Declaration of Independence of the Republic of Texas

UNANIMOUS DECLARATION OF INDEPENDENCE, BY THE DELEGATES OF THE PEOPLE OF TEXAS, IN GENERAL CONVENTION, AT THE TOWN OF WASHINGTON, ON THE SECOND DAY OF MARCH, 1836

1. When a government has ceased to protect the lives, liberty and property of the people from whom its legitimate powers are derived, and for the advancement of whose happiness it was instituted; and so far from being a guarantee for the enjoyment of those inestimable and inalienable rights, becomes an instrument in the hands of evil rulers for their oppression; when the Federal Republican Constitution of their country, which they have sworn to support, no longer has a substantial existence, and the whole nature of their government has been forcibly changed without their consent, from a restricted federative republic, composed of sovereign states, to a consolidated central military despotism, in which every interest is disregarded but that of the army and the priesthood – both the eternal enemies of civil liberty, and the ever-ready minions of power, and the usual instruments of tyrants; When long after the spirit of the Constitution has departed, moderation is at length, so far lost, by those in power that even the semblance of freedom is removed, and the forms, themselves, of the constitution discontinued; and so far from their petitions and remonstrances being regarded, the agents who bear them are thrown into dungeons; and mercenary armies sent forth to force a new government upon them at the point of the bayonet. When in consequence of such acts of malfeasance and abdication, on the part of the government, anarchy prevails, and civil society is dissolved into its original elements: In such a crisis, the first law of nature, the right of self-preservation – the inherent and inalienable right of the people to appeal to first principles and take their political affairs into their own hands in extreme cases – enjoins it as a right towards themselves and a sacred obligation to their posterity, to abolish such government and create another in its stead, calculated to rescue them from impending dangers, and to secure their future welfare and happiness. Nations, as well as individuals, are amenable for their acts to the public opinion of mankind. A statement of a part of our grievances is, therefore, submitted to an impartial world, in justification of the hazardous but unavoidable step now taken of severing our political connection with the Mexican people, and assuming an independent attitude among the nations of the earth.

LIST OF GRIVANCES

2. The Mexican government, by its colonization laws, invited and induced the Anglo-American population of Texas to colonize its wilderness under the pledged faith of a written constitution, that they should continue to enjoy that constitutional liberty and republican government to which they had been habituated in the land of their birth, the United States of America. In this expectation they have been cruelly disappointed, inasmuch as the Mexican nation has acquiesced in the late changes made in the government by General Antonio Lopez de Santa Anna, who, having overturned the constitution of his country, now offers us the cruel alternative either to abandon our homes, acquired by so many privations, or submit to the most intolerable of all tyranny, the combined despotism of the sword and the priesthood.

3. It has sacrificed our welfare to the state of Coahuila, by which our interests have been continually depressed, through a jealous and partial course of legislation carried on at a far distant seat of government, by a hostile majority, in an unknown tongue; and this too, notwithstanding we have petitioned in the humblest terms, for the establishment of a separate state government, and have, in accordance with the provisions of the national constitution, presented the general Congress, a republican constitution which was without just cause contemptuously rejected.

4. It incarcerated in a dungeon, for a long time, one of our citizens, for no other cause but a zealous endeavor to procure the acceptance of our constitution and the establishment of a state government. VIOLATION OF RIGHT TO LIBERTY

5. It has failed and refused to secure on a firm basis, the right of trial by jury; that palladium of civil liberty, and only safe guarantee for the life, liberty, and property of the citizen. RIGHT TO TRIAL BY JURY

6. It has failed to establish any public system of education, although possessed of almost boundless resources (the public domain) and, although, it is an axiom, in political science, that unless a people are educated and enlightened it is idle to expect the continuance of civil liberty, or the capacity for self-government. RIGHT TO EDUCATION

7. It has suffered the military commandants stationed among us to exercise arbitrary acts of oppression and tyranny; thus trampling upon the most sacred rights of the citizen and rendering the military superior to the civil power. RIGHT TO CIVILIAN CONTORL OF MILITARY

8. It has dissolved by force of arms, the state Congress of Coahuila and Texas, and obliged our representatives to fly for their lives from the seat of government; thus depriving us of the fundamental political right of representation. RIGHT TO CONSENT

