Introduction
Background to the Study
The US PATRIOT Act aims at providing the necessary intelligence for helping curb domestic and international terrorist activities that were planned and executed on US soil. One major claim that was advanced by the top administration of the US in support of the US PATRIOT Act is that it strikes a balance between privacy rights and national security. The Act permits the US security agents to conduct both physical and electronic searches on individuals who are suspected to be involved in acts that may endanger the lives of the American population. It also coerces the government of the United States to behave in certain ways during mass destruction and kidnapping among other ways. Moreover, it intimidates the US government to adopt certain policies.
Before the adoption of the US PATRIOT Act, the US law required the police and other security agents to seek issuance of a warrant of search on proof of ‘probable cause’ in any involvement in criminal activities of the person intended to be searched from a judge. The new act only required the police to certify that a search would be conducted for purposes of protection against the likelihood of international and domestic terrorism. This subjective test is much easier to certify than proof of ‘probable cause.’ From this paradigm, this paper proposes research on whether the US PATRIOT law fosters infringement of people’s rights to privacy.
Problem Statement
The large-scale collection of millions of Americans’ information violates the rights of privacy. Can the US PATRIOT law strike balance between national security and privacy rights by violating the rights of privacy for tangible items and information? The problem with the US PATRIOT Act is that it potentially fails to respect the privacy rights of innocent and law-abiding Americans.
Research Aim and Objectives
The aim of the current research is to deploy secondary data that is derived from law journal articles, civil rights publications, books, and other sources to establish the scholarly contention of how the US PATRIOT act infringes the rights of privacy for Americans. The research has two main objectives, which include:
- Examining literature on how the sneak-and-peak rule as provided in section 213 of the US PATRIOT Act contravene privacy rights
- Examining literature on the impact of ‘gag-rule’ as provided in section 215 of the US PATRIOT Act on privacy rights
Research Questions
- Does the provision of section 215 in the US PATRIOT Act erode people’s rights to privacy?
- Does section 213 of the US PATRIOT Act erode US people’s right of privacy?
Significance of the Study
Since September 11 attacks, threats of terrorism in America and other nations have been on the rise. According to the Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals (2008), this situation makes it difficult for different states to establish a boundary between public rights and individual rights such as the right of privacy. The camouflaging nature of terrorists within the sphere of social rights creates the necessity of putting measures to unearth terrorist activities in a bid to protect the integrity of the people of the United States including the violation of their domestic safety rights.
Consequently, availing information on the alignments or misalignments of the US PATRIOT Act with the civil rights can aid significantly to shape the approaches and mechanisms of evaluation of new laws that seek to protect and ensure the security of the American people. In this sense, the proposed research will provide a theoretical framework for balancing public rights such as the right to security and private rights such as the right to privacy.
Literature Review
Privacy Rights
Laws and regulations limit persons from violating constitutional rights of others. State laws prevent and/or reduce crime rates. However, such laws need to reflect both legal together with ethical soundness in their application. As one of the constitutional rights, people have the right to protection of their privacy unless a court order justifies such a violation (Peak 2012, p.83). However, terrorist attacks on the US World Trade Centre gave room for considering balancing people’s rights of security and privacy.
The Congress felt that the US government had a constitutional mandate to enhance the security of Americans amid the directive to protect the US constitution, which proclaims people’s rights such as privacy rights (Wong 2006). The claim here is that the rights of Americans need to be balanced so that one right does not result in the infringement of other rights. For this reason, President Bush enacted the US PATRIOT Act into law in October 2001. However, does it balance the rights of living free from internal and external aggression or harm and privacy right?
Literature on the rights of privacy documents little attempt to define the right to privacy. Etzioni (2000, p. 901) defines privacy rights as the ‘freedom to keep a domain around us, which includes all those things that are part of us such as our body, home, property, thoughts, feelings, secret, and identity.’ This definition implies that people have the right or the freedom to choose at an individual level the domains that can be freely accessed by other people.
