USNewsLink


AmericanFlag.jpg (2932 bytes)

READ PREVIOUS ARTICLES BY JUDITH HANEY

ACT IN HASTE REPENT IN LEISURE:
Safety versus Privacy

By Judith Haney

(USNewsLink)/ September 17, 2001

When Congress votes on Attorney General John Ashcroft's request for an expansion of the Justice Department's ability to use wiretaps in cases of suspected terrorism or espionage (New Powers Sought For Surveillance) it must weigh in on the side of privacy.

Specifically, if Congress allows federal law enforcement to expand its authority under a 1978 law to conduct roving searches of people suspected of terrorism, espionage or sabotage through the use of electronic surveillance of individual suspects rather than of specific telephones or computer terminals, it will violate the essence and rule of law which preserves the privacy of law abiding Americans.

Therefore, how do we preserve our privacy and maintain our safety?

The 1978 law Ashcroft is seeking to expand established a secret federal court to handle wiretap requests. Presently, when the court grants a request, it allows taps to be placed only on specific telephones or computer terminals.

Under the proposal outlined to members of Congress, law enforcement agents could ask a secret court to allow them to monitor whatever telephone or computer terminal is used by a suspect.

The Justice Department also wants to make it easier to detain and deport people suspected of involvement in terrorism.

And, in addition, the government may seek to remove any statute of limitations on crimes committed in connection with terrorist acts.

Under Ashcroft's proposal, evidence collected by the department which demonstrates the transmission of funds to a designated terrorist organization can be used to prosecute a suspect for money laundering.

Concerned civil libertarians, are worried that the Bush administration is using Tuesday's tragedy to erode constitutional protections.

David Cole, a law professor at Georgetown University, said there is no evidence that legal restrictions on the FBI, CIA or other federal agencies helped the hijackers evade detection. Two of the hijackers were on an FBI "watch list" for two weeks before the attacks, and most of the 19 men reportedly purchased their tickets in their own names through the Internet.

"The reality is that the FBI already has tremendous power," Cole said. "We have to be careful about giving the FBI or INS or anyone else greater powers unless they can show they really need those powers."

Terrorism is by definition opportunistic. And our government, through its failure to secure our borders, provided the opportunity for Tuesday's attacks.

In lieu of Tuesday's attacks, government wants to expedite the process of securing our borders and make up for lost time by catching up with the terrorists before they strike again. That is understandable, even admirable.

But as we work to secure our borders we must not violate our constitutional safeguards to protect privacy. 

If Congress acts in haste, Americans will repent in leisure.

 

wpe18.jpg (2018 bytes)
American Red Cross

USNewsLink
BUSINESS JOURNAL™

USNewsLink Is For Sale

BUY JUDITH HANEY'S NEW BOOK

Judith Haney's Archives

Anti-Phishing Working Group

HIV/AIDS Prevention

FCC complaint form to report junk faxes & telemarketing