9. It has demanded the surrender of a number of our citizens, and ordered military detachments to seize and carry them into the Interior for trial; in contempt of the civil authorities, and in defiance of the laws and constitution. RIGHT TO LIBERTY, RIGHT TO DUE PROCESS

10. It has made piratical attacks upon our commerce; by commissioning foreign desperadoes, and authorizing them to seize our vessels, and convey the property of our citizens to far distant ports of confiscation. RIGHT TO PROPERTY

11. It denies us the right of worshipping the Almighty according to the dictates of our own consciences, by the support of a national religion calculated to promote the temporal interests of its human functionaries rather than the glory of the true and living God. RIGHT TO FREE EXERCISE OF RELIGION

12. It has demanded us to deliver up our arms; which are essential to our defense, the rightful property of freemen, and formidable only to tyrannical governments. RIGHT TO BEAR ARMS, RIGHT TO PROPERTY

13. It has invaded our country, both by sea and by land, with intent to lay waste our territory and drive us from our homes; and has now a large mercenary army advancing to carry on against us a war of extermination. RIGHT TO PROPERTY, RIGHT TO LIFE

14. It has, through its emissaries, incited the merciless savage, with the tomahawk and scalping knife, to massacre the inhabitants of our defenseless frontiers. RIGHT TO LIFE

15. It hath been, during the whole time of our connection with it, the contemptible sport and victim of successive military revolutions and hath continually exhibited every characteristic of a weak, corrupt and tyrannical government.

ATTEMPT AT A REMEDY

16. These, and other grievances, were patiently borne by the people of Texas until they reached that point at which forbearance ceases to be a virtue. We then took up arms in defense of the national constitution. We appealed to our Mexican brethren for assistance. Our appeal has been made in vain. Though months have elapsed, no sympathetic response has yet been heard from the Interior. We are, therefore, forced to the melancholy conclusion that the Mexican people have acquiesced in the destruction of their liberty, and the substitution there for of a military government – that they are unfit to be free and incapable of self-government.

17. The necessity of self-preservation, therefore, now decrees our eternal political separation.

DECLARATION OF INDEPENDENCE

18. We, therefore, the delegates, with plenary powers, of the people of Texas, in solemn convention assembled, appealing to a candid world for the necessities of our condition, do hereby resolve and DECLARE that our political connection with the Mexican nation has forever ended; and that the people of Texas do now constitute a FREE, SOVEREIGN and INDEPENDENT REPUBLIC, and are fully invested with all the rights and attributes which properly belong to the independent nations; and, conscious of the rectitude of our intentions, we fearlessly and confidently commit the issue to the decision of the Supreme Arbiter of the destinies of nations.

Computer Security Fundamentals

Chuck Easttom

Chapter 1 Introduction to to Computer Security

*

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Chapter 1 Objectives

  • Identify top threats to a computer network
  • Assess the likelihood of an attack
  • Define key terms like cracker, sneaker, firewall, and authentication
  • Compare and contrast perimeter and layered approaches to network security
  • Use online resources

*

Identify the top threats to a computer network: malware, intrusion, Denial of service attacks

Assess the likelihood of an attack on your personal computer and network

Define key terms such as cracker, sneaker, firewall and authentication

Compare and contrast perimeter and layered approaches to network security

Use online resources to secure your network

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Introduction

  • Computer systems and networks are all around us.
  • Online banking
  • Automated supermarket checkouts
  • Online classes
  • Online shopping
  • Online travel resources

*

Computer systems are everywhere.

  • Online banking, ATMs, debit cards
  • E-Bay, Amazon, Half.com for textbooks
  • Expedia, Travelocity, airplane e-tickets

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Introduction (cont.)

  • How is personal information safeguarded?
  • What are the vulnerabilities?
  • What secures these systems?

*

How is my online personal information safeguarded?

Passwords, account numbers, etc.

What are the vulnerabilities to these systems?

Web site security

What steps are taken to ensure that these systems and data are safe?

SSL, Encryption, etc.

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

How Seriously Should You Take Threats to Network Security?

  • Which group do you belong to?
  • “No one is coming after my computer.”
  • “The sky is falling!”
  • Middle ground.

*

Which group do you belong to?:

“No one is coming after me/my computer.”

