Congressional Record: July 29, 2003 (Senate)
Page S10142-S10153
STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS
[...]
By Mr. WYDEN:
S. 1484. A bill to require a report on Federal Government use of
commercial and other databases for national security, intelligence, and
law enforcement purposes, and for other purposes; to the Committee on
the Judiciary.
Mr. WYDEN. Mr. President, I believe the United States can fight
terrorism ferociously without gutting civil liberties. The point of the
legislation I am introducing today is to address concerns that have
arisen about the second part of this equation: an area of privacy that
has gotten short shrift. That is the personal financial, medical and
other data on millions of Americans that today is less than a
mouseclick away from the computers of thousands of Federal bureaucrats.
Access to and the use of that personal information by Federal
bureaucrats is not protected by any comprehensive law.
The power of technology that allows the Federal Government to pry
into the personal lives of millions of Americans is only beginning to
be understood. It is a breath-taking power, and it has come partly to
light through the Defense Department's Terrorism Information Awareness
Program (TIA), and through the Transportation Security Administration's
Computer Assisted Passenger Profiling System II or CAPPSII Program.
These and more than two dozen other agencies wield that power with
little or no restraint.
The legislation I am introducing with the support of a bipartisan
group of privacy watchdog organizations, the Citizens' Protection in
Federal Databases Act, will put the breaks on unchecked Federal data
sweeps. It requires the Federal agencies with law enforcement or
intelligence authority to share with Congress exactly what they are
doing with private or public databases, why they are doing it, and most
importantly, what, if any, privacy protections the agencies are
affording the individuals' whose sensitive information is caught up in
those databases.
The Citizens' Protection in Federal Databases Act also prohibits
searches based on hypothetical scenarios.
Apparently, some government agencies are using valuable Federal
resources chasing hypothetical situations dreamed up without regard to
actual intelligence or law enforcement information.
The TIA Report to Congress in May of this year explained at length
the program's intent to construct possible terrorist "scenarios"
based on "historical examples, estimated capabilities, and
imagination." These scenarios would then be fed into database searches
in an effort to substantiate the hypotheticals.
This Act bans such searches. This prohibition will promote the
efficient use of Federal law enforcement time and money and help
protect Americans from being subject to "virtual goose chases."
Since 9/11, there has been an abundance of stories regarding
Americans being stopped, searched, or detained due to some mistaken
information. For example, after 9/11, the FBI decided to share with
companies across the country a list with names of people wanted for
possible association with terrorism. This list, as part of "Project
Lookout," was sent to thousands of corporations, some of whom now use
the list in lieu of background checks.
Here's the problem--this list is not necessarily accurate. First of
all, the list quickly became obsolete as the FBI checked people off.
That means even if people were cleared by the FBI of suspicion, their
names were still on this list. Secondly, the list has been shared so
many times, and passed from person to person, group to group--many
names have become misspelled and now folks, due to one or two typos,
are being stopped as suspected terrorists.
That story is just one example of what can happen when information is
[[Page S10150]]
mishandled. It is Congress's job to make sure mistakes like these do
not happen.
The Citizens' Protection in Federal Databases Act is not the end of
this issue. After shedding some light on what exactly is happening with
personal information--the Congress must then address how to protect
Americans from the misuse of this information.
I am happy to be working with a strong group of privacy advocates.
The group includes the Electronic Privacy Information Center, the
Electronic Frontier Foundation, the Center for Democracy and
Technology, People for the American Way, the Free Congress Foundation,
and the American Civil Liberties Union, and they have been instrumental
in getting strong safeguards enacted against abuses in the TIA and
other programs. I look forward to working with these groups, and my
Senate colleagues, to see that this bill is enacted into law.
When tens of thousands of bureaucrats have at their fingertips all-
too-easy access to such personal information from private and public
databases as the use of passports, driver's licenses, credit cards,
ATMs, airline tickets, and rental cars, the American people want to
know what is happening to their information. They want to know who
wants access to it and why. Their personal information deserves strong
privacy protection, and that is what this legislation is all about.
I ask unanimous consent that the text of the bill be printed in the
Record.
There being no objection, the bill was ordered to be printed in the
Record, as follows:
S. 1484
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the "Citizens' Protection in
Federal Databases Act".
SEC. 2. FINDINGS.
Congress makes the following findings:
(1) Many Federal national security, law enforcement, and
intelligence agencies are currently accessing large
databases, both public and private, containing information
that was not initially collected for national security, law
enforcement, or intelligence purposes.
(2) These databases contain personal and sensitive
information on millions of United States persons.
(3) Some of these databases are subject to Federal privacy
protections when in private sector control.
(4) Risks to personal privacy are heightened when personal
information from different sources, including public records,
is aggregated in a single file and made accessible to
thousands of national security, law enforcement, and
intelligence personnel.
(5) It is unclear what standards, policies, procedures, and
guidelines govern the access to or use of these public and
private databases by the Federal Government.
(6) It is unclear what Federal Government agencies believe
they legally can and cannot do with the information once
acquired.
(7) The Federal Government should be required to adhere to
clear civil liberties and privacy standards when accessing
personal information.
(8) There is a need for clear accountability standards with
regard to the accessing or usage of information contained in
public and private databases by Federal agencies.
(9) Without accountability, individuals and the public have
no way of knowing who is reading, using, or disseminating
personal information.
(10) The Federal Government should not access personal
information on United States persons without some nexus to
suspected counterintelligence, terrorist, or other illegal
activity.
