[Congressional Record: March 14, 2008 (House)]
[Page H1707-H1760]
FISA AMENDMENTS ACT OF 2008
Mr. ARCURI. Mr. Speaker, by direction of the Committee on Rules, I
call up House Resolution 1041 and ask for its immediate consideration.
The Clerk read the resolution, as follows:
H. Res. 1041
Resolved, That upon adoption of this resolution it shall be
in order to take from the Speaker's table the bill (H.R.
3773) to amend the Foreign Intelligence Surveillance Act of
1978 to establish a procedure for authorizing certain
acquisitions of foreign intelligence, and for other purposes,
with the Senate amendment thereto, and to consider in the
House, without intervention of any point of order except
those arising under clause 10 of rule XXI, a motion offered
by the chairman of the Committee on the Judiciary or his
designee that the House concur in the Senate amendment with
the amendment printed in the report of the Committee on Rules
accompanying this resolution. The Senate amendment and the
motion shall be considered as read. The motion shall be
debatable for one hour, with 40 minutes equally divided and
controlled by the chairman and ranking minority member of the
Committee on the Judiciary and 20 minutes equally divided and
controlled by the chairman and ranking minority member of the
Permanent Select Committee on Intelligence. The previous
question shall be considered as ordered on the motion to its
adoption without intervening motion.
Sec. 2. During consideration of the motion to concur
pursuant to this resolution, notwithstanding the operation of
the previous question, the Chair may postpone further
consideration of the motion to such time as may be designated
by the Speaker.
The SPEAKER pro tempore (Mr. Pastor). The gentleman from New York is
recognized for 1 hour.
Mr. ARCURI. Mr. Speaker, for purposes of debate only, I yield the
customary 30 minutes to the gentleman from Washington (Mr. Hastings).
All time yielded during consideration of the rule is for purpose of
debate only.
General Leave
Mr. ARCURI. Mr. Speaker, I ask unanimous consent that all Members
have 5 legislative days within which to revise and extend their remarks
and insert extraneous material into the Record.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from New York?
There was no objection.
Mr. ARCURI. Mr. Speaker, I yield myself such time as I may consume.
Mr. Speaker, House Resolution 1041 provides for consideration of the
Senate amendment to H.R. 3773, the FISA Amendments Act of 2008. The
rule makes in order a motion offered by the chairman of the Judiciary
Committee to concur in the Senate amendment with the amendment printed
in the Rules Committee report on this resolution.
Mr. Speaker, we have come a long way on the crucial issues of
intelligence-gathering. I commend Chairmen Conyers and Reyes for their
diligence in providing much-needed attention in evaluation of FISA,
while ensuring that we provide our Nation's intelligence community with
the necessary tools and resources to prevent a future terrorist attack
on our Nation.
[[Page H1708]]
Over the last few weeks, my office phone lines have been burning up
with calls from constituents regarding FISA and the need for Congress
to take action. Unfortunately, the calls were prompted by a far-
reaching misinformation campaign aimed to scare the public into
believing that the House majority is in some way prohibiting our
Nation's intelligence community from monitoring the terrorists. Nothing
could be further from the truth. Not only are these claims false, they
are unconscionable.
I don't believe any Member of this institution, Republican or
Democrat, wants to shackle our Nation's intelligence community from
preventing another terrorist attack. Frankly, I am getting alarmed by
the claims by some of my colleagues. For the last couple of weeks, we
have heard only one message from the other side of the aisle: take up
the Senate bill because it has the support of the President. I have no
interest in being a rubber stamp for this administration, nor of any
elected body, even the Senate. That is not why I was sent to Congress.
I certainly mean no disrespect to the Senate, but my constituents sent
me to Congress to use my judgment and conscience to help govern.
The chairman of the Judiciary Committee said it best earlier in the
week during our Rules Committee hearing when he said we are not an
appendage of the Senate. I couldn't agree with Mr. Conyers more. It is
our responsibility to the American people to exercise our legislative
duty. Furthermore, with an issue like FISA and intelligence-gathering,
I am confident that the American people would expect the House to
exercise that duty to the fullest extent possible.
We are a bicameral form of government. The changes we are proposing
to the Senate bill today represent a powerful step forward in the
legislative process. The administration has made it overwhelmingly
clear that they need to use electronic surveillance to track and
identify terrorist targets. And despite the misinformation campaign and
the rhetoric, the proposal we will vote on today makes it easier for
our Nation's intelligence community to wiretap suspected terrorists by
explicitly not requiring a court order to wiretap targets believed to
be outside the United States. In addition, the proposal provides for
surveillance of terrorists and other targets overseas who may be
communicating with Americans.
And we are all well aware of the issue of immunity for telecom
companies. It seems like that is all we have talked about here for the
past several months. As a former prosecutor, I can say from experience
and without hesitation, you never provide immunity to anyone unless you
are sure whom you are giving the immunity to and why you are giving the
immunity out.
One point that has not received enough emphasis over the last few
weeks is that the telecom companies have immunity under current law.
However, the problem is that anytime a telecommunication company goes
to court, this administration steps in and says this is classified
material and the question is deemed state secret, and therefore you are
not allowed to talk about it. In that way, the telecom companies are
not allowed to even defend themselves, but rather have to sit there and
answer for any charges civilly made against them.
I, for one, couldn't agree more that if the intelligence community
goes to a telecom company with adequate authorization and says, We need
communication records for person X because he or she is believed to be
a terrorist, the telecom company deserves to be afforded that
protection. Unfortunately, we have absolutely no idea what the
administration requested and what the telecom companies have provided.
Our proposal provides a commonsense, balanced approach to address the
immunity issue. We want to provide the telecom companies with a legal
way to present their defense in a secure proceeding and in a secure way
in district court without the administration asserting state secret
privileges to block those defenses.
And, again, don't be fooled by the misinformation campaign. We are
not talking about broadcasting the content of those defenses over the
public airwaves, rather just the opposite will be done in camera and in
secret. This would involve ex parte proceedings in camera. That is one-
on-one telecom company and a Federal district court judge behind closed
doors. That way, the determination of whether or not the classified
material is, in fact, a state secret is made by a neutral third party
and not just this administration.
Finally, our proposal establishes a bipartisan national commission
with subpoena power to investigate and report to the American people on
the administration's warrantless surveillance activities and to
recommend procedures and protections for the future in much the same
way that the 9/11 Commission did.
Mr. Speaker, we must bring the misinformation campaign and partisan
wrangling to an end. There is no question that there are groups and
individuals out there who seek to do us harm. There is no question that
my colleagues and I want to give the people who protect us from the
danger every tool they need to keep fighting terrorism. The proposal we
will vote on today will, in fact, provide our Nation's intelligence
community with the resources to prevent future acts of terrorism while
protecting the freedoms of the citizens under the Constitution.
Everyone in this body wants the same thing, and that is to protect
American citizens. This bill does exactly that.
Mr. Speaker, I reserve the balance of my time.
Mr. HASTINGS of Washington. Mr. Speaker, I yield myself as much time
as I may consume.
(Mr. HASTINGS of Washington asked and was given permission to revise
and extend his remarks.)
Mr. HASTINGS of Washington. Mr. Speaker, I want to thank my friend
from New York (Mr. Arcuri) for yielding me the customary 30 minutes,
which I must note, Mr. Speaker, is more time than the entire House
Intelligence Committee will be permitted to debate the legislative
proposal covered by this rule. The Democrat Rules Committee is allowing
just 20 minutes for the members of the Select Committee on Intelligence
to debate this Democrat FISA proposal.
What is at stake is the safety and security of our Nation to protect
us against foreign terrorists threats by modernizing the 1970s
electronic surveillance law. The issue before the House is no less than
our intelligence community's ability to protect American citizens by
monitoring foreign terrorists communicating in foreign places. But the
respective members of the Intelligence Committee are to be given only
20 minutes to debate this issue.
It appears that Democrat leaders are not content with their record of
the most closed rules in the history of the U.S. House of
Representatives in shutting down every Member from being permitted to
offer amendments on the House floor. So now they are going so far as to
restrict the time the House is even permitted to debate bills that they
are trying to ram through this body.
Mr. Speaker, since the new Democrat majority took control of the
House Rules Committee last January a year ago, they have approved rules
that allow other committees far more time to debate matters of far less
importance than FISA. For example, H. Res. 214 provided a rule allowing
the Transportation Committee 1 hour of floor debate on legislation to
``authorize appropriations for sewer overflow control grants.''
H. Res. 269 gave the Financial Services Committee 1 hour to debate
housing assistance for Native Hawaiians.
H. Res. 327 gave an hour to the Science and Technology Committee to
discuss scholarships for math and science teachers.
H. Res. 331 gave the Resources Committee 1 hour of time, not just 20
minutes, but 1 hour of time to debate restoring the ``prohibition on
the commercial sale and slaughter of wild free roaming horses and
burros.''
Mr. Speaker, I believe my colleagues on the other side of the aisle
care sincerely about the security of our country and our fellow
citizens. But I fail to understand how it could be justified to allow
more House floor time to debate overflowing sewers and the killing of
wild burros than the members of the Intelligence Committee are allowed
today to discuss the urgent needs of FISA.
The answer is that Democrat leaders are working overtime to block the
[[Page H1709]]
House from voting on a bipartisan compromise bill that has passed the
Senate by a vote of 68-29. The bill passed the Senate over a month ago,
and on February 12, the Democrat leaders refused to allow the House to
even vote on that measure.
Twenty-one Blue Dog Democrats sent a letter to Speaker Pelosi at the
end of January declaring their support for the Senate FISA bill. But
there still hasn't been a vote. Mr. Speaker, I submit for the Record
that letter.
Congress of the United States,
Washington, DC, January 28, 2008.
Dear Madam Speaker: Legislation reforming the Foreign
Intelligence Surveillance Act (FISA) is currently being
considered by the Senate. Following the Senate's passage of a
FISA bill, it will be necessary for the House to quickly
consider FISA legislation to get a bill to the President
before the Protect America Act expires in February.
It is our belief that such legislation should include the
following provisions:
Require individualized warrants for surveillance of U.S.
citizens living or traveling abroad;
Clarify that no court order is required to conduct
surveillance of foreign-to-foreign communications that are
routed through the United States;
Provide enhanced oversight by Congress of surveillance laws
and procedures;
Compel compliance by private sector partners;
Review by FISA Court of minimization procedures;
Targeted immunity for carriers that participated in anti-
terrorism surveillance programs.
The Rockefeller-Bond FISA legislation contains satisfactory
language addressing all these issues and we would fully
support that measure should it reach the House floor without
substantial change. We believe these components will ensure a
strong national security apparatus that can thwart terrorism
across the globe and save American lives here in our country.
It is also critical that we update the FISA laws in a
timely manner. To pass a long-term extension of the Protect
America Act, as some may suggest, would leave in place a
limited, stopgap measure that does not fully address critical
surveillance issues. We have it within our ability to replace
the expiring Protect America Act by passing strong,
bipartisan FISA modernization legislation that can be signed
into law and we should do so--the consequences of not passing
such a measure could place our national security at undue
risk.
Sincerely,
Leonard Boswell, Marion Berry, Mike Ross, Bud Cramer,
Heath Shuler, Allen Boyd, Dan Boren, Jim Matheson,
Lincoln Davis, Tim Holden, Dennis Moore, Christopher
Carney, Earl Pomeroy, Melissa Bean, Joe Baca, John
Tanner, Jim Cooper, Brad Ellsworth, Charlie Melancon,
Zack Space.
When the Rules Committee met to discuss this bill on Wednesday,
several of my Democratic colleagues argued that the House shouldn't
have to give in to a my-way-or-the-highway or take-it-or-leave-it
approach when it comes to the bipartisan Senate bill.
I agree with my colleagues, Mr. Speaker. No Member of this House
should ever vote for legislation that they can't support. Members have
the right to vote their conscience. But, Mr. Speaker, simply allowing
the House to vote on a bipartisan FISA bill doesn't force any Members
to vote against his or her will. It just gives them an opportunity to
vote on a bill that has passed the other body overwhelmingly.
{time} 1030
It is the Democrat leaders and a liberal minority amongst that party
who are telling the rest of the House that it's their way or no way.
For days and weeks, they've refused the call of the 21 Blue Dog
Democrats for the House to act in the name of our Nation's security.
Democrat leaders are standing in the way of letting the House vote and
work its will because they fear a majority of this body will actually
approve the Senate bill.
Mr. Speaker, today, every Member of the House is going to have a
chance to vote and to allow the bipartisan Senate language to pass this
House. Let me be very clear what I intend to do when the previous
question is moved, because this will not be the ordinary motion. I will
amend just one clause of the rule, that is, section 2, so that the
section will then read, and I quote: Upon rejection of the motion to
concur specified in section 1, a motion that the House concur in the
Senate amendments to H.R. 3773 is hereby adopted.
What does that mean? What this means is that by voting ``no'' on the
previous question, the rule will be amended in such a way that
continues to allow the House to debate and vote on the proposal that's
offered by the Democrats today. But if the House Democrat proposal
fails, then the bipartisan Senate FISA bill is then agreed to by the
House. So we will have the vote on the Democrats' partisan FISA bill
presented to us today, but if the vote on the Democrat FISA bill fails,
then the games stop right there and the Senate bill goes to the
President for his signature. There's no more stalling, Mr. Speaker, no
more posturing.
It's time for the House to stand up and vote and get on with the
business of protecting America.
With that, Mr. Speaker, I reserve the balance of my time.
Mr. ARCURI. Mr. Speaker, it just seems to me that this debate is
becoming more and more political rather than focusing on what we're
here to do, and that is to ensure that the people of this country have
absolutely the best FISA bill that they can, a bill that not only
protects us but ensures that the Constitution is protected as well.
That's what this FISA bill does. It takes the best of all the things
that we have been trying to achieve over the past several months and
incorporates it into a bill, including unshackling the telecom
companies so that if they have done what has been asked of them and
what is permitted to do under the law, that they are allowed immunity.
We certainly don't want to prosecute people who have been trying to
help our country and keep our country safe. Nonetheless, this puts into
effect the important factors of ensuring that those things are done.
With that, Mr. Speaker, I would like to yield 2\1/2\ minutes to the
gentleman from Pennsylvania (Mr. Sestak).
Mr. SESTAK. Mr. Speaker, I was assigned to the Pentagon the day 9/11
happened. It was very obvious, sitting there at dead center, that the
world had changed. We in the military used to like away games. We liked
our wars over there. Suddenly we had a home game and things had to
change.
A few days later, I was appointed to be head of the Navy's
antiterrorism unit. Shortly after that, I was on the ground in
Afghanistan flying in with a fellow from the CIA with a suitcase filled
with millions of dollars. I wanted the best insurance, the best
intelligence. But I felt I always had that because I had worked at the
National Security Council, where in counterproliferation and
antiterrorism efforts there, I was able to see that whether it had been
President Reagan, President Clinton, or the first President Bush, FISA
provided that ability.
I like this bill. It is very similar to the Senate bill. If someone
in Saudi Arabia is talking to someone in Germany and it routes to the
United States, we can listen in without asking questions.
I remember being in the White House and being frustrated, because if
somebody was doing proliferation of weapons of mass destruction, we
couldn't, under FISA, get a warrant for them. This bill fixes that.
And then I step back in emergencies. This bill fixes it in an
emergency situation that you don't even have to ask permission; you can
just do it. And it extends from 3 days of having to come to the court
till 7 days. And then even if the court takes another 30 days, keep
listening. Thank you for that.
But the real differences come down to what I think is important,
because every day I was out there for 31 years in the military, I
wasn't just fighting an enemy or trying to deter him; I was fighting
for an ideal, the ideal of which America is founded upon, the rights of
civil rights. Therefore, I honestly believe what we have done in the
telecommunications companies and discussing immunity should be done by
the proper branch of government, the judicial branch, a court, the FISA
Court. Then if everything was not awry, then we can say, under the
provisions of the previous law, they have immunity.
And then I would like to also point out that it is very important to
me that we have oversight on reports that are coming, and they must
come to the FISA Court to explain the procedures they will follow. That
type of oversight is what I followed for. In short, I will never forget
being over there in charge of my carrier battle group, fighting in
Afghanistan, that what I was fighting for was security, number one,
properly balanced with civil rights. This bill
[[Page H1710]]
does do that. I wouldn't vote for it any other way unless it did.
Mr. HASTINGS of Washington. Mr. Speaker, I am pleased to yield as
much time as he may consume to the distinguished ranking member of the
Rules Committee, the gentleman from California (Mr. Dreier).
Mr. DREIER. Mr. Speaker, I thank my friend for yielding and I
appreciate his fine work.
It's no secret that there is a lot of controversy surrounding this
issue of modernization of the Foreign Intelligence Surveillance Act and
everything that surrounds our effort to successfully prosecute this war
on terror. We know that sacrifices have been made. We know that
sacrifices continue to be made. And we're all very committed to the
civil liberties of every single American. That's why I'm convinced that
we are not going to take actions which will in any way undermine the
civil liberties of our fellow Americans.
It is very important to note, Mr. Speaker, that as we look at this
issue, there is a great deal of bipartisanship that exists.
Unfortunately, it's not in this body. And I recognize that as the
people's House we have a unique responsibility and we should not in any
way become a rubber stamp for action taken by the other body. But I
will say this. As we look at bipartisanship, it extends beyond our
colleagues in the United States Senate. It does exist right here in the
House, in that 21 Democrats signed a letter to the Speaker and made the
specific request that we have a chance to vote on the proposal that is,
in fact, the bipartisan compromise that did emerge from the Senate. We
also have had a bipartisan group of attorneys general across the
country who have indicated that they very much believe that we should
proceed with taking the action that is embodied in that bipartisan
compromise that has emerged from the Senate.
And, Mr. Speaker, I think one of the most important things that we
should note is not simply bipartisanship but something that clearly
transcends any kind of politics or partisanship, and that is the words
that come from the Director of National Intelligence, Mike McConnell.
And when I say that he transcends partisanship, I would like to remind
our colleagues that this is a man who has spent four decades of his
life working in the intelligence field. He was the head of the National
Security Agency for President Bill Clinton, and he now serves as the
Director of National Intelligence.
In testimony before the Judiciary Committee, he referred to the fact
that there has been a 66 percent reduction, a two-thirds reduction in
the amount of information that they need, that they should be able to
glean in the intelligence area. And he has said that in his discussions
and negotiations with those in the telecommunications industry that
they will not be able to continue as they have in the past to help us
prosecute this war if they don't have this immunity.
Now, Mr. Speaker, I think that one of the things that we in this
debate on the rule are saying is that, let's just allow a vote on that
bipartisan compromise, the so-called Rockefeller-Bond bill that emerged
from the Senate. Sixty-eight Democrats and Republicans came together
and agreed on it. And we had an interesting Rules Committee meeting,
Mr. Speaker, in which we simply said, okay, we're going to have a
chance to vote on the measure that will emerge from the majority, but
why if as my very dear friend, the chairman of the Committee on the
Judiciary, Mr. Conyers said, he said he wanted there to be an exchange
of ideas, if there's going to be an exchange of ideas, let's at least
allow our colleagues to have an up-or-down vote on that bipartisan
compromise which embodies the above-partisan recommendations of the
Director of National Intelligence, the bipartisan recommendations of
the attorneys general across the country and simply say that we should
have a chance to vote on it. It's very unfortunate that this rule
denies Members of the House of Representatives the opportunity to have
that vote.
Mr. Speaker, I urge my colleagues to vote down this rule. We need to
defeat this rule so that we can in fact have a package that will allow
us to do everything we need as we pursue our very, very important
responsibility, and that is to secure our Nation.
Mr. ARCURI. Mr. Speaker, I would like to yield 2 minutes to the
gentleman from New Jersey, a member of the Intelligence Committee, Mr.
Holt.
Mr. HOLT. Mr. Speaker, I thank the gentleman, and I am pleased to
rise to say that not only do we have enough time to debate this, but we
have a very good, well-structured bill in front of us.
It is an important role of the Federal Government to look after the
safety and the security of the American people. This bill does that. It
is a well-structured bill that gives telecom companies the opportunity
they have asked for to defend themselves in court. It provides for a
congressional commission that will look at how electronic surveillance
has been conducted and will make recommendations. It includes a
reasonable expiration date to keep Congress involved in the oversight
of this. And I would argue most importantly this legislation provides
prior involvement of the court in all intercepts of communications of
Americans. Critically important.
Here are the facts. This bill gives our intelligence community the
flexibility they need to collect information on our enemies while
protecting the American people in every aspect. And it mandates
extensive reviews and reporting requirements on the electronic
surveillance programs in question. It rejects the President's efforts
to redefine the relationship between the people and their government, a
very key point.
I commend the Speaker, the leader, the Chair of the Judiciary
Committee, the Chair of the Intelligence Committee for negotiating with
a firm tone and a principled approach to give us very good legislation,
a very good bill despite the fact that they've had to work with the
relentless drumbeat of propaganda and disinformation orchestrated by
the administration in this matter. I commend them for producing such
good legislation in such difficult circumstances.
Mr. HASTINGS of Washington. Mr. Speaker, may I inquire how much time
remains on both sides.
The SPEAKER pro tempore. The gentleman from Washington has 19\1/2\
minutes. The gentleman from New York has 18 minutes.
Mr. HASTINGS of Washington. Mr. Speaker, I am pleased to yield 5
minutes to the gentleman from California (Mr. Royce).
{time} 1045
Mr. ROYCE. I thank the gentleman.
Mr. Speaker, I am rising to oppose the rule. As I think you know, we
are going to end up in a circumstance here, according to our Director
of National Intelligence, where, for the first time, frankly, this
refusal to protect our telecom companies, who face some 40 lawsuits and
billions of dollars, our refusal to allow for the protection for them
to defend themselves will end up stopping the intelligence
professionals from conducting surveillance of foreign persons in
foreign countries. It's really because they cannot read the minds of
their terrorist targets and guarantee that they would not call the
United States or one of their people in the United States.
Unfortunately, sometimes they do. Mahmood Karimi came into this
country in the trunk of a car over the border of Mexico after paying
$5,000. He was the brother, by the way, of the Hezbollah general in
southern Lebanon who launched the attacks there.
I was in Haifa in August, and the Prime Minister of Israel, by the
way, told me that one of his great concerns was the advantages that had
been given up and the knowledge that had now become known to the
terrorists. He said one of the reasons we are having such difficulty
with Hezbollah is because they now know how the United States, how
other countries were able to apprehend the information before these
attacks came.
But in any event, the brother of the individual who was launching
those attacks some years ago actually came into the United States. I am
certain somehow he got phone calls out of Beirut, and I am sorry if we
violated his constitutional rights. I know there is the assumption that
once a foreign agent from a foreign country is in this country, we
don't have the right to monitor and violate his civil rights.
Here is what I do know about this individual: I know that he did
manage to get through our southern border in my State. I know that
somehow we apprehended him up in Detroit. I know that
[[Page H1711]]
once we did, we found 50 of his cohorts who were part of the Hezbollah
cell.
Now, I am not making the allegation that we used this kind of
intelligence in order to apprehend him, because, frankly, I don't know
how we apprehended him. I only give you that example to say these are
the types of individuals who are operating. He was trained by Iran; he
was trained by foreign intelligence. He was here in the United States,
and I imagine in one case out of 1,000, when someone is trying to make
a phone call from Beirut to their agent, let's say in Syria,
occasionally that call might come into the United States because there
might be a foreign agent here.
The point I want to make is that this is, frankly, more protection
than Americans get under court-ordered warrants in Mob and other
criminal cases. The issue we are debating, frankly, is pretty
important. It's an issue of life and death, frankly, as far as I am
concerned.
I serve as the ranking member of the Terrorism and Nonproliferation
Subcommittee. That there have not been attacks on our soil since 9/11
is due to the improved surveillance in real-time that we are able to
conduct against foreign terrorists.
Now, that good record in no way should lead us to discount the
jihadists, because the image of Osama bin Laden's allies operating in
some remote terrain somewhere may give the impression that our foes are
isolated. I want to share with you, because of the Internet our foes
are not isolated. We are confronting a virtual caliphate. Radical
jihadists are physically disbursed, but they are united through the
Internet. They use the tool there to recruit and plot their terrorist
attacks. They use electronic communications for just such a purpose,
and they are very sophisticated in that use.
How has the West attempted to confront that? Well, the British used
Electronic surveillance in real-time and they used it last year to stop
the attack on 10 transatlantic flights. They prevented that attack a
year ago by wiretapping. The French authorities used wiretaps to lure
jihadists basically into custody and prevented a bomb attack.
Given this threat, it is unfathomable that we would weaken our most
effective preventive tool. That's exactly what this bill does, in the
opinion of Admiral McConnell, whose job it is to protect our security.
Admiral McConnell said that we are actually missing a significant
portion of what we should be getting. Now, he has served both
Democratic and Republican administrations with distinction.
I would ask those so distrustful, go ahead, discount his estimate,
cut them in half, say we lose one-third of our intelligence as a result
of this bill passing and the problems that we foment with telecom
companies around the world. I would argue that is too much to give up.
I don't want to lose a single percent of our intelligence on terrorist
communications. With nuclear and biological material floating around
the globe, we don't have that margin of error.
Mr. ARCURI. I thank the gentleman from California. I just want to
assure him that I think I speak for the entire Democratic Caucus when I
say that we share his concern for the safety of this country.
However, when he speaks about things that just blatantly aren't true,
for some reason, and I don't know if it's an attempt to frighten the
American people, it's troubling. This bill, this FISA bill, allows the
government to wiretap any foreign national, whether they are overseas
or they are here. This is just blatantly untrue. What he says about the
fact is that we cannot wiretap, we can't monitor a person that comes to
this country who is a foreigner. It's just blatantly untrue. This FISA
bill allows that to happen.
It's somewhat disheartening when people mention facts that just
aren't true, and I certainly hope it's not for political reasons; but
let's stick to the facts, because the facts are clearly that this bill
allows that to happen.
I yield 2\1/2\ minutes to the gentlewoman from Texas, a member of the
Judiciary Committee, Ms. Jackson-Lee.
(Ms. JACKSON-LEE of Texas asked and was given permission to revise
and extend her remarks.)
Ms. JACKSON-LEE of Texas. Mr. Speaker, I imagine that Admiral
McConnell is watching and listening, and so allow me this morning to
thank all of the patriots that are stationed around the world that are
the front lines of the national security and defense and intelligence
community of this Nation. To the American people, let me say on your
behalf, we thank them, for they are working every day, and they are
working diligently, and they are being successful.
This rule today supporting the underlying bill should be passed,
because Admiral McConnell is aware that every single tool that he has
asked for, foreign-to-foreign and otherwise in terms of surveillance,
is in this bill.
Interestingly enough, if you will talk to members of the law
enforcement community and those who are dealing with terrorists, they
will tell you that they are intercepting terrorists. They are finding
terrorists every single day. I personally spoke to law enforcement who
noted in one region of the country that they have intercepted three
terrorists. So what we are doing today is providing the codified
document to secure your civil liberties, to suggest that if the focus
of your surveillance is actually an American, they have to have a court
intervention, a quick court intervention.
As it relates to our telecom companies, is anyone suggesting that
they are not patriots? Is anyone suggesting that they will not comply
with a request by the national security community?
They will, because in this bill it indicates to them that if they get
a letter that suggests that we need their help, that they are not
breaking the law, that all of the laws have been in compliance
certified by the AG, they get absolute immunity.
So going forward, there will be no question. If that happened in the
past, they have absolute immunity. There will be no gaping hole, and
the idea of avoiding retroactive immunity is a question to America. It
is protecting your civil liberties. Yes, we have been secure, or we
have avoided a tragedy since 9/11. It is because we have given them the
tools, and now we give them better tools.
It is important to pass this legislation, because it advances the
security of America. But what it says to the world is that we are not
terrorized by the terrorists. We believe in security, but we believe in
the civil liberties of all Americans.
The Constitution still stands.
Mr. Speaker, I rise today in support of the H. Res. 1041, Providing
for Consideration of the Senate Amendment to H.R. 3773, the Foreign
Intelligence Surveillance Act (FISA) Amendments Act. This Rule will
allow us to examine the Senate Amendment and to consider the many
concerns associated with this act.
We have worked as a body to resolve our issues with FISA and with
those of our Senate colleagues without eviscerating the fundamental
rights embodied in the Bill of Rights. Leadership has worked tirelessly
to not simply reconcile the Senate language with the RESTORE Act (H.R.
3773), which we passed in the House on November 15, 2007, but
leadership has also worked tirelessly to go beyond the RESTORE Act.
This current FISA Reform legislation has been borne out of this
tireless struggle. Let me detail some of the ways that the FISA Reform
Act balances security and liberty: adopting provisions from the Senate
bill that will for the first time provide statutory protections for
U.S. persons overseas, that ensures surveillance of their
communications are conducted through the courts; and providing a
mechanism for telecommunications carriers to prove their case that they
did not engage in any wrongdoing and to guarantee due process with a
fair hearing in court.
Like the RESTORE Act, the FISA reform legislation provides for
collection against terrorist organizations such as Al Qaeda, while
providing prior court approval of acquisition and an on-going process
of review and oversight in order to protect Americans' privacy.
The FISA Reform Act creates a bipartisan commission on Warrantless
Electronic Surveillance Activities with strong investigatory powers in
order to preserve the rule of law in pending and future lawsuits. This
revised version of the bill reiterates FISA's exclusive control for
conducting foreign intelligence surveillance, unless a specific
statutory authorization for surveillance is enacted. This is an area
where the House version has differed from the Senate.
Perhaps the most important distinction between the House version of
the bill and the Senate's version is that the Court must approve
surveillance procedures prior to the start of surveillance. Under the
Senate bill, the Director of National Intelligence and the Attorney
[[Page H1712]]
General authorize surveillance and submit procedures to the FISA Court
5 days after surveillance begins. Under the Senate bill, the FISA Court
has no firm deadline for approving the procedures. The Senate bill does
not go far enough in protecting the individual rights of Americans.
The FISA Reform Act requires submission to Congress and the FISA
Court of ``reverse targeting'' guidelines that are to be promulgated by
the NSA. Specifically, these guidelines will determine whether the
``significant purpose'' of the surveillance is to acquire
communications of a specific U.S. person. In this regard, the House
bill gives more teeth to the provisions in the Senate bill, which only
has general prohibitions against reverse targeting and does not require
the promulgation of agency guidelines addressing reverse targeting.
Both the FISA Reform Act and the Senate bill, provide for prospective
liability protection for telecommunications companies that assist with
lawful surveillance activities. However, the FISA Reform Act goes
further by ensuring that telecommunication companies complying with the
Protect America Act (PAA) have liability protection for lawful
surveillance that occurred after the expiration of the PAA.
Another major difference between the bills is that the FISA Reform
Act does not provide for any retroactive immunity. Instead, the FISA
Reform Act provides for a process to allow district courts to review
classified evidence in camera and ex parte (in front of the judge
without the presence of the plaintiff). This allows the
telecommunications companies to have their day in court and to assert
defenses that already exist under FISA and other statutes. This process
simply creates a pathway for companies to assert such defenses.
This process, which allows the Court to review information and the
companies to prove their case, prevents the Executive Branch from
blocking the companies from asserting their defenses under the doctrine
of ``state secrets'' privilege. The FISA Reform Act permits the
telecommunication companies an opportunity to defend themselves but
does not create any new defenses or immunity and it does not excuse any
conduct that may have been unlawful. Under the House bill,
telecommunication companies can prove their innocence in court without
the protection of the States immunity privilege. If these companies
cannot prove that their actions were proper then they will be held
accountable.
The Senate bill grants full immunity to any telecommunication company
where the Attorney General certified that assistance was requested as
part of the President's warrantless surveillance program. This blanket
immunity goes to far, and do not support full immunity.
I believe the FISA Reform Act is better because it provides the
telecommunications companies with due process and an opportunity to
prove their guilt or innocence. I cannot support a case for blanket
immunity and the FISA Reform Act does not allow it.
Lastly, the FISA Reform Act provides a forward looking provision that
establishes a bipartisan National Commission, appointed by Congress.
The Commission will investigate and report to Congress and the public
about the Administration's warrantless surveillance activities.
Homeland security is not a Democratic or a Republican issue, it is
not a House or Senate issue; it is an issue for all Americans--all of
us need to be secure in our homes, secure in our thoughts, and secure
in our communications.
I find it disturbing that our Republican colleagues will not join us
to ensure that Americans are safe here and abroad. Disturbing that they
do not recognize that we must protect the civil liberties of this
Nation just as we protect American lives.
Mr. Speaker, in August of last year, I strongly opposed S. 1927, the
so-called ``Protect America Act'' (PAA), when it came to a vote on the
House floor. Had the Bush administration and the Republican-dominated
109th Congress acted more responsibly in the two preceding years, we
would not have been in the position of debating legislation that had
such a profoundly negative impact on the national security and on
American values and civil liberties in the crush of exigent
circumstances. As that regrettable episode clearly showed, it is true
as the saying goes that haste makes waste.
The PAA was stampeded through the Congress in the midnight hour of
the last day before the long August recess on the dubious claim that it
was necessary to fill a gap in the Nation's intelligence gathering
capabilities identified by Director of National Intelligence Mike
McConnell. In reality, it would have circumvented the Fourth Amendment
to the Constitution and represented an unwarranted transfer of power
from the courts to the Executive Branch and a Justice Department led at
that time by an Attorney General whose reputation for candor and
integrity was, to put it charitably, subject to considerable doubt.
Under the House bill, the Foreign Intelligence Surveillance Court
(FISC) is indispensable and is accorded a meaningful role in ensuring
compliance with the law. The bill ensures that the FISC is empowered to
act as an Article III court should act, which means the court shall
operate neither as a rubber-stamp nor a bottleneck. Rather, the
function of the court is to validate the lawful exercise of executive
power on the one hand, and to act as the guardian of individual rights
and liberties on the other.
Moreover, Mr. Speaker, it is important to point out that the loudest
demands for blanket immunity did not come from the telecommunications
companies but from the administration, which raises the interesting
question of whether the administration's real motivation is to shield
from public disclosure the ways and means by which government officials
may have ``persuaded'' telecommunications companies to assist in its
warrantless surveillance programs.
My amendment, which was added during the markup last year, made a
constructive contribution to the RESTORE Act by laying down a clear,
objective criterion for the administration to follow and the FISA court
to enforce in preventing reverse targeting.
``Reverse targeting'' is a concept well known to members of the
Judiciary Committee but not so well understood by those less steeped in
the minutiae of electronic surveillance; it is the practice where the
Government targets foreigners without a warrant while its actual
purpose is to collect information on certain U.S. persons.
One of the major concerns that libertarians, as well as progressives
and civil liberties organizations, have with the FISA is that the
temptation of national security agencies to engage in reverse targeting
is often difficult to resist in the absence of strong safeguards to
prevent it.
My amendment, accepted in the House Judiciary mark up, reduced any
temptation to resort to reverse targeting by requiring the
administration to obtain a regular, individualized FISA warrant
whenever the ``real'' target of the surveillance is a person in the
United States.
The amendment achieved this objective by requiring the administration
to obtain a regular FISA warrant whenever a ``significant purpose of an
acquisition is to acquire the communications of a specific person
reasonably believed to be located in the United States.''
The language used in my amendment, ``significant purpose,'' is a term
of art that has long been a staple of FISA jurisprudence and thus is
well known and readily applied by the agencies, legal practitioners,
and the FISA Court. Thus, the Jackson-Lee Amendment provided a clearer,
more objective, criterion for the administration to follow and the FISA
court to enforce to prevent the practice of reverse targeting without a
warrant, which all of us can agree should not be permitted.
Mr. Speaker, nothing in the Act or the amendments to the Act should
require the Government to obtain a FISA order for every overseas target
on the off chance that they might pick up a call into or from the
United States. Rather, what should be required, is a FISA order only
where there is a particular, known person in the United States at the
other end of the foreign target's calls in whom the Government has a
significant interest such that a significant purpose of the
surveillance has become to acquire that person's communications.
The acquisition of communications will happen over time and the
Government will have the time to get an order while continuing its
surveillance. It is the national security interest to require the
Government to obtain an order at that point, so that it can lawfully
acquire all of the target person's communications rather than
continuing to listen to only some of them.
We are living in a time of economic crisis and acts of unfettered
terrorism. Former President Franklin Delano Roosevelt said that ``our
national determination to keep free of foreign wars and foreign
entanglements cannot prevent us from feeling deep concern when ideals
and principles that we have cherished are challenged.''
Like former President Roosevelt, we must secure our Nation from
foreign entanglements but at the same time we must continue to champion
the fundamental freedoms of all Americans regardless of whether the
surveillance occurs in the United States or abroad.
It is very important to me; and it should be very important to
Members of this body that we require what should be required in all
cases--a warrant any time there is surveillance of a United States
citizen.
In short, the Senate amendment to the House amendment makes a good
bill even better. For this reason alone, civil libertarians should
enthusiastically embrace the amended H.R. 3773.
The Bush administration would like the American people to believe
that Democrats do not want to protect America. My Republican colleagues
echo this false claim in both the chambers of Congress by questioning
our patriotism. But I remind them that tyrannical behavior often
questions the motivations of those seeking to protect civil liberties.
[[Page H1713]]
Let us not fall prey to false proclamations of an administration that
takes our Bill of Rights and lays it to the side when they feel like
it. Security must go hand-in-hand with liberty. Oppression of some for
the alleged security of others is not the example this great Nation
should set.
As I wrote in the Politico, ``the best way to win the war on terror
is to remain true to our democratic traditions. If it retains its
democratic character, no nation and no loose confederation of
international villains will defeat the United States in the pursuit of
its vital interests.''
Thus, the way forward to victory in the war on terror is for the
United States to redouble its commitment to the Bill of Rights and the
democratic values which every American will risk his or her life to
defend. It is only by preserving our attachment to these cherished
values that America will remain forever the home of the free, the land
of the brave, and the country we love.
Mr. Speaker, FISA has served the Nation well for nearly 30 years,
placing electronic surveillance inside the United States for foreign
intelligence and counter-intelligence purposes on a sound legal
footing, and I am far from persuaded that it needs to be jettisoned.
I continue to insist upon individual warrants, based on probable
cause, when surveillance is directed at people in the United States.
The Attorney General must still be required to submit procedures for
international surveillance to the Foreign Intelligence Surveillance
Court for approval, but the FISA Court should not be allowed to issue a
basket warrant without making individual determinations about foreign
surveillance.
In all candor, Mr. Speaker, I must restate my firm conviction that
when it comes to the track record of this President's warrantless
surveillance programs, there is still not enough on the public record
about the nature and effectiveness of those programs, or the
trustworthiness of this administration, to indicate that they require a
blank check from Congress.
The Bush administration did not comply with its legal obligation
under the National Security Act of 1947 to keep the Intelligence
Committees ``fully and currently informed'' of U.S. intelligence
activities. Congress cannot continue to rely upon incomplete
information from the Bush administration or upon erroneous revelations
leaked through the media. Instead Congress must conduct a full and
complete inquiry into electronic surveillance in the United States and
related domestic activities of the NSA, both those that occur within
the United States and abroad.
The inquiry must not be limited to the legal questions. It must
include the operational details of each program of intelligence
surveillance within the United States, including:
(1) Who the NSA is targeting;
(2) How it identifies its targets;
(3) The information the program collects and disseminates; and most
important;
(4) Whether the program advances national security interests without
unduly compromising the privacy rights of the American people.
Given the unprecedented amount of information Americans now transmit
electronically and the post-9/11 loosening of regulations governing
information sharing, the risk of intercepting and disseminating the
communications of ordinary Americans is vastly increased, requiring
more precise--not looser--standards, closer oversight, new mechanisms
for minimization, and limits on retention of inadvertently intercepted
communications.
Mr. Speaker, I encourage my colleagues to Join me In a vote of
support for H. Res. 1041, the Rule providing for FISA Amendments Act. I
yield back the balance of my time.
Mr. HASTINGS of Washington. Mr. Speaker, I am pleased to yield 3
minutes to the distinguished Republican Conference chairman, Mr. Putnam
from Florida.
Mr. PUTNAM. I thank my friend for the time.
Mr. Speaker, much of what we debate down here often is theoretical.
We say if this passes, we believe this will happen. If this fails, we
believe that will happen. Much of it is speculative. It is our opinions
coming down here and directing, gazing into the future about what we
think will happen.
Much in this toxic atmosphere that is Washington that we debate is
very partisan. This issue is neither theoretical nor partisan. It is
not theoretical anymore, because this is now the 27th day that we have
denied our intelligence agencies and law enforcement officials the
tools they need to keep America safe.
It is not partisan because the bill that we are asking you to vote
for and support here in a few minutes already passed the Senate with 68
Senators voting for it. It was voted out on a bipartisan basis.
Now, anyone who follows the activities of the Senate knows that they
have a hard time getting 68 votes for a Mother's Day resolution. For
them to find 68 votes on an issue of this magnitude is remarkable.
The only way that we can put back into place the provisions of the
Protect America Act that allow us to prevent future plots and
conspiracies and attacks on our homeland is to pass the Senate bill. If
we do not pass the Senate bill today, Congress will leave for 2 more
weeks, 2 more weeks that we will deny the eyes and ears to our law
enforcement and intelligence officials who keep us safe.
Now, let me just draw attention to the fact that 21 Blue Dog
Democrats have put their names to a letter saying pass the Senate bill;
68 Senators have voted to pass the Senate bill. The bipartisan Senate
Intelligence Committee said, and I quote, ``Electronic communication
service providers acted in good faith on a good faith belief that the
President's program and their assistance was lawful.''
This is not a theoretical debate. This is an important tool that we
must restore to the hands of our intelligence agencies before Congress
goes home for 2 more weeks. This is an example of the tyranny of the
few blocking the will of the many. It is not just Republicans who say
we need to pass this. It is Senator Rockefeller, chairman of the Senate
Intelligence Committee. It is 21 Blue Dog Democrats.
It is 25 States' attorneys general. This is too important to let it
slip through our fingers before we go home for 2 weeks. Pass the
previous question. Deem the Senate bill passed and give those who stand
on alert as the guardians of our freedom and liberty, liberty and
security on a daily basis, what they need to continue to keep us safe.
Don't extend the 27 days of darkness for another 2 weeks. Give them
the tools they need. Pass the previous question. Pass the Senate bill.
Mr. ARCURI. Mr. Speaker, I yield 4\1/2\ minutes to the gentleman from
New York, a member of the Judiciary Committee, Mr. Nadler.
Mr. NADLER. Mr. Speaker, the last few weeks, the last few minutes we
have heard assertions from our colleagues on the other side of the
aisle that are false and designed to mislead and frighten the American
people. They claim that we allowed the Protect America Act to expire,
that we are dark for 27 days.
Ken Wainstein, the Assistant Attorney General of the United States,
and the Bush administration admitted that because of the provisions of
the group warrants in the Protect America Act that had gone on for a
year, didn't change anything. It is still in effect, number one.
Number two, we forget, this House passed a FISA updating
modernization bill in November, on November 14. We called it the
RESTORE Act. We waited for the Senate to pass a bill so we could go to
conference and compromise on it. When did they pass a bill? Not in
November, not in December, not in January. Because of Republican foot-
dragging, they didn't pass the bill until February, mid-February, three
months after we passed the bill here, and two days before we went home
for a week for the Presidents Day recess.
The President came out and said it's up to the House to pass the
Senate bill, no questions asked. But there are a lot of questions about
the Senate bill. Maybe our bill isn't perfect, but their bill is far
from perfect, and our bill is closer to perfect than theirs.
{time} 1100
So then we said, well, if you don't want, because catastrophe will
happen, according to the President and the Republicans if we go home
without passing the Senate bill, we will extend the Protect America Act
for 3 weeks until we can come back and deal with this. Who voted it
down? The Republicans. They said, no, don't extend it. The President
said he would veto an extension.
So let's not hear any remarks on this floor from that side about how
we are dark because the act expired. It expired because they made it
expire. They voted against a 21-day extension that we could have
renewed if necessary until we got this all figured out. So let's not
hear any less-than-honest assertions about we are dark and we are
unprotected and it is the Democrats' fault.
Mr. Speaker, we have a very good bill here. It gives the intelligence
community every single tool they need and
[[Page H1714]]
every tool they say they need. How does it differ from the Senate bill?
In two ways. One, it provides for some closer judicial supervision,
because while we are giving the intelligence community the tools they
need to wiretap on American citizens, on people who are not American
citizens, we have to make sure that our constitutional rights and
liberties are protected so that this country, which we have all
defended, and we all want to defend, remains worthy of being defended
by defending our own liberties.
Remember why we enacted protections in the first place, because the
administration at the time wiretapped Martin Luther King. We don't want
that to happen again by a future administration. And so we must protect
our civil liberties.
We are told that telecom companies, if we don't provide retroactive
immunity, they won't cooperate in the future, we won't get their help.
Number one, that is an aspersion on their patriotism. Number two, they
can be compelled to do so under court order. And number three, they
have always had immunity. They have it now. All they have to do to have
immunity is to have a request from the administration that says: A, we
need your help; B, you are not violating the law if you do what we ask;
and C, you don't need a court order. If they get that request, whether
those assertions are true or not, as long as the administration says we
need your help, what we are asking you to do won't violate the law, and
you don't need a court order, they are absolutely immune. And they have
always had this immunity.
So why do they need retroactive immunity, they say because the
administration won't permit them to go to court and say we were asked
for help, we gave that help. We have this request and we got the legal
assurances because the administration won't let that go to court
because it says it will violate State secrets.
So what does our bill do? It says you can go to court under secret
procedures to protect the security of the State secrets, but you can
assert your defense in court and get the case thrown out if you at
least got the assurance by the administration in advance, which is all
the law required. If you didn't get that, then you have no respect for
the privacy rights of Americans and you don't deserve immunity. Even if
we gave retroactive immunity for the future to the telecom company that
helped us next week, they still have the same requirements for
immunity. And if they wanted to go to court to assert them if someone
sued them, they would still have to go to court and say the same thing.
So you are dealing with a one-time fix.
Retroactive immunity takes it out of the courts and says Congress
shall say to American citizens you're wrong, you can't protect your
constitutional rights in court, you're right. That is a duty for the
courts, not for Congress. That is the basis of the protections of all
of our rights. The Senate bill goes the wrong way. We protect the
telecom companies and protect our liberties. It is the right way to go.
I urge adoption of this rule.
Mr. HASTINGS of Washington. Mr. Speaker, I am pleased to yield 1
minute to the gentleman from Ohio (Mr. Boehner), the distinguished
Republican leader.
Mr. BOEHNER. Let me thank my colleague from Washington for yielding.
My colleagues, several years ago when the current Speaker, Speaker
Pelosi, had my job as the minority leader, she said that bills should
generally come to the floor under a fair and open process with
amendments allowed and substitutes allowed.
And yet here we are today once again violating the very words that
she said how the minority should be treated by bringing a bill to the
floor, a Senate bill with amendments crafted by the House with no
opportunity for amendments, no opportunity for substitutes. And no
opportunity to vote straight up or down on the bipartisan bill that
came over from the Senate.
I think that what we have seen here is just a pattern of we are for
this, we create rules that allow the minority the opportunity to be
fairly heard, and yet they are routinely violated.
And so the only way we can have a straight up-or-down vote on the
Senate bill that passed the Senate 68-29, the only way we can have a
vote on that is to defeat the previous question. Why do we want to deny
the Members of the House to vote on the bipartisan Senate bill? I can
probably tell you, that's because it would pass. A majority of the
Members of the House of Representatives are in favor of the Senate
bill. But House leaders are standing in the way of the opportunity for
House Members to actually vote on that bill.
We can get into the merits of the changes that were made to the
Senate bill that are being debated here. I think they handcuff our
intelligence officials. I think that they open up a wide avenue for
trial lawyers to hold communication companies at bay and threaten their
very willingness to help us in this very serious business of tracking
down those who would want to do Americans harm.
And so I would ask my colleagues to defeat the previous question.
Let's have a chance to vote on the bipartisan Senate bill and let's
allow the House to work its will.
Mr. ARCURI. Mr. Speaker, I yield 3 minutes to the gentleman from
Texas, the distinguished chairman of the Intelligence Committee, Mr.
Reyes.
Mr. REYES. Mr. Speaker, I thank the gentleman for yielding.
I'm not a lawyer, but I am told by lawyers that every lawyer learns
to argue the following way: When the law is against you, they are
taught to argue the facts. When the facts are against you, they are
taught to argue the law. To a certain extent, that is what is going on
here today.
We just heard from the distinguished minority leader that he wants
the House to go in neutral, put our engine in neutral and just vote on
what the Senate has sent over. In other words, we want to rush to
rubber-stamp what the administration wants. That's not going to happen.
We also heard this morning that somehow my good friend from
Washington State says they haven't had enough time to debate these
issues, the FISA issue. I would remind my good friend that we had
invited our colleagues on the Republican side to work with us, to go
through a process, the process of setting up our ability to go to
conference, and they refused. They refused to participate. So it is not
a failure of getting enough time to participate in the debate; it is a
failure of wanting to participate because the rationale is let's
rubber-stamp what the administration wants, which is the Senate
version.
We also heard that somehow we are losing information. Somehow we are
at a disadvantage because the Protect America Act expired. Nothing
could be further from the truth. I would remind all of the Members that
were here last night that I held up two documents, and one of those
documents authored by the DNI and the Attorney General gave you the
information that refutes that argument.
We have done everything that the DNI has asked us to do in this bill.
He wants us to give the intelligence community the ability to monitor
foreign to foreign. This bill does that.
He wants us to give the telecom companies the opportunity to state
their case in order to get immunity. This bill does that.
The third thing he wanted was to make sure that any time that there
is an American involved or an American address or phone involved, that
a warrant be secured. This bill requires that.
This bill puts the FISA Court back in the process. That's the
American way.
I will close by saying that I come from a State that reveres the
second amendment, our right to bear arms. But I would submit to all of
you, my colleagues here, that that amendment would be irrelevant if we
were to give the administration exactly what they want, and that is the
ability to monitor anyone, any time, for any reason, because a weapon
or a gun is not going to do you any good if the government knows your
every move.
The Senate version is their answer to give the administration exactly
what they want. We took a different approach. Instead of being in
neutral, we are telling the administration and, with all due respect,
we are telling the Senate, let's reconcile our differences. We have
given the DNI every single thing that he wants. And simply stated
today, that dog is not hunting that would create an atmosphere of fear
for America.
[[Page H1715]]
Mr. HASTINGS of Washington. Mr. Speaker, I yield myself 15 seconds
before I yield to the gentleman from Pennsylvania.
The gentleman from Texas just said that he wanted to reconcile the
differences between the House position and the Senate; yet there has
never been a motion or an attempt by the House to go to conference on
these two bills. If you truly want to have a compromise, why don't you
go to conference? That hasn't happened.
