Quantcast
Channel: OMNI's War and Warming Anthologies
Viewing all articles
Browse latest Browse all 902

BILL OF RIGHTS DAY NEWSLETTER #6, DECEMBER 15, 2014

$
0
0
OMNI
BILL OF RIGHTS DAY DECEMBER 15, 2014 NEWSLETTER #6
Compiled by Dick Bennett for a Culture of Peace and Justice.
  (#1 Dec. 15, 2008; #2 Dec. 15, 2009; #3 Dec. 15, 2011; #4 Dec. 15, 2012; #5 Dec. 15, 2013)  

What’s at stake:  Democracy’s electoral integrity is threatened by the Supreme Court’s Citizen United and plutocracy, and the Fourth Amendment and privacy by the bipartisan NSA in a national security state.  

OMNI NATIONAL/INTERNATIONAL DAYS PROJECT

Blog:   War Department/Peace Department
http://jamesrichardbennett.blogspot.com/ 
Newsletters:
http://www.omnicenter.org/newsletter-archive/
Index:
http://www.omnicenter.org/omni-newsletter-general-index/ 
See:  Constitution Day Newsletters, Human Rights Day December 10 Newsletters, and newsletters on Civil Liberties, Detainees, FBI, Homeland Security, National Security State, NSA, Security, Surveillance, Torture, War on Terror, and others.

Contents of 3-5 at end

Contents Newsletter #6 Bill of Rights Day December 15, 2014
Bill of Rights DAY 2014
ACLU Recent Supreme Court Cases
ACLU State Affiliates Celebrate Bill of Rights
Center for Constitutional Rights CCR
Peter Van Buren, Shredding the Fourth Amendment: NSA, Bush, Obama,
     Snowden
Thomas Frank, Rev. of Zephyr Teachout’s Corruption in America: Integrity of
     Elections vs. Freedom of Expression for Corporations and Wealthy Individuals
FDR’s “Economic Bill of Rights”
First Retail Workers’ Bill of Rights


BILL OF RIGHTS DAY DEC. 15, 2014
constitutioncenter.org › ... › Civic Holidays
National Constitution Center
December 15, 2014 ... The Bill of Rights is the foundation of American liberty. ... Join the National Constitution Center on Bill of Rights Day for the museum's first  ...
encyclopedia2.thefreedictionary.com/Bill+of+Rights+Day
The first 10 amendments to the U.S. Constitution of 1787—referred to collectively as the Bill of Rights—were ratified on December 15, 1791 ( see Citizenship ...
jpfo.org › smith
November 5, 2014 at 4:00:00 PM PST ..... Those amendments are commonly called theBill of Rights. .... Widespread Bill of Rights Day festivities will fun -- and a whole new way of kicking off the holiday season -- but they will also chill the  ...
www.presidency.ucsb.edu/ws/?pid...
University of California, Santa Barbara
Now, Therefore, I, Franklin D. Roosevelt, President of the United States of America, do hereby designate December 15, 1941, as Bill of Rights Day. And I call ...
en.wikipedia.org/wiki/United_States_Bill_of_Rights
Wikipedia
The first ten Amendments are collectively known as the Bill of Rights ...... In 1941, President Franklin D. Roosevelt declared December 15 to be Bill of Rights Day, commemorating the 150th anniversary of the ... Retrieved March 6, 2014.
In the news:
Live Video: The Bill of Rights Day Book Festival .... Photos. View · Remembering the photographic work of Michel du Cille (1956 - 2014) ...
billofrightsinstitute.org/founding.../bill-of-rights/
Bill of Rights Institute
The first ten amendments to the Constitution make up the Bill of Rights. ... Documents of Freedom · Bill of Rights Day Resources · Free Lesson Plans · Teaching  ...
news.uscourts.gov › Third Branch News
(November 24, 2014). High school students sound off on Constitutional issues that matter to them in a video commemorating Bill of Rights Day, which occurs  ...


ACLU RECENT SUPREME COURT (‘SCOTUS”) CASES
BECAUSE FREEDOM CAN'T PROTECT ITSELF
KEY ISSUESACTIONSTORIESABOUT US
DONATE
ABOUT THE ACLU 2014 SUPREME COURT TERM
LEADERSHIP»
OFFICERS & BOARD OF DIRECTORS»
HISTORY»
HOW YOU CAN HELP»
CENTERS»
LEGISLATIVE UPDATE»
LOCAL AFFILIATES AND CHAPTERS»
IN THE COURTS»
Supreme Court»
PRESS ROOM»
CAMPAIGNS»
FAQS»
FINANCIAL INFORMATION AND REPORTS»
CAREERS»
CONTACT US»
BROWSE CASES

 ACLU's 100 Greatest Hits
Overview of the 2014 Supreme Court Term
Read a summary of all the Court's major civil liberties-related cases from the previous term >>

SUPREME COURT
TERMS
2013 Term»
2012 Term»
2011 Term»
2010 Term»
2009 Term»
SUPREME COURT CASES
EEOC v. Abercrombie & Fitch
RELIGIOUS FREEDOM
12/10/2014 - Whether an employer can decline to hire a job applicant based on her perceived religious needs without any consideration of possible accommodations unless the job applicant specifically raises the issue.
Young v. United Parcel Service, Inc.
REPRODUCTIVE FREEDOM, WOMENS' RIGHTS
12/3/2014 - Whether the Pregnancy Discrimination Act prohibits an employer from denying a light-duty accommodation to pregnant workers that is available to other employees.
Williams-Yulee v. The Florida Bar
FREE SPEECH
11/24/2014 - Whether a candidate for judicial office can be disciplined for sending out a mass mailing soliciting small donations and support.
Elonis v. United States
FREE SPEECH
8/22/2014 - Whether the government is required to prove that someone prosecuted for making threatening statements intended his words to be taken as a threat.
Jesinoski v. Countrywide Home Loans, Inc.
DEFENDING TARGETS OF DISCRIMINATION, RACIAL JUSTICE
7/28/2014 - Whether the Truth in Lending Act entitles homeowners to rescind their mortgage commitment by notifying the lender in writing within the period specified by the statute, or whether the homeowner must file a lawsuit to make the rescission effective.
Heien v. North Carolina
CRIMINAL JUSTICE
6/17/2014 - Whether a traffic stop based on a police officer’s mistaken understanding of the traffic laws violates the Fourth Amendment.
Holt v. Hobbs
RELIGIOUS FREEDOM
5/30/2014 - Whether Arkansas prison officials violated a federal law designed to protect the religious rights of prisoners when they denied petitioner an exemption to grow a one-half inch beard in compliance with his religious beliefs.
SIGN UP
Get breaking news on issues you care about
  
FOLLOW US
FACEBOOK
TWITTER
BLOG of RIGHTS
EMAIL
NEWSFEED
Support the ACLU today & your gift will be matched.
DONATE NOW

FIND YOUR
LOCAL ACLU AFFILIATE
Find your local ACLU affiliate

Defending Targets of Discrimination»
Keep America Safe and Free»
Protecting Civil Liberties In The Digital Age»
Organization News and Highlights»
Spy Files»
Real ID»
More campaigns»
More
LEGISLATIVE

SCORECARD
SUPREME COURT

LEARNMORE
NEVER MISS AN ACTION THAT'S IMPORTANT TO YOU.
Sign up for the ACLU Action newsletter.

