Review And Analysis Of FISA Term Paper

FISA Summary In light of 9/11 and the aftermath, from both a victim standpoint and a reaction standpoint, there were a lot of things going on and this includes at the government level. One of those reactions was the use (or misuse) of the Foreign Intelligence Surveillance Act (FISA) and the granting of immunity to telecommunication companies that shared information without a warrant when it came to the sharing of information. This report shall reveal what the main and important points of FISA happened to be and what the overall viewpoint could or should be when it comes to what was granted to the telecommunication companies in light of what they did. While trying to help law enforcement is one thing, granting private consumer information with no warrant is a slippery slope and should generally not be happening.

Analysis

Even with the warrantless nature of some of the searches that occurred in the wake of 9/11, the use of Presidential power to do warrantless searches is not really anything new. Indeed, there have been many Presidents that have invoked the words of the Constitution and asserted that they are just trying to do their job and that the warrantless searches...

...

Indeed, many advocates of the approach would point to Article II where it says that the President is supposed to "preserve, protect and defend the Constitution of the United States" (FLETC, 2016). This is a large part of what led to FISA coming to be in the first place. Signed in 1978, FISA has a certain pattern and flow to it. In short, there was an allowance for some discretion on the part of the federal government. However, the act was fairly narrow in that it only pertained to foreign sources of information rather that people in a purely domestic situation. Specifically, surveillance under FISA is allowed for under an order from the Foreign Intelligence Surveillance Courts or an order can be garnered after the fact if there is an emergency situation and the Attorney General, who reports and is appointed by the President, approved the action. However, an emergency application to the court is necessary within twenty-four hours even when such a happenstance occurs. There are also exceptions granted for foreign powers and their agents operating in the United States (FLETC, 2016).
As for what the genesis and nexus of the immunity order was, it was surely a bone to…

Sources Used in Documents:

References

FLETC. (2016). Foreign Intelligence Surveillance Act (FISA): An Overview. Federal Law Enforcement Training Centers. Retrieved 24 June 2016, from https://www.fletc.gov/sites/default/files/imported_files/training/programs/legal-division/downloads-articles-and-faqs/research-by-subject/miscellaneous/ForeignIntelligenceSurveillanceAct.pdf


Cite this Document:

"Review And Analysis Of FISA" (2016, June 24) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/review-and-analysis-of-fisa-2158486

"Review And Analysis Of FISA" 24 June 2016. Web.25 April. 2024. <
https://www.paperdue.com/essay/review-and-analysis-of-fisa-2158486>

"Review And Analysis Of FISA", 24 June 2016, Accessed.25 April. 2024,
https://www.paperdue.com/essay/review-and-analysis-of-fisa-2158486

Related Documents

FISA's recent rise to fame has been due to attempts by the Bush Administration to apply the law as justification for warrant-less wiretaps of U.S. citizens in apparent disregard of their Fourth Amendment protections. This issue will be examined in more detail below, however, it is important to first discuss some of the key court cases that help establish the Constitutionality of FISA. Specifically, this report will address three

Homeland Security and FISA
PAGES 5 WORDS 1457

NSA/FISA Following the terrorist attacks of September 11, 2001 there has been a significant effort to protect America from any further terrorist attacks. The purpose of this discussion is to examine the U.S. National Security Agency's ability to identify and monitor the communications of terrorists and prevent terrorism from occuring. The research will also investigate how the implications of employing these techniques for foreign intelligence surveillance suggests that the Foreign Intelligence

The Church Committee concluded that these activities made the intelligence community a secret government that was illegal, unethical, and improper and did not reflect the people or the nation of America. Secret intelligence actions were used to disrupt, harass, and destroy domestic law-abiding citizens and groups. At the time, people were spied on with excessive intrusion with the methods being illegal. In addition, the intelligence agencies carried out secret infiltration

Counter-Terrorism and Social Media: Freedom vs. Security The United States prides itself to being the most democratic nation of the world, with the highest respect for the human being, for its values, norms, and dreams. At the same time, before 9/11, it was also considered to be one of the safest nations of the world. The attacks on the World Trade Center towers, in particular pointed out that there are gaps

S. law. Legislation such as many elements of the U.S.A. PATRIOT ACT are problematic because they do not provide adequate controls to ensure that investigative methods and procedures appropriate under some circumstances cannot be used in circumstances where they are inappropriate under U.S. law. 4. What is the FISA Court? Explain how it works. What authorities can it grant law enforcement? How is it different from traditional courts? What concerns exist

S.A. PATRIOT Act Improvement and Reauthorization Act reauthorized all expiring provisions of the U.S.A. PATRIOT Act, added dozens of additional safeguards to protect privacy interests and civil liberties, and strengthened port security. (USDOJ, 2008) SUMMARY & CONCLUSION This report has presented in brief the federal policy changes that been changed or created since the events of September 11, 2001. Changes have included collaboration between federal, state and local agencies in coordination and