It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Patriot act 2

page: 1
1

log in

join
share:

posted on Oct, 2 2003 @ 08:58 PM
link   
Here it is what does everyone think about it?


DOMESTIC SECURITY ENHANCEMENT ACT OF 2003
SECTION-BY-SECTION ANALYSIS
Title I: Enhancing National Security Authorities
Subtitle A: Foreign Intelligence Surveillance Act Amendments
Section 101: Individual ists as Foreign Powers.
Under 50 U.S.C. � 1801(a)(4), the definition of "foreign power" includes groups that engage in international ism, but does not reach unaffiliated individuals who do so. As a result, investigations of "lone wolf" ists or "sleeper cells" may not be authorized under FISA. Such investigations therefore must proceed under the stricter standards and shorter time periods set forth in Title III, potentially resulting in unnecessary and dangerous delays and greater administrative burden. This provision would expand FISA's definition of "foreign power" to include all persons, regardless of whether they are affiliated with an international ist group, who engage in international terrorism.

Section 102: Clandestine Intelligence Activities by Agent of a Foreign Power.
FISA currently defines "agent of a foreign power" to include a person who knowingly engages in clandestine intelligence gathering activities on behalf of a foreign power--but only if those activities "involve or may involve a violation of" federal criminal law. Requiring the additional showing that the intelligence gathering violates the laws of the United States is both unnecessary and counterproductive, as such activities threaten the national security regardless of whether they are illegal. This provision would expand the definitions contained in 50 U.S.C. � 1801(b)(2)(A) & (B). Any person who engages in clandestine intelligence gathering activities for a foreign power would qualify as an "agent of a foreign power," regardless of whether those activities are federal crimes.

Section 103: Strengthening Wartime Authorities Under FISA.
Under 50 U.S.C. �� 1811, 1829 & 1844, the Attorney General may authorize, without the prior approval of the FISA Court, electronic surveillance, physical searches, or the use of pen registers for a period of 15 days following a congressional declaration of war. This wartime exception is unnecessarily narrow; it may be invoked only when Congress formally has declared war, a rare event in the nation's history and something that has not occurred in more than sixty years. This provision would expand FISA's wartime exception by allowing the wartime exception

1



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

to be invoked after Congress authorizes the use of military force, or after the United States has suffered an attack creating an national emergency.

Section 104: Strengthening FISA's Presidential Authorization Exception.
50 U.S.C. � 1802 allows the Attorney General to authorize electronic surveillance for up to a year, without the FISA Court's prior approval, in two narrow circumstances: (1) if the surveillance is are directed solely at communications between foreign powers; or (2) if the surveillance is directed solely at the acquisition of technical intelligence, other than spoken communications, from property under the exclusive control of a foreign power. In addition, the Attorney General must certify that there is no substantial likelihood that such surveillance will acquire the communications of U.S. persons. (In essence, � 1802 authorizes the surveillance of communications between foreign governments, and between a foreign government and its embassy.) Section 1802 is of limited use, however, because it explicitly prohibits efforts to acquire spoken communications. (No such limitation exists in the parallel exception for physical searches, 50 U.S.C. � 1822(a), under which agents presumably could infiltrate a foreign power's property for the purpose of overhearing conversations.) This provision would enhance the presidential authorization exception by eliminating the requirement that electronic surveillance cannot be directed at the spoken communications of foreign powers.

Section 105: Law Enforcement Use of FISA Information.
50 U.S.C. � 1806(b) currently prohibits the disclosure of information "for law enforcement purposes" unless the disclosure includes a statement that the information cannot be used in a criminal proceeding without the Attorney General's advance authorization. This provision would amend � 1806(b) to give federal investigators and prosecutors greater flexibility to use FISA-obtained information. Specifically, it would eliminate the requirement that the Attorney General personally approve the use of such information in the criminal context, and would substitute a requirement that such use be approved by the Attorney General, the Deputy Attorney General, the Associate Attorney General, or an Assistant Attorney General designated by the Attorney General.

Section 106: Defense of Reliance on Authorization.
50 U.S.C. � 1809(b) and 1827(b) create a defense for agents who engage in unauthorized surveillance or searches, or who disclose information without authorization, if they were relying on an order issued by the FISA Court. However, there does not appear to be a statutory defense for agents who engage in surveillance or searches pursuant to FISA authorities under which no prior court approval is required--e.g., pursuant to FISA's wartime exception (50 U. S.C. �� 1811, 1829 & 1844), or FISA's presidential authorization exception (50 U.S.C. � 1802 & 1822(a)). This provision would clarify that the "good faith reliance" defense is available, not just when

2



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

agents are acting pursuant to a FISA Court order, but also when they are acting pursuant to a lawful authorization from the President or the Attorney General.

Section 107: Pen Registers in FISA Investigations.
50 U.S.C. � 1842(a)(1) makes FISA pen registers available in investigations of non-U.S. persons to "obtain foreign intelligence information." But for U.S. persons, the standard is much higher: in cases involving U.S. persons, pen registers are only available "to protect against international ism or clandestine intelligence activities." Perversely, this appears to be stricter than the standard for pen registers under Title III, which requires only that it be shown that the information "is relevant to an ongoing criminal investigation." 18 U.S.C. � 3123(a)(1). This provision would amend � 1842(a)(1) by eliminating the stricter standard for U.S. persons. Specifically, FISA pen registers would be available in investigations of both U.S. persons and non-U.S. persons whenever they could be used "to obtain foreign intelligence information."

Section 108: Appointed Counsel in Appeals to FISA Court of Review.
Under FISA, proceedings before the FISA Court and the Court of Review are conducted ex parte. As a result, when the Court of Review meets to consider an appeal by the United States, there is no party to defend the judgment of the court below. The FISA Court of Review thus is obliged to interpret sensitive and complicated statutes without the benefit of the adversary process. This provision would amend FISA to permit the FISA Court of Review, in its discretion, to appoint a lawyer, with appropriate security credentials, to defend the judgment of the FISA Court, when the United States appeals a ruling to the FISA Court of Review. It would also provide for the compensation of a lawyer so appointed by the FISA Court of Review.

Sec. 109: Enforcement of Foreign Intelligence Surveillance Court Orders.
The Foreign Intelligence Surveillance Act does not specify the means for enforcement of orders issued by the Foreign Intelligence Surveillance Court. Thus, for example, if a person refuses to comply with an order of the court to cooperate in the installation of a pen register or trap and trace device under 50 U.S.C. � 1842(d), or an order to produce records under 50 U.S.C. � 1861, existing law provides no clearly defined recourse to secure compliance with the court's order. This section remedies this omission by providing that the Foreign Intelligence Surveillance Court has the same authority as a United States district court to enforce its orders, including the authority to impose contempt sanctions in case of disobedience.

