steem

Friday, April 28, 2017

The Market’s Glorious Resurrection of Mystery Science Theater 3000

The Market’s Glorious Resurrection of Mystery Science Theater 3000

The Market's Glorious Resurrection of Mystery Science Theater 3000

Almost 20 years after being canceled, comedy series Mystery Science Theater 3000(MST3K) has returned.

During its original run in the 90s, MST3K earned a cult following by doing what pop culture does best, namely, taking a mundane idea and elevating it to an art form.

For MST3K, the idea was to build a show around a favorite pastime of movie fans: mocking cheesy movies. The concept seems simple today, but thirty years ago it was groundbreaking, all the more so because the cast of MST3K was really good at it. Yet despite winning many fans, the show was never a favorite of the networks that aired it, which were often unsatisfied with the ratings and therefore eager to control its creative direction.

The revival of MST3K is a testament to the devotion of “MiSTies” around the world. But it’s more than that: it’s also a way to explain how markets work, and other economic science facts.

Crowdfunding Puts Consumers in Control

First, entrepreneurs can use markets to satisfy our most mysterious, scientific, and theatrical wants. In the case of MST3K, there wasn’t an obvious desire for a new season, and certainly not enough to attract the attention of the major networks. There seemed to be only a small, devoted, and mostly decentralized fan base that lacked a clear way to signal the value of a revival to investors.

Yet there actually was enough support, but the producers needed the market to show it. That’s why they turned to crowdfunding to gauge interest in the project. Rather than waste time and money cold-calling networks looking for investments, creator Joel Hodgson and his team asked the fans to vote with their wallets.

 

And so they did: the “Bring Back MST3K” Kickstarter campaign, launched in November 2015, and shattered many previous fundraising records, ultimately grossing over $5.7 million. Eighteen months later, the fans have season 11, this time via Netflix.

Privately Funding the Arts

Like Kickstarter, Netflix is closer to a free-market model than many of the oversized networks that dominate the industry. These privileged, cartelized companies are increasingly threatened by platforms like Netflix and Amazon Prime, which have largely succeeded by taking big risks on seemingly obscure or impossible projects.

Second, the success of the MST3K Kickstarter hints at a deeper point: the arts can be privately funded. When people are convinced an artistic venture has merit, they’re happy to support it—and most art forms require far less investment than a TV show.

Entrepreneurs excel at finding an audience, however niche or dispersed, and the arts are no exception. Crowdfunding can even provide public goods. But too often, calls for public funding of the arts are calls for art that doesn’t create value for anyone but the artists. Of course, public organizations do fund some art projects that appeal to large audiences, but to the extent that those audiences feel strongly about them, they should be willing to support them. There’s no need to force others to pay and then funnel the money through a public bureaucracy first.

Third, using the market to fund the arts benefits creators and audiences, and hurts no one. People support MST3K because they love it. But people who don’t like the show aren’t obliged to pitch in, or even to pay attention, much less sacrifice to their money or viewing time to a show that doesn’t interest them. Contrast this to public programming such as PBS, which delivers one-size-fits-all content at taxpayer expense. That’s the beauty of the market: it doesn’t punish people for having different tastes. My enjoyment of a show like MST3K doesn’t stop others from enjoying art that they like. Publicly-funded art, on the other hand, always involves favoring some tastes at the expense of others.

The Market is the Ultimate Judge

Finally, the market is uncertain. Even successful entrepreneurs can’t be sure consumers will always want what they have to offer. And the fact is, MST3K’s return is not by itself a signal of success: we have to wait and see if fans continue to watch and support the show and if it can capture a new audience, to know whether their money was well-spent.

The creative minds behind the show are bearing this uncertainty, and will profit or lose according to the strength of their artistic judgments—ultimately, the market makes it possible for entrepreneurs to create value, but it can’t guarantee it.

The return of MST3K is a great example of the democracy of the market. And it’s only one of many shows to be resurrected after an untimely cancellation. These revivals are a way for fans to get more of what they love, but they’re also good for artists, who get another chance to create art the way they want.

Welcome back, Mystery Science Theater 3000!

Matthew McCaffrey
Matthew McCaffrey is assistant professor of enterprise at the University of Manchester and editor of Libertarian Papers.

This article was originally published on FEE.org. Read the original article.



Wednesday, April 26, 2017

X-Files Season 11 Confirmed! 10 More Episodes Coming



X-Files Season 11 Confirmed! 10 More Episodes Coming

The truth is out there for at least 10 more episodes. The X-Files Season 11 will arrive some time later this year, or in early 2018, Fox confirmed. The fact that they’re offering fans a larger episode count than we got with Season 10, which only had six episodes, is a good sign.

“Iconic characters, rich storytelling, bold creators — these are the hallmarks of great TV shows. And they are some of the reasons why The X-Files has had such a profound impact on millions of fans worldwide,” David Madden, president, Fox Broadcasting Company, said in a statement. “Chris’ creativity, along with the brilliant work of David and Gillian, continue to propel this pop culture phenomenon, and we can’t wait to see what fresh mysteries Mulder and Scully uncover in this next chapter of The X-Files.”

Even before The X-Files returned in 2016 to strong ratings, the narrative over at Fox seemed to be that Carter, Anderson, and David Duchovny had a greenlight for more episodes or another “event series” if they wanted it.



Trump Just Imposed a New Tax on Lumber

Trump Just Imposed a New Tax on Lumber

Trump Just Imposed a New Tax on Lumber

There are a lot of news reports today about Trump’s decision to impose stiff tariffs on American companies (home builders) who buy Canadian lumber, here is a sample: “Trump slaps first tariffs on Canadian lumber,” “Tariff on Canadian lumber sends a stern message,” “Trump Administration To Impose 20 Percent Tariff On Canadian Lumber,” and “Trump slaps duty on lumber from Canada.” In each case, those news reports miss a few very critical points: a) Canadian lumber doesn’t pay the tariff, b) Canadian lumber companies won’t pay the tariff, and c) American lumber-buying companies (mostly home builders) will pay the tariff, which will be passed along to home buyers in the form of higher new home prices. Therefore, it’s more accurate to report that Trump has just slapped stiff 20% tariffs (lumber taxes) on the American people, not Canada.

I’ve taken the liberty of making some edits to the New York Times article “In New Trade Front, Trump Slaps Tariffs on Canadian Lumber” to reflect more accurately the viewpoint of the American consumer and American lumber-buying companies (home builders), and expose tariffs for what they really are: price-raising, job-killing, prosperity-destroying trade policies that involve the government-sanctioned “legal plunder” of Americans (home buyers and home builders in this case) by domestic producers (domestic lumber producers):

New Title: “In New Trade Front, Trump Slaps Stiff Import Taxes on American Home Builders Buying Canadian Lumber”
WASHINGTON — The Trump administration announced on Monday that it would impose new tariffs taxes on Americans who purchase Canadian softwood lumber imports, escalating a longstanding conflict with America’s second-largest trading partner.

The Commerce Department determined that Canada had been improperly generously subsidizing the sale of American companies who buy softwood lumber products to the United States from Canada, and after failed negotiations to keep lumber prices internationally competitive, Washington decided unfairly to retaliate against American lumber buyers with tariffs of 3 percent to 24 percent. The penalties (taxes) imposed on Americans will be collected retroactively on imports dating back 90 days.

