MatthewHurtFirstPaper 5 - 20 Mar 2020 - Main.MatthewHurt
|
|
META TOPICPARENT | name="FirstPaper" |
Wikimedia and The Empty Promise of the Fourth Amendment Lawsuit | |
< < | -- By MatthewHurt - 13 Mar 2020 | > > | -- By MatthewHurt - 20 Mar 2020 | |
Introduction | |
< < | The Fourth Amendment is often categorized, along with the Fifth and Sixth, as being a criminal procedure provision within the Bill of Rights. However, there is nothing inherently criminal about the text of the Fourth Amendment: it proscribes certain conduct on the part of the government, but it does not strictly limit that proscription to criminal investigations. A plain reading of the amendment indicates that the individual's right is violated upon the act of government intrusion, not the government introducing derivative evidence at a criminal trial. Moreover, if one reads each amendment in context of the remaining nine, the bill of rights emerges as a coherent single document, created as the "fetters against doing evil which no honest government should decline.". In this context the Fourth Amendment takes on broader application than the narrow role in criminal procedure to which it has traditionally been relegated: it proscribes any unreasonable searches and seizures by any organ of the government regardless motive or application.
Notes
:
| > > | The Fourth Amendment is often categorized as a "criminal procedure" provision within the Bill of Rights. However, the text of the Fourth Amendment merely proscribes certain conduct on the part of the government; it does not limit that proscription strictly to criminal investigations. More importantly, plain reading demonstrates the government violates an individual's rights upon its intrusive act, not through the introduction derivative evidence at a criminal trial. If one reads the amendment in context of the remaining nine, the Bill of Rights emerges as a coherent single document, created as the "fetters against doing evil which no honest government should decline.". In this context, the Fourth Amendment applies as more than a reactive criminal procedure protection: it should provide an effective tool to proactively challenge in court any act of government surveillance. Unfortunately, both courts and Congress have declined to give any real teeth to what otherwise could be meaningful protection. | | Lawsuit as a Remedy | |
< < | The obvious problem with challenging a government searches and seizures as unreasonable lies in the very discovery of the violative act. Commonly, this denouement takes place in the context of a criminal prosecution where government the attempts the introduction of evidence of questionable provenance. For such violations, the exclusionary rule provides an apt remedy. But when the intelligence apparatus conducts a search, it does so intending to remain undetected indefinitely. Where there is no revelation, what are the appropriate remedies? Given the preventative language of the Fourth Amendment itself, and the nature of government bulk collection programs, a private citizen should be able to find effective remedy in a lawsuit against the government. Yet such has proven not to be the case, largely due to the issue of standing. | > > | The threshold problem with challenging any government search or seizure lies in the initial discovery of a violative act. Commonly, the revelation takes place in the context of a criminal prosecution when government introduces evidence of questionable provenance. For such violations, the exclusionary rule provides an apt remedy. But when the intelligence apparatus conducts a search, it does so intending to remain undetected indefinitely. Where there is no denouement, what are the appropriate remedies? Given the preventative language of the Fourth Amendment itself, and the nature of government bulk collection programs, a private citizen should be able to find effective remedy in a lawsuit against the government. Yet this has proven so, largely due to the issue of standing. | | Standing | |
< < | To establish standing to bring suit under Article III of the Constitution, a plaintiff must establish: (1) an injury-in-fact; (2) a casual connection between the injury and the alleged conduct; and (3) the redressability of the injury by a court."
The first prong of establishing injury requires a plaintiff show that the government has, in fact, surveilled on their communications in a manner violating the Fourth Amendment. This, burden proves problematic as any evidence of the government surreptitiously monitoring its citizens would naturally be in the possession of the government and only available to the plaintiff if provided through discovery. When served with a discovery request, the government has, unsurprisingly, proven loathe to turn over classified evidence either confirm or refute any alleged surveillance. One of its most effective methods in frustrating those discovery attempts is the state secrets doctrine.