Sec. 110: Technical Correction Related to the USA PATRIOT Act.
3



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Section 204 of the USA PATRIOT Act clarified that intelligence exceptions from the limitations on interception and disclosure of wire, oral, and electronic communications continue to apply, notwithstanding section 216 of the Act. Section 224 sunsetted several provisions of the Act on December 31, 2005. Although section 216 was not included in the sunset provision, section 204's clarifying language was sunsetted. If not corrected, this anomaly will result in the loss of valuable and necessary intelligence exemptions to the pen register and trap and trace provisions after December 31, 2005. This provision would eliminate this anomaly and treat the clarifying language of section 204 the same as section 216.

Sec. 111. International ist Organizations as Foreign Powers.
Groups engaged in international ism are included under the definition of "foreign power" in FISA. See 50 U.S.C. � 1801(a)(4). However, for certain purposes--including the duration of surveillance orders and the definition of what constitutes a "United States person"--they are effectively excluded from the concept of foreign powers, and accorded the more protected treatment that FISA provides to other entities. This section amends FISA so that international terrorist organizations are consistently treated as foreign powers for these purposes.

More specifically, there are basically two sets within the FISA definition of "foreign power" under 50 U.S.C. � 1801(a): (i) A paragraph (1)-(3) set, which includes foreign governments, foreign factions, and entities that foreign governments openly acknowledge they direct and control. (ii) A paragraph (4)-(6) set, which includes groups engaged in international ism or preparations therefor, foreign-based political organizations not substantially composed of U.S. persons, and entities directed and controlled by foreign governments.

50 U.S.C. �� 1805(e) and 1824(d) define the authorization periods for electronic surveillance and physical searches under FISA. The basic authorization and extension periods are 90 days, but longer for surveillance and searches relating to certain foreign powers. Specifically, the authorization and extension periods for foreign powers in the paragraph (1)(3) set--foreign governments, foreign factions, and entities for which foreign governments openly acknowledge direction and control--are up to a year. In contrast, for foreign powers in the paragraph (4)-(6) set--international ist organizations, foreign-base political organizations not substantially composed of U.S. persons, and entities directed and controlled by foreign governments--the initial authorization period is no more than 90 days. The extension period for foreign powers in the paragraph (4)-(6) set is also no more than 90 days, unless certain restrictions and special finding requirements are satisfied. (Specifically, the extension period may be up to a year for an order relating to a foreign-based political organization not substantially composed of U.S. persons or an order relating to an entity directed and controlled by a foreign government, and up to a year for an order relating to an international ist organization that is not a U.S. person, if the judge finds probable cause to believe that no communication or property of any individual U.S. person will be acquired.)

4



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Another context in which different types of "foreign powers" are treated differently is the FISA definition of "United States person." United States persons have a more protected status under FISA for certain purposes, such as dissemination of information. The existing definition of "United States person" in 50 U.S.C. � 1801(i) categorically excludes a corporation or association which is a foreign power--but only if it falls in the paragraph (1)-(3) set.

The effect of the foregoing provisions is that, even if probable cause is established that a group is an international ist organization, it may be subject only to brief periods of surveillance absent renewal, and it may be accorded the protected status of a United States person. The amendments in this section will facilitate the investigation of threats to the national security posed by such groups by reassigning them to the less protected status now accorded to foreign powers in the paragraph (1)-(3) set. Thus, the normal authorization and extension periods for surveillance of international ist organizations would be up to a year, and corporations and associations which are international ist organizations would not be treated as United States persons under FISA.

Subtitle B: Enhancement of Law Enforcement Investigative Tools
Section 121: Definition of ist Activities.
This section adds a definition of % ist activities" to the definitional section for the chapter of the criminal code governing electronic surveillance (chapter 119). The definition encompasses criminal acts of domestic and international ism as defined in 18 U.S.C. � 2331, together with related preparatory, material support, and criminal activities. The same definition of terrorist activities would also apply through cross-referencing provisions, see 18 U.S.C. � 2711(1) and 3127(1) (as amended), in the chapters of the criminal code that govern accessing stored communications and the use of pen registers and trap and trace devices (chapters 121 and 206).

The surveillance chapters of the criminal code contain many provisions which state that the authorized surveillance activities may be carried out as part of "criminal investigations." Section 121 also adds a provision to 18 U.S.C. � 2510 which specifies that "criminal investigations" include all investigations of criminal ist activities, to make it clear that the full range of authorized surveillance techniques are available in investigations of % ist activities" under the new definition.

Section 122: Inclusion of ist Activities as Surveillance Predicates.
This section adds ist activities, as defined under the amendment of section 121, and four specific offenses that are likely to be committed by terrorists (the offenses defined by 18 U.S.C. � 37, 930(c), 956, and 1993), as explicit predicates for electronic surveillance and monitoring. It further adds an explicit reference to ist activities to the provision authorizing electronic

5



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

surveillance without a court order in emergency situations--18 U.S.C. � 2518(7)--and makes conforming changes in the corresponding provision (18 U.S.C. � 3125) for using pen registers and trap and trace devices without a court order in emergency situations.

The final subsection of this section modifies the definition of "court of competent jurisdiction" in 18 U.S.C. � 3127(2), to correct an unintended effect of amendments in sections 216(c)(1) and 220 of the USA PATRIOT Act. The purpose of the amendments was to authorize courts having jurisdiction over an offense to issue orders for pen registers and trap and trace devices, and search warrants for the disclosure of e-mails, which could be executed outside of their districts. However, the language utilized inadvertently created a lack of clarity concerning the continued validity of the pre-existing authority of the courts to issue such orders and warrants for within their own districts (regardless of whether they have "jurisdiction over the offense").

This threatens to be a serious practical problem when information gathering in the United States is needed in response to requests by foreign law enforcement agencies to assist in foreign ism (or other criminal investigations) and to fulfill the United States' obligations under mutual legal assistance treaties, and in the context of investigations relating to crimes committed on U.S. military bases abroad, because in those cases the U.S. courts generally do not have jurisdiction over the offense. This section corrects the problem in relation to pen register and trap and trace orders through definitional language that explicitly includes both a court with jurisdiction over the offense or activities being investigated, and a court in the district in which the order will be executed. A parallel correction for the problem relating to search warrants for e-mails appears in section 125(b) of this bill.