The decision came days after President Trump complained bitterly on behalf of U.S. dairy farmers about Canada’s dairy trade practice of slashing their milk prices (to the great benefit of Americans, especially the poor), and the tariffs on Americans signaled a harsher turn in his relationship with Canada the American people even as he seeks to renegotiate the North American Free Trade Agreement. While he has often assailed China, Mexico and others for their trade practices, he seemed to have forged a strong relationship with Canada’s prime minister, Justin Trudeau.

The United States lumber companies and Canada have been rivals and at odds over softwood lumber in one form or another since the 19th century, with the current dispute tracing back to 1982. The United States imported $5.7 billion in softwood lumber last year alone, mainly for residential home building. Raising prices on imported Canadian lumber by 20 percent will likely lead to higher prices for new homes, and could slow home building and lead to layoffs for U.S. construction workers.

Therefore, the tariffs taxes on American home builders buying Canadian lumber are likely to be opposed by American homebuilders, who say they raise the cost of new houses for American home buyers. A study last year by the National Association of Home Builders found that a 15 percent tariff tax on American home builders buying imported lumber would increase new home prices by 4.2 percent and cost 4,666 full-time construction jobs.
When will the public finally come to understand these basic economic facts about trade protectionism and tariffs?

1. Tariffs are simply taxes on imports, and those taxes are paid for by Americans, not foreigners. In this case, Canadian lumber producers aren’t paying the 20% tariff/tax, American lumber buyers (home builders) pay the tax on imported lumber from Canada, and those taxes on lumber are eventually paid for by American home buyers.

2. Tariffs on imported lumber might help protect, save or create jobs in one US industry (lumber producers), but will destroy more jobs in other US industries (construction in this case).

3. US producers only engage in rent-seeking to use government force to be protected against foreign rivals when foreign competitors (Canadian lumber producers in this case) offer lower prices to Americans than domestic producers. That’s why it’s called “protectionism” — it’s protection for high-cost domestic companies against low-cost foreign competition.

4. It shouldn’t really matter why foreign producers are better able to serve American consumers with lower prices than domestic producers. If China “manipulates” its currency to offer Americans lower prices that otherwise would be the case, that policy provides net benefits for Americans. If Canada “unfairly” subsidizes its lumber producers, that’s a form of foreign aid, and a gift from the citizens of Canada to the citizens of the United States. If we wouldn’t complain about free lumber from Canada, we shouldn’t complain about low lumber prices that might be subsidized by Canadian citizens.

5. Protectionism should be seen for what it really is: Trade policies that favor domestic producers over consumers, raise taxes and prices for Americans, and in the process destroy jobs and prosperity. In other words, it’s a sure formula to make a country poor, not great.

Bottom Line: To paraphrase a comment Milton Friedman once made about minimum wage laws, trade protectionism is a monument to the power of superficial thinking. Superficial and short-sighted because it ignores the complexities and dynamics of world markets, and ignores all of the unseen, delayed and hidden costs of trade protectionism that will make the American economy weak again, not great again.

Republished from AEI.



Mark J. Perry
Mark J. Perry is a scholar at the American Enterprise Institute and a professor of economics and finance at the University of Michigan’s Flint campus.

This article was originally published on FEE.org. Read the original article.


Friday, April 21, 2017

Electronic Gaming Monthly – August 1997

Electronic Gaming Monthly – August 1997






Thursday, April 20, 2017

Hoggetowne Medieval Faire 2013 – Just Desserts

Hoggetowne Medieval Faire 2013 – Just Desserts



Just Desserts at the Hoggetowne Medieval Faire in Gainesville, Florida.

https://www.youtube.com/watch?v=K5RI7fl6swY

States Introduce Dubious Anti-Pornography Legislation to Ransom the Internet

States Introduce Dubious Anti-Pornography Legislation to Ransom the Internet

More than a dozen state legislatures are considering a bill called the “Human Trafficking Prevention Act,” which has nothing to do with human trafficking and all to do with one man’s crusade against pornography at the expense of free speech.

At its heart, the model bill would require device manufacturers to pre-install “obscenity” filters on devices like cell phones, tablets, and computers. Consumers would be forced to pony up $20 per device in order to surf the Internet without state censorship.  The legislation is not only technologically unworkable, it violates the First Amendment and significantly burdens consumers and businesses.

Perhaps more shocking is the bill’s provenance. The driving force behind the legislation is a man named Mark Sevier, who has been using the alias “Chris Severe” to contact legislators. According to the Daily Beast, Sevier is a disbarred attorney who has sued major tech companies, blaming them for his pornography addiction, and sued states for the right to marry his laptop.  Reporters Ben Collins and Brandy Zadrozny uncovered a lengthy legal history for Sevier, including an open arrest warrant and stalking convictions, as well as evidence that Sevier misrepresented his own experience working with anti-trafficking non-profits.

The bill has been introduced in some form Alabama, Florida, Georgia, Indiana, Louisiana, New Jersey, North Dakota, Oklahoma, South Carolina, Texas, West Virginia, and Wyoming (list here). We recommend that any legislator who has to consider this bill read the Daily Beast’s investigation.

But that’s not why they should vote against the Human Trafficking Prevention Act. They should kill this legislation because it’s just plain, awful policy.  Obviously, each version of the legislation varies, but here is the general gist.



Read EFF's opposition letter against H.3003, South Carolina's iteration of the Human Trafficking Prevention Act. 

Pre-installed Filters

Manufacturers of Internet-connected devices would have to pre-install filters to block pornography, including “revenge porn.” Companies would also have to ensure that all child pornography, “revenge pornography,” and “any hub that facilitates prostitution” are rendered inaccessible. Most iterations of the bill require this filtering technology to be turned on and locked in the on position, by default.

This is terrible for consumer choice because it forces people to purchase a software product they don’t necessarily want. It’s also terrible for free speech because it restrains what you can see. Because of the risk of legal liability, companies are more likely to over-censor, blocking content by default rather than giving websites the benefit of the doubt.  The proscriptions are also technologically unworkable: for example, an algorithm can hardly determine whether an item of pornography is “revenge” or consensual or whether a site is a hub for prostitution.

To be clear, unlocking such filters would not just be about accessing pornography.  A user could be seeking to improve the performance of their computer by deleting unnecessary software.  A parent may want to install premium child safety software, which may not play well with the default software. And, of course, many users will simply want to freely surf the Internet without repeatedly being denied access to sites mistakenly swept up in the censorship net.

A Censorship Tax

The model bills would require consumers to pay a $20 fee to unlock each of their devices to exercise their First Amendment rights to look at legal content. Consumers could end up paying a small fortune to unlock their routers, smartphones, tablets, and desktop computers.

Data Collection

Anyone who wants to unlock the filters on their devices would have to put their request in writing. Then they’d be required to show ID, be subjected to a “written warning regarding the potential dangers” of removing the obscenity filter, and then would have to sign a form acknowledging they were shown that warning. That means stores would be maintaining private records on everyone who wanted their “Human Trafficking” filters removed.

The Censorship Machine

The bill would force the companies we rely upon to ensure open access to the Internet to create a massive censorship apparatus that is easily abused.

Under the bill, tech companies would be required to operate call centers or online reporting centers to monitor complaints that a particular site isn’t included in the filter or complaints that a site isn’t being properly filtered. Not only that, but the bill specifically says they must “ensure that all child pornography and revenge pornography is inaccessible on the product” putting immense pressure on companies to aggressively and preemptively block websites to avoid legal liability out of fear of just one illegal or forbidden image making it past their filters. Social media sites would only be immune if they also create a reporting center and “remain reasonably proactive in removing reported obscene content.”

