House lawmakers seek to curtail anti-terrorism law

Several high-profile surveillance provisions in the anti-terrorism law known as the USA PATRIOT Act would be modified under a bill that Democratic presidential candidate Dennis Kucinich of Ohio and Texas Republican Ron Paul pledged to introduce on Wednesday.

The bill would limit the Justice Department's power to use "sneak and peek" search warrants that let police delay their notification of suspects about the warrants. Justice's power to obtain business and library records under a foreign intelligence law also would be curtailed.

Those two powers have emerged as among the most controversial elements of the statute that Congress passed in October 2001. The House already has barred Justice from using its funds to implement "sneak and peak" searches, and the American Civil Liberties Union (ACLU) has sued to halt the use of the business-records section of the law.

The bill also would limit the government's current ability to indefinitely detain non-citizens and curtail other policies of the Bush administration. Those include the ability for the FBI to monitor attorney-client conversations, enter houses of worship without cause and withhold information that otherwise must be disclosed under the Freedom of Information Act.

Kucinich promoted his bill at a press conference with the ACLU.

"We now know that the PATRIOT Act and other measures went too far, too fast," said Gregory Nojeim, chief legislative counsel of the ACLU's Washington office. "Members from both sides of the aisle are calling for corrections to be made, and this bill stays true to Benjamin Franklin's call for a balance between security and liberty."

The new bill comes amid greater focus on the PATRIOT Act's surveillance provisions, including a high-profile speaking tour by Attorney General John Ashcroft. On Sept. 10, President Bush asked Congress to extend surveillance authority further.

In an attempt to counter fears that law enforcement officials excessively peruse business and library records, Ashcroft said he has declassified the fact that provisions in one section of the act have never been used.

"We have not been able to counter the troubling amount of public distortion and misinformation in connection with Section 215," Ashcroft said in a memo to FBI Director Robert Mueller. "Consequently, I have determined that it is in the public interest and the best interest of law enforcement to declassify this information."

Privacy advocates said Ashcroft and other Justice officials are largely to blame for any misinformation because they have withheld data and failed to engage in public debate.

"It's still not clear that we have the full picture," Jim Dempsey, executive director of the Center for Democracy and Technology, said in an analysis of the section. "It seems very strange that [Justice] has never once used Section 215 to compel disclosure of travel records or car-rentals records or records of the purchase of bomb-making material or anything else."

Dempsey also picked apart an Ashcroft statement that the section applies only to foreigners, requires judicial approval and must be relevant to existing counter-terrorism investigations. All three statements are untrue, he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.