Mr. Speaker, I yield 2 minutes to the gentleman from Pennsylvania
(Mr. Dent).
Mr. DENT. Mr. Speaker, I rise to urge that we defeat the previous
question so we can adopt the Protect America Act.
People in this country think that Washington, D.C., is broken, and
they are absolutely right. It is. And this issue is proof positive of
why Washington, D.C., is broken. Yes, we do have an agreement. It is a
bipartisan agreement, 68 votes in the Senate. There is a majority here,
but the majority leadership won't allow us to consider this very
important and necessary legislation.
Senator Rockefeller, the Democratic chairman of the Intelligence
Committee in the Senate, has said our intelligence capacities are being
degraded because we have failed to pass the Protect America Act.
You know, it is time that we put the national interest ahead of the
special interests. Why are we protecting the most litigious among us in
our society at the expense of our troops serving overseas? We know the
issues. It is retroactive immunity. The telecommunications companies
were attempting to help us in good faith, and no good deed goes
unpunished. That is what it happening here. It is time to get the job
done.
I'm going to refer to an article I read in the Wall Street Journal
back in January, 2006, by Debra Burlingame, the sister of the pilot who
crashed into the Pentagon. The title is, ``Al Qaeda, not the FBI, is
the greater threat to America.'' I think we should heed her advice and
recall, because of that wall that existed before 9/11 between the
intelligence agency and our domestic law enforcement, it prevented us
from being more effective.
Today, we are placing barriers between our government and those who
want to help us in the telecommunications sector, but they are going to
be forced to comply with this. They will not be able to do so
voluntarily. We know what the issue is. The Fraternal Order of Police,
many State attorneys general, the VFW, all agree we should pass the
bipartisan. We have it within our means to do it. I don't understand
why not. It is important for the majority leadership to explain to this
House why they won't let this bipartisan agreement be adopted.
The American people are watching. They want us to get the job done.
They have had enough.
Mr. Speaker, I include the Burlingame article for the Record.
[From the Wall Street Journal, Jan. 30, 2006]
Our Right to Security
al qaeda, not the fbi, is the greater threat to america
(By Debra Burlingame)
One of the most excruciating images of the September 11
attacks is the sight of a man who was trapped in one of the
World Trade Center towers. Stripped of his suit jacket and
tie and hanging on to what appears to be his office curtains,
he is seen trying to lower himself outside a window to the
floor immediately below. Frantically kicking his legs in an
effort to find a purchase, he loses his grip, and falls.
That horrific scene and thousands more were the images that
awakened a sleeping nation on that long, brutal morning.
Instead of overwhelming fear or paralyzing self-doubt, the
attacks were met with defiance, unity and a sense of moral
purpose. Following the heroic example of ordinary citizens
who put their fellow human beings and the public good ahead
of themselves, the country's leaders cast aside politics and
personal ambition and enacted the USA Patriot Act just 45
days later.
A mere four-and-a-half years after victims were forced to
choose between being burned alive and jumping from 90
stories, it is frankly shocking that there is anyone in
Washington who would politicize the Patriot Act. It is an
insult to those who died to tell the American people that the
organization posing the greatest threat to their liberty is
not al Qaeda but the FBI. Hearing any member of Congress
actually crow about ``killing'' or ``playing chicken'' with
this critical legislation is as disturbing today as it would
have been when Ground Zero was still smoldering. Today we
know in far greater detail what not having it cost us.
Critics contend that the Patriot Act was rushed into law in
a moment of panic. The truth is, the policies and guidelines
it corrected had a long, troubled history and everybody who
had to deal with them knew it. The ``wall'' was a tortuous
set of rules promulgated by Justice Department lawyers in
1995 and imagined into law by the Foreign Intelligence
Surveillance Act (FISA) court.
Conceived as an added protection for civil liberties
provisions already built into the statute, it was the wall
and its real-world ramifications that hardened the failure-
to-share culture between agencies, allowing early information
about 9/11 hijackers Khalid al-Mihdhar and Nawaf al-Hazmi to
fall through the cracks. More perversely, even after the
significance of these terrorists and their presence in the
country was known by the FBI's intelligence division, the
wall prevented it from talking to its own criminal division
in order to hunt them down.
Furthermore, it was the impenetrable FISA guidelines and
fear of provoking the FISA court's wrath if they were
transgressed that discouraged risk-averse FBI supervisors
from applying for a FISA search warrant in the Zacarias
Moussaoui case. The search, finally conducted on the
afternoon of 9/11, produced names and phone numbers of people
in the thick of the 9/11 plot, so many fertile clues that
investigators believe that at least one airplane, if not
all four, could have been saved.
In 2002, FISA's appellate level Court of Review examined
the entire statutory scheme for issuing warrants in national
security investigations and declared the ``wall'' a
nonsensical piece of legal overkill, based neither on express
statutory language nor reasonable interpretation of the FISA
statute. The lower court's attempt to micromanage the
execution of national security warrants was deemed an
assertion of authority which neither Congress or the
Constitution granted it. In other words, those lawyers and
judges who created, implemented and so assiduously enforced
the FISA guidelines were wrong and the American people paid
dearly for it.
Despite this history, some members of Congress contend that
this process-heavy court is agile enough to rule on quickly
needed National Security Agency (NSA) electronic surveillance
warrants. This is a dubious claim. Getting a FISA warrant
requires a multistep review involving several lawyers at
different offices within the Department of Justice. It can
take days, weeks, even months if there is a legal dispute
between the principals. ``Emergency'' 72-hour intercepts
require sign-offs by NSA lawyers and pre-approval by the
attorney general before surveillance can be initiated.
Clearly, this is not conducive to what Gen. Michael Hayden,
principal deputy director of national intelligence, calls
``hot pursuit'' of al Qaeda conversations.
The Senate will soon convene hearings on renewal of the
Patriot Act and the NSA terrorist surveillance program. A
minority of senators want to gamble with American lives and
``fix'' national security laws, which they can't show are
broken. They seek to eliminate or weaken anti-terrorism
measures which take into account that the Cold War and its
slow-moving, analog world of landlines and stationary targets
is gone. The threat we face today is a completely new
paradigm of global terrorist networks operating in a high-
velocity digital age using the Web and fiber-optic
technology. After four-and-a-half years without another
terrorist attack, these senators think we're safe enough to
cave in to the same civil liberties lobby that supported that
deadly FISA wall in the first place. What if they, like those
lawyers and judges, are simply wrong?
Meanwhile, the media, mouthing phrases like ``Article II
authority,'' ``separation of powers'' and ``right to
privacy,'' are presenting the issues as if politics have
nothing to do with what is driving the subject matter and its
coverage. They want us to forget four years of relentless
``connect-the-dots'' reporting about the missed chances that
``could have prevented 9/11.'' They have discounted the
relevance of references to the two 9/11 hijackers who lived
in San Diego. But not too long ago, the media itself reported
that phone records revealed that five or six of the hijackers
made extensive calls overseas.
NBC News aired an ``exclusive'' story in 2004 that
dramatically recounted how al-Hazmi and al-Mihdhar, the San
Diego terrorists who would later hijack American Airlines
flight 77 and fly it into the Pentagon, received more than a
dozen calls from an al Qaeda ``switchboard'' inside Yemen
where al-Mihdhar's brother-in-law lived. The house received
calls from Osama Bin Laden and relayed them to operatives
around the world. Senior correspondent Lisa Myers told the
shocking story of how, ``The NSA had the actual phone number
in the United States that the switchboard was calling, but
didn't deploy that equipment, fearing it would be accused of
domestic spying.'' Back then, the NBC script didn't describe
it as ``spying on Americans.'' Instead, it was called one of
the ``missed opportunities that could have saved 3,000
lives.''
Another example of opportunistic coverage concerns the
Patriot Act's ``library provision.'' News reports have given
plenty of ink and airtime to the ACLU's unsupported claims
that the government has abused this important records
provision. But how many Americans know that several of the
hijackers repeatedly accessed computers at public
[[Page H1716]]
libraries in New Jersey and Florida, using personal Internet
accounts to carry out the conspiracy? Al-Mihdhar and al-Hazmi
logged on four times at a college library in New Jersey
where they purchased airline tickets for AA 77 and later
confirmed their reservations on Aug. 30. In light of this,
it is ridiculous to suggest that the Justice Department
has the time, resources or interest in ``investigating the
reading habits of law abiding citizens.''
We now have the ability to put remote control cameras on
the surface of Mars. Why should we allow enemies to
annihilate us simply because we lack the clarity or resolve
to strike a reasonable balance between a healthy skepticism
of government power and the need to take proactive measures
to protect ourselves from such threats? The mantra of civil-
liberties hard-liners is to ``question authority''--even when
it is coming to our rescue--then blame that same authority
when, hamstrung by civil liberties laws, it fails to save us.
The old laws that would prevent FBI agents from stopping the
next al-Mihdhar and al-Hazmi were built on the bedrock of a
35-year history of dark, defeating mistrust. More Americans
should not die because the peace-at-any-cost fringe and
antigovernment paranoids still fighting the ghost of Nixon
hate George Bush more than they fear al Qaeda. Ask the
American people what they want. They will say that they want
the commander in chief to use all reasonable means to catch
the people who are trying to rain terror on our cities. Those
who cite the soaring principle of individual liberty do not
appear to appreciate that our enemies are not seeking to
destroy individuals, but whole populations.
Three weeks before 9/11, an FBI agent with the bin Laden
case squad in New York learned that al-Mihdhar and al-Hazmi
were in this country. He pleaded with the national security
gatekeepers in Washington to launch a nationwide manhunt and
was summarily told to stand down. When the FISA Court of
Review tore down the wall in 2002, it included in its ruling
the agent's Aug. 29, 2001, email to FBI headquarters:
``Whatever has happened to this--someday someone will die--
and wall or not--the public will not understand why we were
not more effective and throwing every resource we had at
certain problems. Let's hope the National Security Law Unit
will stand behind their decisions then, especially since the
biggest threat to us now, [bin Laden], is getting the most
`protection.' ''
The public has listened to years of stinging revelations
detailing how the government tied its own--hands in stopping
the devastating attacks of September 11. It is an
irresponsible violation of the public trust for members of
Congress to weaken the Patriot Act or jeopardize the NSA
terrorist surveillance program because of the same illusory
theories that cost us so dearly before, or worse, for rank
partisan advantage. If they do, and our country sustains yet
another catastrophic attack that these antiterrorism tools
could have prevented, the phrase ``connect the dots'' will
resonate again--but this time it will refer to the trail of
innocent American blood which leads directly to the Senate
floor.
Mr. ARCURI. Mr. Speaker, I would again just like to point out that
what this bill does is unshackle the telecommunications companies
because what we do want to do in this particular case is ensure that
they are able to defend themselves if they have cooperated with the
government and followed the law, and that is exactly what this bill
does.
Mr. Speaker, I yield 1\1/2\ minutes to the gentlewoman from Kansas
(Mrs. Boyda).
Mrs. BOYDA of Kansas. Mr. Speaker, I just had to come down to the
floor and speak on this. No one, there isn't anybody who disagrees that
we ought to be wiretapping the terrorists. No one disagrees with that.
Democrats, Republicans, everyone wants to keep this country safe.
{time} 1115
Let's make something real clear about what's at stake here. What's at
stake is whether we wiretap Americans. That's what we're talking about.
The bill that we proposed that we have here, it can be summarized in
one thing: wiretap first, get permission later. Go out and be
aggressive. As a matter of fact, you can spy on Americans. You can do
anything. You can spy, you can go out there and keep our country safe.
But when it comes to spying on Americans, that's the difference here.
We believe that you need a warrant to do that, even after the fact of 6
or 7 days later to go back and tell the court what you've done.
I, for one, do not, and am not able to stand here and say, as the
other side says, that the terrorists have already won; we need to give
up our basic constitutional right. I don't believe that the terrorists
have won, and I find it extremely discouraging.
What I find so troubling is the same, same rhetoric that we heard for
this march to Iraq and, quite honestly, lately this march to Iran. Its
the same rhetoric that we're hearing now. It's ``trust me.''
Well, I'll tell you what. I didn't get sent to Washington, DC not to
speak up. A lot of people are worried sick that a 30-second ad is going
to kick them out of office. And I'll tell you what, I will not put my
own re-election ahead of the absolute determination that I have to make
sure, first and foremost, that my family and your family are safe, but
that we do not shred that Constitution to do it. This is not an either/
or, and we need to find a balance. I do not believe the terrorists have
won.
Mr. HASTINGS of Washington. Mr. Speaker, I reserve my time.
Mr. ARCURI. Mr. Speaker, I yield 1\1/2\ minutes to the gentlewoman
from California (Ms. Zoe Lofgren), a member of the Judiciary Committee.
Ms. ZOE LOFGREN of California. Mr. Speaker, I rise to urge support of
the rule so we can adopt H.R. 3773.
There's been a lot of very misleading and confusing rhetoric about
the issue of immunity. The truth is the phone companies have immunity
already under current law. It's 18 U.S. Code, section 2511. And let me
just read part of it: ``Notwithstanding any other law, providers of
communications services are authorized to provide information in two
cases: if there's a court order, or if they receive a certification in
writing by a person specified in the title or the Attorney General of
the United States that says either no warrant or court order is
required, all the statutory requirements have been met and the
assistance is required.''
The statute says no cause of action shall lie in any court against
any provider of wire or electronic communications if they have received
this certification.
I submit the entire text of section 2511 for the Record.
[From Westlaw, 18 U.S.C.A. Sec. 2511, Effective: Nov. 25, 2002]
United States Code Annotated Currentness
Title 18. Crimes and Criminal Procedure (Refs & Annos)
Part I. Crimes (Refs & Annos)
Chapter 119. Wire and Electronic Communications Interception
and Interception of Oral Communications (Refs & Annos)
Sec. 2511. Interception and disclosure of wire, oral, or
electronic communications prohibited
(1) Except as otherwise specifically provided in this
chapter any person who--
(a) intentionally intercepts, endeavors to intercept, or
procures any other person to intercept or endeavor to
intercept, any wire, oral, or electronic communication;
(b) intentionally uses, endeavors to use, or procures any
other person to use or endeavor to use any electronic,
mechanical, or other device to intercept any oral
communication when--
(i) such device is affixed to, or otherwise transmits a
signal through, a wire, cable, or other like connection used
in wire communication; or
(ii) such device transmits communications by radio, or
interferes with the transmission of such communication; or
(iii) such person knows, or has reason to know, that such
device or any component thereof has been sent through the
mail or transported in interstate or foreign commerce; or
(iv) such use or endeavor to use (A) takes place on the
premises of any business or other commercial establishment
the operations of which affect interstate or foreign
commerce; or (B) obtains or is for the purpose of obtaining
information relating to the operations of any business or
other commercial establishment the operations of which affect
interstate or foreign commerce; or
(v) such person acts in the District of Columbia, the
Commonwealth of Puerto Rico, or any territory or possession
of the United States;
(c) intentionally discloses, or endeavors to disclose, to
any other person the contents of any wire, oral, or
electronic communication, knowing or having reason to know
that the information was obtained through the interception of
a wire, oral, or electronic communication in violation of
this subsection;
(d) intentionally uses, or endeavors to use, the contents
of any wire, oral, or electronic communication, knowing or
having reason to know that the information was obtained
through the interception of a wire, oral, or electronic
communication in violation of this subsection; or
(e) (i) intentionally discloses, or endeavors to disclose,
to any other person the contents of any wire, oral, or
electronic communication, intercepted by means authorized by
sections 2511(2)(a)(ii), 2511(2)(b)-(c), 2511(2)(e), 2516,
and 2518 of this chapter, (ii) knowing or having reason to
know that the information was obtained through the
interception of such a communication in connection with a
criminal investigation, (iii) having obtained
[[Page H1717]]
or received the information in connection with a criminal
investigation, and (iv) with intent to or improperly
obstruct, impede, or interfere with a duly authorized
criminal investigation,
shall be punished as provided in subsection (4) or shall be
subject to suit as provided in subsection (5).
(2)(a)(i) It shall not be unlawful under this chapter for
an operator of a switchboard, or an officer, employee, or
agent of a provider of wire or electronic communication
service, whose facilities are used in the transmission of a
wire or electronic communication, to intercept, disclose, or
use that communication in the normal course of his employment
while engaged in any activity which is a necessary incident
to the rendition of his service or to the protection of the
rights or property of the provider of that service, except
that a provider of wire communication service to the public
shall not utilize service observing or random monitoring
except for mechanical or service quality control checks.
(ii) Notwithstanding any other law, providers of wire or
electronic communication service, their officers, employees,
and agents, landlords, custodians, or other persons, are
authorized to provide information, facilities, or technical
assistance to persons authorized by law to intercept wire,
oral, or electronic communications or to conduct electronic
surveillance, as defined in section 101 of the Foreign
Intelligence Surveillance Act of 1978, if such provider, its
officers, employees, or agents, landlord, custodian, or other
specified person, has been provided with--
(A) a court order directing such assistance signed by the
authorizing judge, or
(B) a certification in writing by a person specified in
section 2518(7) of this title or the Attorney General of the
United States that no warrant or court order is required by
law, that all statutory requirements have been met, and that
the specified assistance is required.
setting forth the period of time during which the provision
of the information, facilities, or technical assistance is
authorized and specifying the information, facilities, or
technical assistance required. No provider of wire or
electronic communication service, officer, employee, or agent
thereof, or landlord, custodian, or other specified person
shall disclose the existence of any interception or
surveillance or the device used to accomplish the
interception or surveillance with respect to which the person
has been furnished a court order or certification under this
chapter, except as may otherwise be required by legal process
and then only after prior notification to the Attorney
General or to the principal prosecuting attorney of a State
or any political subdivision of a State, as may be
appropriate. Any such disclosure, shall render such person
liable for the civil damages provided for in section 2520. No
cause of action shall lie in any court against any provider
of wire or electronic communication service, its officer,
employees, or agents, landlord, custodian, or other specified
person for providing information, facilities, or assistance
in accordance with the terms of a court order, statutory
authorization, or certification under this chapter.
(b) It shall not be unlawful under this chapter for an
officer, employee, or agent of the Federal Communications
Commission, in the normal course of his employment and in
discharge of the monitoring responsibilities exercised by the
Commission in the enforcement of chapter 5 of title 47 of the
United States Code, to intercept a wire or electronic
communication, or oral communication transmitted by radio, or
to disclose or use the information thereby obtained.
(c) It shall not be unlawful under this chapter for a
person acting under color of law to intercept a wire, oral,
or electronic communication, where such person is a party to
the communication or one of the parties to the communication
has given prior consent to such interception.
(d) It shall not be unlawful under this chapter for a
person not acting under color of law to intercept a wire,
oral, or electronic communication where such person is a
party to the communication or where one of the parties to the
communication has given prior consent to such interception
unless such communication is intercepted for the purpose of
committing any criminal or tortious act in violation of the
Constitution or laws of the United States or of any State.
(e) Notwithstanding any other provision of this title or
section 705 or 706 of the Communications Act of 1934, it
shall not be unlawful for an officer, employee, or agent of
the United States in the normal course of his official duty
to conduct electronic surveillance, as defined in section 101
of the Foreign Intelligence Surveillance Act of 1978, as
authorized by that Act.
(f) Nothing contained in this chapter or chapter 121 or
206 of this title, or section 705 of the Communications Act
of 1934, shall be deemed to affect the acquisition by the
United States Government of foreign intelligence information
from international or foreign communications, or foreign
intelligence activities conducted in accordance with
otherwise applicable Federal law involving a foreign
electronic communications system, utilizing a means other
than electronic surveillance as defined in section 101 of the
Foreign Intelligence Surveillance Act of 1978, and procedures
in this chapter or chapter 121 and the Foreign Intelligence
Surveillance Act of 1978 shall be the exclusive means by
which electronic surveillance, as defined in section 101 of
such Act, and the interception of domestic wire, oral, and
electronic communications may be conducted.
(g) It shall not be unlawful under this chapter or chapter
121 of this title for any person--
(i) to intercept or access an electronic communication
made through an electronic communication system that is
configured so that such electronic communication is readily
accessible to the general public;
(ii) to intercept any radio communication which is
transmitted--
(I) by any station for the use of the general public, or
that relates to ships, aircraft, vehicles, or persons in
distress;
(II) by any governmental, law enforcement, civil defense,
private land mobile, or public safety communications system,
including police and fire, readily accessible to the general
public;
(III) by a station operating on an authorized frequency
within the bands allocated to the amateur, citizens band, or
general mobile radio services; or
(IV) by any marine or aeronautical communications system;
(iii) to engage in any conduct which--
(I) is prohibited by section 633 of the Communications Act
of 1934; or
(II) is excepted from the application of section 705(a) of
the Communications Act of 1934 by section 705(b) of that Act;
(iv) to intercept any wire or electronic communication the
transmission of which is causing harmful interference to any
lawfully operating station or consumer electronic equipment,
to the extent necessary to identify the source of such
interference; or
(v) for other users of the same frequency to intercept any
radio communication made through a system that utilizes
frequencies monitored by individuals engaged in the provision
or the use of such system, if such communication is not
scrambled or encrypted.
(h) It shall not be unlawful under this chapter--
(i) to use a pen register or a trap and trace device (as
those terms are defined for the purposes of chapter 206
(relating to pen registers and trap and trace devices) of
this title); or
(ii) for a provider of electronic communication service to
record the fact that a wire or electronic communication was
initiated or completed in order to protect such provider,
another provider furnishing service toward the completion of
the wire or electronic communication, or a user of that
service, from fraudulent, unlawful or abusive use of such
service.
(i) It shall not be unlawful under this chapter for a
person acting under color of law to intercept the wire or
electronic communications of a computer trespasser
transmitted to, through, or from the protected computer, if--
(I) the owner or operator of the protected computer
authorizes the interception of the computer trespasser's
communications on the protected computer;
(II) the person acting under color of law is lawfully
engaged in an investigation;
(III) the person acting under color of law has reasonable
grounds to believe that the contents of the computer
trespasser's communications will be relevant to the
investigation; and
(IV) such interception does not acquire communications
other than those transmitted to or from the computer
trespasser.
(3)(a) Except as provided in paragraph (b) of this
subsection, a person or entity providing an electronic
communication service to the public shall not intentionally
divulge the contents of any communication (other than one to
such person or entity, or an agent thereof) while in
transmission on that service to any person or entity other
than an addressee or intended recipient of such communication
or an agent of such addressee or intended recipient.
(b) A person or entity providing electronic communication
service to the public may divulge the contents of any such
communication--
(i) as otherwise authorized in section 2511(2)(a) or 2517
of this title;
(ii) with the lawful consent of the originator or any
addressee or intended recipient of such communication;
(iii) to a person employed or authorized, or whose
facilities are used, to forward such communication to its
destination; or
(iv) which were inadvertently obtained by the service
provider and which appear to pertain to the commission of a
crime, if such divulgence is made to a law enforcement
agency.
(4)( a) Except as provided in paragraph (b) of this
subsection or in subsection (5), whoever violates subsection
(1) of this section shall be fined under this title or
imprisoned not more than five years, or both.
(b) Conduct otherwise an offense under this subsection that
consists of or relates to the interception of a satellite
transmission that is not encrypted or scrambled and that is
transmitted--
(i) to a broadcasting station for purposes of
retransmission to the general public; or
(ii) as an audio subcarrier intended for redistribution to
facilities open to the public, but not including data
transmissions or telephone calls,
is not an offense under this subsection unless the conduct is
for the purposes of direct or indirect commercial advantage
or private financial gain.
[(c) Redesignated (b)]
(5)(a)(i) If the communication is--
(A) a private satellite video communication that is not
scrambled or encrypted and
[[Page H1718]]
the conduct in violation of this chapter is the private
viewing of that communication and is not for a tortious or
illegal purpose or for purposes of direct or indirect
commercial advantage or private commercial gain; or
(B) a radio communication that is transmitted on
frequencies allocated under subpart D of part 74 of the rules
of the Federal Communications Commission that is not
scrambled or encrypted and the conduct in violation of this
chapter is not for a tortious or illegal purpose or for
purposes of direct or indirect commercial advantage or
private commercial gain,
then the person who engages in such conduct shall be subject
to suit by the Federal Government in a court of competent
jurisdiction.
(ii) In an action under this subsection--
(A) if the violation of this chapter is a first offense for
the person under paragraph (a) of subsection (4) and such
person has not been found liable in a civil action under
section 2520 of this title, the Federal Government shall be
entitled to appropriate injunctive relief; and
(B) if the violation of this chapter is a second or
subsequent offense under paragraph (a) of subsection (4) or
such person has been found liable in any prior civil action
under section 2520, the person shall be subject to a
mandatory $500 civil fine.
(b) The court may use any means within its authority to
enforce an injunction issued under paragraph (ii)(A), and
shall impose a civil fine of not less than $500 for each
violation of such an injunction.
credit(s)
(Added Pub. L. 90-351, Title III, Sec. 802, June 19, 1968,
82 Stat. 213, and amended Pub. L. 91-358, Title II,
Sec. 211(a), July 29, 1970, 84 Stat. 654; Pub. L. 95-511,
Title II, Sec. 201(a) to (c), Oct. 25, 1978, 92 Stat. 1796,
1797; Pub. L. 98-549, Sec. 6(b)(2), Oct. 30, 1984, 98 Stat.
2804; Pub. L. 99-508, Title I, Sec. 101(b), (c)(l), (5), (6),
(d), (t), 102, Oct. 21, 1986, 100 Stat. 1849 to 1853; Pub. L.
103-322, Title XXXII, Sec. 320901, Title XXXIII,
Sec. 330016(1)(f)(G), Sept. 13, 1994, 108 Stat. 2123, 2147;
Pub. L. 103-414, Title II, Sec. 202(b), 204, 205, Oct. 25,
1994, 108 Stat. 4290, 4291; Pub. L. 104-294, Title VI,
Sec. 604(b)(42), Oct. 11, 1996, 110 Stat. 3509; Pub. L. 107-
56, Title II, Sec. Sec. 204, 217(2), Oct. 26, 2001, 115 Stat.
281, 291; Pub. L. 107-296, Title II, Sec. 225(h)(2), Nov. 25,
2002, 116 Stat. 2158.)
Current through P.L. 110-195 (excluding P.L. 110-181)
approved 3-12-08
Simply put, the phone companies have immunity. The only issue is, do
they get their day in court to tell a judge that they have immunity?
This bill allows for that.
I think the phone companies, like any other party, have a right to
assert their defenses and be heard by a judge and have their case be
heard. This bill provides for that.
Now, why wouldn't the Bush administration be supportive?
I think the administration is more concerned about their liability
than the phone companies.
Mr. HASTINGS of Washington. Mr. Speaker, I continue to reserve my
time.
Mr. ARCURI. Mr. Speaker, I am prepared to close. We have no further
speakers on our side.
Mr. HASTINGS of Washington. Mr. Speaker, how much time do I have?
The SPEAKER pro tempore. The gentleman from Washington has 8\1/4\
minutes.
Mr. HASTINGS of Washington. Mr. Speaker, I yield myself the balance
of the time.
Mr. Speaker, earlier in this debate I put into the Record the January
28 letter from the 21 Blue Dog Democrats to Speaker Pelosi in support
of the bipartisan Senate bill. And I'd like to quote from that letter,
Mr. Speaker:
``Following the Senate's passage of a FISA bill, it will be necessary
for the House to quickly consider FISA legislation to get a bill to the
President before the Protect America Act expires in February.''
Mr. Speaker, the Protect America Act has expired, as has the entire
month of February. But House Democrat leaders have not acted, as these
21 Blue Dog Democrats have asked, on our national security needs.
I will quote again from the Blue Dog Democrat letter: ``We have it
within our ability to replace the expiring Protect America Act by
passing strong bipartisan FISA modernization legislation that can be
signed into law, and we should do so. The consequences of not passing
such a measure would place our national security at undue risk.''
I regret to say, Mr. Speaker, that for 27 days, our country's
national security has been put at undue risk because FISA legislation
has not been passed because the Democrat leaders are blocking the House
from voting, from even voting on the Senate proposal that passed the
Senate by a 68-29 vote.
So let me be very clear about what I'm talking about when I'm going
to ask my colleagues to vote ``no'' on the previous question, and why
that will be an attempt, or will be a means, by which we can address
the Senate bill for the first time in this body, because this, what I'm
going to do, is not an ordinary motion.
By voting ``no,'' Mr. Speaker, on the previous question, I will seek
to amend one specific clause of the rule, H. Res. 1041, so that the
House will still be permitted to debate the FISA bill that this
underlying rule makes in order; but if that bill, and if that proposal
does not pass this body, then the House, under the provision that I'm
seeking to amend the rule, will agree to the Senate bill; and,
therefore, the bill would be sent to the President to become law.
Mr. Speaker, I ask unanimous consent to have the text of the
amendment and extraneous material inserted into the Record prior to the
vote on the previous question.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Washington?
There was no objection.
Mr. HASTINGS of Washington. Now let me just review where we are on
this, just to put this into a time frame. The Protect America Act was
first put into place last August, set to expire in February so they
could work out the differences.
Now, the Senate had their proposal, as I mentioned, and as has been
mentioned by our leader, passed by a big margin, 68-29.
The House has their version. There's nothing unusual with both Houses
in a bicameral legislative body having two versions of the same issue.
And the way you generally resolve that is to go to conference and work
out the difference.
We have not had the opportunity, in this body, to go to conference
with the Senate on this bill. Further, we have been denied time and
time again to have an opportunity to even vote on the Senate
amendments. By defeating the previous question, we will have that
opportunity.
So I urge my colleagues to vote to defeat the previous question so we
can amend the rule to have an opportunity to vote and address the
Senate bill that passed overwhelmingly.
Mr. Speaker, I yield back the balance of my time.
Mr. ARCURI. Mr. Speaker, as I said earlier, we must bring the
misinformation campaign and partisan wrangling to an end.
There is no question that there are groups and individuals out there
who would seek to do America harm. There is no question that my
colleagues and I want to give the people who protect us from the danger
every tool they need to fight terrorism.
The proposal we will vote on today will, in fact, provide our
Nation's Intelligence Community with the resources to prevent future
acts of terrorism, while protecting the freedoms of our citizens under
the Constitution.
I strongly urge a ``yes'' vote on the previous question and on the
rule.
The material previously referred to by Mr. Hastings of Washington is
as follows:
Amendment to H. Res. 1041 Offered by Mr. Hastings of Washington
Strike section 2 and insert in lieu thereof the following:
``Sec. 2. Upon rejection of the motion to concur specified
in section 1, a motion that the House concur in the Senate
amendmemt to H.R. 3773 is hereby adopted.''.
(The information contained herein was provided by
Democratic Minority on multiple occasions throughout the
l09th Congress.)
The Vote on the Previous Question: What It Really Means
This vote, the vote on whether to order the previous
question on a special rule, is not merely a procedural vote.
A vote against ordering the previous question is a vote
against the Democratic majority agenda and a vote to allow
the opposition, at least for the moment, to offer an
alternative plan. It is a vote about what the House should be
debating.
Mr. Clarence Cannon's Precedents of the House of
Representatives, (VI, 308-311) describes the vote on the
previous question on the rule as ``a motion to direct or
control the consideration of the subject before the House
being made by the Member in charge.'' To defeat the previous
question is to give the opposition a chance to decide the
subject before the House. Cannon cites the Speaker's ruling
of January 13, 1920, to the effect that ``the refusal of the
House to sustain the demand for the previous question passes
the control of the resolution to the opposition'' in order to
offer an amendment. On March 15, 1909, a member of the
majority party offered a rule resolution. The House defeated
[[Page H1719]]
the previous question and a member of the opposition rose to
a parliamentary inquiry, asking who was entitled to
recognition. Speaker Joseph G. Cannon (R-Illinois) said:
``The previous question having been refused, the gentleman
from New York, Mr. Fitzgerald, who had asked the gentleman to
yield to him for an amendment, is entitled to the first
recognition.''
Because the vote today may look bad for the Democratic
majority they will say ``the vote on the previous question is
simply a vote on whether to proceed to an immediate vote on
adopting the resolution . . . . . [and] has no substantive
legislative or policy implications whatsoever.'' But that is
not what they have always said. Listen to the definition of
the previous question used in the Floor Procedures Manual
published by the Rules Committee in the 109th Congress, (page
56). Here's how the Rules Committee described the rule using
information from Congressional Quarterly's ``American
Congressional Dictionary'': ``If the previous question is
defeated, control of debate shifts to the leading opposition
member (usually the minority Floor Manager) who then manages
an hour of debate and may offer a germane amendment to the
pending business.''
Deschler's Procedure in the U.S. House of Representatives,
the subchapter titled ``Amending Special Rules'' states: ``a
refusal to order the previous question on such a rule [a
special rule reported from the Committee on Rules] opens the
resolution to amendment and further debate.'' (Chapter 21,
section 21.2) Section 21.3 continues: Upon rejection of the
motion for the previous question on a resolution reported
from the Committee on Rules, control shifts to the Member
leading the opposition to the previous question, who may
offer a proper amendment or motion and who controls the time
for debate thereon.''
Clearly, the vote on the previous question on a rule does
have substantive policy implications. It is one of the only
available tools for those who oppose the Democratic
majority's agenda and allows those with alternative views the
opportunity to offer an alternative plan.
Mr. ARCURI. Mr. Speaker, I yield back the balance of my time, and I
move the previous question on the resolution.
The SPEAKER pro tempore. The question is on ordering the previous
question
The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
Mr. HASTINGS of Washington. Mr. Speaker, I object to the vote on the
ground that a quorum is not present and make the point of order that a
quorum is not present.
The SPEAKER pro tempore. Evidently a quorum is not present.
The Sergeant at Arms will notify absent Members.
The vote was taken by electronic device, and there were--yeas 217,
nays 190, not voting 23, as follows:
[Roll No. 143]
YEAS--217
Abercrombie
Ackerman
Allen
Altmire
Andrews
Arcuri
Baca
Baird
Baldwin
Becerra
Berkley
Berman
Berry
Bishop (GA)
Bishop (NY)
Blumenauer
Boren
Boswell
Boucher
Boyd (FL)
Boyda (KS)
Brady (PA)
Braley (IA)
Brown, Corrine
Butterfield
Capps
Capuano
Cardoza
Carnahan
Carson
Castor
Chandler
Clarke
Clay
Cleaver
Clyburn
Cohen
Conyers
Costa
Costello
Courtney
Crowley
Cuellar
Cummings
Davis (AL)
Davis (CA)
Davis (IL)
DeFazio
DeGette
Delahunt
DeLauro
Dicks
Dingell
Doggett
Doyle
Edwards
Ellison
Ellsworth
Emanuel
Eshoo
Etheridge
Farr
Fattah
Filner
Foster
Frank (MA)
Giffords
Gillibrand
Gonzalez
Gordon
Green, Al
Green, Gene
Grijalva
Gutierrez
Hall (NY)
Hare
Harman
Hastings (FL)
Herseth Sandlin
Higgins
Hill
Hinchey
Hirono
Hodes
Holden
Holt
Honda
Hoyer
Inslee
Israel
Jackson (IL)
Jackson-Lee (TX)
Jefferson
Johnson (GA)
Johnson, E. B.
Jones (OH)
Kagen
Kanjorski
Kaptur
Kennedy
Kildee
Kilpatrick
Kind
Klein (FL)
Kucinich
Langevin
Larsen (WA)
Larson (CT)
Lee
Levin
Lewis (GA)
Lipinski
Loebsack
Lofgren, Zoe
Lowey
Lynch
Mahoney (FL)
Maloney (NY)
Markey
Marshall
Matheson
Matsui
McCarthy (NY)
McCollum (MN)
McDermott
McGovern
McIntyre
McNerney
McNulty
Meek (FL)
Melancon
Michaud
Miller (NC)
Miller, George
Mitchell
Mollohan
Moore (KS)
Moore (WI)
Moran (VA)
Murphy (CT)
Murphy, Patrick
Murtha
Nadler
Napolitano
Neal (MA)
Obey
Olver
Ortiz
Pallone
Pascrell
Pastor
Paul
Payne
Perlmutter
Peterson (MN)
Pomeroy
Price (NC)
Rahall
Reyes
Richardson
Rodriguez
Ross
Rothman
Roybal-Allard
Ruppersberger
Ryan (OH)
Salazar
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schiff
Schwartz
Scott (GA)
Scott (VA)
Serrano
Sestak
Shea-Porter
Sherman
Shuler
Sires
Skelton
Slaughter
Smith (WA)
Snyder
Solis
Space
Spratt
Stark
Stupak
Sutton
Tanner
Tauscher
Taylor
Thompson (CA)
Thompson (MS)
Tierney
Towns
Tsongas
Udall (CO)
Udall (NM)
Van Hollen
Velazquez
Visclosky
Walz (MN)
Wasserman Schultz
Waters
Watson
Watt
Waxman
Weiner
Welch (VT)
Wexler
Wilson (OH)
Wu
Wynn
Yarmuth
NAYS--190
Aderholt
Akin
Alexander
Bachmann
Bachus
Barrett (SC)
Barrow
Bartlett (MD)
Barton (TX)
Bean
Biggert
Bilbray
Bilirakis
Bishop (UT)
Blackburn
Blunt
Boehner
Bonner
Bono Mack
Boozman
Brady (TX)
Broun (GA)
Brown (SC)
Buchanan
Burgess
Burton (IN)
Buyer
Calvert
Camp (MI)
Campbell (CA)
Cannon
Cantor
Capito
Carney
Carter
Castle
Chabot
Coble
Cole (OK)
Conaway
Cooper
Crenshaw
Culberson
Davis (KY)
Davis, David
Davis, Lincoln
Davis, Tom
Deal (GA)
Dent
Diaz-Balart, L.
Diaz-Balart, M.
Donnelly
Doolittle
Drake
Dreier
Duncan
Ehlers
Emerson
Engel
English (PA)
Everett
Fallin
Feeney
Ferguson
Flake
Forbes
Fortenberry
Fossella
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Garrett (NJ)
Gerlach
Gingrey
Gohmert
Goode
Goodlatte
Graves
Hall (TX)
Hastings (WA)
Hayes
Heller
Hensarling
Herger
Hobson
Hoekstra
Hulshof
Inglis (SC)
Issa
Johnson (IL)
Johnson, Sam
Jones (NC)
Jordan
Keller
King (IA)
King (NY)
Kingston
Kirk
Kline (MN)
Knollenberg
Kuhl (NY)
Lamborn
Lampson
Latham
LaTourette
Latta
Lewis (CA)
Lewis (KY)
Linder
LoBiondo
Lucas
Lungren, Daniel E.
Mack
Manzullo
Marchant
McCarthy (CA)
McCaul (TX)
McCotter
McCrery
McHenry
McHugh
McKeon
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Moran (KS)
Murphy, Tim
Myrick
Neugebauer
Pearce
Pence
Petri
Pitts
Platts
Poe
Porter
Price (GA)
Pryce (OH)
Putnam
Radanovich
Ramstad
Regula
Rehberg
Reichert
Renzi
Reynolds
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Ros-Lehtinen
Roskam
Royce
Ryan (WI)
Sali
Saxton
Schmidt
Sensenbrenner
Sessions
Shadegg
Shays
Shimkus
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Souder
Stearns
Sullivan
Terry
Thornberry
Tiahrt
Tiberi
Turner
Upton
Walberg
Walden (OR)
Walsh (NY)
Wamp
Weldon (FL)
Westmoreland
Whitfield (KY)
Wilson (NM)
Wilson (SC)
Wittman (VA)
Wolf
Young (FL)
NOT VOTING--23
Boustany
Brown-Waite, Ginny
Cramer
Cubin
Gilchrest
Granger
Hinojosa
Hooley
Hunter
LaHood
McMorris Rodgers
Meeks (NY)
Musgrave
Nunes
Oberstar
Peterson (PA)
Pickering
Rangel
Rush
Tancredo
Weller
Woolsey
Young (AK)
{time} 1148
Mr. MANZULLO changed his vote from ``yea'' to ``nay.''
Mr. BAIRD changed his vote from ``nay'' to ``yea.''
Mr. CARSON of Indiana changed his vote from ``present'' to ``yea.''
So the previous question was ordered.
The result of the vote was announced as above recorded.
The SPEAKER pro tempore. The question is on the resolution.
The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
Mr. HASTINGS of Washington. Mr. Speaker, on that I demand the yeas
and nays.
The yeas and nays were ordered.
The vote was taken by electronic device, and there were--yeas 221,
nays 188, not voting 21, as follows:
[Roll No. 144]
YEAS--221
Abercrombie
Ackerman
Allen
Altmire
Andrews
Arcuri
Baca
Baird
Baldwin
Barrow
Bean
Becerra
Berkley
Berman
Berry
Bishop (GA)
Bishop (NY)
Blumenauer
Boren
Boswell
Boucher
Boyd (FL)
Boyda (KS)
Brady (PA)
Braley (IA)
Brown, Corrine
Butterfield
Capps
Capuano
Cardoza
Carnahan
Carney
Carson
Castor
Chandler
Clarke
Clay
Cleaver
Clyburn
Cohen
Conyers
Costa
Costello
Courtney
Crowley
Cuellar
Cummings
Davis (AL)
Davis (CA)
Davis (IL)
Davis, Lincoln
DeFazio
DeGette
Delahunt
DeLauro
Dicks
Dingell
Doggett
Donnelly
Doyle
Edwards
Ellison
Ellsworth
Emanuel
Eshoo
Etheridge
Farr
Fattah
Filner
[[Page H1720]]
Foster
Frank (MA)
Giffords
Gillibrand
Gonzalez
Gordon
Green, Al
Green, Gene
Grijalva
Gutierrez
Hall (NY)
Hare
Harman
Hastings (FL)
Herseth Sandlin
Higgins
Hill
Hinchey
Hirono
Hodes
Holden
Holt
Honda
Hoyer
Inslee
Israel
Jackson (IL)
Jackson-Lee (TX)
Jefferson
Johnson (GA)
Johnson, E. B.
Jones (OH)
Kagen
Kanjorski
Kaptur
Kennedy
Kildee
Kilpatrick
Kind
Klein (FL)
Kucinich
Langevin
Larsen (WA)
Larson (CT)
Lee
Levin
Lewis (GA)
Lipinski
Loebsack
Lofgren, Zoe
Lowey
Lynch
Mahoney (FL)
Maloney (NY)
Markey
Marshall
Matheson
Matsui
McCarthy (NY)
McCollum (MN)
McDermott
McGovern
McIntyre
McNerney
McNulty
Meek (FL)
Melancon
Michaud
Miller (NC)
Miller, George
Mitchell
Mollohan
Moore (KS)
Moore (WI)
Moran (VA)
Murphy (CT)
Murphy, Patrick
Murtha
Nadler
Napolitano
Neal (MA)
Obey
Olver
Ortiz
Pallone
Pascrell
Pastor
Payne
Perlmutter
Peterson (MN)
Pomeroy
Price (NC)
Rahall
Reyes
Richardson
Rodriguez
Ross
Rothman
Roybal-Allard
Ruppersberger
Ryan (OH)
Salazar
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schiff
Schwartz
Scott (GA)
Scott (VA)
Serrano
Sestak
Shea-Porter
Sherman
Shuler
Sires
Skelton
Slaughter
Smith (WA)
Snyder
Solis
Space
Spratt
Stark
Stupak
Sutton
Tanner
Tauscher
Taylor
Thompson (CA)
Thompson (MS)
Tierney
Towns
Tsongas
Udall (CO)
Udall (NM)
Van Hollen
Velazquez
Visclosky
Walz (MN)
Wasserman Schultz
Waters
Watson
Watt
Waxman
Weiner
Welch (VT)
Wexler
Wilson (OH)
Wu
Wynn
Yarmuth
NAYS--188
Aderholt
Akin
Alexander
Bachmann
Bachus
Barrett (SC)
Bartlett (MD)
Barton (TX)
Biggert
Bilbray
Bilirakis
Bishop (UT)
Blackburn
Blunt
Boehner
Bonner
Bono Mack
Boozman
Brady (TX)
Broun (GA)
Brown (SC)
Buchanan
Burgess
Burton (IN)
Buyer
Calvert
Camp (MI)
Campbell (CA)
Cannon
Cantor
Capito
Carter
Castle
Chabot
Coble
Cole (OK)
Conaway
Cooper
Crenshaw
Culberson
Davis (KY)
Davis, David
Davis, Tom
Deal (GA)
Dent
Diaz-Balart, L.
Diaz-Balart, M.
Doolittle
Drake
Dreier
Duncan
Ehlers
Emerson
Engel
English (PA)
Everett
Fallin
Feeney
Ferguson
Flake
Forbes
Fortenberry
Fossella
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Garrett (NJ)
Gerlach
Gingrey
Gohmert
Goode
Goodlatte
Granger
Graves
Hall (TX)
Hastings (WA)
Hayes
Heller
Hensarling
Herger
Hobson
Hoekstra
Hulshof
Inglis (SC)
Issa
Johnson (IL)
Johnson, Sam
Jones (NC)
Jordan
Keller
King (IA)
King (NY)
Kingston
Kirk
Kline (MN)
Knollenberg
Kuhl (NY)
Lamborn
Lampson
Latham
LaTourette
Latta
Lewis (CA)
Lewis (KY)
Linder
LoBiondo
Lucas
Lungren, Daniel E.
Mack
Manzullo
Marchant
McCarthy (CA)
McCaul (TX)
McCotter
McCrery
McHenry
McHugh
McKeon
McMorris Rodgers
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Moran (KS)
Murphy, Tim
Myrick
Neugebauer
Paul
Pearce
Pence
Petri
Pitts
Platts
Poe
Porter
Price (GA)
Pryce (OH)
Putnam
Radanovich
Ramstad
Regula
Rehberg
Reichert
Renzi
Reynolds
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Ros-Lehtinen
Roskam
Royce
Ryan (WI)
Sali
Saxton
Schmidt
Sensenbrenner
Sessions
Shadegg
Shays
Shimkus
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Souder
Stearns
Sullivan
Terry
Thornberry
Tiahrt
Tiberi
Turner
Upton
Walberg
Walden (OR)
Walsh (NY)
Wamp
Weldon (FL)
Westmoreland
Whitfield (KY)
Wilson (NM)
Wilson (SC)
Wittman (VA)
Wolf
Young (FL)
NOT VOTING--21
Boustany
Brown-Waite, Ginny
Cramer
Cubin
Gilchrest
Hinojosa
Hooley
Hunter
LaHood
Meeks (NY)
Musgrave
Nunes
Oberstar
Peterson (PA)
Pickering
Rangel
Rush
Tancredo
Weller
Woolsey
Young (AK)
{time} 1205
So the resolution was agreed to.
The result of the vote was announced as above recorded.
A motion to reconsider was laid on the table.
Personal explanation
Mr. HINOJOSA. Mr. Speaker, on rollcall Nos. 143 and 144, I was
unavoidably detained. Had I been present, I would have voted ``yea'' on
rollcall Nos. 143 and 144.
Mr. CONYERS. Mr. Speaker, pursuant to House Resolution 1041, I call
up the bill (H.R. 3773) to amend the Foreign Intelligence Surveillance
Act of 1978 to establish a procedure for authorizing certain
acquisitions of foreign intelligence, and for other purposes, with a
Senate amendment thereto, and ask for its immediate consideration in
the House.
The Clerk read the title of the bill.
The SPEAKER pro tempore (Mr. Ross). The Clerk will designate the
Senate amendment.
The text of the Senate amendment is as follows:
Senate amendment:
Strike out all after the enacting clause and insert:
SECTION 1. SHORT TITLE; TABLE OF CONTENTS.
(a) Short Title.--This Act may be cited as the ``Foreign
Intelligence Surveillance Act of 1978 Amendments Act of
2008'' or the ``FISA Amendments Act of 2008''.
(b) Table of Contents.--The table of contents for this Act
is as follows:
Sec. 1. Short title; table of contents.
TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE
Sec. 101. Additional procedures regarding certain persons outside the
United States.
Sec. 102. Statement of exclusive means by which electronic surveillance
and interception of domestic communications may be
conducted.
Sec. 103. Submittal to Congress of certain court orders under the
Foreign Intelligence Surveillance Act of 1978.
Sec. 104. Applications for court orders.
Sec. 105. Issuance of an order.
Sec. 106. Use of information.
Sec. 107. Amendments for physical searches.
Sec. 108. Amendments for emergency pen registers and trap and trace
devices.
Sec. 109. Foreign Intelligence Surveillance Court.
Sec. 110. Weapons of mass destruction.
Sec. 111. Technical and conforming amendments.
TITLE II--PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS
Sec. 201. Definitions.
Sec. 202. Limitations on civil actions for electronic communication
service providers.
Sec. 203. Procedures for implementing statutory defenses under the
Foreign Intelligence Surveillance Act of 1978.
Sec. 204. Preemption of State investigations.
Sec. 205. Technical amendments.
TITLE III--OTHER PROVISIONS
Sec. 301. Severability.
Sec. 302. Effective date; repeal; transition procedures.
TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE
SEC. 101. ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS
OUTSIDE THE UNITED STATES.
(a) In General.--The Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1801 et seq.) is amended--
(1) by striking title VII; and
(2) by adding after title VI the following new title:
``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
THE UNITED STATES
``SEC. 701. LIMITATION ON DEFINITION OF ELECTRONIC
SURVEILLANCE.
``Nothing in the definition of electronic surveillance
under section 101(f) shall be construed to encompass
surveillance that is targeted in accordance with this title
at a person reasonably believed to be located outside the
United States.
``SEC. 702. DEFINITIONS.
``(a) In General.--The terms `agent of a foreign power',
`Attorney General', `contents', `electronic surveillance',
`foreign intelligence information', `foreign power',
`minimization procedures', `person', `United States', and
`United States person' shall have the meanings given such
terms in section 101, except as specifically provided in this
title.
``(b) Additional Definitions.--
``(1) Congressional intelligence committees.--The term
`congressional intelligence committees' means--
``(A) the Select Committee on Intelligence of the Senate;
and
``(B) the Permanent Select Committee on Intelligence of the
House of Representatives.
``(2) Foreign intelligence surveillance court; court.--The
terms `Foreign Intelligence Surveillance Court' and `Court'
mean the court established by section 103(a).
``(3) Foreign intelligence surveillance court of review;
court of review.--The terms `Foreign Intelligence
Surveillance Court of Review' and `Court of Review' mean the
court established by section 103(b).
``(4) Electronic communication service provider.--The term
`electronic communication service provider' means--
``(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
``(B) a provider of electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
``(C) a provider of a remote computing service, as that
term is defined in section 2711 of title 18, United States
Code;
``(D) any other communication service provider who has
access to wire or electronic communications either as such
communications are transmitted or as such communications are
stored; or
``(E) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), or (D).