It’s unfortunate that the Human Trafficking Prevention Act has gained traction in so many states, but we're pleased to see that some, such as Wyoming and North Dakota, have already rejected it. Legislators should do the right thing: uphold the Constitution, protect consumers, and not use the problem of human trafficking as an excuse to promote this individual’s agenda against pornography.

Source: States Introduce Dubious Anti-Pornography Legislation to Ransom the Internet | Electronic Frontier Foundation

Taxes Are Worse than You Thought

Taxes Are Worse than You Thought

Taxes Are Worse than You Thought

We are quickly approaching the deadline for filing (and paying) our federal and state income taxes (extended to April 18 this year because of Emancipation Day), and that means it’s time for my annual post at tax time to help put things in perspective.

1. Some Historical Perspective. “In the beginning” when the US federal income tax was first introduced in 1913, it used to be a lot, lot simpler and a lot easier to file taxes; so easy in fact that it was basically like filling out your federal tax return on a postcard.



For example, page 1 of the original IRS 1040 income tax form from 1913 appears above. There were only four pages in the original 1040 form, including two pages of worksheets, the actual one-page 1040 form above, and only one page of instructions (view all four pages here). In contrast, just the current 1040 instructions for 2016, without any forms, runs 106 pages.

Individual federal income tax rates started at 1% in 1913, and the maximum marginal income tax rate was only 7% on incomes above $500,000 (more than $12 million in today’s dollars). The personal exemption in 1913 was $3,000 for individuals ($72,850 in today’s dollars) and $4,000 for married couples ($97,000 in today’s dollars), meaning that very few Americans had to pay federal income tax since the average income in 1913 was only about $750. The Tax Foundation has historical federal income tax rates for every year between 1913 and 2013 here for tax brackets expressed in both nominal dollars and inflation-adjusted dollars.

2. Tax Graphic of the Day (above). Some more historical perspective…

3. Opportunity Cost. In a 2012 report to Congress (most recent data available), the National Taxpayer Advocate estimated that American taxpayers and businesses spend 6.1 billion hours every year complying with the income tax code, based on IRS estimates of how much time taxpayers (both individual and businesses) spend collecting data for, and filling out their tax forms. In addition, Americans will spend an estimated $10 billion for the services of tax preparation firms and $2 billion on tax-preparation software programs like TurboTax that still require many hours of time.

The amount of time spent on income tax compliance – 6.1 billion hours – would be the equivalent of more than 3 million Americans working full-time, year-round (or 2.1% of total US payrolls of 145.9 million). By way of comparison, the federal government currently employs 2.8 million full-time workers, and Wal-Mart, the world’s largest private employer, currently employs 2.2 million workers worldwide and 1.3 million workers in the US (both full-time and part-time). At the current average hourly wage of $21.90 an hour, the dollar value of the opportunity cost associated with tax filing would be more than $131 billion, slightly more than the 2016 GDP of Washington, D.C. ($127 billion).

As T.R. Reid pointed out recently in a New York Times op-ed, it really doesn’t have to be that way. For example:
In Japan, you get a postcard in early spring from Kokuzeicho (Japan’s IRS) that says how much you earned last year, how much tax you owed, and how much was withheld. If you disagree, you go into the tax office to work it out. For nearly everybody, though, the numbers are correct, so you never have to file a return.

4. Tax Progressivity. And just how progressive is the US federal income tax system? Very, very progressive, see the chart above showing average effective tax rates by various income groups in 2014 (most recent year available). That pattern of income tax progressivity explains why almost all federal income taxes are paid by the top income groups (see next few items).

5. Tax Progressivity and Tax Burden. According to the most recent IRS data, the federal income tax shares by six different income groups are displayed in the chart above. Almost all federal income taxes (97.3%) are paid by the top 50%, more than 2/3 of income taxes are paid for by the top 10% and nearly 40% of taxes are paid by the top 1% of taxpayers. For all of the criticism and negative publicity the “Top 1%” get, I’d like to personally thank that group this year at tax time for shouldering such a disproportionate share of our collective tax burden. It’s a form of “disparate impact” on the 1% that we all benefit from! So, I say “Thank You Top 1%” from all of us in the bottom 99% for your valuable and significant contribution to our nation’s tax burden.

 

6. Tax Burden of the Top 1% vs. the Bottom 95%. The chart above gives us another perspective on the tax burden of the top 1% over time, and compares the tax share of that group to the tax burden of the bottom 95% in every year between 1980 and 2014 (most recent year available). In 2014, the top 1% earned 20.6% of the total income reported to the IRS and paid 39.4% of all federal income taxes collected ($543 billion). The bottom 95% of US taxpayers earned 64% of total income (almost three times as much as the top 1%) and paid only 40.5% of the total income taxes collected ($550 billion). So once again, to the 1.395 million taxpayers in the top 1%, I say “Thank You” for paying almost as much in federal income taxes in 2013 as the 132.6 million taxpayers in the bottom 95% by income.

7. Bowling vs. Taxes. Speaking of the progressivity of income taxes, here’s a thought about the way we tax income vs. the way we score bowling. Under the scoring rules of bowling, you get rewarded, not penalized, for being successful. If you get a spare, the scoring system rewards you by adding the pins from the next ball into the current frame, and if you get a strike you get rewarded by adding your next 2 balls into the current frame.

Under our progressive income tax system with seven tax rates in 2015 increasing from 10% to 39.6%, you get penalized, not rewarded, for being successful, productive and entrepreneurial, because the more you earn, the higher the tax rate you pay. The top marginal income tax rate has been as high as 91% in the 1950s and 1960s, and 70% in the 1970s. If we scored bowling the way we tax income, we would subtract, not add pins for a spare or strike, i.e., penalize successful bowling. If we taxed income the way we score bowling, we would have lower, not higher, tax rates on our most successful income-earners.

8. Coincidence? Why are Tax Day (April 15) and Voting Day (first Tuesday in November) so far apart? Couldn’t we move Tax Day to the first Monday in November, or Voting Day to the first Tuesday following April 15?

9. What’s in a Name? Why do we call the IRS a “service?” Couldn’t it have been named a department like Labor, a bureau like the BLS or the FBI, a commission like the FTC, an administration like FDA, an agency like EPA, etc.?

10. 20 Inspirational Quotes about Taxes from Forbes, here are a few good ones:
“The taxpayer: that’s someone who works for the federal government, but doesn’t have to take a civil service examination.” – Ronald Reagan

“We have what it takes to take what you have.” – Suggested IRS Motto 

“It is a paradoxical truth that tax rates are too high today and tax revenues are too low, and the soundest way to raise the revenues in the long run is to cut the tax rates.” – John F. Kennedy

I am proud to be paying taxes in the United States. The only thing is I could be just as proud for half of the money.” – Arthur Godfrey

“A liberal is someone who feels a great debt to his fellow man, which debt he proposes to pay off with your money.” – G. Gordon Liddy
Happy Tax Day!

Republished from AEI.



Mark J. Perry
Mark J. Perry is a scholar at the American Enterprise Institute and a professor of economics and finance at the University of Michigan’s Flint campus.

This article was originally published on FEE.org. Read the original article.

The Bill of Rights at the Border: Fifth Amendment Protections for Account Passwords and Device Passcodes

The Bill of Rights at the Border: Fifth Amendment Protections for Account Passwords and Device Passcodes



This is the third and final installment in our series on the Constitution at the border. Today, we’ll focus on the Fifth Amendment and passwords. Click here for Part 1 on the First Amendment or Part 2 on the Fourth Amendment.