Any forceful attempt to access the disallowed domain amounts to a breach of privacy of an individual. Therefore, privacy rights protect people from infringement of privacy of individuals by restraining parties including the government apart from an individual from accessing personal information and tangible items such as assets (Rubel 2006). In this sense, privacy rights may be loosely interpreted to mean freedom from interference or the right of being left alone.
The question of whether the US constitution makes a declaration for privacy rights attracts a heated debate in legal practice. Hudson (2009, p. 107) asserts, ‘The US constitution contains no express right to privacy.’ However, the bill of rights makes various provisions for the protection of individual privacy. The first amendment of the bill of human rights provides for the privacy of people’s beliefs. The fourth amendment makes the provision for the protection of individuals against unlawful or unreasonable searches while the fifth amendment makes the provision for the protection of privacy of people’s information (Maillet 2013, p. 3).
These provisions fail to justify any attempt to conduct a search on people’s property. The provision of the ninth amendment raises questions in terms of the applicability of these amendments. ‘Enumeration of certain rights in the Bill of Rights will not be construed to deny or disparage other rights retained by the people’ (Hudson 2009, p.128). This context implies that the preservation of privacy rights should not allow one to have the capacity to engage privately in acts that deprive people of their other rights. Can this case justify the application of the US PATRIOT Act to ensure that people do not house items that may cause mass destruction to other citizens?
The US PATRIOT Act and Breach of Privacy Rights
President Bush signed the US PATRIOT Act into law immediately after the September 11 attacks, which claimed the lives of more than 3000 Americans. The provisions of sections 213 and 215 of the Act attract many controversies from legal scholars and advocates of human rights. Civil rights activists contend that the US PATRIOT Act infringes people’s rights to privacy (New York Bill of Rights Defence Campaign 2013).
This contention emanates from the promulgation of privacy rights in the fourth amendment. However, Maillet (2013) believes that the history of the amendment introduces difficulties in the determination of the extent to which the US PATRIOT Act erodes privacy rights. The fourth amendment fails to protect directly the rights to privacy It only protects personal effects such as books, houses, and vehicles among others. Thus, interpreting the fourth amendment literally makes it impossible to determine how it protects information and conversation privacy rights, as civil rights advocates contend.
The legal implication of the fourth amendment in terms of protection of information and conversation is perhaps clear upon consideration of judicial precedence. In the 1970s, the US Supreme Court ruled that the fourth amendment failed to offer protection to information entrusted to other parties. This exposition implies that financial information, medical records, and educational records did not receive protection from the fourth amendment (Smith 2010).
The principle provides the ground for seeking information from phone companies on the numbers dialed from a certain phone or addresses keyed in by an individual from an internet service provider organization since such companies are the custodians of private conversations. However, the intents of section 215 remain questionable as the section prohibits parties, which are served by the orders of the section to disclose to any other party that security agents searched their details.
With or without evidence, civil rights advocates cite specifically section 213 and 215 of the US PATRIOT Act as their major concern in the capacity of the Act to breach civil rights (Rubel 2006). Sneak-and-peak provisions, as enumerated in section 213 of the Act, guarantee many powers to law enforcement agents to conduct searches in premises of unsuspecting US citizens without having to inform them priory in the effort to mitigate challenges of destruction or hiding of evidence (Cole & Dempsey 2002, p.83).
On the other hand, the ‘gag-rule’ is provided in section 215 of the Act. It gives law enforcement agencies the power to subpoena business records without the consent of the business owners (Rubel 2006). This suggests that the two rules do not make provisions for civilians and organizations to authenticate searches within their premises or information systems.
In her study on the applicability of the US PATRIOT Act in curbing terrorism, Van Bergen discusses the case of the indictment of Professor Al-Arian. Through sneaking and peaking into the information of the Al-Arian, purported money transfers to various accounts that were later utilized in funding terrorist acts were possible to prove. She asserts, ‘The allegations contained in the conspiracy indictment were based largely on authorized electronic surveillance pursuant to FISA and conducted prior to the US PATRIOT Act’ (Van Bergen 2003, p.122).
