Bis 220 - the Patriot Act
Autor: jmpimaster • March 5, 2017 • Research Paper • 624 Words (3 Pages) • 810 Views
The Patriot Act
BIS220
The Patriot Act
There have been significant advances in information technology in the past twenty-five years. When I was a child, we used our imagination. We played board games, played tag, rode our bikes, and sometimes even read a book. Today, information technology is a fundamental component of our daily lives. It has been incorporated into everything from dating to finances.
We are currently in the age of the computer. With the advancement of the computer, came the Internet. The Internet allows us to have unlimited information at our fingertips twenty-four hours a day. Instead of writing a letter to a friend or relative by hand, we can type a quick line on our computer keyboard. We don't wait days for a reply in the mail; we have a reply almost instantaneously using electronic mail. Oftentimes we use Skye, Facebook, or Twitter to connect quickly with others. In our society today, it is all about instant gratification.
On September 11, 2001 we were shocked by the news of the bombing of the World Trade Center and of the Pentagon. The United States had been a victim of terrorism. We were appalled and scared beyond belief. The nation wanted tighter security and the assurance that terrorists would be caught. The Patriot Act was introduced to Congress by Republican Rep. Jim Sensenbrenner. President George Bush signed it into law on October 26, 2001 (Garfinkel, p. 93).
The Patriot Act (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) was enacted essentially to aide in the prevention of future terrorist acts. This Act is divided into sections. Title I. states that the president may seize the property of anyone believed to incite war or an attack against the Unites States. Title II gives law enforcement agencies the power to use surveillance against possible terror threats. Communication may be intercepted if it suggests a threat to the country. An Internet Service Provider (ISP) may even be ordered to provide the IP addresses and login information of their clients if the threat is significant. Title II also allows for a search warrant to be carried out without the knowledge of the suspect. Title III makes sure that terrorist groups have no means of financial support. Banks are required to divulge information to the necessary authorities if requested. Title IV is added to improve border security. Patrols and other necessary employees are hired to protect our borders from the threat of terrorism. Title V calls for the use of National Security Letters. An NSL is a "demand for the release of information and paperwork related to a person under investigation" (Garfinkel, p. 112). Basically, Title VI allows families and victims of terrorism monetary compensation. Title VII is the portion of the Act that allows for the sharing of information among law enforcement agencies. Title VIII of the Patriot Act expands the definition of weapons of terrorism to include biological weapons and computer hacking. Finally Title IX suggests that intelligence information be shared among all government agencies.
...