Starting December 1, Feds Can Hack Millions Of Devices With One Warrant

It is important to note that this rule change implicitly presumes that ALL COMPUTERS and PHONES are PERSONAL PROPERTY actually owned by the U.S. INC, whereby the computers and phones are only REPRESENTATIVE OWNERSHIP.

The artificial person that represents the human being is the one that owns the computer/phone!

This cannot be understated!!!   If you believe in PRIVATE PROPERTY…  If you believe in the US Constitution, then Amendment 5 protects all private property as requiring to be COMPENSATED for public use.  This includes the presumption of legal ownership by the “Governmental Services Corporation” and mere equitable title (title of usufruct usage) for the human being.

For Instance, when automobiles are purchased in the UNITED STATES, INC, the MCO is nearly immediately and transparently (by the dealership) SURRENDERED to the State in which the car is purchased. SURRENDER is a term of war.  The CERTIFICATE OF TITLE is not the MCO.  it is only a mere representation of ownership.  To verify if you own your VEHICLE or your ARTIFICIAL PERSON TRADE NAME owns it, go look at the title…  is the OWNERS NAME in UPPER CASE?  Yes?  You don’t own it.  The State does…  they issued the Certificate of Title as proof that you don’t own it!

The Rule Change implicitly makes all computers and phones property of the UNITED STATES, no matter what.  They can issue warrants on phones and computers in foreign countries when combined with other legal precedence.

The UNITED STATES, INC has laid claim to all computers and phones in the entire planet.  That is where their fictitious legal “authority” to hack any computer/phone stems from…  and is not in-fact true.

This is what “makes” the UNITED STATES, INC governmental services corporation a slavery system…  laying claim to all private property without jurisdiction nor authority.  Some may argue that the Papel Bulls authorize the Pope to operate everything -including the UNITED STATES, INC- as an Express Constructive Trust.

Even using their own rules, procedures, and operations to exit their fictional corporate system, the system enables judges to unlawfully “legally assume” their fiction over everything else.

Many people are familiar with the POWER OF ATTORNEY.  There is another power:  THE POWER OF ASSUMPTION.   Plaintiffs are giving this right, and the State abuses the power of assumption….  particularly in semantic deception of confusing the ARTIFICIAL PERSON with the human being.   How many times have you heard: “Is this your driver’s License?”  and you (would) say yes?  Well, the news is that it’s not YOUR Driver’s License…   It’s the STATE’S DRIVER’S LICENSE for you.  They own it.  It is their property.  They can ask for the Driver’s License back at any time…  that is their law.

The Driver’s License is literally its own LEGAL “ARTIFICIAL PERSON” ENTITY unto itself.  It has your image likeness, but that does not make it you.  It has your signature on it, making it a contract with the State….  a ONE WAY, ONE SIDED CONTRACT.  They have not signed anything; we have only given them consent to treat us as artificial persons corporation constructs constructive trusts insurance franchises.

Only in having a Driver’s Licenses is in illegal not to have one!  Without a Driver’s License, the Driver’s License cannot be required.  The Right to Travel is converted into a privilege with a license for a fee…  which is one of many crimes by Policy Enforcers should they mis-enforce the law.  (Mis-Enforcement is a crime as it creates liability)

So, to Defend ones right to own a private property automobile, there are laws in every State and Nation for CANCELLING the Certificate of TITLE used to represent the automobile in the “LEGAL SLAVERY SYSTEM” as a commercial “MOTOR VEHICLE.”

Likewise, the only way for the UNITED STATES, INC to not have the right to break into our private property is if we actually own the computer/phone.

What does actually owning a computer/phone look like?  SOLUTIONS TIME!!!!

Creating a Foreign Country Negotiable Instrument that represents the computer/phone eliminates the presumption of ownership by the UNITED STATES, INC…  Especially if a COPY of the negotiable Instrument representing the Computer/Phone in the foreign country is sent to the proper authorities: U. S. Department of Justice, U.S. Department of State, US Department of Treasury, and Department of Homeland Security.  Similarly, to stop the presumption of computer/phone ownership by the STATE, send a copy of the ownership documents to the Court/Justice System, Department of State, State Treasury, and the State Police for record keeping.

Starting December 1, Feds Can Hack Millions Of Devices With One Warrant

15281834_1505841339444476_226435650_nBy Shaun Bradley

On Thursday, December 1, a vital Supreme Court order is set to go into effect that dramatically expands the surveillance power of federal agents. The impending alteration to Rule 41 of the Federal Rules of Criminal Procedure softens the legal requirements for obtaining search and seizure warrants that grant the government remote access to individuals’ computers and phones.

In the past, law enforcement was required to obtain a warrant from a judge within the jurisdiction where the proposed search was going take place. Under this new system, however, if an individual is using technology to conceal their location, the warrant is considered valid regardless of jurisdiction. A single authorization will have the potential to validate millions of searches on private devices. Any journalist, activist, or whistleblower who values privacy and uses tools like Freenet or the Tor network will fall directly into the crosshairs.