Lately, a big question on everyone's mind has been: Do I have to give my password to customs agents?

As anyone who’s ever watched any cop show knows, the Fifth Amendment gives you the right to remain silent and to refuse to provide evidence against yourself – even at the border. If a CBP agent asks you a question, you can tell them you choose to remain silent and want to speak to an attorney, even if you don’t have one retained yet. That choice may not stop CBP agents from pressuring you to “voluntarily” talk to them, but they are supposed to stop questioning you once you ask for a lawyer. Also, beware that government agents are permitted to lie to you in order to convince you to waive your right to remain silent, but you can be criminally prosecuted if you lie to them.

CBP agents are unlikely to advise you that you have this choice because the government generally argues that such warnings are only required if you are taken into “custody” and subjected to a criminal prosecution. And at least one federal court of appeals has determined that secondary inspection – the separate interview area you get referred to if the CBP officer can’t readily verify your information at the initial port of entry – doesn’t qualify as “custody.”

But you don’t have to be in custody or subject to a criminal prosecution before you choose to invoke your Fifth Amendment rights to remain silent or to object to being deprived of your property without due process of law. For example, the Second Circuit Court of Appeals has held that a person’s request for an attorney is enough to invoke the privilege against self-incrimination, even at the border.

And that privilege includes refusing to provide the password to your device. For example, in 2015, a Pennsylvania court held that you may properly invoke the Fifth Amendment privilege to avoid giving up your cell phone passcode – even to an employer’s phone – because your passcode is personal in nature and producing it requires you to speak or testify against yourself.

Some courts have been less protective, overriding Fifth Amendment protections where the information sought is a so-called “foregone conclusion.” In 2012, a Colorado court ordered a defendant to provide the password to her laptop, only after the government had obtained a search warrant based on the defendant’s admission that there was specific content on her laptop and that the laptop belonged to her. On appeal, the Eleventh Circuit clarified that the government "must [first] show with some reasonable particularity that it seeks a certain file and is aware, based on other information, that . . . the file exists in some specified location" and that the individual has access to the desired file or is capable of decrypting it.

So, Fifth Amendment protections do apply at the border, and they protect your right to refuse to reveal your password in most circumstances. That said, individuals passing through the border sometimes choose to surrender their account information and passwords anyway, in order to avoid consequences like missing their flight, being made subject to more constrictive or prolonged detention, or being denied entry to the US.

As we have noted in our Digital Border Search Whitepaper, the consequences for refusing to provide your password(s) are different for different classes of individuals. If you are a U.S. citizen, CBP cannot detain you indefinitely as you have a right to re-enter the country. However, agents may escalate the encounter (for example, by detaining you for more time), or flag you for heightened screening during future border crossings. If you are a lawful permanent resident, agents may also raise complicated questions about your continued status as a resident. If you are a foreign visitor, agents might deny you entry to the country entirely.

But whatever your status, whether you choose to provide your passwords or not, border agents may decide to seize your digital devices. While CBP guidelines set a five-day deadline for agents to return detained devices unless a CBP supervisor approves a lengthier detention, in practice, device detentions commonly last many months.

Source: The Bill of Rights at the Border: Fifth Amendment Protections for Account Passwords and Device Passcodes | Electronic Frontier Foundation

Wednesday, April 19, 2017

Antic – September 1986

Antic – September 1986








Monday, April 17, 2017

This State Really Doesn’t Want Its Residents to Know the Law

This State Really Doesn’t Want Its Residents to Know the Law

This State Really Doesn't Want Its Residents to Know the Law

A “legitimate” government cannot exist without first deriving its power from the consent of the governed.

This pillar of classical liberalism is so integral to the Lockean vision of a free society, it has historically been recognized as one of the central issues that caused the American colonists to rise to action, and mutually pledge their lives, fortunes, and sacred honors to declaring independence from the world’s most powerful government.

But there is more to the maxim of “government by consent” than just the idea of a representative legislature. In order for individuals to be punished for breaking a law they’ve tacitly “consented” to, they must first understand that there is a law in which to be broken.

Unfortunately, one Georgia resident has learned the hard way that governments have a history of keeping citizens in the dark and then punishing them for breaking crimes they were unaware existed.

Arbitrary Rule





It is difficult to imagine what it might be like to live under a dictatorship, where laws are created and passed in secret, and citizens are left in the dark, hoping they are not guilty of violating whatever new statute was just enacted behind closed doors.

However, while the above scenario may be an extreme case, to some extent this is exactly what is currently happening across the country.

Just weeks ago in Florida, a father spending spring break on the beach with his family was fined $25 dollars for using metal sand tools on Panama City Beach, a law he had no idea he was breaking.

When this long-time resident of Panama City Beach asked law enforcement if he could see the actual text of the statute he was breaking, the officer on the scene immediately called for backup and threatened the father with jail time.

This is, unfortunately, not an isolated instance of the state penalizing individuals for breaking laws they did not know they were committing, and then denying these citizens the right to actually see these legal codes firsthand.

By allowing the state to punish individuals for an act committed without foreknowledge of wrongdoing or any proof of criminal intent, the entire justice system loses one of its primary components of the right to due process. After all, how can one commit a crime they had no knowledge they were committing? How is this a manifestation of rule by consent?

In Georgia, the potential to become an accidental criminal is rather high, since residents aren’t even allowed to see copies of legal code without first applying for a license and paying a hefty fine to the state. And even then, what residents are provided with doesn’t exactly explain the law in full.

An Unconventional Hero

Carl Malamud, founder of public.research.org, has been giving Georgia lawmakers a run for their money for years. As a long-time open records advocate, Malamud has dedicated his time to ensuring that the people of Georgia have access to every single law in the state, including the annotated copies, something that has recently gotten him into hot water with the state.

For students of the law or anyone doing legal research, annotated copies of legal texts are extremely helpful as they provide further insight into each law. Annotations may include a backstory or judicial opinion regarding the law and will often cite which laws preceded and followed the law in question. All this information is extremely valuable to those defending themselves against the state.

Unfortunately in Georgia, in order to gain access to the complete and official compilation of the state’s laws, residents, like Malamud, are required to pay the state $1,207.02 for access to a hardcopy version. The state has promised to unveil a more “affordable” version that can be printed from LexusNexus for only $400 (what a bargain).

As an activist who believes that every person should have access to the laws they allegedly consented to follow, Malamud has spent countless hours scanning copies of the annotated version Georgia’s law. He then copied those annotated files to USB drives, which were then sent out to local lawmakers as well as other prominent members of the community.

Each USB drive was sent in an envelope with an enclosed letter which stated:
"Access to the law is a fundamental aspect of our system of democracy, an essential element of due process, equal protection, and access to justice.”
Of course, recipients of Malamud’s envelopes were given fair warning of its contents just by glancing at the colorful packages, as each contained the words: “UNIMPEACHABLE,” on the front and featured pictures Georgia peaches and American flags and the phrase, “code is law.”

However, some of the government recipients of Malamud’s letter were less than impressed.

In a written response sent to Malamud, chairman of Georgia's Code Revision Commission, Josh McKoon stated:
"Your unlawful copying... Infringes on the exclusive copyright of the state of Georgia, Accordingly, you are hereby notified to CEASE AND DESIST ALL COPYRIGHT INFRINGEMENT."
When Life Gives you Peaches...