E-mail address
HELP GUARANTEE FREEDOM FOR ALL.
Chip in to help protect all of our rights and liberties.

DONATE NOW»
CAPITAL PUNISHMENT
Clemency»
Effective Counsel»
Execution Methods»
Innocence and the Death Penalty»
Junk Science and Capital Punishment»
Mental Illness and the Death Penalty»
Race and the Death Penalty»
CRIMINAL LAW REFORM
Drug Sentencing and Penalties»
Drug Testing»
Health-Based Solutions»
Marijuana Law Reform»
Police Practices»
Race and Criminal Justice»
Search and Seizure»
Juvenile Justice»
DISABILITY RIGHTS
Criminal Justice»
Education»
Integration and Autonomy»
FREE SPEECH
Campaign Finance Reform»
Censorship»
Flag Desecration»
Internet Censorship»
Right to Protest»
Student Speech»
HIV / AIDS
Criminal Justice and HIV»
HIV/AIDS Discrimination»
Prevention and Education»
Testing and Privacy»
HUMAN RIGHTS
Children's Rights»
Death Penalty»
Immigrants' Rights»
National Security»
Racial Justice»
Women's Rights»
IMMIGRANTS' RIGHTS
State Anti-Immigrant Laws»
Local Anti-Immigrant Laws»
Immigration Detention»
Immigration Enforcement»
LGBT RIGHTS
LGBT Basic Rights and Liberties»
LGBT Parenting»
LGBT Relationships»
LGBT Youth & Schools»
Discrimination Against Transgender People»
NATIONAL SECURITY
Detention»
Discrimination»
Dissent»
Ideological Exclusion»
Secrecy»
Spy Files»
Surveillance & Privacy»
Targeted Killings»
Torture»
PRISONERS' RIGHTS
Immigration Detention»
Medical Care in Prison»
Mental Health Care in Prison»
Prison Conditions»
Private Prisons»
Restriction of Prisoners' Rights»
Women in Prison»
Solitary Confinement»
RACIAL JUSTICE
Affirmative Action»
American Indian Rights»
Criminal Justice»
Debtors' Prisons»
Economic Justice»
Education»
Racial Profiling»
RELIGION & BELIEF
Free Exercise of Religion»
Government-Funded Religion»
Religion and Schools»
The Public Square»
REPRODUCTIVE FREEDOM
Abortion»
Birth Control»
Pregnancy»
Religion and Reproductive Rights»
Sex Education»
TECHNOLOGY AND LIBERTY
Biological Technologies»
Consumer Privacy»
Internet Free Speech»
Internet Privacy»
Medical Privacy»
Students»
Workplace Privacy»
VOTING RIGHTS
Voter Suppression»
Promoting Access»
Voting Rights Act»
Redistricting»
WOMEN'S RIGHTS
Criminal Justice»
Education»
Employment»
Human Rights»
Violence Against Women»
SITE MAP: Key Issues Features Action Center Blog Press Room Local Affiliate Finder About the ACLU Legislative In the Courts Our History Video Podcasts Photos All Multimedia E-mail Sign-up Donate»


ACLU DEFENDS CIVIL LIBERTIES 2014, Google Search, Dec. 14, 2014
Adwww.aclu.org/2014Match‎
Support American Civil Liberties. Your gift will be matched.
Top of Form
Bottom of Form
https://www.aclu.org/.../2014-supreme-co...
American Civil Liberties Union
Read a summary of all the Court's major civil liberties-related cases from the ... 12/10/2014 - Whether an employer can decline to hire a job applicant based on ...
https://www.aclu.org/courts
American Civil Liberties Union
The American Civil Liberties Union and the Community Legal Aid Society today filed ... ACLU Challenges Delaware's Segregated Charter Schools». 12/3/2014.
https://www.aclu.org/
American Civil Liberties Union
12/11/2014 – This summer, Tennessee thumbed its nose at doctors, nearly every national medical association, addiction experts, and women's right activists ...
https://www.aclu.org/.../week-civil-liberti...
American Civil Liberties Union
Mar 14, 2014 - What NSA whistleblower joined the ACLU at South by Southwest for his first live conversation with an audience? On March 25, the Supreme ...
https://www.aclu.org/human-rights
American Civil Liberties Union
In September 2014, the ACLU submitted a report to the Council, highlighting ... Statement of American Civil Liberties Union, Submitted to the 57th Session of the ...
https://www.aclu.org/.../week-civil-liberti...
American Civil Liberties Union
Mar 21, 2014 - The American Civil Liberties Union filed a federal lawsuit this week on behalf of Midori Fujii and 12 other individuals affected by Indian's ban on ...
https://www.aclu.org/racial.../education
American Civil Liberties Union
The American Civil Liberties Union's education work centers on a disturbing trend called the ... Segregation 2.0: America's School-to-Prison Pipeline (2014)
https://www.aclu.org/.../week-civil-liberti...
American Civil Liberties Union
Feb 21, 2014 - How many Japanese Americans were relocated to American concentration camps seventy one years ago? A transparency report released by ..


ACLU CELEBRATES BILL OF RIGHTS WITH DINNERS 2014, Google Search, Dec. 14, 2014
aclu-nca.org/category/catalog/events/2014-bill-of-rights-awards-dinner
Help Preserve Freedom by Supporting the Annual Bill of Rights Awards Dinner as: Legacy Supporter ($25,000) – 2 tables of 10 in premium location; Prominent ...
https://www.aclu.org/.../2014-aclutn-bill-r...
American Civil Liberties Union
Tickets to the American Civil Liberties Union of Tennessee 2014 Bill of RightsCelebration are no longer available online. To purchase tickets, please contact us ...
https://www.aclusocal.org/.../2014-bill-righ...
ACLU of Southern California
American Civil Liberties Union of Southern California .... Join us for the 2014 ACLUOF SOUTHERN CALIFORNIA BILL OF RIGHTS DINNER as we honor:.

[The List of state affiliate dinners goes on and on……  -Dick
Adwww.aclu.org/2014Match‎
Your gift will be matched.ACLU Bill Of Rights‎
Adwww.wow.com/ACLU+Bill+Of+Rights
Search for ACLU Bill Of Rights Browse Results Instantly!
Searches related to ACLU AND BILL OF RIGHTS 2014



CENTER FOR CONSTITUTIONAL RIGHTS
VIDEO: Your fight for social justice
Vincent Warren,   Dec. 1, 2014   CCR development@ccrjustice.org via uark.edu 

https://mail.google.com/mail/u/0/images/cleardot.gif
https://mail.google.com/mail/u/0/images/cleardot.gif
to James
https://mail.google.com/mail/u/0/images/cleardot.gif


Dear Dick,

Donate now and your gift will count twice as much! 

The Center for Constitutional Rights has an exciting matching gift opportunity thanks to The Atlantic Philanthropies. Donate today and your gift will be matched dollar for dollar.