Prove to me that I am at risk

Ostrich Theory

“The sky is falling!!”

Prove to me that I am not at risk

Paranoia

Middle Ground

An educated awareness of true risk

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Identifying Types of Threats

  • Malware: MALicious softWARE
  • Security Breaches
  • DoS: Denial of Service attacks
  • Web Attacks
  • Session Hijacking
  • DNS Poisoning
  • Insider Threats

*

Malware – MALicious softWARE, the most common threat to your system

Intrusions – an attempt to gain unauthorized access to your system

DoS – Denial of Service attacks, attempts to deny authorized users access to the system

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Malware

  • Software with a malicious purpose
  • Virus
  • Trojan horse
  • Spyware
  • Logic Bomb

*

Virus – “a small program that replicates itself and hides itself inside other programs, usually without your knowledge” (Symantec, 2003)

Trojan horse - a malicious program disguised as something desirable or harmless

Spyware – the fastest-growing category of malware

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Malware (cont.)

Virus

  • One of the two most common types
  • Usually spreads through e-mail
  • Uses system resources, causing slowdown or stoppage

*

One of the two most common types of malware

Usually spreads itself through unsuspecting user’s e-mail

Even without malicious payload, rapid replication uses system resources, causing slow down or stoppage

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Malware (cont.)

Trojan Horse

  • The other most common kind of malware
  • Named after the wooden horse of ancient history

*

The other most common kind of malware

Named after the famous wooden horse of ancient history

It disguises itself as something benign, something you need or want, i.e. a game, screen saver, account logon, etc

It captures your information and returns it to the intruder

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Malware (cont.)

Spyware

  • The most rapidly growing types of malware
  • Cookies
  • Key logger

*

Spyware is the most rapidly growing type of malware.

Cookies: initially a good idea to help users surf the Web, now misused to spy on users

Key logger: both in software and hardware, captures all the user’s typing and logs it, capturing passwords, account numbers, credit card numbers, etc.

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Malware (cont.)

Logic Bomb

  • Lays dormant until some logical condition is met, often a specific date.

*

Spyware is the most rapidly growing type of malware.

Cookies: initially a good idea to help users surf the Web, now misused to spy on users

Key logger: both in software and hardware, captures all the user’s typing and logs it, capturing passwords, account numbers, credit card numbers, etc.

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Compromising System Security

Intrusions

  • Attacks that break through system resources
  • Hackers
  • Crackers
  • Social engineering
  • War-driving

*

Intrusions are attacks that break through your system’s resources without authorization

Hackers – early internet joy riders, by intent not malevolent

Crackers – system intruders, with malevolent intent

Social Engineering – intruding into a system using human nature, not technology

War driving – driving around looking for unprotected wireless networks

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Denial of Service Attacks

  • The attacker does not intrude into the system but just blocks access by authorized users.

*

The attacker does not actually intrude into the system, just blocks access from authorized users

Keeps your customers from purchasing on your Web site, denying you sales

Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned

Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Web Attacks

  • The attacker attempts to breach a web application. Common attacks of this type are SQL injection and Cross Site Scripting.

*

The attacker does not actually intrude into the system, just blocks access from authorized users

Keeps your customers from purchasing on your Web site, denying you sales

Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned

Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Session Hijacking

  • This is a complex attack that involves actually taking over an authenticated session.

*

The attacker does not actually intrude into the system, just blocks access from authorized users

Keeps your customers from purchasing on your Web site, denying you sales

Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned

Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

DNS Poisoning

  • This involves altering DNS records on a DNS server to redirect client traffic to malicious websites, usually for identity theft.

*

The attacker does not actually intrude into the system, just blocks access from authorized users

Keeps your customers from purchasing on your Web site, denying you sales

Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned

Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Assessing the Likelihood of an Attack on Your Network

  • Viruses
  • Catch up on new and refurbished viruses
  • Unauthorized use of systems
  • DoS attacks
  • Intrusions
  • Employee misuse

*

Viruses are most common network attacks

Check any AV vendor Web site to catch up on new and refurbished viruses

Unauthorized use of systems is the next most common attack

DoS attacks

Intrusions

Employee misuse, either deliberate or accidental

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Basic Security Terminology

People:

  • Hackers
  • White hats
  • Black hats
  • Gray hats
  • Script kiddies
  • Sneakers
  • Ethical hackers

*

People

Hackers – anyone who studies a system through analyzing its flaws

White hats – Consider themselves the “good guys”

Black hats – Or “crackers” are definitely the “bad guys”

Gray hats – Not a common term; refers to individuals who operate out side of the law on occasion

Script kiddies – Inexperienced; consider themselves hackers, but only copy the work of others

Ethical hackers – Consultants who are hired to do vulnerability assessments on company systems

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Basic Security Terminology (cont.)

