Patriot act summary

Order Code RS21203
                                                                                     April 18, 2002



CRS Report for Congress
                Received through the CRS Web


            The USA PATRIOT Act: A Sketch
                                 Charles Doyle
                                Senior Specialist
                              American Law Division

Summary

      Congress passed the USA PATRIOT Act (the Act) in response to the terrorists’
attacks of September 11, 2001. The Act gives federal officials greater authority to track
and intercept communications, both for law enforcement and foreign intelligence
gathering purposes. It vests the Secretary of the Treasury with regulatory powers to
combat corruption of U.S. financial institutions for foreign money laundering purposes.
It seeks to further close our borders to foreign terrorists and to detain and remove those
within our borders. It creates new crimes, new penalties, and new procedural
efficiencies for use against domestic and international terrorists. Although it is not
without safeguards, critics contend some of its provisions go too far. Although it grants
many of the enhancements sought by the Department of Justice, others are concerned
that it does not go far enough.
     The Act originated as H.R.2975 (the PATRIOT Act) in the House and S.1510 in
the Senate (the USA Act). S.1510 passed the Senate on October 11, 2001, 147 Cong.
Rec. S10604 (daily ed.). The House Judiciary Committee reported out an amended
version of H.R. 2975 on the same day, H.R.Rep.No. 107-236. The House passed H.R.
2975 the following day after substituting the text of H.R. 3108, 147 Cong.Rec. H6775-
776 (daily ed. Oct. 12, 2001). The House version incorporated most of the money
laundering provisions found in an earlier House bill, H.R. 3004, many of which had
counterparts in S.1510 as approved by the Senate. The House subsequently passed a
clean bill, H.R. 3162 ( under suspension of the rules), which resolved the differences
between H.R. 2975 and S.1510, 147 Cong.Rec. H7224 (daily ed. Oct. 24, 2001). The
Senate agreed to the changes, 147 Cong.Rec. S10969 (daily ed. Oct. 24, 2001), and H.R.
3162 was sent to the President who signed it on October 26, 2001.
    This is an abbreviated versions of The USA PATRIOT Act: A Legal Analysis, CRS
Report RL31377, stripped of its citations and footnotes.




       Congressional Research Service ˜ The Library of Congress
CRS-2

Criminal Investigations:                        Tracking          and        Gathering
Communications
     Federal communications privacy law features a three tiered system, erected for the
dual purpose of protecting the confidentiality of private telephone, face-to-face, and
computer communications while enabling authorities to identify and intercept criminal
communications. Title III of the Omnibus Crime Control and Safe Streets Act of 1968
supplies the first level. It prohibits electronic eavesdropping on telephone conversations,
face-to-face conversations, or computer and other forms of electronic communications in
most instances. It does, however, give authorities a narrowly defined process for
electronic surveillance to be used as a last resort in serious criminal cases. When
approved by senior Justice Department officials, law enforcement officers may seek a
court order authorizing them to secretly capture conversations concerning any of a
statutory list of offenses (predicate offenses). Title III court orders come replete with
instructions describing the permissible duration and scope of the surveillance as well as
the conversations which may be seized and the efforts to be taken to minimize the seizure
of innocent conversations. The court notifies the parties to any conversations seized
under the order after the order expires.

     Below Title III, the next tier of privacy protection covers telephone records, e-mail
held in third party storage, and the like, 18 U.S.C. 2701-2709 (Chapter 121). Here, the
law permits law enforcement access, ordinarily pursuant to a warrant or court order or
under a subpoena in some cases, but in connection with any criminal investigation and
without the extraordinary levels of approval or constraint that mark a Title III interception.

     Least demanding and perhaps least intrusive of all is the procedure that governs court
orders approving the government’s use of trap and trace devices and pen registers, a kind
of secret “caller id.”, which identify the source and destination of calls made to and from
a particular telephone, 18 U.S.C. 3121-3127 (Chapter 206). The orders are available
based on the government's certification, rather than a finding of a court, that use of the
device is likely to produce information relevant to the investigation of a crime, any crime.
The devices record no more than identity of the participants in a telephone conversation,
but neither the orders nor the results they produce need ever be revealed to the
participants.

     The Act modifies the procedures at each of the three levels. It:

     !   permits pen register and trap and trace orders for electronic
         communications (e.g., e-mail);
     !   authorizes nationwide execution of court orders for pen registers, trap
         and trace devices, and access to stored e-mail or communication records;
     !   treats stored voice mail like stored e-mail (rather than like telephone
         conversations);
     !   permits authorities to intercept communications to and from a trespasser
         within a computer system (with the permission of the system’s owner);
     !   adds terrorist and computer crimes to Title III’s predicate offense list;
     !   reenforces protection for those who help execute Title III, ch. 121, and
         ch. 206 orders;
CRS-3

     !   encourages cooperation between law enforcement and foreign
         intelligence investigators;
     !   establishes a claim against the U.S. for certain communications privacy
         violations by government personnel; and
     !   terminates the authority found in many of these provisions and several of
         the foreign intelligence amendments with a sunset provision (Dec. 31,
         2005).