Want to know where your support will go? Check out this short video:
https://ci5.googleusercontent.com/proxy/xRAcCkCBVvJNxIzKxt6nNWSf7r3OwiaIt2PKkePr6txb_EKHVbc39yGvo0haWfdi36ZKY-NhitsMn_bafQ_T4UEw_BoIVG7A=s0-d-e1-ft#http://org.salsalabs.com/o/383/images/CCRVideo.jpg

CCR’s strategic approach combines innovative litigation with media advocacy, public education, and movement support. And it includes YOU—your support, your activism, and your vision of a better world.

DOUBLE your impact in the struggle for justice. Be part of our match campaign, and make an even greater difference in 2015.

Thank you for standing with CCR in the fight for justice.
With deep gratitude,
Vincent Warren
Executive Director

P.S. Invite your family and friends to join the match campaign by sharing our video!
https://ci5.googleusercontent.com/proxy/OfYoHhhQayMpnWzCGcBGaOrKY9s7fKfFcH19ZptIxkXEmRrEHw_llxQWhMlfhv1qFVyXLjPTuZKF6J4UsoW-BV3lgcbsvyDHyNfx_pBvEIutw32Z_G6msGr9OXuDZA=s0-d-e1-ft#https://org.salsalabs.com/o/383/images/ccr-newsletter-divider-600x31.png


https://ci4.googleusercontent.com/proxy/zWDNuhJJDGByg3x_K49L3Km1qCm7ky_LYsZ1XZafvHuvYFUEM0a0saWpv_wWaFWnFKV_VCZoSEsbMGd5r10_Q-gkhv9X8XNB_1XEJEUgSg=s0-d-e1-ft#https://org.salsalabs.com/o/383/images/donate-2xmatch.png https://ci5.googleusercontent.com/proxy/mjYgaborGdZbbfNRK9TrKS5I_Y6DEe6rORw4VTYMavuroTRtKAX_1Mic0UdkB2MO7MUvZPJdzMYygATAOlMWCG3ZAqKVvmY0gGzzGXiuHYoztkhOqrT4bpSxh17k=s0-d-e1-ft#https://org.salsalabs.com/o/383/images/charity-navigator-3-star-h62.jpg


About Us
The Center for Constitutional Rights is dedicated to advancing and protecting the rights guaranteed by the United States Constitution and the Universal Declaration of Human Rights. Read More