Section 123: Extension of Authorized Periods Relating to Surveillance and Searches in Investigations of ist Activities.
In Katz v. United States, 389 U.S. 347 (1967), the Supreme Court held for the first time that government wiretapping was subject to the Fourth Amendment. In response, Congress enacted Title III of the 1968 Omnibus Crime Control and Safe Streets Act, 28 U.S.C. �� 2510-2522, which governs electronic surveillance for all federal criminal offenses. Congress also subsequently enacted the Electronic Communications Privacy Act (ECPA), 18 U.S.C. �� 2701-2712, which addresses government access to stored communications, and established statutory standards and procedures for the use of pen registers and trap and trace devices, 18 U.S.C. �� 3121-3127. Further, because Katz and progeny specifically stated that the Court did not hold that the same Fourth Amendment restrictions applied with respect to the activities of foreign powers and their agents, in 1978 Congress enacted the Foreign Intelligence Surveillance Act, 50 U.S.C. �� 1801-1862, which establishes standards applicable to surveillance of foreign powers and agents of foreign powers--including electronic surveillance, physical searches, and use of pen registers and trap and trace devices--in relation to the investigation of such matters as international ism and espionage.

6



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Congress has not provided separate statutory standards governing investigations of wholly domestic threats to the national security, particularly domestic ism. Thus, such investigations are subject to the time limits set forth in Title III. However, the Supreme Court in United States v. United States District Court ("Keith"), 407 U.S. 297 (1972), explicitly recognized that domestic security investigations would require different standards than those set forth in Title III:

"We recognize that domestic security surveillance may involve different policy and practical considerations from the surveillance of 'ordinary crime.' The gathering of security intelligence is often long range and involves the interrelation of various sources and types of information. The exact targets of such surveillance may be more difficult to identify than in surveillance operations against many types of crime specified in Title III. Often, too, the emphasis of domestic intelligence gathering is on the prevention of unlawful activity or the enhancement of the Government's preparedness for some possible future crisis or emergency. Thus, the focus of domestic surveillance may be less precise than that directed against more conventional types of crime."
Id. at 322. Because domestic security investigations were subject to Title III, despite these considerations, the Court invited Congress to legislate new and different standards for such investigations:

"Given [the] potential distinctions between Title III criminal surveillances and those involving the domestic security, Congress may wish to consider protective standards for the latter which differ from those already prescribed for specified crimes in Title III. Different standards may be compatible with the Fourth Amendment if they are reasonable both in relation to the legitimate need of Government for intelligence information and the protected rights of our citizens."
Id.

In Keith, the court noted that, with respect to surveillance in domestic security cases, "the time and reporting requirements need not be so strict as those in � 2518." Id. at 323. This section accepts the Court's invitation and extends, in investigations of ist activities, a number of statutory time limits or periods relating to electronic surveillance or monitoring and searches. The specific changes are:

(1) Amend 18 U.S.C. � 2518(5) to extend the normal duration of electronic surveillance orders in investigations of ist activities from 30 days to 90 days.

(2) Amend 18 U.S.C. � 2518(6), which provides that an electronic surveillance order may require periodic progress reports to the judge who issued the order "at such intervals as

7



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

the judge may require." As amended, the provision would not allow reports to be required at shorter intervals than 30 days in investigations of ist activities.

(3) Amend 18 U.S.C. � 2705, which permits delaying notification concerning the accessing of a person's stored electronic communications where specified "adverse results" would result from the notification. As amended, the provision would include endangerment of the national security as a specified adverse result that permits delaying notification.

(4) Amend 18 U.S.C. � 3123 to extend the normal authorization periods for pen registers and trap and trace devices in investigations of ist activities from 60 days to 120 days.

Section 124: Multi-function Devices
Electronic manufacturers increasingly are producing devices that are capable of performing multiple functions--e.g., cell phones that also can send e-mail like a Blackberry, and that include a calendar like a Palm Pilot. Multiple functions are also illustrated by ordinary home computers, which may, for example, be used to send and receive e-mail messages, to engage in oral communications through an Internet phone service, to store sent and received messages, and to store other information. Current law does not make it clear that the authorization (e.g., under an electronic surveillance order) to monitor one of a device's functions also entails the authority to monitor other functions.

This section accordingly amends 18 U.S.C. � 2518(4) to make it clear that authorization of electronic surveillance with respect to a device, unless otherwise specified, may be relied on to intercept and access communications through any of the device's functions. The section also effectively allows a search warrant for other information retrievable from the device (whether or not related to the intercepted communications) to be combined with the electronic surveillance order, and makes conforming changes in the chapters relating to accessing stored communications and pen registers and trap and trace devices.

The section further incorporates a correction for an unintended consequence of amendments in section 220 of the USA PATRIOT Act. As discussed in relation to section 122 of the bill above, amendments designed to authorize courts having jurisdiction over an offense to issue search warrants for the disclosure of e-mails outside of their districts have inadvertently clouded the pre-existing authority of the courts to issue such orders and warrants for within their own districts. This section corrects the problem by amending the pertinent language in 18 U.S.C. � 2703(b)(1)(A) and (c)(1)(A) to refer to a court in a district in which a provider of electronic communications service is located, as well as a court having jurisdiction over the offense or activities under investigation.

8



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Section 125: Nationwide Search Warrants in ism Investigations.
Federal Rule of Criminal Procedure 41(a)(3) currently authorizes judges in one district to issue search warrants that are valid in another district, if the crime being investigated is "domestic ism or international ism" as defined in 18 U.S.C. � 2331. But � 2331 sets forth an extremely narrow definition of ism, as it is limited to "violent acts or acts dangerous to human life." Thus section 2331 arguably does not include investigations into terrorist financing, or other crimes that ists are likely to commit. As a result, a federal judge sitting in New York would be able to issue a search warrant that is valid in California in an investigation of a plot to a building, but arguably could not issue the same warrant if the investigation concerned the raising of money to support ist operations.

This provision would expand the types of ism crimes for which judges may issue search warrants that are valid nationwide. Specifically, it would authorize nationwide search warrants in investigations of the offenses listed in 18 U.S.C. � 2332b(g)(5)(B), including computer crimes, attacks on communications infrastructure, and providing material support to ists or ist organizations.

Section 126: Equal Access to Consumer Credit Reports.
In recent years, it has become increasingly apparent that law enforcement investigators need access to suspected ists' banking information to determine their connections to ist organizations, including financial ties. The current version of 15 U.S.C. � 1681b(a)(1) allows investigators to obtain a suspect's credit report-the first step in locating his banking recordsonly in response to a court order or a federal grand jury subpoena. As a result, law enforcement cannot obtain a suspect's banking information without issuing multiple timeconsuming subpoenas. In some cases, it can take a series of three subpoenas--first to the credit reporting agency, then to the suspect's creditors, then to the suspect's banks--and a period of nine to 12 weeks to learn where a suspected ist keeps his accounts. Perversely, the law makes it far easier for priva ies to obtain an individual's credit reports; under 15 U.S.C. � 1681b(a)(3)(F), a priva y can obtain--usually within minutes--a credit report on anyone in the United States so long as it has a "legitimate business need" for the information.