Foreign Intelligence Investigations
     The Act eases some of the restrictions on foreign intelligence gathering within the
United States, and affords the U.S. intelligence community greater access to information
unearthed during a criminal investigation, but it also establishes and expands safeguards
against official abuse. More specifically, it:

     !   permits “roving” surveillance (court orders omitting the identification of
         the particular instrument, facilities, or place where the surveillance is to
         occur when the court finds the target is likely to thwart identification with
         particularity);
     !   increases the number of judges on the Foreign Intelligence Surveillance
         Act (FISA) court from 7 to 11;
     !   allows application for a FISA surveillance or search order when
         gathering foreign intelligence is a significant reason for the application
         rather than the reason;
     !   authorizes pen register and trap & trace device orders for e-mail as well
         as telephone conversations;
     !   sanctions court ordered access to any tangible item rather than only
         business records held by lodging, car rental, and locker rental businesses;
     !   carries a sunset provision;
     !   establishes a claim against the U.S. for certain communications privacy
         violations by government personnel; and
     !   expands the prohibition against FISA orders based solely on an
         American’s exercise of his or her First Amendment rights.

Money Laundering
      In federal law, money laundering is the flow of cash or other valuables derived from,
or intended to facilitate, the commission of a criminal offense. It is the movement of the
fruits and instruments of crime. Federal authorities attack money laundering through
regulations, criminal sanctions, and forfeiture. The Act bolsters federal efforts in each
area.

Regulation: The Act expands the authority of the Secretary of the Treasury to regulate
the activities of U.S. financial institutions, particularly their relations with foreign
individuals and entities. He is to promulgate regulations:

     !   under which securities brokers and dealers as well as commodity
         merchants, advisors and pool operators must file suspicious activity
         reports (SARs);
CRS-4

     !   requiring businesses, which were only to report cash transactions
         involving more than $10,000 to the IRS, to file SARs as well;
     !   imposing additional “special measures” and               “due diligence”
         requirements to combat foreign money laundering;
     !   prohibiting U.S. financial institutions from maintaining correspondent
         accounts for foreign shell banks;
     !   preventing financial institutions from allowing their customers to conceal
         their financial activities by taking advantage of the institutions’
         concentration account practices;
     !   establishing minimum new customer identification standards and record-
         keeping and recommending an effective means to verify the identity of
         foreign customers;
     !   encouraging financial institutions and law enforcement agencies to share
         information concerning suspected money laundering and terrorist
         activities; and
     !   requiring financial institutions to maintain anti-money laundering
         programs which must include at least a compliance officer; an employee
         training program; the development of internal policies, procedures and
         controls; and an independent audit feature.

Crimes: The Act contains a number of new money laundering crimes, as well as
amendments and increased penalties for earlier crimes. It:

     !   outlaws laundering (in the U.S.) any of the proceeds from foreign crimes
         of violence or political corruption;
     !   prohibits laundering the proceeds from cybercrime or supporting a
         terrorist organization;
     !   increases the penalties for counterfeiting;
     !   seeks to overcome a Supreme Court decision finding that the confiscation
         of over $300,000 (for attempt to leave the country without reporting it to
         customs) constituted an unconstitutionally excessive fine;
     !   provides explicit authority to prosecute overseas fraud involving
         American credit cards; and
     !   endeavors to permit prosecution of money laundering in the place where
         the predicate offense occurs.

Forfeiture: The Act creates two types of forfeitures and modifies several confiscation-
related procedures. It allows confiscation of all of the property of any individual or entity
that participates in or plans an act of domestic or international terrorism; it also permits
confiscation of any property derived from or used to facilitate domestic or international
terrorism. The Constitution’s due process, double jeopardy, and ex post facto clauses may
limit the anticipated breath of these provisions. Procedurally, the Act:

     !   establishes a mechanism to acquire long arm jurisdiction, for purposes of
         forfeiture proceedings, over individuals and entities;
     !   allows confiscation of property located in this country for a wider range
         of crimes committed in violation of foreign law;
     !   permits U.S. enforcement of foreign forfeiture orders;
CRS-5

     !   calls for the seizure of correspondent accounts held in U.S. financial
         institutions for foreign banks who are in turn holding forfeitable assets
         overseas; and
     !   denies corporate entities the right to contest a confiscation if their
         principal shareholder is a fugitive.

Alien Terrorists and Victims
     The Act contains a number of provisions designed to prevent alien terrorists from
entering the United States, particularly from Canada; to enable authorities to detain and
deport alien terrorists and those who support them; and to provide humanitarian
immigration relief for foreign victims of the attacks on September 11.