BILL OF RIGHTS, FOURTH AMENDMENT, BUSH, OBAMA, NSA, SNOWDEN
Published on Thursday, June 26, 2014 by Tomdispatch, Common Dreams June 28, 2014
Shredding the Fourth Amendment in Post-Constitutional America:  Four ways It no longer applies  by Peter Van Buren
Posted on June 27, 2014 by Yves Smith
Yves here. Van Buren continues his examination of what he calls the “post-Constitutional era”. This post focuses on the loss of privacy, a presumption enshrined in the Fourth Amendment. Van Buren describes how Fourth Amendment rights have been eviscerated in the post 9/11 era, such as by permitting the surveillance state to pour through millions of records using subpoenas rather than search warrants.
By Peter Van Buren, who blew the whistle on State Department waste and mismanagement during Iraq Reconstruction in his first book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People. He writes about current events at his blog, We Meant Well. Van Buren’s new book, Ghosts of Tom Joad: A Story of the #99Percentis available now. Cross posted fromTomDispatch
Here’s a bit of history from another America: the Bill of Rights was designed to protect the people from their government. If the First Amendment’s right to speak out publicly was the people’s wall of security, then the Fourth Amendment’s right to privacy was its buttress. It was once thought that the government should neither be able to stop citizens from speaking nor peer into their lives. Think of that as the essence of the Constitutional era that ended when those towers came down on September 11, 2001. Consider how privacy worked before 9/11 and how it works now in Post-Constitutional America.
The Fourth Amendment
A response to British King George’s excessive invasions of privacy in colonial America, the Fourth Amendment pulls no punches: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
In Post-Constitutional America, the government might as well have taken scissors to the original copy of the Constitution stored in the National Archives, then crumpled up the Fourth Amendment and tossed it in the garbage can. The NSA revelations of Edward Snowden are, in that sense, not just a shock to the conscience but to the Fourth Amendment itself: our government spies on us. All of us. Without suspicion. Without warrants. Without probable cause. Without restraint. This would qualify as “unreasonable” in our old constitutional world, but no more.
Here, then, are four ways that, in the name of American “security” and according to our government, the Fourth Amendment no longer really applies to our lives.
The Constitutional Borderline
Begin at America’s borders. Most people believe they are “in” the United States as soon as they step off an international flight and are thus fully covered by the Bill of Rights. The truth has, in the twenty-first century, become infinitely more complicated as long-standing practices are manipulated to serve the expanding desires of the national security state. The mining of words and concepts for new, darker meanings is a hallmark of how things work in Post-Constitutional America.
Over the years, recognizing that certain situations could render Fourth Amendment requirements impractical or against the public interest, the Supreme Court crafted various exceptions to them. One was the “border search.” The idea was that the United States should be able to protect itself by stopping and examining people entering the country. As a result, routine border searches without warrants are constitutionally “reasonable” simply by virtue of where they take place. It’s a concept with a long history, enumerated by the First Congress in 1789.
Here’s the twist in the present era: the definition of “border” has been changed. Upon arriving in the United States from abroad, you are not legally present in the country until allowed to enter by Department of Homeland Security (DHS) officials. You know, the guys who look into your luggage and stamp your passport. Until that moment, you exist in a legal void where the protections of the Bill of Rights and the laws of the United States do not apply. This concept also predates Post-Constitutional America and the DHS. Remember the sorting process at Ellis Island in the late nineteenth and early twentieth centuries? No lawyers allowed there.
Those modest exceptions were all part of constitutional America. Today, once reasonable searches at the border have morphed into a vast “Constitution-free zone.” The “border” is now a strip of land circling the country and extending 100 miles inland that includes two-thirds of the U.S. population. In this vast region, Customs and Border Protection (CBP) can set up checkpoints and conduct warrantless searches. At airports, American citizens are now similarly subjected to search and seizure as filmmaker Laura Poitras — whose work focuses on national security issues in general and Edward Snowden in the particular — knows firsthand. Since 2006, almost every time Poitras has returned to the U.S., her plane has been met by government agents and her laptop and phone examined.
There are multiple similar high-profile cases (including those of aWikileaks researcher and a Chelsea Manning supporter), but ordinary citizens are hardly exempt. Despite standing in an American airport, a pane of glass away from loved ones, you are not in the U.S. and have no Fourth Amendment rights. How many such airport searches are conducted in the aggregate is unknown. The best information we have comes from a FOIA request by the ACLU. It revealed that, in the 18-month period beginning in October 2008, more than 6,600 people, about half of them U.S. citizens, were subjected to electronic device searches at the border.
Still, reminding us that it’s possible to have a sense of humor on the road to hell, the CBP offers this undoubtedly inadvertent pun at its website: “It is not the intent of CBP to subject travelers to unwarranted scrutiny.” (emphasis added)
Making It All Constitutional In-House
Here’s another example of how definitions have been readjusted to serve the national security state’s overriding needs: the Department of Justice (DOJ) created a Post-Constitutional interpretation of the Fourth Amendment that allows it to access millions of records of Americans using only subpoenas, not search warrants.
Some background: a warrant is court permission to search and seize something. As the Fourth Amendment makes clear, it must be specific: enter Thomas Anderson’s home and look for hacked software. Warrants can only be issued on “probable cause.” The Supreme Court definedprobable cause as requiring a high standard of proof, or to quote its words, “a fair probability that contraband or evidence of a crime will be found in a particular place.”
http://www.tomdispatch.com/images/managed/tomjoad.jpgA subpoena on the other hand is nothing more than a government order issued to a citizen or organization to do something, most typically to produce a document. Standards for issuing a subpoena are flexible, as most executive agencies can issue them on their own without interaction with a court. In such cases, there is no independent oversight.
The Department of Justice now claims that, under the Fourth Amendment, it can simply subpoena an Internet company like Facebook and demand that they look for and turn over all the records they have on our Mr. Anderson. Their explanation: the DOJ isn’t doing the searching, just demanding that another organization do it. As far as its lawyers are concerned, in such a situation, no warrant is needed. In addition, the Department of Justice believes it has the authority to subpoena multiple records, maybe even all the records Facebook has. Records on you? Some group of people including you? Everyone? We don’t know, as sources of data like Facebook and Google are prohibited from disclosingmuch about the information they hand over to the NSA or other government outfits about you.
It’s easy enough to miss the gravity of this in-house interpretation when it comes to the Fourth Amendment. If the FBI today came to your home and demanded access to your emails, it would require a warrant obtained from a court after a show of probable cause to get them. If, however, the Department of Justice can simply issue a subpoena to Google to the same end, they can potentially vacuum up every Gmail message you’ve ever sent without a warrant and it won’t constitute a “search.” The DOJ has continued this practice even though in 2010 a federal appeals courtruled that bulk warrantless access to email violates the Fourth Amendment. An FBI field manual released under the Freedom of Information Act similarly makes it clear that the Bureau’s agents don’t need warrants to access email in bulk when it’s pulled directly from Google, Yahoo, Microsoft, or other service providers.
How far can the use of a subpoena go in bypassing the Fourth Amendment? Recently, the inspector general of the Department of Veterans Affairs (VA) issued a subpoena — no court involved — demanding that the Project On Government Oversight (POGOturn overall information it has collected relating to abuses and mismanagement at VA medical facilities. POGO is a private, non-profit group, dedicated to assisting whistleblowers. The VA subpoena demands access to records sent via an encrypted website to POGO under a promise of anonymity, many from current or former VA employees.
Rather than seek to break the encryption surreptitiously and illegally to expose the whistleblowers, the government has taken a simpler, if unconstitutional route, by simply demanding the names and reports. POGO has refused to comply, setting up a legal confrontation. In the meantime, consider it just another sign of the direction the government is heading when it comes to the Fourth Amendment.
Technology and the Fourth Amendment
Some observers suggest that there is little new here. For example, the compiling of information on innocent Americans by J. Edgar Hoover’s low-tech FBI back in the 1960s has been well documented. Paper reports on activities, recordings of conversations, and photos of meetings and trysts, all secretly obtained, exposed the lives of civil rights leaderspopular musicians, and antiwar protesters. From 1956 to at least 1971, the government also wiretapped the calls and conversations of Americans under the Bureau’s counterintelligence program (COINTELPRO).
