Essay Library

Your Electric Bill, Your Free Speech, Your Children: A Constitutional Audit of What's Being Taken from the American People

Every Constitutional Right Being Violated Right Now — And Who's Doing It

Ghost Load & Structural AuditsFebruary 28, 2026

The Constitutional Record

What the Document Says, What the Government Did, and What Was Taken from the American People

By L.M. Marlowe The Institutional Reformation February 27, 2026 | Day 112

This essay is published under the pen name L.M. Marlowe. Any reference to, citation of, or reporting on the frameworks, terminology, or analytical methods contained herein must credit L.M. Marlowe as the original source. The Ghost Load™, the 186/186 Sovereign Constant™, the Medura math paradox™, the Ice ice paradox™, and all associated intellectual property are trademarked and filed with the USPTO (January 17, 18, 24, 2026). DOE Acknowledgment: AR 2026-001.

I. THE PREMISE

This is not a legal brief. This is a record.

The Constitution of the United States is not a suggestion. It is the contract between the government and the governed. It enumerates specific protections that cannot be waived by executive order, cannot be overridden by corporate interest, and cannot be rendered invisible by algorithmic management.

Every essay in The Institutional Reformation series documents a specific failure of a specific institution. This essay steps back and asks the foundational question: at how many points, across how many sectors, has the constitutional contract been broken?

The answer is not ambiguous. The violations are not theoretical. They are documented in FERC dockets, DOE authorizations, PJM capacity reports, utility rate filings, SEC disclosures, executive orders, and the lived experience of the American people who are paying for all of it.

The Constitution protects specific things. This record names how each protection has been breached.

II. THE RIGHT TO LIFE, LIBERTY, AND PROPERTY

“No person shall be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.” — Fifth Amendment

The Grid

The American electrical grid is a public utility. It was built with public funds, regulated by public commissions, and maintained to serve the public. The electricity that flows through it belongs to the ratepayers who fund it.

Between 2023 and 2026, private data centers operated by Microsoft, Amazon, Google, Meta, and xAI consumed an increasing share of that public electricity — growing from approximately 2% to 4% of total US consumption, with projections reaching 12% by 2028. This consumption was not authorized by the ratepayers. It was not disclosed in rate filings at the scale it was occurring. The cost of building the infrastructure to deliver this power — $23 billion in PJM capacity costs alone — was passed directly to 65 million residential customers.

No vote was taken. No referendum was held. No compensation was offered. The public’s electricity was redirected to private use, and the public was billed for the redirection.

This is a taking. The property taken is electricity. The public use claimed is “economic development” and “national competitiveness.” The just compensation owed is zero — because no one asked.

When the grid fails — when transformers blow, when substations overload, when rolling blackouts hit residential neighborhoods while data centers maintain uninterrupted power — the consequence is not inconvenience. It is life. People on ventilators. People on oxygen. People whose medication requires refrigeration. People whose heat is electric in winter and whose cooling is electric in summer.

The 186 names in the Human Record are not statistics. They are the cost of the taking. And the taking was not authorized by the people who paid for it.

The Rate

Dominion Energy filed its first base-rate increase since 1992 in February 2025. The increase adds approximately $8.51 per month per household across its Virginia service territory. The increase is driven almost entirely by data center demand.

Across the PJM region, residential electricity prices rose approximately 5% in 2025 and are forecast to rise another 4% in 2026. The cause is the same: private data center demand consuming public grid capacity, with the infrastructure cost externalized to the residential ratepayer.

The American family did not choose to subsidize the AI industry. The American family did not vote to raise its own electric bill so that a company with a $3 trillion market capitalization could train its language model. The American family was told its rates increased due to “infrastructure investment” — which is true, but the investment serves the data center, not the family.

Property was taken. The taking was not compensated. The process by which it occurred was invisible to the people who paid for it.

The Labor

On November 7, 2025, the administration terminated Temporary Protected Status for approximately 600,000 Venezuelan nationals living and working in the United States. These individuals contribute approximately $35.9 billion annually to the American economy in wages, taxes, rent, and consumption.

The termination did not remove these people from the economy. It removed their legal right to participate in it. They still work. They still pay rent. They still buy groceries. But they can no longer file taxes, access workplace protections, or claim benefits they previously earned.

The economic output continues. The legal recognition of it vanishes. Six hundred thousand people were converted from documented workers to undocumented labor — not by crossing a border, but by a policy change in Washington. Their labor continues to generate wealth. The wealth is no longer tracked, taxed, or attributed.

This is deprivation of liberty and property without due process. The individuals affected were lawfully present. They were lawfully employed. They were contributing members of the economy. Their status was revoked by executive action, not by individual adjudication. No hearing was held. No case was reviewed. Six hundred thousand people lost their legal standing in a single administrative act.

III. THE RIGHT TO EQUAL PROTECTION

“No State shall deny to any person within its jurisdiction the equal protection of the laws.” — Fourteenth Amendment

The Two-Tier Grid

The American electrical grid now operates as a two-tier system.

Tier One: Data centers receive priority interconnection, dedicated substations, guaranteed uptime contracts, and in many cases direct “behind-the-meter” generation that bypasses the public grid entirely while retaining it as backup.