Other Crimes, Penalties, & Procedures
New crimes: The Act creates new federal crimes for terrorist attacks on mass
transportation facilities, for biological weapons offenses, for harboring terrorists, for
affording terrorists material support, for misconduct associated with money laundering
already mentioned, for conducting the affairs of an enterprise which affects interstate or
foreign commerce through the patterned commission of terrorist offenses, and for
fraudulent charitable solicitation. Although strictly speaking these are new federal crimes,
they generally supplement existing law by filling gaps and increasing penalties.

New Penalties: The Act increases the penalties for acts of terrorism and for crimes
which terrorists might commit. More specifically it establishes an alternative maximum
penalty for acts of terrorism, raises the penalties for conspiracy to commit certain terrorist
offenses, envisions sentencing some terrorists to life-long parole, and increases the
penalties for counterfeiting, cybercrime, and charity fraud.

Other Procedural Adjustments: In other procedural adjustments designed to facilitate
criminal investigations, the Act:

     !   increases the rewards for information in terrorism cases;
     !   expands the Posse Comitatus Act exceptions;
     !   authorizes “sneak and peek” search warrants;
     !   permits nationwide and perhaps worldwide execution of warrants in
         terrorism cases;
     !   eases government access to confidential information;
     !   allows the Attorney General to collect DNA samples from prisoners
         convicted of any federal crime of violence or terrorism;
     !   lengthens the statute of limitations applicable to crimes of terrorism;
     !   clarifies the application of federal criminal law on American installations
         and in residences of U.S. government personnel overseas; and
     !   adjust federal victims’ compensation and assistance programs.

     A section, found in the Senate bill but ultimately dropped, would have changed the
provision of federal law which requires Justice Department prosecutors to adhere to the
ethical standards of the legal profession where they conduct their activities (the McDade-
Murtha Amendment), 28 U.S.C. 530B.

Recomendados

Final presentation rev 1 - USA Patriot Act por
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
2.7K visualizações21 slides
USA Patriot Act por
USA Patriot ActUSA Patriot Act
USA Patriot ActGnosticMedia
1.5K visualizações131 slides
Usa Patriot Act por
Usa Patriot ActUsa Patriot Act
Usa Patriot Actwaymanside345
4.8K visualizações13 slides
Nc Latest Ppt por
Nc Latest PptNc Latest Ppt
Nc Latest PptPatriotAct9
702 visualizações34 slides
Student Presentation Assignment por
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation AssignmentMuhammed Haidri
309 visualizações12 slides
Freedoms Forsaken por
Freedoms ForsakenFreedoms Forsaken
Freedoms ForsakenHudson Valley Public Relations
321 visualizações12 slides

Mais conteúdo relacionado

Mais procurados

White7e ppt ch16 por
White7e ppt ch16White7e ppt ch16
White7e ppt ch16difordham
957 visualizações34 slides
PATRIOT.Act.Essay3 por
PATRIOT.Act.Essay3PATRIOT.Act.Essay3
PATRIOT.Act.Essay3Christopher Cole
210 visualizações8 slides
Domestic Surveillance_ProsandCons por
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
317 visualizações10 slides
Covert government surveillance por
Covert government surveillanceCovert government surveillance
Covert government surveillancemmicka
1.9K visualizações13 slides
public_hearing02 por
public_hearing02public_hearing02
public_hearing02Greg Burton
326 visualizações42 slides
Executive Order Lecture by Cynthia Farina por
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farinanslscornell
590 visualizações32 slides

Mais procurados(19)

White7e ppt ch16 por difordham
White7e ppt ch16White7e ppt ch16
White7e ppt ch16
difordham957 visualizações
PATRIOT.Act.Essay3 por Christopher Cole
PATRIOT.Act.Essay3PATRIOT.Act.Essay3
PATRIOT.Act.Essay3
Christopher Cole210 visualizações
Domestic Surveillance_ProsandCons por Kati Mccarthy
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy317 visualizações
Covert government surveillance por mmicka
Covert government surveillanceCovert government surveillance
Covert government surveillance
mmicka1.9K visualizações
public_hearing02 por Greg Burton
public_hearing02public_hearing02
public_hearing02
Greg Burton326 visualizações
Executive Order Lecture by Cynthia Farina por nslscornell
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farina
nslscornell590 visualizações
RESEARCH - STUDIES IN CONSTITUTIONAL LAW por Chirine Haddad ?
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
Chirine Haddad ?294 visualizações
Usa patriot act por esounds
Usa patriot actUsa patriot act
Usa patriot act
esounds468 visualizações
Drones Webinar Tom Nash 20 Nov 2012 por JohnLindsayPoland
Drones Webinar Tom Nash 20 Nov 2012Drones Webinar Tom Nash 20 Nov 2012
Drones Webinar Tom Nash 20 Nov 2012
JohnLindsayPoland582 visualizações
Us legislation authorizing wiretapping por Angela Strudwick
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
Angela Strudwick532 visualizações
Arizona SB1070 por perezdenice
Arizona SB1070Arizona SB1070
Arizona SB1070
perezdenice451 visualizações
The Security Era por jk_welder
The Security EraThe Security Era
The Security Era
jk_welder312 visualizações
Right to Privacy in the Digital Age-final por Graham Smith
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
Graham Smith1.4K visualizações
Final Paper Com 300 por William Beer
Final Paper Com 300Final Paper Com 300
Final Paper Com 300
William Beer146 visualizações
Eroding liberty por Kelly Scott
Eroding libertyEroding liberty
Eroding liberty
Kelly Scott234 visualizações
Intelligence Agencies, Law Enforcement, And The Prosecution Team por guest5921a5
Intelligence Agencies, Law Enforcement, And The Prosecution TeamIntelligence Agencies, Law Enforcement, And The Prosecution Team
Intelligence Agencies, Law Enforcement, And The Prosecution Team
guest5921a51.4K visualizações
Introduction to National Security Law por Joseph V. Moreno
Introduction to National Security LawIntroduction to National Security Law
Introduction to National Security Law
Joseph V. Moreno150 visualizações
Why Freedom of Information por Joel J. Campbell
Why Freedom of InformationWhy Freedom of Information
Why Freedom of Information
Joel J. Campbell552 visualizações
Can the law control Digital Leviathan? por blogzilla
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
blogzilla1.7K visualizações