But those who look to such history of government illegality for a strange kind of nothing-new-under-the-sun reassurance have not grasped the impact of fast-developing technology. In scale, scope, and sheer efficiency, the systems now being employed inside the U.S. by the NSA and other intelligence agencies are something quite new and historically significant. Size matters.
To avoid such encroaching digitization would essentially mean withdrawing from society, not exactly an option for most Americans. More of life is now online — from banking to travel to social media. Where the NSA was once limited to traditional notions of communication — the written and spoken word — new possibilities for following you and intruding on your life in myriad ways are being created. The agency can, for instance, now collect images, photos, and video, and subject them tofacial recognition technology that can increasingly put a name to a face. Such technology, employed today at casinos as well as in the secret world of the national security state, can pick out a face in a crowd and identify it, taking into account age, changes in facial hair, new glasses, hats, and the like.
An offshoot of facial recognition is the broader category of biometrics, the use of physical and biological traits unique to a person for identification. These can be anything from ordinary fingerprinting to cutting-edge DNA records and iris scans. (Biometrics is already big business and even has its own trade association in Washington.) One of the world’s largestknown collections of biometric data is held by the Department of State. As of December 2009, its Consular Consolidated Database (CCD) contained more than 75 million photographs of Americans and foreigners and is growing at a rate of approximately 35,000 records per day. CCD also collects and stores indefinitely the fingerprints of all foreigners issued visas.
With ever more data available, the NSA and other agencies are creating ever more robust ways to store it. Such storage is cheap and bounteous, with few limits other than the availability of electricity and water to cool the electronics. Emerging tech will surely bypass many of the existing constraints to make holding more data longer even easier and cheaper. The old days of file cabinets, or later, clunky disk drives, are over in an era of mega-data storage warehouses.
The way data is aggregated is also changing fast. Where data was once kept in cabinets in separate offices, later in bureaucratically isolated, agency-by-agency digital islands, post-9/11 sharing mandates coupled with new technology have led to fusion databases. In these, information from such disparate sources as license plate readers, wiretaps, and records of library book choices can be aggregated and easily shared. Basically everything about a person, gathered worldwide by various agencies and means, can now be put into a single “file.”
Once you have the whole haystack, there’s still the problem of how to locate the needle. For this, emerging technologies grow ever more capable of analyzing Big Data. Some simple ones are even available to the public, like IBM’s Non-Obvious Relationship Awareness software (NORA). It can, for example, scan multiple databases, geolocation information, and social media friend lists and recognize relationships that may not be obvious at first glance. The software is fast and requires no human intervention. It runs 24/7/365/Forever.
Tools like NORA and its more sophisticated classified cousins are NSA’s solution to one of the last hurdles to knowing nearly everything: the need for human analysts to “connect the dots.” Skilled analysts take time to train, are prone to human error, and — given the quickly expanding supply of data — will always be in demand. Automated analysis also offers the NSA other advantages. Software doesn’t have a conscience and it can’t blow the whistle.
What does all this mean in terms of the Fourth Amendment? It’s simple: the technological and human factors that constrained the gathering and processing of data in the past are fast disappearing. Prior to these “advances,” even the most ill-intentioned government urges to intrude on and do away with the privacy of citizens were held in check by the possible. The techno-gloves are now off and the possible is increasingly whatever an official or bureaucrat wants to do. That means violations of the Fourth Amendment are held in check only by the goodwill of the government, which might have qualified as the ultimate nightmare of those who wrote the Constitution.
On this front, however, there are signs of hope that the Supreme Court may return to its check-and-balance role of the Constitutional era. One sign, directly addressing the Fourth Amendment, is this week’s unanimous decision that the police cannot search the contents of a cell phone without a warrant. (The court also recently issued a rulingdetermining that the procedures for challenging one’s inclusion on the government’s no-fly list are unconstitutional, another hopeful sign.)
Prior to the cell phone decision, law enforcement held that if someone was arrested for, say, a traffic violation, the police had the right to examine the full contents of his or her cell phone — call lists, photos, social media, contacts, whatever was on the device. Police traditionally have been able to search physical objects they find on an arrestee without a warrant on the grounds that such searches are for the protection of the officers. 
In its new decision, however, the court acknowledged that cell phones represent far more than a “physical object.” The information they hold is a portrait of someone’s life like what’s in a closet at home or on a computer sitting on your desk. Searches of those locations almost always require a warrant.
Does this matter when talking about the NSA’s technological dragnet? Maybe. While the Supreme Court’s decision applies directly to street-level law enforcement, it does suggest an evolution within the court, a recognition of the way advances in technology have changed the Fourth Amendment. A cell phone is not an object anymore; it is now recognized as a portal to other information that a person has gathered in one place for convenience with, as of this decision, a reasonable expectation of privacy.
National Security Disclosures Under HIPPA
While the NSA’s electronic basket of violations of the Fourth Amendment were, pre-Snowden, meant to take place in utter secrecy, here’s a violation that sits in broad daylight: since 2002, my doctor can disclose my medical records to the NSA without my permission or knowledge. So can yours.
Congress passed the Health Information Portability and Accountability Act (HIPPA) in 1996 “to assure that individuals’ health information is properly protected.” You likely signed a HIPPA agreement at your doctor’s office, granting access to your records. However, Congress quietly amended the HIPPA Act in 2002 to permit disclosure of those records for national security purposes. Specifically, the new version of this “privacy law”states: “We may also disclose your PHI [Personal Health Information] to authorized federal officials as necessary for national security and intelligence activities.” The text is embedded deep in your health care provider’s documentation. Look for it.
How does this work? We don’t know. Do the NSA or other agencies have ongoing access to the medical records of all Americans? Do they have to request specific ones? Do doctors have any choice in whose records to forward under what conditions? No one knows. My HMO, after much transferring of my calls, would ultimately only refer me back to the HIPPA text with a promise that they follow the law.
The Snowden revelations are often dismissed by people who wonder what they have to hide. (Who cares if the NSA sees my cute cat videos?) That’s why health-care spying stands out. How much more invasive could it be than for your government to have unfettered access to such a potentially personal and private part of your life — something, by the way, that couldn’t have less to do with American “security” or combating terrorism.
Our health-care providers, in direct confrontation with the Fourth Amendment, are now part of the metastasizing national security state. You’re right to be afraid, but for goodness sake, don’t discuss your fears with your doctor.
How the Unreasonable Becomes Reasonable
At this point, when it comes to national security matters, the Fourth Amendment has by any practical definition been done away with as a part of Post-Constitutional America. Whole books have been written just about Edward Snowden and more information about government spying regularly becomes available. We don’t lack for examples. Yet as the obviousness of what is being done becomes impossible to ignore and reassurances offered up by the president and others are shown to be lies, the government continues to spin the debate into false discussions about how to “balance” freedom versus security, to raise the specter of another 9/11 if spying is curtailed, and to fall back on that go-to “nothing to hide, nothing to fear” line.
In Post-Constitutional America, the old words that once defined our democracy are twisted in new ways, not discarded. Previously unreasonable searches become reasonable ones under new government interpretations of the Fourth Amendment. Traditional tools of law, like subpoenas and warrants, continue to exist even as they morph into monstrous new forms.
Americans are told (and often believe) that they retain rights they no longer have. Wait for the rhetoric that goes with the celebrations of our freedoms this July 4th. You won’t hear a lot about the NSA then, but you should. In pre-constitutional America the colonists knew that they were under the king’s thumb. In totalitarian states of the last century like the Soviet Union, people dealt with their lack of rights and privacy with grim humor and subtle protest. However, in America, ever exceptional, citizens passively watch their rights disappear in the service of dark ends, largely without protest and often while still celebrating a land that no longer exists.