SEC. 3. LIMITATION ON USE OF FUNDS FOR PROCUREMENT OR ACCESS
OF COMMERCIAL DATABASES PENDING REPORT ON USE
OF INFORMATION.
(a) Limitation.--Notwithstanding any other provision of
law, commencing 60 days after the date of the enactment of
this Act, no funds appropriated or otherwise made available
to the Department of Justice, the Department of Defense, the
Department of Homeland Security, the Central Intelligence
Agency, the Department of Treasury, or the Federal Bureau of
Investigation may be obligated or expended by such department
or agency on the procurement of or access to any commercially
available database unless such head of such department or
agency submits to Congress the report required by subsection
(b) not later than 60 days after the date of the enactment of
this Act.
(b) Report.--(1) The Attorney General, the Secretary of
Defense, the Secretary of Homeland Security, the Secretary of
the Treasury, the Director of Central Intelligence, and the
Director of the Federal Bureau of Investigation shall each
prepare, submit to the appropriate committees of Congress,
and make available to the public a report, in writing,
containing a detailed description of any use by the
department or agency under the jurisdiction of such official,
or any national security, intelligence, or law enforcement
element under the jurisdiction of the department or agency,
of databases that were obtained from or remain under the
control of a non-Federal entity, or that contain information
that was acquired initially by another department or agency
of the Federal Government for purposes other than national
security, intelligence or law enforcement, regardless of
whether any compensation was paid for such databases.
(2) Each report shall include--
(A) a list of all contracts, memoranda of understanding, or
other agreements entered into by the department or agency, or
any other national security, intelligence, or law enforcement
element under the jurisdiction of the department or agency
for the use of, access to, or analysis of databases that were
obtained from or remain under the control of a non-Federal
entity, or that contain information that was acquired
initially by another department or agency of the Federal
Government for purposes other than national security,
intelligence, or law enforcement;
(B) the duration and dollar amount of such contracts;
(C) the types of data contained in the databases referred
to in subparagraph (A);
(D) the purposes for which such databases are used,
analyzed, or accessed;
(E) the extent to which such databases are used, analyzed,
or accessed;
(F) the extent to which information from such databases is
retained by the department or agency, or any national
security, intelligence, or law enforcement element under the
jurisdiction of the department or agency, including how long
the information is retained and for what purpose;
(G) a thorough description, in unclassified form, of any
methodologies being used or developed by the department or
agency, or any intelligence or law enforcement element under
the jurisdiction of the department or agency, to search,
access, or analyze such databases;
(H) an assessment of the likely efficacy of such
methodologies in identifying or locating criminals,
terrorists, or terrorist groups, and in providing practically
valuable predictive assessments of the plans, intentions, or
capabilities of criminals, terrorists, or terrorist groups;
(I) a thorough discussion of the plans for the use of such
methodologies;
(J) a thorough discussion of the activities of the
personnel, if any, of the department or agency while assigned
to the Terrorist Threat Integration Center; and
(K) a thorough discussion of the policies, procedures,
guidelines, regulations, and laws, if any, that have been or
will be applied in the access, analysis, or other use of the
databases referred to in subparagraph (A), including--
(i) the personnel permitted to access, analyze, or
otherwise use such databases;
(ii) standards governing the access, analysis, or use of
such databases;
(iii) any standards used to ensure that the personal
information accessed, analyzed, or used is the minimum
necessary to accomplish the intended legitimate Government
purpose;
(iv) standards limiting the retention and redisclosure of
information obtained from such databases;
(v) procedures ensuring that such data meets standards of
accuracy, relevance, completeness, and timeliness;
(vi) the auditing and security measures to protect against
unauthorized access, analysis, use, or modification of data
in such databases;
(vii) applicable mechanisms by which individuals may secure
timely redress for any adverse consequences wrongfully
incurred due to the access, analysis, or use of such
databases;
(viii) mechanisms, if any, for the enforcement and
independent oversight of existing or planned procedures,
policies, or guidelines; and
(ix) an outline of enforcement mechanisms for
accountability to protect individuals and the public against
unlawful or illegitimate access or use of databases.
SEC. 4. GENERAL PROHIBITIONS.
(a) In General.--Notwithstanding any other provision of
law, no department, agency, or other element of the Federal
Government, or officer or employee of the Federal Government,
may conduct a search or other analysis for national security,
intelligence, or law enforcement purposes of a database based
solely on a hypothetical scenario or hypothetical supposition
of who may commit a crime or pose a threat to national
security.
(b) Construction.--The limitation in subsection (a) shall
not be construed to endorse or allow any other activity that
involves use or access of databases referred to in section
3(b)(2)(A).
SEC. 5. DEFINITIONS.
In this Act:
(1) Appropriate committees of congress.--The term
"appropriate committees of Congress" means--
(A) the Select Committee on Intelligence and the Committee
on the Judiciary of the Senate; and
(B) the Permanent Select Committee on Intelligence and the
Committee on the Judiciary of the House of Representatives.
(2) Database.--The term "database" means any collection
or grouping of information about individuals that contains
personally identifiable information about individuals, such
as individual's names, or identifying numbers, symbols, or
other identifying
[[Page S10151]]
particulars associated with individuals, such as
fingerprints, voice prints, photographs, or other biometrics.
The term does not include telephone directories or
information publicly available on the Internet without fee.
(3) United states person.--The term "United States
person" has the meaning given that term in section 101(i) of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(i)).
______