Notes
:
| > > | To establish standing under Article III of the Constitution, a plaintiff must establish: (1) an injury-in-fact; (2) a causal connection between the injury and the alleged conduct; and (3) the redressability of the injury by a court.". This first prong of establishing injury requires a plaintiff show that the government has, in fact, surveilled their communications in a manner violating the Fourth Amendment. This burden proves problematic as any evidence of the government surreptitiously monitoring its citizens would naturally be in the exclusive possession of the government and only available to the plaintiff through discovery. Yet when served with a discovery request, the government has, unsurprisingly, proven loathe to turn over classified evidence either confirm or refute any alleged surveillance. One of its most effective methods in frustrating those discovery attempts is the state secrets doctrine.
Notes
:
| | State Secrets Doctrine | |
< < | The state secrets doctrine, originally rooted in federal common law, held that courts cannot require production of evidence (even for in camera review) when "there is a reasonable danger that compulsion of the evidence will expose . . . matters which, in the interest of national security, should not be divulged." While the Reynolds court in dicta admonished that the claim of privilege on the part of the government, should not be lightly accepted," in practice courts do not appear to be particularly demanding. Thus the Court created a paradox in which an executive agency could potentially surveil American citizens in violation of the Fourth Amendment, but deny production evidence of that surveillance by asserting a judicially created privilege. Congress attempted to address this paradox with the Foreign Intelligence Surveillance Act, which provided for _in camera, ex parte review of classified evidence obtained or derived from electronic surveillance. The private lawsuit have been consistently blocked by litigants inability to demonstrate standing (that the government can deny private citizens the evidence of potentially unreasonable searches and seizures under state secrets doctrine. However, the recent Wikimedia ruling denied the applicability of this provision of the FISA prior to the plaintiff making a clear showing that they were the subject of electronic surveillance. .
Notes
:
:
:
:
:
| > > | The state secrets doctrine, originally rooted in federal common law, held that courts cannot require production of evidence (even for in camera review) when "there is a reasonable danger that compulsion of the evidence will expose . . . matters which, in the interest of national security, should not be divulged." While the Reynolds Court in dicta admonished that the claim of privilege on the part of the government, should not be lightly accepted," in practice courts do not appear to be particularly demanding. Thus the Court created a paradox in which an executive agency could potentially surveil American citizens in violation of the Fourth Amendment, but deny production the evidence of that surveillance by asserting a judicially created privilege. Congress attempted to address this paradox with the Foreign Intelligence Surveillance Act, which provided for in camera, ex parte review of classified evidence obtained or derived from electronic surveillance. This provision would strike an ideal of maintaining the secrecy of an intelligence agencies practices, while still enabling the judiciary to provide judicial oversight of those practices. However, the recent Wikimedia ruling denied the applicability of this provision of the FISA prior to the plaintiff clearing the first prong of standing by making a clear showing that it was the subject of electronic surveillance. . Congress, for its part, declined to create more robust (or clearer) in camera review provisions of the FISA in its most recent attempted renewal, choosing only to make grammatical edits to the § 1806(f).
Notes
:
:
:
| | States Secrets in Application | |
< < | The logic of this ruling, while consistent with other appellate court rulings, creates a perverse incentive for the government intelligence services to cast their nets as wide as possible so just not so wide they capture all communications: the less discriminately one surveils, the more difficult it becomes for any particular plaintiff to make a _prima facie case that their specific communications were intercepted. It seems lost on the judiciary that these potential plaintiffs knowledge of the very existence of the data collection programs under § 702 of FISA (the Prism and Upstream programs) results from the actions of Edward Snowden. Under this regime whereby any evidence of a Fourth Amendment violation remains classified, there is no lawful mechanism of oversight. Thus the only conceivable way any party could obtain evidence to show standing would for an individually illegally leaking that information. Thus, these rulings also create the perverse incentive for any potential whistleblowers to emulate Mr. Snowden's actions.