[[Page H1721]]
``(5) Element of the intelligence community.--The term
`element of the intelligence community' means an element of
the intelligence community specified in or designated under
section 3(4) of the National Security Act of 1947 (50 U.S.C.
401a(4)).
``SEC. 703. PROCEDURES FOR TARGETING CERTAIN PERSONS OUTSIDE
THE UNITED STATES OTHER THAN UNITED STATES
PERSONS.
``(a) Authorization.--Notwithstanding any other law, the
Attorney General and the Director of National Intelligence
may authorize jointly, for periods of up to 1 year, the
targeting of persons reasonably believed to be located
outside the United States to acquire foreign intelligence
information.
``(b) Limitations.--An acquisition authorized under
subsection (a)--
``(1) may not intentionally target any person known at the
time of acquisition to be located in the United States;
``(2) may not intentionally target a person reasonably
believed to be located outside the United States if the
purpose of such acquisition is to target a particular, known
person reasonably believed to be in the United States, except
in accordance with title I or title III;
``(3) may not intentionally target a United States person
reasonably believed to be located outside the United States,
except in accordance with sections 704, 705, or 706;
``(4) shall not intentionally acquire any communication as
to which the sender and all intended recipients are known at
the time of the acquisition to be located in the United
States; and
``(5) shall be conducted in a manner consistent with the
fourth amendment to the Constitution of the United States.
``(c) Conduct of Acquisition.--An acquisition authorized
under subsection (a) may be conducted only in accordance
with--
``(1) a certification made by the Attorney General and the
Director of National Intelligence pursuant to subsection (f);
and
``(2) the targeting and minimization procedures required
pursuant to subsections (d) and (e).
``(d) Targeting Procedures.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt targeting procedures that are reasonably designed
to ensure that any acquisition authorized under subsection
(a) is limited to targeting persons reasonably believed to be
located outside the United States and does not result in the
intentional acquisition of any communication as to which the
sender and all intended recipients are known at the time of
the acquisition to be located in the United States.
``(2) Judicial review.--The procedures referred to in
paragraph (1) shall be subject to judicial review pursuant to
subsection (h).
``(e) Minimization Procedures.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt minimization procedures that meet the definition
of minimization procedures under section 101(h) or section
301(4) for acquisitions authorized under subsection (a).
``(2) Judicial review.--The minimization procedures
required by this subsection shall be subject to judicial
review pursuant to subsection (h).
``(f) Certification.--
``(1) In general.--
``(A) Requirement.--Subject to subparagraph (B), prior to
the initiation of an acquisition authorized under subsection
(a), the Attorney General and the Director of National
Intelligence shall provide, under oath, a written
certification, as described in this subsection.
``(B) Exception.--If the Attorney General and the Director
of National Intelligence determine that immediate action by
the Government is required and time does not permit the
preparation of a certification under this subsection prior to
the initiation of an acquisition, the Attorney General and
the Director of National Intelligence shall prepare such
certification, including such determination, as soon as
possible but in no event more than 7 days after such
determination is made.
``(2) Requirements.--A certification made under this
subsection shall--
``(A) attest that--
``(i) there are reasonable procedures in place for
determining that the acquisition authorized under subsection
(a) is targeted at persons reasonably believed to be located
outside the United States and that such procedures have been
approved by, or will be submitted in not more than 5 days for
approval by, the Foreign Intelligence Surveillance Court
pursuant to subsection (h);
``(ii) there are reasonable procedures in place for
determining that the acquisition authorized under subsection
(a) does not result in the intentional acquisition of any
communication as to which the sender and all intended
recipients are known at the time of the acquisition to be
located in the United States, and that such procedures have
been approved by, or will be submitted in not more than 5
days for approval by, the Foreign Intelligence Surveillance
Court pursuant to subsection (h);
``(iii) the procedures referred to in clauses (i) and (ii)
are consistent with the requirements of the fourth amendment
to the Constitution of the United States and do not permit
the intentional targeting of any person who is known at the
time of acquisition to be located in the United States or the
intentional acquisition of any communication as to which the
sender and all intended recipients are known at the time of
acquisition to be located in the United States;
``(iv) a significant purpose of the acquisition is to
obtain foreign intelligence information;
``(v) the minimization procedures to be used with respect
to such acquisition--
``(I) meet the definition of minimization procedures under
section 101(h) or section 301(4); and
``(II) have been approved by, or will be submitted in not
more than 5 days for approval by, the Foreign Intelligence
Surveillance Court pursuant to subsection (h);
``(vi) the acquisition involves obtaining the foreign
intelligence information from or with the assistance of an
electronic communication service provider; and
``(vii) the acquisition does not constitute electronic
surveillance, as limited by section 701; and
``(B) be supported, as appropriate, by the affidavit of any
appropriate official in the area of national security who
is--
``(i) appointed by the President, by and with the consent
of the Senate; or
``(ii) the head of any element of the intelligence
community.
``(3) Limitation.--A certification made under this
subsection is not required to identify the specific
facilities, places, premises, or property at which the
acquisition authorized under subsection (a) will be directed
or conducted.
``(4) Submission to the court.--The Attorney General shall
transmit a copy of a certification made under this
subsection, and any supporting affidavit, under seal to the
Foreign Intelligence Surveillance Court as soon as possible,
but in no event more than 5 days after such certification is
made. Such certification shall be maintained under security
measures adopted by the Chief Justice of the United States
and the Attorney General, in consultation with the Director
of National Intelligence.
``(5) Review.--The certification required by this
subsection shall be subject to judicial review pursuant to
subsection (h).
``(g) Directives and Judicial Review of Directives.--
``(1) Authority.--With respect to an acquisition authorized
under subsection (a), the Attorney General and the Director
of National Intelligence may direct, in writing, an
electronic communication service provider to--
``(A) immediately provide the Government with all
information, facilities, or assistance necessary to
accomplish the acquisition in a manner that will protect the
secrecy of the acquisition and produce a minimum of
interference with the services that such electronic
communication service provider is providing to the target;
and
``(B) maintain under security procedures approved by the
Attorney General and the Director of National Intelligence
any records concerning the acquisition or the aid furnished
that such electronic communication service provider wishes to
maintain.
``(2) Compensation.--The Government shall compensate, at
the prevailing rate, an electronic communication service
provider for providing information, facilities, or assistance
pursuant to paragraph (1).
``(3) Release from liability.--Notwithstanding any other
law, no cause of action shall lie in any court against any
electronic communication service provider for providing any
information, facilities, or assistance in accordance with a
directive issued pursuant to paragraph (1).
``(4) Challenging of directives.--
``(A) Authority to challenge.--An electronic communication
service provider receiving a directive issued pursuant to
paragraph (1) may challenge the directive by filing a
petition with the Foreign Intelligence Surveillance Court,
which shall have jurisdiction to review such a petition.
``(B) Assignment.--The presiding judge of the Court shall
assign the petition filed under subparagraph (A) to 1 of the
judges serving in the pool established by section 103(e)(1)
not later than 24 hours after the filing of the petition.
``(C) Standards for review.--A judge considering a petition
to modify or set aside a directive may grant such petition
only if the judge finds that the directive does not meet the
requirements of this section, or is otherwise unlawful.
``(D) Procedures for initial review.--A judge shall conduct
an initial review not later than 5 days after being assigned
a petition described in subparagraph (C). If the judge
determines that the petition consists of claims, defenses, or
other legal contentions that are not warranted by existing
law or by a nonfrivolous argument for extending, modifying,
or reversing existing law or for establishing new law, the
judge shall immediately deny the petition and affirm the
directive or any part of the directive that is the subject of
the petition and order the recipient to comply with the
directive or any part of it. Upon making such a determination
or promptly thereafter, the judge shall provide a written
statement for the record of the reasons for a determination
under this subparagraph.
``(E) Procedures for plenary review.--If a judge determines
that a petition described in subparagraph (C) requires
plenary review, the judge shall affirm, modify, or set aside
the directive that is the subject of that petition not later
than 30 days after being assigned the petition, unless the
judge, by order for reasons stated, extends that time as
necessary to comport with the due process clause of the fifth
amendment to the Constitution of the United States. Unless
the judge sets aside the directive, the judge shall
immediately affirm or affirm with modifications the
directive, and order the recipient to comply with the
directive in its entirety or as modified. The judge shall
provide a written statement for the records of the reasons
for a determination under this subparagraph.
``(F) Continued effect.--Any directive not explicitly
modified or set aside under this paragraph shall remain in
full effect.
``(G) Contempt of court.--Failure to obey an order of the
Court issued under this paragraph may be punished by the
Court as contempt of court.
[[Page H1722]]
``(5) Enforcement of directives.--
``(A) Order to compel.--In the case of a failure to comply
with a directive issued pursuant to paragraph (1), the
Attorney General may file a petition for an order to compel
compliance with the directive with the Foreign Intelligence
Surveillance Court, which shall have jurisdiction to review
such a petition.
``(B) Assignment.--The presiding judge of the Court shall
assign a petition filed under subparagraph (A) to 1 of the
judges serving in the pool established by section 103(e)(1)
not later than 24 hours after the filing of the petition.
``(C) Standards for review.--A judge considering a petition
filed under subparagraph (A) shall issue an order requiring
the electronic communication service provider to comply with
the directive or any part of it, as issued or as modified, if
the judge finds that the directive meets the requirements of
this section, and is otherwise lawful.
``(D) Procedures for review.--The judge shall render a
determination not later than 30 days after being assigned a
petition filed under subparagraph (A), unless the judge, by
order for reasons stated, extends that time if necessary to
comport with the due process clause of the fifth amendment to
the Constitution of the United States. The judge shall
provide a written statement for the record of the reasons for
a determination under this paragraph.
``(E) Contempt of court.--Failure to obey an order of the
Court issued under this paragraph may be punished by the
Court as contempt of court.
``(F) Process.--Any process under this paragraph may be
served in any judicial district in which the electronic
communication service provider may be found.
``(6) Appeal.--
``(A) Appeal to the court of review.--The Government or an
electronic communication service provider receiving a
directive issued pursuant to paragraph (1) may file a
petition with the Foreign Intelligence Surveillance Court of
Review for review of the decision issued pursuant to
paragraph (4) or (5). The Court of Review shall have
jurisdiction to consider such a petition and shall provide a
written statement for the record of the reasons for a
decision under this paragraph.
``(B) Certiorari to the supreme court.--The Government or
an electronic communication service provider receiving a
directive issued pursuant to paragraph (1) may file a
petition for a writ of certiorari for review of the decision
of the Court of Review issued under subparagraph (A). The
record for such review shall be transmitted under seal to the
Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``(h) Judicial Review of Certifications and Procedures.--
``(1) In general.--
``(A) Review by the foreign intelligence surveillance
court.--The Foreign Intelligence Surveillance Court shall
have jurisdiction to review any certification required by
subsection (c) and the targeting and minimization procedures
adopted pursuant to subsections (d) and (e).
``(B) Submission to the court.--The Attorney General shall
submit to the Court any such certification or procedure, or
amendment thereto, not later than 5 days after making or
amending the certification or adopting or amending the
procedures.
``(2) Certifications.--The Court shall review a
certification provided under subsection (f) to determine
whether the certification contains all the required elements.
``(3) Targeting procedures.--The Court shall review the
targeting procedures required by subsection (d) to assess
whether the procedures are reasonably designed to ensure that
the acquisition authorized under subsection (a) is limited to
the targeting of persons reasonably believed to be located
outside the United States and does not result in the
intentional acquisition of any communication as to which the
sender and all intended recipients are known at the time of
the acquisition to be located in the United States.
``(4) Minimization procedures.--The Court shall review the
minimization procedures required by subsection (e) to assess
whether such procedures meet the definition of minimization
procedures under section 101(h) or section 301(4).
``(5) Orders.--
``(A) Approval.--If the Court finds that a certification
required by subsection (f) contains all of the required
elements and that the targeting and minimization procedures
required by subsections (d) and (e) are consistent with the
requirements of those subsections and with the fourth
amendment to the Constitution of the United States, the Court
shall enter an order approving the continued use of the
procedures for the acquisition authorized under subsection
(a).
``(B) Correction of deficiencies.--If the Court finds that
a certification required by subsection (f) does not contain
all of the required elements, or that the procedures required
by subsections (d) and (e) are not consistent with the
requirements of those subsections or the fourth amendment to
the Constitution of the United States, the Court shall issue
an order directing the Government to, at the Government's
election and to the extent required by the Court's order--
``(i) correct any deficiency identified by the Court's
order not later than 30 days after the date the Court issues
the order; or
``(ii) cease the acquisition authorized under subsection
(a).
``(C) Requirement for written statement.--In support of its
orders under this subsection, the Court shall provide,
simultaneously with the orders, for the record a written
statement of its reasons.
``(6) Appeal.--
``(A) Appeal to the court of review.--The Government may
appeal any order under this section to the Foreign
Intelligence Surveillance Court of Review, which shall have
jurisdiction to review such order. For any decision
affirming, reversing, or modifying an order of the Foreign
Intelligence Surveillance Court, the Court of Review shall
provide for the record a written statement of its reasons.
``(B) Continuation of acquisition pending rehearing or
appeal.--Any acquisitions affected by an order under
paragraph (5)(B) may continue--
``(i) during the pendency of any rehearing of the order by
the Court en banc; and
``(ii) if the Government appeals an order under this
section, until the Court of Review enters an order under
subparagraph (C).
``(C) Implementation pending appeal.--Not later than 60
days after the filing of an appeal of an order under
paragraph (5)(B) directing the correction of a deficiency,
the Court of Review shall determine, and enter a
corresponding order regarding, whether all or any part of the
correction order, as issued or modified, shall be implemented
during the pendency of the appeal.
``(D) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review issued under subparagraph
(A). The record for such review shall be transmitted under
seal to the Supreme Court of the United States, which shall
have jurisdiction to review such decision.
``(i) Expedited Judicial Proceedings.--Judicial proceedings
under this section shall be conducted as expeditiously as
possible.
``(j) Maintenance and Security of Records and
Proceedings.--
``(1) Standards.--A record of a proceeding under this
section, including petitions filed, orders granted, and
statements of reasons for decision, shall be maintained under
security measures adopted by the Chief Justice of the United
States, in consultation with the Attorney General and the
Director of National Intelligence.
``(2) Filing and review.--All petitions under this section
shall be filed under seal. In any proceedings under this
section, the court shall, upon request of the Government,
review ex parte and in camera any Government submission, or
portions of a submission, which may include classified
information.
``(3) Retention of records.--A directive made or an order
granted under this section shall be retained for a period of
not less than 10 years from the date on which such directive
or such order is made.
``(k) Assessments and Reviews.--
``(1) Semiannual assessment.--Not less frequently than once
every 6 months, the Attorney General and Director of National
Intelligence shall assess compliance with the targeting and
minimization procedures required by subsections (e) and (f)
and shall submit each such assessment to--
``(A) the Foreign Intelligence Surveillance Court; and
``(B) the congressional intelligence committees.
``(2) Agency assessment.--The Inspectors General of the
Department of Justice and of any element of the intelligence
community authorized to acquire foreign intelligence
information under subsection (a) with respect to their
department, agency, or element--
``(A) are authorized to review the compliance with the
targeting and minimization procedures required by subsections
(d) and (e);
``(B) with respect to acquisitions authorized under
subsection (a), shall review the number of disseminated
intelligence reports containing a reference to a United
States person identity and the number of United States person
identities subsequently disseminated by the element concerned
in response to requests for identities that were not referred
to by name or title in the original reporting;
``(C) with respect to acquisitions authorized under
subsection (a), shall review the number of targets that were
later determined to be located in the United States and, to
the extent possible, whether their communications were
reviewed; and
``(D) shall provide each such review to--
``(i) the Attorney General;
``(ii) the Director of National Intelligence; and
``(iii) the congressional intelligence committees.
``(3) Annual review.--
``(A) Requirement to conduct.--The head of an element of
the intelligence community conducting an acquisition
authorized under subsection (a) shall direct the element to
conduct an annual review to determine whether there is reason
to believe that foreign intelligence information has been or
will be obtained from the acquisition. The annual review
shall provide, with respect to such acquisitions authorized
under subsection (a)--
``(i) an accounting of the number of disseminated
intelligence reports containing a reference to a United
States person identity;
``(ii) an accounting of the number of United States person
identities subsequently disseminated by that element in
response to requests for identities that were not referred to
by name or title in the original reporting;
``(iii) the number of targets that were later determined to
be located in the United States and, to the extent possible,
whether their communications were reviewed; and
``(iv) a description of any procedures developed by the
head of an element of the intelligence community and approved
by the Director of National Intelligence to assess, in a
manner consistent with national security, operational
requirements and the privacy interests of United States
persons, the extent to which the acquisitions authorized
under subsection (a) acquire the communications of United
States persons, as well as the results of any such
assessment.
[[Page H1723]]
``(B) Use of review.--The head of each element of the
intelligence community that conducts an annual review under
subparagraph (A) shall use each such review to evaluate the
adequacy of the minimization procedures utilized by such
element or the application of the minimization procedures to
a particular acquisition authorized under subsection (a).
``(C) Provision of review.--The head of each element of the
intelligence community that conducts an annual review under
subparagraph (A) shall provide such review to--
``(i) the Foreign Intelligence Surveillance Court;
``(ii) the Attorney General;
``(iii) the Director of National Intelligence; and
``(iv) the congressional intelligence committees.
``SEC. 704. CERTAIN ACQUISITIONS INSIDE THE UNITED STATES OF
UNITED STATES PERSONS OUTSIDE THE UNITED
STATES.
``(a) Jurisdiction of the Foreign Intelligence Surveillance
Court.--
``(1) In general.--The Foreign Intelligence Surveillance
Court shall have jurisdiction to enter an order approving the
targeting of a United States person reasonably believed to be
located outside the United States to acquire foreign
intelligence information, if such acquisition constitutes
electronic surveillance (as defined in section 101(f),
regardless of the limitation of section 701) or the
acquisition of stored electronic communications or stored
electronic data that requires an order under this Act, and
such acquisition is conducted within the United States.
``(2) Limitation.--In the event that a United States person
targeted under this subsection is reasonably believed to be
located in the United States during the pendency of an order
issued pursuant to subsection (c), such acquisition shall
cease until authority, other than under this section, is
obtained pursuant to this Act or the targeted United States
person is again reasonably believed to be located outside the
United States during the pendency of an order issued pursuant
to subsection (c).
``(b) Application.--
``(1) In general.--Each application for an order under this
section shall be made by a Federal officer in writing upon
oath or affirmation to a judge having jurisdiction under
subsection (a)(1). Each application shall require the
approval of the Attorney General based upon the Attorney
General's finding that it satisfies the criteria and
requirements of such application, as set forth in this
section, and shall include--
``(A) the identity of the Federal officer making the
application;
``(B) the identity, if known, or a description of the
United States person who is the target of the acquisition;
``(C) a statement of the facts and circumstances relied
upon to justify the applicant's belief that the United States
person who is the target of the acquisition is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(D) a statement of the proposed minimization procedures
that meet the definition of minimization procedures under
section 101(h) or section 301(4);
``(E) a description of the nature of the information sought
and the type of communications or activities to be subjected
to acquisition;
``(F) a certification made by the Attorney General or an
official specified in section 104(a)(6) that--
``(i) the certifying official deems the information sought
to be foreign intelligence information;
``(ii) a significant purpose of the acquisition is to
obtain foreign intelligence information;
``(iii) such information cannot reasonably be obtained by
normal investigative techniques;
``(iv) designates the type of foreign intelligence
information being sought according to the categories
described in section 101(e); and
``(v) includes a statement of the basis for the
certification that--
``(I) the information sought is the type of foreign
intelligence information designated; and
``(II) such information cannot reasonably be obtained by
normal investigative techniques;
``(G) a summary statement of the means by which the
acquisition will be conducted and whether physical entry is
required to effect the acquisition;
``(H) the identity of any electronic communication service
provider necessary to effect the acquisition, provided,
however, that the application is not required to identify the
specific facilities, places, premises, or property at which
the acquisition authorized under this section will be
directed or conducted;
``(I) a statement of the facts concerning any previous
applications that have been made to any judge of the Foreign
Intelligence Surveillance Court involving the United States
person specified in the application and the action taken on
each previous application; and
``(J) a statement of the period of time for which the
acquisition is required to be maintained, provided that such
period of time shall not exceed 90 days per application.
``(2) Other requirements of the attorney general.--The
Attorney General may require any other affidavit or
certification from any other officer in connection with the
application.
``(3) Other requirements of the judge.--The judge may
require the applicant to furnish such other information as
may be necessary to make the findings required by subsection
(c)(1).
``(c) Order.--
``(1) Findings.--Upon an application made pursuant to
subsection (b), the Foreign Intelligence Surveillance Court
shall enter an ex parte order as requested or as modified
approving the acquisition if the Court finds that--
``(A) the application has been made by a Federal officer
and approved by the Attorney General;
``(B) on the basis of the facts submitted by the applicant,
for the United States person who is the target of the
acquisition, there is probable cause to believe that the
target is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(C) the proposed minimization procedures meet the
definition of minimization procedures under section 101(h) or
section 301(4); and
``(D) the application which has been filed contains all
statements and certifications required by subsection (b) and
the certification or certifications are not clearly erroneous
on the basis of the statement made under subsection
(b)(1)(F)(v) and any other information furnished under
subsection (b)(3).
``(2) Probable cause.--In determining whether or not
probable cause exists for purposes of an order under
paragraph (1), a judge having jurisdiction under subsection
(a)(1) may consider past activities of the target, as well as
facts and circumstances relating to current or future
activities of the target. However, no United States person
may be considered a foreign power, agent of a foreign power,
or officer or employee of a foreign power solely upon the
basis of activities protected by the first amendment to the
Constitution of the United States.
``(3) Review.--
``(A) Limitation on review.--Review by a judge having
jurisdiction under subsection (a)(1) shall be limited to that
required to make the findings described in paragraph (1).
``(B) Review of probable cause.--If the judge determines
that the facts submitted under subsection (b) are
insufficient to establish probable cause to issue an order
under paragraph (1), the judge shall enter an order so
stating and provide a written statement for the record of the
reasons for such determination. The Government may appeal an
order under this clause pursuant to subsection (f).
``(C) Review of minimization procedures.--If the judge
determines that the proposed minimization procedures required
under paragraph (1)(C) do not meet the definition of
minimization procedures under section 101(h) or section
301(4), the judge shall enter an order so stating and provide
a written statement for the record of the reasons for such
determination. The Government may appeal an order under this
clause pursuant to subsection (f).
``(D) Review of certification.--If the judge determines
that an application required by subsection (b) does not
contain all of the required elements, or that the
certification or certifications are clearly erroneous on the
basis of the statement made under subsection (b)(1)(F)(v) and
any other information furnished under subsection (b)(3), the
judge shall enter an order so stating and provide a written
statement for the record of the reasons for such
determination. The Government may appeal an order under this
clause pursuant to subsection (f).
``(4) Specifications.--An order approving an acquisition
under this subsection shall specify--
``(A) the identity, if known, or a description of the
United States person who is the target of the acquisition
identified or described in the application pursuant to
subsection (b)(1)(B);
``(B) if provided in the application pursuant to subsection
(b)(1)(H), the nature and location of each of the facilities
or places at which the acquisition will be directed;
``(C) the nature of the information sought to be acquired
and the type of communications or activities to be subjected
to acquisition;
``(D) the means by which the acquisition will be conducted
and whether physical entry is required to effect the
acquisition; and
``(E) the period of time during which the acquisition is
approved.
``(5) Directions.--An order approving acquisitions under
this subsection shall direct--
``(A) that the minimization procedures be followed;
``(B) an electronic communication service provider to
provide to the Government forthwith all information,
facilities, or assistance necessary to accomplish the
acquisition authorized under this subsection in a manner that
will protect the secrecy of the acquisition and produce a
minimum of interference with the services that such
electronic communication service provider is providing to the
target;
``(C) an electronic communication service provider to
maintain under security procedures approved by the Attorney
General any records concerning the acquisition or the aid
furnished that such electronic communication service provider
wishes to maintain; and
``(D) that the Government compensate, at the prevailing
rate, such electronic communication service provider for
providing such information, facilities, or assistance.
``(6) Duration.--An order approved under this paragraph
shall be effective for a period not to exceed 90 days and
such order may be renewed for additional 90-day periods upon
submission of renewal applications meeting the requirements
of subsection (b).
``(7) Compliance.--At or prior to the end of the period of
time for which an acquisition is approved by an order or
extension under this section, the judge may assess compliance
with the minimization procedures by reviewing the
circumstances under which information concerning United
States persons was acquired, retained, or disseminated.
``(d) Emergency Authorization.--
``(1) Authority for emergency authorization.--
Notwithstanding any other provision of this Act, if the
Attorney General reasonably determines that--
``(A) an emergency situation exists with respect to the
acquisition of foreign intelligence
[[Page H1724]]
information for which an order may be obtained under
subsection (c) before an order authorizing such acquisition
can with due diligence be obtained, and
``(B) the factual basis for issuance of an order under this
subsection to approve such acquisition exists,
the Attorney General may authorize the emergency acquisition
if a judge having jurisdiction under subsection (a)(1) is
informed by the Attorney General, or a designee of the
Attorney General, at the time of such authorization that the
decision has been made to conduct such acquisition and if an
application in accordance with this subsection is made to a
judge of the Foreign Intelligence Surveillance Court as soon
as practicable, but not more than 7 days after the Attorney
General authorizes such acquisition.
``(2) Minimization procedures.--If the Attorney General
authorizes such emergency acquisition, the Attorney General
shall require that the minimization procedures required by
this section for the issuance of a judicial order be
followed.
``(3) Termination of emergency authorization.--In the
absence of a judicial order approving such acquisition, the
acquisition shall terminate when the information sought is
obtained, when the application for the order is denied, or
after the expiration of 7 days from the time of authorization
by the Attorney General, whichever is earliest.
``(4) Use of information.--In the event that such
application for approval is denied, or in any other case
where the acquisition is terminated and no order is issued
approving the acquisition, no information obtained or
evidence derived from such acquisition, except under
circumstances in which the target of the acquisition is
determined not to be a United States person during the
pendency of the 7-day emergency acquisition period, shall be
received in evidence or otherwise disclosed in any trial,
hearing, or other proceeding in or before any court, grand
jury, department, office, agency, regulatory body,
legislative committee, or other authority of the United
States, a State, or political subdivision thereof, and no
information concerning any United States person acquired from
such acquisition shall subsequently be used or disclosed in
any other manner by Federal officers or employees without the
consent of such person, except with the approval of the
Attorney General if the information indicates a threat of
death or serious bodily harm to any person.
``(e) Release From Liability.--Notwithstanding any other
law, no cause of action shall lie in any court against any
electronic communication service provider for providing any
information, facilities, or assistance in accordance with an
order or request for emergency assistance issued pursuant to
subsections (c) or (d).
``(f) Appeal.--
``(1) Appeal to the foreign intelligence surveillance court
of review.--The Government may file an appeal with the
Foreign Intelligence Surveillance Court of Review for review
of an order issued pursuant to subsection (c). The Court of
Review shall have jurisdiction to consider such appeal and
shall provide a written statement for the record of the
reasons for a decision under this paragraph.
``(2) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of the
decision of the Court of Review issued under paragraph (1).
The record for such review shall be transmitted under seal to
the Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``SEC. 705. OTHER ACQUISITIONS TARGETING UNITED STATES
PERSONS OUTSIDE THE UNITED STATES.
``(a) Jurisdiction and Scope.--
``(1) Jurisdiction.--The Foreign Intelligence Surveillance
Court shall have jurisdiction to enter an order pursuant to
subsection (c).
``(2) Scope.--No element of the intelligence community may
intentionally target, for the purpose of acquiring foreign
intelligence information, a United States person reasonably
believed to be located outside the United States under
circumstances in which the targeted United States person has
a reasonable expectation of privacy and a warrant would be
required if the acquisition were conducted inside the United
States for law enforcement purposes, unless a judge of the
Foreign Intelligence Surveillance Court has entered an order
or the Attorney General has authorized an emergency
acquisition pursuant to subsections (c) or (d) or any other
provision of this Act.
``(3) Limitations.--
``(A) Moving or misidentified targets.--In the event that
the targeted United States person is reasonably believed to
be in the United States during the pendency of an order
issued pursuant to subsection (c), such acquisition shall
cease until authority is obtained pursuant to this Act or the
targeted United States person is again reasonably believed to
be located outside the United States during the pendency of
an order issued pursuant to subsection (c).
``(B) Applicability.--If the acquisition is to be conducted
inside the United States and could be authorized under
section 704, the procedures of section 704 shall apply,
unless an order or emergency acquisition authority has been
obtained under a provision of this Act other than under this
section.
``(b) Application.--Each application for an order under
this section shall be made by a Federal officer in writing
upon oath or affirmation to a judge having jurisdiction under
subsection (a)(1). Each application shall require the
approval of the Attorney General based upon the Attorney
General's finding that it satisfies the criteria and
requirements of such application as set forth in this section
and shall include--
``(1) the identity, if known, or a description of the
specific United States person who is the target of the
acquisition;
``(2) a statement of the facts and circumstances relied
upon to justify the applicant's belief that the United States
person who is the target of the acquisition is--
``(A) a person reasonably believed to be located outside
the United States; and
``(B) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(3) a statement of the proposed minimization procedures
that meet the definition of minimization procedures under
section 101(h) or section 301(4);
``(4) a certification made by the Attorney General, an
official specified in section 104(a)(6), or the head of an
element of the intelligence community that--
``(A) the certifying official deems the information sought
to be foreign intelligence information; and
``(B) a significant purpose of the acquisition is to obtain
foreign intelligence information;
``(5) a statement of the facts concerning any previous
applications that have been made to any judge of the Foreign
Intelligence Surveillance Court involving the United States
person specified in the application and the action taken on
each previous application; and
``(6) a statement of the period of time for which the
acquisition is required to be maintained, provided that such
period of time shall not exceed 90 days per application.
``(c) Order.--
``(1) Findings.--If, upon an application made pursuant to
subsection (b), a judge having jurisdiction under subsection
(a) finds that--
``(A) on the basis of the facts submitted by the applicant,
for the United States person who is the target of the
acquisition, there is probable cause to believe that the
target is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(B) the proposed minimization procedures, with respect to
their dissemination provisions, meet the definition of
minimization procedures under section 101(h) or section
301(4); and
``(C) the application which has been filed contains all
statements and certifications required by subsection (b) and
the certification provided under subsection (b)(4) is not
clearly erroneous on the basis of the information furnished
under subsection (b),
the Court shall issue an ex parte order so stating.
``(2) Probable cause.--In determining whether or not
probable cause exists for purposes of an order under
paragraph (1)(A), a judge having jurisdiction under
subsection (a)(1) may consider past activities of the target,
as well as facts and circumstances relating to current or
future activities of the target. However, no United States
person may be considered a foreign power, agent of a foreign
power, or officer or employee of a foreign power solely upon
the basis of activities protected by the first amendment to
the Constitution of the United States.
``(3) Review.--
``(A) Limitations on review.--Review by a judge having
jurisdiction under subsection (a)(1) shall be limited to that
required to make the findings described in paragraph (1). The
judge shall not have jurisdiction to review the means by
which an acquisition under this section may be conducted.
``(B) Review of probable cause.--If the judge determines
that the facts submitted under subsection (b) are
insufficient to establish probable cause to issue an order
under this subsection, the judge shall enter an order so
stating and provide a written statement for the record of the
reasons for such determination. The Government may appeal an
order under this clause pursuant to subsection (e).
``(C) Review of minimization procedures.--If the judge
determines that the minimization procedures applicable to
dissemination of information obtained through an acquisition
under this subsection do not meet the definition of
minimization procedures under section 101(h) or section
301(4), the judge shall enter an order so stating and provide
a written statement for the record of the reasons for such
determination. The Government may appeal an order under this
clause pursuant to subsection (e).
``(D) Scope of review of certification.--If the judge
determines that the certification provided under subsection
(b)(4) is clearly erroneous on the basis of the information
furnished under subsection (b), the judge shall enter an
order so stating and provide a written statement for the
record of the reasons for such determination. The Government
may appeal an order under this subparagraph pursuant to
subsection (e).
``(4) Duration.--An order under this paragraph shall be
effective for a period not to exceed 90 days and such order
may be renewed for additional 90-day periods upon submission
of renewal applications meeting the requirements of
subsection (b).
``(5) Compliance.--At or prior to the end of the period of
time for which an order or extension is granted under this
section, the judge may assess compliance with the
minimization procedures by reviewing the circumstances under
which information concerning United States persons was
disseminated, provided that the judge may not inquire into
the circumstances relating to the conduct of the acquisition.
``(d) Emergency Authorization.--
``(1) Authority for emergency authorization.--
Notwithstanding any other provision in this subsection, if
the Attorney General reasonably determines that--
``(A) an emergency situation exists with respect to the
acquisition of foreign intelligence information for which an
order may be obtained under subsection (c) before an order
under that
[[Page H1725]]
subsection may, with due diligence, be obtained, and
``(B) the factual basis for issuance of an order under this
section exists,
the Attorney General may authorize the emergency acquisition
if a judge having jurisdiction under subsection (a)(1) is
informed by the Attorney General or a designee of the
Attorney General at the time of such authorization that the
decision has been made to conduct such acquisition and if an
application in accordance with this subsection is made to a
judge of the Foreign Intelligence Surveillance Court as soon
as practicable, but not more than 7 days after the Attorney
General authorizes such acquisition.
``(2) Minimization procedures.--If the Attorney General
authorizes such emergency acquisition, the Attorney General
shall require that the minimization procedures required by
this section be followed.
``(3) Termination of emergency authorization.--In the
absence of an order under subsection (c), the acquisition
shall terminate when the information sought is obtained, if
the application for the order is denied, or after the
expiration of 7 days from the time of authorization by the
Attorney General, whichever is earliest.
``(4) Use of information.--In the event that such
application is denied, or in any other case where the
acquisition is terminated and no order is issued approving
the acquisition, no information obtained or evidence derived
from such acquisition, except under circumstances in which
the target of the acquisition is determined not to be a
United States person during the pendency of the 7-day
emergency acquisition period, shall be received in evidence
or otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from such acquisition shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of such
person, except with the approval of the Attorney General if
the information indicates a threat of death or serious bodily
harm to any person.
``(e) Appeal.--
``(1) Appeal to the court of review.--The Government may
file an appeal with the Foreign Intelligence Surveillance
Court of Review for review of an order issued pursuant to
subsection (c). The Court of Review shall have jurisdiction
to consider such appeal and shall provide a written statement
for the record of the reasons for a decision under this
paragraph.
``(2) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of the
decision of the Court of Review issued under paragraph (1).
The record for such review shall be transmitted under seal to
the Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``SEC. 706. JOINT APPLICATIONS AND CONCURRENT AUTHORIZATIONS.
``(a) Joint Applications and Orders.--If an acquisition
targeting a United States person under section 704 or section
705 is proposed to be conducted both inside and outside the
United States, a judge having jurisdiction under section
704(a)(1) or section 705(a)(1) may issue simultaneously, upon
the request of the Government in a joint application
complying with the requirements of section 704(b) or section
705(b), orders under section 704(c) or section 705(c), as
applicable.
``(b) Concurrent Authorization.--If an order authorizing
electronic surveillance or physical search has been obtained
under section 105 or section 304 and that order is still in
effect, the Attorney General may authorize, without an order
under section 704 or section 705, an acquisition of foreign
intelligence information targeting that United States person
while such person is reasonably believed to be located
outside the United States.
``SEC. 707. USE OF INFORMATION ACQUIRED UNDER TITLE VII.
``(a) Information Acquired Under Section 703.--Information
acquired from an acquisition conducted under section 703
shall be deemed to be information acquired from an electronic
surveillance pursuant to title I for purposes of section 106,
except for the purposes of subsection (j) of such section.
``(b) Information Acquired Under Section 704.--Information
acquired from an acquisition conducted under section 704
shall be deemed to be information acquired from an electronic
surveillance pursuant to title I for purposes of section 106.
``SEC. 708. CONGRESSIONAL OVERSIGHT.
``(a) Semiannual Report.--Not less frequently than once
every 6 months, the Attorney General shall fully inform, in a
manner consistent with national security, the congressional
intelligence committees, the Committee on the Judiciary of
the Senate, and the Committee on the Judiciary of the House
of Representatives, concerning the implementation of this
title.
``(b) Content.--Each report made under subparagraph (a)
shall include--
``(1) with respect to section 703--
``(A) any certifications made under subsection 703(f)
during the reporting period;
``(B) any directives issued under subsection 703(g) during
the reporting period;
``(C) a description of the judicial review during the
reporting period of any such certifications and targeting and
minimization procedures utilized with respect to such
acquisition, including a copy of any order or pleading in
connection with such review that contains a significant legal
interpretation of the provisions of this section;
``(D) any actions taken to challenge or enforce a directive
under paragraphs (4) or (5) of section 703(g);
``(E) any compliance reviews conducted by the Department of
Justice or the Office of the Director of National
Intelligence of acquisitions authorized under subsection
703(a);
``(F) a description of any incidents of noncompliance with
a directive issued by the Attorney General and the Director
of National Intelligence under subsection 703(g), including--
``(i) incidents of noncompliance by an element of the
intelligence community with procedures adopted pursuant to
subsections (d) and (e) of section 703; and
``(ii) incidents of noncompliance by a specified person to
whom the Attorney General and Director of National
Intelligence issued a directive under subsection 703(g); and
``(G) any procedures implementing this section;
``(2) with respect to section 704--
``(A) the total number of applications made for orders
under section 704(b);
``(B) the total number of such orders either granted,
modified, or denied; and
``(C) the total number of emergency acquisitions authorized
by the Attorney General under section 704(d) and the total
number of subsequent orders approving or denying such
acquisitions; and
``(3) with respect to section 705--
``(A) the total number of applications made for orders
under 705(b);
``(B) the total number of such orders either granted,
modified, or denied; and
``(C) the total number of emergency acquisitions authorized
by the Attorney General under subsection 705(d) and the total
number of subsequent orders approving or denying such
applications.''.
(b) Table of Contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et. seq.) is amended--
(1) by striking the item relating to title VII;
(2) by striking the item relating to section 701; and
(3) by adding at the end the following:
``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
THE UNITED STATES
``Sec. 701. Limitation on definition of electronic surveillance.
``Sec. 702. Definitions.
``Sec. 703. Procedures for targeting certain persons outside the United
States other than United States persons.
``Sec. 704. Certain acquisitions inside the United States of United
States persons outside the United States.
``Sec. 705. Other acquisitions targeting United States persons outside
the United States.
``Sec. 706. Joint applications and concurrent authorizations.
``Sec. 707. Use of information acquired under title VII.
``Sec. 708. Congressional oversight.''.
(c) Technical and Conforming Amendments.--
(1) Title 18, united states code.--
(A) Section 2232.--Section 2232(e) of title 18, United
States Code, is amended by inserting ``(as defined in section
101(f) of the Foreign Intelligence Surveillance Act of 1978,
regardless of the limitation of section 701 of that Act)''
after ``electronic surveillance''.
(B) Section 2511.--Section 2511(2)(a)(ii)(A) of title 18,
United States Code, is amended by inserting ``or a court
order pursuant to section 705 of the Foreign Intelligence
Surveillance Act of 1978'' after ``assistance''.
(2) Foreign intelligence surveillance act of 1978.--
(A) Section 109.--Section 109 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1809) is amended by
adding at the end the following:
``(e) Definition.--For the purpose of this section, the
term `electronic surveillance' means electronic surveillance
as defined in section 101(f) of this Act regardless of the
limitation of section 701 of this Act.''.
(B) Section 110.--Section 110 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1810) is amended by--
(i) adding an ``(a)'' before ``Civil Action'',
(ii) redesignating subsections (a) through (c) as
paragraphs (1) through (3), respectively; and
(iii) adding at the end the following:
``(b) Definition.--For the purpose of this section, the
term `electronic surveillance' means electronic surveillance
as defined in section 101(f) of this Act regardless of the
limitation of section 701 of this Act.''.
(C) Section 601.--Section 601(a)(1) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1871(a)(1))
is amended by striking subparagraphs (C) and (D) and
inserting the following:
``(C) pen registers under section 402;
``(D) access to records under section 501;
``(E) acquisitions under section 704; and
``(F) acquisitions under section 705;''.
(d) Termination of Authority.--
(1) In general.--Except as provided in paragraph (2), the
amendments made by subsections (a)(2), (b), and (c) shall
cease to have effect on December 31, 2013.
(2) Continuing applicability.--Section 703(g)(3) of the
Foreign Intelligence Surveillance Act of 1978 (as amended by
subsection (a)) shall remain in effect with respect to any
directive issued pursuant to section 703(g) of that Act (as
so amended) for information, facilities, or assistance
provided during the period such directive was or is in
effect. Section 704(e) of the Foreign Intelligence
Surveillance Act of 1978 (as amended by subsection (a)) shall
remain in effect with respect to an order or request for
emergency assistance under that section. The use of
information acquired by an acquisition conducted under
[[Page H1726]]
section 703 of that Act (as so amended) shall continue to be
governed by the provisions of section 707 of that Act (as so
amended).
SEC. 102. STATEMENT OF EXCLUSIVE MEANS BY WHICH ELECTRONIC
SURVEILLANCE AND INTERCEPTION OF DOMESTIC
COMMUNICATIONS MAY BE CONDUCTED.
(a) Statement of Exclusive Means.--Title I of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.) is amended by adding at the end the following new
section:
``statement of exclusive means by which electronic surveillance and
interception of domestic communications may be conducted
``Sec. 112. The procedures of chapters 119, 121, and 206
of title 18, United States Code, and this Act shall be the
exclusive means by which electronic surveillance (as defined
in section 101(f), regardless of the limitation of section
701) and the interception of domestic wire, oral, or
electronic communications may be conducted.''.
(b) Table of Contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.) is amended by adding after the item
relating to section 111, the following:
``Sec. 112. Statement of exclusive means by which electronic
surveillance and interception of domestic communications
may be conducted.''.
(c) Conforming Amendments.--Section 2511(2) of title 18,
United States Code, is amended in paragraph (f), by striking
``, as defined in section 101 of such Act,'' and inserting
``(as defined in section 101(f) of such Act regardless of the
limitation of section 701 of such Act)''.
SEC. 103. SUBMITTAL TO CONGRESS OF CERTAIN COURT ORDERS UNDER
THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF
1978.
(a) Inclusion of Certain Orders in Semiannual Reports of
Attorney General.--Subsection (a)(5) of section 601 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1871) is amended by striking ``(not including orders)'' and
inserting ``, orders,''.
(b) Reports by Attorney General on Certain Other Orders.--
Such section 601 is further amended by adding at the end the
following:
``(c) Submissions to Congress.--The Attorney General shall
submit to the committees of Congress referred to in
subsection (a)--
``(1) a copy of any decision, order, or opinion issued by
the Foreign Intelligence Surveillance Court or the Foreign
Intelligence Surveillance Court of Review that includes
significant construction or interpretation of any provision
of this Act, and any pleadings, applications, or memoranda of
law associated with such decision, order, or opinion, not
later than 45 days after such decision, order, or opinion is
issued; and
``(2) a copy of any such decision, order, or opinion, and
any pleadings, applications, or memoranda of law associated
with such decision, order, or opinion, that was issued during
the 5-year period ending on the date of the enactment of the
FISA Amendments Act of 2008 and not previously submitted in a
report under subsection (a).
``(d) Protection of National Security.--The Attorney
General, in consultation with the Director of National
Intelligence, may authorize redactions of materials described
in subsection (c) that are provided to the committees of
Congress referred to in subsection (a), if such redactions
are necessary to protect the national security of the United
States and are limited to sensitive sources and methods
information or the identities of targets.''.
(c) Definitions.--Such section 601, as amended by
subsections (a) and (b), is further amended by adding at the
end the following:
``(e) Definitions.--In this section:
``(1) Foreign intelligence surveillance court; court.--The
term `` `Foreign Intelligence Surveillance Court' '' means
the court established by section 103(a).
``(2) Foreign intelligence surveillance court of review;
court of review.--The term `Foreign Intelligence Surveillance
Court of Review' means the court established by section
103(b).''.
SEC. 104. APPLICATIONS FOR COURT ORDERS.
Section 104 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1804) is amended--
(1) in subsection (a)--
(A) by striking paragraphs (2) and (11);
(B) by redesignating paragraphs (3) through (10) as
paragraphs (2) through (9), respectively;
(C) in paragraph (5), as redesignated by subparagraph (B)
of this paragraph, by striking ``detailed'';
(D) in paragraph (6), as redesignated by subparagraph (B)
of this paragraph, in the matter preceding subparagraph (A)--
(i) by striking ``Affairs or'' and inserting ``Affairs,'';
and
(ii) by striking ``Senate--'' and inserting ``Senate, or
the Deputy Director of the Federal Bureau of Investigation,
if designated by the President as a certifying official--'';
(E) in paragraph (7), as redesignated by subparagraph (B)
of this paragraph, by striking ``statement of'' and inserting
``summary statement of'';
(F) in paragraph (8), as redesignated by subparagraph (B)
of this paragraph, by adding ``and'' at the end; and
(G) in paragraph (9), as redesignated by subparagraph (B)
of this paragraph, by striking ``; and'' and inserting a
period;
(2) by striking subsection (b);
(3) by redesignating subsections (c) through (e) as
subsections (b) through (d), respectively; and
(4) in paragraph (1)(A) of subsection (d), as redesignated
by paragraph (3) of this subsection, by striking ``or the
Director of National Intelligence'' and inserting ``the
Director of National Intelligence, or the Director of the
Central Intelligence Agency''.
SEC. 105. ISSUANCE OF AN ORDER.
Section 105 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1805) is amended--
(1) in subsection (a)--
(A) by striking paragraph (1); and
(B) by redesignating paragraphs (2) through (5) as
paragraphs (1) through (4), respectively;
(2) in subsection (b), by striking ``(a)(3)'' and inserting
``(a)(2)'';
(3) in subsection (c)(1)--
(A) in subparagraph (D), by adding ``and'' at the end;
(B) in subparagraph (E), by striking ``; and'' and
inserting a period; and
(C) by striking subparagraph (F);
(4) by striking subsection (d);
(5) by redesignating subsections (e) through (i) as
subsections (d) through (h), respectively;
(6) by amending subsection (e), as redesignated by
paragraph (5) of this section, to read as follows:
``(e)(1) Notwithstanding any other provision of this title,
the Attorney General may authorize the emergency employment
of electronic surveillance if the Attorney General--
``(A) reasonably determines that an emergency situation
exists with respect to the employment of electronic
surveillance to obtain foreign intelligence information
before an order authorizing such surveillance can with due
diligence be obtained;
``(B) reasonably determines that the factual basis for
issuance of an order under this title to approve such
electronic surveillance exists;
``(C) informs, either personally or through a designee, a
judge having jurisdiction under section 103 at the time of
such authorization that the decision has been made to employ
emergency electronic surveillance; and
``(D) makes an application in accordance with this title to
a judge having jurisdiction under section 103 as soon as
practicable, but not later than 7 days after the Attorney
General authorizes such surveillance.
``(2) If the Attorney General authorizes the emergency
employment of electronic surveillance under paragraph (1),
the Attorney General shall require that the minimization
procedures required by this title for the issuance of a
judicial order be followed.
``(3) In the absence of a judicial order approving such
electronic surveillance, the surveillance shall terminate
when the information sought is obtained, when the application
for the order is denied, or after the expiration of 7 days
from the time of authorization by the Attorney General,
whichever is earliest.
``(4) A denial of the application made under this
subsection may be reviewed as provided in section 103.
``(5) In the event that such application for approval is
denied, or in any other case where the electronic
surveillance is terminated and no order is issued approving
the surveillance, no information obtained or evidence derived
from such surveillance shall be received in evidence or
otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from such surveillance shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of such
person, except with the approval of the Attorney General if
the information indicates a threat of death or serious bodily
harm to any person.
``(6) The Attorney General shall assess compliance with the
requirements of paragraph (5).''; and
(7) by adding at the end the following:
``(i) In any case in which the Government makes an
application to a judge under this title to conduct electronic
surveillance involving communications and the judge grants
such application, upon the request of the applicant, the
judge shall also authorize the installation and use of pen
registers and trap and trace devices, and direct the
disclosure of the information set forth in section
402(d)(2).''.
SEC. 106. USE OF INFORMATION.
Subsection (i) of section 106 of the Foreign Intelligence
Surveillance Act of 1978 (8 U.S.C. 1806) is amended by
striking ``radio communication'' and inserting
``communication''.
SEC. 107. AMENDMENTS FOR PHYSICAL SEARCHES.
(a) Applications.--Section 303 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1823) is amended--
(1) in subsection (a)--
(A) by striking paragraph (2);
(B) by redesignating paragraphs (3) through (9) as
paragraphs (2) through (8), respectively;
(C) in paragraph (2), as redesignated by subparagraph (B)
of this paragraph, by striking ``detailed'';
(D) in paragraph (3)(C), as redesignated by subparagraph
(B) of this paragraph, by inserting ``or is about to be''
before ``owned''; and
(E) in paragraph (6), as redesignated by subparagraph (B)
of this paragraph, in the matter preceding subparagraph (A)--
(i) by striking ``Affairs or'' and inserting ``Affairs,'';
and
(ii) by striking ``Senate--'' and inserting ``Senate, or
the Deputy Director of the Federal Bureau of Investigation,
if designated by the President as a certifying official--'';
and
(2) in subsection (d)(1)(A), by striking ``or the Director
of National Intelligence'' and inserting ``the Director of
National Intelligence, or the Director of the Central
Intelligence Agency''.
(b) Orders.--Section 304 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1824) is amended--
[[Page H1727]]
(1) in subsection (a)--
(A) by striking paragraph (1); and
(B) by redesignating paragraphs (2) through (5) as
paragraphs (1) through (4), respectively; and
(2) by amending subsection (e) to read as follows:
``(e)(1) Notwithstanding any other provision of this title,
the Attorney General may authorize the emergency employment
of a physical search if the Attorney General reasonably--
``(A) determines that an emergency situation exists with
respect to the employment of a physical search to obtain
foreign intelligence information before an order authorizing
such physical search can with due diligence be obtained;
``(B) determines that the factual basis for issuance of an
order under this title to approve such physical search
exists;
``(C) informs, either personally or through a designee, a
judge of the Foreign Intelligence Surveillance Court at the
time of such authorization that the decision has been made to
employ an emergency physical search; and
``(D) makes an application in accordance with this title to
a judge of the Foreign Intelligence Surveillance Court as
soon as practicable, but not more than 7 days after the
Attorney General authorizes such physical search.