Destaque

How the Intellectual Property Act 2014 will affect British Design Right Law por
How the Intellectual Property Act 2014 will affect British Design Right LawHow the Intellectual Property Act 2014 will affect British Design Right Law
How the Intellectual Property Act 2014 will affect British Design Right LawJane Lambert
909 visualizações6 slides
Copyrights in the United States Government (Training) por
Copyrights in the United States Government (Training)Copyrights in the United States Government (Training)
Copyrights in the United States Government (Training)Marcus A. Streips
712 visualizações60 slides
סמלי מדינת ישראל por
סמלי מדינת ישראלסמלי מדינת ישראל
סמלי מדינת ישראלJaguit
2.4K visualizações25 slides
Practice director demo power point 4.14.14 por
Practice director demo power point 4.14.14Practice director demo power point 4.14.14
Practice director demo power point 4.14.14Katie Ulrich
1.9K visualizações22 slides
BLNR Order por
BLNR OrderBLNR Order
BLNR OrderHonolulu Civil Beat
576 visualizações4 slides
OSS Licensing (Public) por
OSS Licensing (Public)OSS Licensing (Public)
OSS Licensing (Public)Marcus A. Streips
720 visualizações68 slides

Destaque(6)

How the Intellectual Property Act 2014 will affect British Design Right Law por Jane Lambert
How the Intellectual Property Act 2014 will affect British Design Right LawHow the Intellectual Property Act 2014 will affect British Design Right Law
How the Intellectual Property Act 2014 will affect British Design Right Law
Jane Lambert909 visualizações
Copyrights in the United States Government (Training) por Marcus A. Streips
Copyrights in the United States Government (Training)Copyrights in the United States Government (Training)
Copyrights in the United States Government (Training)
Marcus A. Streips712 visualizações
סמלי מדינת ישראל por Jaguit
סמלי מדינת ישראלסמלי מדינת ישראל
סמלי מדינת ישראל
Jaguit2.4K visualizações
Practice director demo power point 4.14.14 por Katie Ulrich
Practice director demo power point 4.14.14Practice director demo power point 4.14.14
Practice director demo power point 4.14.14
Katie Ulrich1.9K visualizações
OSS Licensing (Public) por Marcus A. Streips
OSS Licensing (Public)OSS Licensing (Public)
OSS Licensing (Public)
Marcus A. Streips720 visualizações

Similar a Patriot act summary

Ch 9 White Collar and Organized Crime por
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
3.3K visualizações31 slides
An Encyclopedia of Wiretaps por
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of WiretapsWendy Knox Everette
246 visualizações48 slides
504 Part II Criminal Procedure# 151053 Cust Cengage .docx por
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docxtroutmanboris
3 visualizações103 slides
Defending Securities Fraud por
Defending Securities FraudDefending Securities Fraud
Defending Securities FraudAmanda Whitt-Downs
240 visualizações7 slides
How the Patriot Act Works by Ed Grabianowski Browse th.docx por
How the Patriot Act Works by Ed Grabianowski Browse th.docxHow the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxwellesleyterresa
3 visualizações19 slides
Twitter vs. United States por
Twitter vs. United StatesTwitter vs. United States
Twitter vs. United StatesDavid Sweigert
298 visualizações19 slides

Similar a Patriot act summary(20)