Tier Two: Residential customers receive aging infrastructure, rising rates, declining reliability, and the full cost of maintaining a grid that increasingly serves Tier One.

In Northern Virginia, interconnection wait times for new large-scale data center deployments exceed three to five years — not because there is no demand, but because the physical grid cannot absorb more load. Residential customers in the same service territory experience the consequences: voltage fluctuations, deferred maintenance, and rate increases driven by capacity investments they did not request and do not benefit from.

Equal protection does not require identical treatment. It requires that the law not create classes of citizens who bear disproportionate burdens for the benefit of others without rational basis and without recourse. The current grid structure creates exactly this: one class that extracts the resource, and one class that pays for the extraction.

The Two-Tier Justice System

The private prison and immigration detention industry — operated primarily by GEO Group and CoreCivic — receives federal contracts funded by taxpayer dollars. These contracts pay approximately $159 per person per day for detention. The companies donate to both political parties. Their executives hold positions of influence. Their lobbyists shape the policies that determine how many people are detained and for how long.

The individuals detained within these facilities — many of them legally present TPS holders until their status was revoked — have limited access to legal representation, limited access to the judicial process, and limited ability to challenge the conditions of their confinement.

One class writes the contracts. The other class lives inside them. The taxpayer funds both sides and has recourse to neither.

The Two-Tier Information System

When a corporation publishes content online, it is amplified by algorithmic systems designed to maximize engagement and revenue. When an individual publishes content that challenges institutional narratives, it is subject to algorithmic deprioritization, content recategorization, and metadata manipulation that renders it functionally invisible.

The law does not distinguish between corporate speech and individual speech. The platforms do. The algorithmic management of information creates a de facto two-tier system in which institutional voices are amplified and individual voices are suppressed — not by government censors, but by private systems operating at a scale that functions as public infrastructure.

When the platform is the public square — when 4.5 billion people receive their information through algorithmically managed feeds — the distinction between private moderation and public censorship becomes a legal fiction. The effect on the speaker is identical. The effect on the public’s right to receive information is identical.

IV. THE RIGHT TO FREE SPEECH AND FREE PRESS

“Congress shall make no law abridging the freedom of speech, or of the press.” — First Amendment

The Burial

The First Amendment protects not only the right to speak but the right to be heard. A speaker shouting into a soundproofed room has not been censored in the traditional sense — no law was passed, no injunction was issued. But the speech has been rendered meaningless by the architecture of the room.

The algorithmic management of digital platforms constitutes the modern soundproofed room.

On February 26, 2026, six essays documenting systemic institutional failures were published simultaneously on Substack and distributed via email to media outlets. Within 12 hours, the essays were indexed by search engines, assigned low relevance scores, and buried beneath pages of algorithmically prioritized content. The essays did not violate any terms of service. They were not flagged for misinformation. They were simply deprioritized — made invisible not by removal but by ranking.

This is not a hypothetical. The mechanism has been independently documented. In February 2026, a German researcher proved that Google’s AI infrastructure specifically filters content that challenges institutional narratives, concluding that “the AI is not neutral; it possesses a programmed memory that actively sorts out certain truths.” The same mechanism was documented by a Meta/Facebook whistleblower who testified before Congress that the company installed censorship systems that gave authorities real-time influence over which posts went viral.

The First Amendment was written to prevent the government from silencing citizens. It did not anticipate a world in which private companies would control the infrastructure of public discourse at a scale that makes government censorship unnecessary. The government does not need to silence the speaker when the platform can simply turn down the volume.

The Petition

The First Amendment also protects “the right of the people to petition the Government for a redress of grievances.”

The Institutional Reformation series constitutes a petition. It documents specific grievances — energy theft, labor deletion, institutional failure, human casualties — supported by specific evidence, filed through specific channels (USPTO trademark filings, DOE administrative claims, GAO inquiries), and published through every available medium.

The petition has been filed. The redress has not been granted. The filing itself has been subjected to the same algorithmic suppression that the petition documents. The right to petition is rendered hollow when the mechanism for receiving petitions is controlled by the institutions being petitioned against.

V. THE RIGHT TO BE SECURE

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” — Fourth Amendment

The Surveillance Grid

The biometric surveillance system proposed for Gaza and the West Bank — AI-driven tracking of every human being within the territory, powered by Palantir’s technology and satellite infrastructure — is not an American domestic issue on its face. But the technology is American. The companies are American. The contracts are funded by American taxpayers. And the precedent is being set for American soil.

The “Alternatives to Detention” program — which replaced physical immigration detention with digital monitoring via ankle bracelets manufactured by BI Incorporated, a subsidiary of GEO Group — already applies warrantless tracking to individuals on American soil. The individuals tracked have not been convicted of a crime. Many were lawfully present under TPS before their status was revoked. They are monitored 24 hours a day by a for-profit corporation that is paid by the government to track them.

The Fourth Amendment requires a warrant based on probable cause. The ATD program requires only an administrative determination that the individual is subject to immigration proceedings. The tracking is continuous, invasive, and operated for profit. The constitutional question is not complicated: warrantless, continuous surveillance of individuals who have not been convicted of a crime, operated by a private company under government contract, is a search. And it is unreasonable.