As USA Today summarized, the rule change was “sought by the Justice Department, adopted by the U.S. Federal Courts, and approved on April 28 by the Supreme Court without much fanfare.”

These changes have been on the fast track since the FBI had evidence thrown out in a recent child pornography case. The defendant was using the Tor network to conceal his IP address and operating a child pornography site known as Playpen. The Department of Justice and FBI refused to disclose the legal process used to gain access to the evidence, likely because they did not follow proper legal protocols. As a result, at least some of their evidence was rejected by the court.

The controversy was compounded by the FBI’s use of Playpen’s servers to set up a massive sting, known as Operation Pacifier. The pedophilic porn site was run directly by federal agents for over two weeks in an attempt to round up any individuals using the network. These same agencies are now claiming that without changes to the current rule, their ability to put the scum of society behind bars is severely restricted.

The dark web has been subverting the controllable marketplace for years, but through the eyes of the government, anything outside of their dominance is equivalent to insurrection. Without a doubt, anonymity online creates a double-edged sword of freedom versus lawlessness, so it’s no surprise significant action has been taken to crack down on this space under the guise of national security and public safety.

In this vein, the modification of Rule 41 has been framed as crucial in preventing crime even though implementing it grants sweeping authority to the State.

Typically, any changes that carry these broad implications are openly debated in Congress, but by classifying the move as a simple procedural change, the discussion was instead held by the small U.S. Courts Advisory Committee on the Federal Rules of Criminal Procedure following the Department of Justice’s request to modify the rule. The alteration was approved by the Supreme Court. The lack of publicity received for something so fundamental shows there has been a deliberate effort to conceal the consequences of this scheme.

The Electronic Frontier Foundation has been an outspoken advocate for maintaining the current protections. The organization has voiced its concerns about the new rule:

The Federal Rules of Criminal Procedure set the ground rules for federal criminal prosecutions. The rules cover everything from correcting clerical errors in a judgment to which holidays a court will be closed on—all the day-to-day procedural details that come with running a judicial system. The key word here is ‘procedural.’  By law, the rules and proposals are supposed to be procedural and must not change substantive rights. But the amendment to Rule 41 isn’t procedural at all. It creates new avenues for government hacking that were never approved by Congress.

The media has done an excellent job of demonizing the dark web and the anonymous networks that inhabit it. By focusing on stories like the Silk Road and its founder Ross Ulbricht (among others who use anonymous systems to conceal state-designated criminal activity), the media has convinced the public that anonymity and criminality are one and the same. The federal government has long held this belief; during a crackdown in 2014, the FBI targeted more than 400 Tor addresses in an attempt to identify the actual locations of anonymous servers.

Maintaining complete privacy doesn’t matter to those whose biggest worry is having their porn history made public. But it’s the underground railroad for renegades working against the establishment. Journalists who are communicating with sources or establishing an outlet for whistleblowers need a layer of protection that can encourage others to feel safe coming forward. As activism and social media continue to merge, it’s essential that the leadership of dissenting movements can coordinate action without having to worry about infiltration.

There have been multiple bipartisan actions to curtail this erosion of privacy, namely through the Stopping Mass Hacking Act and the Review the Rule Act. Well-known lawmakers who value individual liberty, like Thomas Massie and Rand Paul, have come out in full support of these counter-efforts. Twenty-three members of Congress also sent a letter to Attorney General Loretta Lynch to express concerns and ask for more information.

Senator Ron Wyden, a member of the Senate’s Intelligence Committee, is a sponsor of the Stopping Mass Hacking Act. In a last ditch effort, he called on Congress to take action in an attempt to block the rule change. Unfortunately, the motion was voted down on Wednesday morning.

If Congress doesn’t stop these changes, a single judge will be able to grant a warrant to hack a million (or more) computers and other devices. By hacking the devices of victims of a botnet, the government will be treating victims the same way it treats attackers. We need to pass my Stopping Mass Hacking (SMH) Act right now.

Removing these kinds of limitations on power is what, over time, leads to the complete subjugation of a society. This takes a huge step towards further neutering the 4th Amendment of the Bill of Rights, making probable cause on an individual basis a thing of the past. The desire for privacy cannot be considered suspicious in a world where almost all personal information is a matter of public record.

This ruling can easily be rationalized when framed as an effort to stop child trafficking, but the unseen effects it will have on the future of journalism and activism must be seriously examined. Contacting legislators directly may seem futile, but making their lives difficult is one of the best ways to get their attention. If those of us who are passionate about preserving individual freedom become apathetic, there will be nobody left to hold back the constant progression of invasive statism.

This article (Starting Tomorrow, Feds Can Hack Millions of Devices with One Warrant) by Shaun Bradley is free and open source. You have permission to republish this article under a Creative Commons license with attribution to Shaun Bradley and theAntiMedia.orgAnti-Media Radio airs weeknights at 11 pm Eastern/8 pm Pacific. If you spot a typo, please email the error and name of the article to


Post a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s