Ch 9 White Collar and Organized Crime por rharrisonaz
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
rharrisonaz3.3K visualizações
An Encyclopedia of Wiretaps por Wendy Knox Everette
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
Wendy Knox Everette246 visualizações
504 Part II Criminal Procedure# 151053 Cust Cengage .docx por troutmanboris
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
troutmanboris3 visualizações
Defending Securities Fraud por Amanda Whitt-Downs
Defending Securities FraudDefending Securities Fraud
Defending Securities Fraud
Amanda Whitt-Downs240 visualizações
How the Patriot Act Works by Ed Grabianowski Browse th.docx por wellesleyterresa
How the Patriot Act Works by Ed Grabianowski Browse th.docxHow the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docx
wellesleyterresa3 visualizações
Twitter vs. United States por David Sweigert
Twitter vs. United StatesTwitter vs. United States
Twitter vs. United States
David Sweigert298 visualizações
Steele R3 por Nadine Tushe
Steele R3Steele R3
Steele R3
Nadine Tushe71 visualizações
Quickdinero Compliance Training Module 4 por Quickdinero_Inc
Quickdinero Compliance Training Module 4Quickdinero Compliance Training Module 4
Quickdinero Compliance Training Module 4
Quickdinero_Inc477 visualizações
On Overview of the NSA's Surveillance Program por Joseph V. Moreno
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
Joseph V. Moreno413 visualizações
Senate bill 1733 salient points por Ernesto Neri
Senate bill 1733 salient pointsSenate bill 1733 salient points
Senate bill 1733 salient points
Ernesto Neri1.2K visualizações
Privacy and the Government por primeteacher32
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
primeteacher32598 visualizações
06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He... por Roxanne Grinage
06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He...06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He...
06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He...
Roxanne Grinage5.3K visualizações
06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He... por Roxanne Grinage
06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He...06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He...
06/25/12 Posted to HireLyrics U.S. Citizens Public Docket New Civil Rights He...
Roxanne Grinage34 visualizações
Twitter v. holder suit to disclose ns ls por PublicLeaks
Twitter v. holder suit to disclose ns lsTwitter v. holder suit to disclose ns ls
Twitter v. holder suit to disclose ns ls
PublicLeaks150 visualizações
Computer forensics law and privacy por ch samaram
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
ch samaram4.7K visualizações
National Security Agency Values por April Dillard
National Security Agency ValuesNational Security Agency Values
National Security Agency Values
April Dillard2 visualizações
Reporter's Recording Guide por - Mark - Fullbright
Reporter's Recording GuideReporter's Recording Guide
Reporter's Recording Guide
- Mark - Fullbright778 visualizações
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ... por - Mark - Fullbright
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
- Mark - Fullbright1.2K visualizações

Mais de sevans-idaho

Crij 103 001 w intro to law and justice summer 2012 schedule por
Crij 103 001 w  intro to law and justice summer 2012 scheduleCrij 103 001 w  intro to law and justice summer 2012 schedule
Crij 103 001 w intro to law and justice summer 2012 schedulesevans-idaho
1.3K visualizações3 slides
Cwi crij 103 intro to law and justice summer 2012 syllabus por
Cwi crij 103 intro to law and justice summer 2012 syllabusCwi crij 103 intro to law and justice summer 2012 syllabus
Cwi crij 103 intro to law and justice summer 2012 syllabussevans-idaho
2K visualizações7 slides
Walsh power point_chapter 1 por
Walsh power point_chapter 1Walsh power point_chapter 1
Walsh power point_chapter 1sevans-idaho
1.4K visualizações55 slides
0495808652 282845 por
0495808652 2828450495808652 282845
0495808652 282845sevans-idaho
1.2K visualizações16 slides
Ch13 overview por
Ch13 overviewCh13 overview
Ch13 overviewsevans-idaho
1.2K visualizações3 slides
Future forensic science por
Future forensic scienceFuture forensic science
Future forensic sciencesevans-idaho
3.1K visualizações13 slides

Mais de sevans-idaho(20)