While this seems almost too far-fetched to believe, the government of Georgia was so infuriated that Malamud would dare disseminate annotated copies of the law for others to read, they pursued legal action against his organization, public.research.org.

Malamud was ordered to destroy all physical files and remove all information regarding the annotated law from his organization’s website within ten days, or face legal consequences.

While the state of Georgia had already “won” in the legal sense, it continued to pursue legal action against Malamud, suing him in federal court.

The state of Georgia claims that there is no substance to Malamud’s complaints since technically the law is already available to the public for free online.

Malamud has, in turn, questioned the state of Georgia’s definition of “free,” since before even the non-annotated legal codes can be viewed online, users must agree to a list of restrictions as well as agree to two separate terms of use.

Among these terms is a stipulation that states that any of the information found is prohibited from being copied and cannot be cited in any newspaper or “articles.”In other instances, those wishing to view the law must even apply for a license.

Unfortunately for Malamud, the judge ruled in favor of the state of Georgia.

When it comes to intellectual property laws, the federal government is prohibited from copyrighting texts, such as laws, for example. However, states are allowed to copyright text, especially if a private company is involved—like LexusNexus.

Since LexusNexus, a private company, provided the annotations for the state online, the judge viewed these additional notes as “value added material” and not necessary to the understanding of the law and thus, found Malamud in violation of the Copyright Act.

But the judge didn’t stop his criticism of Malamud there. Adding insult to injury he accused Malamud’s website of engaging in commercial copying of materials—various laws— which is illegal for a non-profit organization like Public.Resource.Org.

The state has also continued to go after Malamud and his organization for any other offense they can manage to find. Recently Malamud was served with an injunction as a result of what one source calls, “publishing technical and scientific standards that have been incorporated into laws.”

Consent Is a Two-Way Street

The term consent itself implies that something has been agreed upon by two or more persons acting of their own free will.

In criminal law,  this means that a law cannot actually be broken if the accused had no foreknowledge that the act in question was in fact, illegal. However, if citizens are prohibited from accessing the law, how are they to know when they may be breaking a law?

The legal principle known as mens rea, Latin for “guilty mind,” explains that for guilt to be determined, criminal intent must first be demonstrated.

In other words, unless the individual in question had foreknowledge of the law they are accused of breaking, they cannot be held responsible for its violation.

To punish an individual for breaking a law of which they had no prior knowledge would be contrary to a political system built on the precept of consent by the governed.

And yet, in spite of our nation’s tradition of rule by consent, the state of Georgia has gone to extreme lengths to keep its own state laws hidden from the people, and has even gone after those who have attempted to give this information to the people.

As of now, all the legal text in question has been removed from Malamud’s site and has instead been replaced with the following:
“Your access to this document, which is a law of the United States of America, has been temporarily disabled while we fight for your right to read and speak the laws by which we choose to govern ourselves as a democratic society. To apply for a license to read this law, please consult the Code of Federal Regulations or applicable state laws and regulations for the name and address of a vendor... Thank you for your interest in reading the law."

Brittany Hunter
Brittany Hunter is an associate editor at FEE. Brittany studied political science at Utah Valley University with a minor in Constitutional studies.

This article was originally published on FEE.org. Read the original article.

Wednesday, April 12, 2017

Everything You Need to Know about Dollar-Denominated Cryptocurrencies

Everything You Need to Know about Dollar-Denominated Cryptocurrencies

Everything You Need to Know about Dollar-Denominated Cryptocurrencies

A well-known obstacle to the greater popularity of Bitcoin as a medium of payment is the high volatility of its exchange value. This volatility results from its built-in quantity commitment: because the number of Bitcoins in existence stays on a programmed path, variations in the real demand to hold Bitcoin must be accommodated entirely by variations in its unit value. When demand goes up, there is no quantity increase to dampen the rise in price; and vice-versa for a fall in demand.

Not surprisingly, several cryptocurrency developers have thought of creating a cryptocurrency with a price commitment–namely a pegged exchange rate with the US dollar–rather than a quantity commitment, in hopes of greater popularity. The aim is to create a system in which dollar-denominated payments can be made with the ease, security, and low cost of Bitcoin payments, but without the exchange-rate risk.

New Digital Assets





The development of “Blockchain 2.0” platforms has enabled the launching of a variety of new digital assets, including such dollar-pegged (and euro-pegged and gold-pegged) currencies. As we will see, the histories of early (2014-2016) dollar-pegged cryptocurrencies show a series of flops. But one project, Tether, has become a late-blooming success.

Tether had $55 million in circulation as of March 29, 2017, making it the #13 largest cryptocurrency. To keep this size in perspective, a brick-and-mortar US institution with $55 million in deposits is a tiny bank or a mid-size credit union, and Tether is currently only 1/300th the size of Bitcoin.

The Tether white paper explains in more detail the motivation for developing a dollar-pegged cryptocurrency by listing advantages to individuals using it for dollar-denominated transactions rather than using dollars held in “legacy bank” accounts:
  • Transact in USD/fiat value, pseudonymously, without any middlemen/intermediaries
  • Cold store USD/fiat value by securing one’s own private keys
  • Avoid the risk of storing fiat on [cryptocurrency] exchanges–move crypto­fiat in and out of exchanges easily
  • Avoid having to open a fiat bank account to store fiat value
In sum, “Anything one can do with Bitcoin as an individual one can also do with” a dollar-pegged cryptocurrency, namely, “avoid credit card [or debit card] fees,” maintain greater privacy, “remit payments globally” more cheaply, and access blockchain financial services.

But what is the claimed advantage over using Bitcoin? It is the expectation of wider acceptance in payments, because of the advantages to merchants of accepting a dollar-pegged cryptocurrency over accepting Bitcoin in a US-dollar-dominated economy:
  • Price goods in USD/fiat value rather than Bitcoin (no moving conversion rates/purchase windows)
  • Avoid conversion from Bitcoin to USD/fiat and associated fees and processes
The Flops

First we consider the projects that have flopped. Three projects were launched in September 2014: CoinoUSD, NuBits, and BitUSD. Their pegging mechanisms were different, and are difficult to describe briefly (partly because they were not all entirely transparent), but two common features are important to note.
  • The rate-pegging mechanisms were not programmed into a source code, like Bitcoin’s quantity commitment, but relied on non-programmed policy actions by a trusted central authority.
  • None used the traditional currency pegging method of having the issuer hold reserves in physical dollars or dollar-denominated debt securities. (On the NuBits mechanism see this critique by a BitUSD promoter. On the BitUSD mechanism see this critique by the CoinoUSD developer.)
We can examine the fortunes of each project by looking at its price and “market capitalization” (value-in-circulation) history on the cryptocurrency tracking site CoinMarketCap.com.

CoinoUSD

CoinoUSD, which began trading in December 2014, was developed by a for-profit payments firm called Coinomat and built on the blockchain of the NXT cryptocurrency. (In November 2014 NXT was the #6 cryptocurrency with a market cap of $19 million; currently it ranks #38 with a market cap around $13 million.)

CoinoUSD reached a market cap plateau of $2.7 million in early 2016, but shut down in early 2016, due to a “payout glitch” that flooded customers with free CoinoUSD units, making it impossible to maintain the exchange value at $1. Coinomat announced a reboot in which the erroneous payout would be reversed and said, “NXTUSD will replace CoinoUSD completely, and enhance it,” but this appears not to have happened. Since then it has had a market cap of zero, and its webpage at the Coinomat site declares it “disabled until further notice.”