 The signing of the U.S. Constitution in Philadelphia. (Credit: Library of Congress)Here’s a bit of history from another America: the Bill of Rights was designed to protect the people from their government. If the First Amendment’s right to speak out publicly was the people's wall of security, then the Fourth Amendment’s right to privacy was its buttress. It was once thought that the government should neither be able to stop citizens from speaking nor peer into their lives. Think of that as the essence of the Constitutional era that ended when those towers came down on September 11, 2001. Consider how privacy worked before 9/11 and how it works now in Post-Constitutional America.
The Fourth Amendment
A response to British King George’s excessive invasions of privacy in colonial America, the Fourth Amendment pulls no punches: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
In Post-Constitutional America, the government might as well have taken scissors to the original copy of the Constitution stored in the National Archives, then crumpled up the Fourth Amendment and tossed it in the garbage can. The NSA revelations of Edward Snowden are, in that sense, not just a shock to the conscience but to the Fourth Amendment itself: our government spies on us. All of us. Without suspicion. Without warrants. Without probable cause. Without restraint. This would qualify as “unreasonable” in our old constitutional world, but no more.
Here, then, are four ways that, in the name of American “security” and according to our government, the Fourth Amendment no longer really applies to our lives.
The Constitutional Borderline
Begin at America's borders. Most people believe they are “in” the United States as soon as they step off an international flight and are thus fully covered by the Bill of Rights. The truth has, in the twenty-first century, become infinitely more complicated as long-standing practices are manipulated to serve the expanding desires of the national security state. The mining of words and concepts for new, darker meanings is a hallmark of how things work in Post-Constitutional America.
Over the years, recognizing that certain situations could render Fourth Amendment requirements impractical or against the public interest, the Supreme Court crafted various exceptions to them. One was the “border search.” The idea was that the United States should be able to protect itself by stopping and examining people entering the country. As a result, routine border searches without warrants are constitutionally “reasonable” simply by virtue of where they take place. It’s a concept with a long history, enumerated by the First Congress in 1789.
Here’s the twist in the present era: the definition of “border” has been changed. Upon arriving in the United States from abroad, you are not legally present in the country until allowed to enter by Department of Homeland Security (DHS) officials. You know, the guys who look into your luggage and stamp your passport. Until that moment, you exist in a legal void where the protections of the Bill of Rights and the laws of the United States do not apply. This concept also predates Post-Constitutional America and the DHS. Remember the sorting process at Ellis Island in the late nineteenth and early twentieth centuries? No lawyers allowed there.
Those modest exceptions were all part of constitutional America. Today, once reasonable searches at the border have morphed into a vast “Constitution-free zone.” The “border” is now a strip of land circling the country and extending 100 miles inland that includes two-thirds of the U.S. population. In this vast region, Customs and Border Protection (CBP) can set up checkpoints and conduct warrantless searches. At airports, American citizens are now similarly subjected to search and seizure as filmmaker Laura Poitras -- whose work focuses on national security issues in general and Edward Snowden in the particular -- knows firsthand. Since 2006, almost every time Poitras has returned to the U.S., her plane has been met by government agents and her laptop and phone examined.
There are multiple similar high-profile cases (including those of a Wikileaks researcher and aChelsea Manning supporter), but ordinary citizens are hardly exempt. Despite standing in an American airport, a pane of glass away from loved ones, you are not in the U.S. and have no Fourth Amendment rights. How many such airport searches are conducted in the aggregate is unknown. The best information we have comes from a FOIA request by the ACLU. It revealed that, in the 18-month period beginning in October 2008, more than 6,600 people, about half of them U.S. citizens, were subjected to electronic device searches at the border.
Still, reminding us that it’s possible to have a sense of humor on the road to hell, the CBP offers this undoubtedly inadvertent pun at its website: “It is not the intent of CBP to subject travelers to unwarranted scrutiny.” (emphasis added)
Making It All Constitutional In-House
Here’s another example of how definitions have been readjusted to serve the national security state's overriding needs: the Department of Justice (DOJ) created a Post-Constitutional interpretation of the Fourth Amendment that allows it to access millions of records of Americans using only subpoenas, not search warrants.
Some background: a warrant is court permission to search and seize something. As the Fourth Amendment makes clear, it must be specific: enter Thomas Anderson's home and look for hacked software. Warrants can only be issued on “probable cause.” The Supreme Court defined probable cause as requiring a high standard of proof, or to quote its words, “a fair probability that contraband or evidence of a crime will be found in a particular place.”
A subpoena on the other hand is nothing more than a government order issued to a citizen or organization to do something, most typically to produce a document. Standards for issuing a subpoena are flexible, as most executive agencies can issue them on their own without interaction with a court. In such cases, there is no independent oversight.
The Department of Justice now claims that, under the Fourth Amendment, it can simplysubpoena an Internet company like Facebook and demand that they look for and turn over all the records they have on our Mr. Anderson. Their explanation: the DOJ isn't doing the searching, just demanding that another organization do it. As far as its lawyers are concerned, in such a situation, no warrant is needed. In addition, the Department of Justice believes it has the authority to subpoena multiple records, maybe even all the records Facebook has. Records on you? Some group of people including you? Everyone? We don't know, as sources of data like Facebook and Google are prohibited from disclosing much about the information they hand over to the NSA or other government outfits about you.
It’s easy enough to miss the gravity of this in-house interpretation when it comes to the Fourth Amendment. If the FBI today came to your home and demanded access to your emails, it would require a warrant obtained from a court after a show of probable cause to get them. If, however, the Department of Justice can simply issue a subpoena to Google to the same end, they can potentially vacuum up every Gmail message you’ve ever sent without a warrant and it won’t constitute a “search.” The DOJ has continued this practice even though in 2010 a federal appeals court ruled that bulk warrantless access to email violates the Fourth Amendment. An FBI field manual released under the Freedom of Information Act similarly makes it clear that the Bureau’s agents don’t need warrants to access email in bulk when it’s pulled directly from Google, Yahoo, Microsoft, or other service providers.
How far can the use of a subpoena go in bypassing the Fourth Amendment? Recently, the inspector general of the Department of Veterans Affairs (VA) issued a subpoena -- no court involved -- demanding that the Project On Government Oversight (POGO) turn over all information it has collected relating to abuses and mismanagement at VA medical facilities. POGO is a private, non-profit group, dedicated to assisting whistleblowers. The VA subpoena demands access to records sent via an encrypted website to POGO under a promise of anonymity, many from current or former VA employees.
Rather than seek to break the encryption surreptitiously and illegally to expose the whistleblowers, the government has taken a simpler, if unconstitutional route, by simply demanding the names and reports. POGO has refused to comply, setting up a legal confrontation. In the meantime, consider it just another sign of the direction the government is heading when it comes to the Fourth Amendment.
Technology and the Fourth Amendment
Some observers suggest that there is little new here. For example, the compiling of information on innocent Americans by J. Edgar Hoover's low-tech FBI back in the 1960s has been well documented. Paper reports on activities, recordings of conversations, and photos of meetings and trysts, all secretly obtained, exposed the lives of civil rights leaders, popular musicians, and antiwar protesters. From 1956 to at least 1971, the government also wiretapped the calls and conversations of Americans under the Bureau’s counterintelligence program (COINTELPRO).
But those who look to such history of government illegality for a strange kind of nothing-new-under-the-sun reassurance have not grasped the impact of fast-developing technology. In scale, scope, and sheer efficiency, the systems now being employed inside the U.S. by the NSA and other intelligence agencies are something quite new and historically significant. Size matters.
To avoid such encroaching digitization would essentially mean withdrawing from society, not exactly an option for most Americans. More of life is now online -- from banking to travel to social media. Where the NSA was once limited to traditional notions of communication -- the written and spoken word -- new possibilities for following you and intruding on your life in myriad ways are being created. The agency can, for instance, now collect images, photos, and video, and subject them to facial recognition technology that can increasingly put a name to a face. Such technology, employed today at casinos as well as in the secret world of the national security state, can pick out a face in a crowd and identify it, taking into account age, changes in facial hair, new glasses, hats, and the like.
An offshoot of facial recognition is the broader category of biometrics, the use of physical and biological traits unique to a person for identification. These can be anything from ordinary fingerprinting to cutting-edge DNA records and iris scans. (Biometrics is already big business and even has its own trade association in Washington.) One of the world's largest known collections of biometric data is held by the Department of State. As of December 2009, its Consular Consolidated Database (CCD) contained more than 75 million photographs of Americans and foreigners and is growing at a rate of approximately 35,000 records per day. CCD also collects and stores indefinitely the fingerprints of all foreigners issued visas.
With ever more data available, the NSA and other agencies are creating ever more robust ways to store it. Such storage is cheap and bounteous, with few limits other than the availability of electricity and water to cool the electronics. Emerging tech will surely bypass many of the existing constraints to make holding more data longer even easier and cheaper. The old days of file cabinets, or later, clunky disk drives, are over in an era of mega-data storage warehouses.
The way data is aggregated is also changing fast. Where data was once kept in cabinets in separate offices, later in bureaucratically isolated, agency-by-agency digital islands, post-9/11 sharing mandates coupled with new technology have led to fusion databases. In these, information from such disparate sources as license plate readers, wiretaps, and records oflibrary book choices can be aggregated and easily shared. Basically everything about a person, gathered worldwide by various agencies and means, can now be put into a single “file.”
Once you have the whole haystack, there’s still the problem of how to locate the needle. For this, emerging technologies grow ever more capable of analyzing Big Data. Some simple ones are even available to the public, like IBM's Non-Obvious Relationship Awareness software (NORA). It can, for example, scan multiple databases, geolocation information, and social media friend lists and recognize relationships that may not be obvious at first glance. The software is fast and requires no human intervention. It runs 24/7/365/Forever.
Tools like NORA and its more sophisticated classified cousins are NSA's solution to one of the last hurdles to knowing nearly everything: the need for human analysts to “connect the dots.” Skilled analysts take time to train, are prone to human error, and -- given the quickly expanding supply of data -- will always be in demand. Automated analysis also offers the NSA other advantages. Software doesn't have a conscience and it can't blow the whistle.
What does all this mean in terms of the Fourth Amendment? It’s simple: the technological and human factors that constrained the gathering and processing of data in the past are fast disappearing. Prior to these “advances,” even the most ill-intentioned government urges to intrude on and do away with the privacy of citizens were held in check by the possible. The techno-gloves are now off and the possible is increasingly whatever an official or bureaucrat wants to do. That means violations of the Fourth Amendment are held in check only by the goodwill of the government, which might have qualified as the ultimate nightmare of those who wrote the Constitution.
On this front, however, there are signs of hope that the Supreme Court may return to its check-and-balance role of the Constitutional era. One sign, directly addressing the Fourth Amendment, is this week's unanimous decision that the police cannot search the contents of a cell phone without a warrant. (The court also recently issued a ruling determining that the procedures for challenging one's inclusion on the government’s no-fly list are unconstitutional, another hopeful sign.)
Prior to the cell phone decision, law enforcement held that if someone was arrested for, say, a traffic violation, the police had the right to examine the full contents of his or her cell phone -- call lists, photos, social media, contacts, whatever was on the device. Police traditionally have been able to search physical objects they find on an arrestee without a warrant on the grounds that such searches are for the protection of the officers.
In its new decision, however, the court acknowledged that cell phones represent far more than a "physical object." The information they hold is a portrait of someone's life like what’s in a closet at home or on a computer sitting on your desk. Searches of those locations almost always require a warrant.
Does this matter when talking about the NSA's technological dragnet? Maybe. While the Supreme Court's decision applies directly to street-level law enforcement, it does suggest an evolution within the court, a recognition of the way advances in technology have changed the Fourth Amendment. A cell phone is not an object anymore; it is now recognized as a portal to other information that a person has gathered in one place for convenience with, as of this decision, a reasonable expectation of privacy.
National Security Disclosures Under HIPPA
While the NSA’s electronic basket of violations of the Fourth Amendment were, pre-Snowden, meant to take place in utter secrecy, here’s a violation that sits in broad daylight: since 2002, my doctor can disclose my medical records to the NSA without my permission or knowledge. So can yours.
Congress passed the Health Information Portability and Accountability Act (HIPPA) in 1996 “to assure that individuals’ health information is properly protected.” You likely signed a HIPPA agreement at your doctor's office, granting access to your records. However, Congress quietly amended the HIPPA Act in 2002 to permit disclosure of those records for national security purposes. Specifically, the new version of this “privacy law” states: “We may also disclose your PHI [Personal Health Information] to authorized federal officials as necessary for national security and intelligence activities.” The text is embedded deep in your health care provider’s documentation. Look for it.
How does this work? We don’t know. Do the NSA or other agencies have ongoing access to the medical records of all Americans? Do they have to request specific ones? Do doctors have any choice in whose records to forward under what conditions? No one knows. My HMO, after much transferring of my calls, would ultimately only refer me back to the HIPPA text with a promise that they follow the law.
The Snowden revelations are often dismissed by people who wonder what they have to hide. (Who cares if the NSA sees my cute cat videos?) That's why health-care spying stands out. How much more invasive could it be than for your government to have unfettered access to such a potentially personal and private part of your life -- something, by the way, that couldn’t have less to do with American “security” or combating terrorism.
Our health-care providers, in direct confrontation with the Fourth Amendment, are now part of the metastasizing national security state. You’re right to be afraid, but for goodness sake, don't discuss your fears with your doctor.
How the Unreasonable Becomes Reasonable
At this point, when it comes to national security matters, the Fourth Amendment has by any practical definition been done away with as a part of Post-Constitutional America. Wholebooks have been written just about Edward Snowden and more information about government spying regularly becomes available. We don't lack for examples. Yet as the obviousness of what is being done becomes impossible to ignore and reassurances offered up by thepresident and others are shown to be lies, the government continues to spin the debate into false discussions about how to “balance” freedom versus security, to raise the specter of another 9/11 if spying is curtailed, and to fall back on that go-to “nothing to hide, nothing to fear” line.
In Post-Constitutional America, the old words that once defined our democracy are twisted in new ways, not discarded. Previously unreasonable searches become reasonable ones under new government interpretations of the Fourth Amendment. Traditional tools of law, like subpoenas and warrants, continue to exist even as they morph into monstrous new forms.
Americans are told (and often believe) that they retain rights they no longer have. Wait for the rhetoric that goes with the celebrations of our freedoms this July 4th. You won’t hear a lot about the NSA then, but you should. In pre-constitutional America the colonists knew that they were under the king's thumb. In totalitarian states of the last century like the Soviet Union, people dealt with their lack of rights and privacy with grim humor and subtle protest. However, in America, ever exceptional, citizens passively watch their rights disappear in the service of dark ends, largely without protest and often while still celebrating a land that no longer exists.
© 2014 Peter Van Buren