Crij 103 001 w intro to law and justice summer 2012 schedule por sevans-idaho
Crij 103 001 w  intro to law and justice summer 2012 scheduleCrij 103 001 w  intro to law and justice summer 2012 schedule
Crij 103 001 w intro to law and justice summer 2012 schedule
sevans-idaho1.3K visualizações
Cwi crij 103 intro to law and justice summer 2012 syllabus por sevans-idaho
Cwi crij 103 intro to law and justice summer 2012 syllabusCwi crij 103 intro to law and justice summer 2012 syllabus
Cwi crij 103 intro to law and justice summer 2012 syllabus
sevans-idaho2K visualizações
Walsh power point_chapter 1 por sevans-idaho
Walsh power point_chapter 1Walsh power point_chapter 1
Walsh power point_chapter 1
sevans-idaho1.4K visualizações
0495808652 282845 por sevans-idaho
0495808652 2828450495808652 282845
0495808652 282845
sevans-idaho1.2K visualizações
Ch13 overview por sevans-idaho
Ch13 overviewCh13 overview
Ch13 overview
sevans-idaho1.2K visualizações
Future forensic science por sevans-idaho
Future forensic scienceFuture forensic science
Future forensic science
sevans-idaho3.1K visualizações
Timeline of forensic science por sevans-idaho
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic science
sevans-idaho9.1K visualizações
Forensic science%20from%20fingerprints%20to%20 dna por sevans-idaho
Forensic science%20from%20fingerprints%20to%20 dnaForensic science%20from%20fingerprints%20to%20 dna
Forensic science%20from%20fingerprints%20to%20 dna
sevans-idaho1K visualizações
Dna testing por sevans-idaho
Dna testingDna testing
Dna testing
sevans-idaho819 visualizações
The origins of islamic law por sevans-idaho
The origins of islamic lawThe origins of islamic law
The origins of islamic law
sevans-idaho7.1K visualizações
Commonvs civillaw chart por sevans-idaho
Commonvs civillaw chartCommonvs civillaw chart
Commonvs civillaw chart
sevans-idaho1.9K visualizações
Civil law por sevans-idaho
Civil lawCivil law
Civil law
sevans-idaho3.5K visualizações
Walsh power point_chapter 14 por sevans-idaho
Walsh power point_chapter 14Walsh power point_chapter 14
Walsh power point_chapter 14
sevans-idaho1.2K visualizações
Topic paper week 16 cja 101 intro to criminal justice por sevans-idaho
Topic paper week 16 cja 101 intro to criminal justiceTopic paper week 16 cja 101 intro to criminal justice
Topic paper week 16 cja 101 intro to criminal justice
sevans-idaho706 visualizações
Fagin 13 images por sevans-idaho
Fagin 13 imagesFagin 13 images
Fagin 13 images
sevans-idaho450 visualizações
0131389033 ppt13 por sevans-idaho
0131389033 ppt130131389033 ppt13
0131389033 ppt13
sevans-idaho447 visualizações
Topic paper week 14 cja 104 intro to corrections por sevans-idaho
Topic paper week 14 cja 104 intro to correctionsTopic paper week 14 cja 104 intro to corrections
Topic paper week 14 cja 104 intro to corrections
sevans-idaho1.6K visualizações
0495808652 282844 por sevans-idaho
0495808652 2828440495808652 282844
0495808652 282844
sevans-idaho472 visualizações
Ch12 overview por sevans-idaho
Ch12 overviewCh12 overview
Ch12 overview
sevans-idaho434 visualizações
Marshall trilogy cases por sevans-idaho
Marshall trilogy casesMarshall trilogy cases
Marshall trilogy cases
sevans-idaho1.8K visualizações

Último

Google solution challenge..pptx por
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
117 visualizações18 slides
Use of Probiotics in Aquaculture.pptx por
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptxAKSHAY MANDAL
95 visualizações15 slides
MercerJesse2.1Doc.pdf por
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdfjessemercerail
142 visualizações5 slides
11.30.23 Poverty and Inequality in America.pptx por
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptxmary850239
149 visualizações33 slides
Narration ppt.pptx por
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptxTARIQ KHAN
131 visualizações24 slides
The basics - information, data, technology and systems.pdf por
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdfJonathanCovena1
106 visualizações1 slide

Último(20)

Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani1117 visualizações
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL95 visualizações
MercerJesse2.1Doc.pdf por jessemercerail
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdf
jessemercerail142 visualizações
11.30.23 Poverty and Inequality in America.pptx por mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239149 visualizações
Narration ppt.pptx por TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN131 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1106 visualizações
Java Simplified: Understanding Programming Basics por Akshaj Vadakkath Joshy
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming Basics
Akshaj Vadakkath Joshy273 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington148 visualizações
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239291 visualizações
Education and Diversity.pptx por DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar135 visualizações
ACTIVITY BOOK key water sports.pptx por Mar Caston Palacio
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio511 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA244 visualizações
Solar System and Galaxies.pptx por DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar89 visualizações
When Sex Gets Complicated: Porn, Affairs, & Cybersex por Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu67 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1483 visualizações
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta187 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por SukhwinderSingh895865
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865518 visualizações
ICS3211_lecture 08_2023.pdf por Vanessa Camilleri
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri127 visualizações