This provision would enable the government to obtain credit reports on virtually the same terms that priva ies may. Specifically, it would amend � 1681b(a)(1) to allow law enforcement officers to obtain credit reports upon their certification that they will use the information only in connection with their duties to enforce federal law. This certification parallels the existing requirement that a priva y must have a "legitimate business need" before obtaining a credit report. In addition, to avoid alerting ists that they are under investigation, this provision would prohibit (absent court approval) disclosing to a consumer the fact that law enforcement has sought his credit report.

9



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Section 127: Authority.
Autopsies of the victims of ist attacks and other ly crimes, as well as other persons, can be an effective way of obtaining information about the perpetrators. In addition to revealing the cause of , sometimes enable law enforcement to retrieve forensic evidence (such as fragments) from the deceased's body. The primary need for federal authority arises in the case of offenses, including acts of ism, outside the United States. At present, however, except in cases involving military personnel, the United States has no statutory authority to conduct . When a non-military United States national dies abroad as a result of a possible offense against the United States, the victim's body typically must be transported back to the United States before an can be performed; this may significantly delay both the return of the loved one's remains to family members, as well as cause significant delays in the criminal investigation.

This provision would create federal authority, in the Attorney General, to conduct when necessary or appropriate in the conduct of federal criminal investigations. This authority is not limited and may be delegated to other officers. This proposal is not intended to result in the hiring of medical examiners by federal law enforcement agencies. Rather, the will be performed by local coroners, private forensics investigators, or the Armed Forces Medical Examiner and his staff.

Section 128: Administrative Subpoenas in ism Investigations.
The Department of Justice currently has the authority to issue administrative subpoenas in investigations of a wide variety of federal offenses, including health-care fraud, see 18 U.S.C. � 3486(a)(1)(A), immigration violations, see 8 U.S.C. � 1225(a), and false claims against the United States, see 31 U.S.C. � 3733. But administrative subpoenas are not available in investigations of ism, even though the consequences of a ist attack are far more dire than committing simple fraud against the United States government. As a result, lawenforcement personnel are required to seek grand jury subpoenas before individuals who may have information relevant to a terrorism investigation can be compelled to testify or provide documents.

This provision would extend the existing administrative-subpoena authorities into investigations involving domestic or international ism. It also would prohibit a subpoena recipient from disclosing to any other person (except to a lawyer in order to obtain legal advice) the fact that he has received a subpoena. This proposal would not give the Justice Department a unilateral, unreviewable authority to compel production of documents relevant to a ism investigation. If recipients refuse to comply with subpoenas, the Justice Department would have to ask a court to enforce them. And subpoena recipients would retain the ability, as they do in other contexts, to ask a court to quash the subpoena. See, e.g., In re Administrative Subpoena, John Doe, D.P.M., 253 F.3d 256 (6th Cir. 2001).

10



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Sec. 129: Strengthening Access to and Use of Information in National Security Investigations.
This section is primarily concerned with correcting problems and weaknesses in provisions authorizing the use of "national security letters." In substance, national security letters are administrative subpoenas that may be issued by FBI officials--or in some instances, other authorized government officials-to obtain specified types of records or information for use in national security investigations. The existing national security letter provisions include the following:

(1) 18 U.S.C. � 2709--Providing FBI access, in connection with investigations of international ism or espionage, to certain electronic communication transactional records maintained by communication service providers.

(2) Section 625(a)-(b) of the Fair Credit Reporting Act (15 U.S.C. � 168 Iu(a)(b))--Providing FBI access, in connection with investigations of international ism or espionage, to certain consumer information maintained by consumer reporting agencies.

(3) Section 626 of the Fair Credit Reporting Act (15 U.S.C. � 1681v)--Providing access to consumer reports and other consumer information maintained by consumer reporting agencies, where needed by government agencies authorized to investigate or carry out intelligence or analysis activities related to international ism.

(4) Section 1114(a)(5) of the Right to Financial Privacy Act (12 U.S.C. � 3414(a)(5))--Providing FBI access, in connection with investigations of international ism or espionage, to financial records maintained by financial institutions.

(5) Section 802(a) of the National Security Act of 1947 (50 U.S.C. � 436(a))--Providing access by authorized investigative agencies to financial records and information, consumer reports, and travel records in relation to a person having access to classified information, based on indications that the person has disclosed or may disclose classified information to a foreign power.

Problems under these provisions include the following: (1) The statutes in which the national security letter provisions appear generally prohibit persons from disclosing that they have received these requests for information, to safeguard the integrity of the ism and espionage investigations in which national security letters are used. However, they specify no penalty for persons who make such unlawful disclosures. (2) While these statutes create a legal obligation for the recipient to provide the requested information, they do not specify any procedures for judicial enforcement in case the recipient refuses to comply with the request. (3) The scope of the national security letter provisions on the ism side is generally limited to international

11



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

terrorism; however, the distinction between international and domestic terrorism is increasingly elusive in contemporary circumstances. (4) These provisions are restrictive regarding the sharing of information among federal agencies with relevant responsibilities. This is in conflict with current needs and with the broad principles favoring the sharing of intelligence among federal agencies under the USA PATRIOT Act.

Subsection (a) of this section provides appropriate penalties for violations of the nondisclosure provisions of the national security letter provisions. Currently, 18 U. S.C. � 1510(b) makes it an offense for an officer of a financial institution to notify other persons about a grand jury subpoena or an administrative subpoena issued by the Department of Justice for records of the financial institution. The offense is punishable by up to a year of imprisonment, or up to five years of imprisonment if the disclosure was made with the intent to obstruct a judicial proceeding. Similarly, 18 U.S.C. � 1510(d) makes it an offense, punishable by up to five years of imprisonment, for an insurance company employee to notify other persons about a grand jury subpoena for records with intent to obstruct a judicial proceeding.

Subsection (a) of this section adds a parallel offense (proposed 18 U.S.C. � 1510(e)) covering violations of the non-disclosure requirements of the national security letter provisions described above. As with current 18 U.S.C. � 1510(b), the offense would be a misdemeanor punishable by up to a year of imprisonment, but would be punishable by up to five years of imprisonment if the unlawful disclosure was committed with the intent to obstruct the ism or espionage investigation. In addition to providing appropriate penalties for unlawful disclosure of national security letter requests, the same penalties would apply to: (i) violation of the non-disclosure requirement under 50, U. S .C. � 1861(d) for orders of the Foreign Intelligence Surveillance Court requiring the production of records, documents, and other tangible things in connection with investigations to obtain foreign intelligence information about non-United States persons or to protect against international ism or espionage, and (ii) violation of the non-disclosure provision of proposed 18 U.S.C. � 2332f(d) in section 129 of this bill, relating to administrative subpoenas in ism investigations.