Devices

  • Firewall
  • Filters network traffic
  • Proxy server
  • Disguises IP address of internal host
  • Intrusion Detection System
  • Monitors traffic, looking for attempted attacks

*

Firewalls – Found in a router or a server or as a stand-alone device, it filters ingress and egress network traffic.

Proxy server – This sits between a client and an application, acting as the host on your network, disguising the IP address of your internal host.

Intrusion Detection System – IDS monitors traffic, looking for attempted attacks.

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Basic Security Terminology (cont.)

Activities

  • Authentication
  • Auditing

*

Phreaking – A subspecialty of hacking, breaking into telephone systems, it gave Kevin Mitnick his start down the road to prison.

Authentication – Process todetermine if the credentials given by a user are authorized to access system resources.

Auditing – Process of reviewing logs, records, and procedures to ensure established standards are being met; tedious but critical.

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Network Security Paradigms

  • How will youprotect your network?
  • CIA Triangle
  • Least Privileges
  • Perimeter security approach
  • Layered security approach
  • Proactive versus reactive
  • Hybrid security method

*

How will youprotect our network?

Perimeter security approach

Perimeter Defense is the most popular because it used to be clearly defined, but as companies hire mobile workers, home workers, and contract workers, the perimeter is becoming less and less clearly defined.

Layered security approach

Not only the perimeter but separate sections of the network are protected to the security level assigned to them.

Proactive Versus Reactive

Are your security measures active or passive?

Do you have a security plan, or are you part of someone else’s plan to intrude on you?

Hybrid Security Method

Only a thorough and ongoing risk assessment and vulnerability can keep you informed about what combination of postures will benefit your network the most.

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

How Do Legal Issues Impact Network Security?

*

The Computer Security Act of 1987, the first piece of U.S. legislation to affect computer systems

OMB Circular A-130, a more specific federal law that addresses the idea of security standards

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Online Security Resources

*

CERT

Computer Emergency Response Team, sponsored by Carnegie-Mellon University, the first computer incident response team

Microsoft Security Advisor

Microsoft security information, tools, and updates

F-Secure

Information on virus outbreaks

SANS

Documentation on computer security issues

© 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security

*

Summary

  • Network security is a constantly changing field.
  • You need three levels of knowledge.
  • Take the courses necessary to learn the basic techniques.
  • Learn your enterprise system intimately, with all its strengths and vulnerabilities.
  • Keep current in the ever-changing world of threats and exploits.

*

Rights of the Texas Declaration of Independence and Texas Constitution

Comparison Chart

The first thing to do is to read the Texas Declaration of Independence and Article I of the Texas Constitution – both are attached to this assignment. Your chart will have three columns. The first column is for the specific right mentioned in the documents. The other columns are the following: One for the Texas Declaration of Independence, Texas Bill of Rights (Article I of the Texas Constitution). For each right mentioned or implied, list the sentence in which it appears in your chart under the proper document. Write as much of the sentence as required to make clear what the right is. If the same right is listed in another document, list it in the same row

Read the documents carefully and choose at least five “rights” to list and compare. To be eligible, the right must appear in both documents. Don’t pick a right that only appears in one document. I have given you one example—you may not use this as part of your five.

RIGHT

Texas Declaration of Independence

Texas Constitution, Article I (Texas Bill of Rights)

Right to Jury Trials

It has failed and refused to secure, on a firm basis, the right of trial by jury

The right of trial by jury shall remain inviolate. (Art I. Sec. 15)

So to explain the example: The authors of the Texas Declaration complain that the Mexican government has refused to secure the right of trial by jury (paragraph 5). This right is then guaranteed in the Texas Bill of Rights (section 10). In the first column, I put the right in question (right to jury trials), in the second column I put where in the Texas Declaration it says that Mexico violated that right, and in the third column I put the reference to the right to jury trial as it appears in the Texas Bill of Rights.