Patriot act summary

  • 1. Order Code RS21203 April 18, 2002 CRS Report for Congress Received through the CRS Web The USA PATRIOT Act: A Sketch Charles Doyle Senior Specialist American Law Division Summary Congress passed the USA PATRIOT Act (the Act) in response to the terrorists’ attacks of September 11, 2001. The Act gives federal officials greater authority to track and intercept communications, both for law enforcement and foreign intelligence gathering purposes. It vests the Secretary of the Treasury with regulatory powers to combat corruption of U.S. financial institutions for foreign money laundering purposes. It seeks to further close our borders to foreign terrorists and to detain and remove those within our borders. It creates new crimes, new penalties, and new procedural efficiencies for use against domestic and international terrorists. Although it is not without safeguards, critics contend some of its provisions go too far. Although it grants many of the enhancements sought by the Department of Justice, others are concerned that it does not go far enough. The Act originated as H.R.2975 (the PATRIOT Act) in the House and S.1510 in the Senate (the USA Act). S.1510 passed the Senate on October 11, 2001, 147 Cong. Rec. S10604 (daily ed.). The House Judiciary Committee reported out an amended version of H.R. 2975 on the same day, H.R.Rep.No. 107-236. The House passed H.R. 2975 the following day after substituting the text of H.R. 3108, 147 Cong.Rec. H6775- 776 (daily ed. Oct. 12, 2001). The House version incorporated most of the money laundering provisions found in an earlier House bill, H.R. 3004, many of which had counterparts in S.1510 as approved by the Senate. The House subsequently passed a clean bill, H.R. 3162 ( under suspension of the rules), which resolved the differences between H.R. 2975 and S.1510, 147 Cong.Rec. H7224 (daily ed. Oct. 24, 2001). The Senate agreed to the changes, 147 Cong.Rec. S10969 (daily ed. Oct. 24, 2001), and H.R. 3162 was sent to the President who signed it on October 26, 2001. This is an abbreviated versions of The USA PATRIOT Act: A Legal Analysis, CRS Report RL31377, stripped of its citations and footnotes. Congressional Research Service ˜ The Library of Congress
  • 2. CRS-2 Criminal Investigations: Tracking and Gathering Communications Federal communications privacy law features a three tiered system, erected for the dual purpose of protecting the confidentiality of private telephone, face-to-face, and computer communications while enabling authorities to identify and intercept criminal communications. Title III of the Omnibus Crime Control and Safe Streets Act of 1968 supplies the first level. It prohibits electronic eavesdropping on telephone conversations, face-to-face conversations, or computer and other forms of electronic communications in most instances. It does, however, give authorities a narrowly defined process for electronic surveillance to be used as a last resort in serious criminal cases. When approved by senior Justice Department officials, law enforcement officers may seek a court order authorizing them to secretly capture conversations concerning any of a statutory list of offenses (predicate offenses). Title III court orders come replete with instructions describing the permissible duration and scope of the surveillance as well as the conversations which may be seized and the efforts to be taken to minimize the seizure of innocent conversations. The court notifies the parties to any conversations seized under the order after the order expires. Below Title III, the next tier of privacy protection covers telephone records, e-mail held in third party storage, and the like, 18 U.S.C. 2701-2709 (Chapter 121). Here, the law permits law enforcement access, ordinarily pursuant to a warrant or court order or under a subpoena in some cases, but in connection with any criminal investigation and without the extraordinary levels of approval or constraint that mark a Title III interception. Least demanding and perhaps least intrusive of all is the procedure that governs court orders approving the government’s use of trap and trace devices and pen registers, a kind of secret “caller id.”, which identify the source and destination of calls made to and from a particular telephone, 18 U.S.C. 3121-3127 (Chapter 206). The orders are available based on the government's certification, rather than a finding of a court, that use of the device is likely to produce information relevant to the investigation of a crime, any crime. The devices record no more than identity of the participants in a telephone conversation, but neither the orders nor the results they produce need ever be revealed to the participants. The Act modifies the procedures at each of the three levels. It: ! permits pen register and trap and trace orders for electronic communications (e.g., e-mail); ! authorizes nationwide execution of court orders for pen registers, trap and trace devices, and access to stored e-mail or communication records; ! treats stored voice mail like stored e-mail (rather than like telephone conversations); ! permits authorities to intercept communications to and from a trespasser within a computer system (with the permission of the system’s owner); ! adds terrorist and computer crimes to Title III’s predicate offense list; ! reenforces protection for those who help execute Title III, ch. 121, and ch. 206 orders;
  • 3. CRS-3 ! encourages cooperation between law enforcement and foreign intelligence investigators; ! establishes a claim against the U.S. for certain communications privacy violations by government personnel; and ! terminates the authority found in many of these provisions and several of the foreign intelligence amendments with a sunset provision (Dec. 31, 2005). Foreign Intelligence Investigations The Act eases some of the restrictions on foreign intelligence gathering within the United States, and affords the U.S. intelligence community greater access to information unearthed during a criminal investigation, but it also establishes and expands safeguards against official abuse. More specifically, it: ! permits “roving” surveillance (court orders omitting the identification of the particular instrument, facilities, or place where the surveillance is to occur when the court finds the target is likely to thwart identification with particularity); ! increases the number of judges on the Foreign Intelligence Surveillance Act (FISA) court from 7 to 11; ! allows application for a FISA surveillance or search order when gathering foreign intelligence is a significant reason for the application rather than the reason; ! authorizes pen register and trap & trace device orders for e-mail