``(2) If the Attorney General authorizes the emergency
employment of a physical search under paragraph (1), the
Attorney General shall require that the minimization
procedures required by this title for the issuance of a
judicial order be followed.
``(3) In the absence of a judicial order approving such
physical search, the physical search shall terminate when the
information sought is obtained, when the application for the
order is denied, or after the expiration of 7 days from the
time of authorization by the Attorney General, whichever is
earliest.
``(4) A denial of the application made under this
subsection may be reviewed as provided in section 103.
``(5)(A) In the event that such application for approval is
denied, or in any other case where the physical search is
terminated and no order is issued approving the physical
search, no information obtained or evidence derived from such
physical search shall be received in evidence or otherwise
disclosed in any trial, hearing, or other proceeding in or
before any court, grand jury, department, office, agency,
regulatory body, legislative committee, or other authority of
the United States, a State, or political subdivision thereof,
and no information concerning any United States person
acquired from such physical search shall subsequently be used
or disclosed in any other manner by Federal officers or
employees without the consent of such person, except with the
approval of the Attorney General if the information indicates
a threat of death or serious bodily harm to any person.
``(B) The Attorney General shall assess compliance with the
requirements of subparagraph (A).''.
(c) Conforming Amendments.--The Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.) is
amended--
(1) in section 304(a)(4), as redesignated by subsection (b)
of this section, by striking ``303(a)(7)(E)'' and inserting
``303(a)(6)(E)''; and
(2) in section 305(k)(2), by striking ``303(a)(7)'' and
inserting ``303(a)(6)''.
SEC. 108. AMENDMENTS FOR EMERGENCY PEN REGISTERS AND TRAP AND
TRACE DEVICES.
Section 403 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1843) is amended--
(1) in subsection (a)(2), by striking ``48 hours'' and
inserting ``7 days''; and
(2) in subsection (c)(1)(C), by striking ``48 hours'' and
inserting ``7 days''.
SEC. 109. FOREIGN INTELLIGENCE SURVEILLANCE COURT.
(a) Designation of Judges.--Subsection (a) of section 103
of the Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1803) is amended by inserting ``at least'' before
``seven of the United States judicial circuits''.
(b) En Banc Authority.--
(1) In general.--Subsection (a) of section 103 of the
Foreign Intelligence Surveillance Act of 1978, as amended by
subsection (a) of this section, is further amended--
(A) by inserting ``(1)'' after ``(a)''; and
(B) by adding at the end the following new paragraph:
``(2)(A) The court established under this subsection may,
on its own initiative, or upon the request of the Government
in any proceeding or a party under section 501(f) or
paragraph (4) or (5) of section 703(h), hold a hearing or
rehearing, en banc, when ordered by a majority of the judges
that constitute such court upon a determination that--
``(i) en banc consideration is necessary to secure or
maintain uniformity of the court's decisions; or
``(ii) the proceeding involves a question of exceptional
importance.
``(B) Any authority granted by this Act to a judge of the
court established under this subsection may be exercised by
the court en banc. When exercising such authority, the court
en banc shall comply with any requirements of this Act on the
exercise of such authority.
``(C) For purposes of this paragraph, the court en banc
shall consist of all judges who constitute the court
established under this subsection.''.
(2) Conforming amendments.--The Foreign Intelligence
Surveillance Act of 1978 is further amended--
(A) in subsection (a) of section 103, as amended by this
subsection, by inserting ``(except when sitting en banc under
paragraph (2))'' after ``no judge designated under this
subsection''; and
(B) in section 302(c) (50 U.S.C. 1822(c)), by inserting
``(except when sitting en banc)'' after ``except that no
judge''.
(c) Stay or Modification During an Appeal.--Section 103 of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1803) is amended--
(1) by redesignating subsection (f) as subsection (g); and
(2) by inserting after subsection (e) the following new
subsection:
``(f)(1) A judge of the court established under subsection
(a), the court established under subsection (b) or a judge of
that court, or the Supreme Court of the United States or a
justice of that court, may, in accordance with the rules of
their respective courts, enter a stay of an order or an order
modifying an order of the court established under subsection
(a) or the court established under subsection (b) entered
under any title of this Act, while the court established
under subsection (a) conducts a rehearing, while an appeal is
pending to the court established under subsection (b), or
while a petition of certiorari is pending in the Supreme
Court of the United States, or during the pendency of any
review by that court.
``(2) The authority described in paragraph (1) shall apply
to an order entered under any provision of this Act.''.
(d) Authority of Foreign Intelligence Surveillance Court.--
Section 103 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1803), as amended by this Act, is amended by
adding at the end the following:
``(h)(1) Nothing in this Act shall be considered to reduce
or contravene the inherent authority of the Foreign
Intelligence Surveillance Court to determine, or enforce,
compliance with an order or a rule of such Court or with a
procedure approved by such Court.
``(2) In this subsection, the terms `Foreign Intelligence
Surveillance Court' and `Court' mean the court established by
subsection (a).''.
SEC. 110. WEAPONS OF MASS DESTRUCTION.
(a) Definitions.--
(1) Foreign power.--Subsection (a)(4) of section 101 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(a)(4)) is amended by inserting ``, the international
proliferation of weapons of mass destruction,'' after
``international terrorism''.
(2) Agent of a foreign power.--Subsection (b)(1) of such
section 101 is amended--
(A) in subparagraph (B), by striking ``or'' at the end
(B) in subparagraph (C), by striking ``or'' at the end; and
(C) by adding at the end the following new subparagraphs:
``(D) engages in the international proliferation of weapons
of mass destruction, or activities in preparation therefor;
or
``(E) engages in the international proliferation of weapons
of mass destruction, or activities in preparation therefor,
for or on behalf of a foreign power; or''.
(3) Foreign intelligence information.--Subsection (e)(1)(B)
of such section 101 is amended by striking ``sabotage or
international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(4) Weapon of mass destruction.--Such section 101 is
amended by inserting after subsection (o) the following:
``(p) `Weapon of mass destruction' means--
``(1) any destructive device described in section
921(a)(4)(A) of title 18, United States Code, that is
intended or has the capability to cause death or serious
bodily injury to a significant number of people;
``(2) any weapon that is designed or intended to cause
death or serious bodily injury through the release,
dissemination, or impact of toxic or poisonous chemicals or
their precursors;
``(3) any weapon involving a biological agent, toxin, or
vector (as such terms are defined in section 178 of title 18,
United States Code); or
``(4) any weapon that is designed to release radiation or
radioactivity at a level dangerous to human life.''.
(b) Use of Information.--
(1) In general.--Section 106(k)(1)(B) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C.
1806(k)(1)(B)) is amended by striking ``sabotage or
international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(2) Physical searches.--Section 305(k)(1)(B) of such Act
(50 U.S.C. 1825(k)(1)(B)) is amended by striking ``sabotage
or international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(c) Technical and Conforming Amendment.--Section 301(1) of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1821(1)) is amended by inserting `` `weapon of mass
destruction','' after `` `person',''.
SEC. 111. TECHNICAL AND CONFORMING AMENDMENTS.
Section 103(e) of the Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1803(e)) is amended--
(1) in paragraph (1), by striking ``105B(h) or 501(f)(1)''
and inserting ``501(f)(1) or 703''; and
(2) in paragraph (2), by striking ``105B(h) or 501(f)(1)''
and inserting ``501(f)(1) or 703''.
TITLE II--PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS
SEC. 201. DEFINITIONS.
In this title:
(1) Assistance.--The term ``assistance'' means the
provision of, or the provision of access to, information
(including communication contents, communications records, or
other information relating to a customer or communication),
facilities, or another form of assistance.
(2) Contents.--The term ``contents'' has the meaning given
that term in section 101(n) of the
[[Page H1728]]
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(n)).
(3) Covered civil action.--The term ``covered civil
action'' means a civil action filed in a Federal or State
court that--
(A) alleges that an electronic communication service
provider furnished assistance to an element of the
intelligence community; and
(B) seeks monetary or other relief from the electronic
communication service provider related to the provision of
such assistance.
(4) Electronic communication service provider.--The term
``electronic communication service provider'' means--
(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
(B) a provider of an electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
(C) a provider of a remote computing service, as that term
is defined in section 2711 of title 18, United States Code;
(D) any other communication service provider who has access
to wire or electronic communications either as such
communications are transmitted or as such communications are
stored;
(E) a parent, subsidiary, affiliate, successor, or assignee
of an entity described in subparagraph (A), (B), (C), or (D);
or
(F) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), (D), or (E).
(5) Element of the intelligence community.--The term
``element of the intelligence community'' means an element of
the intelligence community specified in or designated under
section 3(4) of the National Security Act of 1947 (50 U.S.C.
401a(4)).
SEC. 202. LIMITATIONS ON CIVIL ACTIONS FOR ELECTRONIC
COMMUNICATION SERVICE PROVIDERS.
(a) Limitations.--
(1) In general.--Notwithstanding any other provision of
law, a covered civil action shall not lie or be maintained in
a Federal or State court, and shall be promptly dismissed, if
the Attorney General certifies to the court that--
(A) the assistance alleged to have been provided by the
electronic communication service provider was--
(i) in connection with an intelligence activity involving
communications that was--
(I) authorized by the President during the period beginning
on September 11, 2001, and ending on January 17, 2007; and
(II) designed to detect or prevent a terrorist attack, or
activities in preparation for a terrorist attack, against the
United States; and
(ii) described in a written request or directive from the
Attorney General or the head of an element of the
intelligence community (or the deputy of such person) to the
electronic communication service provider indicating that the
activity was--
(I) authorized by the President; and
(II) determined to be lawful; or
(B) the electronic communication service provider did not
provide the alleged assistance.
(2) Review.--A certification made pursuant to paragraph (1)
shall be subject to review by a court for abuse of
discretion.
(b) Review of Certifications.--If the Attorney General
files a declaration under section 1746 of title 28, United
States Code, that disclosure of a certification made pursuant
to subsection (a) would harm the national security of the
United States, the court shall--
(1) review such certification in camera and ex parte; and
(2) limit any public disclosure concerning such
certification, including any public order following such an
ex parte review, to a statement that the conditions of
subsection (a) have been met, without disclosing the
subparagraph of subsection (a)(1) that is the basis for the
certification.
(c) Nondelegation.--The authority and duties of the
Attorney General under this section shall be performed by the
Attorney General (or Acting Attorney General) or a designee
in a position not lower than the Deputy Attorney General.
(d) Civil Actions in State Court.--A covered civil action
that is brought in a State court shall be deemed to arise
under the Constitution and laws of the United States and
shall be removable under section 1441 of title 28, United
States Code.
(e) Rule of Construction.--Nothing in this section may be
construed to limit any otherwise available immunity,
privilege, or defense under any other provision of law.
(f) Effective Date and Application.--This section shall
apply to any covered civil action that is pending on or filed
after the date of enactment of this Act.
SEC. 203. PROCEDURES FOR IMPLEMENTING STATUTORY DEFENSES
UNDER THE FOREIGN INTELLIGENCE SURVEILLANCE ACT
OF 1978.
The Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1801 et seq.), as amended by section 101, is further
amended by adding after title VII the following new title:
``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
``SEC. 801. DEFINITIONS.
``In this title:
``(1) Assistance.--The term `assistance' means the
provision of, or the provision of access to, information
(including communication contents, communications records, or
other information relating to a customer or communication),
facilities, or another form of assistance.
``(2) Attorney general.--The term `Attorney General' has
the meaning give that term in section 101(g).
``(3) Contents.--The term `contents' has the meaning given
that term in section 101(n).
``(4) Electronic communication service provider.--The term
`electronic communication service provider' means--
``(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
``(B) a provider of electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
``(C) a provider of a remote computing service, as that
term is defined in section 2711 of title 18, United States
Code;
``(D) any other communication service provider who has
access to wire or electronic communications either as such
communications are transmitted or as such communications are
stored;
``(E) a parent, subsidiary, affiliate, successor, or
assignee of an entity described in subparagraph (A), (B),
(C), or (D); or
``(F) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), (D), or (E).
``(5) Element of the intelligence community.--The term
`element of the intelligence community' means an element of
the intelligence community as specified or designated under
section 3(4) of the National Security Act of 1947 (50 U.S.C.
401a(4)).
``(6) Person.--The term `person' means--
``(A) an electronic communication service provider; or
``(B) a landlord, custodian, or other person who may be
authorized or required to furnish assistance pursuant to--
``(i) an order of the court established under section
103(a) directing such assistance;
``(ii) a certification in writing under section
2511(2)(a)(ii)(B) or 2709(b) of title 18, United States Code;
or
``(iii) a directive under section 102(a)(4), 105B(e), as in
effect on the day before the date of the enactment of the
FISA Amendments Act of 2008 or 703(h).
``(7) State.--The term `State' means any State, political
subdivision of a State, the Commonwealth of Puerto Rico, the
District of Columbia, and any territory or possession of the
United States, and includes any officer, public utility
commission, or other body authorized to regulate an
electronic communication service provider.
``SEC. 802. PROCEDURES FOR IMPLEMENTING STATUTORY DEFENSES.
``(a) Requirement for Certification.--
``(1) In general.--Notwithstanding any other provision of
law, no civil action may lie or be maintained in a Federal or
State court against any person for providing assistance to an
element of the intelligence community, and shall be promptly
dismissed, if the Attorney General certifies to the court
that--
``(A) any assistance by that person was provided pursuant
to an order of the court established under section 103(a)
directing such assistance;
``(B) any assistance by that person was provided pursuant
to a certification in writing under section 2511(2)(a)(ii)(B)
or 2709(b) of title 18, United States Code;
``(C) any assistance by that person was provided pursuant
to a directive under sections 102(a)(4), 105B(e), as in
effect on the day before the date of the enactment of the
FISA Amendments Act of 2008, or 703(h) directing such
assistance; or
``(D) the person did not provide the alleged assistance.
``(2) Review.--A certification made pursuant to paragraph
(1) shall be subject to review by a court for abuse of
discretion.
``(b) Limitations on Disclosure.--If the Attorney General
files a declaration under section 1746 of title 28, United
States Code, that disclosure of a certification made pursuant
to subsection (a) would harm the national security of the
United States, the court shall--
``(1) review such certification in camera and ex parte; and
``(2) limit any public disclosure concerning such
certification, including any public order following such an
ex parte review, to a statement that the conditions of
subsection (a) have been met, without disclosing the
subparagraph of subsection (a)(1) that is the basis for the
certification.
``(c) Removal.--A civil action against a person for
providing assistance to an element of the intelligence
community that is brought in a State court shall be deemed to
arise under the Constitution and laws of the United States
and shall be removable under section 1441 of title 28, United
States Code.
``(d) Relationship to Other Laws.--Nothing in this section
may be construed to limit any otherwise available immunity,
privilege, or defense under any other provision of law.
``(e) Applicability.--This section shall apply to a civil
action pending on or filed after the date of enactment of the
FISA Amendments Act of 2008.''.
SEC. 204. PREEMPTION OF STATE INVESTIGATIONS.
Title VIII of the Foreign Intelligence Surveillance Act (50
U.S.C. 1801 et seq.), as added by section 203 of this Act, is
amended by adding at the end the following new section:
``SEC. 803. PREEMPTION.
``(a) In General.--No State shall have authority to--
``(1) conduct an investigation into an electronic
communication service provider's alleged assistance to an
element of the intelligence community;
``(2) require through regulation or any other means the
disclosure of information about an electronic communication
service provider's alleged assistance to an element of the
intelligence community;
``(3) impose any administrative sanction on an electronic
communication service provider for assistance to an element
of the intelligence community; or
[[Page H1729]]
``(4) commence or maintain a civil action or other
proceeding to enforce a requirement that an electronic
communication service provider disclose information
concerning alleged assistance to an element of the
intelligence community.
``(b) Suits by the United States.--The United States may
bring suit to enforce the provisions of this section.
``(c) Jurisdiction.--The district courts of the United
States shall have jurisdiction over any civil action brought
by the United States to enforce the provisions of this
section.
``(d) Application.--This section shall apply to any
investigation, action, or proceeding that is pending on or
filed after the date of enactment of the FISA Amendments Act
of 2008.''.
SEC. 205. TECHNICAL AMENDMENTS.
The table of contents in the first section of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.), as amended by section 101(b), is further amended by
adding at the end the following:
``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
``Sec. 801. Definitions.
``Sec. 802. Procedures for implementing statutory defenses.
``Sec. 803. Preemption.''.
TITLE III--OTHER PROVISIONS
SEC. 301. SEVERABILITY.
If any provision of this Act, any amendment made by this
Act, or the application thereof to any person or
circumstances is held invalid, the validity of the remainder
of the Act, any such amendments, and of the application of
such provisions to other persons and circumstances shall not
be affected thereby.
SEC. 302. EFFECTIVE DATE; REPEAL; TRANSITION PROCEDURES.
(a) In General.--Except as provided in subsection (c), the
amendments made by this Act shall take effect on the date of
the enactment of this Act.
(b) Repeal.--
(1) In general.--Except as provided in subsection (c),
sections 105A, 105B, and 105C of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1805a, 1805b, and 1805c)
are repealed.
(2) Table of contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.) is amended by striking the items
relating to sections 105A, 105B, and 105C.
(c) Transitions Procedures.--
(1) Protection from liability.--Notwithstanding subsection
(b)(1), subsection (l) of section 105B of the Foreign
Intelligence Surveillance Act of 1978 shall remain in effect
with respect to any directives issued pursuant to such
section 105B for information, facilities, or assistance
provided during the period such directive was or is in
effect.
(2) Orders in effect.--
(A) Orders in effect on date of enactment.--Notwithstanding
any other provision of this Act or of the Foreign
Intelligence Surveillance Act of 1978--
(i) any order in effect on the date of enactment of this
Act issued pursuant to the Foreign Intelligence Surveillance
Act of 1978 or section 6(b) of the Protect America Act of
2007 (Public Law 110-55; 121 Stat. 556) shall remain in
effect until the date of expiration of such order; and
(ii) at the request of the applicant, the court established
under section 103(a) of the Foreign Intelligence Surveillance
Act of 1978 (50 U.S.C. 1803(a)) shall reauthorize such order
if the facts and circumstances continue to justify issuance
of such order under the provisions of such Act, as in effect
on the day before the date of the enactment of the Protect
America Act of 2007, except as amended by sections 102, 103,
104, 105, 106, 107, 108, 109, and 110 of this Act.
(B) Orders in effect on december 31, 2013.--Any order
issued under title VII of the Foreign Intelligence
Surveillance Act of 1978, as amended by section 101 of this
Act, in effect on December 31, 2013, shall continue in effect
until the date of the expiration of such order. Any such
order shall be governed by the applicable provisions of the
Foreign Intelligence Surveillance Act of 1978, as so amended.
(3) Authorizations and directives in effect.--
(A) Authorizations and directives in effect on date of
enactment.--Notwithstanding any other provision of this Act
or of the Foreign Intelligence Surveillance Act of 1978, any
authorization or directive in effect on the date of the
enactment of this Act issued pursuant to the Protect America
Act of 2007, or any amendment made by that Act, shall remain
in effect until the date of expiration of such authorization
or directive. Any such authorization or directive shall be
governed by the applicable provisions of the Protect America
Act of 2007 (121 Stat. 552), and the amendment made by that
Act, and, except as provided in paragraph (4) of this
subsection, any acquisition pursuant to such authorization or
directive shall be deemed not to constitute electronic
surveillance (as that term is defined in section 101(f) of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(f)), as construed in accordance with section 105A of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1805a)).
(B) Authorizations and directives in effect on december 31,
2013.--Any authorization or directive issued under title VII
of the Foreign Intelligence Surveillance Act of 1978, as
amended by section 101 of this Act, in effect on December 31,
2013, shall continue in effect until the date of the
expiration of such authorization or directive. Any such
authorization or directive shall be governed by the
applicable provisions of the Foreign Intelligence
Surveillance Act of 1978, as so amended, and, except as
provided in section 707 of the Foreign Intelligence
Surveillance Act of 1978, as so amended, any acquisition
pursuant to such authorization or directive shall be deemed
not to constitute electronic surveillance (as that term is
defined in section 101(f) of the Foreign Intelligence
Surveillance Act of 1978, to the extent that such section
101(f) is limited by section 701 of the Foreign Intelligence
Surveillance Act of 1978, as so amended).
(4) Use of information acquired under protect america
act.--Information acquired from an acquisition conducted
under the Protect America Act of 2007, and the amendments
made by that Act, shall be deemed to be information acquired
from an electronic surveillance pursuant to title I of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801
et seq.) for purposes of section 106 of that Act (50 U.S.C.
1806), except for purposes of subsection (j) of such section.
(5) New orders.--Notwithstanding any other provision of
this Act or of the Foreign Intelligence Surveillance Act of
1978--
(A) the government may file an application for an order
under the Foreign Intelligence Surveillance Act of 1978, as
in effect on the day before the date of the enactment of the
Protect America Act of 2007, except as amended by sections
102, 103, 104, 105, 106, 107, 108, 109, and 110 of this Act;
and
(B) the court established under section 103(a) of the
Foreign Intelligence Surveillance Act of 1978 shall enter an
order granting such an application if the application meets
the requirements of such Act, as in effect on the day before
the date of the enactment of the Protect America Act of 2007,
except as amended by sections 102, 103, 104, 105, 106, 107,
108, 109, and 110 of this Act.
(6) Extant authorizations.--At the request of the
applicant, the court established under section 103(a) of the
Foreign Intelligence Surveillance Act of 1978 shall
extinguish any extant authorization to conduct electronic
surveillance or physical search entered pursuant to such Act.
(7) Applicable provisions.--Any surveillance conducted
pursuant to an order entered pursuant to this subsection
shall be subject to the provisions of the Foreign
Intelligence Surveillance Act of 1978, as in effect on the
day before the date of the enactment of the Protect America
Act of 2007, except as amended by sections 102, 103, 104,
105, 106, 107, 108, 109, and 110 of this Act.
(8) Transition procedures concerning the targeting of
united states persons overseas.--Any authorization in effect
on the date of enactment of this Act under section 2.5 of
Executive Order 12333 to intentionally target a United States
person reasonably believed to be located outside the United
States shall remain in effect, and shall constitute a
sufficient basis for conducting such an acquisition targeting
a United States person located outside the United States
until the earlier of--
(A) the date that authorization expires; or
(B) the date that is 90 days after the date of the
enactment of this Act.
Motion Offered by Mr. Conyers
Mr. CONYERS. Mr. Speaker, pursuant to House Resolution 1041, I have a
motion at the desk.
The SPEAKER pro tempore. The Clerk will designate the motion.
The text of the motion is as follows:
Motion offered by Mr. Conyers:
Mr. Conyers moves that the House concur in the Senate
amendment to H.R. 3773 with the amendment printed in House
Report 110-549.
The text of the House amendment to the Senate amendment is as
follows:
In lieu of the matter proposed to be inserted by the
Senate, insert the following:
SEC. 1. SHORT TITLE; TABLE OF CONTENTS.
(a) Short Title.--This Act may be cited as the ``Foreign
Intelligence Surveillance Act of 1978 Amendments Act of
2008'' or the ``FISA Amendments Act of 2008''.
(b) Table of Contents.--The table of contents for this Act
is as follows:
Sec. 1. Short title; table of contents.
TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE
Sec. 101. Additional procedures regarding certain persons outside the
United States.
Sec. 102. Statement of exclusive means by which electronic surveillance
and interception of certain communications may be
conducted.
Sec. 103. Submittal to Congress of certain court orders under the
Foreign Intelligence Surveillance Act of 1978.
Sec. 104. Applications for court orders.
Sec. 105. Issuance of an order.
Sec. 106. Use of information.
Sec. 107. Amendments for physical searches.
Sec. 108. Amendments for emergency pen registers and trap and trace
devices.
Sec. 109. Foreign intelligence surveillance court.
Sec. 110. Review of previous actions.
Sec. 111. Weapons of mass destruction.
Sec. 112. Statute of limitations.
TITLE II--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
Sec. 201. Statutory defenses.
Sec. 202. Technical amendments.
TITLE III--COMMISSION ON WARRANTLESS ELECTRONIC SURVEILLANCE ACTIVITIES
Sec. 301. Commission on Warrantless Electronic Surveillance Activities.
TITLE IV--OTHER PROVISIONS
Sec. 401. Severability.
[[Page H1730]]
Sec. 402. Effective date.
Sec. 403. Repeals.
Sec. 404. Transition procedures.
Sec. 405. No rights under the FISA Amendments Act of 2008 for
undocumented aliens.
Sec. 406. Surveillance to protect the United States.
TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE
SEC. 101. ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS
OUTSIDE THE UNITED STATES.
(a) In General.--The Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1801 et seq.) is amended--
(1) by striking title VII; and
(2) by adding after title VI the following new title:
``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
THE UNITED STATES
``SEC. 701. DEFINITIONS.
``(a) In General.--The terms `agent of a foreign power',
`Attorney General', `contents', `electronic surveillance',
`foreign intelligence information', `foreign power',
`minimization procedures', `person', `United States', and
`United States person' have the meanings given such terms in
section 101, except as specifically provided in this title.
``(b) Additional Definitions.--
``(1) Congressional intelligence committees.--The term
`congressional intelligence committees' means--
``(A) the Select Committee on Intelligence of the Senate;
and
``(B) the Permanent Select Committee on Intelligence of the
House of Representatives.
``(2) Foreign intelligence surveillance court; court.--The
terms `Foreign Intelligence Surveillance Court' and `Court'
mean the court established by section 103(a).
``(3) Foreign intelligence surveillance court of review;
court of review.--The terms `Foreign Intelligence
Surveillance Court of Review' and `Court of Review' mean the
court established by section 103(b).
``(4) Electronic communication service provider.--The term
`electronic communication service provider' means--
``(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
``(B) a provider of electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
``(C) a provider of a remote computing service, as that
term is defined in section 2711 of title 18, United States
Code;
``(D) any other communication service provider who has
access to wire or electronic communications either as such
communications are transmitted or as such communications are
stored; or
``(E) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), or (D).
``(5) Intelligence community.--The term `intelligence
community' has the meaning given the term in section 3(4) of
the National Security Act of 1947 (50 U.S.C. 401a(4)).
``SEC. 702. PROCEDURES FOR TARGETING CERTAIN PERSONS OUTSIDE
THE UNITED STATES OTHER THAN UNITED STATES
PERSONS.
``(a) Authorization.--Notwithstanding any other provision
of law, pursuant to an order issued in accordance with
subsection (i)(3) or a determination under subsection
(g)(1)(B), the Attorney General and the Director of National
Intelligence may authorize jointly, for a period of up to 1
year from the effective date of the authorization, the
targeting of persons reasonably believed to be located
outside the United States to acquire foreign intelligence
information.
``(b) Limitations.--An acquisition authorized under
subsection (a)--
``(1) may not intentionally target any person known at the
time of acquisition to be located in the United States;
``(2) may not intentionally target a person reasonably
believed to be located outside the United States in order to
target a particular, known person reasonably believed to be
in the United States;
``(3) may not intentionally target a United States person
reasonably believed to be located outside the United States;
``(4) may not intentionally acquire any communication as to
which the sender and all intended recipients are known at the
time of the acquisition to be located in the United States;
and
``(5) shall be conducted in a manner consistent with the
fourth amendment to the Constitution of the United States.
``(c) Conduct of Acquisition.--An acquisition authorized
under subsection (a) may be conducted only in accordance
with--
``(1) a certification made by the Attorney General and the
Director of National Intelligence pursuant to subsection (g)
or a determination under paragraph (1)(B) of such subsection;
and
``(2) the procedures and guidelines required pursuant to
subsections (d), (e), and (f).
``(d) Targeting Procedures.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt targeting procedures that are reasonably designed
to ensure that any acquisition authorized under subsection
(a) is limited to targeting persons reasonably believed to be
located outside the United States and does not result in the
intentional acquisition of any communication as to which the
sender and all intended recipients are known at the time of
the acquisition to be located in the United States.
``(2) Judicial review.--The procedures required by
paragraph (1) shall be subject to judicial review pursuant to
subsection (i).
``(e) Minimization Procedures.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt minimization procedures for acquisitions
authorized under subsection (a) that--
``(A) in the case of electronic surveillance, meet the
definition of minimization procedures under section 101(h);
and
``(B) in the case of a physical search, meet the definition
of minimization procedures under section 301(4).
``(2) Judicial review.--The minimization procedures
required by paragraph (1) shall be subject to judicial review
pursuant to subsection (i).
``(f) Guidelines for Compliance With Limitations.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt guidelines to ensure--
``(A) compliance with the limitations in subsection (b);
and
``(B) that an application is filed under section 104 or
303, if required by this Act.
``(2) Criteria.--With respect to subsection (b)(2), the
guidelines adopted pursuant to paragraph (1) shall contain
specific criteria for determining whether a significant
purpose of an acquisition is to acquire the communications of
a specific United States person reasonably believed to be
located in the United States. Such criteria shall include
consideration of whether--
``(A) the department or agency of the Federal Government
conducting the acquisition has made an inquiry to another
department or agency of the Federal Government to gather
information on the specific United States person;
``(B) the department or agency of the Federal Government
conducting the acquisition has provided information that
identifies the specific United States person to another
department or agency of the Federal Government;
``(C) the department or agency of the Federal Government
conducting the acquisition determines that the specific
United States person has been the subject of ongoing interest
or repeated investigation by a department or agency of the
Federal Government; and
``(D) the specific United States person is a natural
person.
``(3) Training.--The Director of National Intelligence
shall establish a training program for appropriate personnel
of the intelligence community to ensure that the guidelines
adopted pursuant to paragraph (1) are properly implemented.
``(4) Submission to congress and foreign intelligence
surveillance court.--The Attorney General shall submit the
guidelines adopted pursuant to paragraph (1) to--
``(A) the congressional intelligence committees;
``(B) the Committees on the Judiciary of the House of
Representatives and the Senate; and
``(C) the Foreign Intelligence Surveillance Court.
``(g) Certification.--
``(1) In general.--
``(A) Requirement.--Subject to subparagraph (B), if the
Attorney General and the Director of National Intelligence
seek to authorize an acquisition under this section, the
Attorney General and the Director of National Intelligence
shall provide, under oath, a written certification, as
described in this subsection.
``(B) Emergency authorization.--If the Attorney General and
the Director of National Intelligence determine that an
emergency situation exists, immediate action by the
Government is required, and time does not permit the
completion of judicial review pursuant to subsection (i)
prior to the initiation of an acquisition, the Attorney
General and the Director of National Intelligence may
authorize the acquisition and shall submit to the Foreign
Intelligence Surveillance Court a certification under this
subsection as soon as possible but in no event more than 7
days after such determination is made.
``(2) Requirements.--A certification made under this
subsection shall--
``(A) attest that--
``(i) there are reasonable procedures in place for
determining that the acquisition authorized under subsection
(a)--
``(I) is targeted at persons reasonably believed to be
located outside the United States and such procedures have
been submitted to the Foreign Intelligence Surveillance
Court; and
``(II) does not result in the intentional acquisition of
any communication as to which the sender and all intended
recipients are known at the time of the acquisition to be
located in the United States, and such procedures have been
submitted to the Foreign Intelligence Surveillance Court;
``(ii) guidelines have been adopted in accordance with
subsection (f) to ensure compliance with the limitations in
subsection (b) and to ensure that applications are filed
under section 104 or section 303, if required by this Act;
``(iii) the minimization procedures to be used with respect
to such acquisition--
``(I) meet the definition of minimization procedures under
section 101(h) or section 301(4) in accordance with
subsection (e); and
[[Page H1731]]
``(II) have been submitted to the Foreign Intelligence
Surveillance Court;
``(iv) the procedures and guidelines referred to in clauses
(i), (ii), and (iii) are consistent with the requirements of
the fourth amendment to the Constitution of the United
States;
``(v) a significant purpose of the acquisition is to obtain
foreign intelligence information;
``(vi) the acquisition involves obtaining the foreign
intelligence information from or with the assistance of an
electronic communication service provider; and
``(vii) the acquisition complies with the limitations in
subsection (b);
``(B) be supported, as appropriate, by the affidavit of any
appropriate official in the area of national security who
is--
``(i) appointed by the President, by and with the consent
of the Senate; or
``(ii) the head of an element of the intelligence
community; and
``(C) include--
``(i) an effective date for the authorization that is
between 30 and 60 days from the submission of the written
certification to the court; or
``(ii) if the acquisition has begun or will begin in less
than 30 days from the submission of the written certification
to the court--
``(I) the date the acquisition began or the effective date
for the acquisition;
``(II) a description of why implementation was required in
less than 30 days from the submission of the written
certification to the court; and
``(III) if the acquisition is authorized under paragraph
(1)(B), the basis for the determination that an emergency
situation exists, immediate action by the government is
required, and time does not permit the completion of judicial
review prior to the initiation of the acquisition.
``(3) Limitation.--A certification made under this
subsection is not required to identify the specific
facilities, places, premises, or property at which the
acquisition authorized under subsection (a) will be directed
or conducted.
``(4) Submission to the court.--The Attorney General shall
transmit a copy of a certification made under this
subsection, and any supporting affidavit, under seal to the
Foreign Intelligence Surveillance Court before the initiation
of an acquisition under this section, except in accordance
with paragraph (1)(B). The Attorney General shall maintain
such certification under security measures adopted by the
Chief Justice of the United States and the Attorney General,
in consultation with the Director of National Intelligence.
``(5) Review.--A certification submitted pursuant to this
subsection shall be subject to judicial review pursuant to
subsection (i).
``(h) Directives and Judicial Review of Directives.--
``(1) Authority.--Pursuant to an order issued in accordance
with subsection (i)(3) or a determination under subsection
(g)(1)(B), the Attorney General and the Director of National
Intelligence may direct, in writing, an electronic
communication service provider to--
``(A) immediately provide the Government with all
information, facilities, or assistance necessary to
accomplish the acquisition authorized in accordance with this
section in a manner that will protect the secrecy of the
acquisition and produce a minimum of interference with the
services that such electronic communication service provider
is providing to the target of the acquisition; and
``(B) maintain under security procedures approved by the
Attorney General and the Director of National Intelligence
any records concerning the acquisition or the aid furnished
that such electronic communication service provider wishes to
maintain.
``(2) Compensation.--The Government shall compensate, at
the prevailing rate, an electronic communication service
provider for providing information, facilities, or assistance
pursuant to paragraph (1).
``(3) Release from liability.--Notwithstanding any other
provision of law, no cause of action shall lie in any court
against any electronic communication service provider for
providing any information, facilities, or assistance in
accordance with a directive issued pursuant to paragraph (1).
``(4) Challenging of directives.--
``(A) Authority to challenge.--An electronic communication
service provider receiving a directive issued pursuant to
paragraph (1) may challenge the directive by filing a
petition with the Foreign Intelligence Surveillance Court,
which shall have jurisdiction to review such a petition.
``(B) Assignment.--The presiding judge of the Court shall
assign the petition filed under subparagraph (A) to 1 of the
judges serving in the pool established by section 103(e)(1)
not later than 24 hours after the filing of the petition.
``(C) Standards for review.--A judge considering a petition
to modify or set aside a directive may grant such petition
only if the judge finds that the directive does not meet the
requirements of this section or is otherwise unlawful.
``(D) Procedures for initial review.--A judge shall conduct
an initial review of a petition filed under subparagraph (A)
not later than 5 days after being assigned such petition. If
the judge determines that the petition does not consist of
claims, defenses, or other legal contentions that are
warranted by existing law, a nonfrivolous argument for
extending, modifying, or reversing existing law, or
establishing new law, the judge shall immediately deny the
petition and affirm the directive or any part of the
directive that is the subject of the petition and order the
recipient to comply with the directive or any part of it.
Upon making such a determination or promptly thereafter, the
judge shall provide a written statement for the record of the
reasons for a determination under this subparagraph.
``(E) Procedures for plenary review.--If a judge determines
that a petition filed under subparagraph (A) requires plenary
review, the judge shall affirm, modify, or set aside the
directive that is the subject of that petition not later than
30 days after being assigned the petition. If the judge does
not set aside the directive, the judge shall immediately
affirm or modify the directive and order the recipient to
comply with the directive in its entirety or as modified. The
judge shall provide a written statement for the records of
the reasons for a determination under this subparagraph.
``(F) Continued effect.--Any directive not explicitly
modified or set aside under this paragraph shall remain in
full effect.
``(G) Contempt of court.--Failure to obey an order of the
Court issued under this paragraph may be punished by the
Court as contempt of court.
``(5) Enforcement of directives.--
``(A) Order to compel.--If an electronic communication
service provider fails to comply with a directive issued
pursuant to paragraph (1), the Attorney General may file a
petition for an order to compel the electronic communication
service provider to comply with the directive with the
Foreign Intelligence Surveillance Court, which shall have
jurisdiction to review such a petition.
``(B) Assignment.--The presiding judge of the Court shall
assign a petition filed under subparagraph (A) to 1 of the
judges serving in the pool established by section 103(e)(1)
not later than 24 hours after the filing of the petition.
``(C) Procedures for review.--A judge considering a
petition filed under subparagraph (A) shall issue an order
requiring the electronic communication service provider to
comply with the directive or any part of it, as issued or as
modified not later than 30 days after being assigned the
petition if the judge finds that the directive meets the
requirements of this section and is otherwise lawful. The
judge shall provide a written statement for the record of the
reasons for a determination under this paragraph.
``(D) Contempt of court.--Failure to obey an order of the
Court issued under this paragraph may be punished by the
Court as contempt of court.
``(E) Process.--Any process under this paragraph may be
served in any judicial district in which the electronic
communication service provider may be found.
``(6) Appeal.--
``(A) Appeal to the court of review.--The Government or an
electronic communication service provider receiving a
directive issued pursuant to paragraph (1) may file a
petition with the Foreign Intelligence Surveillance Court of
Review for review of a decision issued pursuant to paragraph
(4) or (5). The Court of Review shall have jurisdiction to
consider such a petition and shall provide a written
statement for the record of the reasons for a decision under
this paragraph.
``(B) Certiorari to the supreme court.--The Government or
an electronic communication service provider receiving a
directive issued pursuant to paragraph (1) may file a
petition for a writ of certiorari for review of the decision
of the Court of Review issued under subparagraph (A). The
record for such review shall be transmitted under seal to the
Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``(i) Judicial Review of Certifications and Procedures.--
``(1) In general.--
``(A) Review by the foreign intelligence surveillance
court.--The Foreign Intelligence Surveillance Court shall
have jurisdiction to review any certification submitted
pursuant to subsection (g) and the targeting and minimization
procedures required by subsections (d) and (e).
``(B) Time period for review.--The Court shall review the
certification submitted pursuant to subsection (g) and the
targeting and minimization procedures required by subsections
(d) and (e) and approve or deny an order under this
subsection not later than 30 days after the date on which a
certification is submitted.
``(2) Review.--The Court shall review the following:
``(A) Certifications.--A certification submitted pursuant
to subsection (g) to determine whether the certification
contains all the required elements.
``(B) Targeting procedures.--The targeting procedures
required by subsection (d) to assess whether the procedures
are reasonably designed to ensure that the acquisition
authorized under subsection (a) is limited to the targeting
of persons reasonably believed to be located outside the
United States and does not result in the intentional
acquisition of any communication as to which the sender and
all intended recipients are known at the time of the
acquisition to be located in the United States.
``(C) Minimization procedures.--The minimization procedures
required by subsection (e) to assess whether such procedures
meet the definition of minimization procedures
[[Page H1732]]
under section 101(h) or section 301(4) in accordance with
subsection (e).
``(3) Orders.--
``(A) Approval.--If the Court finds that a certification
submitted pursuant to subsection (g) contains all of the
required elements and that the procedures required by
subsections (d) and (e) are consistent with the requirements
of those subsections and with the fourth amendment to the
Constitution of the United States, the Court shall enter an
order approving the certification and the use of the
procedures for the acquisition.
``(B) Correction of deficiencies.--If the Court finds that
a certification submitted pursuant to subsection (g) does not
contain all of the required elements or that the procedures
required by subsections (d) and (e) are not consistent with
the requirements of those subsections or the fourth amendment
to the Constitution of the United States--
``(i) in the case of a certification submitted in
accordance with subsection (g)(1)(A), the Court shall deny
the order, identify any deficiency in the certification or
procedures, and provide the Government with an opportunity to
correct such deficiency; and
``(ii) in the case of a certification submitted in
accordance with subsection (g)(1)(B), the Court shall issue
an order directing the Government to, at the Government's
election and to the extent required by the Court's order--
``(I) correct any deficiency identified by the Court not
later than 30 days after the date the Court issues the order;
or
``(II) cease the acquisition authorized under subsection
(g)(1)(B).
``(C) Requirement for written statement.--In support of its
orders under this subsection, the Court shall provide,
simultaneously with the orders, for the record a written
statement of its reasons.
``(4) Appeal.--
``(A) Appeal to the court of review.--The Government may
appeal any order under this section to the Foreign
Intelligence Surveillance Court of Review, which shall have
jurisdiction to review such order. For any decision
affirming, reversing, or modifying an order of the Foreign
Intelligence Surveillance Court, the Court of Review shall
provide for the record a written statement of its reasons.
``(B) Continuation of acquisition pending rehearing or
appeal.--Any acquisition affected by an order under paragraph
(3)(B)(ii) may continue--
``(i) during the pendency of any rehearing of the order by
the Court en banc; and
``(ii) if the Government appeals an order under this
section, subject to subparagraph (C), until the Court of
Review enters an order under subparagraph (A).
``(C) Implementation of emergency authority pending
appeal.--Not later than 60 days after the filing of an appeal
of an order issued under paragraph (3)(B)(ii) directing the
correction of a deficiency, the Court of Review shall
determine, and enter a corresponding order regarding whether
all or any part of the correction order, as issued or
modified, shall be implemented during the pendency of the
appeal. The Government shall conduct an acquisition affected
by such order issued under paragraph (3)(B)(ii) in accordance
with an order issued under this subparagraph or shall cease
such acquisition.
``(D) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review issued under subparagraph
(A). The record for such review shall be transmitted under
seal to the Supreme Court of the United States, which shall
have jurisdiction to review such decision.
``(5) Schedule.--
``(A) Replacement of authorizations in effect.--If the
Attorney General and the Director of National Intelligence
seek to replace an authorization issued pursuant to section
105B of the Foreign Intelligence Surveillance Act of 1978, as
added by section 2 of the Protect America Act of 2007 (Public
Law 110-55), the Attorney General and the Director of
National Intelligence shall, to the extent practicable,
submit to the Court a certification under subsection (g) and
the procedures required by subsections (d), (e), and (f) at
least 30 days before the expiration of such authorization.
``(B) Reauthorization of authorizations in effect.--If the
Attorney General and the Director of National Intelligence
seek to replace an authorization issued pursuant to this
section, the Attorney General and the Director of National
Intelligence shall, to the extent practicable, submit to the
Court a certification under subsection (g) and the procedures
required by subsections (d), (e), and (f) at least 30 days
prior to the expiration of such authorization.
``(C) Consolidated submissions.--The Attorney General and
Director of National Intelligence shall, to the extent
practicable, annually submit to the Court a consolidation
of--
``(i) certifications under subsection (g) for
reauthorization of authorizations in effect;
``(ii) the procedures required by subsections (d), (e), and
(f); and
``(iii) the annual review required by subsection (l)(3) for
the preceding year.
``(D) Timing of reviews.--The Attorney General and the
Director of National Intelligence shall, to the extent
practicable, schedule the completion of the annual review
under subsection (l)(3) and a semiannual assessment under
subsection (l)(1) so that they may be submitted to the Court
at the time of the consolidated submission under subparagraph
(C).
``(E) Construction.--The requirements of subparagraph (C)
shall not be construed to preclude the Attorney General and
the Director of National Intelligence from submitting
certifications for additional authorizations at other times
during the year as necessary.
``(6) Compliance.--At or before the end of the period of
time for which a certification submitted pursuant to
subsection (g) and procedures required by subsection (d) and
(e) are approved by an order under this section, the Foreign
Intelligence Surveillance Court may assess compliance with
the minimization procedures required by subsection (e) by
reviewing the circumstances under which information
concerning United States persons was acquired, retained, or
disseminated.
``(j) Judicial Proceedings.--
``(1) Expedited proceedings.--Judicial proceedings under
this section shall be conducted as expeditiously as possible.
``(2) Time limits.--A time limit for a judicial decision in
this section shall apply unless the Court, the Court of
Review, or any judge of either the Court or the Court of
Review, by order for reasons stated, extends that time for
good cause.
``(k) Maintenance and Security of Records and
Proceedings.--
``(1) Standards.--The Foreign Intelligence Surveillance
Court shall maintain a record of a proceeding under this
section, including petitions filed, orders granted, and
statements of reasons for decision, under security measures
adopted by the Chief Justice of the United States, in
consultation with the Attorney General and the Director of
National Intelligence.
``(2) Filing and review.--All petitions under this section
shall be filed under seal. In any proceedings under this
section, the court shall, upon request of the Government,
review ex parte and in camera any Government submission, or
portions of a submission, which may include classified
information.
``(3) Retention of records.--The Director of National
Intelligence and the Attorney General shall retain a
directive made or an order granted under this section for a
period of not less than 10 years from the date on which such
directive or such order is made.
``(l) Assessments and Reviews.--
``(1) Semiannual assessment.--Not less frequently than once
every 6 months, the Attorney General and Director of National
Intelligence shall assess compliance with the procedures and
guidelines required by subsections (d), (e), and (f) and
shall submit each assessment to--
``(A) the congressional intelligence committees;
``(B) the Committees on the Judiciary of the House of
Representatives and the Senate; and
``(C) the Foreign Intelligence Surveillance Court.
``(2) Agency assessment.--The Inspectors General of the
Department of Justice and of each element of the intelligence
community authorized to acquire foreign intelligence
information under subsection (a), with respect to such
Department or such element--
``(A) are authorized to review compliance with the
procedures and guidelines required by subsections (d), (e),
and (f);
``(B) with respect to acquisitions authorized under
subsection (a), shall review the disseminated intelligence
reports containing a reference to a United States person
identity and the number of United States person identities
subsequently disseminated by the element concerned in
response to requests for identities that were not referred to
by name or title in the original reporting;
``(C) with respect to acquisitions authorized under
subsection (a), shall review the targets that were later
determined to be located in the United States and, to the
extent possible, whether their communications were reviewed;
and
``(D) shall provide each such review to--
``(i) the Attorney General;
``(ii) the Director of National Intelligence;
``(iii) the congressional intelligence committees;
``(iv) the Committees on the Judiciary of the House of
Representatives and the Senate; and
``(v) the Foreign Intelligence Surveillance Court.
``(3) Annual review.--
``(A) Requirement to conduct.--The head of each element of
the intelligence community conducting an acquisition
authorized under subsection (a) shall conduct an annual
review to determine whether there is reason to believe that
foreign intelligence information has been or will be obtained
from the acquisition. The annual review shall provide, with
respect to such acquisitions authorized under subsection
(a)--
``(i) the number and nature of disseminated intelligence
reports containing a reference to a United States person
identity;
``(ii) the number and nature of United States person
identities subsequently disseminated by that element in
response to requests for identities that were not referred to
by name or title in the original reporting;
``(iii) the number of targets that were later determined to
be located in the United States and, to the extent possible,
whether their communications were reviewed; and
``(iv) a description of any procedures developed by the
head of such element of the intelligence community and
approved by the Director of National Intelligence to assess,
[[Page H1733]]
in a manner consistent with national security, operational
requirements and the privacy interests of United States
persons, the extent to which the acquisitions authorized
under subsection (a) acquire the communications of United
States persons, and the results of any such assessment.
``(B) Use of review.--The head of each element of the
intelligence community that conducts an annual review under
subparagraph (A) shall use each such review to evaluate the
adequacy of the minimization procedures utilized by such
element or the application of the minimization procedures to
a particular acquisition authorized under subsection (a).
``(C) Provision of review.--The head of each element of the
intelligence community that conducts an annual review under
subparagraph (A) shall provide such review to--
``(i) the Foreign Intelligence Surveillance Court;
``(ii) the Attorney General;
``(iii) the Director of National Intelligence;
``(iv) the congressional intelligence committees; and
``(v) the Committees on the Judiciary of the House of
Representatives and the Senate.
``(m) Construction.--Nothing in this Act shall be construed
to require an application under section 104 for an
acquisition that is targeted in accordance with this section
at a person reasonably believed to be located outside the
United States.
``SEC. 703. CERTAIN ACQUISITIONS INSIDE THE UNITED STATES OF
UNITED STATES PERSONS OUTSIDE THE UNITED
STATES.
``(a) Jurisdiction of the Foreign Intelligence Surveillance
Court.--
``(1) In general.--The Foreign Intelligence Surveillance
Court shall have jurisdiction to review an application and
enter an order approving the targeting of a United States
person reasonably believed to be located outside the United
States to acquire foreign intelligence information if the
acquisition constitutes electronic surveillance or the
acquisition of stored electronic communications or stored
electronic data that requires an order under this Act and
such acquisition is conducted within the United States.
``(2) Limitation.--If a United States person targeted under
this subsection is reasonably believed to be located in the
United States during the pendency of an order issued pursuant
to subsection (c), such acquisition shall cease unless
authority, other than under this section, is obtained
pursuant to this Act or the targeted United States person is
again reasonably believed to be located outside the United
States during the pendency of an order issued pursuant to
subsection (c).
``(b) Application.--
``(1) In general.--Each application for an order under this
section shall be made by a Federal officer in writing upon
oath or affirmation to a judge having jurisdiction under
subsection (a)(1). Each application shall require the
approval of the Attorney General based upon the Attorney
General's finding that it satisfies the criteria and
requirements of such application, as set forth in this
section, and shall include--
``(A) the identity of the Federal officer making the
application;
``(B) the identity, if known, or a description of the
United States person who is the target of the acquisition;
``(C) a statement of the facts and circumstances relied
upon to justify the applicant's belief that the United States
person who is the target of the acquisition is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(D) a statement of proposed minimization procedures
that--
``(i) in the case of electronic surveillance, meet the
definition of minimization procedures in section 101(h); and
``(ii) in the case of a physical search, meet the
definition of minimization procedures in section 301(4);
``(E) a description of the nature of the information sought
and the type of communications or activities to be subjected
to acquisition;
``(F) a certification made by the Attorney General or an
official specified in section 104(a)(6) that--
``(i) the certifying official deems the information sought
to be foreign intelligence information;
``(ii) a significant purpose of the acquisition is to
obtain foreign intelligence information;
``(iii) such information cannot reasonably be obtained by
normal investigative techniques;
``(iv) identifies the type of foreign intelligence
information being sought according to the categories
described in each subparagraph of section 101(e); and
``(v) includes a statement of the basis for the
certification that--
``(I) the information sought is the type of foreign
intelligence information designated; and
``(II) such information cannot reasonably be obtained by
normal investigative techniques;
``(G) a summary statement of the means by which the
acquisition will be conducted and whether physical entry is
required to effect the acquisition;
``(H) the identity of any electronic communication service
provider necessary to effect the acquisition, provided,
however, that the application is not required to identify the
specific facilities, places, premises, or property at which
the acquisition authorized under this section will be
directed or conducted;
``(I) a statement of the facts concerning any previous
applications that have been made to any judge of the Foreign
Intelligence Surveillance Court involving the United States
person specified in the application and the action taken on
each previous application; and
``(J) a statement of the period of time for which the
acquisition is required to be maintained, provided that such
period of time shall not exceed 90 days per application.