Now you find five others on your own!!! Think about the various rights claimed in these documents and pick from the following list: right to consent, right to vote, right to bear arms, right to security, right to life, right to liberty, right to property, right to education, right to equality, right of conscience, right to free speech, right to publish, right to an attorney, right to a writ of habeas corpus, right to just punishment, right not to be tried for the same crime twice, right to privacy, right to protest, right to petition, right to a warrant upon being searched.

Be sure whatever right you pick is referenced (in some way) in the Texas Declaration of Independence and the Texas Bill of Rights.

THE TEXAS CONSTITUTION   ARTICLE 1. BILL OF RIGHTS

THE TEXAS CONSTITUTION

ARTICLE 1. BILL OF RIGHTS

Sec. 1.  FREEDOM AND SOVEREIGNTY OF STATE. Texas is a free and independent State, subject only to the Constitution of the United States, and the maintenance of our free institutions and the perpetuity of the Union depend upon the preservation of the right of local self-government, unimpaired to all the States.

Sec. 2.  INHERENT POLITICAL POWER; REPUBLICAN FORM OF GOVERNMENT. All political power is inherent in the people, and all free governments are founded on their authority, and instituted for their benefit. The faith of the people of Texas stands pledged to the preservation of a republican form of government, and, subject to this limitation only, they have at all times the inalienable right to alter, reform or abolish their government in such manner as they may think expedient.

Sec. 3.  EQUAL RIGHTS. All free men, when they form a social compact, have equal rights, and no man, or set of men, is entitled to exclusive separate public emoluments, or privileges, but in consideration of public services.

Sec. 3a.  EQUALITY UNDER THE LAW. Equality under the law shall not be denied or abridged because of sex, race, color, creed, or national origin. This amendment is self-operative. (Added Nov. 7, 1972.)

Sec. 4.  RELIGIOUS TESTS. No religious test shall ever be required as a qualification to any office, or public trust, in this State; nor shall any one be excluded from holding office on account of his religious sentiments, provided he acknowledge the existence of a Supreme Being.

Sec. 5.  WITNESSES NOT DISQUALIFIED BY RELIGIOUS BELIEFS; OATHS AND AFFIRMATIONS. No person shall be disqualified to give evidence in any of the Courts of this State on account of his religious opinions, or for the want of any religious belief, but all oaths or affirmations shall be administered in the mode most binding upon the conscience, and shall be taken subject to the pains and penalties of perjury.

Sec. 6.  FREEDOM OF WORSHIP. All men have a natural and indefeasible right to worship Almighty God according to the dictates of their own consciences. No man shall be compelled to attend, erect or support any place of worship, or to maintain any ministry against his consent. No human authority ought, in any case whatever, to control or interfere with the rights of conscience in matters of religion, and no preference shall ever be given by law to any religious society or mode of worship. But it shall be the duty of the Legislature to pass such laws as may be necessary to protect equally every religious denomination in the peaceable enjoyment of its own mode of public worship.

Sec. 7.  APPROPRIATIONS FOR SECTARIAN PURPOSES. No money shall be appropriated, or drawn from the Treasury for the benefit of any sect, or religious society, theological or religious seminary; nor shall property belonging to the State be appropriated for any such purposes.

Sec. 8.  FREEDOM OF SPEECH AND PRESS; LIBEL. Every person shall be at liberty to speak, write or publish his opinions on any subject, being responsible for the abuse of that privilege; and no law shall ever be passed curtailing the liberty of speech or of the press. In prosecutions for the publication of papers, investigating the conduct of officers, or men in public capacity, or when the matter published is proper for public information, the truth thereof may be given in evidence. And in all indictments for libels, the jury shall have the right to determine the law and the facts, under the direction of the court, as in other cases.

Sec. 9.  SEARCHES AND SEIZURES. The people shall be secure in their persons, houses, papers and possessions, from all unreasonable seizures or searches, and no warrant to search any place, or to seize any person or thing, shall issue without describing them as near as may be, nor without probable cause, supported by oath or affirmation.