Notes
:
:
| > > | The logic of the Wikimedia ruling, while consistent with other appellate court rulings, creates a perverse incentive for the government intelligence services to cast a wide net through bulk collection programs, just not so wide they capture all communications: the less discriminately one surveils, the more difficult it becomes for any particular plaintiff to make a _prima facie case that their specific communications were intercepted. It seems lost on the judiciary that of the very existence of the data collection programs under § 702 of FISA (the PRISM and Upstream programs) became known to these plaintiffs due to actions of Edward Snowden. Under this regime whereby any evidence of a Fourth Amendment can be withheld from even the courts' eyes, there exists no lawful mechanism of oversight. Thus the only conceivable way any party could obtain evidence to show standing would require an individual to illegally leak that evidence. Thus, these rulings also create the perverse incentive for any potential whistleblowers to emulate Mr. Snowden's actions. | |
Conclusion: Paradoxes and Self-Licking Ice Cream Cones
The bizarre conclusion from this jurisprudence is that the state secrets doctrine trumps the American citizens' Fourth Amendment rights. The paramount concern throughout this line of cases is the preservation of secrecy. Absent anywhere in this line of cases a question as to whether or not any of this is reasonable. That a judicially created privilege could deny a judge examination of evidence of a potential constitutional violation defies common sense. A system inoculating the surveillance apparatus from judicial oversight, would be primed for abuse. It begs the question, why would any given intelligence service not take everything they could when the very raison d'etra of any intelligence organization is to gather information? Yet, absent a Supreme Court ruling contra the state secrets doctrine appears to have created that exact system.
Notes
:
|
|
MatthewHurtFirstPaper 4 - 13 Mar 2020 - Main.MatthewHurt
|
|
META TOPICPARENT | name="FirstPaper" |
| |
< < | It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted. | | | |
< < | Why the hell isn't this working | > > | Wikimedia and The Empty Promise of the Fourth Amendment Lawsuit | | | |
< < | -- By MatthewHurt - 04 Mar 2020 | > > | -- By MatthewHurt - 13 Mar 2020 | |
Introduction | |
< < | The Fourth Amendment is often categorized, along with the Fifth and Sixth, as being a criminal procedure provision within the bill of rights. However, there is nothing inherently criminal about the text of the Fourth Amendment: it proscribes certain conduct on the part of the government, but it does not limit the proscription to strictly to criminal investigations. If one reads in context of the remaining the bill of rights must be read as a coherent single document the intent of which as “fetters against doing evil which no honest government should decline.” . A plain reading of the amendment indicates that the individual’s right is violated upon the act of government intrusion, not the government attempting to introduce evidence derived therefrom at a trial. Therefore any agency of the government When read in this light, the Fourth Amendment takes on broader application than the narrow role of criminal procedure to which it has been relegated.
Subsection A
Notes
:
| > > | The Fourth Amendment is often categorized, along with the Fifth and Sixth, as being a criminal procedure provision within the Bill of Rights. However, there is nothing inherently criminal about the text of the Fourth Amendment: it proscribes certain conduct on the part of the government, but it does not strictly limit that proscription to criminal investigations. A plain reading of the amendment indicates that the individual's right is violated upon the act of government intrusion, not the government introducing derivative evidence at a criminal trial. Moreover, if one reads each amendment in context of the remaining nine, the bill of rights emerges as a coherent single document, created as the "fetters against doing evil which no honest government should decline.". In this context the Fourth Amendment takes on broader application than the narrow role in criminal procedure to which it has traditionally been relegated: it proscribes any unreasonable searches and seizures by any organ of the government regardless motive or application. | | | |
> > | Lawsuit as a Remedy
The obvious problem with challenging a government searches and seizures as unreasonable lies in the very discovery of the violative act. Commonly, this denouement takes place in the context of a criminal prosecution where government the attempts the introduction of evidence of questionable provenance. For such violations, the exclusionary rule provides an apt remedy. But when the intelligence apparatus conducts a search, it does so intending to remain undetected indefinitely. Where there is no revelation, what are the appropriate remedies? Given the preventative language of the Fourth Amendment itself, and the nature of government bulk collection programs, a private citizen should be able to find effective remedy in a lawsuit against the government. Yet such has proven not to be the case, largely due to the issue of standing. | | | |
< < | Subsub 1 | > > | Standing
To establish standing to bring suit under Article III of the Constitution, a plaintiff must establish: (1) an injury-in-fact; (2) a casual connection between the injury and the alleged conduct; and (3) the redressability of the injury by a court."