``(2) Other requirements of the attorney general.--The
Attorney General may require any other affidavit or
certification from any other officer in connection with the
application.
``(3) Other requirements of the judge.--The judge may
require the applicant to furnish such other information as
may be necessary to make the findings required by subsection
(c)(1).
``(c) Order.--
``(1) Findings.--Upon an application made pursuant to
subsection (b), the Foreign Intelligence Surveillance Court
shall enter an ex parte order as requested or as modified by
the Court approving the acquisition if the Court finds that--
``(A) the application has been made by a Federal officer
and approved by the Attorney General;
``(B) on the basis of the facts submitted by the applicant,
for the United States person who is the target of the
acquisition, there is probable cause to believe that the
target is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(C) the proposed minimization procedures--
``(i) in the case of electronic surveillance, meet the
definition of minimization procedures in section 101(h); and
``(ii) in the case of a physical search, meet the
definition of minimization procedures in section 301(4);
``(D) the application that has been filed contains all
statements and certifications required by subsection (b) and
the certification or certifications are not clearly erroneous
on the basis of the statement made under subsection
(b)(1)(F)(v) and any other information furnished under
subsection (b)(3).
``(2) Probable cause.--In determining whether or not
probable cause exists for purposes of paragraph (1)(B), a
judge having jurisdiction under subsection (a)(1) may
consider past activities of the target and facts and
circumstances relating to current or future activities of the
target. No United States person may be considered a foreign
power, agent of a foreign power, or officer or employee of a
foreign power solely upon the basis of activities protected
by the first amendment to the Constitution of the United
States.
``(3) Review.--
``(A) Limitation on review.--Review by a judge having
jurisdiction under subsection (a)(1) shall be limited to that
required to make the findings described in paragraph (1).
``(B) Review of probable cause.--If the judge determines
that the facts submitted under subsection (b) are
insufficient to establish probable cause under paragraph
(1)(B), the judge shall enter an order so stating and provide
a written statement for the record of the reasons for such
determination. The Government may appeal an order under this
subparagraph pursuant to subsection (f).
``(C) Review of minimization procedures.--If the judge
determines that the proposed minimization procedures referred
to in paragraph (1)(C) do not meet the definition of
minimization procedures as required under such paragraph the
judge shall enter an order so stating and provide a written
statement for the record of the reasons for such
determination. The Government may appeal an order under this
subparagraph pursuant to subsection (f).
``(D) Review of certification.--If the judge determines
that an application under subsection (b) does not contain all
of the required elements, or that the certification or
certifications are clearly erroneous on the basis of the
statement made under subsection (b)(1)(F)(v) and any other
information furnished under subsection (b)(3), the judge
shall enter an order so stating and provide a written
statement for the record of the reasons for such
determination. The Government may appeal an order under this
subparagraph pursuant to subsection (f).
``(4) Specifications.--An order approving an acquisition
under this subsection shall specify--
``(A) the identity, if known, or a description of the
United States person who is the target of the acquisition
identified or described in the application pursuant to
subsection (b)(1)(B);
``(B) if provided in the application pursuant to subsection
(b)(1)(H), the nature and location of each of the facilities
or places at which the acquisition will be directed;
``(C) the nature of the information sought to be acquired
and the type of communications or activities to be subjected
to acquisition;
``(D) the means by which the acquisition will be conducted
and whether physical
[[Page H1734]]
entry is required to effect the acquisition; and
``(E) the period of time during which the acquisition is
approved.
``(5) Directions.--An order approving an acquisition under
this subsection shall direct--
``(A) that the minimization procedures referred to in
paragraph (1)(C), as approved or modified by the Court, be
followed;
``(B) an electronic communication service provider to
provide to the Government forthwith all information,
facilities, or assistance necessary to accomplish the
acquisition authorized under such order in a manner that will
protect the secrecy of the acquisition and produce a minimum
of interference with the services that such electronic
communication service provider is providing to the target of
the acquisition;
``(C) an electronic communication service provider to
maintain under security procedures approved by the Attorney
General any records concerning the acquisition or the aid
furnished that such electronic communication service provider
wishes to maintain; and
``(D) that the Government compensate, at the prevailing
rate, such electronic communication service provider for
providing such information, facilities, or assistance.
``(6) Duration.--An order approved under this subsection
shall be effective for a period not to exceed 90 days and
such order may be renewed for additional 90-day periods upon
submission of renewal applications meeting the requirements
of subsection (b).
``(7) Compliance.--At or prior to the end of the period of
time for which an acquisition is approved by an order or
extension under this section, the judge may assess compliance
with the minimization procedures referred to in paragraph
(1)(C) by reviewing the circumstances under which information
concerning United States persons was acquired, retained, or
disseminated.
``(d) Emergency Authorization.--
``(1) Authority for emergency authorization.--
Notwithstanding any other provision of this Act, if the
Attorney General reasonably determines that--
``(A) an emergency situation exists with respect to the
acquisition of foreign intelligence information for which an
order may be obtained under subsection (c) before an order
authorizing such acquisition can with due diligence be
obtained, and
``(B) the factual basis for issuance of an order under this
subsection to approve such acquisition exists,
the Attorney General may authorize such acquisition if a
judge having jurisdiction under subsection (a)(1) is informed
by the Attorney General, or a designee of the Attorney
General, at the time of such authorization that the decision
has been made to conduct such acquisition and if an
application in accordance with this section is made to a
judge of the Foreign Intelligence Surveillance Court as soon
as practicable, but not more than 7 days after the Attorney
General authorizes such acquisition.
``(2) Minimization procedures.--If the Attorney General
authorizes an acquisition under paragraph (1), the Attorney
General shall require that the minimization procedures
referred to in subsection (c)(1)(C) for the issuance of a
judicial order be followed.
``(3) Termination of emergency authorization.--In the
absence of a judicial order approving an acquisition
authorized under paragraph (1), such acquisition shall
terminate when the information sought is obtained, when the
application for the order is denied, or after the expiration
of 7 days from the time of authorization by the Attorney
General, whichever is earliest.
``(4) Use of information.--If an application for approval
submitted pursuant to paragraph (1) is denied, or in any
other case where the acquisition is terminated and no order
is issued approving the acquisition, no information obtained
or evidence derived from such acquisition, except under
circumstances in which the target of the acquisition is
determined not to be a United States person, shall be
received in evidence or otherwise disclosed in any trial,
hearing, or other proceeding in or before any court, grand
jury, department, office, agency, regulatory body,
legislative committee, or other authority of the United
States, a State, or political subdivision thereof, and no
information concerning any United States person acquired from
such acquisition shall subsequently be used or disclosed in
any other manner by Federal officers or employees without the
consent of such person, except with the approval of the
Attorney General if the information indicates a threat of
death or serious bodily harm to any person.
``(e) Release From Liability.--Notwithstanding any other
provision of law, no cause of action shall lie in any court
against any electronic communication service provider for
providing any information, facilities, or assistance in
accordance with an order or request for emergency assistance
issued pursuant to subsections (c) or (d).
``(f) Appeal.--
``(1) Appeal to the foreign intelligence surveillance court
of review.--The Government may file an appeal with the
Foreign Intelligence Surveillance Court of Review for review
of an order issued pursuant to subsection (c). The Court of
Review shall have jurisdiction to consider such appeal and
shall provide a written statement for the record of the
reasons for a decision under this paragraph.
``(2) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review under paragraph (1). The
record for such review shall be transmitted under seal to the
Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``(g) Construction.--Nothing in this Act shall be construed
to require an application under section 104 for an
acquisition that is targeted in accordance with this section
at a person reasonably believed to be located outside the
United States.
``SEC. 704. OTHER ACQUISITIONS TARGETING UNITED STATES
PERSONS OUTSIDE THE UNITED STATES.
``(a) Jurisdiction and Scope.--
``(1) Jurisdiction.--The Foreign Intelligence Surveillance
Court shall have jurisdiction to enter an order pursuant to
subsection (c).
``(2) Scope.--No department or agency of the Federal
Government may intentionally target, for the purpose of
acquiring foreign intelligence information, a United States
person reasonably believed to be located outside the United
States under circumstances in which the targeted United
States person has a reasonable expectation of privacy and a
warrant would be required if the acquisition were conducted
inside the United States for law enforcement purposes, unless
a judge of the Foreign Intelligence Surveillance Court has
entered an order with respect to such targeted United States
person or the Attorney General has authorized an emergency
acquisition pursuant to subsection (c) or (d) or any other
provision of this Act.
``(3) Limitations.--
``(A) Moving or misidentified targets.--If a targeted
United States person is reasonably believed to be in the
United States during the pendency of an order issued pursuant
to subsection (c), acquisitions relating to such targeted
United States Person shall cease unless authority is obtained
pursuant to this Act or the targeted United States person is
again reasonably believed to be located outside the United
States during the pendency of such order.
``(B) Applicability.--If an acquisition is to be conducted
inside the United States and could be authorized under
section 703, the acquisition may only be conducted if
authorized under section 703 or in accordance with another
provision of this Act other than this section.
``(b) Application.--Each application for an order under
this section shall be made by a Federal officer in writing
upon oath or affirmation to a judge having jurisdiction under
subsection (a)(1). Each application shall require the
approval of the Attorney General based upon the Attorney
General's finding that it satisfies the criteria and
requirements of such application as set forth in this section
and shall include--
``(1) the identity of the Federal officer making the
application;
``(2) the identity, if known, or a description of the
specific United States person who is the target of the
acquisition;
``(3) a statement of the facts and circumstances relied
upon to justify the applicant's belief that the United States
person who is the target of the acquisition is--
``(A) a person reasonably believed to be located outside
the United States; and
``(B) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(4) a statement of proposed minimization procedures
that--
``(A) in the case of electronic surveillance, meet the
definition of minimization procedures in section 101(h); and
``(B) in the case of a physical search, meet the definition
of minimization procedures in section 301(4);
``(5) a certification made by the Attorney General, an
official specified in section 104(a)(6), or the head of an
element of the intelligence community that--
``(A) the certifying official deems the information sought
to be foreign intelligence information; and
``(B) a significant purpose of the acquisition is to obtain
foreign intelligence information;
``(6) a statement of the facts concerning any previous
applications that have been made to any judge of the Foreign
Intelligence Surveillance Court involving the United States
person specified in the application and the action taken on
each previous application; and
``(7) a statement of the period of time for which the
acquisition is required to be maintained, provided that such
period of time shall not exceed 90 days per application.
``(c) Order.--
``(1) Findings.--Upon an application made pursuant to
subsection (b), the Foreign Intelligence Surveillance Court
shall enter an ex parte order as requested or as modified by
the Court if the Court finds that--
``(A) the application has been made by a Federal officer
and approved by the Attorney General;
``(B) on the basis of the facts submitted by the applicant,
for the United States person who is the target of the
acquisition, there is probable cause to believe that the
target is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(C) the proposed minimization procedures--
``(i) in the case of electronic surveillance, meet the
definition of minimization procedures in section 101(h); and
[[Page H1735]]
``(ii) in the case of a physical search, meet the
definition of minimization procedures in section 301(4);
``(D) the application that has been filed contains all
statements and certifications required by subsection (b) and
the certification provided under subsection (b)(5) is not
clearly erroneous on the basis of the information furnished
under subsection (b).
``(2) Probable cause.--In determining whether or not
probable cause exists for purposes of an order under
paragraph (1)(B), a judge having jurisdiction under
subsection (a)(1) may consider past activities of the target
and facts and circumstances relating to current or future
activities of the target. No United States person may be
considered a foreign power, agent of a foreign power, or
officer or employee of a foreign power solely upon the basis
of activities protected by the first amendment to the
Constitution of the United States.
``(3) Review.--
``(A) Limitations on review.--Review by a judge having
jurisdiction under subsection (a)(1) shall be limited to that
required to make the findings described in paragraph (1). The
judge shall not have jurisdiction to review the means by
which an acquisition under this section may be conducted.
``(B) Review of probable cause.--If the judge determines
that the facts submitted under subsection (b) are
insufficient to establish probable cause under paragraph
(1)(B), the judge shall enter an order so stating and provide
a written statement for the record of the reasons for such
determination. The Government may appeal an order under this
clause pursuant to subsection (e).
``(C) Review of minimization procedures.--If the judge
determines that the proposed minimization procedures referred
to in paragraph (1)(C) do not meet the definition of
minimization procedures as required under such paragraph, the
judge shall enter an order so stating and provide a written
statement for the record of the reasons for such
determination. The Government may appeal an order under this
clause pursuant to subsection (e).
``(D) Scope of review of certification.--If the judge
determines that an application under subsection (b) does not
contain all the required elements, or that the certification
provided under subsection (b)(5) is clearly erroneous on the
basis of the information furnished under subsection (b), the
judge shall enter an order so stating and provide a written
statement for the record of the reasons for such
determination. The Government may appeal an order under this
clause pursuant to subsection (e).
``(4) Duration.--An order under this paragraph shall be
effective for a period not to exceed 90 days and such order
may be renewed for additional 90-day periods upon submission
of renewal applications meeting the requirements of
subsection (b).
``(5) Compliance.--At or prior to the end of the period of
time for which an order or extension is granted under this
section, the judge may assess compliance with the
minimization procedures referred to in paragraph (1)(C) by
reviewing the circumstances under which information
concerning United States persons was disseminated, provided
that the judge may not inquire into the circumstances
relating to the conduct of the acquisition.
``(d) Emergency Authorization.--
``(1) Authority for emergency authorization.--
Notwithstanding any other provision of this section, if the
Attorney General reasonably determines that--
``(A) an emergency situation exists with respect to the
acquisition of foreign intelligence information for which an
order may be obtained under subsection (c) before an order
under that subsection may, with due diligence, be obtained,
and
``(B) the factual basis for the issuance of an order under
this section exists,
the Attorney General may authorize such acquisition if a
judge having jurisdiction under subsection (a)(1) is informed
by the Attorney General or a designee of the Attorney General
at the time of such authorization that the decision has been
made to conduct such acquisition and if an application in
accordance with this section is made to a judge of the
Foreign Intelligence Surveillance Court as soon as
practicable, but not more than 7 days after the Attorney
General authorizes such acquisition.
``(2) Minimization procedures.--If the Attorney General
authorizes an emergency acquisition under paragraph (1), the
Attorney General shall require that the minimization
procedures referred to in subsection (c)(1)(C) be followed.
``(3) Termination of emergency authorization.--In the
absence of an order under subsection (c), the acquisition
authorized under paragraph (1) shall terminate when the
information sought is obtained, if the application for the
order is denied, or after the expiration of 7 days from the
time of authorization by the Attorney General, whichever is
earliest.
``(4) Use of information.--If an application submitted
pursuant to paragraph (1) is denied, or in any other case
where an acquisition under this section is terminated and no
order with respect to the target of the acquisition is issued
under subsection (c), no information obtained or evidence
derived from such acquisition, except under circumstances in
which the target of the acquisition is determined not to be a
United States person, shall be received in evidence or
otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from such acquisition shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of such
person, except with the approval of the Attorney General if
the information indicates a threat of death or serious bodily
harm to any person.
``(e) Appeal.--
``(1) Appeal to the court of review.--The Government may
file an appeal with the Foreign Intelligence Surveillance
Court of Review for review of an order issued pursuant to
subsection (c). The Court of Review shall have jurisdiction
to consider such appeal and shall provide a written statement
for the record of the reasons for a decision under this
paragraph.
``(2) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review issued under paragraph (1).
The record for such review shall be transmitted under seal to
the Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``SEC. 705. JOINT APPLICATIONS AND CONCURRENT AUTHORIZATIONS.
``(a) Joint Applications and Orders.--If an acquisition
targeting a United States person under section 703 or section
704 is proposed to be conducted both inside and outside the
United States, a judge having jurisdiction under section
703(a)(1) or section 704(a)(1) may issue simultaneously, upon
the request of the Government in a joint application
complying with the requirements of section 703(b) and section
704(b), orders under section 703(c) and section 704(c), as
appropriate.
``(b) Concurrent Authorization.--
``(1) Electronic surveillance.--If an order authorizing
electronic surveillance has been obtained under section 105
and that order is still in effect, during the pendency of
that order the Attorney General may authorize, without an
order under section 703 or 704, electronic surveillance for
the purpose of acquiring foreign intelligence information
targeting that United States person while such person is
reasonably believed to be located outside the United States.
``(2) Physical search.--If an order authorizing a physical
search has been obtained under section 304 and that order is
still in effect, during the pendency of that order the
Attorney General may authorize, without an order under
section 703 or 704, a physical search for the purpose of
acquiring foreign intelligence information targeting that
United States person while such person is reasonably believed
to be located outside the United States.
``SEC. 706. USE OF INFORMATION ACQUIRED UNDER TITLE VII.
``Information acquired pursuant to section 702 or 703 shall
be considered information acquired from an electronic
surveillance pursuant to title I for purposes of section 106.
``SEC. 707. CONGRESSIONAL OVERSIGHT.
``(a) Semiannual Report.--Not less frequently than once
every 6 months, the Attorney General shall fully inform, in a
manner consistent with national security, the congressional
intelligence committees and the Committees on the Judiciary
of the Senate and the House of Representatives, concerning
the implementation of this title.
``(b) Content.--Each report made under subsection (a) shall
include--
``(1) with respect to section 702--
``(A) any certifications made under section 702(g) during
the reporting period;
``(B) with respect to each certification made under
paragraph (1)(B) of such section, the reasons for exercising
the authority under such paragraph;
``(C) any directives issued under section 702(h) during the
reporting period;
``(D) a description of the judicial review during the
reporting period of any such certifications and targeting and
minimization procedures adopted pursuant to subsections (d)
and (e) of section 702 utilized with respect to such
acquisition, including a copy of any order or pleading in
connection with such review that contains a significant legal
interpretation of the provisions of section 702;
``(E) any actions taken to challenge or enforce a directive
under paragraph (4) or (5) of section 702(h);
``(F) any compliance reviews conducted by the Attorney
General or the Director of National Intelligence of
acquisitions authorized under subsection 702(a);
``(G) a description of any incidents of noncompliance with
a directive issued by the Attorney General and the Director
of National Intelligence under subsection 702(h), including--
``(i) incidents of noncompliance by an element of the
intelligence community with procedures and guidelines adopted
pursuant to subsections (d), (e), and (f) of section 702; and
``(ii) incidents of noncompliance by a specified person to
whom the Attorney General and Director of National
Intelligence issued a directive under subsection 702(h); and
``(H) any procedures implementing section 702;
``(2) with respect to section 703--
``(A) the total number of applications made for orders
under section 703(b);
``(B) the total number of such orders--
``(i) granted;
``(ii) modified; or
[[Page H1736]]
``(iii) denied; and
``(C) the total number of emergency acquisitions authorized
by the Attorney General under section 703(d) and the total
number of subsequent orders approving or denying such
acquisitions; and
``(3) with respect to section 704--
``(A) the total number of applications made for orders
under 704(b);
``(B) the total number of such orders--
``(i) granted;
``(ii) modified; or
``(iii) denied; and
``(C) the total number of emergency acquisitions authorized
by the Attorney General under subsection 704(d) and the total
number of subsequent orders approving or denying such
applications.
``SEC. 708. SAVINGS PROVISION.
``Nothing in this title shall be construed to limit the
authority of the Federal Government to seek an order or
authorization under, or otherwise engage in any activity that
is authorized under, any other title of this Act.''.
(b) Table of Contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et. seq.) is amended--
(1) by striking the item relating to title VII;
(2) by striking the item relating to section 701; and
(3) by adding at the end the following:
``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
THE UNITED STATES
``Sec. 701. Definitions.
``Sec. 702. Procedures for targeting certain persons outside the United
States other than United States persons.
``Sec. 703. Certain acquisitions inside the United States of United
States persons outside the United States.
``Sec. 704. Other acquisitions targeting United States persons outside
the United States.
``Sec. 705. Joint applications and concurrent authorizations.
``Sec. 706. Use of information acquired under title VII.
``Sec. 707. Congressional oversight.
``Sec. 708. Savings provision.''.
(c) Technical and Conforming Amendments.--
(1) Title 18, united states code.--Section
2511(2)(a)(ii)(A) of title 18, United States Code, is amended
by inserting ``or a court order pursuant to section 704 of
the Foreign Intelligence Surveillance Act of 1978'' after
``assistance''.
(2) Foreign intelligence surveillance act of 1978.--Section
601(a)(1) of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1871(a)(1)) is amended--
(A) in subparagraph (C), by striking ``and''; and
(B) by adding at the end the following new subparagraphs:
``(E) acquisitions under section 703; and
``(F) acquisitions under section 704;''.
SEC. 102. STATEMENT OF EXCLUSIVE MEANS BY WHICH ELECTRONIC
SURVEILLANCE AND INTERCEPTION OF CERTAIN
COMMUNICATIONS MAY BE CONDUCTED.
(a) Statement of Exclusive Means.--Title I of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.) is amended by adding at the end the following new
section:
``statement of exclusive means by which electronic surveillance and
interception of certain communications may be conducted
``Sec. 112. (a) Except as provided in subsection (b), the
procedures of chapters 119, 121, and 206 of title 18, United
States Code, and this Act shall be the exclusive means by
which electronic surveillance and the interception of
domestic wire, oral, or electronic communications may be
conducted.
``(b) Only an express statutory authorization for
electronic surveillance or the interception of domestic wire,
oral, or electronic communications, other than as an
amendment to this Act or chapters 119, 121, or 206 of title
18, United States Code, shall constitute an additional
exclusive means for the purpose of subsection (a).''.
(b) Offense.--Section 109(a) of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1809(a)) is amended by
striking ``authorized by statute'' each place it appears in
such section and inserting ``authorized by this Act, chapter
119, 121, or 206 of title 18, United States Code, or any
express statutory authorization that is an additional
exclusive means for conducting electronic surveillance under
section 112.''; and
(c) Conforming Amendments.--
(1) Title 18, united states code.--Section 2511(2)(a) of
title 18, United States Code, is amended by adding at the end
the following:
``(iii) If a certification under subparagraph (ii)(B) for
assistance to obtain foreign intelligence information is
based on statutory authority, the certification shall
identify the specific statutory provision, and shall certify
that the statutory requirements have been met.''; and
(2) Table of contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.) is amended by inserting after the
item relating to section 111 the following new item:
``Sec. 112. Statement of exclusive means by which electronic
surveillance and interception of certain communications
may be conducted.''.
SEC. 103. SUBMITTAL TO CONGRESS OF CERTAIN COURT ORDERS UNDER
THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF
1978.
(a) Inclusion of Certain Orders in Semiannual Reports of
Attorney General.--Subsection (a)(5) of section 601 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1871) is amended by striking ``(not including orders)'' and
inserting ``, orders,''.
(b) Reports by Attorney General on Certain Other Orders.--
Such section 601 is further amended by adding at the end the
following:
``(c) Submissions to Congress.--The Attorney General shall
submit to the committees of Congress referred to in
subsection (a)--
``(1) a copy of any decision, order, or opinion issued by
the Foreign Intelligence Surveillance Court or the Foreign
Intelligence Surveillance Court of Review that includes
significant construction or interpretation of any provision
of this Act, and any pleadings, applications, or memoranda of
law associated with such decision, order, or opinion, not
later than 45 days after such decision, order, or opinion is
issued; and
``(2) a copy of any such decision, order, or opinion, and
any pleadings, applications, or memoranda of law associated
with such decision, order, or opinion, that was issued during
the 5-year period ending on the date of the enactment of the
FISA Amendments Act of 2008 and not previously submitted in a
report under subsection (a).
``(d) Protection of National Security.--The Attorney
General, in consultation with the Director of National
Intelligence, may authorize redactions of materials described
in subsection (c) that are provided to the committees of
Congress referred to in subsection (a), if such redactions
are necessary to protect the national security of the United
States and are limited to sensitive sources and methods
information or the identities of targets.''.
(c) Definitions.--Such section 601, as amended by
subsections (a) and (b), is further amended by adding at the
end the following:
``(e) Definitions.--In this section:
``(1) Foreign intelligence surveillance court.--The term
`Foreign Intelligence Surveillance Court' means the court
established by section 103(a).
``(2) Foreign intelligence surveillance court of review.--
The term `Foreign Intelligence Surveillance Court of Review'
means the court established by section 103(b).''.
SEC. 104. APPLICATIONS FOR COURT ORDERS.
Section 104 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1804) is amended--
(1) in subsection (a)--
(A) by striking paragraphs (2) and (11);
(B) by redesignating paragraphs (3) through (10) as
paragraphs (2) through (9), respectively;
(C) in paragraph (5), as redesignated by subparagraph (B)
of this paragraph, by striking ``detailed'';
(D) in paragraph (7), as redesignated by subparagraph (B)
of this paragraph, by striking ``statement of'' and inserting
``summary statement of'';
(E) in paragraph (8), as redesignated by subparagraph (B)
of this paragraph, by adding ``and'' at the end; and
(F) in paragraph (9), as redesignated by subparagraph (B)
of this paragraph, by striking ``; and'' and inserting a
period;
(2) by striking subsection (b);
(3) by redesignating subsections (c) through (e) as
subsections (b) through (d), respectively; and
(4) in paragraph (1)(A) of subsection (d), as redesignated
by paragraph (3) of this subsection, by striking ``or the
Director of National Intelligence'' and inserting ``the
Director of National Intelligence, or the Director of the
Central Intelligence Agency''.
SEC. 105. ISSUANCE OF AN ORDER.
Section 105 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1805) is amended--
(1) in subsection (a)--
(A) by striking paragraph (1); and
(B) by redesignating paragraphs (2) through (5) as
paragraphs (1) through (4), respectively;
(2) in subsection (b), by striking ``(a)(3)'' and inserting
``(a)(2)'';
(3) in subsection (c)(1)--
(A) in subparagraph (D), by adding ``and'' at the end;
(B) in subparagraph (E), by striking ``; and'' and
inserting a period; and
(C) by striking subparagraph (F);
(4) by striking subsection (d);
(5) by redesignating subsections (e) through (i) as
subsections (d) through (h), respectively;
(6) by amending subsection (e), as redesignated by
paragraph (5) of this section, to read as follows:
``(e)(1) Notwithstanding any other provision of this title,
the Attorney General may authorize the emergency employment
of electronic surveillance if the Attorney General--
``(A) reasonably determines that an emergency situation
exists with respect to the employment of electronic
surveillance to obtain foreign intelligence information
before
[[Page H1737]]
an order authorizing such surveillance can with due diligence
be obtained;
``(B) reasonably determines that the factual basis for the
issuance of an order under this title to approve such
electronic surveillance exists;
``(C) informs, either personally or through a designee, a
judge having jurisdiction under section 103 at the time of
such authorization that the decision has been made to employ
emergency electronic surveillance; and
``(D) makes an application in accordance with this title to
a judge having jurisdiction under section 103 as soon as
practicable, but not later than 7 days after the Attorney
General authorizes such surveillance.
``(2) If the Attorney General authorizes the emergency
employment of electronic surveillance under paragraph (1),
the Attorney General shall require that the minimization
procedures required by this title for the issuance of a
judicial order be followed.
``(3) In the absence of a judicial order approving such
electronic surveillance, the surveillance shall terminate
when the information sought is obtained, when the application
for the order is denied, or after the expiration of 7 days
from the time of authorization by the Attorney General,
whichever is earliest.
``(4) A denial of the application made under this
subsection may be reviewed as provided in section 103.
``(5) In the event that such application for approval is
denied, or in any other case where the electronic
surveillance is terminated and no order is issued approving
the surveillance, no information obtained or evidence derived
from such surveillance shall be received in evidence or
otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from such surveillance shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of such
person, except with the approval of the Attorney General if
the information indicates a threat of death or serious bodily
harm to any person.
``(6) The Attorney General shall assess compliance with the
requirements of paragraph (5).''; and
(7) by adding at the end the following:
``(i) In any case in which the Government makes an
application to a judge under this title to conduct electronic
surveillance involving communications and the judge grants
such application, upon the request of the applicant, the
judge shall also authorize the installation and use of pen
registers and trap and trace devices, and direct the
disclosure of the information set forth in section
402(d)(2).''.
SEC. 106. USE OF INFORMATION.
Subsection (i) of section 106 of the Foreign Intelligence
Surveillance Act of 1978 (8 U.S.C. 1806) is amended by
striking ``radio communication'' and inserting
``communication''.
SEC. 107. AMENDMENTS FOR PHYSICAL SEARCHES.
(a) Applications.--Section 303 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1823) is amended--
(1) in subsection (a)--
(A) by striking paragraph (2);
(B) by redesignating paragraphs (3) through (9) as
paragraphs (2) through (8), respectively;
(C) in paragraph (2), as redesignated by subparagraph (B)
of this paragraph, by striking ``detailed''; and
(D) in paragraph (3)(C), as redesignated by subparagraph
(B) of this paragraph, by inserting ``or is about to be''
before ``owned''; and
(2) in subsection (d)(1)(A), by striking ``or the Director
of National Intelligence'' and inserting ``the Director of
National Intelligence, or the Director of the Central
Intelligence Agency''.
(b) Orders.--Section 304 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1824) is amended--
(1) in subsection (a)--
(A) by striking paragraph (1); and
(B) by redesignating paragraphs (2) through (5) as
paragraphs (1) through (4), respectively; and
(2) by amending subsection (e) to read as follows:
``(e)(1) Notwithstanding any other provision of this title,
the Attorney General may authorize the emergency employment
of a physical search if the Attorney General--
``(A) reasonably determines that an emergency situation
exists with respect to the employment of a physical search to
obtain foreign intelligence information before an order
authorizing such physical search can with due diligence be
obtained;
``(B) reasonably determines that the factual basis for
issuance of an order under this title to approve such
physical search exists;
``(C) informs, either personally or through a designee, a
judge of the Foreign Intelligence Surveillance Court at the
time of such authorization that the decision has been made to
employ an emergency physical search; and
``(D) makes an application in accordance with this title to
a judge of the Foreign Intelligence Surveillance Court as
soon as practicable, but not more than 7 days after the
Attorney General authorizes such physical search.
``(2) If the Attorney General authorizes the emergency
employment of a physical search under paragraph (1), the
Attorney General shall require that the minimization
procedures required by this title for the issuance of a
judicial order be followed.
``(3) In the absence of a judicial order approving such
physical search, the physical search shall terminate when the
information sought is obtained, when the application for the
order is denied, or after the expiration of 7 days from the
time of authorization by the Attorney General, whichever is
earliest.
``(4) A denial of the application made under this
subsection may be reviewed as provided in section 103.
``(5)(A) In the event that such application for approval is
denied, or in any other case where the physical search is
terminated and no order is issued approving the physical
search, no information obtained or evidence derived from such
physical search shall be received in evidence or otherwise
disclosed in any trial, hearing, or other proceeding in or
before any court, grand jury, department, office, agency,
regulatory body, legislative committee, or other authority of
the United States, a State, or political subdivision thereof,
and no information concerning any United States person
acquired from such physical search shall subsequently be used
or disclosed in any other manner by Federal officers or
employees without the consent of such person, except with the
approval of the Attorney General if the information indicates
a threat of death or serious bodily harm to any person.
``(B) The Attorney General shall assess compliance with the
requirements of subparagraph (A).''.
(c) Conforming Amendments.--The Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.) is
amended--
(1) in section 304(a)(4), as redesignated by subsection (b)
of this section, by striking ``303(a)(7)(E)'' and inserting
``303(a)(6)(E)''; and
(2) in section 305(k)(2), by striking ``303(a)(7)'' and
inserting ``303(a)(6)''.
SEC. 108. AMENDMENTS FOR EMERGENCY PEN REGISTERS AND TRAP AND
TRACE DEVICES.
Section 403 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1843) is amended--
(1) in subsection (a)(2), by striking ``48 hours'' and
inserting ``7 days''; and
(2) in subsection (c)(1)(C), by striking ``48 hours'' and
inserting ``7 days''.
SEC. 109. FOREIGN INTELLIGENCE SURVEILLANCE COURT.
(a) Designation of Judges.--Subsection (a) of section 103
of the Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1803) is amended by inserting ``at least'' before
``seven of the United States judicial circuits''.
(b) En Banc Authority.--
(1) In general.--Subsection (a) of section 103 of the
Foreign Intelligence Surveillance Act of 1978, as amended by
subsection (a) of this section, is further amended--
(A) by inserting ``(1)'' after ``(a)''; and
(B) by adding at the end the following new paragraph:
``(2)(A) The court established under this subsection, on
its own initiative or upon the request of the Government in
any proceeding or a party under section 501(f) or paragraph
(4) or (5) of section 703(h), may hold a hearing or
rehearing, en banc, when ordered by a majority of the judges
that constitute such court upon a determination that--
``(i) en banc consideration is necessary to secure or
maintain uniformity of the court's decisions; or
``(ii) the proceeding involves a question of exceptional
importance.
``(B) Any authority granted by this Act to a judge of the
court established under this subsection may be exercised by
the court en banc. When exercising such authority, the court
en banc shall comply with any requirements of this Act on the
exercise of such authority.
``(C) For purposes of this paragraph, the court en banc
shall consist of all judges who constitute the court
established under this subsection.''.
(2) Conforming amendments.--The Foreign Intelligence
Surveillance Act of 1978 is further amended--
(A) in subsection (a) of section 103, as amended by this
subsection, by inserting ``(except when sitting en banc under
paragraph (2))'' after ``no judge designated under this
subsection''; and
(B) in section 302(c) (50 U.S.C. 1822(c)), by inserting
``(except when sitting en banc)'' after ``except that no
judge''.
(c) Stay or Modification During an Appeal.--Section 103 of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1803) is amended--
(1) by redesignating subsection (f) as subsection (g); and
(2) by inserting after subsection (e) the following new
subsection:
``(f)(1) A judge of the court established under subsection
(a), the court established under subsection (b) or a judge of
that court, or the Supreme Court of the United States or a
justice of that court, may, in accordance with the rules of
their respective courts, enter a stay of an order or an order
modifying an order of the court established under subsection
(a) or the court established under subsection (b) entered
under any title of this Act, while the court established
under subsection (a) conducts a rehearing, while an appeal is
pending to the court established
[[Page H1738]]
under subsection (b), or while a petition of certiorari is
pending in the Supreme Court of the United States, or during
the pendency of any review by that court.
``(2) The authority described in paragraph (1) shall apply
to an order entered under any provision of this Act.''.
(d) Authority of Foreign Intelligence Surveillance Court.--
Section 103 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1803), as amended by this Act, is further
amended by adding at the end the following:
``(i) Nothing in this Act shall be construed to reduce or
contravene the inherent authority of the court established by
subsection (a) to determine or enforce compliance with an
order or a rule of such court or with a procedure approved by
such court.''.
SEC. 110. INSPECTOR GENERAL REVIEW OF PREVIOUS ACTIONS.
(a) Definitions.--In this section:
(1) Appropriate committees of congress.--The term
``appropriate committees of Congress'' means--
(A) the Select Committee on Intelligence and the Committee
on the Judiciary of the Senate; and
(B) the Permanent Select Committee on Intelligence and the
Committee on the Judiciary of the House of Representatives.
(2) Foreign intelligence surveillance court.--The term
``Foreign Intelligence Surveillance Court'' means the court
established by section 103(a) of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1803(a)).
(3) President's surveillance program and program.--The
terms ``President's Surveillance Program'' and ``Program''
mean the intelligence activity involving communications that
was authorized by the President during the period beginning
on September 11, 2001, and ending on January 17, 2007,
including the program referred to by the President in a radio
address on December 17, 2005 (commonly known as the Terrorist
Surveillance Program).
(b) Reviews.--
(1) Requirement to conduct.--The Inspectors General of the
Department of Justice, the Office of the Director of National
Intelligence, the National Security Agency, and any other
element of the intelligence community that participated in
the President's Surveillance Program shall complete a
comprehensive review of, with respect to the oversight
authority and responsibility of each such Inspector General--
(A) all of the facts necessary to describe the
establishment, implementation, product, and use of the
product of the Program;
(B) the procedures and substance of, and access to, the
legal reviews of the Program;
(C) communications with and participation of individuals
and entities in the private sector related to the Program;
(D) interaction with the Foreign Intelligence Surveillance
Court and transition to court orders related to the Program;
and
(E) any other matters identified by any such Inspector
General that would enable that Inspector General to complete
a review of the Program, with respect to such Department or
element.
(2) Cooperation and coordination.--
(A) Cooperation.--Each Inspector General required to
conduct a review under paragraph (1) shall--
(i) work in conjunction, to the extent practicable, with
any other Inspector General required to conduct such a
review; and
(ii) utilize, to the extent practicable, and not
unnecessarily duplicate or delay such reviews or audits that
have been completed or are being undertaken by any such
Inspector General or by any other office of the Executive
Branch related to the Program.
(B) Coordination.--The Inspectors General shall designate
one of the Inspectors General required to conduct a review
under paragraph (1) that is appointed by the President, by
and with the advice and consent of the Senate, to coordinate
the conduct of the reviews and the preparation of the
reports.
(c) Reports.--
(1) Preliminary reports.--Not later than 60 days after the
date of the enactment of this Act, the Inspectors General of
the Department of Justice, the Office of the Director of
National Intelligence, the National Security Agency, and any
other Inspector General required to conduct a review under
subsection (b)(1) shall submit to the appropriate committees
of Congress an interim report that describes the planned
scope of such review.
(2) Final report.--Not later than 1 year after the date of
the enactment of this Act, the Inspectors General of the
Department of Justice, the Office of the Director of National
Intelligence, the National Security Agency, and any other
Inspector General required to conduct a review under
subsection (b)(1) shall submit to the appropriate committees
of Congress and the Commission established under section
301(a) a comprehensive report on such reviews that includes
any recommendations of any such Inspectors General within the
oversight authority and responsibility of any such Inspector
General.
(3) Form.--A report submitted under this subsection shall
be submitted in unclassified form, but may include a
classified annex. The unclassified report shall not disclose
the name or identity of any individual or entity of the
private sector that participated in the Program or with whom
there was communication about the Program, to the extent that
information is classified.
(d) Resources.--
(1) Expedited security clearance.--The Director of National
Intelligence shall ensure that the process for the
investigation and adjudication of an application by an
Inspector General or any appropriate staff of an Inspector
General for a security clearance necessary for the conduct of
the review under subsection (b)(1) is carried out as
expeditiously as possible.
(2) Additional personnel for the inspectors general.--An
Inspector General required to conduct a review under
subsection (b)(1) and submit a report under subsection (c) is
authorized to hire such additional personnel as may be
necessary to carry out such review and prepare such report in
a prompt and timely manner. Personnel authorized to be hired
under this paragraph--
(A) shall perform such duties relating to such a review as
the relevant Inspector General shall direct; and
(B) are in addition to any other personnel authorized by
law.
SEC. 111. WEAPONS OF MASS DESTRUCTION.
(a) Definitions.--
(1) Foreign power.--Subsection (a) of section 101 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(a)) is amended--
(A) in paragraph (5), by striking ``persons; or'' and
inserting ``persons;'';
(B) in paragraph (6), by striking the period and inserting
``; or''; and
(C) by adding at the end the following new paragraph:
``(7) an entity not substantially composed of United States
persons that is engaged in the international proliferation of
weapons of mass destruction.''.
(2) Agent of a foreign power.--Subsection (b)(1) of such
section 101 is amended--
(A) in subparagraph (B), by striking ``or'' at the end; and
(B) by adding at the end the following new subparagraph:
``(D) engages in the international proliferation of weapons
of mass destruction, or activities in preparation therefor;
or''.
(3) Foreign intelligence information.--Subsection (e)(1)(B)
of such section 101 is amended by striking ``sabotage or
international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(4) Weapon of mass destruction.--Such section 101 is
amended by adding at the end the following new subsection:
``(p) `Weapon of mass destruction' means--
``(1) any explosive, incendiary, or poison gas device that
is intended or has the capability to cause a mass casualty
incident;
``(2) any weapon that is designed or intended to cause
death or serious bodily injury to a significant number of
persons through the release, dissemination, or impact of
toxic or poisonous chemicals or their precursors;
``(3) any weapon involving a biological agent, toxin, or
vector (as such terms are defined in section 178 of title 18,
United States Code) that is designed, intended, or has the
capability of causing death, illness, or serious bodily
injury to a significant number of persons; or
``(4) any weapon that is designed, intended, or has the
capability of releasing radiation or radioactivity causing
death, illness, or serious bodily injury to a significant
number of persons.''.
(b) Use of Information.--
(1) In general.--Section 106(k)(1)(B) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C.
1806(k)(1)(B)) is amended by striking ``sabotage or
international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(2) Physical searches.--Section 305(k)(1)(B) of such Act
(50 U.S.C. 1825(k)(1)(B)) is amended by striking ``sabotage
or international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(c) Technical and Conforming Amendment.--Section 301(1) of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1821(1)) is amended by inserting ``weapon of mass destruction
,'' after ``person,''.
SEC. 112. STATUTE OF LIMITATIONS.
(a) In General.--Section 109 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1809) is amended by
adding at the end the following new subsection:
``(e) Statute of Limitations.--No person shall be
prosecuted, tried, or punished for any offense under this
section unless the indictment is found or the information is
instituted not later than 10 years after the commission of
the offense.''.
(b) Application.--The amendment made by subsection (a)
shall apply to any offense committed before the date of the
enactment of this Act if the statute of limitations
applicable to that offense has not run as of such date.
TITLE II--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
SEC. 201. STATUTORY DEFENSES.
The Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1801 et seq.) is amended by adding after title VII the
following:
``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
``SEC. 801. DEFINITIONS.
``In this title:
``(1) Assistance.--The term `assistance' means the
provision of, or the provision of access to, information
(including communication contents, communications records,
[[Page H1739]]
or other information relating to a customer or
communication), facilities, or another form of assistance.
``(2) Attorney general.--The term `Attorney General' has
the meaning given that term in section 101(g).
``(3) Contents.--The term `contents' has the meaning given
that term in section 101(n).
``(4) Covered civil action.--The term `covered civil
action' means a suit in Federal or State court against any
person for providing assistance to an element of the
intelligence community.
``(5) Electronic communication service provider.--The term
`electronic communication service provider' means--
``(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
``(B) a provider of electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
``(C) a provider of a remote computing service, as that
term is defined in section 2711 of title 18, United States
Code;
``(D) any other communication service provider who has
access to wire or electronic communications either as such
communications are transmitted or as such communications are
stored;
``(E) a parent, subsidiary, affiliate, successor, or
assignee of an entity described in subparagraph (A), (B),
(C), or (D); or
``(F) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), (D), or (E).
``(6) Intelligence community.--The term `intelligence
community' has the meaning given that term in section 3(4) of
the National Security Act of 1947 (50 U.S.C. 401a(4)).
``(7) Person.--The term `person' means--
``(A) an electronic communication service provider; or
``(B) a landlord, custodian, or other person who may be
authorized or required to furnish assistance pursuant to--
``(i) an order of the court established under section
103(a) directing such assistance;
``(ii) a certification in writing under section
2511(2)(a)(ii)(B) or 2709(b) of title 18, United States Code;
or
``(iii) a directive under section 102(a)(4), 105B(e), as
added by section 2 of the Protect America Act of 2007 (Public
Law 110-55), or 703(h).
``(8) State.--The term `State' means any State, political
subdivision of a State, the Commonwealth of Puerto Rico, the
District of Columbia, and any territory or possession of the
United States, and includes any officer, public utility
commission, or other body authorized to regulate an
electronic communication service provider.
``SEC. 802. PROCEDURES FOR COVERED CIVIL ACTIONS.
``(a) Intervention by Government.-- In any covered civil
action, the court shall permit the Government to intervene.
Whether or not the Government intervenes in the civil action,
the Attorney General may submit any information in any form
the Attorney General determines is appropriate and the court
shall consider all such submissions.
``(b) Factual and Legal Determinations.--In any covered
civil action, any party may submit to the court evidence,
briefs, arguments, or other information on any matter with
respect to which a privilege based on state secrets is
asserted. The court shall review any such submission in
accordance with the procedures set forth in section 106(f)
and may, based on the review, make any appropriate
determination of fact or law. The court may, on motion of the
Attorney General, take any additional actions the court deems
necessary to protect classified information. The court may,
to the extent practicable and consistent with national
security, request that any party present briefs and arguments
on any legal question the court determines is raised by such
a submission even if that party does not have full access to
the submission. The court shall consider whether the
employment of a special master or an expert witness, or both,
would facilitate proceedings under this section.
``(c) Location of Review.--The court may conduct the review
in a location and facility specified by the Attorney General
as necessary to ensure security.
``(d) Removal.--A covered civil action that is brought in a
State court shall be deemed to arise under the Constitution
and laws of the United States and shall be removable under
section 1441 of title 28, United States Code.
``(e) Special Rule for Certain Cases.--For any covered
civil action alleging that a person provided assistance to an
element of the intelligence community pursuant to a request
or directive during the period from September 11, 2001
through January 17, 2007, the Attorney General shall provide
to the court any request or directive related to the
allegations under the procedures set forth in subsection (b).
``(f) Applicability.--This section shall apply to a civil
action pending on or filed after the date of the enactment of
this Act.''.
SEC. 202. TECHNICAL AMENDMENTS.
The table of contents in the first section of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.) is amended by adding at the end the following:
``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
``Sec. 801. Definitions
``Sec. 802. Procedures for covered civil actions.''.
TITLE III--COMMISSION ON WARRANTLESS ELECTRONIC SURVEILLANCE ACTIVITIES
SEC. 301. COMMISSION ON WARRANTLESS ELECTRONIC SURVEILLANCE
ACTIVITIES.
(a) Establishment of Commission.--There is established in
the legislative branch a commission to be known as the
``Commission on Warrantless Electronic Surveillance
Activities'' (in this section referred to as the
``Commission'').
(b) Duties of Commission.--
(1) In general.--The Commission shall--
(A) ascertain, evaluate, and report upon the facts and
circumstances relating to electronic surveillance activities
conducted without a warrant between September 11, 2001 and
January 17, 2007;
(B) evaluate the lawfulness of such activities;
(C) examine all programs and activities relating to
intelligence collection inside the United States or regarding
United States persons that were in effect or operation on
September 11, 2001, and all such programs and activities
undertaken since that date, including the legal framework or
justification for those activities; and
(D) report to the President and Congress the findings and
conclusions of the Commission and any recommendations the
Commission considers appropriate.
(2) Protection of national security.--The Commission shall
carry out the duties of the Commission under this section in
a manner consistent with the need to protect national
security.
(c) Composition of Commission.--
(1) Members.--The Commission shall be composed of 9
members, of whom--
(A) 5 members shall be appointed jointly by the majority
leader of the Senate and the Speaker of the House of
Representatives; and
(B) 4 members shall be appointed jointly by the minority
leader of the Senate and the minority leader of the House of
Representatives.
(2) Qualifications.--It is the sense of Congress that
individuals appointed to the Commission should be prominent
United States citizens with significant depth of experience
in national security, Constitutional law, and civil
liberties.
(3) Chair; vice chair.--
(A) Chair.--The Chair of the Commission shall be jointly
appointed by the majority leader of the Senate and the
Speaker of the House of Representatives from among the
members appointed under paragraph (1)(A).
(B) Vice chair.--The Vice Chair of the Commission shall be
jointly appointed by the minority leader of the Senate and
the minority leader of the House of Representatives from
among the members appointed under paragraph (1)(B).
(4) Deadline for appointment.--All members of the
Commission shall be appointed not later than 90 days after
the date of the enactment of this Act.
(5) Initial meeting.--The Commission shall hold its first
meeting and begin operations not later than 45 days after the
date on which a majority of its members have been appointed.
(6) Subsequent meetings.--After its initial meeting, the
Commission shall meet upon the call of the Chair.
(7) Quorum.--A majority of the members of the Commission
shall constitute a quorum, but a lesser number may hold
hearings.
(8) Vacancies.--Any vacancy in the Commission shall not
affect its powers and shall be filled in the same manner in
which the original appointment was made.
(d) Powers of Commission.--
(1) Hearings and evidence.--The Commission or, on the
authority of the Chair, any subcommittee or member thereof
may, for the purpose of carrying out this section, hold such
hearings and sit and act at such times and places, take such
testimony, receive such evidence, and administer such oaths
as the Commission, such designated subcommittee, or
designated member may determine advisable.
(2) Subpoenas.--
(A) Issuance.--
(i) In general.--The Commission may issue subpoenas
requiring the attendance and testimony of witnesses and the
production of any evidence relating to any matter that the
Commission is empowered to investigate under this section.
The attendance of witnesses and the production of evidence
may be required from any place within the United States at
any designated place of hearing within the United States.
(ii) Signature.--Subpoenas issued under this paragraph may
be issued under the signature of the Chair of the Commission,
the chair of any subcommittee created by a majority of the
Commission, or any member designated by a majority of the
Commission and may be served by any person designated by such
Chair, subcommittee chair, or member.
(B) Enforcement.--
(i) In general.--If a person refuses to obey a subpoena
issued under subparagraph (A), the Commission may apply to a
United States district court for an order requiring that
person to appear before the Commission to give testimony,
produce evidence, or both, relating to the matter under
investigation. The application may be made within the
judicial district where the hearing is conducted or where
that person is found, resides, or transacts business. Any
failure to obey the order of the court may be punished by the
court as civil contempt.
[[Page H1740]]
(ii) Jurisdiction.--In the case of contumacy or failure to
obey a subpoena issued under subparagraph (A), the United
States district court for the judicial district in which the
subpoenaed person resides, is served, or may be found, or
where the subpoena is returnable, may issue an order
requiring such person to appear at any designated place to
testify or to produce documentary or other evidence. Any
failure to obey the order of the court may be punished by the
court as a contempt of that court.