NuBits

The history of NuBits, also a for-profit enterprise, shows that it gained only a similarly small market foothold. Its market cap plateaued early on below $2.5 million, and since April 2015 has remained below $1 million. In June 2016 NuBits had a devaluation crisis, with the price falling to 20 cents. Its rate-pegging intervention mechanism, despite claiming many layers of reinforcement, was not robust and failed.

Although the price later returned to par, today NuBits shows very little market activity. Since January 2017 the market cap has hovered around only $135,000, with daily trading volume in the neighborhood of $2,000.



BitUSD

BitUSD is built on the blockchain platform of the cryptocurrency BitSharesX. Its highest market cap plateau was around $1 million soon after introduction, but it fell to below $200,000 in April 2015 and is currently less than $110,000.



BitUSD uses a novel pegging system that so far has proven robust. A piece promoting BitUSD emphasizes that “the bitUSD is an asset that is not backed by real dollars in someone’s bank account.” (It claims this a virtue: “We cannot trust anyone to hold and secure a physical asset so that people can redeem it eventually. History has repeatedly shown: It doesn’t work!” In fact, history shows the major banks in unhampered banking systems routinely justifying the public’s trust by redeeming their liabilities on demand for decades. Paypal works on the same supposedly non-working model, backed by Paypal’s dollar deposits at Wells Fargo Bank.)

By contrast, BitUSD are created through collateralized forward currency contracts. The network provides an escrow service that credibly ensures repurchase (or “redemption”) of the BitUSD at or near par. Someone who wants to acquire BitUSD, say in order to buy from a seller who prefers a dollar-denominated medium of exchange, offers a contract: so many BitShares (hereafter BTS) for a certain amount of new BitUSD.

Under the BitShare network rules, the acquirer must not only pay at the outset in BTS but also agree to post collateral in BTS equal to the value of the bid. If the bid is accepted by another network participant, explains the BitUSD white paper, “the collateral and purchase price are held by the network until the BitUSD is redeemed” by some third party repurchasing it. The acquirer of BitUSD thus puts 200% collateral into a contract “that only allows access to these BTS when the BitUSD are paid back.” In effect the acquirer is shorting the dollar price of BTS.

Note that the new BitUSD units are initially 200% collateralized not in dollar-denominated assets, but in BTS. If BTS fall 25% or more against the dollar, such that the value of the BTS collateral declines to 150% or less of the value to be repaid, under the network rules redemption can be compelled by any BitShares miner who “enforces a margin call.” (It should be noted that to enforce the collateral rules, the BitShares network relies on trusted human agents to inform it about the current $ price of BTS.)

The system then “uses the backing BitShares to repurchase the BitUSD…thereby redeeming it.” Conversion back into dollars is thus not always at the initiative of the holder, as it is for a holder of ordinary demandable bank liabilities. Instead, a BitUSD holder faces a risk of “forced settlement.” If the value of BTS falls so quickly “that the margin is insufficient, then the market price of the BitUSD may fall slightly below parity for a short time if there is insufficient demand for BitUSD relative to the supply of sellers.”

The white paper concludes: “The critical thing to understand is that BitUSD is an asset used to hedge a position in BitShares against changes in the price of USD and is not supposed to have an exact 1:1 exchange rate with USD.” A close look at the chart indeed shows that the price of 1BitUSD has not been exactly $1. It has vibrated around $1 but has not experienced any lasting devaluation. Nonetheless, its clientele has declined and is currently small. No doubt this reflects in part the declining popularity of BTS, its market cap having fallen from more than $60 million in September 2014 to around $15 million today.

The Success: Tether

Now to the success story. Tether was launched in February 2015. In contrast to the previous contenders, as the chart shows, it started slowly and has grown in market cap. The series of discrete steps in its market cap path indicates that there have been a series of large purchases.

The most recent step, on Wednesday, March 29, 2017, raised the value in circulation to $55 million from $45 million. Logically these are not speculative position-takings because there are no capital gains to be had so long as the price per tether remains solidly pegged (or “tethered”) to $1. And Tether has in fact successfully maintained a steady peg throughout its history with only one small and brief blip. The steps are presumably big acquisitions for transaction use. Transactions volume in recent weeks has been running mostly in the neighborhood of at $20-40 million per day.



Tether transfers are executed using the Bitcoin blockchain. Tether’s pegging mechanism is also not programmed into a source code, but it is the traditional one: the issuer holds dollar-denominated reserve assets and pledges to redeem Tethers on demand. (Euro-Tethers have recently been introduced, but I focus here on dollar-Tethers.)

According to the official FAQ, “Tether Platform currencies are 100% backed by actual fiat currency assets in our reserve account. Tethers are redeemable and exchangeable pursuant to Tether Limited’s terms of service. The conversion rate is 1 tether USD₮ equals 1 USD.”

The parent Tether firm, in other words, operates like a currency board: It holds 100%+ dollar-asset backing, and passively swaps Tethers for dollars and back again. Like a currency board, it can earn interest income by holding some of its dollar-denominated assets in interest-bearing form.

The Tether white paper reveals that Tether’s dollar reserves are currently held in accounts at two major Taiwanese commercial banks: Cathay United Bank and Hwatai Bank. (Why these particular banks? “They also provide banking services to some of the largest Bitcoin exchanges globally,” they are okay with Tether’s business model, and they are experienced at compliance with Know-Your-Customer and Anti-Money-Laundering regulations.)

It adds that “additional banking partners are being established in other jurisdictions” to reduce political risk of the accounts being frozen. Tether is thus not a “100% reserve” institution in the sense of a money warehouse holding 100% literal cash reserves (which would mean Federal Reserve notes in a vault).

How does a potential purchaser of Tether verify the 100% backing claim? The website declares: “Our reserve holdings are published daily and subject to frequent professional audits. All tethers in circulation always match our reserves.”

A web page does give dollar values for assets and liabilities but does not identify the auditors or provide copies of the audit reports, so the claim of being “fully transparent” is somewhat exaggerated. The transparency is as great as that of historical note-issuing banks, however. And perhaps the important test of trustworthiness is that Tethers have in practice been redeemed every day at par for about two years.

Competition as a Market Referendum

Dollar-pegged cryptocurrencies, by contrast to Bitcoin, separate blockchain-secured payments from the speculative holding of an irredeemable private currency. Thus they provide a potential window for learning how much of the demand for cryptocurrencies is transactional, and how much is speculative.

The competition among dollar-pegged cryptocurrencies provides something of a market referendum on the relative credibility of alternative pegging arrangements. The much larger size achieved by Tether suggests (though not definitively, because other factors are also in play) a popular verdict that its pegging mechanism is more credible than those of CoinoUSD, Nubits, or BitUSD. It will be interesting to watch Tether’s progress from this point on and to observe whether its model is copied by other entrants.

Reprinted from the Cato Institute.



Lawrence H. White
Lawrence H. White is Professor of Economics at George Mason University and The Freeman contributor.  He previously taught at New York University, the University of Georgia, and the University of Missouri – St. Louis. He is a member of the FEE Faculty Network.

This article was originally published on FEE.org. Read the original article.

Monday, April 10, 2017

Review: Popful Mail (Sega CD)

Review: Popful Mail (Sega CD)






The X-Files is back again (sort of) with new spin-off

The X-Files is back again (sort of) with new spin-off


It seems you may have to listen to the skies on this occasion, as David Duchovny and Gillian Anderson will lend their voices as Mulder and Scully for a new audio spin-off on Audible.


