who wrote the U.S. Constitution could not foresee the power of smartphones does not mean the rights guaranteed to all persons by the Constitution can be forfeited.  Constitutional rights are permanent and enduring, and they cannot be negotiated away from the individual under any but judicial circumstances.  If rights become commodities, they can be traded away or sold.  Then they can be seized by a future totalitarian political regime in Washington.

The NSA seizes personal information electronically through cell phone and e-mail channels of communication.  App developers are now having persons agree to give up their cell phone and email information.  Additionally, this surveillance may be turned on and off by the app developer or anyone to whom that developer assigns the agreement rights.  So on the whole, it seems that the app developers’ abuse of the Fourth Amendment protections are far more broad, enduring, and egregious.

So when a person downloads an App, and in exchange agrees to barter away his privacy rights to the app developer, both the downloader and the developer are acting unconstitutionally.  For once the App developer has the right to turn on the phone’s camera and microphone without notice, there is no longer any expectation of privacy for anyone within range of these devices’ ability to capture sound and imagery.  This includes those in the room who did not download the App but may have their privacy compromised.  This may provoke future litigation: in Illinois, it is a felony to eavesdrop on a conversation.  If an app developer turns on the microphone in a user’s phone, others in the room can sue for eavesdropping.

Nowhere in the Bill of Rights does the Constitution say that a person has the right to give up his rights.  The only language of the Constitution that refers to the possession of rights is in the Declaration of Independence – “endowed by their Creator with unalienable Rights” – and the amendments that state “shall not be infringed.”  Congress should be presented with these issues so that a constitutionally enforceable national policy may be enacted.

Scandal du Jour

More corruption have been unearthed in Washington, DC—again in the State Department. It seems their DSS, the Diplomatic Security Service, which is the department’s security service has been hiring prostitutes while on duty, engaged in “sexual assaults” on foreign nationals, and falsifying reports, among other things.

After the revelation of NSA snooping last week, it seems that every day there is another discovery of corruption and/or violations of law or the Constitution. It really makes you wonder what is coming next. All of this is a prime example of Congress enacting laws they do not understand, have zero concept of ‘unintended consequences’, or in the case of many democrats, simply don’t care it the law enhances their chances for re-election. There are a number of ‘Pubs defending the NSA as well.

It all makes one ask, “What resource do we have when the Constitution is ignored and no longer protects us?” Not many. Public opinion is about it…and the ballot box. The dems (and some ‘Pubs) are working hard to remove that second option, (Motor-Voter, continuing large-scale vote fraud, the Gang of Eights Immigration bill, etc.) Julian Assange claims the “rule of law” is collapsing in the US. He may be correct.

The PTBs (Powers That Be) claim the NSA leaker is a Chinese agent because he fled to Hong Kong. He may well be. That does not, however, invalidate his claims—in fact, once exposed, the NSA/CIA have tacitly admitted PRISM exists and has existed for years. The program’s supporters claim information skimmed by PRISM, prevented a terrorist subway attack in 2009.

Really? Perhaps. But how many individuals’ privacy was violated in the process? We don’t know—and that is the crux of the matter. How much do we not know. Supposedly, Congress was informed. So we were told. Then is was discovered that only a few congressmen in some oversight committees were told—and not everyone in those committees, only a select few.

It makes you wonder why some were told and why were others not informed? Hmmm? Obama claims all of Congress was briefed. Members of Congress, including some democrats, refute that claim.

It is interesting that Obama is even losing the rank ‘n file dem congressmen on this scandal.