The national security letter provisions make compliance with the request for information mandatory. See 12 U.S.C. � 3414(a)(5)(A); 15 U.S.C. � 1681u(a)-(b), 1681v(a); 18 U.S.C. � 2709(a); 50 U.S.C. � 436(c). However, they make no provision for judicial enforcement in case this legal obligation is not met. Subsection (b) of this section authorizes the Attorney General to seek judicial enforcement in such cases. This is similar, for example, to the existing judicial enforcement provision in 18 U.S.C. � 3486(c) for administrative subpoenas under that section.

Subsection (c) of this section amends the national security letter provisions relating to electronic communication transactional records, consumer credit information, and financial institution records, so that they apply in investigations of all types of ist activities. The specific amendments involve substituting, for current references in these provisions to

12



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

investigations relating to "international ism," references to investigations relating to % ist activities." The latter notion is defined in proposed 18 U.S.C. � 2510(20) in section 121 of this bill so as to include domestic, as well as international, ism. The limitation to international terrorism in existing law is an impediment to the effective use of national security letters because it may not be apparent in the early stages of a terrorism investigation-or even after it has continued for some time-whether domestic or international ism is involved. The Oklahoma City ing and the anthrax letter incidents illustrate this point. Moreover, in the current circumstances, domestic ists who attempt to ally with or are inspired to emulate international ists are an increasing concern. The dangers posed to the national security by such persons may be comparable to those posed by international ists, and national security letters should likewise be an available tool in the investigation of their criminal activities.

Subsection (d) of this section deletes or modifies language in the national security letter provisions which unduly limits information sharing among federal agencies. For example, 18 U.S.C. � 2709 is the national security letter provision for electronic communication transactional records. Subsection (d) of � 2709 states that the FBI may disseminate information and records obtained pursuant to that section only as provided in guidelines approved by the Attorney General "for foreign intelligence collection and foreign counterintelligence investigations conducted by the Federal Bureau of Investigation, and, with respect to dissemination to an agency of the United States, only if such information is clearly relevant to the authorized responsibilities of such agency." The reference to guidelines that relate to "foreign intelligence collection and foreign counterintelligence investigations" is inconsistent with the amendment proposed in subsection (c) of this section to extend the scope of 18 U.S.C. � 2709 to include investigations of domestic ism, as well as international ism. The restrictive language regarding information sharing with other federal agencies is in conflict with the principles favoring broad sharing of intelligence among federal agencies under section 203 of the USA PATRIOT Act (Pub. L. 107-56).

Subsection (c) of this section accordingly deletes the restrictive language quoted above in 18 U.S.C. � 2709(d), so that it states simply that the FBI may disseminate information and records obtained under � 2709 only as provided in guidelines approved by the Attorney General. Subsection (c) also makes similar changes in the other national security letter provisions. The general effect of the amendments is to remove existing impediments to the sharing of information obtained by means of national security letters in ism and espionage investigations with other federal agencies having relevant responsibilities.

Title II: Protecting National Security Information
Section 201: Prohibition of Disclosure of ism Investigation Detainee Information.
13



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

In certain instances, the release of information about persons detained in connection with ism investigations could have a substantial adverse impact on the United States' security interests, as well as the detainee's privacy. Cf. North Jersey Media Group, Inc. v. Ashcroft, 308 F.3d 198, 217-19 (3d Cir. 2002). Publicizing the fact that a particular alien has been detained could alert his coconspirators about the extent of the federal investigation and the imminence of their own detention, thus provoking them to flee to avoid detention and prosecution or to accelerate their ist plans before they can be disrupted.

Although existing Freedom of Information Act (FOIA) exemptions 7(A), 7(C), and 7(F) (5 U.S.C. � 552(b)(7)) permit the government to protect information relating to detainees, defending this interpretation through litigation requires extensive Department of Justice resources, which would be better spent detecting and incapacitate ists. This provision thus establishes a specific authority under Exemption 3 of the FOIA to clarify what is already implicit in various FOIA exemptions: the government need not disclose information about individuals detained in investigations of ism until disclosure occurs routinely upon the initiation of criminal charges.

Section 202: Distribution of "Worst Case Scenario" Information.
Section 112(r) of the Clean Air Act, 42 U. S.C. � 7412(r), requires private companies that use potentially dangerous chemicals to submit to the Environmental Protection Agency a "worst case scenario" report detailing what would be the impact on the surrounding community of release of the specified chemicals. Such reports are a roadmap for ists, who could use the information to plan attacks on the facilities.

This provision would revise section 112(r)(7)(H) of the Clean Air Act to better manage access to information contained in "worst case scenario" reports. This revised section would continue to allow such information to be shared with federal and state officials who are responsible for preventing or responding to accidental or criminal releases. However, the revised section will require that public access be limited to "read-only" ods, and only to those persons who live or work in the geographical area likely to be affected by a worst-case release from a facility.

Section 203: Information Relating to Capitol Buildings.
The Congressional Accountability Act of 1995, 2 U.S.C. � 1301 et seq., establishes the Office of Compliance, a congressional office that has the power to enforce OSHA standards with respect to the working conditions of legislative branch employees. OSHA often assists the Office in its work, see 2 USC. � 1382(e) & 1385(b), and therefore the agency sometimes obtains securitysensitive information (e.g., the layout of government buildings, and the location of air circulation equipment and ventilation ducts). ists may be able to obtain this information from OSHA via a FOIA request. To ensure that congressional officials can provide necessary information with

14



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

the assurance that it will not be publicly released, this provision makes clear that such information is exempt from disclosure under FOIA Exemption 3.

Section 204: Ex Parte Authorizations Under Classified Information Procedures Act.
Under the current version of the Classified Information Procedures Act, 18 U.S.C. App. 3 � 116, courts have discretion over whether to approve the government's request for a CIPA authorization-which enables the submission of sensitive evidence ex parte and in camera. See 18 U.S.C. App. 3 � 4 ("The court may permit the United States to make a request for such authorization [for a protective order] in the form of a written statement to be inspected by the court alone." (emphasis added)). As a result, the government is forced to divert valuable resources to litigating this question. And even worse, a request for confidentiality itself can be a security breach: the government risks disclosing sensitive national-security information simply by explaining in open court why the information should be redacted. See, e.g., United States v. Rezaq, 899 F. Supp. 697, 707 (D.D.C. 1995) (government's CIPA pleadings must be served "on the defendant and then litigated in an adversarial hearing").