The X-Files: Cold Cases will be set before the events of the recent revival series, providing more backstory on the events we saw.


Pre-order now!


Woodrow Wilson Made the World Unsafe for Democracy

Woodrow Wilson Made the World Unsafe for Democracy

Woodrow Wilson Made the World Unsafe for Democracy

This week is the 100th anniversary of President Woodrow Wilson’s speech to Congress seeking a declaration of war against Germany. Many people celebrate this centenary of America’s emergence as a world power. But, when the Trump administration is bombing or rattling sabers at half a dozen nations while many Democrats clamor to fight Russia, it is worth reviewing World War One’s high hopes and dire results.

Lies, Censorship, and Poison 

Wilson was narrowly re-elected in 1916 based on a campaign slogan, "He kept us out of war." But Wilson had massively violated neutrality by providing armaments and money to the Allied powers that had been fighting Germany since 1914. In his war speech to Congress, Wilson hailed the U.S. government as "one of the champions of the rights of mankind" and proclaimed that "the world must be made safe for democracy."

American soldiers fought bravely and helped turn the tide on the Western Front in late 1918. But the cost was far higher than Americans anticipated. More than a hundred thousand American soldiers died in the third bloodiest war in U.S. history. Another half million Americans perished from the Spanish flu epidemic spurred and spread by the war.

In his speech to Congress, Wilson declared, "We have no quarrel with the German people" and feel "sympathy and friendship" towards them. But his administration speedily commenced demonizing the "Huns." One Army recruiting poster portrayed German troops as an ape ravaging a half-naked damsel beneath an appeal to "Destroy this mad brute."

Wilson acted as if the congressional declaration of war against Germany was also a declaration of war against the Constitution. Harvard professor Irving Babbitt commented in 1924: "Wilson, in the pursuit of his scheme for world service, was led to make light of the constitutional checks on his authority and to reach out almost automatically for unlimited power." Wilson even urged Congress to set up detention camps to quarantine "alien enemies."

Wilson unleashed ruthless censorship of any criticism. Anyone who spoke publicly against military conscription was likely to get slammed with federal espionage or sedition charges. Possessing a pamphlet entitled Long Live the Constitution of the United States earned six months in jail for a Pennsylvania malcontent. Censorship was buttressed by fanatic propaganda campaigns led by the Committee on Public Information, a federal agency whose shameless motto was "faith in democracy... faith in fact."

The war enabled the American equivalent of the Taliban to triumph on the home front. Prohibition advocates "indignantly insisted that... any kind of opposition to prohibition was sinister and subversively pro-German," noted William Ross, author of World War 1 and the American Constitution. Even before the 18th Amendment (which banned alcohol consumption) was ratified, Wilson banned beer sales as a wartime measure. Prohibition was a public health disaster; the rate of alcoholism tripled during the 1920s.

To punish lawbreakers, the federal government added poisons to industrial alcohol that was often converted into drinkable hooch; ten thousand people were killed as a result. Professor Deborah Blum, the author of The Poisoner's Handbook, noted that "an official sense of higher purpose kept the poisoning program in place."

Hell's Dirtiest Work

The war provided the pretext for unprecedented federal domination of the economy. Washington promised that "food will win the war" and farmers vastly increased their plantings. Price supports and government credits for foreign buyers sent crop prices and land prices skyrocketing. However, when the credits ended in 1920, prices and land values plunged, spurring massive bankruptcies across rural America. This spurred perennial political discontent that helped lead to a federal takeover of agriculture by the Roosevelt administration in the 1930s.

World War One was ended by the Treaty of Versailles, which redrew European borders willy-nilly and imposed ruinous reparations on Germany. One of Wilson’s top aides at the peace talks, Henry White, lamented: "We had such high hopes of this adventure; we believed God called us and now we are doing hell’s dirtiest work."

Wilson had proclaimed 14 points to guide peace talks; instead, there were 14 separate small wars in Europe towards the end of his term–after peace had been proclaimed. Millions of Irish Americans were outraged that, despite Wilson’s bleatings about democracy, Britain brutally repressed Ireland during and after the war. The League of Nations, which Wilson championed in vain, was so smarmily worded that it could have obliged the U.S. to send troops to help Britain crush the burgeoning Irish independence movement.

The chaos and economic depression sowed by the war and the Treaty of Versailles helped open the door to some of the worst dictators in modern times, including Germany’s Adolf Hitler, Italy’s Benito Mussolini, and Vladimir Lenin–whom Wilson intensely disliked because "he felt the Bolshevik leader had stolen his ideas for world peace," as historian Thomas Fleming noted in his 2003 masterpiece, The Illusion of VictoryAmerica in World War 1.

Despite winning the war, Wilson’s Democratic Party was crushed at the polls in both 1918 and 1920. H.L. Mencken wrote on the eve of the 1920 election that Americans were sickened of Wilsonian "idealism that is oblique, confusing, dishonest, and ferocious."

Have today’s policymakers learned anything from the debacle a century ago? Wilson continues to be invoked by politicians who believe America can achieve great things by warring abroad. The bellicosity of both Republican and Democratic leaders is a reminder that Wilson also failed to make democracy safe for the world.

Reprinted from USA Today.



James Bovard

James Bovard is the author of ten books, including Public Policy Hooligan, Attention Deficit Democracy, and Lost Rights: The Destruction of American Liberty. Find him on Twitter @JimBovard.

This article was originally published on FEE.org. Read the original article.


Friday, April 7, 2017

Firearms Technology and the Original Meaning of the Second Amendment

Firearms Technology and the Original Meaning of the Second Amendment


Firearms Technology and the Original Meaning of the Second Amendment

Gun-control advocates often argue that gun-control laws must be more restrictive than the original meaning of the Second Amendment would allow, because modern firearms are so different from the firearms of the late 18th century. This argument is based on ignorance of the history of firearms. It is true that in 1791 the most common firearms were handguns or long guns that had to be reloaded after every shot. But it is not true that repeating arms, which can fire multiple times without reloading, were unimagined in 1791. To the contrary, repeating arms long predate the 1606 founding of the first English colony in America. As of 1791, repeating arms were available but expensive.

This article explains why the price of repeating arms declined so steeply. Then it describes some of the repeating arms that were already in use when the Second Amendment was ratified, including the 22-shot rifle that was later carried on the Lewis and Clark expedition.

James Madison and Firearm Innovation





One of the men to credit for why repeating arms became much less expensive during the 19th century is James Madison, author of the Second Amendment. During Madison’s presidency (1809-17), Secretary of War James Monroe (who would succeed Madison as president), successfully promoted legislation to foster the development of firearms technology. In particular, the federal armories at Springfield, Mass., and Harpers Ferry, Va., were ordered to invent the means of producing firearms with interchangeable parts.

To function reliably, repeating firearms must have internal components that fit together very precisely — much more precisely than is necessary for single-shot firearms. Before President Madison and Secretary Monroe started the manufacturing revolution, firearms were built one at a time by craftsmen. Making a repeating arm required much more time and expertise than making a single-shot firearm. How to make repeating arms was well-known, but making them at a labor cost the average person could afford was impossible.

Thanks to the technology innovation labs created at Springfield and Harpers Ferry, inventors found ways to manufacture firearms components at a higher rate, and with more consistency for each part. Instead of every part being made by hand, parts were manufactured with machine tools (tools that make other tools). For example, the wooden stocks for rifles could be repetitively manufactured with such precision that any stock from a factory would fit any rifle from the factory, with no need for craftsmen to shave or adjust the stock.