Peter Van Buren spent a year in Iraq as a State Department Foreign Service Officer serving as Team Leader for two Provincial Reconstruction Teams (PRTs). Now in Washington, he writes about Iraq and the Middle East at his blog, We Meant Well. His book is We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People(The American Empire Project, Metropolitan Books).


Zephyr Teachout’s Corruption in America
By THOMAS FRANK, New York Times, SUNDAY BOOK REVIEW
OCT. 16, 2014
Photo
http://static01.nyt.com/images/2014/10/19/books/review/19FRANK/19FRANK-articleLarge.jpg
A reproduction of an 1871 Thomas Nast cartoon about a Tammany Hall scandal. CreditNorth Wind Picture Archives, via Associated Press
·         Share
·         Tweet
·         Pin
·         Email
·         Save
·         More
The language of political corruption is the default invective of our jaded age. For all our disposition to believe the worst, however, Beltway knavery has only rarely been the object of sustained historical consideration. Most corruption writing, for reasons of journalistic necessity, focuses on particular scandals or individual rogues. TV shows on the subject, meanwhile, assure us that vice is simply a Washington constant; that it saunters along the streets of the capital today with the same easy, untroubled gait as it always has.
The true student of misgovernment knows that the story is grander and more complicated than that. Washington isn’t simply a Place of Wickedness, throbbing with sin at all times and always in the same way. The misdeeds of Iran-contra did not much resemble the turpitude of, say, the Crédit Mobilier episode, even if they did have a great deal in common with the screw-ups of the George W. Bush years. And so the most ambitious chronicler of political misbehavior looks for something higher: a theory, a dialectic, a telos of scandal.
Surprisingly few have been able to pull this off. There was the muckraker Lincoln Steffens, who called himself a “graft philosopher” as he traveled from city to city studying political machines at the turn of the last century. There was the historian Matthew Josephson, whose 1938 masterpiece, “The Politicos,” traced the marriage of money with politics from its dalliances during the Grant administration until its final, grotesque consummation in William McKinley’s electoral triumph of 1896.
And now comes Zephyr Teachout, a professor at Fordham University Law School and a candidate in this year’s Democratic primary for governor of New York. Her entry into the field, “Corruption in America,” includes plenty of the juicy stories that make the genre so much fun to read. We learn, for example, about a diamond-studded snuffbox that Louis XVI gave Benjamin Franklin, then our ambassador to France, and how the Revolutionary generation regarded this gift — the result of a noncontroversial custom in Europe — as a possible threat to republican virtue. We read about an officer of the Turkish government in the 1870s who agreed to sell the products of an American arms manufacturer to his government in exchange for a small consideration, and who then, having duly moved the units, went to court to have the deal enforced. Good stuff, all of it. You have probably heard pundits say we are living in an age of “legalized bribery”; “Corruption in America” is the book that makes their case in careful detail.
As you might have guessed, Teachout’s main target is the currently reigning money-in-politics doctrine of the Supreme Court, as defined mainly by Citizens United, the 2010 decision that struck down certain restrictions on political spending by corporations. Today’s court understands “corruption” as a remarkably rare malady, a straight-up exchange of money for official acts. Any definition broader than that, the justices say, transgresses the all-important First Amendment. Besides, as Justice Anthony Kennedy announced in the Citizens United decision, the court now knows that “independent expenditures, including those made by corporations, do not give rise to corruption or the appearance of corruption” — a statement that I guess makes sense somehow in law-land but sounds to the layman’s ear like the patter of a man who has come unzipped from reality.
The first few American generations, Teachout reminds us, saw things very differently; for them, corruption was a “national fixation.” Drawing on Montesquieu and their understanding of ancient history, the founders fretted about the countless ways a republic might be undone from within. “They saw their task this way,” Teachout writes: “How could they create a system that would be most likely to be filled with men of civic virtue but avoid creating temptations that might corrode that virtue?” Their answer was to build structural barriers keeping public and personal interests separated, without getting lost in considerations of whether a forbidden activity did or did not amount to what our current court calls a “quid pro quo.”
The dings and the dents in their grand design started appearing almost immediately. In 1795, it was discovered that members of the Georgia Legislature had been bribed to hand over enormous stretches of land to speculators. The guilty were promptly booted from office, but then things got complicated. Was it possible for a state to take back land that a corrupt but duly elected legislature had given away? The Supreme Court eventually decided it wasn’t — corruption was just too hard to define.
And so have the debates gone, right down to our own day. We think of all the laws passed over the years to restrict money in politics — and of all the ways the money has flowed under and around those restrictions. And finally, it seems to me, we just gave up out of sheer exhaustion.
According to Teachout, however, it’s much worse than this. Our current Supreme Court, in Citizens United, “took that which had been named corrupt for over 200 years” — which is to say, gifts to politicians — “and renamed it legitimate.” Teachout does not exaggerate. Here is Justice Kennedy again, in the Citizens United decision: “The censorship we now confront is vast in its reach. The government has ‘muffle[d] the voices that best represent the most significant segments of the economy.’ ”
You read that right: The economy needs to be represented in democratic politics, or at least the economy’s “most significant segments,” whatever those are, and therefore corporate “speech,” meaning gifts, ought not to be censored. Corporations now possess the rights that the founders reserved for citizens, and as Teachout explains, what used to be called “corruption becomes democratic responsiveness.”
Let me pause here to take note of another recurring peculiarity in corruption literature: an eerie overlap between theory and practice. If you go back to that “censorship” quotation from Kennedy, you will notice he quotes someone else: his colleague Antonin Scalia, in an opinion from 2003. Google the quote and one place you’ll find it is in a book of Scalia’s opinions that was edited in 2004 by none other than the lobbyist Kevin Ring, an associate of Jack Abramoff who would later be convicted of corrupting public officials.
As it happens, Teachout gives us a long and savory chapter on the legal history of lobbying. Once upon a time, lobbying was regarded as obviously perfidious; in California it was a felony; and contracts to lobby were regarded as reprehensible by the Supreme Court. Here is a justice of that body in the year 1854, delivering the court’s decision in a case concerning lobbyists and lobbying contracts:
“The use of such means and such agents will have the effect to subject the state governments to the combined capital of wealthy corporations, and produce universal corruption, commencing with the representative and ending with the elector. Speculators in legislation, public and private, a compact corps of venal solicitors, vending their secret influences, will infest the capital of the Union and of every state, till corruption shall become the normal condition of the body politic, and it will be said of us as of Rome — omne Romae venale.
Well, folks, it happened all right, just as predicted. State governments subject to wealthy corporations? Check. Speculators in legislation, infesting the capital? They call it K Street. And that fancy Latin remark about Rome? They do say that of us today. Just turn on your TV sometime and let the cynicism flow.
And all of it has happened, Teachout admonishes, because the founders’ understanding of corruption has been methodically taken apart by a Supreme Court that cynically pretends to worship the founders’ every word. “We could lose our democracy in the process,” Teachout warns, a bit of hyperbole that maybe it’s time to start taking seriously.
CORRUPTION IN AMERICA
From Benjamin Franklin’s Snuff Boxto Citizens United
By Zephyr Teachout
376 pp. Harvard University Press. $29.95.
Thomas Frank is a columnist for Salon and the author, most recently, of “Pity the Billionaire.”
A version of this review appears in print on October 19, 2014, on page BR20 of the Sunday Book Review with the headline: The Best Congress Money Can Buy. Order Reprints| Today's Paper|Subscribe



