Jim Jordan on Homeland Security
Proponent's Argument for voting Yes:
[Rep. Blackburn, R-TN]: This bill gets the Federal Government--and Federal taxpayers--out of the business of buying radio programming they do not agree with. This is a bill that is long overdue. Regardless of what you think of NPR, its programming or statements by its management, the time has come to cut the umbilical cord from the taxpayer support that has become as predictable as an entitlement program. Much has changed in the media landscape since the wiretaps, to seek certain business records, and to gather intelligence on lone terrorists who are not affiliated with a known terrorist group. The Patriot Act works. It has proved effective in preventing terrorist attacks and protecting Americans. To let these provisions expire would leave every American less safe.
Opponent's Argument for voting No:
[Rep. Conyers, D-MI]: Section 215 of the Patriot Act allows a secret FISA court to authorize our government to collect business records or anything else, requiring that a person or business produce virtually any type record. We didn't think that that was right then. We don't think it's right now. This provision is contrary to traditional notions of search and seizure which require the government to show reasonable suspicion or probable cause before undertaking an investigation that infringes upon a person's privacy. And so I urge a "no" vote on the extension of these expiring provisions.
SUPPORTER'S ARGUMENT FOR VOTING YES:Rep. CONYERS: Earlier this year, in the Protect America Act, PAA, amendments were made to FISA, giving the Government enhanced flexibility to collect foreign intelligence information. But the broad scope of the authority without up-front court approval raised grave concerns about the need for more safeguards of innocent Americans' communications. The RESTORE Act improves upon the PAA by providing a series of checks and balances while still allowing maximum flexibility. The RESTORE Act does not require individual warrants when persons are abroad, but it is firm that a FISA warrant is required to obtain communications of people in the US.
OPPONENT'S ARGUMENT FOR VOTING NO:Rep. KING of N.Y.: Electronic surveillance is one of the strongest weapons in our arsenal. The real enemy is al Qaeda and Islamic terrorism, not our own government working so hard to protect us. The PAA updated FISA and struck the appropriate balance between protecting our citizens from terrorist attacks and protecting our civil liberties. Today's bill, the RESTORE Act, marks an undeniable retreat in the war against Islamic terrorism. It limits the type of foreign intelligence information that may be acquired and actually gives foreign targets more protections than Americans get in criminal cases here at home.
LEGISLATIVE OUTCOME:Bill passed, 213-197.
SUPPORTER'S ARGUMENT FOR VOTING YES:Rep. REYES: This legislation goes a long way towards strengthening oversight of the intelligence community, which the President seems to consistently want to fight. That's why the President vetoed it. He wants the authority to do whatever he wants, in secret, with no oversight or authorization or without any checks and balances. Well, I don't agree. The Constitution gives us a role in this process. We do have a say in what the intelligence community does. That's why we need to override this veto.
OPPONENT'S ARGUMENT FOR VOTING NO:Rep. HOEKSTRA: This bill fails to give the intelligence community the tools that it needs to protect the American people from radical jihadists. The debate on this authorization bill is not about a single issue, [waterboarding], as some would have you believe. It is about the need to ensure that we give the right tools to our intelligence professionals in this time of enhanced threat.
LEGISLATIVE OUTCOME:Veto override failed, 225-188 (2/3rds required)
A modified version, S.2011, failed in the Senate; it called for amending FISA to provide that a court order is not required for the electronic surveillance of communication between foreign persons who are not located within the US for collecting foreign intelligence information, without respect to whether the communication passes through the US or the surveillance device is located within the US.
Opponents recommend voting NO because:
Sen. LEVIN: Both bills cure the problem that exists: Our intelligence agencies must obtain a court order to monitor the communications of foreigners suspected of terrorist activities who are physically located in foreign countries. Now, what are the major differences? Our bill (S2011) is limited to foreign targets limited overseas, unlike the Bond bill (S1927), which does not have that key limitation and which very clearly applies to US citizens overseas. Our bill does not. Now, if there is an incidental access to US citizens, we obviously will permit that. But the Bond bill goes beyond that, citing "any person." It does not say a "foreign person." We avoid getting to the communications of Americans. There you have to go for a warrant.
Proponents support voting YES because:
Sen. LIEBERMAN: I will vote for the Bond proposal (S1927) because we are at war, & there is increased terrorist activity. We have a crisis. This proposal will allow us to gather intelligence information on that enemy we otherwise would not gather. This is not the time for striving for legislative perfection. Let us not strive for perfection. Let us put national security first. We are going to have 6 months to reason together to find something better.
Proponents support voting YES because:
In Iraq, we were told we needed Halliburton to get a contract without any competition because they were the only ones who know how to put out oil well fires. So they got a contract on a cost-plus basis even though they had a history of overcharging the taxpayers. And then later we found out that they didn't do anything about putting out oil well fires in the first Gulf war; it was Bechtel, not Halliburton. Contractors were given special treatment by not having healthy competition.
In dealing with Hurricane Katrina, and we have seen the same mistakes again: No-competition contracts; cost-plus contracts. We have seen what the result has been: Wasted taxpayer dollars. This bill requires that if there is an emergency to give a contract, give it. But then have bidding within a year.
Opponents support voting NO because:
We support transparency and accountability in decision-making, but this bill asks for audit reports that are only advisory. To provide those to Congress not only gives you too much information, a lot of it can be misleading and can increase the number of contract disputes.
When you are fighting a war, you need to move quickly. You don't give a 6-month appeal to the folks that lose the competition. You don't give small business set-asides because there is one thing you don't have, you don't have time.
Congressional Summary:Expressing the conditions for the US becoming a signatory to the UN Arms Trade Treaty (ATT).
Opponent's argument against bill:(United Nations press release, June 3, 2013):
Secretary-General Ban Ki-moon str
Congressional summary:: Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection, and Online Monitoring Act or the USA FREEDOM Act:
Opponent's argument against (Electronic Frontier Foundation): The bill only addresses a small portion of the problems created by NSA spying. It does not touch problems like NSA programs to sabotage encryption standards; it does not effectively tackle the issue of collecting information on people outside of the US; and it doesn't address the authority that the government is supposedly using to tap the data links between service provider data centers, such as those owned by Google and Yahoo. The bill also does not address excessive secrecy; it won't deal with the major over-classification issues or the state secrets privilege.
Opponent's argument against (J. Kirk Wiebe, former NSA Senior Intelligence Analyst interview with TheRealNews.com): It's window dressing. Stopping bulk collection is a good step, but the only thing that's going to fix this is direct access into NSA's databases by an independent group of hackers, techie types, people like Snowden who know how to get into a network and look at things and verify that the data they're collecting and what they're doing with it complies with the Constitution. The NSA has essentially operated illegally--unconstitutionally--for 60% of its existence.
|2016-17 Governor, House and Senate candidates on Homeland Security:||Jim Jordan on other issues:|
Newly-elected Democrats taking office Jan.2017:
Newly-elected Republicans taking office Jan.2017:
Cannon HOB 515, Washington, DC 20515