(iii) Additional enforcement.--In the case of the failure
of a witness to comply with any subpoena or to testify when
summoned under authority of this paragraph, the Commission,
by majority vote, may certify a statement of fact attesting
to such failure to the appropriate United States attorney,
who shall bring the matter before the grand jury for its
action, under the same statutory authority and procedures as
if the United States attorney had received a certification
under sections 102 through 104 of the Revised Statutes of the
United States (2 U.S.C. 192 through 194).
(3) Contracting.--The Commission may, to such extent and in
such amounts as are provided in appropriations Acts, enter
into contracts to enable the Commission to discharge its
duties under this section.
(4) Information from federal agencies.--
(A) In general.--The Commission is authorized to secure
directly from any executive department, bureau, agency,
board, commission, office, independent establishment, or
instrumentality of the Government documents, information,
suggestions, estimates, and statistics for the purposes of
this section. Each department, bureau, agency, board,
commission, office, independent establishment, or
instrumentality shall furnish such documents, information,
suggestions, estimates, and statistics directly to the
Commission upon request made by the Chair, the chair of any
subcommittee created by a majority of the Commission, or any
member designated by a majority of the Commission.
(B) Receipt, handling, storage, and dissemination.--
Information shall only be received, handled, stored, and
disseminated by members of the Commission and its staff in a
manner consistent with all applicable statutes, regulations,
and Executive orders.
(5) Assistance from federal agencies.--
(A) General services administration.--The Administrator of
General Services shall provide to the Commission on a
reimbursable basis administrative support and other services
for the performance of the Commission's functions.
(B) Other departments and agencies.--In addition to the
assistance prescribed in subparagraph (A), departments and
agencies of the United States may provide to the Commission
such services, funds, facilities, staff, and other support
services as they may determine advisable and as may be
authorized by law.
(6) Gifts.--The Commission may accept, use, and dispose of
gifts or donations of services or property.
(7) Postal services.--The Commission may use the United
States mails in the same manner and under the same conditions
as departments and agencies of the United States.
(e) Staff of Commission.--
(1) In general.--
(A) Appointment and compensation.--The Chair, in
consultation with Vice Chair and in accordance with rules
agreed upon by the Commission, may appoint and fix the
compensation of an executive director and such other
personnel as may be necessary to enable the Commission to
carry out its functions, without regard to the provisions of
title 5, United States Code, governing appointments in the
competitive service, and without regard to the provisions of
chapter 51 and subchapter III of chapter 53 of such title
relating to classification and General Schedule pay rates,
except that no rate of pay fixed under this paragraph may
exceed the equivalent of that payable for a position at level
V of the Executive Schedule under section 5316 of title 5,
United States Code.
(B) Personnel as federal employees.--
(i) In general.--The executive director and any personnel
of the Commission who are employees shall be employees under
section 2105 of title 5, United States Code, for purposes of
chapters 63, 81, 83, 84, 85, 87, 89, 89A, 89B, and 90 of that
title.
(ii) Members of commission.--Clause (i) shall not be
construed to apply to members of the Commission.
(2) Detailees.--A Federal Government employee may be
detailed to the Commission without reimbursement from the
Commission, and such detailee shall retain the rights,
status, and privileges of his or her regular employment
without interruption.
(3) Consultant services.--The Commission is authorized to
procure the services of experts and consultants in accordance
with section 3109 of title 5, United States Code, at rates
not to exceed the daily rate paid a person occupying a
position at level IV of the Executive Schedule under section
5315 of title 5, United States Code.
(f) Security Clearances for Commission Members and Staff.--
(1) Expeditious provision of clearances.--The appropriate
Federal agencies or departments shall cooperate with the
Commission in expeditiously providing to the Commission
members and staff appropriate security clearances to the
extent possible pursuant to existing procedures and
requirements, except that no person shall be provided with
access to classified information under this section without
the appropriate security clearances.
(2) Access to classified information.--All members of the
Commission and commission staff, as authorized by the Chair
or the designee of the Chair, who have obtained appropriate
security clearances, shall have access to classified
information related to the surveillance activities within the
scope of the examination of the Commission and any other
related classified information that the members of the
Commission determine relevant to carrying out the duties of
the Commission under this section.
(3) Facilities and resources.--The Director of National
Intelligence shall provide the Commission with appropriate
space and technical facilities approved by the Commission.
(g) Compensation and Travel Expenses.--
(1) Compensation.--Each member of the Commission may be
compensated at a rate not to exceed the daily equivalent of
the annual rate of basic pay in effect for a position at
level IV of the Executive Schedule under section 5315 of
title 5, United States Code, for each day during which that
member is engaged in the actual performance of the duties of
the Commission.
(2) Travel expenses.--While away from their homes or
regular places of business in the performance of services for
the Commission, members of the Commission shall be allowed
travel expenses, including per diem in lieu of subsistence,
in the same manner as persons employed intermittently in the
Government service are allowed expenses under section 5703(b)
of title 5, United States Code.
(h) Nonapplicability of Federal Advisory Committee Act.--
(1) In general.--The Federal Advisory Committee Act (5
U.S.C. App.) shall not apply to the Commission.
(2) Public meetings.--The Commission shall hold public
hearings and meetings to the extent appropriate.
(3) Public hearings.--Any public hearings of the Commission
shall be conducted in a manner consistent with the protection
of information provided to or developed for or by the
Commission as required by any applicable statute, regulation,
or Executive order.
(i) Reports and Recommendations of Commission.--
(1) Interim reports.--The Commission may submit to the
President and Congress interim reports containing such
findings, conclusions, and recommendations for corrective
measures as have been agreed to by a majority of Commission
members.
(2) Final report.--Not later than one year after the date
of its first meeting, the Commission, in consultation with
appropriate representatives of the intelligence community,
shall submit to the President and Congress a final report
containing such information, analysis, findings, conclusions,
and recommendations as have been agreed to by a majority of
Commission members.
(3) Form.--The reports submitted under paragraphs (1) and
(2) shall be submitted in unclassified form, but may include
a classified annex.
(4) Recommendations for declassification.--The Commission
may make recommendations to the appropriate department or
agency of the Federal Government regarding the
declassification of documents or portions of documents.
(j) Termination.--
(1) In general.--The Commission, and all the authorities of
this section, shall terminate 60 days after the date on which
the final report is submitted under subsection (i)(2).
(2) Administrative activities before termination.--The
Commission may use the 60-day period referred to in paragraph
(1) for the purpose of concluding its activities, including
providing testimony to committees of Congress concerning its
report and disseminating the final report.
(k) Definitions.--In this section:
(1) Intelligence community.--The term ``intelligence
community'' has the meaning given the term in section 3(4) of
the National Security Act of 1947 (50 U.S.C. 401a(4)).
(2) United states person.--The term ``United States
person'' has the meaning given the term in section 101(i) of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(i)).
(l) Funding.--
(1) In general.--There are authorized to be appropriated
such sums as may be necessary to carry out the activities of
the Commission under this section.
(2) Duration of availability.--Amounts made available to
the Commission under paragraph (1) shall remain available
until the termination of the Commission.
TITLE IV--OTHER PROVISIONS
SEC. 401. SEVERABILITY.
If any provision of this Act, any amendment made by this
Act, or the application thereof to any person or
circumstances is held invalid, the validity of the remainder
of the Act, any such amendments, and of the application of
such provisions to other persons and circumstances shall not
be affected thereby.
SEC. 402. EFFECTIVE DATE.
Except as provided in section 404, the amendments made by
this Act shall take effect on the date of the enactment of
this Act.
SEC. 403. REPEALS.
(a) Repeal of Protect America Act of 2007 Provisions.--
(1) Amendments to fisa.--
(A) In general.--Except as provided in section 404,
sections 105A, 105B, and 105C of the
[[Page H1741]]
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1805a, 1805b, and 1805c) are repealed.
(B) Technical and conforming amendments.--
(i) Table of contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 nt) is amended by striking the items relating
to sections 105A, 105B, and 105C.
(ii) Conforming amendments.--Except as provided in section
404, section 103(e) of the Foreign Intelligence Surveillance
Act of 1978 (50 U.S.C. 1803(e)) is amended--
(I) in paragraph (1), by striking ``105B(h) or 501(f)(1)''
and inserting ``501(f)(1) or 702(h)(4)''; and
(II) in paragraph (2), by striking ``105B(h) or 501(f)(1)''
and inserting ``501(f)(1) or 702(h)(4)''.
(2) Reporting requirements.--Except as provided in section
404, section 4 of the Protect America Act of 2007 (Public Law
110-55; 121 Stat. 555) is repealed.
(3) Transition procedures.--Except as provided in section
404, subsection (b) of section 6 of the Protect America Act
of 2007 (Public Law 110-55; 121 Stat. 556) is repealed.
(b) FISA Amendments Act of 2008.--
(1) In general.--Except as provided in section 404,
effective December 31, 2009, title VII of the Foreign
Intelligence Surveillance Act of 1978, as amended by section
101(a), is repealed.
(2) Technical and conforming amendments.--Effective
December 31, 2009--
(A) the table of contents in the first section of such Act
(50 U.S.C. 1801 nt) is amended by striking the items related
to title VII;
(B) except as provided in section 404, section 601(a)(1) of
such Act (50 U.S.C. 1871(a)(1)) is amended to read as such
section read on the day before the date of the enactment of
this Act; and
(C) except as provided in section 404, section
2511(2)(a)(ii)(A) of title 18, United States Code, is amended
by striking ``or a court order pursuant to section 704 of the
Foreign Intelligence Surveillance Act of 1978''.
SEC. 404. TRANSITION PROCEDURES.
(a) Transition Procedures for Protect America Act of 2007
Provisions.--
(1) Continued effect of orders, authorizations,
directives.--Notwithstanding any other provision of law, any
order, authorization, or directive issued or made pursuant to
section 105B of the Foreign Intelligence Surveillance Act of
1978, as added by section 2 of the Protect America Act of
2007 (Public Law 110-55; 121 Stat. 552), shall continue in
effect until the expiration of such order, authorization, or
directive.
(2) Applicability of protect america act of 2007 to
continued orders, authorizations, directives.--
Notwithstanding any other provision of this Act or of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801
et seq.)--
(A) subject to paragraph (3), section 105A of such Act, as
added by section 2 of the Protect America Act of 2007 (Public
Law 110-55; 121 Stat. 552), shall continue to apply to any
acquisition conducted pursuant to an order, authorization, or
directive referred to in paragraph (1); and
(B) sections 105B and 105C of such Act (as so added) shall
continue to apply with respect to an order, authorization, or
directive referred to in paragraph (1) until the expiration
of such order, authorization, or directive.
(3) Use of information.--Information acquired from an
acquisition conducted pursuant to an order, authorization, or
directive referred to in paragraph (1) shall be deemed to be
information acquired from an electronic surveillance pursuant
to title I of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1801 et seq.) for purposes of section 106 of
such Act (50 U.S.C. 1806).
(4) Protection from liability.--Subsection (l) of section
105B of the Foreign Intelligence Surveillance Act of 1978, as
added by section 2 of the Protect America Act of 2007, shall
continue to apply with respect to any directives issued
pursuant to such section 105B.
(5) Jurisdiction of foreign intelligence surveillance
court.--Notwithstanding any other provision of this Act or of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801 et seq.), section 103(e), as amended by section 5(a) of
the Protect America Act of 2007 (Public Law 110-55; 121 Stat.
556), shall continue to apply with respect to a directive
issued pursuant to section 105B of the Foreign Intelligence
Surveillance Act of 1978, as added by section 2 of the
Protect America Act of 2007, until the expiration of all
orders, authorizations, and directives issued or made
pursuant to such section.
(6) Reporting requirements.--
(A) Continued applicability.--Notwithstanding any other
provision of this Act, the Protect America Act of 2007
(Public Law 110-55), or the Foreign Intelligence Surveillance
Act of 1978 (50 U.S.C. 1801 et seq.), section 4 of the
Protect America Act of 2007 shall continue to apply until the
date that the certification described in subparagraph (B) is
submitted.
(B) Certification.--The certification described in this
subparagraph is a certification--
(i) made by the Attorney General;
(ii) submitted as part of a semi-annual report required by
section 4 of the Protect America Act of 2007;
(iii) that states that there will be no further
acquisitions carried out under section 105B of the Foreign
Intelligence Surveillance Act of 1978, as added by section 2
of the Protect America Act of 2007, after the date of such
certification; and
(iv) that states that the information required to be
included under such section 4 relating to any acquisition
conducted under such section 105B has been included in a
semi-annual report required by such section 4.
(7) Effective date.--Paragraphs (1) through (6) shall take
effect as if enacted on August 5, 2007.
(b) Transition Procedures for FISA Amendments Act of 2008
Provisions.--
(1) Orders in effect on december 31, 2009.--Notwithstanding
any other provision of this Act or of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.), any order, authorization, or directive issued or made
under title VII of the Foreign Intelligence Surveillance Act
of 1978, as amended by section 101(a), shall continue in
effect until the date of the expiration of such order,
authorization, or directive.
(2) Applicability of title vii of fisa to continued orders,
authorizations, directives.--Notwithstanding any other
provision of this Act or of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.), with
respect to any order, authorization, or directive referred to
in paragraph (1), title VII of such Act, as amended by
section 101(a), shall continue to apply until the expiration
of such order, authorization, or directive.
(3) Challenge of directives; protection from liability; use
of information.--Notwithstanding any other provision of this
Act or of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.)--
(A) section 103(e) of such Act, as amended by section 113,
shall continue to apply with respect to any directive issued
pursuant to section 702(h) of such Act, as added by section
101(a);
(B) section 702(h)(3) of such Act (as so added) shall
continue to apply with respect to any directive issued
pursuant to section 702(h) of such Act (as so added);
(C) section 703(e) of such Act (as so added) shall continue
to apply with respect to an order or request for emergency
assistance under that section;
(D) section 706 of such Act (as so added) shall continue to
apply to an acquisition conducted under section 702 or 703 of
such Act (as so added); and
(E) section 2511(2)(a)(ii)(A) of title 18, United States
Code, as amended by section 101(c)(1), shall continue to
apply to an order issued pursuant to section 704 of the
Foreign Intelligence Surveillance Act of 1978, as added by
section 101(a).
(4) Reporting requirements.--
(A) Continued applicability.--Notwithstanding any other
provision of this Act or of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.), section
601(a) of such Act (50 U.S.C. 1871(a)), as amended by section
101(c)(2), and sections 702(l) and 707 of such Act, as added
by section 101(a), shall continue to apply until the date
that the certification described in subparagraph (B) is
submitted.
(B) Certification.--The certification described in this
subparagraph is a certification--
(i) made by the Attorney General;
(ii) submitted to the Select Committee on Intelligence of
the Senate, the Permanent Select Committee on Intelligence of
the House of Representatives, and the Committees on the
Judiciary of the Senate and the House of Representatives;
(iii) that states that there will be no further
acquisitions carried out under title VII of the Foreign
Intelligence Surveillance Act of 1978, as amended by section
101(a), after the date of such certification; and
(iv) that states that the information required to be
included in a review, assessment, or report under section 601
of such Act, as amended by section 101(c), or section 702(l)
or 707 of such Act, as added by section 101(a), relating to
any acquisition conducted under title VII of such Act, as
amended by section 101(a), has been included in a review,
assessment, or report under such section 601, 702(l), or 707.
(5) Transition procedures concerning the targeting of
united states persons overseas.--Any authorization in effect
on the date of enactment of this Act under section 2.5 of
Executive Order 12333 to intentionally target a United States
person reasonably believed to be located outside the United
States shall continue in effect, and shall constitute a
sufficient basis for conducting such an acquisition targeting
a United States person located outside the United States
until the earlier of--
(A) the date that such authorization expires; or
(B) the date that is 90 days after the date of the
enactment of this Act.
SEC. 405. NO RIGHTS UNDER THE FISA AMENDMENTS ACT OF 2008 FOR
UNDOCUMENTED ALIENS.
This Act and the amendments made by this Act shall not be
construed to prohibit surveillance of, or grant any rights
to, an alien not permitted to be in or remain in the United
States.
SEC. 406. SURVEILLANCE TO PROTECT THE UNITED STATES.
This Act and the amendments made by this Act shall not be
construed to prohibit the intelligence community (as defined
in section 3(4) of the National Security Act of 1947 (50
U.S.C. 401a(4))) from conducting lawful surveillance that is
necessary to--
[[Page H1742]]
(1) prevent Osama Bin Laden, al Qaeda, or any other
terrorist or terrorist organization from attacking the United
States, any United States person, or any ally of the United
States;
(2) ensure the safety and security of members of the United
States Armed Forces or any other officer or employee of the
Federal Government involved in protecting the national
security of the United States; or
(3) protect the United States, any United States person, or
any ally of the United States from threats posed by weapons
of mass destruction or other threats to national security.
The SPEAKER pro tempore. Pursuant to House Resolution 1041, the
motion shall be debatable for 1 hour, with 40 minutes equally divided
and controlled by the chairman and ranking minority member of the
Committee on the Judiciary and 20 minutes equally divided and
controlled by the chairman and ranking minority member of the Permanent
Select Committee on Intelligence.
The gentleman from Michigan (Mr. Conyers) and the gentleman from
Texas (Mr. Smith) each will control 20 minutes, and the gentleman from
Texas (Mr. Reyes) and the gentleman from Michigan (Mr. Hoekstra) each
will control 10 minutes.
The Chair recognizes the gentleman from Michigan.
General Leave
Mr. CONYERS. Mr. Speaker, I ask unanimous consent that all Members
have 5 legislative days to revise and extend their remarks and include
extraneous material on the bill under consideration.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Michigan?
There was no objection.
Mr. CONYERS. Mr. Speaker, I yield myself such time as I may consume.
Ladies and gentlemen of the House, we finally come to the point in
time where we consider the Foreign Intelligence Surveillance Act
amendments, and I am delighted to bring this measure to the floor.
I begin by observing that there are few rights that are more
fundamental to our democracy than the right to have protections against
unreasonable search and seizure, and there are few responsibilities
that are more important than the government's protecting us from
foreign threats. I submit that the measure before us does both of those
and regards them as the two most important acts that we can pursue as
responsible Members of the Congress. That conflict or tension goes to
the very core of who we are as a Nation.
Now, for more than 30 years, we have relied on the Foreign
Intelligence Surveillance Act to strike the appropriate balance between
the government's need to protect our rights from foreign attack and our
citizens' right to be free from unreasonable searches and seizures and
to have freedom of speech. The heart of that bargain was that the
government could indeed use its awesome power of surveillance but only
through independent court review. That's FISA since 1978.
Now, a few years ago, the administration unilaterally chose to engage
in warrantless surveillance of American citizens without court review.
And last August, when this scheme appeared to be breaking down, this
administration pushed through a law that it had caused to be drafted
that essentially transferred the power of independent review from the
courts to the Attorney General of the United States. Today, we will be
voting on legislation to restore that proper balance.
And so we present to you an uncomplicated consideration of a measure
that has three titles. The first allows the government to obtain a
single court order to approve surveillance against all members of any
known terrorist group. It includes important safeguards to make sure
that this power is not used to target innocent Americans.
{time} 1215
The chairman of the Intelligence Committee has a lot more to say
about that.
The second title deals with the difficult issue of how we make sure
that those telecom carriers who assisted the government in the
aftermath of the September 11 tragedy are not placed in a position
where they cannot defend themselves in court.
And then, finally, the last title provides an accounting of the
highly controversial warrantless surveillance program. The
administration tells us they have nothing to hide and the program was
lawful in their program or its implementation. If that is the case,
they should have nothing to fear from this blue ribbon commission that
will be created by the enactment of the provision before us.
Now, we learned only yesterday that the Federal Bureau of
Investigation was continuing to misuse the authorities that we granted
it under the PATRIOT Act 6 years ago to unlawfully obtain information
about law-abiding Americans. Just yesterday. We learned 4 days ago that
the National Security Agency was using its massive power to create a
nationwide database of American citizens. Four days ago.
And so that's why I believe it important that we include the civil
liberties safeguards set forth in the legislation today. We have been
working very closely with the American Civil Liberties Union in that
regard, and we have a half dozen other organizations that have fully
endorsed the bill.
The legislation before us gives the administration and the agencies
every tool they need to protect our Nation against terrorism, while at
the same time protecting our own citizens' civil rights and liberties.
I urge that we carefully examine the proposition before us.
And I will reserve the balance of my time.
Mr. SMITH of Texas. Mr. Speaker, I yield myself such time as I may
consume.
This debate today is not about Republican or Democratic arguments. It
is not about right or left ideology. It is simply about protecting our
country, and it is about protecting American lives. This might be a
good time to recall the story of the American soldiers who were killed
in Iraq last May. When the U.S. military discovered that the soldiers
had been kidnapped by terrorists, they launched a full scale search and
rescue mission.
In the early hours of the operation, U.S. intelligence officials on
the ground discovered a lead that required immediate electronic
surveillance of telephone conversations. But the terrorist loophole,
which requires a court order from Washington before conducting
surveillance on a foreign target, prevented our intelligence officials
from gathering information from almost 10 hours.
The body of one of the soldiers was later found in the Euphrates
River. The terrorists claim to have executed the other two soldiers.
We will never know if that information could have saved the lives of
our soldiers. But we do know that the terrorist loophole tied our hands
then and perhaps is costing us lives now.
Prior to enactment of the Protect America Act, the Director of
National Intelligence, Admiral McConnell, warned Congress that our
intelligence community was missing two-thirds of all overseas terrorist
communications. Three weeks ago, the Protect America Act expired, and
our intelligence community lost the tools they need to monitor
terrorists overseas and protect Americans here at home. We may never
recover the foreign intelligence lost because of Congress's inaction.
This intelligence might have given us information about terrorist
plots or foreign espionage. I hope these missed opportunities will not
lead to a terrorist attack in the United States or in other countries
that could have been prevented.
We are now 27 days late and much intelligence short because of the
Democratic leadership's refusal to consider the bipartisan Senate bill.
If they had brought it to the floor 3 weeks ago, it would have passed
easily; and America would be safer today. But rather than modernize the
Foreign Intelligence Surveillance Act, the Democrat majority's bill
actually weakens it.
First, the Democrats' bill requires a court order before the
government can begin surveillance of a foreign terrorist overseas. FISA
has never required a court order to target foreigners overseas. As we
saw in May, this causes significant delays in gathering foreign
intelligence, placing Americans at risk.
Second, the Democrats' bill denies giving immunity to
telecommunications providers who assisted the government following the
terrorist attacks of September 11, 2001. The past
[[Page H1743]]
and future cooperation of these companies is essential to our national
security.
Ninety-eight percent of America's communications technology is owned
by private sector companies. We cannot conduct foreign surveillance
without them. But if we continue to subject them to billion-dollar
lawsuits, we risk losing their cooperation in the future. In fact, this
bill is so flawed that the President has promised to veto it. Even
more, Senator Reid, the Democratic majority leader, acknowledges that
this legislation will never pass in the Senate.
Congress can and must do better than this bill. Our liberties, our
security, and the future of our Nation depend on it.
I urge my colleagues to oppose this fatally flawed piece of
legislation, and I ask the Democratic majority to bring the bipartisan
Senate bill to the House floor for a vote.
Mr. Speaker, I will reserve the balance of my time.
Mr. REYES. Mr. Speaker, I yield myself such time as I may consume.
I am proud to rise today in support of H.R. 3773, the FISA Amendments
Act of 2008. This bill arms our intelligence community with powerful
new tools to track and identify terrorist targets outside the United
States. At the same time, it restores essential constitutional
protections to Americans that were sharply eroded when the President
signed the law known as the Protect America Act last August.
We have put the security of Americans first and foremost, with close
attention to their constitutional rights. We have also included
provisions to allow companies that acted lawfully to make that argument
to the courts. If they did nothing wrong, as they have said, then they
will be immune from any lawsuit.
Title I of this bill ensures that the government does not need to get
an individualized warrant when it targets communications of targets
overseas, the so-called foreign-to-foreign. This is the central problem
that the administration cited with FISA in August, and we have fixed
it.
Let me be clear, Mr. Speaker, this bill does not require individual
warrants for foreign targets before surveillance can begin. It does
require the FISA Court to ensure that the procedures that the
government uses to identify foreign targets are designed to protect the
rights of Americans. This independent front-end review is necessary to
ensure that the rights of Americans are being properly protected before
any violations occur. However, we also provide a generous emergency
provision, at least 30 days, so that the surveillance can begin in an
emergency before the government has to go get approval from a court.
In title II, we address the issue of the lawsuits filed against the
telecom companies who allegedly participated in the President's
warrantless surveillance program. This bill allows the courts to
carefully safeguard classified information under well-established
protocols. This information that the companies may wish to use to
defend themselves now gives them that opportunity. This will also allow
the companies to defend themselves in a secure effort. If they are
innocent, they will face no damage. If they broke the law, they will be
held to account. But this issue will be decided by a court, the
American way.
Title III of this bill establishes a bipartisan national commission
to investigate warrantless tapping. I believe that the Nation is deeply
concerned about what has gone on for the last 7 years. And I also want
to restore some of the trust in the intelligence community. Title III
is designed to do just that, by bringing these things into light in a
careful and bipartisan manner. The American people deserve to know the
truth about what has happened. This provision makes that happen.
This is an important step forward, Mr. Speaker. So I urge my
colleagues to vote ``yes.''
I reserve the balance of my time.
Mr. SMITH of Texas. Mr. Speaker, not enough attention is given to
what the Director of National Intelligence and the Attorney General
think about this piece of legislation; and in order to serve that
purpose, I yield 2 minutes to the gentleman from Florida (Mr. Feeney),
who is also a member of the Judiciary Committee.
Mr. FEENEY. Mr. Speaker, there couldn't be a more critical discussion
to have this morning before we cast this critical vote. The chairman of
the Intelligence Committee, I must say, I respectfully disagree with in
terms of the devastating consequences his proposal would have. The
Attorney General of the United States and the Director of National
Intelligence have looked at this proposal, and here is what they have
said about the majority's proposal: ``Requiring prior court approval to
gather foreign intelligence from foreign targets located overseas: the
reason Congress did not include such a requirement when it passed the
original FISA statute and with good reason, these foreign targets have
no right to any court review of such surveillance under our
Constitution. We know from experience requiring prior court approval is
a formula for delay. Thus, this framework would impede vital foreign
intelligence collection and put the Nation at unnecessary and greater
risk.''
Ladies and gentlemen, assume that you are the head of a corporation
or a business in America after America is attacked, thousands of lives
and several cities attacked; assuming that there is imminent threats to
dozens of other cities and millions of others; assuming the Attorney
General or the President contacts you and say that you have access to
information that will save millions of Americans. What would you do? I
hope you would cooperate.
That is what many companies did, and now they are subject, in San
Francisco, to over 50 lawsuits for tens of billions of dollars. The
question is whether we ought to protect patriotic companies that for
several hundred years have had a privilege to cooperate with
government. It's true that technically they may have immunity. But here
is what you haven't acknowledged: the immunity is useless to them
because they cannot assert it. It would be a violation of Federal law.
Mr. Speaker, I will submit for the Record a letter from the general
counsel of AT&T, the victim of one of these trial lawyer suits to the
tune of tens of billions of dollars as he talks about the state secrets
doctrine that prevents them from protecting themselves in a court of
law, as he talks about the dilemma that they face in the future going
forward if they want to help Americans defend themselves.
Mr. CONYERS. Mr. Speaker, I would like to recognize Jim Marshall of
Georgia, who has worked with us on this month in and month out, for
1\1/2\ minutes.
Mr. MARSHALL. I thank you, Mr. Chairman.
Mr. Speaker, may I engage the chairman of the Judiciary Committee and
the chairman of the Intelligence Committee for purposes of a colloquy.
Mr. CONYERS. Of course.
Mr. REYES. I would be happy to oblige my good friend from Georgia.
Mr. MARSHALL. I would like to clarify some elements of the process to
be established under title II of the bill we debate today. Title II of
the bill would assist the telecommunications carriers in dealing with
the civil lawsuits they currently face by permitting them to use
classified information in defense of claims against them.
I want to be clear that any review of classified information would
only take place in the judge's chambers without the plaintiffs or their
representatives present. The bill requires the judge to follow the
procedures in section 106(f) of FISA.
Am I correct in my understanding that section 106(f) of FISA requires
that the review of any classified information must take place in camera
and ex parte and that such classified information must remain secret,
that it is not to be disclosed to the plaintiffs, their representatives
or any others except those authorized to receive such information by
virtue of their security clearances?
Mr. CONYERS. Mr. Marshall, I couldn't put it any more appropriately
myself.
Mr. REYES. That is correct.
Mr. MARSHALL. I would also like to clarify what sort of trial would
be involved in this process. Am I correct in my understanding that
under the bill being debated, if this judicial process in any way
involves classified information, the classified portion of the trial
[[Page H1744]]
would be conducted by a judge without a jury; the judge would privately
inspect, but not reveal, classified information relevant to the case;
and that the process would be limited to the in camera ex parte
procedures already outlined in FISA?
Mr. REYES. That is correct.
Mr. CONYERS. I agree, as well.
{time} 1230
Mr. SMITH of Texas. Mr. Speaker, I yield 2 minutes to the gentleman
from Iowa (Mr. King), a member of the Judiciary Committee.
Mr. KING of Iowa. I thank the ranking member for yielding.
Mr. Speaker, you know, we are here not really talking about the issue
of rights. I haven't found anyone yet who has had their rights trampled
on, their rights to be free from unreasonable search and seizure, as
the chairman announced from the beginning.
As I look at what is going on here in policy, there is a situation
going on right now in New York, in that area, where you have
contractors that answered the call and the crisis of 9/11, and they are
under lawsuits by the thousands, and I think we are in pretty much
unanimous agreement that we should indemnify them for answering the
call to protect America. I don't understand the difference between why
we would not want to indemnify an information company that answered the
call to protect America.
To me, those are the closest two comparisons that we can get. If we
protect contractors when they went to that smoking hole in that war
zone, why won't we protect telecommunication companies when they
stepped up on good faith and believed that they were legally operating
under the law?
Where is that first citizen that has had their privacy violated? I
haven't found one yet. None have been brought forward. I sat in hours
of classified briefings. No one even uttered the name of a person who
had their rights violated.
The chairman talked about restoring the proper balance. Well, here is
the thing that sits behind this restoring the proper balance. This is
from page 8 of the AT&T letter. ``The legal paradox has implications
not just for the carrier defendants, but for the Nation's security in
general. It suggests to private companies that even good-faith
cooperation is apparently authorized, and lawful intelligence activity
can expose them to serious legal and business risk. This creates
incentives to resist cooperation.''
That sets up a scenario where we are saying to companies, cooperate
with us, but you might have to face, and will face, billions and
billions of dollars of lawsuits, two score more of lawsuits, two dozen
or more aggregated under a single court, Ninth Circuit, San Francisco,
and they are watching their share values go down and watching their
opportunities diminish around the world. And then we put them in the
face of the paradox, what do you do if there is another attack on
America?
These scales of justice are now out of balance because the trial
lawyers have put this thing out of balance, and the political pressure
and the risk to the American people of the security of being attacked
again are what is weighing on the other side. When the fear of attack
gets greater and when the political benefit becomes that point, then we
will offset the trial lawyers and we will get a bill.
Mr. CONYERS. Mr. Speaker, I yield 2 minutes to the gentleman from New
York (Mr. Nadler), a coauthor of the bill before us today and the
chairman of the Constitution Committee.
Mr. NADLER. Mr. Speaker, I thank the gentleman for yielding.
Mr. Speaker, I rise in support of this carefully crafted legislation
which gives our intelligence agencies all the tools they say they need
to protect our country while protecting our fundamental civil
liberties.
In the last few weeks, we have heard countless assertions from our
colleagues on the other side that are false and misleading. They claim
that we allowed the Protect America Act to expire, when it was the
Republicans who blocked attempts to extend that bill temporarily, and
they continue to claim that retroactive immunity for the telecom
companies is necessary for the security of the country.
The telecom companies aided the administration's surveillance
program. Some people, American citizens, believe their constitutional
rights were violated and brought a lawsuit against the government and
telecom companies.
There are two narratives here. One is that these companies
patriotically aided the administration to protect Americans from
terrorists. The other is that they conspired with a lawless
administration to violate the constitutional rights of Americans. Which
of these narratives is right is for a court to decide. It is not the
role of Congress to decide legal cases between private parties. That is
why we have courts.
We had told the telecom companies they would not be subject to
lawsuits for doing their duty. But whether they were doing their duty
or abusing the rights of Americans is precisely the issue.
In any event, the existing law already provides absolute immunity if
their help was requested and if they were given a statement by the
Attorney General or various other government officials stating that the
requested help did not require a warrant or court order and would not
break the law. They have immunity. Whether those statements are true or
not, they can rely absolutely on the government's assertions.
So why do they think they need retroactive immunity? Because of the
administration's sweeping assertion of the State secrets doctrine, will
has prevented the companies from claiming their immunity.
This bill allows the telecom companies in secret in court to present
the evidence for their immunity and to get their immunity, if they
obeyed the law. And I remind that obeying the law means simply
obtaining a statement from the government that the company's help is
needed and that the requested help does not require a court order or
violated the law. A company that assisted in spying on its customers
without getting that simple assurance from the government does not
deserve immunity. And even if we voted retroactive immunity, they would
still have to prove that immunity for what they do next week in the
same way, and they would have the same problem.
So, by solving the State secrets problem, we give the companies the
immunity they need, if they need it, and if they obeyed the law. This
still gives our intelligence agencies what they need. I urge its
adoption.
Mr. Speaker, I rise in strong support of H.R. 3733, the FISA
Amendments Act. This carefully crafted legislation gives our
intelligence agencies all the tools they say they need to protect our
country, while protecting our fundamental civil liberties.
Mr. Speaker, let us be clear about what this legislation does not do.
It does not require individual warrants for the targeting of foreign
terrorists located outside the United States. For three decades, that
has been the law, and it will still be the law under this bill. There
is no dispute about this.
The bill starts with the recognition that the intelligence community
needs to surveil all members of a terrorist group--once that group is
identified. Any suggestion that it requires individualized warrants to
intercept communications of terrorists overseas is wrong.
The bill maintains the traditional requirement of a warrant when our
intelligence agencies seek to conduct surveillance on Americans. And
because some foreign surveillance may record conversations with
Americans, the bill requires that, when the Government proposes to
undertake surveillance of a foreign group or entity, it must first
apply to the FISA court, except that, in an emergency, the surveillance
can begin immediately, and the court can consider the surveillance
procedures later.
In both this bill and the Senate bill, the government must inform the
court of the procedures it will use to ensure that it is targeting only
foreigners overseas and how it will ``minimize'' domestic information
it might inadvertently pick up. The only real difference is that the
Senate bill lets them listen first, then go to the court within 5 days.
This bill requires that they go to the FISA Court first. But in an
emergency, we give them 7 days to listen before they go to the court.
So will someone please tell me how this minor difference between the
bills somehow gives rights to terrorist?
There is one thing that this bill does not do, and this great body
must not do--provide blanket, retroactive immunity to the
telecommunication companies that assisted in the President's
warrantless wiretapping program. Such a move would fly in the face of
our notions of justice.
Mr. Speaker, in the last few weeks, we have heard countless
assertions from our colleagues on the other side that are false and
[[Page H1745]]
misleading. They claim that we allowed the Protect America Act to
expire--when it was the Republicans who blocked attempts to extend that
legislation temporarily. And they continue to claim that retroactive
immunity for the telecom companies is necessary for the security of the
country. But they have failed to provide any evidence for that claim.
The telecom companies aided the Administration's surveillance
program. Some people--American citizens--believe their constitutional
rights were violated, and brought suit against the government and the
telecom companies. There are two narratives here. One is that the
telecom companies patriotically aided the Administration in protecting
Americans from terrorists. The other is that the telecom companies
conspired with a lawless Administration to violate the Constitutional
rights of Americans. Which of these narratives is correct is for a
court to decide.
It is not the role of Congress to decide legal cases between private
parties. That is why we have courts. If the claims are not meritorious,
the courts will throw them out. But if the claims do have merit, we
have no right to dismiss them without even reviewing the evidence.
We are told that the telecom companies should not be subject to
lawsuits for doing their duty. But whether they were doing their duty,
or abusing the rights of Americans, is precisely the issue. And that is
a legal issue for the courts to decide.
In any event, the existing law, in a wise balance of national
security and constitutional rights that this bill does not change,
already provides absolute immunity to the telecom companies if their
help was requested, and if they were given a statement by the Attorney
General, or by various other government officials, stating that the
requested help did not require a warrant or court order and would not
break the law. They have immunity whether those statements were true or
not. They can rely absolutely on the government's assertions.
So why do they think they need retroactive immunity? Because of the
Administration's sweeping assertion of the ``state secrets'' doctrine,
which has prevented the companies from claiming their immunity.
Title II of this bill will allow the telecoms to show the courts, in
a secure setting, if they were obeying the law or if they weren't. It
will allow the telecom companies to assert their immunity in court, and
to present the relevant documents and evidence to the court in a secret
session that protects any ``state secrets.'' The courts can then judge
whether the telecom company obeyed the law--in which case it has
complete immunity--or whether it did not. And, I remind you, that
``obeying the law'' means simply obtaining a statement from the
government that the company's help is needed, and that the requested
help does not require a court order or violate the law. A company that
assisted in spying on its customers without getting that simple
assurance does not deserve immunity.
Mr. Speaker, this bill gives our intelligence agencies what they say
they need. But it also demands that their extraordinary powers be used
properly, and that they follow our laws and our Constitution. This bill
will help limit this Administration's disregard for the rule of law. It
is a carefully crafted measure, and deserves the support of every
member in this body.
Mr. SMITH of Texas. I yield 2 minutes to the gentleman from Indiana
(Mr. Pence), a member of the Judiciary Committee and the Foreign
Affairs Committee.
(Mr. PENCE asked and was given permission to revise and extend his
remarks.)
Mr. PENCE. I thank the gentleman for yielding.
Mr. Speaker, I rise in opposition to the FISA Amendments Act of 2008.
America is at war. We have to do all we can to protect ourselves from
those who seek to do us and our communities and our families harm. But
for the past few weeks, we have unilaterally disarmed, because this
House has failed to pass an acceptable long-term extension of the
Foreign Intelligence Surveillance Act, and it will fail again today.
The United States Senate passed a workable bipartisan compromise by a
vote of 68-29 that extended FISA for nearly 6 years. The Senate bill
provided necessary immunity to communication providers who aided the
government after 9/11, and they are now facing numerous frivolous
lawsuits as a result. It also closed a massive loophole in our foreign
intelligence surveillance laws that prevents us from listening to
terrorists in one foreign country who are talking to a terrorist in
another foreign country; yet the Senate bill is not before us today.
It is extraordinary that a bipartisan compromise and accomplishment
in the United States Senate is not being considered before this House
today.
Last August, Republicans and Democrats on the Judiciary Committee
came together in the Protect America Act and we forged a compromise,
but it was only embraced in the short term. And, sadly, the Senate will
not pass this bill, even if it passes the House today, and if it did,
the President will veto it. So what we are involved in here is a futile
attempt at compromise that will fail.
Speaking less as a Congressman and more as a father and as an
American who was here on September 11, I urge my colleagues to take a
breath, to step back, to examine the spirit of compromise evidenced by
our colleagues in the Senate, and find a way to give our foreign
intelligence gathering the tools they need to protect our families.
Mr. REYES. Mr. Speaker, I am proud to say that the 110th Congress is
not a rubber stamp for anybody, the Senate or the administration.
I now yield 2\1/2\ minutes to the distinguished gentleman from Iowa
(Mr. Boswell), the vice chairman of the Intelligence Committee.
(Mr. BOSWELL asked and was given permission to revise and extend his
remarks.)
Mr. BOSWELL. Mr. Speaker, I thank Chairman Reyes for the time and
your dedicated leadership and hard work to effect oversight over our
Nation's multiple intelligence gathering agencies.
In the process of this debate regarding FISA, we have strived to make
America safe and exercise and protect the Constitution and Americans'
civil liberties. As I have heard Congressman Tierney say at different
times, if we had followed FISA, we wouldn't be here today, and I
appreciate that very, very much. Unfortunately, for whatever reason,
and I don't know, none of us do, whatever reason, this President has
repeatedly used executive orders and end-run the provisions,
protections of FISA that work for the purposes intended.
Several weeks ago, I became concerned that our private telecom
companies might be falsely accused and have the effect of putting a
chill on their response in the future. I felt a gut confidence that
pressure from on high was put on, i.e., we have an emergency, and we,
the government, must have your assistance or a terrible event would
happen. I think back on my own training in my life, and I know
something about those terrible events that could happen, because I put
together weapons of mass destruction in my own training, so it kind of
haunts you sometimes.
So, yes, I, like others, like 20 others, signed a letter of concern.
By the way, it was not a Blue Dog letter or a Blue Dog position. It was
individuals, some of whom were Blue Dogs.
Now, over the course of these past weeks, a credit to Chairman Reyes
and Chairman Conyers and our super staff, an acceptable solution has
been found that makes FISA, supports FISA, and gives protection to
those who assist within the provisions of the law.
For example, those who feel their civil rights have been violated can
seek justice, and the telecoms who feel they have complied with the law
can be defended. A judge would review the classified evidence and
decide. This means to me that the Constitution and civil rights are
protected, and the telecoms who are asked or pressured to assist in an
emergency can know that classified evidence will be seen by the judge.
Classified evidence would be seen by a judge and the providers' defense
would be taken into account. I believe this to be a solution.
So, in closing, I would say this will protect the Constitution and
the American people's civil rights, plus I support the bill because it
gives the intelligence community the tools it needs and gives the
telecom companies the means to defend themselves from unfair lawsuits.
The bill provides telecom companies a way to present their defense in
district court without the administration using State secrets to block
the defense. If a company is simply doing its patriotic duty and
following the law, this bill ensures the company will not be punished.
I urge everyone who signed the letter with me to support this
resolution.
Mr. SMITH of Texas. Mr. Speaker, I yield 2 minutes to the gentleman
from Ohio (Mr. Chabot), a member of both the Judiciary Committee and
the Foreign Affairs Committee.
Mr. CHABOT. I thank the gentleman for yielding.
[[Page H1746]]
Mr. Speaker, we are on the floor today debating yet again another set
of amendments to FISA, another set of amendments that limit the ability
of law enforcement and intelligence communities to make this Nation
safer, another set of amendments that have no chance of becoming law.
What these amendments do confirm is that we are a litigious society,
that some are willing to put lawsuits over safety.
Prior to the passage of the Protect America Act, our intelligence
community told us that they missed more than two-thirds of all overseas
terrorist communications because of gaps and inconsistencies in the
law. In August, we closed those holes, giving law enforcement and the
intelligence communities the tools and resources they need to stay one
step ahead.
Disappointingly, 26 days have passed since those provisions expired.
For 26 days now, our law enforcement and intelligence communities have
had to revert back to the status quo. They have had to revert back to a
status that allows terrorists to have the upper hand. And yet this
Chamber continues to bring legislation that we know will not do the
job, all the while, knowing that there is a solution, a bipartisan
solution, to this predicament.
The bipartisan solution lies in the legislation passed by the Senate
30 days ago. These amendments continue and build on the authorizations
provided by the Protect America Act, ensuring that surveillance
continues on foreign targets outside the United States. Immunity is
provided to our communication partners, FISA applications, and orders
are processed in a more timely manner, and lengthening the periods of
emergency authorization for electronic surveillance.
Yet this bill is mindful of our Constitution and the protections it
affords to U.S. citizens, whether they are inside or outside the United
States. Moreover, the authority provided by the bill sunsets in 6
years, allowing Congress to revisit if issues arise.
I urge my colleagues to not make the safety of the American people a
partisan issue.
There are many things that we can disagree on, but the safety of this
country should not be one of them. Let's not send the message that
litigation is more important than patriotism, but that we are committed
to standing as one in doing what is necessary and needed to keep this
Nation safe.
{time} 1245
Mr. CONYERS. Mr. Speaker, could I remind my two distinguished members
of Judiciary, Mike Pence of Indianapolis and Steve Chabot of Ohio, that
the reason we are not taking up the Senate provisions is that the House
has a better idea, and we are coequal. They don't give us whatever they
want.
The Chair is pleased now to recognize Bobby Scott of Virginia,
chairman of the Crime Committee, for 2 minutes.
Mr. SCOTT of Virginia. I would like to thank the chairs of the
Judiciary Committee and the Intelligence Committee for their hard work
in addressing the issue of warrantless surveillance under the Foreign
Intelligence Surveillance Act and for introducing legislation that
addresses national security challenges presented by global terrorism.
This bill provides that any wiretap which would be legal under the
President's proposal will be legal under this legislation. It merely
requires that under some circumstances that a warrant be obtained prior
to the wiretap or if there is an emergency after the wiretap begins.
The warrant procedure is a modest protection of our civil liberties.
This bill does not balance civil liberties with national security,
because all of the wiretaps would be permitted; but this bill just
provides a little oversight. The idea of wiretaps without oversight has
to be considered in the context of some recent documents of the
Department of Justice.
Republican-appointed officials have accused this administration of
firing U.S. Attorneys because they did not indict Democrats in time to
affect an upcoming election. We have been unable to ascertain the truth
of the allegations for several reasons.
First, high-ranging administration officials question the credibility
of Attorney General Gonzales' original response to the allegations. One
high-ranking Justice Department official quit; another pleaded the
fifth. White House officials have refused to respond to our subpoenas.
It is this Justice Department that seeks unprecedented authority to
wiretap citizens without traditional oversight or even articulating the
primary purpose of the wiretaps.
Furthermore, the bill does not offer retroactive immunity for illegal
activities. The fact is that the telecom companies which may benefit
from retroactive immunity already have immunity for any reasonable
actions they may have taken. This bill provides a procedural change
which ensures that these claims of immunity can properly be considered.
In summary, this bill provides for all of the security protections
sought by the President, but it also provides modest protection for our
civil liberties. Therefore, we should support the bill.
Mr. SMITH of Texas. Mr. Speaker, I yield 2 minutes to my colleague
from Texas (Mr. Gohmert), who is not only on the Judiciary Committee
but also the ranking member of the Crime, Terrorism and Homeland
Security Subcommittee.
Mr. GOHMERT. Mr. Speaker, we have just heard reference to the Senate
bill; and my friend, for whom I have great respect, our chairman of
Judiciary, Chairman Conyers, mentioned that we are coequal branches. I
would submit to you, we are an even more important branch because we
are more accountable to the people than the Senate is.
The difference, though, in the Senate bill and this bill is, the
Senate Democrats got input and allowed input into the bill from their
Republican colleagues, and we are not allowed to make amendments on
this bill. All we can do is come up and point out problems with it.
My friend, Mr. Nadler, whom I have come to believe has a brilliant
legal intellect, has come on the floor this morning and said that there
is false information from our side, that we are falsely misleading. He
said that we have been less than honest. That bothers me to no end,
because he knows some of the talking points that are being talked on
this floor are just not right.
Now, I have read the bill. It's a better bill than the manager's
amendment we dealt with last time; it is. But we are still not there,
and we still haven't been allowed enough input to make it better.
But we also heard from one of our colleagues across the aisle that
said he fought in Afghanistan, and he was a soldier. Thank God we have
him and others that would do that. But the telecoms in the week, 2
weeks, 4 weeks right after 9/11, when we did not know if we were going
to have thousands of Americans lost any day, they were put in a
terrible situation.
You know the law. The law is very restricted on who in the telecom
company can see the request or the demand from the administration, from
the NSA or whoever makes it. You know that. I pushed to make sure in
the law that they are at least allowed to talk to a lawyer, but they
are restricted there.
Put yourself in their place. They get a request in any hypothetical
case after Americans are killed in an act of war on our soil.
Mr. REYES. Mr. Speaker, I yield 1\1/2\ minutes to the gentlewoman
from California, Ms. Anna Eshoo, who chairs our Subcommittee on
Intelligence Community Management.
Ms. ESHOO. I thank the distinguished chairman of the House
Intelligence Committee.
Mr. Speaker, I rise in support of H.R. 3773. Today's debate really
goes to the heart of the two highest responsibilities of Members of
Congress, to preserve our Constitution and to secure our Nation.
Front and center, that's what this bill does, it accomplishes both.
It gives the intelligence community the most flexible tools for our
professionals for their surveillance of terrorists and other necessary
targets overseas. It accomplishes that. It safeguards our
constitutional rights by requiring the FISA Court to approve targeting
and minimization standards at the front end, when no emergency exists
and to assure that Americans are not targeted.
It protects the private sector by providing prospective liability
protection for telecommunications companies that provide lawful
assistance to the government, and it provides those companies a way to
present their defenses
[[Page H1747]]
in secure proceedings, in district court, without the administration
using state secrets to block those defenses.
These are the most critical tools and safeguards, and that's why
Members of Congress can be assured that they will be taking all the
right steps by supporting this bill.
The bill is one that we should all support, and I am proud to support
it.
Mr. SMITH of Texas. Mr. Speaker, I yield 1 minute to my colleague
from Texas (Mr. McCaul), who is a member of the Homeland Security
Committee and the Foreign Affairs Committee.
Mr. McCAUL of Texas. Mr. Speaker, we all took an oath in this Chamber
to protect and defend the Constitution of the United States from all
enemies, both foreign and domestic. That is what this debate here today
is really all about.
By allowing the Protect America Act to expire, we are extending
constitutional protections to foreign terrorists. This bill does
nothing to fix that problem.
We need to pass this Senate bill that passed overwhelmingly on a
bipartisan basis. I worked in the Justice Department on FISA warrants.
The statute was never designed to apply to foreign terrorists in a
foreign country, as recently stated by admiral Bobby Inman, the
principal author of the FISA statute.
I want to point out two articles that were in The New York Times
today: ``Afghanistan: Taliban Destroy Cell Towers.'' ``Taliban
Threatens Afghan Cellphone Companies.''
This is what is happening. We need to protect America now by making
the Protect America Act permanent. The Taliban in their own words,
their own statements, says the surveillance program has ``caused heavy
casualties to Taliban'' in great proportions.
It is time to pass the Protect America Act.
Mr. CONYERS. I wanted my friend Judge Gohmert to know that the reason
we didn't get the bipartisanship that the other body did is that you
guys boycotted our meetings. Your ranking member or leader could have
sent anybody to our meetings, but you didn't come. So now you are
complaining.
Mr. Speaker, I am happy to recognize Debbie Wasserman Schultz, a
valuable member of our Judiciary Committee, for 1 minute.
Ms. WASSERMAN SCHULTZ. Mr. Speaker, I began my service in Congress
fighting for the right to privacy. Above all else, Americans' ability
to communicate without the fear of having the government tap their
phones, listen to their conversations or intercept their private
communication is a right that just cannot be discarded.