This provision would amend CIPA to provide that courts shall allow the United States to make a request for a CIPA authorization ex parte and in camera. This amendment would not affect the showing that the United States is required to make in order to obtain a protective order, but by replacing "may" with "shall," the United States will be able to obtain the court's guidance in every case in which classified information may potentially be discoverable, without risking disclosure of the very secrets that it seeks to protect. See United States v. Klimavicius-Viloria, 144 F.3d 1249, 1261 (9th Cir. 1998) (upholding the use under CIPA of ex parte, in camera hearings and written submissions by the government when the court is required to make discovery determinations).

Section 205: Exclusion of United States Security Requirements from Gross Income of Protected Officials.
Under current tax law, certain federal officials--those whose movements are restricted, or who are required to use specific facilities, for their physical protection in the interest of the United States' national security--may be taxed on the value of these protective "services." See 26 C.F.R. 1.132-5(m) (describing the circumstances under which police protection and related transportation expenses may be deemed to be working condition fringe benefits). Due to the recent ist threats, an increasing and variable number of government officials--including Cabinet and subcabinet officers, congressional leaders, and Justices of the Supreme Court--have begun to receive protective services, and now find themselves taxed on the value of these services.

15



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Accordingly, this provision would add a provision to the Internal Revenue Code to clarify that required security measures jointly determined by the Secretary of the Treasury, the Attorney General, and the Director of Central Intelligence, are excludable from the gross income of the protected officials. This provision is limited to provisions from appropriate fluids to be consistent with restrictions on the receipt of private funds for public purposes, and to ensure that the exclusion is limited to the public security purpose.

Section 206: Grand Jury Information in ism Cases.
This section amends Rule 6(e)(2)(B) of the Federal Rules of Criminal Procedure to make witnesses and persons to whom subpoenas are directed subject to grand jury secrecy rules in cases where serious adverse consequences may otherwise result, including danger to the national security or to the life or physical safety of an individual, flight from prosecution, destruction of or tampering with evidence, intimidation of a potential witness, or other serious jeopardy to an investigation. The provision would permit witnesses and recipients of grand jury subpoenas to consult with counsel regarding the subpoena and any testimony, but would impose the same secrecy obligations on counsel.

Title III: Enhancing Investigations of ist Plots
Subtitle A: ism Identification Database
Section 301: Short Title.
This provision indicates that Title III, Subtitle B may be referred to as the "Terrorist Identification Database Act of 2003."

Section 302: Collection and Use of Identification Information from Suspected Terrorists and Other Sources.
Current law permits the FBI to establish an index to collect DNA identification records of persons convicted of certain crimes, and DNA samples recovered from crime scenes and unidentified human remains. 42 U.S.C. � 14132. However, the law does not directly address the FBI's authority to collect and use DNA samples of ists or those suspected of ism. It would be extremely beneficial to clarify how DNA samples from suspects, such as samples taken from unlawful combatants at Guantanaino Bay, can be used as necessary for counterterrorism and law-enforcement purposes. Section 302 would allow the Attorney General or Secretary of Defense to collect, analyze, and maintain DNA samples and other identification information from "suspected ists"--i.e., (1) persons suspected of engaging in ism as defined in 18 U.S.C. � 2331 (1) & (5), or committing an offense described in 18 U.S.C. � 2332b(g)(5)(B), or persons conspiring or attempting to do so; (2) enemy combatants or other battlefield detainees;

16



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

(3) persons suspected of being members of a ist organization; and (4) certain classes of aliens including those engaged in activity that endangers national security.

Section 303: Establishment of Database to Facilitate Investigation and Prevention of ist Activities.
This provision would allow the Attorney General to establish databases of DNA records pertaining to the ists or suspected ists from whom DNA samples or other identification information have been collected. All federal agencies, including the Department of Defense and probation offices, would be required to give the Attorney General, for inclusion in the databases, any DNA records, fingerprints, or other identification information that can be collected under this Subtitle. This provision also allows the Attorney General to use the information to detect, investigate, prosecute, prevent, or respond to ist activities, or other unlawful activities by suspected ists. In addition, the Attorney General would be able to share the information with other federal, state, local, or foreign agencies for the same purposes.

Section 304: Definitions.
This section would establish definitions for the terms "DNA sample" and "DNA analysis." It also would define "suspected ist," which describes the class of individuals from whom the Attorney General may acquire DNA samples and other identification information, and whose information may be included in DNA databases.

Section 305: Existing Authorities.
This provision would establish that the new authorities created by this Subtitle are in addition toy authorities that may exist under any other source of law. It also would provide that this Subtitle shall not construed to preclude the receipt, collection, analysis, maintenance, or dissemination of evidence or information pursuant to any other source of law.

Section 306: Conditions of Release.
This provision would amend several portions of the United States Code to clarify that ists or suspected ists who are under any form of federal supervision or conditional release, including parole, are subject to this Subtitle's provisions. These individuals would be in the physical custody of the United States but for an act of governmental discretion. This section would require such individuals to cooperate in the collection of a DNA sample as a condition of supervision or conditional release.

Subtitle B: Facilitating Information Sharing and Cooperation
17



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

Section 311: State and Local Information Sharing.
Section 203 and other provisions of the USA PATRIOT Act broadened authority to share information among federal agencies that may be relevant to the detection and prevention of ism, and to obtain otherwise confidential information for use in ism investigations. That Act, however, did not adequately address the need for enhanced information sharing authority in relation to state and local officials and foreign governments, who are the critical partners of the United States in investigating ist crimes and preventing future ist attacks. This section of the bill would provide further authority for sharing of consumer credit information, visa-related information, and educational records information with state and local law enforcement, thereby enacting the remainder of the information sharing proposals that have been proposed legislatively and endorsed by the Administration and the Department of Justice. See Letter of Assistant Attorney General Daniel J. Bryant to Honorable Patrick J. Leahy concerning S. 1615 (April 30, 2002).

Section 312: Appropriate Remedies with Respect to Law Enforcement Surveillance Activities.
During the 1970s and 1980s, some law enforcement agencies--e.g., the New York City Police Department--entered consent decrees that limit such agencies from gathering information about organizations and individuals that may be engaged in terrorist activities and other criminal wrongdoing. See, e.g., Handschu v. Special Servs. Div., 605 F. Supp. 1384 (S.D.N.Y. 1985), aff'd, 787 F.2d 828 (2d Cir. 1986). As a result, they lack the ability to use the full range of investigative techniques that are lawful under the Constitution, and that are available to the FBI. (For example, the Attorney General's investigative guidelines authorize agents, subject to certain restrictions, to attend public places and events "on the same terms and conditions as members of the public generally.") The consent decrees also handicap officers in their efforts to share information with other law enforcement agencies, including federal law enforcement agencies such as the FBI. These problems threaten to frustrate the operations of the federal-state-local Joint ism Task Forces, and could prevent effective cooperation at all levels of government in antiterrorism efforts. As the United States Court of Appeals for the Seventh Circuit explained (before September 11) in discussing one consent decree, as a result of such a decree "the public safety is insecure and the prerogatives of local government scorned. To continue federal judicial micromanagement of local investigations of domestic and international ist activities ... is to undermine the federal system and to trifle with the public safety." Alliance to End Repression v. City of Chicago, 237 F.3d 799, 802 (7th Cir. 2001).