This finding provides evidence on the applicability of the US PATRIOT Act in balancing the rights of security for Americans and the rights for ensuring the privacy of their information. Her research methodology that involved the use of case studies of successful application of the US PATRIOT is particularly effective in providing reliable evidence on the extent to which the Act does not amount to a violation of the privacy rights of the US citizens.
Principles of democracy advocate that people have the right to make choices of their course of action. However, this does not imply that they should break the democratic rights of others while preserving their democratic rights’ discourses (Isakhan & Stockwell 2011). Theories of democracy such as pluralist, protective, and the performance democracy uphold the principle, ‘democratic citizens are expected to be free in several important respects…they must be free regarding such matters as speech, assembly, and conscience’ (Sen 2004, p.9). This suggests that the freedom of conversing and sharing information freely with one’s party of choice is fundamental to any democratic government.
In a democratic government whose policies are informed by the democratic theory of equal participation, people also preserve their right to security from internal and external inversion (Halperin, Siegle & Weinstein 2005). Indeed, it is an obligation of any democratic government to provide control for infringement of people’s rights while exercising other rights such as the rights of privacy. In this context, the US PATRIOT Act does not harm people’s privacy to the extent that it can help in balancing the right of privacy and security of Americans.
This situation is only possible when a subjective test is applied while issuing warrants of search to ensure the existence of precision of allegation of the likely involvement of people who are scheduled for search in criminal or terrorist activities. However, Wong’s (2006) research on the consideration of the US PATRIOT Act while arriving at the decision to issue a warrant of search proves the ease at which a judge may issue a warrant of search without demonstration of connectivity between a request for search and the victim party’s involvement in terrorist acts.
In his analysis of section 213 of the US PATRIOT Act, Wong (2006) informs that the US security agents need to only prove ‘significant purpose’ in the search of private property or information systems for organizations holding private information. Thus, the proof of probable cause does not apply in the application of section 213. Hence, it widens the scope of search and seizures. The legal provisions on electronic surveillance attract high concerns from investigative agencies.
Abramson and Godoy (2014) reveal that the agencies have always complained about the legal restrictions of using information obtained from technology devices such as cell phones and computers during prosecutions. Sneak-and-peak rule provides solutions to these complaints. The rule gives legal support for intelligence agencies to mount wiretaps on unsuspecting citizens. While the rule may be important during investigations of highly technologically informed terrorists, the privacy of innocent Americans who may be conversing with terrorists unknowingly is subjected to jeopardy.
Wong and Gruberg’s (2006) study on the impacts of the US PATRIOT Act on civil rights relies on data collected through direct interviews. Drawing from the data, they report, ‘Non-citizens with no connection to terrorists have been rounded up seemingly on the basis of their religion or ethnicity, held for months without charges, and in some cases physically abused’ (Wong & Gruberg 2006, p.15). They claim that about 57 percent of Muslims with American citizenship have encountered discrimination together with biasness in terms of violation of their privacy rights in search of information linking them to terrorism. Based on these findings, Wong and Gruberg (2006) insist that the US PATRIOT Act has led to the erosion of democratic rights of the Muslim American population such as equal and fair treatment to other citizens in its implementation.
In terms of its application from the domain of the general American population, Wong and Gruberg (2006) assert that the US PATRIOT Act, especially the provision of section 215, changes the procedures for the Federal Intelligence Surveillance Act (FISA). The procedures outline how law enforcement agencies should conduct intelligence surveillance. Rubel (2006) agrees with this claim by adding that the ‘gag-rule’ provision does not require law enforcement officers to prove a terrorist link to conduct searches.
The research by Wong and Gruberg (2006) relies on interviews to make inferences on the impacts of the US PATRIOT Act on certain groups of American citizens. However, it fails to consider reliable information derived from cases settled in courts of law, which are prosecuted using information garnered through the application of section 213 and 215 of the Act. This proposal seeks to close this gap in the effort to determine the segregation in the application of the US PATRIOT Act among the American population.