Our good friends on the other side of the aisle have said if an
American is not communicating with a terrorist, then they have nothing
to fear. The manner in which the administration has conducted the
warrantless surveillance program has undermined our citizens'
confidence in the bedrock belief that we live in a free country where
we do not live in constant fear of the government looking over our
shoulder.
This is a cherished right that has been arrogantly cast aside by an
administration run amok. After a careful review of both classified and
unclassified materials concerning the administration's warrantless
wiretapping program, I, like so many of my Judiciary Committee
colleagues, concluded that the immunity that is proposed by the
administration is unnecessary and goes too far.
We must be vigilant when protecting our citizens' right to privacy.
It is a rare, unique, and important right that we cannot allow to be
subjected to death by a thousand cuts. If the administration has its
way and this right falls, what is next? We must stand in the breach and
make sure that Americans' right to privacy is preserved.
I urge my colleagues to support this bill.
Mr. SMITH of Texas. Mr. Speaker, I yield 1 minute to the gentlewoman
from Tennessee (Mrs. Blackburn), whom we wish were a member of the
Judiciary Committee.
Mrs. BLACKBURN. Mr. Speaker, the legislation before the House today
is nothing short of an abdication of the liberal majority's
responsibility to protect the American people. Yesterday's Investor's
Business Daily editorial sums the bill up nicely, a ``FISA Fix for
Lawyers.'' I could not say it better myself. After all, this bill is
nothing short of an earmark for the trial bar, and it reveals the
brazen partisan interest of this Democrat majority.
Rather than accept the bipartisan legislation adopted in the Senate
and endorsed by our Nation's security experts, the liberal elite of
this House instead brings forward a $72,440,904 thank you note to the
trial bar. Why $72,440,904? That's the amount the trial attorneys have
contributed to Democrat candidates in the 2008 election cycle.
But it might only be a down payment for the potential liability
interest that they have if they get their way on their earmark bill. We
have to say, at what cost? We have heard the story that I used in a
Memphis story on February 28 of our three American soldiers who were
kidnapped.
Mr. CONYERS. Mr. Speaker, I am honored to recognize the Speaker of
the House of Representatives, the Honorable Nancy Pelosi, for 1 minute.
Ms. PELOSI. I thank Mr. Conyers, the Chair of the Judiciary
Committee, for yielding and thank Mr. Reyes, the chairman of the
Intelligence Committee, for bringing this legislation to the floor.
They know, as does each and every one of us, that our primary
responsibility is to protect the American people.
Mr. Speaker, we take an oath of office, as has been referenced, to
protect and defend the Constitution of the United States from all
enemies foreign and domestic.
In the preamble it states that one of our primary responsibilities is
to provide for the common defense. We take those responsibilities
seriously, and I don't take seriously any statements by some in this
body that any person here is abdicating that responsibility.
All of us understand also the role that intelligence plays. In
protecting our troops, force protection, that used to be our primary
responsibility and now, of course, Homeland Security is part of that.
None of us would send our troops into harm's way without the
intelligence to perform their mission and keep them safe, although some
have been willing to send our men and women in uniform into harm's way
without the equipment they need to keep them safe, but we don't make
any accusations against them that they are not patriotic Americans who
don't want to protect the American people.
Chairman Conyers and Chairman Reyes have already pointed out in some
detail this legislation will meet our responsibility to protect America
while also protecting our precious civil liberties. The President has
said that our legislation will not make America safe. The President is
wrong, and I think he knows it. He knows that our legislation contains
within it the principles that were suggested by the Director of
National Intelligence, Mr. McConnell, early on, as to what is needed to
protect our people in terms of intelligence.
{time} 1300
The administration demands that Congress grant immunity to companies
for activities about which the President wants only a small number of
Members of Congress, and no member of the judicial branch, deciding on
any currently filed lawsuits to know anything about.
The bill before us acknowledges that immunity for the companies may
already exist under current law and allows that determination to be
decided by a judge with due protection for classified information, not
by hundreds of people who really do not have the facts.
Why should the administration oppose a judicial determination of
whether the companies already have immunity. Well, there are at least
three explanations. First, the President knows that it's the
administration's incompetence in failing to follow the procedures in
statute is what has prevented immunity from being conveyed. That is one
possibility. They simply didn't do it right.
Second, the administration's legal argument that the surveillance
requests were lawfully authorized was wrong, or public reports that the
surveillance activities undertaken by the companies went far beyond
anything about which any Member of Congress was notified, as is
required by the law.
[[Page H1748]]
None of these alternatives is attractive, but they clearly
demonstrate why the administration's insistence that Congress provide
retroactive immunity has never been about national security or about
concerns for the companies. It has always been about protecting the
administration.
As important as the issue of immunity might be, it is chiefly
important to the administration and the telecommunications companies as
they look back to events that occurred as many as 6 years ago. What is
truly important to the security of our country and the protections of
our Constitution going forward are the amendments made to the FISA bill
in title I in this bill that is on the floor today, the so-called
surveillance title of the bill.
The bill contains three of the essential provisions of the bill
passed by the House in November and, in doing so, explicitly rejects
the heart of the President's warrantless surveillance program. Those
provisions are:
One, the reinstatement that FISA remains the exclusive means to
authorize electronic surveillance. The President likes to think he has
inherent authority to surveil, to collect on anybody, and this bill
restates that FISA is the exclusive authority. This was a point
conceded to in 1978 when the Congress of the United States established
the FISA law, passed the FISA law, which was signed by the President of
the United States, thereby his recognition of Congress's ability to
make the courts, the third branch of government, the exclusive
authority for the collection of intelligence in the United States. That
is exclusivity.
Second, except in emergencies, FISA Court approval must take place
before surveillance begins, but there are exceptions in case of
emergency.
Third, a refusal to follow the Senate in excluding, and this is very
important because people are talking about the Senate bill as though it
is some great thing. This is very important: A refusal to follow the
Senate in excluding from the definition of electronic surveillance
activities historically considered within the definition. In other
words, if they don't want the law to apply to a particular activity,
they will just say it doesn't fall into this bill.
If the administration's change in the definition was accepted, FISA-
derived information, including U.S. person information, could be data-
mined with fewer protections than are currently in place under FISA.
This is very important to each and every person in America.
The President insists that we pass the Senate bill as is. Yet even
that legislation's chief author, Chairman Rockefeller, agrees that many
of the House provisions improve the Senate bill.
This legislation before us today will ensure that our intelligence
professionals have the tools they need to protect the American people.
And the President knows it.
This legislation will ensure that we protect what it means to be an
American, our precious civil rights and civil liberties. Both goals are
essential and both are achieved in this bill. I urge its passage.
Mr. SMITH of Texas. Mr. Speaker, I yield myself 1 minute.
Mr. Speaker, this might be a good time to read excerpts from a letter
to the Speaker. This letter was written 2 days ago by the Attorney
General and by the Director of National Intelligence, and I think
Members and the American people are going to be very interested in what
these two individuals had to say.
They expressed particular concern about requiring prior court
approval to gather foreign intelligence from foreign targets located
overseas.
The letter says: ``Congress did not include such a requirement when
it passed the original FISA statute, and with good reason. These
foreign targets have no right to any court review of such surveillance
under our Constitution. We know from experience that requiring prior
court approval is a formula for delay. Thus, this framework would
impede vital foreign intelligence collection and put the Nation at
unnecessary and greater risk.''
They conclude about this bill that it does not provide the
intelligence community the tools it needs to collect effectively
foreign intelligence information vital for the security of the Nation.
Mr. Speaker, what else do we need to hear? Members need to know this.
I reserve the balance of my time.
Mr. REYES. Mr. Speaker, I yield 1\1/2\ minutes to the gentleman from
Rhode Island (Mr. Langevin) who serves on our Intelligence Committee.
(Mr. LANGEVIN asked and was given permission to revise and extend his
remarks.)
Mr. LANGEVIN. Mr. Speaker, I thank the gentleman for yielding.
Mr. Speaker, I rise in support of H.R. 3773, a careful and reasoned
approach to electronic surveillance. Though people have talked a lot
about immunity, we must remember that because of changes in technology,
this is a bill to update the way we conduct electronic surveillance.
I approached this subject with two principles in mind. First, our
surveillance must be effective. Second, the rights of Americans must be
protected. On the second point, there is a real difference between the
Senate and the House bills.
The issue is how both bills handle the calls of Americans. Under the
Senate bill, the DNI and the Attorney General approve surveillance and
then go to the court, with no set timeline for ruling. Under the House
bill, the program of surveillance, not the specific individual targets,
is submitted to the court. The government will essentially ask the
court: Is this method of handling the communications of Americans
appropriate, careful, and, most importantly, constitutional?
The approval of a program of surveillance allows the government to
get approval before there is an operational requirement. So there will
never be any operational sacrifice here. If it were going to slow down
intelligence collection or cause operational problems, I can see where
some might take issue with that. But the simple fact is that the way
this bill is drafted, there is no excuse for not getting the approvals
in place in advance.
I am all for strong intelligence authorities. The beauty of this bill
is it combines that with care for our civil liberties, without
sacrificing either.
Mr. HOEKSTRA. Mr. Speaker, I yield 2\1/2\ minutes to the gentleman
from Missouri (Mr. Blunt), the distinguished minority whip.
Mr. BLUNT. Mr. Speaker, I thank Mr. Hoekstra for the leadership he
has given on this issue.
The problem we have with the bill on the floor today is, in
everything I read, it can't become law. That is one problem. A bigger
problem is that it doesn't address the fundamental question of how we
treat these companies for doing what we asked them to do after 9/11.
It is clear from all of the facts that as the FISA law anticipated,
that the leaders of the House and the leaders of the Senate on the
Intelligence Committee would be informed of what was going on. And, in
fact, in October of 2001 and November of 2001, in March of 2002, those
leaders were informed. On our side, the ranking Democrat at the time is
the current Speaker of the House. Porter Goss, the future CIA director,
was the chairman of the committee. They were informed on all of those
occasions, and these companies only have liability protection if they
were pursuing what was given to them as a lawful government order;
orders that Members of Congress, including the now Speaker, were told
would be issued to these companies.
This program doesn't work without voluntary compliance on the foreign
side. It also doesn't work without subpoenas on the American side, the
U.S. side. Every U.S. effort has to include a subpoena. The 1978 law
anticipated that. The law we would like to have on the books today
continues that. But for foreign subpoenas, to have to get a court order
for a foreign request of somebody in a foreign country simply bogs this
program down to the point it won't work. We proved that in July of last
year when this FISA came to a screeching halt.
This bill is not the improvement that we need. There is a bipartisan
majority in the House ready to pass a bill that could go to the
President today, be signed today.
We are now 4 weeks away from the time when we said, if we just had a
21-day extension, we would solve this problem. This problem needs to be
solved. It needs to be solved now. I urge the majority to step back and
bring a bill to the House that can pass and become law.
[[Page H1749]]
I urge my colleagues to vote ``no'' on this replacement.
Mr. CONYERS. Mr. Speaker, I recognize an invaluable member of the
Judiciary Committee, Keith Ellison from Minnesota, for 1 minute.
Mr. ELLISON. Mr. Speaker, today I rise to support the House
Democratic FISA bill, a bill that provides for collection of data to
protect America against people who would harm us, but also, and very
importantly, provides court approval of acquisition and an ongoing
process of review and oversight in order to protect Americans' privacy.
The bill goes beyond the RESTORE Act which we passed in the House,
and I supported, by adopting statutory protections for U.S. persons
overseas to ensure that surveillance of their communications are always
conducted through the courts.
The House bill does not confer retroactive immunity on telecom
carriers alleged to have participated under the President's warrantless
surveillance program. It provides a mechanism for the carriers to
assert existing immunity claims and to guarantee that they have a fair
hearing in court currently prevented by the administration's assertion
of the State secrets privilege.
In order to fully ascertain the scope and legality of the TSP, the
House bill also creates a bipartisan commission on warrantless
electronic surveillance activities with strong investigatory powers.
Mr. SMITH of Texas. Mr. Speaker, I reserve the balance of my time.
Mr. HOEKSTRA. Mr. Speaker, I would like to recognize my colleague,
the gentleman from Texas (Mr. Thornberry) for 3 minutes.
Mr. THORNBERRY. Mr. Speaker, Chairman Conyers said a few moments ago
the House will not be permitted to vote on the Senate bill because he
has a better idea. Let me suggest three reasons why he does not have a
better idea.
Number one, the bill before us sets up a new process to adjudicate
immunity. Now, if a company voluntarily answered the request of their
government, they did not do so to get a chance to have another legal
process, to pay some more lawyers to file some more motions. That is
not what they were doing. They were doing it to answer the call of
their country, and I think most Americans believe that Good Samaritans
should be thanked rather than punished with a new legal process.
But I would also suggest that this new legal process chills any hope
of voluntary cooperation in the future, not just for intelligence but
for quick response for law enforcement matters as well.
I don't see how any company can meet the obligations of the laws this
Congress has passed to its shareholders and others and voluntarily
submit themselves to another legal process to pay some more lawyers and
file some more motions.
{time} 1315
Secondly, this bill requires court approval of processes, of
procedures before foreign surveillance of foreign targets can ever
begin.
Now, under the Protect America Act, the FISA Court took months to
approve the procedures. And so it's reasonable to assume it's going to
take months to approve the procedures under this bill were it to become
law. The problem is, you can't begin foreign surveillance of foreign
targets under this law until those procedures are approved. And I am
perplexed how Members on either side can feel comfortable having months
more go by before we can have that intelligence information.
Thirdly, this bill sets up a new commission. And I understand it may
be politically desirable to set up a new commission and have new
investigations and have some more folks on a commission looking to make
their mark. I understand politically why that would be attractive. But
it seems to me that, one, there is no need to do that. What do we have
the Intelligence Committee for, if it is not to investigate and
understand, as has been done thoroughly in this case. So I must
conclude that this new commission must be an attempt to deflect
responsibility away from those in this Congress who had the
responsibility to oversee these programs.
We have a better option. We should take it.
Mr. CONYERS. I am pleased to yield 1\1/2\ minutes to the gentlelady
from California (Ms. Harman), a former member of the Intelligence
Committee. I wish I could give her more time.
(Ms. HARMAN asked and was given permission to revise and extend her
remarks.)
Ms. HARMAN. My oldest grandchild, Lucy, is 2 today. She, my other two
grandchildren, and my four children are never out of my thoughts as I
wrestle with what are the right and wise security policies to protect
our country.
I served 6 years on the Armed Services Committee, 8 on the
Intelligence Committee, and 4 on the Homeland Security Committee where
I chair its intelligence subcommittee.
I received so-called ``Gang of Eight'' briefings on the operational
details of the terrorist surveillance program from 2003 to 2006, and I
regularly receive classified threat briefings.
Some in this Chamber in both parties seek my views on security
issues, and I hope my advice is helpful. On the matter before us it is
as follows:
First, the world is very dangerous and we need to protect against
threats.
Second, actions we take can and must comply fully with the rule of
law. FISA has served us well for 30 years. Its framework is still
sound.
Third, FISA does need some tweaking, but the technical changes are
not controversial.
Fourth, FISA has already provided immunity for telecom firms which
follow its provisions. Telecom firms are now protected under FISA.
Fifth, telecom firms are now complying with FISA.
And, sixth, press accounts, especially Monday's story in the Wall
Street Journal, make clear there are other programs out there that
haven't been told to Congress.
We can't pass retroactive immunity when we don't know what we're
talking about.
So happy birthday, Lucy. May you grow up in a country with security
and liberty.
Passing the bill before us is a good start.
Mr. HOEKSTRA. Mr. Speaker, at this time I would like to yield 2
minutes to my colleague from the State of Michigan, a member of the
Intelligence Committee, Mr. Rogers.
Mr. ROGERS of Michigan. Mr. Speaker, two problems with where we're
going: one is, this will, in effect, require intelligence officials to
seek a Federal court warrant for foreign targets overseas. That is
undeniable. Everybody in the intelligence community says it. The Senate
even came across in a bipartisan bill, led by Democrats, who agree to
the same principle and said that's the wrong direction to go to protect
America.
The other serious problem: one of your great distinguished Members,
Elijah Cummings, took a courageous stand in a courageous moment when he
had serious crime in his district in Baltimore. He went out, went on TV
on a PSA and said, please cooperate with the local police to solve this
crime. Please step up and cooperate so that we can solve these crimes
together.
What we are effectively doing today, we're effectively telling
businesses, large and small, and citizens from neighborhoods to
corporate citizens to individual citizens, everybody who every day
across America says, I will cooperate with law enforcement to solve
crime because it's the right thing to do, you send an absolute chilling
effect across. And I've heard this from businesses not related to this
particular issue, telecom companies, companies who cooperate on
kidnappings, companies that cooperate on trying to find people who are
fugitives, who have raped children, people who cooperate on catching
drug dealers. They've said, you know, if you show up and ask me that, I
want to help. But what this body is telling them, you might not be
protected. It might not be just enough. And if you have enough money,
and we have enough trial lawyers, you're going to find yourself in
court.
So what these people are saying is, maybe I can't cooperate with my
government anymore. Maybe I can't, in good faith, like good Samaritans
have done all 200-plus years of this great Nation, come forward and say
we are in this together. We are united to stop crime, to keep our homes
and neighborhoods safe and to protect our country from terrorism.
The CIA case also said it's not good. The military leader said it's
dangerous,
[[Page H1750]]
the intelligence community said it's dangerous, and so did the
Democrats in the Senate. Let's join them and do this right.
Mr. CONYERS. Mr. Speaker, I'm going to recognize Barbara Lee, but I
want my dear friend from Michigan to know you cannot give retroactive
immunity when you don't know what you're immunizing. That's the
problem.
I turn now to the co-chair of the Progressive Caucus, a distinguished
civil rights fighter who has her own experiences, and we yield proudly
to Barbara Lee of California for 1 minute.
Ms. LEE. I want to thank Chairman Conyers and Chairman Reyes for
bringing this legislation to the floor which does contain the
safeguards necessary to protect the liberties of the American people,
while giving the intelligence community powers to protect our Nation,
which are very important in this bill.
Now, let me tell you, I know from personal experience about wiretaps
during the J. Edgar Hoover period and the unwarranted domestic
surveillance and wire tapping as a result of the Cointelpro program.
Many innocent people, their lives were destroyed, personal information
was gathered from innocent people, yes, including myself, who were no
threat to national security. Dr. King and his family were the victims
of government-sponsored wiretapping.
We must never go down this road again. So I fully support this bill
because it explicitly declares that the FISA Court is the sole
authority for electronic surveillance. It prohibits this reverse
targeting. It also makes sure that we do not provide retroactive
immunity to telecom companies that participated in any illegal spying
by this administration.
This bill will protect America and, equally important, protect
American civil liberties and values as guaranteed, mind you, guaranteed
by the fourth amendment.
Mr. HOEKSTRA. Mr. Speaker, Mr. Smith and I both have only one speaker
remaining, so we would reserve our right to close in the order as
determined.
Mr. REYES. Mr. Speaker, I only have one more speaker remaining as
well.
Mr. CONYERS. Mr. Speaker, how much time have I remaining?
The SPEAKER pro tempore. The gentleman from Michigan (Mr. Conyers)
has 2\3/4\ minutes remaining.
Mr. CONYERS. The gentleman from Washington (Mr. Inslee), who has
worked with us on this matter, is recognized for 1 minute.
(Mr. INSLEE asked and was given permission to revise and extend his
remarks.)
Mr. INSLEE. Mr. Speaker, from time to time, we are called to, again,
define what it means to be an American. And this is never more so than
when security concerns threaten our commitment to liberty. And at those
moments, at this moment, we need to be imbued with the spirit of 1776,
a spirit against tyranny, a spirit that recognizes that the rule of law
is the ultimate bulwark of liberty.
A Nation that threw off the shackles of King George should never
yield to an executive who seeks to trample on the rule of law. Whether
it was inconvenient, whether it was bothersome, whether it was
frustrating, we should never yield to an executive who believes himself
above the rule of law. We should never yield to an Executive that,
instead of coming to Congress to change a law, simply decides to ignore
it.
We are nothing without this commitment. We are everything with it.
Stand for liberty. Pass this bill.
Mr. CONYERS. Mr. Speaker, I yield everything but 1 minute to the
gentlelady from Illinois, Jan Schakowsky.
The SPEAKER pro tempore. The gentlewoman from Illinois is recognized
for 45 seconds.
Ms. SCHAKOWSKY. This FISA legislation is proof that we can protect
the American people, keep our country and our families safe without
violating American's civil liberties. The Republicans have posed a
false choice, tried to convince us, the American people, that the only
way to protect this country from terrorists is to sacrifice our civil
liberties, particularly when it comes to this administration perhaps
illegally telling the telecommunications companies to share our private
communications with them.
The Republicans want to wave a wand, grant amnesty to the phone
companies, retroactive immunity to turn over information about their
customers, not only letting the companies off the hook, but protecting
the administration from judicial scrutiny about its warrantless
surveillance programs.
This program, this legislation that we have introduced, is a fair way
to resolve this conflict issue.
Mr. CONYERS. Mr. Speaker, I yield to the gentlelady from Texas (Ms.
Jackson-Lee) for a unanimous consent request.
(Ms. JACKSON-LEE of Texas asked and was given permission to revise
and extend her remarks.)
Ms. JACKSON-LEE of Texas. Having heard all of the answers to all of
the questions that have been raised by the opposition, knowing that
full justice, civil liberties and the protection is in this bill, I
rise in support of the underlying bill.
Mr. Speaker, I rise today in support of the Senate Amendment to H.R.
3773, the Foreign Intelligence Surveillance Act (FISA). This body has
worked diligently with our colleagues in the Senate to ensure that the
civil liberties of American citizens are appropriately addressed.
We have worked to not simply reconcile the Senate language with the
RESTORE Act (H.R. 3773) which we passed in the House on November 15,
2007, but to go beyond the RESTORE Act as part of FISA Reform
legislation by: Adopting provisions from the Senate bill that will for
the first time provide statutory protections for U.S. persons overseas,
that ensures surveillance of their communications are conducted through
the courts; and Providing a mechanism for telecommunications carriers
to prove their case that they did not engage in any wrongdoing and to
guarantee due process with a fair hearing in court.
Like the RESTORE Act, the FISA reform legislation provides for
collection against terrorist organizations such as Al Qaeda, while
providing prior court approval of acquisition and an on-going process
of review and oversight in order to protect Americans' privacy.
The revised House bill creates a bipartisan commission on Warrantless
Electronic Surveillance Activities with strong investigatory powers in
order to preserve the rule of law in pending and future lawsuits. This
revised version of the bill continues to reiterate FISA's exclusive
control for conducting foreign intelligence surveillance, and requires
explicit statutory authorization for any means outside of FISA. This is
an area where the House version has differed from the Senate.
Homeland security is not a Democratic or a Republican issue, it is
not a House or Senate issue; it is an issue for all Americans--all of
us need to be secure in our homes, secure in our thoughts, and secure
in our communications.
I find it disturbing that our Republican colleagues will not join us
to ensure that Americans are safe here and abroad. Disturbing that they
do not recognize that we must protect the civil liberties of this
nation just as we protect American lives.
Mr. Speaker, in August of this year, I strongly opposed S. 1927, the
so-called ``Protect America Act'' (PAA) when it came to a vote on the
House floor. Had the Bush Administration and the Republican-dominated
109th Congress acted more responsibly in the two preceding years, we
would not have been in the position of debating legislation that had
such a profoundly negative impact on the national security and on
American values and civil liberties in the crush of exigent
circumstances. As that regrettable episode clearly showed, it is true
as the saying goes that haste makes waste.
The PAA was stampeded through the Congress in the midnight hour of
the last day before the long August recess on the dubious claim that it
was necessary to fill a gap in the nation's intelligence gathering
capabilities identified by Director of National Intelligence Mike
McConnell. In reality it would have eviscerated the Fourth Amendment to
the Constitution and represented an unwarranted transfer of power from
the courts to the Executive Branch and a Justice Department led at that
time by an Attorney General whose reputation for candor and integrity
was, to put it charitably, subject to considerable doubt.
Under the House bill, the Foreign Intelligence Surveillance Court,
FISC is indispensable and is accorded a meaningful role in ensuring
compliance with the law. The bill ensures that the FISC is empowered to
act as an Article III court should act, which means the court shall
operate neither as a rubber-stamp nor a bottleneck. Rather, the
function of the court is to validate the lawful exercise of executive
power on the one hand, and to act as the guardian of individual rights
and liberties on the other.
[[Page H1751]]
Moreover, Mr. Speaker, it is important to point out that the loudest
demands for blanket immunity did not come from the telecommunications
companies but from the administration, which raises the interesting
question of whether the administration's real motivation is to shield
from public disclosure the ways and means by which government officials
may have ``persuaded'' telecommunications companies to assist in its
warrantless surveillance programs. I call my colleagues' attention to
an article published in the Washington Post in which it is reported
that Joseph Nacchio, the former CEO of Qwest, alleges that his company
was denied NSA contracts after he declined in a February 27, 2001
meeting at Fort Meade with National Security Agency, NSA,
representatives to give the NSA customer calling records.
To give a detailed illustration of just how superior the RESTORE Act
is to the ill-considered and hastily enacted Protect America Act, I
wish to take a few moments to discuss an important improvement in the
bill that was adopted in the full Judiciary Committee markup.
My amendment, which was added during the markup, made a constructive
contribution to the RESTORE Act by laying down a clear, objective
criterion for the administration to follow and the FISA court to
enforce in preventing reverse targeting.
``Reverse targeting,'' a concept well known to members of this
Committee but not so well understood by those less steeped in the
arcana of electronic surveillance, is the practice where the Government
targets foreigners without a warrant while its actual purpose is to
collect information on certain U.S. persons.
One of the major concerns that libertarians and classical
conservatives, as well as progressives and civil liberties
organizations, have with the PAA is that the understandable temptation
of national security agencies to engage in reverse targeting may be
difficult to resist in the absence of strong safeguards in the PAA to
prevent it.
My amendment reduces even further any such temptation to resort to
reverse targeting by requiring the administration to obtain a regular,
individualized FISA warrant whenever the ``real'' target of the
surveillance is a person in the United States.
The amendment achieves this objective by requiring the administration
to obtain a regular FISA warrant whenever a ``significant purpose of an
acquisition is to acquire the communications of a specific person
reasonably believed to be located in the United States.'' The current
language in the bill provides that a warrant be obtained only when the
Government ``seeks to conduct electronic surveillance'' of a person
reasonably believed to be located in the United States.
It was far from clear how the operative language ``seeks to'' is to
be interpreted. In contrast, the language used in my amendment,
``significant purpose,'' is a term of art that has long been a staple
of FISA jurisprudence and thus is well known and readily applied by the
agencies, legal practitioners, and the FISA Court. Thus, the Jackson
Lee Amendment provides a clearer, more objective, criterion for the
administration to follow and the FISA court to enforce to prevent the
practice of reverse targeting without a warrant, which all of us can
agree should not be permitted.
Mr. Speaker, nothing in the Act or the amendments to the Act should
require the Government to obtain a FISA order for every overseas target
on the off chance that they might pick up a call into or from the
United States. Rather, what should be required, is a FISA order only
where there is a particular, known person in the United States at
the other end of the foreign target's calls in whom the Government has
a significant interest such that a significant purpose of the
surveillance has become to acquire that person's communications.
This will usually happen over time and the Government will have the
time to get an order while continuing its surveillance. It is the
national security interest to require it to obtain an order at that
point, so that it can lawfully acquire all of the target person's
communications rather than continuing to listen to only some of them.
It is very important to me, and it should be very important to
Members of this body that we require what should be required in all
cases--a warrant anytime there is surveillance of a United States
citizen.
In short, the Senate amendment to the House version makes a good bill
even better. For this reason alone, civil libertarians should
enthusiastically embrace H.R. 3773.
Nearly two centuries ago, Alexis de Tocqueville, who remains the most
astute student of American democracy, observed that the reason
democracies invariably prevail in any martial conflict is because
democracy is the governmental form that best rewards and encourages
those traits that are indispensable to martial success: initiative,
innovation, resourcefulness, and courage.
As I wrote in the Politico, ``the best way to win the war on terror
is to remain true to our democratic traditions. If it retains its
democratic character, no nation and no loose confederation of
international villains will defeat the United States in the pursuit of
its vital interests.''
Thus, the way forward to victory in the war on terror is for the
United States country to redouble its commitment to the Bill of Rights
and the democratic values which every American will risk his or her
life to defend. It is only by preserving our attachment to these
cherished values that America will remain forever the home of the free,
the land of the brave, and the country we love.
Mr. Speaker, FISA has served the Nation well for nearly 30 years,
placing electronic surveillance inside the United States for foreign
intelligence and counterintelligence purposes on a sound legal footing,
and I am far from persuaded that it needs to be jettisoned.
However, I know that FISA as it is run currently attempts to
circumvent the Bill of Rights and the civil liberties of the American
people. I continue to insist upon individual warrants, based on
probable cause, when surveillance is directed at people in the United
States. The Attorney General must still be required to submit
procedures for international surveillance to the Foreign Intelligence
Surveillance Court for approval, but the FISA Court should not be
allowed to issue a ``basket warrant'' without making individual
determinations about foreign surveillance.
In all candor, Mr. Speaker, I must restate my firm conviction that
when it comes to the track record of this President's warrantless
surveillance programs, there is still not enough on the public record
about the nature and effectiveness of those programs, or the
trustworthiness of this administration, to indicate that they require a
blank check from Congress.
The Bush administration did not comply with its legal obligation
under the National Security Act of 1947 to keep the Intelligence
Committees ``fully and currently informed'' of U.S. intelligence
activities. Congress cannot continue to rely on incomplete information
from the Bush administration or revelations in the media. It must
conduct a full and complete inquiry into electronic surveillance in the
United States and related domestic activities of the NSA, both those
that occur within FISA and those that occur outside FISA.
The inquiry must not be limited to the legal questions. It must
include the operational details of each program of intelligence
surveillance within the United States, including: (1) who the NSA is
targeting; (2) how it identifies its targets; (3) the information the
program collects and disseminates; and most important, (4) whether the
program advances national security interests without unduly
compromising the privacy rights of the American people.
Given the unprecedented amount of information Americans now transmit
electronically and the post-9/11 loosening of regulations governing
information sharing, the risk of intercepting and disseminating the
communications of ordinary Americans is vastly increased, requiring
more precise--not looser--standards, closer oversight, new mechanisms
for minimization, and limits on retention of inadvertently intercepted
communications.
Mr. Speaker, I encourage my colleagues to join me in a vote of
support for the FISA Amendments Act, H.R. 3773, as it seeks to balance
our Nation's securities and our civil liberties.
Mr. HOEKSTRA. Mr. Speaker, before I close, could the Speaker tell me
exactly how much time I have left.
The SPEAKER pro tempore. The gentleman from Michigan (Mr. Hoekstra)
has 3 minutes remaining; the gentleman from Texas (Mr. Smith) has 2\1/
2\ minutes remaining; the gentleman from Michigan (Mr. Conyers) has 1
minute remaining; and the gentleman from Texas (Mr. Reyes) has 1\1/2\
minutes remaining.
Mr. HOEKSTRA. Mr. Speaker, I yield myself the balance of my time.
What is this Congress thinking? Some of my colleagues are scaring the
American people into believing that the men and women in the
intelligence community are spying on them. In reality, our intelligence
professionals are focused solely on identifying and stopping the threat
from radical jihadists.
What's this Congress thinking? Some of my colleagues want to reward
opportunist trial lawyers who are suing the very companies that stood
up in America's hour of need. We should recognize what these companies
did and protect them from these frivolous lawsuits.
What is this Congress thinking? Some of the key leadership in this
House, including this current Speaker, were fully briefed and involved
in developing the strategies that were implemented to keep America safe
in the aftermath of 9/11. Now some are running from those decisions.
They should take responsibility for their actions.
[[Page H1752]]
{time} 1330
At the funerals last week for the victims of the recent terrorist
attack in Jerusalem, Rabbi Shapira delivered a eulogy charging the
government with not doing enough to keep Israel safe, for not
delivering the strong leadership to face down a deadly enemy. That same
enemy wants to attack America.
The 9/11 Commission said, ``Terrorists could acquire without great
expense communications devices that were varied, global, instantaneous,
complex, and encrypted.''
As Rabbi Shapira last week questioned the leadership of his country,
and in light of what the 9/11 Commission told us years ago, I ask the
leadership of this House are we doing enough.
Is the 2001 FISA law adequate? The answer has been, and continues to
be, a resounding ``no.''
Are we doing enough to protect America, our troops, and our allies,
when we go home without finishing this crucial work on intelligence
surveillance? Is it acceptable to have our intelligence capabilities
continue to erode? Continuing down this path is dangerous.
I hope that when we return, America will not have its own Rabbi
Shapira, our own Rabbi Shapira asking, Why did Congress go home without
finishing its work? Why didn't the Democratic Congress do better? Why
didn't the House recognize the danger and the threat?
We should complete this work today. We should vote on the Senate
bill. Why are we going home? Why are we going home with the work
unfinished one more time?
With that, I yield back the balance of my time.
Mr. REYES. Mr. Speaker, before I yield the balance of our time, I
would like to insert into the Record at this point several letters of
endorsement for H.R. 3773.
Center for Democracy
and Technology,
Washington, DC, March 12, 2008.
Re Vote ``Yes'' on H.R. 3773, the FISA Amendments Act.
Dear Representative: We are writing to urge you to support
legislation to amend the Foreign Intelligence Surveillance
Act that the House of Representatives will soon consider. The
bill, an amendment in the nature of a substitute to H.R.
3773, is a responsible compromise between the House RESTORE
Act and the Senate FISA legislation. This compromise includes
most of the civil liberties protections in the RESTORE Act
while also providing the intelligence agencies the
flexibility they need to monitor the international
communications of people believed to be abroad. The
legislation would replace the Protect America Act (``PAA,''
Pub. L. No. 110-55), which became law in August 2007 and
which expired a few weeks ago.
Like the RESTORE Act, the compromise bill permits
authorization of surveillance programs targeting persons
abroad who may be communicating with people in the United
States. The compromise bill makes it clear that the
government does not have to make an individualized showing of
probable cause for targeting any person reasonably believed
to be abroad, unless that person is a U.S. citizen or green
card holder. It provides intelligence agencies great
flexibility in adding new surveillance targets to existing
authorizations. The compromise bill also makes it clear that
no order is required for surveillance of foreign-to-foreign
communications. The compromise bill includes no blanket
immunity from civil liability for telecommunications carriers
who assisted with illegal warrantless surveillance from
October 2001 through January 17, 2007, but it does allow
carriers to defend themselves against those lawsuits while
protecting classified information.
Unlike the PAA, the compromise bill includes significant
civil liberties protections that merit your support.
Prior Court Approval. Most importantly, the compromise bill
requires court approval of surveillance procedures prior to
the commencement of surveillance. Except in emergencies, the
compromise bill bars the executive branch from commencing
surveillance unless the Foreign Intelligence Surveillance
Court (``FISA court'') has approved of targeting and
minimization procedures designed to protect Americans. The
targeting procedures must be reasonably designed to ensure
that communications to be acquired will be those of persons
reasonably believed to be located outside the United States.
The minimization procedures limit the circumstances in which
a U.S. citizen or green card holder can be identified when
information resulting from intelligence surveillance is
disseminated. We are disappointed that under the compromise
bill, the authorization for surveillance comes from the
Director of National Intelligence (``DNI'') and the Attorney
General (``AG''), and not from the FISA court, as would have
been provided under the RESTORE Act. While we would have
preferred the RESTORE Act approach, surveillance under both
bills cannot commence unless the FISA court has first
approved the procedures under which it would be conducted.
Court Compliance Assessment. The compromise bill explicitly
authorizes the FISA court not only to assess the adequacy of
surveillance procedures at the front end, but also to assess
whether those procedures are being complied with on a going
forward basis. It provides that the court shall assess
compliance with the minimization procedures it has approved,
and it acknowledges that nothing in the bill prohibits the
FISA court from having inherent authority to assess
compliance with those procedures and other procedures it has
approved. While the extent of the court's inherent authority
is unclear, we understand that the Administration has agreed
that the court has inherent authority to assess compliance.
Prevention of Reverse Targeting. The compromise bill bars
the targeting of a person reasonably believed to be outside
the United States for the purpose of targeting a particular,
known person reasonably believed to be in the United States.
A number of provisions support this bar. They help ensure
that surveillance targeted at persons abroad will not be used
to circumvent individualized court order requirements that
protect Americans from unwarranted surveillance. The bill
requires the AG, in consultation with the DNI, to adopt
guidelines to ensure compliance with the reverse targeting
limitation. Those guidelines must contain criteria for
determining whether a ``significant purpose'' of an
acquisition is to acquire the communications of a specific,
known U.S. citizen or lawful permanent resident reasonably
believed to be in the United States. Those criteria must in
turn reflect consideration of criteria listed in the bill
that tend to show whether a person in the U.S. has become of
significant intelligence interest. The guidelines must be
submitted to Congress. AG/DNI certifications submitted to the
FISA court in connection with authorized surveillance are
reviewed by the FISA court for completeness, and must attest
that guidelines meeting the reverse targeting limitation have
been adopted. The Inspectors General and the AG/DNI both
report to Congress on whether the reverse targeting
guidelines are being followed.
FISA Exclusivity. The compromise bill takes a significant
step toward the goal of clarifying that FISA is the exclusive
means of conducting surveillance in the United States for
foreign intelligence purposes. It does this by cutting off
the argument advanced by the Administration that Congress may
implicitly authorize warrantless surveillance when it
authorizes the use of force following an attack on the United
States, or when it passes other legislation. Under the bill,
such authorization would need to be explicit.
Telecom Immunity. Unlike the Senate bill, the compromise
bill wisely rejects proposals to grant blanket retroactive
immunity to telecommunications carriers that assisted with
illegal warrantless surveillance for more than five years
following the attacks of September 11, 2001. Telecoms should
be immune when they assist surveillance that meets the
statutory requirements, and should face civil liability when
they assist with requests for assistance with unlawful
surveillance. The compromise bill preserves this incentive
system, which helps ensure that telecoms prevent unlawful
surveillance. In lieu of retroactive immunity, the compromise
bill frees telecoms to present in court information tending
to show that they complied with the law, even though such
information may be subject to the state secrets privilege. It
signals the courts that such submissions must be protected
from disclosure and should be handled in accordance with the
relevant provision of FISA, Section 106(f).
The compromise bill also includes the following significant
provisions:
A December 31, 2009 sunset to prompt Congress to reconsider
the legislation in a timely manner, and to encourage
Executive branch compliance with reporting duties imposed in
the legislation and with congressional requests for
information;
An Inspectors General audit of post 9-11 warrantless
surveillance that may represent the best chance of shedding
light on this surveillance, to the extent consistent with
national security concerns; and
A requirement for court orders based on probable cause for
surveillance of Americans and green card holders who are
believed to be abroad, in lieu of the Attorney General
certification of probable cause now required by executive
order.
For all of these reasons, we encourage you to vote for the
compromise bill when it is considered by the House of
Representatives. It represents a responsible effort to
preserve both liberty and security, and it is legislation the
Administration would be wise to support.
For more information, please see our latest policy brief on
FISA legislation (http://www
.cdt.org/publications/policyposts/2008/3) or contact the
Director of CDT's Project on Freedom, Security & Technology,
Gregory T. Nojeim, at 202/637-9800 x113.
Sincerely,
Leslie Harris,
President and CEO.
Gregory T. Nojeim,
Director, Project on Freedom, Security & Technology.
[[Page H1753]]
____
Center for National
Security Studies,
Washington, DC,
March 12, 2008.
Re H.R. 3733 Substitute Amending the Foreign Intelligence
Surveillance Act.
Hon. John Conyers,
Chairman, Judiciary Committee,
Hon. Silvestre Reyes,
Chairman, Permanent Select Committee
on Intelligence, House of Representatives,
Washington, DC.
Dear Chairmen Conyers and Reyes: We write on behalf of the
Center for National Security Studies, which is the only
organization whose sole mission is to work to protect civil
liberties and human rights in the context of national
security issues. For more than thirty years, the Center has
worked to find solutions that both respect civil liberties
and advance national security interests. The Center advocated
for constitutional protections in the Foreign Intelligence
Surveillance Act when it was first enacted and has litigated
and repeatedly testified against unconstitutional government
surveillance since then.
We are writing to outline our views on the substitute bill,
which we understand will be brought to the floor for a vote
this week.
The new bill (H.R. 3773 substitute) is substantially better
than the Protect America Act enacted in August or the bill
passed by the Senate last month. The substitute contains
strong reporting requirements that will ensure that Congress
obtains access to the information needed for public and
congressional consideration of what permanent amendments
should be made to the FISA. At the same time, the bill would
authorize the surveillance of Americans' international
communications without a warrant in some circumstances where
we believe that the Fourth Amendment requires a warrant.
However, the bill contains important protections against such
unconstitutional surveillance, many of which were not
included in the bill passed by the Senate. Given the votes
for that severely flawed bill and the Protect America Act, we
welcome this substitute as an important step toward restoring
constitutional privacy protections and congressional and
public oversight.
A. The new bill contains important provisions to establish
accountability for the illegal surveillance by this
administration as well as guarantees for future oversight. In
particular, and unlike the bill passed by the Senate, it
contains:
1. A December 2009 sunset so a new Congress will revisit
these temporary powers;
2. A required Inspector General audit of all warrantless
electronic surveillance and a public report, which will
ensure that information about past programs is preserved and
reviewed;
3. Better congressional reporting requirements about future
surveillance;
4. Creation of a commission appointed by Congress with
subpoena power to investigate and report to the American
people about the Administration's warrantless surveillance;
and
5. No retroactive immunity for the telecommunications
carriers that carried out the warrantless surveillance of
Americans' communications.
We applaud your efforts to require an accounting of the
administration's past illegal surveillance of Americans. The
Inspector General audit, the commission, and the other
congressional and public reporting requirements would lay the
groundwork for the next administration and the next Congress
to gain a full understanding of this administration's illegal
surveillance, its underlying interpretations of applicable
laws, and the impact of any changes to FISA this year. This
bill would help ensure that more information, not just the
administration's rhetoric and selective disclosures, are made
available to Congress, and will give Congress and the
American people the opportunity to assess surveillance
procedures on the basis of a complete record in 2009. In this
connection, we applaud your commitment to revisiting in
advance of that sunset date what the substantive standards
and procedures for surveillance of Americans should be in
order to better protect Americans' constitutional rights and
ensure effective national security measures.
B. The bill also contains stronger judicial review
procedures than does the Senate bill.
1. It does not contain the rewrite of the definition of
``electronic surveillance'' contained in the Senate bill,
which would have weakened even further the FISA's protections
for the rights of people in the U.S.
2. It requires judicial review in advance of surveillance
except in emergencies.
3. It contains specific protections from the RESTORE Act
for Americans' international communications.
4. It requires a court order based on probable cause to
target Americans who are overseas. (This requirement is also
in the Senate bill.)
5. The bill also reinforces that surveillance must be
conducted within the requirements of the FISA or federal
criminal law and not at the President's say-so.
In sum, the bill provides many more protections than any
proposal the administration has helped draft on these issues,
including the bill passed by the Senate last month.
Thank you for your consideration of our views.
Sincerely,
Kate Martin,
Director.
Lisa Graves,
Deputy Director.
____
March 12, 2008.
Groups Urge Further Investigation of Telecom's Actions Before Any Vote
on Retroactive Immunity
Dear Member of Congress: Our thirty-four organizations
write to support the March 6 Dear Colleague letter on telecom
immunity legislation from House Energy and Commerce Committee
Chairman John Dingell, Subcommittee on Telecommunications and
the Internet Chairman Edward Markey, and Subcommittee on
Oversight and Investigations Chairman Bart Stupak. These
respective Chairs urged Congress to uphold its duty to make
an informed decision by first learning and evaluating ``all
the facts'' prior to any vote on immunity. They specifically
referenced a whistleblowing disclosure from Mr. Babak Pasdar
whose affidavit was distributed last week to all House
offices. We ask the House to support the chairmen and not
grant retroactive immunity as part of any bill to amend the
Foreign Intelligence Surveillance Act.
The Dear Colleague letter summarized a threat to privacy
rights that is the bottom line in Mr. Pasdar's affidavit:
That an unnamed major wireless telecommunications carrier may
have given the government unmonitored access to data
communications from that company's mobile devices, including
e-mail, text messages, and Internet use.
Mr. Pasdar's statement describes a mysterious ``Quantico
Circuit'' with apparently unfettered access to this carrier's
mobile device data network as well as its core business
network, which includes billing records and fraud-detection
information. The other end of that Quantico Circuit may have
had capabilities to physically track the whereabouts of
innocent subscribers and monitor communications and other
personal, behavioral habits. Yet, according to Mr. Pasdar,
the line was configured so that the carrier could have no
record of what information had been transmitted. Of equal
concern was his allegation that there was no security to
protect this line--an unheard of vulnerability in a carrier
environment.
Mr. Dingell, Mr. Markey, and Mr. Stupak are right. Mr.
Pasdar's concerns are strikingly similar to those raised by
another whistleblower, Mr. Mark Klein from AT&T. Their
combined disclosures raise grave questions. For example, who
was at the other end of the Quantico Circuit, and what
information have they been obtaining? Does such access
comport with long-standing federal law? Is the circuit legal?
Is its apparent lack of security legal or wise? How long has
it been in operation? Who paid for construction and operation
of the Quantico Circuit? Was the telecom paid by its
recipients for using the circuit? What were the terms?
You must get answers to these questions to make an informed
decision about what the Senate's broad retroactive telecom
immunity provision would sweep in. Congress should schedule
hearings and exercise any other investigative authority
necessary to determine the truth about our privacy and
telecom companies--before Congress votes on any bill that
would give amnesty to these companies.
We urge you not to retreat on the immunity issue in the
face of Administration scare tactics. A rush to judgment
would not improve national security, and would unnecessarily
jeopardize our rights to privacy. Four experts and former
aides to the current Director of National Intelligence
explained last week that alternate authority exists under
current law to continue ongoing surveillance for up to a
year, as well as to obtain new approvals as needed. No
special immunity is needed, as the FISA court can order
telecoms to cooperate with lawful foreign intelligence
surveillance.
If Messrs. Pasdar and Klein are telling the truth, they
have described the tip of an iceberg. Congress must find out
what is underneath. Accordingly, we urge you to investigate
these matters fully and not grant retroactive immunity in the
meantime.
Sincerely,
Christopher Finan, President, American Booksellers
Foundation for Free Expression; Nancy Talanian,
Director, Bill of Rights Defense Committee; Chief Gary
Harrison, Chickaloon Village, Alaska; Lyn Hurwich,
President, Circumpolar Conservation Union; Jesselyn
Radack, Coalition for Civil Rights and Democratic
Liberties; Matthew Fogg, Congress Against Racism and
Corruption in Law Enforcement (CARCLE); Ben Smilowitz,
Disaster Accountability Project; Dr. Jim Murtagh,
Doctors for Open Government (DFOG); Jim Babka,
President, DownsizeDC.org, Inc.; John Richard,
Director, Essential Information.
George Anderson, Ethics in Government Group, (EGG); Mike
Stollenwerk, Fairfax County Privacy Council; Steven
Aftergood, Project Director, Federation of American
Scientists; Conrad Martin, Executive Director, Fund for
Constitutional Government; Gwen Marshall, Co-chairman,
Georgians for Open Government; Tom Devine, Legal
Director, Government Accountability Project; James C.
Turner, Executive Director, HALT, Inc.--An Organization
of Americans for Legal Reform; Helen Salisbury, MD,
Health Integrity Project; Scott Armstrong, President,
Information Trust; Michael Ostrolenk, National
Director, Liberty Coalition.
[[Page H1754]]
Dr. Janet Chandler, Co-Director, TAF Mentoring Project;
Joan E. Bertin, Esq., Executive Director, National
Coalition Against Censorship; Zena D. Crenshaw,
Executive Director, National Judicial Conduct and
Disability Law Project, Inc.; Mike Kohn, General
Counsel, National Whistleblower Center; Ron Marshall,
Chairman, The New Grady Coalition; Sean Moulton,
Director, Federal Information Policy OMB Watch; Patrice
McDermott, Director, OpenTheGovernment.org; Darlene
Fitzgerald, Patrick Henry Center; David Arkush,
Director, Congress Watch Public Citizen; John W.
Whitehead, President, Rutherford Institute; Daphne
Wysham, Director, Sustainable Energy and Economy
Network; Kevin Kuritzky, The Student Health Integrity
Project (SHIP); Jeb White, President, and C.E.O.,
Taxpayers Against Fraud; Dane von Breichenruchardt,
President U.S. Bill of Rights Foundation; Linda Lewis,
USDA Homeland Security Specialist (retired).
Mr. Speaker, I now yield the remaining time to the gentleman from
Massachusetts (Mr. Tierney), a valued and distinguished member of the
Intelligence Committee.
Mr. TIERNEY. Mr. Speaker, over history, and particularly since 1970,
we have been able to find balance of getting the necessary intelligence
collection and also having the protection of our liberties and our
constitutional rights; through wars, in fact through the Cold War,
which are much more severe existential threats than we see today, to a
Cold War where we had nuclear powers that we thought were ready to
attack us. We didn't know when and we didn't know to what degree. We
never found it necessary to totally abdicate our constitutional rights
and privileges. It is unnecessary for us to do that. It is shameful
that some think that now is an opportunity for us to do that.
The legislation before us today allows us to, in timely ways, collect
all of the intelligence we need. It allows us to do it before a court
order in cases of emergency. It allows us to do it without delay. It
allows us to have provisions for oversight. It allows us to do
everything to protect this country and it protects our civil liberties.
We have a situation with phone companies now wanting immunity.
They've always had immunity. The question is did they go for it. Did
they have a court order or did they have the proper certification? Why
won't the White House let all Members of Congress see that? It would
answer the questions if they saw the documents.
All Members of Congress should see the Presidential order and discuss
whether the breadth and scope was so breathtaking that they would rush
to make sure that courts intervene to make sure we had the
constitutional protections there and make sure that we saw the memos
that were there for legal justification and whether or not they weren't
farcical in some respects and make sure that we saw what went on
between the companies and the administration.
If the companies think that they have reason to believe that, despite
the fact that they didn't take advantage of their immunity provisions,
they still have a claim of defense, we've provided a way for them to go
to court so they can make that case. Going forward, they have immunity
and a way to protect themselves in the past.
Let's get over the nonsense and pass this law.
Mr. SMITH of Texas. Mr. Speaker, I yield the balance of my time to
the gentleman from California (Mr. Daniel E. Lungren), a member of the
Judiciary Committee and a member of the Homeland Security Committee.