The first prong of establishing injury requires a plaintiff show that the government has, in fact, surveilled on their communications in a manner violating the Fourth Amendment. This, burden proves problematic as any evidence of the government surreptitiously monitoring its citizens would naturally be in the possession of the government and only available to the plaintiff if provided through discovery. When served with a discovery request, the government has, unsurprisingly, proven loathe to turn over classified evidence either confirm or refute any alleged surveillance. One of its most effective methods in frustrating those discovery attempts is the state secrets doctrine. | | | |
< < | Subsection B | > > | State Secrets Doctrine
The state secrets doctrine, originally rooted in federal common law, held that courts cannot require production of evidence (even for in camera review) when "there is a reasonable danger that compulsion of the evidence will expose . . . matters which, in the interest of national security, should not be divulged." While the Reynolds court in dicta admonished that the claim of privilege on the part of the government, should not be lightly accepted," in practice courts do not appear to be particularly demanding. Thus the Court created a paradox in which an executive agency could potentially surveil American citizens in violation of the Fourth Amendment, but deny production evidence of that surveillance by asserting a judicially created privilege. Congress attempted to address this paradox with the Foreign Intelligence Surveillance Act, which provided for _in camera, ex parte review of classified evidence obtained or derived from electronic surveillance. The private lawsuit have been consistently blocked by litigants inability to demonstrate standing (that the government can deny private citizens the evidence of potentially unreasonable searches and seizures under state secrets doctrine. However, the recent Wikimedia ruling denied the applicability of this provision of the FISA prior to the plaintiff making a clear showing that they were the subject of electronic surveillance. . | | | |
> > | States Secrets in Application
The logic of this ruling, while consistent with other appellate court rulings, creates a perverse incentive for the government intelligence services to cast their nets as wide as possible so just not so wide they capture all communications: the less discriminately one surveils, the more difficult it becomes for any particular plaintiff to make a _prima facie case that their specific communications were intercepted. It seems lost on the judiciary that these potential plaintiffs knowledge of the very existence of the data collection programs under § 702 of FISA (the Prism and Upstream programs) results from the actions of Edward Snowden. Under this regime whereby any evidence of a Fourth Amendment violation remains classified, there is no lawful mechanism of oversight. Thus the only conceivable way any party could obtain evidence to show standing would for an individually illegally leaking that information. Thus, these rulings also create the perverse incentive for any potential whistleblowers to emulate Mr. Snowden's actions. | | | |
< < | Subsub 1 | > > | Conclusion: Paradoxes and Self-Licking Ice Cream Cones
The bizarre conclusion from this jurisprudence is that the state secrets doctrine trumps the American citizens' Fourth Amendment rights. The paramount concern throughout this line of cases is the preservation of secrecy. Absent anywhere in this line of cases a question as to whether or not any of this is reasonable. That a judicially created privilege could deny a judge examination of evidence of a potential constitutional violation defies common sense. A system inoculating the surveillance apparatus from judicial oversight, would be primed for abuse. It begs the question, why would any given intelligence service not take everything they could when the very raison d'etra of any intelligence organization is to gather information? Yet, absent a Supreme Court ruling contra the state secrets doctrine appears to have created that exact system. | | | |
< < | Subsub 2
State Secrets Doctrine
Subsection A
Subsection B | |
| |
< < | You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines: | | | |
< < | Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
MatthewHurtFirstPaper 3 - 13 Mar 2020 - Main.MatthewHurt
|
|
< < | Revision 2 is unreadable | > > |
META TOPICPARENT | name="FirstPaper" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Why the hell isn't this working
-- By MatthewHurt - 04 Mar 2020
Introduction
The Fourth Amendment is often categorized, along with the Fifth and Sixth, as being a criminal procedure provision within the bill of rights. However, there is nothing inherently criminal about the text of the Fourth Amendment: it proscribes certain conduct on the part of the government, but it does not limit the proscription to strictly to criminal investigations. If one reads in context of the remaining the bill of rights must be read as a coherent single document the intent of which as “fetters against doing evil which no honest government should decline.” . A plain reading of the amendment indicates that the individual’s right is violated upon the act of government intrusion, not the government attempting to introduce evidence derived therefrom at a trial. Therefore any agency of the government When read in this light, the Fourth Amendment takes on broader application than the narrow role of criminal procedure to which it has been relegated.
Subsection A
Subsub 1
Subsection B
Subsub 1
Subsub 2
State Secrets Doctrine
Subsection A
Subsection B
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|