FDR’S SECOND—ECONOMICS—BILL OF RIGHTS
en.wikipedia.org/wiki/Second_Bill_of_Rights
Wikipedia
Roosevelt's remedy was to declare an "economic bill of rights" which would .... The Second Bill of Rights: FDR's Unfinished Revolution--And Why We Need It ...
www.dailykos.com/.../-FDR-s-Economic-Bill-of-Rights-could-...
Daily Kos
Mar 17, 2014 - What do you think of FDR's Economic Bill of Rights saying everyone should have the right to decent job, health care, education, and to be able ...
www.ushistory.org/.../economic_bill_of_r...
Independence Hall Association
The Economic Bill of Rights, in a collection of Historic Documents of America.
www.fdrlibrary....
Franklin D. Roosevelt Presidential Library and Museum
FDR's Second Bill of Rights or Economic Bill of Rights Speech ... Click the images above to see the text of the economic measures excerpt as read by the ..









Contact


Here is the link to all OMNI newsletters:

Contents #3 Dec. 15,  2011
Assaults on Bill of Rights
         Habeas Corpus
        2011 Patriot Act
        If Homeland Battlefield: End of Bill of Rights
Fascist Police State?
Military Detention USA
Defending the Bill of Rights
Jefferson and Madison
4th Amendment Victory
Electronic Privacy
Susan Herman
Tom Engelhardt
FDR: Economic Bill of Rights

Contents of #4 Dec. 15, 2012
Bill of Rights Day 2012
FISA, NDAA, and Other Anti-Democratic Regressions
BORDC vs. Decline of Liberties
ACLU vs. SB1867
PRA vs. Right Wing
Patriot Act
Bradley Manning
BORDC Newsletter

Contents #5 Dec. 15, 2013
President’s Proclamation
National Constitution Center
Google Search: Attacks on Bill of Rights
Boghosian, Spying on Democracy
National Lawyers Guild
Solomon, Justice Dept. vs. Free Press
Madar, Prosecution of Manning Endangers US Journalism and  Democracy
Natapoff, Snitching
Potter, Green is the New Red
Pretzel, Defying Hitler

“Our Constitution is not perfect yet.”  FDR, Last Inaugural



END BILL OF RIGHTS DAY NEWSLETTER #6, Dec. 15, 2014

Viewing all articles
Browse latest Browse all 902

Trending Articles