Mr. DANIEL E. LUNGREN of California. Mr. Speaker, oftentimes what is
said on this floor reveals the differences between the two parties or
the difference between the two approaches. The gentleman who just spoke
before me made an allegation about the breathtaking and overwhelming
nature of the President's request for information. Frankly, I thought
what was at stake at the time was the breathtaking and overwhelming
threat that this Nation faced after 9/11. That's what the President was
responding to. That's what the President utilized in his request of
American companies that come to the aid of their country. And here we
stand saying we cannot reward them except to give them lawsuits.
The gentleman from Texas (Mr. Reyes) says if the companies are
innocent, as if there is some question. I sat through all of those
briefings. There is, in my judgment, not one iota of evidence that the
companies acted inappropriately whatsoever. Not one iota of evidence
sitting there after question after question after question; yet, on
this floor, we raised the very question of those companies by saying if
they are innocent. And what does Mr. Reyes say? If they are innocent,
then it will be decided the good old American way: Go to court.
Well, I'm a lawyer, but I don't think most Americans think the
American way in every instance is to go to court. If you look at the
legislation we have before us, it is rewarding the Good Samaritans with
a lawsuit.
There is a fig leaf here, yes. Now the majority side says, You know,
there is a problem that we have to address with respect to
telecommunications companies. That's progress, because when we were
arguing on the floor with your previous provisions, you didn't even
admit that. Now you do it, and now you say we are going to take care of
it by the State's secrets doctrine and by going to a secret court
proceeding.
It is a fig leaf to allow Members to vote for a bill you know is
never going to become law. It is not effective. How do I know? Twenty-
five attorneys general of the United States say it doesn't work. They
say support the provision that's contained in the Senate bill.
Democrats and Republicans alike from Texas, from North Carolina, from
Oklahoma, from Florida, from Alabama, Arkansas, Alaska, Colorado,
Georgia, Idaho, Indiana, Kansas, Maryland, Michigan, Nebraska, New
Hampshire, North Dakota, Rhode Island, South Dakota, Virginia, West
Virginia, Washington, Utah, South Carolina, and Pennsylvania.
No, Mr. Speaker, the President is not wrong. No, Mr. Speaker, he is
not doing this to protect himself. He's doing it as these attorneys
general of the United States recognize to allow us to go forward in
protecting the American people.
Don't harm these telecommunications companies with friendly fire.
Mr. CONYERS. Mr. Speaker, it's my privilege to yield the balance of
our time to the majority leader, Steny Hoyer, whose legal expertise has
held him in good stead over the months that we've worked on the Foreign
Intelligence Surveillance Act.
Mr. HOYER. Mr. Speaker, this is indeed an important day for our
country, for the House of Representatives, and for the American people.
An important day because we focus on the protection that we owe to our
people and to our country, not only from terrorists but from those who
would undermine the Constitution of the United States.
Let me just briefly put in context where we are today some 7 years
and 2 months after the start of this administration. From 2001 to 2006,
the President of the United States did not veto a single bill. Why did
he not veto a single bill? Because the Congress would not send him a
bill that he did not want sent to him. It was a complacent, complicit
Congress. And as a result of that complacency of the representatives of
the American people, the administration came to believe that it could
do anything it wanted without oversight or accountability.
And because of that, when we were put at risk by 9/11, the
administration's response, perhaps led by the Vice President, was that
we do not need to follow the law. There was a law in place. It's still
in place. It still provides for the protection of the American people.
It's called the Foreign Surveillance Intelligence Act. But as too often
has been the case in this administration, they chose not to follow the
law. They chose, instead, to follow their own predilections. And that's
why we are here today.
In addition to that, we were in a condition where technology had
changed. The administration was absolutely correct on that point. And
both the Intelligence Committee in the Senate and the Intelligence
Committee in the House knew they had to respond to that. As a matter of
fact, Mr. Hoekstra and Ms. Harman, as the chairman and ranking member,
and Mr. Goss prior to that, knew that we had to move towards that. That
is now a result of the legislation we see before us.
My good friend and distinguished colleague, the former attorney
general of the State of California who's been in this body for some
years. He was here,
[[Page H1755]]
then he went back to California. He read from the letter of the
attorneys general. One of them was Maryland. I talked to him yesterday.
Sometimes people put letters in front of us that are not accurate and
we don't check all of the facts. I presume that the other attorneys
general that were presented with this letter are in the same position.
Let me read from this letter: ``Senate Intelligence Committee
Chairman John D. Rockefeller authored S. 2248 to solve a critical
problem that arose when the Protect America Act was allowed to lapse on
February 16, 2008.'' Hopefully, everybody in this body knows that
information is inaccurate. Senator Rockefeller started to draft his
legislation, and the Senate Intelligence Committee, long before
February of 2008, the House Intelligence Committee and the House
Judiciary Committee and Senate Judiciary Committee, long before that
ever happened. That information is inaccurate. I don't hold the
attorneys general personally responsible for that inaccuracy. But I
will tell you, my own attorney general, a signatory on this letter, had
been misinformed. That's unfortunate.
I presume by the association, the overwhelming majority of these
attorneys general are Republicans, but I don't think it was a partisan
letter, per se, but it is shocking to me that an attorney general of a
State in this country would say, ``whatever action is necessary to keep
our citizens safe.'' There have been those down through history who,
when we have been at risk, have said whatever action we take is
justified, and the Constitution has suffered in that process.
We have a responsibility to do both, not just one. The attorneys
general in their letter also said this: ``Intelligence officials must
obtain FISA warrants every time they attempt to monitor suspected
terrorists in overseas countries.'' That is categorically false. I do
not believe that any one of the attorneys general that signed this
letter believed it to be false, but it is wrong. They are misinformed.
We have an opportunity today to move this process forward to protect
America and protect our Constitution. Senator Rockefeller, the chairman
of the Senate Foreign Intelligence Committee, a committee from the
Senate, passed a bipartisan bill. And I am so interested to hear all of
the Members on the Republican side talk about how a Senate, bipartisan-
passed bill ought to pass this House.
My, my, my. If Congressman DeLay were here now, he would turn over in
his seat. His premise was the Senate doggone well ought to pass House
bills and not ask any questions. That was his position. He had no
intent to pass, no matter how bipartisan a Senate bill was, Tom DeLay
had no use for talking to Senate Republicans about what he ought to
pass.
And by the way, if the President said pass it, if it was the
Patients' Bill of Rights that he didn't want and it passed the Senate
and the House, it didn't pass out of the conference committee because
the President didn't want it. And by the way, on the prescription drug
bill that a large number of your caucus was against, you passed anyway.
It took you 3 hours to vote it, but you passed it. And so many of your
Members came kicking and screaming to the final result and lament that
vote this very day, and all of you on that side of the aisle know it.
Not all of you, but a large number.
Our responsibility is not to take a Senate bill or a House bill at
face value. It is to exercise our best judgment to serve the American
people as best we can.
{time} 1345
I will close with this: Senator Rockefeller, the chairman of the
committee, strong proponent of the bipartisan bill, said this on March
11, 2008, just a few days ago:
``Today's House proposal reflects progress in bringing the two bills
together, and it is a step in the right direction.'' He concluded his
statement by saying this: ``As soon as the House sends us this new
bill, we will once again roll up our sleeves and get back to work on a
final compromise that the House, the Senate, and the White House can
support.''
Ladies and gentlemen of this House, that's what the Founding Fathers
had in mind when they created the House of Representatives and the
United States Senate and they gave to the President of the United
States a role in the legislative process. We have an opportunity today
to serve the protection of our country, the interception of
communications dangerous to our people, and to uphold our oath to
preserve and protect the Constitution of the United States. Let us take
that opportunity.
Mr. VAN HOLLEN. Mr. Speaker, I rise in support of H.R. 3773. This
bill reestablishes the role of the Court into foreign surveillance if
and when a U.S. person becomes a target of such surveillance. H.R. 3773
also authorizes the FISA court to review the ``minimization''
procedures used by intelligence agencies regarding the use of material
that has been inadvertently intercepted. Moreover, this bill authorizes
the FISA court to also review the ``targeting'' procedures that involve
U.S. persons. Finally, the bill creates a commission to review the
President's previous warrantless surveillance program and to report to
Congress. It is important to note that H.R. 3773 contains no
retroactive immunity for the telephone companies for their past
accommodation to intercept the communications of U.S. persons without a
court order.
After the terrorist attack on September 11, 2001, our security
agencies worked to improve their intelligence operations to ensure that
such a plot could never again be executed on U.S. soil. However, this
Administration, rather than assessing the need to make adjustments to
surveillance authorities, embarked upon an unauthorized secret program
authorized by nothing more than Executive fiat and clearly outside of
the Foreign Intelligence Surveillance Act, FISA. The telecommunication
industry was directed to comply with demands of the Administration with
or without the requisite authority. Some telecommunications companies
complied some did not.
Despite repeated requests from Democratic Members of Congress for the
Administration to assess the limitations of the existing FISA law and
to request necessary changes, the Administration refused to do so. Only
after James Risen in 2006 exposed the fact that the Administration had
been engaged in a massive domestic spying operation did the
Administration begin to address the need to reconcile the program with
some semblance of statutory authority. To that end, last summer the
Administration identified a change in technology that warranted a
change to the law. The change in the telecommunications industry has
placed nodes and other technological backbones on U.S. soil regardless
of the flow of information. Consequently, many foreign-to-foreign
communications pass through the U.S. without involving U.S. persons.
This technological ``touch down'' under existing law would require a
court order and needed to be changed.
From that request for a technical change, the Administration, with
the assistance of the Republicans in Congress, launched an initiative
to virtually remove court orders for the surveillance of American
persons. Moreover, the Administration launched an additional initiative
to provide blanket retroactive immunity for all the phone companies and
ISPs that intercepted communications in the absence of a legal
authorization. This immunity was demanded without the disclosure of the
acts that would be subject to such immunization. Currently, there are
almost 40 lawsuits pending that have challenged the legality of the
President's unauthorized surveillance program.
All of these past cynical efforts to engage in an illicit
surveillance program have now transformed into a campaign to engage in
a widespread cover-up of past illegalities. The Republicans and the
President cloak their surreptitious activity in a cloak of national
security. However, the American people know better. We all want to stop
terrorism. We all agree that foreign-to-foreign communications should
be intercepted without needing a court order. We all agree that merely
because such a communication is transported through a device that sits
on U.S. soil, it should not impose any impediment to the surveillance
of these communications. Where we disagree is in the need to carry on
an illegal program, to defy any accountability and then come to
Congress to seek legislation that is purely designed to conceal
wrongdoing.
The bill before us today accomplishes the following:
Provides for surveillance of terrorist and other targets overseas who
may be communicating with Americans.
Requires the FISA court to approve targeting and minimization
procedures--to ensure that Americans are not targeted and that their
inadvertently intercepted communications are not disseminated. These
procedures must be approved prior to surveillance beginning--except in
an emergency, in which case the government may begin surveillance
immediately, and the procedures must be approved by the court within 30
days. (This may be extended if the court determines it needs more time
to decide the matter.)
[[Page H1756]]
Provides prospective liability protection for telecommunications
companies that provide lawful assistance to the government.
Requires a court order based on probable cause to conduct
surveillance targeted at Americans, whether inside the United States or
abroad.
Requires an Inspector General report on the President's warrantless
surveillance program.
Prohibits ``reverse targeting'' of Americans.
Explicitly establishes FISA Exclusivity--that FISA is the exclusive
way to conduct foreign intelligence surveillance inside the U.S. Any
other means requires an express statutory authorization.
Sunsets these authorities on December 31, 2009 (same as the PATRIOT
Act sunset).
Moreover, this bill is as important for what it does not contain,
i.e. retroactive immunity. This bill does provide telecom companies a
way to present their defenses in secure proceedings in district court
without the Administration using ``state secrets'' to block those
defenses. Finally, this bill also establishes a bipartisan, National
Commission--with subpoena power--to investigate and report to the
American people on the Administration's warrantless surveillance
activities, and to recommend procedures and protections for the future.
We all want to prevent the acts of terrorism. However, some of us
believe that we can protect our Nation without throwing away all of the
rules that have been designed to protect the Constitutional rights of
Americans. The scare tactics that have been used by this Administration
to further cloak their illegal programs are reprehensible. What is more
is that these tactics are not even marginally credible.
The President's national security programs by and large have been a
failure, his misadventure into Iraq on a quest for nonexistent weapons
of mass destruction have led us on a path of a substantial loss of
life, resources and moral standing in the world. Moreover, it has
diverted our attention from those who did attack us on 9/11, Al-Qaeda
and its Taliban allies who are regrouping and strengthening, according
to declassified U.S. intelligence estimates, along the Afghanistan-
Pakistan border. In addition, the President's authorization to use
torture on U.S. soil, as well as outsourcing it to foreign countries,
by way of rendition, has compromised the security of our troops and
diplomatic corps around the world. These practices have done much more
to compromise our national security than to protect it. For these
reasons, the President is not in a position to invoke national security
on any grounds and certainly not to justify a warrantless domestic
spying program and retroactive immunity for those who were complicit in
this activity.
Mr. BLUMENAUER. Mr. Speaker, over the past few months, we've had a
lot of back and forth on this issue. For those who have been at the
table, I want to express my appreciation for your hard work and the
quality of your debate. I am proud of the fortitude displayed by the
Speaker and the Intelligence Committee during this process: There will
be no blanket immunity for telecom companies, there will be a two-year
sunset, and there will be a commission to thoroughly investigate this
administration's shameful wiretapping program.
For the past seven years I have been highly critical of Republican
wiretapping legislation. I have voted against past efforts to expand
the ability of this administration to intrude in the lives and privacy
of innocent citizens. Most recently, I supported the expiration of the
Protect America Act because I am confident that the dedicated members
of the intelligence community do not need to violate the rights of
Americans in order to protect them.
The bill before us will not solve every potential abuse of FISA, but
it does provide stronger legal protections for Americans and introduces
a measure of oversight. As this issue continues to play out into the
future, it is my hope that our next steps will include even stronger
protections for innocent Americans, clearer legal standards for FISA to
judge surveillance procedures, and explicit requirements for the
destruction of unnecessary data.
Ms. MATSUI. Mr. Speaker, liberty and security are not mutually
exclusive. Quite the opposite; they go hand in hand.
The FISA Amendments Act recognizes this reality. This legislation is
a balanced compromise that protects our country and ensures that our
basic American freedoms remain intact.
Our great country is founded on civil liberties, and secured by our
intelligence community.
Much of what keeps us safe is our commitment to upholding the values
of freedom and liberty.
All the security in the world is meaningless if we fail to protect
the values that make our country worth defending in the first place.
If we surrender the basic principles that make us who we are, we
will forever change what it means to be American.
Mr. Speaker, I know what can happen when we abandon our core
American values. I was born in an internment camp, and my own family
suffered the consequences when our country succumbed to the rhetoric of
fear.
That was a dark time in our Nation's history--one we cannot afford
to repeat.
That is why the legislation before us today is so important.
It protects the liberties that we cherish, liberties that are the
birthright of every American citizen.
At the same time, it recognizes the need for the surveillance of our
enemies.
It gives our intelligence agencies the tools necessary to keep us
safe, and provides strong legal clarity for the intelligence community.
The compromise solution we have negotiated also allows
telecommunications companies to defend themselves in a court of law.
It takes Congress out of the equation and puts legal decisions back
where they belong: in the court system.
I am confident that this process will result in a fair solution to
the civil cases that have been brought against these companies.
That is why this balanced legislation deserves the support of every
Member of this House.
This bill will keep us safe, and it will keep us free.
I urge passage of the FISA Amendments Act of 2008,
Mr. MOORE of Kansas. Mr. Speaker, I rise today to express my cautious
support for this House amendment to the Senate-approved version of H.R.
3773, the FISA Amendments Act of 2008. I extend my gratitude for the
hard work that Chairmen Conyers and Reyes have put into this
legislation, as well as Speaker Pelosi and Majority Leader Hoyer for
their efforts to negotiate with the Senate to work out the differences
between the different approaches to update the Foreign Intelligence
Surveillance Act [FISA] of 1978.
We will never forget the awful terrorist attacks of September 11,
2001, on our country. And we must keep in mind there are still those
who wish to do us harm as we authorize essential surveillance
authorities balanced by the civil liberty protections ensured by our
Constitution. It is disappointing that the Bush Administration and our
Republican colleagues have refused to participate in negotiations to
date, but I am hopeful that with this new bill approved by the House,
we can quickly work out our honest differences to provide our
intelligence and law enforcement agencies with the tools required to
monitor potential agents with terrorist intentions against the United
States.
This bill is a step in the right direction, but I have serious
reservations with certain provisions that I urge Congress to promptly
resolve in the coming weeks. I strongly believe in the merits of the
Senate-approved FISA legislation drafted by Chairman Rockefeller and
Ranking Member Bond, and I support a final bill that includes the
following provisions: Require individualized warrants for surveillance
of U.S. citizens living or traveling abroad; clarify no court order is
required to conduct surveillance of foreign-to-foreign communications
that are routed through the United States; provide enhanced oversight
by Congress of surveillance laws and procedures; compel compliance by
private sector partners; review by FISA Court of minimization
procedures; and targeted immunity for carriers that allegedly
participated in anti-terrorism surveillance programs.
As a District Attorney for 12 years, I understand the importance of
cooperation with private-sector partners in law enforcement matters.
Without their cooperation in times of emergency, the community I was
sworn to protect would be less safe and secure. The National Sheriffs'
Association, the International Association of Chiefs of Police, the
Fraternal Order of Police and the National Troopers Coalition have all
expressed their support for the targeted immunity that the Rockefeller-
Bond FISA bill would provide. Key members of the 9/11 Commission have
also voiced their support for the Rockefeller-Bond FISA bill. 9/11
Commission Co-Chair and former Congressman Lee Hamilton wrote that:
``To the extent that companies helped the government, they were acting
out of a sense of patriotic duty and in the belief that their actions
were legal. Dragging them through litigation would set a bad precedent.
It would deter companies and private citizens from helping in future
emergencies. . . .'' 9/11 Commissioner and former Senator Bob Kerrey
affirmed that sentiment when he stated: ``We wrote in the 9/11
Commission report that `unity of purpose and unity of effort are the
way that we will defeat this enemy and make America safer for our
children and our grandchildren.' We cannot hope to achieve such unity
of effort if on the one hand we call upon private industry to aid us in
this fight, and on the other allow them to be sued for their good-faith
efforts to help.''
I agree with the 21 state attorneys general who wrote in a December
11, 2007, letter to Senate leadership: ``The provisions of
[Rockefeller-Bond] are consistent with existing, long-standing law and
policy. Congress has long
[[Page H1757]]
provided legal immunity for carriers when, in reliance on government
assurances of legality or otherwise in good faith, they cooperate with
law enforcement and intelligence agencies . . . provisions of S. 2248
would . . . establish a thoughtful, multi-step process involving
independent review by the Attorney General and the courts that, only
when completed, would lead to dismissal of the claims.''
Congress must continue the hard work of negotiating a suitable
compromise that equips our intelligence agents with the tools they need
to protect our country, while ensuring that our civil liberties--which
make us the greatest nation in the world--remain protected.
Mr. DINGELL. Mr. Speaker, I voted against the original Patriot Act, I
voted against the reauthorization of the Patriot Act in 2005, I voted
against the President's Protect America Act that was signed into law
last August, and I remain prepared to vote against any legislation that
does not adequately protect our constitutionally guaranteed civil
rights. I have some concerns about this legislation. I don't believe it
is perfect. However, I am prepared to vote in support of it today as a
sign that we in the House are prepared to negotiate a bipartisan
solution that will end the deadlock on this issue.
I note that the President has already rejected this overture, and
once again insisted that he will veto any bill that does not grant
blanket amnesty to the telecommunications companies that are alleged to
have assisted the Bush Administration in conducting illegal warrantless
wiretap programs. It is unfortunate that the President has taken this
position, but I can assure him that there are those of us who will not
be moved by his intransigence.
I have repeatedly asked the Bush Administration to provide me with a
briefing about the warrantless wiretap programs that took place without
Congressional authorization so I could determine for myself whether
amnesty is justified, and these requests have been repeatedly denied.
After seven years of lies and obfuscation, I refuse to take the
President at his word that amnesty for telecommunications companies is
in the best interest of the American people, and I refuse to vote for
amnesty until I am given the opportunity to review the evidence
supporting it.
Mr. NADLER. Mr. Speaker, I rise in strong support of H.R. 3773, the
FISA Amendments Act. This carefully crafted legislation gives our
intelligence agencies all the tools they need to protect our country,
while protecting our fundamental civil liberties.
Mr. Speaker, let us be clear about what this legislation does not do.
It does not require individual warrants for the targeting of foreign
terrorists located outside the United States. For three decades, that
has been the law, and it will still be the law under this bill. There
is no dispute about this.
The bill starts with the recognition that the intelligence community
needs to surveil all members of a terrorist group--once that group is
identified. Any suggestion that it requires individualized warrants to
intercept communications of terrorists overseas is wrong.
The bill maintains the traditional requirement of a warrant when our
intelligence agencies seek to conduct surveillance on Americans. And
because some foreign surveillance may record conversations with
Americans, the bill requires that, when the Government proposes to
undertake surveillance of a foreign group or entity, it must first
apply to the FISA court, except that, in an emergency, the surveillance
can begin immediately, and the court can consider the surveillance
procedures later.
In both this bill and the Senate bill, the Government has to inform
the court of the procedures it will use to ensure that it is targeting
only foreigners overseas and how it will ``minimize'' domestic
information it might inadvertently pick up. The only real difference is
that the Senate bill lets them listen first, then go to the court
within 5 days. This bill requires that they go to the FISA Court first.
But in an emergency, we give them 7 days to listen before they go to
the court. So will someone please tell me how this minor difference
between the bills somehow gives rights to terrorists?
There is one thing that this bill does not do, and this great body
must not do--provide blanket, retroactive immunity to the
telecommunication companies that assisted in the President's
warrantless wiretapping program. Such a move would fly in the face of
our notions of justice.
Mr. Speaker, in the last few weeks, we have heard countless
assertions from our colleagues on the other side that are false and
misleading. They claim that we allowed the Protect America Act to
expire--when it was the Republicans who blocked attempts to extend that
legislation temporarily. And they continue to claim that retroactive
immunity for the telecom companies is necessary for the security of the
country. But they have failed to provide any evidence for that claim.
The telecom companies aided the Administration's surveillance
program. Some people--American citizens--believe their constitutional
rights were violated, and brought suit against the government and the
telecom companies. There are two narratives here. One is that the
telecom companies patriotically aided the Administration in protecting
Americans from terrorists. The other is that the telecom companies
conspired with a lawless Administration to violate the Constitutional
rights of Americans. Which of these narratives is correct is for a
court to decide.
It is not the role of Congress to decide legal cases between private
parties. That is why we have courts. If the claims are not meritorious,
the courts will throw them out. But if the claims do have merit, we
have no right to dismiss them without even reviewing the evidence.
We are told that the telecom companies should not be subject to
lawsuits for doing their duty. But whether they were doing their duty,
or abusing the rights of Americans, is precisely the issue. And that is
a legal issue for the courts to decide.
In any event, the existing law, in a wise balance of national
security and constitutional rights that this bill does not change,
already provides absolute immunity to the telecom companies if their
help was requested, and if they were given a statement by the Attorney
General, or various other government officials, stating that the
requested help did not require a warrant or court order and would not
break the law. They have immunity whether those statements were true or
not. They can rely absolutely on the government's assertions.
So why do they think they need retroactive immunity? Because of the
Administration's sweeping assertion of the ``state secrets'' doctrine,
which has prevented the companies from claiming their immunity.
Title II of this bill will allow the telecoms to show the courts, in
a secure setting, if they were obeying the law or if they weren't. It
will allow the telecom companies to assert their immunity in court, and
to present the relevant documents and evidence to the court in a secret
session that protects any ``state secrets.'' The courts can then judge
whether the telecom company obeyed the law--in which case it has
complete immunity--or whether it did not. And, I remind you, that
``following the law'' means simply obtaining a statement from the
government that the company's help is needed, and that the requested
help does not require a court order or violate the law. A company that
assisted in spying on its customers without getting that simple
assurance does not deserve immunity.
Mr. Speaker, this bill gives our intelligence agencies what they say
they need. But it also demands that their extraordinary powers be used
properly, and that they follow our laws and our Constitution. This bill
will help limit this Administration's disregard for the rule of law. It
is a carefully crafted measure, and deserves the support of every
member in this body.
Mr. UDALL of New Mexico. Mr. Speaker, for the past several months,
Congress has debated one of the most important issues that we face: the
struggle to protect America while preserving the guaranteed liberties
that make America great. During this vital discussion, some argued that
Congress should stop deliberating and pass a reckless proposal that
would unnecessarily sacrifice our constitutional rights. I disagreed.
The legislation we discuss today, which was the product of deep
deliberation and compromise, will keep America both safe and free. It
is a credit to this House and to the American people.
Today's legislation contains a number of carefully crafted provisions
intended to protect the civil liberties of Americans at home and abroad
while ensuring that the intelligence community can do its job. The
wisest decision the House made in this bill was to grant
telecommunications companies an opportunity to defend themselves in a
confidential FISA court trial. This is in stark contrast to the
administration's attempt to provide retroactive immunity for
telecommunications companies that may have violated the law. The Bush
administration claims that the telecommunications companies have
evidence that would exonerate them but cannot be revealed in court
because of confidentiality concerns. Our bill ensures that the American
people will get their day in court and the companies will have the
chance to defend their actions. This compromise is fair to the
companies and to those whose rights they may have violated.
I believe we can protect our Nation while upholding the values that
make America a beacon of hope to people around the world. America is
strong because we are a nation of freedom and a nation of laws. By
refusing to grant blanket immunity to those who violated Americans'
rights, the House reaffirms the rule of law and the importance of
liberty. The Senate should follow our lead.
Mr. KUCINICH. Mr. Speaker, I rise today in opposition to the FISA
Amendments Act of 2008.
This legislation is a commendable improvement over the irresponsible
Protect America
[[Page H1758]]
Act passed by this body in August. I am thankful that this new bill
does not include retroactive immunity for telecommunication companies.
However, the bill still falls short of ensuring the protection of the
fourth amendment rights of U.S. citizens.
Blanket warrants, institutionalized by the Protect America Act, will
continue with the enactment of the FISA Amendments Act. There is a
legitimate concern that surveillance of persons abroad can potentially
infringe on the fourth amendment rights of U.S. citizens.
These blanket wiretaps make it impossible to know whose calls are
being intercepted by the National Security Agency, which increase the
likelihood that the civil liberties of innocent U.S. citizens will be
violated.
Specifically, in Section 101(702)(i) appears to include a review
process of ``Certifications and Procedures'' but these procedures are
of a broad nature, make no connection to specific individuals, provide
for no showing of wrongdoing and contain no explanation of how
collection procedures will actually work. Consequently, the bill fails
to uphold standard fourth amendment judicial involvement.
Section 101 (702)(g)(3) states that ``a certification made under this
subsection is not required to identify the specific facilities, places,
premises, or property at which the acquisition authorized under
subsection (a) will be directed or conducted.''
Our county's fourth amendment provides that targets of search and
seizure should be stated with particularity. The particularity
requirement limits the scope of the search by assuring U.S. citizens
whose property is subject to a search is, according to the
Congressional Research Service, ``being searched of the lawful
authority of the executing officer and of the limits of his power to
search. It follows, therefore, that the warrant itself must describe
with particularity the items to be seized, or that such itemization
must appear in documents incorporated by reference in the warrant and
actually shown to the person whose property is to be searched.''
Under current law, reviews conducted by the FISA court do not receive
names of targets or organizations which already places some limitation
on particularity. But this bill appears to allow the Government to go
even further by applying for very broad, year-long authority to issue
directives to companies to comply with Government searches as they see
fit. This broad authority is reminiscent of the current
administration's secret spying program.
Furthermore, Section 101(702)(g)(2)(v) states that a requirement of
certification for the targeting of certain persons outside of the
United States is that ``a significant purpose of the acquisition is to
obtain foreign intelligence information.'' FISA warrants already have a
lower threshold of ``probable cause'' than criminal ``probable cause''
because the targets are assumed to be terrorist. The language in this
section of the bill eliminates the need to find any wrongdoing
whatsoever. Because, in the words of the Congressional Research
Service, ``[t]he concept of ``probable cause'' is central to the
meaning of the warrant clause'' of the fourth amendment, there are
grave concerns about the erosion of our civil liberties.
In sum total, allowing the administration to run a surveillance
program of such a broad and undefined nature qualifies as
``unreasonable'' under the fourth amendment. Although the purpose of
the bill is to target foreigners abroad, by picking up calls coming
into and out of the U.S., the program is not targeted at individual
terrorists and individualized court orders are not required. The bill
ensures that all targeted international communications are not covered
by the fourth amendment even if a U.S. citizen is involved. The rights
guaranteed by the fourth amendment dictate that the Government must
have cause to spy on U.S. citizens. But the language in this bill
ensures that the Government can spy on U.S. citizens who participate in
international communications if there is no cause. If we permit our
constitutional rights to be watered down out of fear, we have given up
our democracy. Congress must stand firm and defend the Constitution.
Mr. BUTTERFIELD. Mr. Speaker, I rise today to speak on the FISA
Amendments Act. The most controversial element of this legislation is
the absence of retroactive immunity for telecommunications companies.
As we continue this debate, I urge my colleagues to consider the unique
circumstances telecommunications companies faced after the events of 9/
11. I believe that their cooperation with the government was undertaken
in good faith and with an objectively reasonable belief that such
assistance was lawful. I applaud this legislation, but urge careful
consideration of the issue of retroactive immunity.
Mr. UDALL of Colorado. Mr. Speaker, I support this measure for two
reasons.
First, I will support it because, as I have consistently said, I do
think the basic law in this area--the Foreign Intelligence Surveillance
Act, or FISA--needs to be updated to respond to changes in technology,
which was the purpose of the current, temporary law.
That is why, last August, I voted for a bill (H.R. 3356) to provide
such an update--a bill that was supported by a majority of the House,
but did not pass because it was considered under a procedure that
required a two-thirds vote for passage, which did not occur because of
the opposition of the Bush Administration, which was supported by all
but 3 of our Republican colleagues. That is also why I voted for
another bill to update FISA--H.R. 3773, the ``Responsible Electronic
Surveillance That is Overseen, Reviewed, and Effective'' (or RESTORE)
Act--which the House passed on November 15th of last year.
Second, I will support it because I think it is distinctly better
than the version the Senate passed--as an amendment to the House-passed
RESTORE Act--on February 12th.
It does include some good features of the Senate version, including
provisions that for the first time will provide statutory requirement
that surveillance of the communications of Americans overseas will be
done pursuant to appropriate orders of the courts.
But it differs from the Senate version in some important ways,
particularly in the way it addresses the current lawsuits brought
against several telecommunications companies by parties who claim that
the companies acted wrongly by assisting with a surveillance program
involving the massive interception of purely domestic communications.
Those lawsuits have been consolidated and are pending in one court,
but evidently have made little progress because of the Administration's
argument, still awaiting court resolution, that the suits are barred
because they involve state secrets. My understanding is that the
defendant companies have argued that government's invocation of the
state-secrets privilege has had the result of preventing them from
defending themselves, although at least one company has stated in
regulatory filings that the cases against it are without merit.
President Bush has insisted that Congress throw these cases out of
court by giving the companies retroactive immunity for whatever they
might have done in connection with the surveillance program, even
though the Administration and the companies themselves insist that
those actions were lawful and that the plaintiffs' complaints against
the companies have no merit.
Regrettably, last month the Senate decided to comply with the
President's demand on this point, and their version of this legislation
would provide that retroactive immunity.
I do not think that was the right decision. I agree with the Rocky
Mountain News, which in a February 15th editorial said ``Letting this
litigation proceed would not, as Bush [has] said . . . punish companies
that want to `help America.' Businesses that want to help America need
to be mindful of the Constitution--and so should the government.''
That is why I think the approach taken in the measure before us is
better. Unlike the Senate version, it would not short-circuit the court
by preventing the cases from proceeding. Instead, it would allow the
defendant companies to defend themselves by freeing them from the
``state secret'' barrier erected by the Bush Administration.
Under the measure before us, the defendants will be able to
demonstrate to the court the evidence they say supports their arguments
in a way that assures the continued security of that evidence and that
avoids the public disclosure the Administration says would be adverse
to the national interest. This is a process that has worked well in
criminal cases, and while I am certainly not an expert on the matter, I
think it can work when applied to these civil cases.
Mr. Speaker, I think it is a matter of basic fairness to allow the
companies now being sued, and those that may be sued in the future, to
fully defend themselves and to try to show the court why, as the
defendants in the current cases claim, they are already immune under
existing law.
That is what this measure does--and, in fact, it does more.
Unlike the Senate version, it will protect the companies from
lawsuits for compliance with valid authorizations under the temporary
surveillance law (the ``Protect America Act'') passed last August for
the period between the expiration of that law (but not the underlying
authorizations) and the enactment of more lasting FISA reform
legislation.
I strongly approve of that aspect of the legislation because while I
did not support its original enactment, I do regret the fact that the
temporary law was allowed to lapse.
I thought it should have remained in effect while we in Congress work
to replace it with a longer-lasting statute. That was why earlier this
year, I twice voted to extend it--first, by passage of a 15-day
extension (H.R. 5104) and then by voting for a bill (H.R. 5349) that
would have provided a further 21-day extension.
Regrettably, that second extension did not occur. Its failure was
because of the opposition of President Bush and the resulting fact
[[Page H1759]]
that all our Republican colleagues here in the House, who voted against
the extension and thus allowed the ``Protect America Act'' to lapse--a
fact that has been conveniently ignored by many of those who have
sponsored television commercials or otherwise complained about that
lapse.
In any event, today we have the opportunity to make progress toward
the goal of updating the FISA law in a way that will enable our
intelligence agencies to obtain information needed to protect the
American people while safeguarding our rights under the Constitution.
That is what this measure does, and that is why I will vote for it.
For the information of our colleague, I am attaching the February
15th editorial of the Rocky Mountain News that I mentioned earlier.
[From the Rocky Mountain News--Friday, Feb. 15, 2008]
No Immunity--Senate Veers Off Track in Its Surveillance Bill
The Bush administration is in a tizzy because Congress will
take its Presidents Day recess and allow the temporary
``terrorist surveillance'' act passed six months ago to
expire at midnight Saturday.
Earlier this week, President Bush actually suggested that
al-Qaida operatives are watching the calendar, poised to plot
new attacks freely with Congress absent--and U.S.
intelligence officials will be largely powerless to stop
them.
Don't insult the American public, Mr. President. You'll
still have the ability to wiretap suspected terrorists--and
the warrantless surveillance powers in the bill are valid
until August.
Bush is riled because the House is leaving town without
adopting immunity provisions in the Senate surveillance bill.
The Senate version granted immunity from lawsuits--unwisely,
in our view--to telecommunications firms that cooperated with
the warrantless wiretaps on overseas calls.
If immunity is in the final legislation--and Bush has said
he'd veto any bill that doesn't include it--it would kill the
40-plus lawsuits that have been filed against telecoms in
federal court. The litigation challenges the legality of the
program and the actions of telecoms that cooperated with the
government.
If the lawsuits don't move forward, we may never learn if
some telecoms compromised the privacy of innocent Americans.
A grant of immunity could also set a dangerous precedent for
other businesses when federal agents or local cops who don't
have a court order demand private or confidential information
about their customers.
(Colorado Sens. Wayne Allard and Ken Salazar both voted to
pass the Senate legislation and to oppose an amendment that
would have stripped the immunity provisions from the bill.)
Look, we think the government should have greater leeway--
and constitutionally, does have greater leeway--to monitor
international communications with al-Qaida than it does to
intercept domestic phone calls or e-mails.
But we've largely had to take the administration's word
that the wiretap program didn't go beyond the narrow confines
under which it would be legal. Moreover, any program that
lets the government snoop without a judge's approval deserves
outside scrutiny to prevent abuses.
In this instance, the lawsuits may reveal whether the
wiretaps were targeted or were more like fishing expeditions.
We may also learn how effectively the telecoms separated
international communications from domestic calls or e-mails.
The government initially tried (and failed) to quash these
cases, claiming the program was so top secret that even
admitting that private telecoms participated would compromise
national security. Federal courts wouldn't buy that line. So
AT&T and other telecoms started claiming they were victims--
Washington had persuaded them that the program was legal and
they had little choice but to assist in the fight against al-
Qaida.
Those claims may be true, but they seem to run counter to
the experience of Joe Nacchio, the former Qwest CEO who was
convicted on insider trading charges last year. Two years ago
it was revealed that Nacchio refused to comply with appeals
from the government to participate in the warrantless wiretap
program; he balked at turning over information about his
customers obtained under what Qwest considered suspect legal
circumstances.
Court documents released in October revealed that Nacchio
first met with national security officials in February 2001--
six months before the 9/11 attacks. ``Nacchio's account,''
The Washington Post reported, ``suggests that the Bush
administration was seeking to enlist telecommunications firms
in programs without court oversight before the terrorist
attacks on New York and the Pentagon.''
Letting this litigation proceed would not, as Bush said
Wednesday, punish companies that want to ``help America.''
Businesses that want to help America need to be mindful of
the Constitution--and so should the government.
Mr. ETHERIDGE. Mr. Speaker, I rise in support of H.R. 3773, the FISA
Amendments Act of 2008. This bill will help protect our Nation's
security from terrorist threats while also protecting the civil rights
and freedoms of our citizens.
On November 15, 2007, I voted in favor of the Responsible Electronic
Surveillance That is Overseen, Reviewed, and Effective (RESTORE) Act
that passed the United States House of Representatives by a vote of 227
to 189. The FISA Amendments Act includes and enhances the provisions
from the RESTORE Act that form a strong framework for how our
intelligence agencies operate. This bill requires the FISA court to
approve targeting and minimization procedures to ensure that Americans
are not targeted and their communications are not disseminated. These
procedures would have to be approved prior to any surveillance, with
the exception of emergency cases that would allow the government to
begin surveillance immediately, provided that they obtain approval from
the FISA court within 30 days. Under the FISA Amendments Act, this
requirement would extend to American citizens at home and as well as
those traveling abroad. To further enhance accountability, this
legislation would create a Congressional commission that would conduct
hearings and investigation into the President's recent warrantless
wiretapping program. This bill grants new authorities for conducting
surveillance and collecting intelligence against terrorist
organizations, while preserving the requirement that the government
obtain a FISA court order, based on probable cause, when targeting
Americans.
While the FISA Amendments Act does not include retroactive immunity
for telecommunications companies, it does ensure the ability of these
companies to fully defend themselves if they are sued in a court of
law. This bill provides these telecommunications companies a way to
present their defenses in secure proceedings and gives them access to
any documents relating to their case that the government could
otherwise withhold as ``state secrets.''
We owe our intelligence agencies clear rules and guidelines in order
to perform their duties to the fullest, just as we owe it to every
American to protect their rights and freedoms. I support the passage of
H.R. 3773, The FISA Amendments Act of 2008, and I urge my colleagues to
join me.
Mr. SMITH of Texas. Mr. Speaker, I submit the following for the
Record.
FISA Fix For Lawyers
National Security: Wiretap law is supposed to protect the
U.S. by discovering and foiling terrorist operations.
Congressional Democrats seem to think its purpose is to line
the pockets of their trial lawyer supporters.
House Democrats want to enact a terrorist surveillance law
that puts lawyers' fees before the safety of Americans. It's
a bill so skewed that its passage on a vote scheduled for
Thursday was questionable even to Democrats in the majority.
At issue is the help given by telecom companies such as
AT&T and Verizon in monitoring the telephone and Internet
communications of suspected terrorists with contacts within
the U.S.
Those heroic firms have saved hundreds, if not thousands,
of innocent lives with their cooperation in helping to obtain
information that allowed law enforcement to prevent post-9/ll
attacks.
Congressional Democrats steadfastly refuse to protect those
firms from lawsuits backed by the American Civil Liberties
Union. Their message to those patriotic companies seems to
be:
You helped President Bush succeed at something we wanted to
destroy him over, so now that we control Congress we're going
to give you your well-deserved comeuppance.
The ACLU issued a statement expressing delight over the
House Democrats' new bill and was also pleased that the
Democrats would let the authorization to track terrorists
expire in only two years--as if there is any realistic chance
that the global war on terror could be behind us by then.
A permanent Foreign Intelligence Surveillance Act could
always be revisited or repealed by Congress, yet Speaker
Nancy Pelosi's Democrats insist on a FISA sunset provision.
The group said it is ``also heartened by the role retained
by the FISA court in overseeing the program,'' an allusion to
the fact that under the Democrats' bill, any and all domestic
surveillance for anti-terrorism purposes would have to first
get the approval of the special FISA courts--a state of
affairs that the president has emphatically stated places the
nation at risk.
Moreover, it is a state of affairs under which the country
is vulnerable today, because the Democratic Congress let FISA
expire nearly a month ago.
The Senate's FISA revision provides retroactive protection
from lawsuits to the telecom firms. If nothing is done, they
could conceivably be liable for hundreds of millions of
dollars--which would be some thanks for helping to protect
Americans from al-Qaida.
House Democrats instead would give only ``prospective
liability protection for telecom companies that assist with
lawful surveillance'', according to a statement from House
Majority Leader Steny Hoyer.
One of the bill's proposed procedures apparently would be
for the firms to tell the judge state secrets as part of
their defense
[[Page H1760]]
while the ACLU lawyers and other plaintiff attorneys are out
of the room.
But the ACLU's strategy in trying to destroy our
government's ability to monitor terrorist communications has
been to take their cases to federal courts in different
regions--in effect, judge shopping.
Because the House Democrats' FISA bill would, as the ACLU
puts it, keep ``the courthouse door open,'' chances are that
they would be able to find judges only too happy to make the
telecom firms pay multimillion-dollar awards. The only just
solution is for Congress to grant those firms full
retroactive immunity.
As Vice President Dick Cheney recently told the Heritage
Foundation, ``those who assist the government in tracking
terrorists should not be punished with lawsuits . . . it's
not even proper to confirm whether any given company provided
assistance.'' He added: ``In some situations, there is no
alternative to seeking assistance from the private sector.''
The Center for Responsive Politics reports that trial
lawyers contributed some $85 million to Democratic candidates
in the 2006 election cycle. Obviously, Democrats believe
letting those legal parasites feed off patriotic companies
who have saved countless American lives is what is expected
of them in return.
Mr. STARK. Madam Speaker, I rise today to support the House's changes
to the Foreign Intelligence Surveillance Act, FISA, Amendments Act.
After 8 long years of watching Republicans kowtow to the President's
tyrannical policies, I am only too happy to stand by a bill that will
hold his administration accountable to some of their past actions and
prevent future administrations from abusing our civil liberties.
Our government was designed to be of the people, by the people, and
for the people. But under President Bush, it has been a government of
the executive branch, by the executive branch, and for the executive
branch. The Administration's so-called ``security measures''--tapping
phones, obtaining personal records, and spying without warrants--have
undermined basic freedoms and diminished trust in government.
It will take a great deal of time to clean up the mess left by this
administration. We can take an important step forward today by giving
telecommunications companies their day in court and establishing strict
restrictions to prevent the government from spying whenever and on
whomever it pleases. By voting for this bill, we make it clear that we
won't let the President make a quick escape from Washington without
bringing his transgressions to light. Rather than hide behind the
threat of terrorism to justify illegal activities, as past Congresses
have done, we will defend the constitutional rights of our
constituents.
The Bush administration has tried its hardest to convince us that our
country's most basic tenets are unattainable. It believes that in order
to protect life, we must sacrifice liberty and the pursuit of
happiness. That line of thought is wrong, President Bush is wrong, and
I encourage my colleagues to support this bill and show that they are
above the executive branch's scare tactics.
The SPEAKER pro tempore. All time for debate has expired.
Pursuant to House Resolution 1041, the previous question is ordered.
The question is on the motion offered by the gentleman from Michigan
(Mr. Conyers).
The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
Mr. SMITH of Texas. Mr. Speaker, on that I demand the yeas and nays.
The yeas and nays were ordered.
The vote was taken by electronic device, and there were--yeas 213,
nays 197, answered ``present'' 1, not voting 20, as follows:
[Roll No. 145]
YEAS--213
Abercrombie
Ackerman
Allen
Altmire
Andrews
Arcuri
Baca
Baird
Baldwin
Barrow
Bean
Becerra
Berkley
Berman
Berry
Bishop (GA)
Bishop (NY)
Blumenauer
Boswell
Boucher
Boyd (FL)
Boyda (KS)
Brady (PA)
Braley (IA)
Brown, Corrine
Butterfield
Capps
Cardoza
Carnahan
Carson
Castor
Chandler
Clarke
Clay
Cleaver
Clyburn
Cohen
Conyers
Costa
Costello
Courtney
Crowley
Cuellar
Cummings
Davis (AL)
Davis (CA)
Davis (IL)
DeFazio
DeGette
Delahunt
DeLauro
Dicks
Dingell
Doggett
Donnelly
Doyle
Edwards
Ellison
Ellsworth
Emanuel
Engel
Eshoo
Etheridge
Farr
Fattah
Foster
Frank (MA)
Giffords
Gillibrand
Gonzalez
Gordon
Green, Al
Grijalva
Gutierrez
Hall (NY)
Hare
Harman
Hastings (FL)
Herseth Sandlin
Higgins
Hill
Hinojosa
Hirono
Hodes
Holt
Honda
Hoyer
Inslee
Israel
Jackson (IL)
Jackson-Lee (TX)
Jefferson
Johnson (GA)
Johnson, E. B.
Jones (OH)
Kagen
Kanjorski
Kaptur
Kennedy
Kildee
Kilpatrick
Kind
Klein (FL)
Langevin
Larsen (WA)
Larson (CT)
Lee
Levin
Lewis (GA)
Lipinski
Loebsack
Lofgren, Zoe
Lowey
Lynch
Mahoney (FL)
Maloney (NY)
Markey
Marshall
Matheson
Matsui
McCarthy (NY)
McCollum (MN)
McGovern
McIntyre
McNerney
McNulty
Meek (FL)
Meeks (NY)
Melancon
Michaud
Miller (NC)
Miller, George
Mitchell
Mollohan
Moore (KS)
Moore (WI)
Moran (VA)
Murphy (CT)
Murphy, Patrick
Murtha
Nadler
Napolitano
Neal (MA)
Obey
Olver
Ortiz
Pallone
Pascrell
Pastor
Payne
Pelosi
Perlmutter
Peterson (MN)
Pomeroy
Price (NC)
Rahall
Reyes
Richardson
Rodriguez
Ross
Rothman
Roybal-Allard
Ruppersberger
Ryan (OH)
Salazar
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schiff
Schwartz
Scott (GA)
Scott (VA)
Serrano
Sestak
Shea-Porter
Sherman
Sires
Skelton
Slaughter
Smith (WA)
Snyder
Solis
Space
Spratt
Stark
Stupak
Sutton
Tanner
Tauscher
Taylor
Thompson (CA)
Thompson (MS)
Tierney
Towns
Tsongas
Udall (CO)
Udall (NM)
Van Hollen
Velazquez
Visclosky
Walz (MN)
Wasserman Schultz
Waters
Watson
Watt
Waxman
Weiner
Wexler
Wilson (OH)
Wu
Wynn
Yarmuth
NAYS--197
Aderholt
Akin
Alexander
Bachmann
Bachus
Barrett (SC)
Bartlett (MD)
Barton (TX)
Biggert
Bilbray
Bilirakis
Bishop (UT)
Blackburn
Blunt
Boehner
Bonner
Bono Mack
Boozman
Boren
Brady (TX)
Broun (GA)
Brown (SC)
Buchanan
Burgess
Burton (IN)
Buyer
Calvert
Camp (MI)
Campbell (CA)
Cannon
Cantor
Capito
Capuano
Carney
Carter
Castle
Chabot
Coble
Cole (OK)
Conaway
Cooper
Crenshaw
Cubin
Culberson
Davis (KY)
Davis, David
Davis, Tom
Deal (GA)
Dent
Diaz-Balart, L.
Diaz-Balart, M.
Doolittle
Drake
Dreier
Duncan
Ehlers
Emerson
English (PA)
Fallin
Feeney
Ferguson
Filner
Flake
Forbes
Fortenberry
Fossella
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Garrett (NJ)
Gerlach
Gilchrest
Gingrey
Gohmert
Goode
Goodlatte
Granger
Graves
Hall (TX)
Hastings (WA)
Hayes
Heller
Hensarling
Herger
Hinchey
Hobson
Hoekstra
Holden
Hulshof
Inglis (SC)
Issa
Johnson (IL)
Johnson, Sam
Jones (NC)
Jordan
Keller
King (IA)
King (NY)
Kingston
Kirk
Kline (MN)
Knollenberg
Kucinich
Kuhl (NY)
Lamborn
Lampson
Latham
LaTourette
Latta
Lewis (CA)
Lewis (KY)
Linder
LoBiondo
Lucas
Lungren, Daniel E.
Mack
Manzullo
Marchant
McCarthy (CA)
McCaul (TX)
McCotter
McCrery
McDermott
McHenry
McHugh
McKeon
McMorris Rodgers
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Moran (KS)
Murphy, Tim
Myrick
Neugebauer
Paul
Pearce
Pence
Petri
Pitts
Platts
Poe
Porter
Price (GA)
Pryce (OH)
Putnam
Radanovich
Ramstad
Regula
Rehberg
Reichert
Renzi
Reynolds
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Ros-Lehtinen
Roskam
Royce
Ryan (WI)
Sali
Saxton
Schmidt
Sensenbrenner
Sessions
Shadegg
Shays
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Souder
Stearns
Sullivan
Terry
Thornberry
Tiahrt
Tiberi
Turner
Upton
Walberg
Walden (OR)
Wamp
Welch (VT)
Weldon (FL)
Westmoreland
Whitfield (KY)
Wilson (NM)
Wilson (SC)
Wittman (VA)
Wolf
Young (FL)
ANSWERED ``PRESENT''--1
Davis, Lincoln
NOT VOTING--20
Boustany
Brown-Waite, Ginny
Cramer
Everett
Green, Gene
Hooley
Hunter
LaHood
Musgrave
Nunes
Oberstar
Peterson (PA)
Pickering
Rangel
Rush
Tancredo
Walsh (NY)
Weller
Woolsey
Young (AK)
{time} 1408
Messrs. KINGSTON, EHLERS, and McDERMOTT changed their vote from
``yea'' to ``nay.''
So the motion was agreed to.
The result of the vote was announced as above recorded.
A motion to reconsider was laid on the table.
____________________