This proposal would discontinue most consent decrees that could impede terrorism investigations conducted by federal, state or local law enforcement agencies. It would immediately terminate most decrees that were enacted before September 11, 2001 (including New York City's). All surviving decrees would have to be necessary to correct a current and ongoing

18



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

violation of a Federal right, extend no further than necessary to correct the violation of the Federal right, and be narrowly drawn and the least intrusive means to correct the violation. This provision is ed on the Prison Litigation Reform Act, 18 U.S.C. � 3626, which terminated many prison-related consent decrees and which repeatedly has been upheld by the courts. Section 312 does not apply to consent decrees or injunctions remedying discrimination based on race, color, religion, , or national origin, and therefore would not affect decrees or injunctions involving allegations of racial profiling.

Section 313: Disclosure of Information.
This provision provides protection against civil liability for businesses and their personnel who voluntarily provide information to federal law enforcement agencies to assist in the investigation and prevention of ist activities. The purpose of the provision is to encourage voluntary cooperation and assistance in counterterrorism efforts by priva ies and individuals.

Subtitle C: Facilitating International ism Investigations
Section 321: Authority to Seek Search Warrants and Orders to Assist Foreign States.
28 U.S.C. � 1782 does not clearly authorize the United States to obtain search warrants in response to requests from foreign governments; it only clearly applies to subpoenas. Nor is it clear that federal law enforcement can obtain orders under the pen register/trap and trace statute at foreign governments' requests. As a result, the United States can seek search warrants only if we have entered into a treaty with the foreign government that contains a provision authorizing us to do so (and, naturally, only if the foreign government has set forth facts sufficient to establish probable cause). The same is true of pen./trap orders. The United States therefore may find itself in a situation where it cannot assist a foreign government in one of its criminal investigations, which is hardly an effective way of encouraging foreign allies to assist our own counterterrorism investigations.

This provision would modify federal law to clarify that the United States may seek search warrants, pen/trap orders, and ECPA orders, in response to the requests of foreign governments. Doing so will enhance our ability to assist foreign law enforcement investigations, as well as promote better cooperation from foreign allies when we seek evidence from within their borders.

Section 322: Extradition Without Treaties and for Offenses Not Covered by an Existing Treaty.
Many of the United States' older extradition treaties contain "lists" or "schedules" of extraditable offenses that reflect only those serious crimes in existence at the time the treaties

19



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

were negotiated. (For. example, our treaty with Egypt dates from 1874, and our treaty with Great Britain which includes Pakistan dates from the 1930s.) As a result, these older treaties often fail to include more modern offenses, such as money laundering, computer crimes, and certain crimes against children. While some old treaties are supplemented by newer multilateral ism treaties, extradition is possible under these newer treaties only if the other country is also a party to the multinational treaty, leaving gaps in coverage. Additionally, absent a few narrow exceptions, U.S. law permits the extradition of offenders to a foreign nation only when there is a treaty or convention in force with that country or a statute conferring such authority upon the executive branch. See Valentine v. United States, 299 U.S. 5, 8 (1936). At present, there are close to seventy countries in the world with which the U.S. has no extradition treaty at all. This means that the U.S. can become a "safe haven" for some foreign criminals, and that we cannot take advantage of some countries' willingness to surrender fugitives to us in the absence of an extradition treaty these nations usually require at least the possibility of reciprocity.

This provision would amend current extradition law to: (1) authorize the U.S. to extradite offenders to treaty partners for modern crimes that may not be included in our older list treaties with those countries; and (2) provide for on a case-by-case basis and with the approval of the Attorney General and the Secretary of State extradition from the United States for serious crimes even in the absence of an extradition treaty.

Title IV: Enhancing Prosecution and Prevention of ist Crimes
Subtitle A: Increased Penalties and Protections Against Terrorist Acts
Section 401: ism Hoaxes.
In the wake of the anthrax attacks in the fall of 2001, a number of individuals chose to perpetrate ism hoaxes (e.g., sending unidentified white powder in a letter with the intent that the recipient believe it to be anthrax). Such hoaxes divert law-enforcement and emergencyservices resources, and thus impede our ability to respond to actual ist events. Current federal law does not adequately address the problem of hoaxes relating to various weapons of mass destruction. At present, the primary way to prosecute terrorism hoaxes is to use "threat" statutes--e.g., 18 U.S.C. � 2332a, which criminalizes certain threats to use a weapon of mass destruction, and 18 U.S.C. � 876, which criminalizes the use of the mails to threaten injury to a person. But some ism hoaxes are simply false reports that cannot easily be characterized as outright threats.

This section would amend federal law to create a new prohibition on ism hoaxes. In particular, it would (1) make it unlawful to knowingly convey false or misleading information, where the information reasonably may be believed, and concerns criminal activity relating to

20



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

weapons of mass destruction; (2) require criminal defendants to reimburse any person, including the United States, State and local first responders who incur expenses incident to an emergency or investigative response to the ism hoax; and (3) authorize a civil action for such expenses.

Section 402: Providing Material Support to ism.
18 U.S.C. � 2339A's prohibition on providing material support to ists is unnecessarily narrow; it currently does not reach all situations where material support o resources are provided to facilitate the commission of "international ism." Rather, � 2339A only encompasses those acts of international ism which are prohibited by some other federal statute. Because, unlike the existing underlying offenses in � 2339A(a), "international terrorism" per se is not an offense under Title 18, it is prudent to establish unassailable constitutional bases for prohibiting such support. The first basis is if the material support is in or affects interstate or foreign commerce. The second basis is the regulation and control over the activities of U.S. nationals and U.S. legal entities who are outside the United States. Such control is based on, among others, the United States' constitutional foreign affairs power. In addition, this section amends the definition of "international ism" to make it clear that it covers acts which by their nature appear to be intended for the stated purposes. Hence, there would be no requirement to show that the defendants actually had such an intent. (There is a conforming amendment to the definition of "domestic ism" to maintain the existing parallel between the two definitions.)