In New England, the Springfield Armory worked with emerging machinists for other consumer products; the exchange of information in this technology network led directly to the Connecticut River Valley becoming a center of American consumer firearms manufacture, and to rapid improvements in the manufacture of many other consumer durables. The story is told in: Ross Thomson, Structures of Change in the Mechanical Age: Technological Innovation in the United States 1790-1865 (2009); Alexander Rose, American Rifle: A Biography (2008); David R. Meyer, Networked Machinists: High-Technology Industries in Antebellum America (2006); David A. Hounshell, From the American System to Mass Production, 1800-1932 (1985);  Merritt Roe Smith, Harpers Ferry Armory and the New Technology: The Challenge of Change (1977); Felicia Johnson Deyrup, Arms Makers of the Connecticut Valley: A Regional Study of the Economic Development of the Small Arms Industry, 1798-1870 (1948). By the 1830s, manufacturing uniformity was sufficiently advanced that repeating arms were becoming widely affordable, and no longer just for the wealthy.

Centuries of Repeating Arms

What kind of repeating arms were available before 1815, when the Madison-Monroe mass production innovation program began? The state of the art was the Girandoni air rifle, invented around 1779 for Austrian army sharpshooters. Lewis and Clark would carry a Girandoni on their famous expedition, during the Jefferson administration. The Girandoni could shoot 21 or 22 bullets in .46 or .49 caliber without reloading. Ballistically equal to a firearm, a single shot from the Girandoni could penetrate a one-inch wood plank, or take an elk. (For more on the Girandoni, see my article “The History of Firearms Magazines and Magazine Prohibitions,” 88 Albany L. Rev. 849, 852-53 (2015).)

The first repeaters had been invented about three centuries before. The earliest-known model is a German breech-loading matchlock arquebus from around 1490-1530 with a 10-shot revolving cylinder. M.L. Brown, Firearms in Colonial America: The Impact on History and Technology, 1492-1792, 50 (1980). Henry VIII had a long gun that used a revolving cylinder (a “revolver”) for multiple shots. W.W. Greener, The Gun and Its Development, 81-82 (9th ed. 1910). A 16-round wheel lock dates from about 1580. Kopel, at 852.

Production of repeaters continued in the seventeenth century. Brown, at 105-6 (four-barreled wheel-lock pistol could fire 15 shots in a few seconds); John Nigel George, English Guns and Rifles, 55-58 (1947) (English breech-loading lever-action repeater, and a revolver, made no later than the British Civil War, and perhaps earlier, by an English gun maker).

The first repeaters to be built in large quantities appear to be the 1646 Danish flintlocks that used a pair of tubular magazines, and could fire 30 shots without reloading. Like a modern lever-action rifle, the next shot was made ready by a simple two-step motion of the trigger guard. These guns were produced for the Danish and Dutch armies. Brown, at 106-7.

In Colonial America, repeating arms were available for people who could afford them, or who were skilled enough to make their own. For example, in September 1722, John Pim of Boston entertained some Indians by demonstrating a firearm he had made. Although “loaded but once,” it “was discharged eleven times following, with bullets in the space of two minutes each which went through a double door at fifty yards’ distance.” Samuel Niles, A Summary Historical Narrative of the Wars in New England, Massachusetts Historical Society Collections, 4th ser., vol. 5, 347 (1837). Pim’s gun may have been a type of the repeating flintlock that became “popular in England from the third quarter of the 17th century,” and was manufactured in Massachusetts starting in the early eighteenth. Harold L. Peterson, Arms and Armor in Colonial America 1526-1783, 215-17 (Dover reprint 2000) (Smithsonian Institution 1956). Another repeating flintlock, invented by Philadelphia’s Joseph Belton, could fire eight shots in three seconds. Idem, 217. Pim also owned a .52 caliber six-shot flintlock revolver, similar to the revolvers that had been made in England since the turn of the century. Brown, 255. A variety of multi-shot pistols from the late eighteenth century have been preserved, holding two to four rounds. Charles Winthrop Sawyer, Firearms in American History: 1600 to 1800, 194-98, 215-16 (1910).

Devastation at Short Range

The repeaters described above were not the most common arms. It would take two decades for the program begun by President Madison to result in repeating arms beginning to become affordable to the middle class. So in the seventeenth and eighteenth centuries, a person who could not afford an expensive repeater, but who wanted to be able to fire more than one bullet without reloading, would often buy a blunderbuss. The blunderbuss was the size of a very large handgun. Its muzzle flared outward slightly, like a bell. This made it easier to load while bouncing in a stagecoach, or on a swaying ship. The blunderbuss could fire either one large projectile, or several at once. Most often it was loaded with about 20 large pellets, and so it was devastating at short range. The name seems an adaptation of the Dutch “donder-buse” or “thunder gun.”

Excellent for self-defense at close quarters, the blunderbuss was of little use for anything else, having an effective range of about 20 yards. Militarily, it was used by sailors to repel boarders. Stagecoach guards and travelers carried blunderbusses, and it was also a common arm for home defense. For more on the blunderbuss, see Brown and George, above.

High-Capacity Printing Presses

No one would dispute that modern arms are much improved from 1791 in terms of reliability, accuracy, range and affordability. But the gap from the 22-shot Girandoni (powerful enough to take an elk) to a modern firearm is pretty small compared with the changes in technology of “the press.” Compared to the one-sheet-at-a-time printing presses of 1791, the steam and rotary presses invented in the 19th century made printing vastly faster — a speed improvement that dwarfs the speed improvement in firearms in the last 500 years. When the First Amendment was written, a skilled printer could produce 250 sheets in two hours. Today, a modern newspaper printing press can produce 70,000 copies of a newspaper (consisting of dozens of sheets) in an hour. Now, with digital publishing, a newspaper article can be read globally within minutes after it is written.

This means that irresponsible media can cause far more harm today than they could in 1791. For example, in 2005, Newsweek magazine published a false story claiming that American personnel at Guantanamo Bay had desecrated Korans belonging to prisoners there. Eventually, Newsweek retracted the story. But the phony story had already spread worldwide, setting off riots in six countries, in which over 30 people were killed. Had Newsweek been using 18th-century printing presses, the false story would have mostly been read by several thousand people in the New York City area, where Newsweek is based. It would been months — if ever — before the Newsweek issue with the false story was read by anyone in Pakistan or Afghanistan.

We do not limit any constitutional right to the technology that existed in 1791. In District of Columbia v. Heller, the court observed:
Some have made the argument, bordering on the frivolous, that only those arms in existence in the 18th century are protected by the Second Amendment. We do not interpret constitutional rights that way. Just as the First Amendment protects modern forms of communications, e.g., Reno v. American Civil Liberties Union, 521 U. S. 844, 849 (1997), and the Fourth Amendment applies to modern forms of search, e.g., Kyllo v. United States, 533 U. S. 27, 35-36 (2001), the Second Amendment extends, prima facie, to all instruments that constitute bearable arms, even those that were not in existence at the time of the founding.
This is an accurate statement of constitutional law, but it understates how truly frivolous the argument against modern firearms is. The people who ratified the Bill of Rights certainly did not anticipate the invention centuries later of the Internet or of thermal imaging sensors. The American people of 1791 did not have to anticipate the invention of repeating arms, because such arms had been in existence for centuries.

Republished from the Washington Post.



David B. Kopel

This article was originally published on FEE.org. Read the original article.