as well as telephone conversations; ! sanctions court ordered access to any tangible item rather than only business records held by lodging, car rental, and locker rental businesses; ! carries a sunset provision; ! establishes a claim against the U.S. for certain communications privacy violations by government personnel; and ! expands the prohibition against FISA orders based solely on an American’s exercise of his or her First Amendment rights. Money Laundering In federal law, money laundering is the flow of cash or other valuables derived from, or intended to facilitate, the commission of a criminal offense. It is the movement of the fruits and instruments of crime. Federal authorities attack money laundering through regulations, criminal sanctions, and forfeiture. The Act bolsters federal efforts in each area. Regulation: The Act expands the authority of the Secretary of the Treasury to regulate the activities of U.S. financial institutions, particularly their relations with foreign individuals and entities. He is to promulgate regulations: ! under which securities brokers and dealers as well as commodity merchants, advisors and pool operators must file suspicious activity reports (SARs);
  • 4. CRS-4 ! requiring businesses, which were only to report cash transactions involving more than $10,000 to the IRS, to file SARs as well; ! imposing additional “special measures” and “due diligence” requirements to combat foreign money laundering; ! prohibiting U.S. financial institutions from maintaining correspondent accounts for foreign shell banks; ! preventing financial institutions from allowing their customers to conceal their financial activities by taking advantage of the institutions’ concentration account practices; ! establishing minimum new customer identification standards and record- keeping and recommending an effective means to verify the identity of foreign customers; ! encouraging financial institutions and law enforcement agencies to share information concerning suspected money laundering and terrorist activities; and ! requiring financial institutions to maintain anti-money laundering programs which must include at least a compliance officer; an employee training program; the development of internal policies, procedures and controls; and an independent audit feature. Crimes: The Act contains a number of new money laundering crimes, as well as amendments and increased penalties for earlier crimes. It: ! outlaws laundering (in the U.S.) any of the proceeds from foreign crimes of violence or political corruption; ! prohibits laundering the proceeds from cybercrime or supporting a terrorist organization; ! increases the penalties for counterfeiting; ! seeks to overcome a Supreme Court decision finding that the confiscation of over $300,000 (for attempt to leave the country without reporting it to customs) constituted an unconstitutionally excessive fine; ! provides explicit authority to prosecute overseas fraud involving American credit cards; and ! endeavors to permit prosecution of money laundering in the place where the predicate offense occurs. Forfeiture: The Act creates two types of forfeitures and modifies several confiscation- related procedures. It allows confiscation of all of the property of any individual or entity that participates in or plans an act of domestic or international terrorism; it also permits confiscation of any property derived from or used to facilitate domestic or international terrorism. The Constitution’s due process, double jeopardy, and ex post facto clauses may limit the anticipated breath of these provisions. Procedurally, the Act: ! establishes a mechanism to acquire long arm jurisdiction, for purposes of forfeiture proceedings, over individuals and entities; ! allows confiscation of property located in this country for a wider range of crimes committed in violation of foreign law; ! permits U.S. enforcement of foreign forfeiture orders;
  • 5. CRS-5 ! calls for the seizure of correspondent accounts held in U.S. financial institutions for foreign banks who are in turn holding forfeitable assets overseas; and ! denies corporate entities the right to contest a confiscation if their principal shareholder is a fugitive. Alien Terrorists and Victims The Act contains a number of provisions designed to prevent alien terrorists from entering the United States, particularly from Canada; to enable authorities to detain and deport alien terrorists and those who support them; and to provide humanitarian immigration relief for foreign victims of the attacks on September 11. Other Crimes, Penalties, & Procedures New crimes: The Act creates new federal crimes for terrorist attacks on mass transportation facilities, for biological weapons offenses, for harboring terrorists, for affording terrorists material support, for misconduct associated with money laundering already mentioned, for conducting the affairs of an enterprise which affects interstate or foreign commerce through the patterned commission of terrorist offenses, and for fraudulent charitable solicitation. Although strictly speaking these are new federal crimes, they generally supplement existing law by filling gaps and increasing penalties. New Penalties: The Act increases the penalties for acts of terrorism and for crimes which terrorists might commit. More specifically it establishes an alternative maximum penalty for acts of terrorism, raises the penalties for conspiracy to commit certain terrorist offenses, envisions sentencing some terrorists to life-long parole, and increases the penalties for counterfeiting, cybercrime, and charity fraud. Other Procedural Adjustments: In other procedural adjustments designed to facilitate criminal investigations, the Act: ! increases the rewards for information in terrorism cases; ! expands the Posse Comitatus Act exceptions; ! authorizes “sneak and peek” search warrants; ! permits nationwide and perhaps worldwide execution of warrants in terrorism cases; ! eases government access to confidential information; ! allows the Attorney General to collect DNA samples from prisoners convicted of any federal crime of violence or terrorism; ! lengthens the statute of limitations applicable to crimes of terrorism; ! clarifies the application of federal criminal law on American installations and in residences of U.S. government personnel overseas; and ! adjust federal victims’ compensation and assistance programs. A section, found in the Senate bill but ultimately dropped, would have changed the provision of federal law which requires Justice Department prosecutors to adhere to the ethical standards of the legal profession where they conduct their activities (the McDade- Murtha Amendment), 28 U.S.C. 530B.