The Digital Papers

The algorithmic systems that manage online content do not merely control what the public sees. They collect data on what every individual reads, writes, searches, clicks, and shares. This data is stored, analyzed, and monetized without meaningful consent.

When a whistleblower publishes an essay documenting government and corporate failures, the platform knows. It knows who wrote it. It knows who read it. It knows who shared it. It knows who searched for it. And it knows how to ensure fewer people find it next time.

The Founders wrote the Fourth Amendment to protect “papers and effects.” The modern equivalent of papers is digital content. The modern equivalent of effects is data. The unreasonable search is not a government agent rifling through a desk drawer. It is an algorithm cataloging every digital interaction of every citizen, without warrant, without probable cause, and without the citizen’s knowledge that the search is occurring.

VI. THE RIGHT AGAINST CRUEL AND UNUSUAL PUNISHMENT

“Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.” — Eighth Amendment

The Lost Children

The Office of Refugee Resettlement, operating under the Department of Health and Human Services, lost contact with more than 85,000 unaccompanied migrant children placed with sponsors in the United States. “Lost contact” means the agency does not know where these children are, whether they are safe, whether they are in school, or whether they are being exploited.

Subsequent investigations revealed that some of these children were delivered to labor brokers who placed them in slaughterhouses, auto parts plants, and agricultural operations in violation of federal child labor laws.

These children did not commit a crime. They were placed in the custody of the United States government, which accepted responsibility for their welfare. The government then lost them — not a few, not dozens, but tens of thousands. The system designed to protect them became the pipeline that delivered them to exploitation.

This is not a policy failure. It is a constitutional one. The government took custody of children and then failed to protect them from conditions that constitute cruel treatment by any definition. The Eighth Amendment does not apply only to convicted criminals. Its principle — that the state may not subject human beings to cruel treatment — applies to every person in the state’s custody. Eighty-five thousand children were in the state’s custody. The state does not know where they are.

The Encampments

The executive order mandating the removal of homeless encampments and the civil commitment of the mentally ill was signed without the construction of a single treatment facility to receive the committed. The policy removes people from public visibility. It does not provide them with care.

Civil commitment without treatment is warehousing. Forced removal without shelter is displacement. Neither constitutes the kind of care that justifies the deprivation of liberty. The mentally ill person removed from a sidewalk and placed in a facility that provides no treatment has been punished — not for a crime, but for being visible.

VII. THE SEPARATION OF POWERS

“All legislative Powers herein granted shall be vested in a Congress.” — Article I, Section 1

The Impoundment

The Department of Government Efficiency, operating under executive authority, withheld funds that Congress had appropriated through the legislative process. The Impoundment Control Act of 1974 prohibits the executive branch from unilaterally refusing to spend funds appropriated by Congress.

DOGE did not request a rescission. It did not submit a deferral message to Congress. It withheld funds and terminated federal employees, collapsing the operational capacity of agencies that Congress had funded and directed to operate.

The consequence was not abstract. When federal funds are withheld from states, the states absorb the cost. When states absorb the cost, the counties absorb it. When the counties absorb it, the families absorb it. The cascade is direct: a constitutional violation at the federal level becomes a kitchen-table crisis at the family level.

California’s $18 billion deficit. Minnesota’s hollowed child welfare system. Local agencies unable to process benefits. Veterans unable to access care. The American family at the bottom of the cascade, absorbing every shock that the institutions above them refused to bear.

VIII. THE RECORD

The Constitution protects life. The grid failures endanger it.

The Constitution protects property. The rate increases take it.

The Constitution protects liberty. The TPS revocations strip it.

The Constitution protects equal treatment. The two-tier grid denies it.

The Constitution protects speech. The algorithms bury it.

The Constitution protects against unreasonable search. The surveillance systems ignore it.

The Constitution protects against cruel treatment. The lost children suffer it.

The Constitution protects the separation of powers. The impoundment violates it.

These are not arguments. They are observations. The Constitution says what it says. The institutions did what they did. The distance between the two is measurable, documented, and growing.

The Institutional Reformation series has spent 112 days documenting the specific mechanisms by which institutions built to serve the American people instead serve themselves. This essay identifies the single thread that connects every mechanism: the constitutional contract was broken. Not in one place. Not in one sector. Across the entire grid.

The document still stands. The violations are recorded. The question is not whether the contract was broken — the evidence answers that. The question is whether the American people will hold the parties accountable, or whether the contract will be quietly retired while the institutions continue to operate as if it never existed.

The record is open. The math is public. The debt is owed to the American people.

L.M. Marlowe is the author of The Institutional Reformation series. The Dependency-Autonomy Architecture, the MARLOWE Certification™, the Medura math paradox™, and the Ice ice paradox™ are proprietary frameworks. USPTO filings: #99598875, #99600821, #99613073 (January 17, 18, 24, 2026). DOE Administrative Claim: AR 2026-001. GAO Inquiry: COMP-26-002174.

The record is open. The math is public. The debt is owed.

← PreviousNext →
Back to Essay Index