Sec. 10.  RIGHTS OF ACCUSED IN CRIMINAL PROSECUTIONS. In all criminal prosecutions the accused shall have a speedy public trial by an impartial jury. He shall have the right to demand the nature and cause of the accusation against him, and to have a copy thereof. He shall not be compelled to give evidence against himself, and shall have the right of being heard by himself or counsel, or both, shall be confronted by the witnesses against him and shall have compulsory process for obtaining witnesses in his favor, except that when the witness resides out of the State and the offense charged is a violation of any of the anti-trust laws of this State, the defendant and the State shall have the right to produce and have the evidence admitted by deposition, under such rules and laws as the Legislature may hereafter provide; and no person shall be held to answer for a criminal offense, unless on an indictment of a grand jury, except in cases in which the punishment is by fine or imprisonment, otherwise than in the penitentiary, in cases of impeachment, and in cases arising in the army or navy, or in the militia, when in actual service in time of war or public danger.

(Amended Nov. 5, 1918.)

Sec. 12.  HABEAS CORPUS. The writ of habeas corpus is a writ of right, and shall never be suspended. The Legislature shall enact laws to render the remedy speedy and effectual.

Sec. 13.  EXCESSIVE BAIL OR FINES; CRUEL AND UNUSUAL PUNISHMENT; REMEDY BY DUE COURSE OF LAW. Excessive bail shall not be required, nor excessive fines imposed, nor cruel or unusual punishment inflicted. All courts shall be open, and every person for an injury done him, in his lands, goods, person or reputation, shall have remedy by due course of law.

Sec. 14.  DOUBLE JEOPARDY. No person, for the same offense, shall be twice put in jeopardy of life or liberty; nor shall a person be again put upon trial for the same offense after a verdict of not guilty in a court of competent jurisdiction.

Sec. 15.  RIGHT OF TRIAL BY JURY. The right of trial by jury shall remain inviolate. The Legislature shall pass such laws as may be needed to regulate the same, and to maintain its purity and efficiency. Provided, that the Legislature may provide for the temporary commitment, for observation and/or treatment, of mentally ill persons not charged with a criminal offense, for a period of time not to exceed ninety (90) days, by order of the County Court without the necessity of a trial by jury.

(Amended Aug. 24, 1935.)

Sec. 15-a.  COMMITMENT OF PERSONS OF UNSOUND MIND. No person shall be committed as a person of unsound mind except on competent medical or psychiatric testimony. The Legislature may enact all laws necessary to provide for the trial, adjudication of insanity and commitment of persons of unsound mind and to provide for a method of appeal from judgments rendered in such cases. Such laws may provide for a waiver of trial by jury, in cases where the person under inquiry has not been charged with the commission of a criminal offense, by the concurrence of the person under inquiry, or his next of kin, and an attorney ad litem appointed by a judge of either the County or Probate Court of the county where the trial is being held, and shall provide for a method of service of notice of such trial upon the person under inquiry and of his right to demand a trial by jury.

(Added Nov. 6, 1956.)

Sec. 16.  BILLS OF ATTAINDER; EX POST FACTO OR RETROACTIVE LAWS; IMPAIRING OBLIGATION OF CONTRACTS. No bill of attainder, ex post facto law, retroactive law, or any law impairing the obligation of contracts, shall be made.

Sec. 17.  TAKING, DAMAGING, OR DESTROYING PROPERTY FOR PUBLIC USE; SPECIAL PRIVILEGES AND IMMUNITIES; CONTROL OF PRIVILEGES AND FRANCHISES. No person's property shall be taken, damaged or destroyed for or applied to public use without adequate compensation being made, unless by the consent of such person; and, when taken, except for the use of the State, such compensation shall be first made, or secured by a deposit of money; and no irrevocable or uncontrollable grant of special privileges or immunities, shall be made; but all privileges and franchises granted by the Legislature, or created under its authority shall be subject to the control thereof.

Sec. 18.  IMPRISONMENT FOR DEBT. No person shall ever be imprisoned for debt.

Sec. 19.  DEPRIVATION OF LIFE, LIBERTY, ETC.; DUE COURSE OF LAW. No citizen of this State shall be deprived of life, liberty, property, privileges or immunities, or in any manner disfranchised, except by the due course of the law of the land.