Methodology
Research Design
This research deploys secondary data to achieve its aim. It draws its data from law journals, books, and complied cases involving alleged participation in acts that are likely to expose the security of Americans to the danger of terrorism. Quantitative data on the number of such cases since the enactment of the US PATRIOT Act in October 2001 is gathered for further analysis. Related qualitative information such as race, religious inclination, and ethnicity of the accused persons is also compiled.
Data Collection
Secondary research uses information from other studies. The proposed study will collect this information mainly from government publications, legal journals/books, and civil right websites. The main reason for using the secondary data collection method is its unobtrusive nature. It is also relatively easier, cheaper, and faster to collect secondary information in comparison with primary data.
Research Strategy
The proposed research strategy adopts a non-experimental approach to answer the research questions. This means that there will be no manipulation during the collection, analysis, or presentation of findings (Mangal & Mangal 2013). Overall, this strategy will include the analysis of case studies, review of analytical views, and the review of archived information concerning the research topic.
Conclusion
The US government, under the Bush administration, passed the US PATRIOT Act into law after the September 11 attacks. The Act aimed at improving the quality of counterterrorism investigations by giving law enforcement officers immense powers to search and survey terrorists. However, the Act has caused widespread controversies. It potentially undermines the rights and freedoms of the Americans.
For example, the law eliminated many checks and balances that gave Americans the right to seek legal redress in case of abuse of their civil rights. The proposed research aims at examining the extent to which sections 213 and 215 erode the privacy rights of the American population through studying the evident segregation in the application of the US PATRIOT Act among American citizens. This goal is accomplished through a discussion of how information for the successful prosecution of various cases was acquired.
References
Abramson, L & Godoy, M 2014, The PATRIOT Act: Key Controversies. Web.
Cole, D & Dempsey J 2002, Terrorism and the Constitution: Sacrificing Civil Liberties in the Name of National Security, W. W. Norton & Co., New York, NY.
Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals 2008, Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, National Academies Press, Washington, DC.
Etzioni, A 2000, ‘A communitarian perspective on privacy’, Connecticut Law Review, vol.32 no.3, pp. 897-905.
Halperin, H, Siegle, J & Weinstein, M 2005, The Democracy Advantage: How Democracies Promote Prosperity and Peace, Routledge, New York, NY.
Hudson, D 2009, The Right to Privacy, Infobase Publishing, New York, NY.
Isakhan, B & Stockwell, S 2011, The Secret History of Democracy, Palgrave MacMillan, New York, NY.
Maillet, J 2013, The Controversy over the USA PATRIOT Act. Web.
Mangal, S & Mangal, S 2013, Research Methodology in Behavioural Sciences, PHI Learning Pvt. Ltd, New Delhi.
New York Bill of Rights Defence Campaign 2013, Rights and Freedoms We Have Needlessly Lost in the name of National Security. Web.
Peak, K 2012, Justice Administration: Police, Courts and Corrections Management, Pearson, Prentice Hall, Upper Saddle River, NJ.
Rubel, 2006, Privacy and the USA PATRIOT Act: Rights, the Value of Rights, and Autonomy, University of Wisconsin, Madison.
Sen, A 2004, ‘Democracy as a Universal Value’, Journal of Democracy, vol. 10 no. 3, pp. 3–17.
Smith, R 2010, Fourth Amendment: The Right to Privacy, ABDO, New York, NY.
Van Bergen, J 2003, ‘In the Absence of Democracy: The Designation and Material Support Provisions of the Anti-Terrorism Laws’, Law Policy & Ethics Journal, vol. 2 no. 107, pp. 109-159.
Wong, K & Gruberg, M 2006, ‘The Impact of USA PATRIOT ACT on American Society: The Case of the Muslim Community’, The Washington Quarterly, vol. 28 no. 4, pp. 7-17.
Wong, K 2006, ‘The making of the USA PATRIOT Act I: Legislative Process and Dynamics’, International Journal of The Sociology Of Law, vol. 34, no. 3, pp. 179–219.