Second, one court of appeals recently has questioned whether the current prohibition in 18 U.S.C. � 2339B on providing "training" or "personnel" to terrorist organizations designated under section 219 of the Immigration and Nationality Act are unconstitutionally vague. See Humanitarian Law Project v. Reno, 205 F.3d 1130 (9th Cir. 2000), cert. denied, 121 S. Ct. 1226 (2001). But see United States v. Lindh, ___ F. Supp. 2d (E.D. Va. 2002) (rejecting the holding of Humanitarian Law Project). Subsection (b) would amend the pertinent statutes to remove any possible doubts about the scope of the prohibition. In particular, "training" would now be defined as "instruction or teaching designed to impart a specific skill." And criminal liability for "personnel" would apply to "knowingly provid[ing], attempt[ing] to provide, or conspir[ing] to provide a ist organization with one or more individuals (including himself) to work in concert with it or under its direction or control."

Section 403: Weapons of Mass Destruction.
At present, the federal weapons of mass destruction statute, 18 U.S.C. � 2332a, contains only one of the several constitutional bases for asserting federal jurisdiction over a ist attack involving weapons of mass destruction in certain circumstances: if the attack is against a person or property and "affect[s] interstate commerce." Id. � 2332a(a)(2). This provision would amend the statute to specifically cover property and persons in three other circumstances where federal jurisdiction constitutionally can be asserted: (1) if the mail or any facility of interstate or foreign

21



--------------------------------------------------------------------------------


CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003

commerce is used in furtherance of the offense; (2) if the attacked



posted on Oct, 2 2003 @ 09:04 PM
link   
A lot of people expressed their views here:

www.abovetopsecret.com...


I don't think anyone at ATS would be for any aspect of the new expanded version that goes beyond pure terrorism.

But to be honest, I'm not even sure how many people know what the acronym U.S.A. P.A.T.R.I.O.T. Act stands for.

I think you may receive some suggestions to link to large slabs of text such as whol legislation rather than posting them. What is your opinion of it anyway?



posted on Oct, 2 2003 @ 09:39 PM
link   
Well you asked for it so here it is.

I really don't know how to explain this without telling you a little about myself, so please bare with me.

I'm 28 years old, and I was raised a republican. I'm very against gun laws just for the simple fact that I think our constitution was made with the thought in mind that our government might want to take over one day. And that if that ever happens "We the People" can do somthing about it. My step father owns a gun shop, and everyday our gun rights are taken away. Disarming the people.

I'm also a christian, not to be mistaken by someone who is perfect, I'm very far from perfect I have many problems that I have to deal with every day. Most of them are caused by my own sins. But throught the grace of God I know I'm saved, and strive day to day to be a better person.

To make a long story short, and if I'm not giving enough detail please let me know. But I think the PA2 is taking away the rights of EVERYONE in the USA using Terrorism as an excuse to spy/take over the rights of law bidding citizens, bringing terrorism in our own country through our government. Currently we have our government building consentration camps in the USA we have our own nation taking God from the country. I think this "Patriot Act 2" is just a re-done constitution. That may sound insane and I take any info that anyone has to say. I'm here to learn and take responses from others.

I just think that everyday our rights are taken away as a people, and it's all done in the name of "Good".



posted on Mar, 16 2004 @ 12:18 PM
link   
Well, I think the second Patriot Act is worse than the first. I believe they created the second one because the first wasn't doing the job they wanted. Here's the link to Alex Jones analysis of Patriot Act 2.

www.infowars.com...

It angers me more than the first.



posted on Mar, 16 2004 @ 12:54 PM
link   
This is flat out terrifying. America seems to be on it's last legs. We are going from democracy to dictatorship on the fast track. I think it's time to start thinking about canada ha ha....or englad...



posted on Mar, 16 2004 @ 01:33 PM
link   
I'm going to chime in as a conservative. The Patriot act was ok and doable so long as it remained temporary as it was first written - now that does'nt seem to be the case, as a constitutinalist in belief this is my major beef with Bush. However I also feel that a different party in control would come up with even more draconian laws couched in socialist language. I really agree with neither option though. I'll have to stick with the lessor of two evils here.



posted on Mar, 16 2004 @ 01:35 PM
link   
Maybe John Titor was right...I could definitely see things like this leading to a Civil War in the US.



posted on Mar, 16 2004 @ 01:43 PM
link   
And it this document even real? Or is it just a "conspiracy" document with no proof, such as the MJ-12 docs?



posted on Mar, 16 2004 @ 06:03 PM
link   
This doc is real. Type in the title or bill number at this site and read it there yourself.
thomas.loc.gov...

As for my opinion I think this is a horrible thing if this gets passed. I was 100% against the original PATRIOT Act and this is way worse. At least with PA1 your civil rights couldn't be violated unless you were declared an "enemy combatant", now everybody's fair game. The Founding Fathers are probably spinning in their graves rights now.



posted on Mar, 16 2004 @ 06:18 PM
link   
if the public every actually read that thing...there would be riots in the streets....so what does the govt....don't talk about it. the mainstream media is worthless and the other forms of media are consider conspiracy media. john titor here we come



posted on Mar, 16 2004 @ 06:21 PM
link   
how about we mail-bomb (as in, spam their emails) the documents to media until A) they run the story or B) they press criminal charges. Either way, guaranteed press.



posted on Mar, 16 2004 @ 06:40 PM
link   
Guess what? This isn't the first time this has happened. Look up Lincoln and the writ of habeus corpus and Wilson and the Sedition and Espionage Act of 1917,



posted on Mar, 16 2004 @ 06:43 PM
link   
And Executive Order during WWII that let to internment of japanese...and the HUAC...etc



posted on Mar, 16 2004 @ 06:54 PM
link   
The thing that scares me the most about the Patriot Acts and what they do is the fact that hardly anyone believes in the stuff that we do.

People are either too ignorant, too stubborn to believe that our government could do us harm, or just take me for a cook. It's hard to have strong beliefs about stuff like this when no one believes you.

It makes me second guess myself. Do I put too much stock in what COULD happen? Or should I put faith in my concerns and continue being cautious? It's a hard decision to make, for me and I'm sure lots of other people.

I've tried to warn my friends and other people about stuff that the Patriot Act can do, and other things dealing with shadowy stuff in our government. And they just pass it off as me being "crazy Faisca." It kinda gets disheartening after a while.

But oh well... I guess thats what happens when you believe these kinds of things.



posted on Aug, 22 2008 @ 11:24 PM
link   
Very well said Faisca! I know what you mean. Then I run a crossed something like this short movie I found "A Patriot Act" (first saw it at myspace but the sites the movie name I think). I think it's fiction but maybe the filmmaker was making a fictional story from some real account but changed the names to protect their ass. Either way if we don't watch what they pass through and say something then don't we deserve it? But then again if no one believes when we do find inconsistence what are we to do???



new topics

top topics



 
1

log in

join