Sec. 20.  OUTLAWRY OR TRANSPORTATION FOR OFFENSE. No citizen shall be outlawed. No person shall be transported out of the State for any offense committed within the same. This section does not prohibit an agreement with another state providing for the confinement of inmates of this State in the penal or correctional facilities of that state.

(Amended Nov. 5, 1985.)

Sec. 21.  CORRUPTION OF BLOOD; FORFEITURE; SUICIDES. No conviction shall work corruption of blood, or forfeiture of estate, and the estates of those who destroy their own lives shall descend or vest as in case of natural death.

Sec. 22.  TREASON. Treason against the State shall consist only in levying war against it, or adhering to its enemies, giving them aid and comfort; and no person shall be convicted of treason except on the testimony of two witnesses to the same overt act, or on confession in open court.

Sec. 23.  RIGHT TO KEEP AND BEAR ARMS. Every citizen shall have the right to keep and bear arms in the lawful defense of himself or the State; but the Legislature shall have power, by law, to regulate the wearing of arms, with a view to prevent crime.

Sec. 24.  MILITARY SUBORDINATE TO CIVIL AUTHORITY. The military shall at all times be subordinate to the civil authority.

Sec. 25.  QUARTERING SOLDIERS IN HOUSES. No soldier shall in time of peace be quartered in the house of any citizen without the consent of the owner, nor in time of war but in a manner prescribed by law.

Sec. 26.  PERPETUITIES AND MONOPOLIES; PRIMOGENITURE OR ENTAILMENTS. Perpetuities and monopolies are contrary to the genius of a free government, and shall never be allowed, nor shall the law of primogeniture or entailments ever be in force in this State.

Sec. 27.  RIGHT OF ASSEMBLY; PETITION FOR REDRESS OF GRIEVANCES. The citizens shall have the right, in a peaceable manner, to assemble together for their common good; and apply to those invested with the powers of government for redress of grievances or other purposes, by petition, address or remonstrance.

Sec. 28.  SUSPENSION OF LAWS. No power of suspending laws in this State shall be exercised except by the Legislature.

Sec. 29.  PROVISIONS OF BILL OF RIGHTS EXCEPTED FROM POWERS OF GOVERNMENT; TO FOREVER REMAIN INVIOLATE. To guard against transgressions of the high powers herein delegated, we declare that everything in this "Bill of Rights" is excepted out of the general powers of government, and shall forever remain inviolate, and all laws contrary thereto, or to the following provisions, shall be void.

Sec. 30.  RIGHTS OF CRIME VICTIMS.

(a) A crime victim has the following rights:

(1)  the right to be treated with fairness and with respect for the victim's dignity and privacy throughout the criminal justice process; and

(2)  the right to be reasonably protected from the accused throughout the criminal justice process.

(b)  On the request of a crime victim, the crime victim has the following rights:

(1)  the right to notification of court proceedings;

(2)  the right to be present at all public court proceedings related to the offense, unless the victim is to testify and the court determines that the victim's testimony would be materially affected if the victim hears other testimony at the trial;

(3)  the right to confer with a representative of the prosecutor's office;

(4)  the right to restitution; and

(5)  the right to information about the conviction, sentence, imprisonment, and release of the accused.

(c)  The legislature may enact laws to define the term "victim" and to enforce these and other rights of crime victims.

(d)  The state, through its prosecuting attorney, has the right to enforce the rights of crime victims.

(e)  The legislature may enact laws to provide that a judge, attorney for the state, peace officer, or law enforcement agency is not liable for a failure or inability to provide a right enumerated in this section. The failure or inability of any person to provide a right or service enumerated in this section may not be used by a defendant in a criminal case as a ground for appeal or post-conviction writ of habeas corpus. A victim or guardian or legal representative of a victim has standing to enforce the rights enumerated in this section but does not have standing to participate as a party in a criminal proceeding or to contest the disposition of any charge. (Added Nov. 7, 1989.)

Sec. 32.  MARRIAGE.

(a) Marriage in this state shall consist only of the union of one man and one woman.

(b)  This state or a political subdivision of this state may not create or recognize any legal status identical or similar to marriage. (Added Nov. 8, 2005.)

Page - 1 -

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com