[Congressional Record: June 20, 2008 (House)]
[Page H5743-H5774]





                      FISA AMENDMENTS ACT OF 2008

  Mr. CONYERS. Madam Speaker, pursuant to House Resolution 1285, I call
up the bill (H.R. 6304) to amend the Foreign Intelligence Surveillance
Act of 1978 to establish a procedure for authorizing certain
acquisitions of foreign intelligence, and for other purposes, and ask
for its immediate consideration in the House.
  The Clerk read the title of the bill.
  The text of the bill is as follows:

                               H.R. 6304

       Be it enacted by the Senate and House of Representatives of
     the United States of America in Congress assembled,

     SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

       (a) Short Title.--This Act may be cited as the ``Foreign
     Intelligence Surveillance Act of 1978 Amendments Act of
     2008'' or the ``FISA Amendments Act of 2008''.
       (b) Table of Contents.--The table of contents for this Act
     is as follows:

Sec. 1. Short title; table of contents.

               TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE

Sec. 101. Additional procedures regarding certain persons outside the
              United States.
Sec. 102. Statement of exclusive means by which electronic surveillance
              and interception of certain communications may be
              conducted.
Sec. 103. Submittal to Congress of certain court orders under the
              Foreign Intelligence Surveillance Act of 1978.
Sec. 104. Applications for court orders.
Sec. 105. Issuance of an order.
Sec. 106. Use of information.
Sec. 107. Amendments for physical searches.
Sec. 108. Amendments for emergency pen registers and trap and trace
              devices.
Sec. 109. Foreign Intelligence Surveillance Court.
Sec. 110. Weapons of mass destruction.

  TITLE II--PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS

Sec. 201. Procedures for implementing statutory defenses under the
              Foreign Intelligence Surveillance Act of 1978.
Sec. 202. Technical amendments.

                 TITLE III--REVIEW OF PREVIOUS ACTIONS

Sec. 301. Review of previous actions.

                       TITLE IV--OTHER PROVISIONS

Sec. 401. Severability.
Sec. 402. Effective date.
Sec. 403. Repeals.
Sec. 404. Transition procedures.

               TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE

     SEC. 101. ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS
                   OUTSIDE THE UNITED STATES.

       (a) In General.--The Foreign Intelligence Surveillance Act
     of 1978 (50 U.S.C. 1801 et seq.) is amended--
       (1) by striking title VII; and
       (2) by adding at the end the following:

 ``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
                           THE UNITED STATES

     ``SEC. 701. DEFINITIONS.

       ``(a) In General.--The terms `agent of a foreign power',
     `Attorney General', `contents', `electronic surveillance',
     `foreign intelligence information', `foreign power',
     `person', `United States', and `United States person' have
     the meanings given such terms in section 101, except as
     specifically provided in this title.
       ``(b) Additional Definitions.--
       ``(1) Congressional intelligence committees.--The term
     `congressional intelligence committees' means--
       ``(A) the Select Committee on Intelligence of the Senate;
     and
       ``(B) the Permanent Select Committee on Intelligence of the
     House of Representatives.
       ``(2) Foreign intelligence surveillance court; court.--The
     terms `Foreign Intelligence Surveillance Court' and `Court'
     mean the court established under section 103(a).
       ``(3) Foreign intelligence surveillance court of review;
     court of review.--The terms `Foreign Intelligence
     Surveillance Court of Review' and `Court of Review' mean the
     court established under section 103(b).
       ``(4) Electronic communication service provider.--The term
     `electronic communication service provider' means--
       ``(A) a telecommunications carrier, as that term is defined
     in section 3 of the Communications Act of 1934 (47 U.S.C.
     153);

[[Page H5744]]

       ``(B) a provider of electronic communication service, as
     that term is defined in section 2510 of title 18, United
     States Code;
       ``(C) a provider of a remote computing service, as that
     term is defined in section 2711 of title 18, United States
     Code;
       ``(D) any other communication service provider who has
     access to wire or electronic communications either as such
     communications are transmitted or as such communications are
     stored; or
       ``(E) an officer, employee, or agent of an entity described
     in subparagraph (A), (B), (C), or (D).
       ``(5) Intelligence community.--The term `intelligence
     community' has the meaning given the term in section 3(4) of
     the National Security Act of 1947 (50 U.S.C. 401a(4)).

     ``SEC. 702. PROCEDURES FOR TARGETING CERTAIN PERSONS OUTSIDE
                   THE UNITED STATES OTHER THAN UNITED STATES
                   PERSONS.

       ``(a) Authorization.--Notwithstanding any other provision
     of law, upon the issuance of an order in accordance with
     subsection (i)(3) or a determination under subsection (c)(2),
     the Attorney General and the Director of National
     Intelligence may authorize jointly, for a period of up to 1
     year from the effective date of the authorization, the
     targeting of persons reasonably believed to be located
     outside the United States to acquire foreign intelligence
     information.
       ``(b) Limitations.--An acquisition authorized under
     subsection (a)--
       ``(1) may not intentionally target any person known at the
     time of acquisition to be located in the United States;
       ``(2) may not intentionally target a person reasonably
     believed to be located outside the United States if the
     purpose of such acquisition is to target a particular, known
     person reasonably believed to be in the United States;
       ``(3) may not intentionally target a United States person
     reasonably believed to be located outside the United States;
       ``(4) may not intentionally acquire any communication as to
     which the sender and all intended recipients are known at the
     time of the acquisition to be located in the United States;
     and
       ``(5) shall be conducted in a manner consistent with the
     fourth amendment to the Constitution of the United States.
       ``(c) Conduct of Acquisition.--
       ``(1) In general.--An acquisition authorized under
     subsection (a) shall be conducted only in accordance with--
       ``(A) the targeting and minimization procedures adopted in
     accordance with subsections (d) and (e); and
       ``(B) upon submission of a certification in accordance with
     subsection (g), such certification.
       ``(2) Determination.--A determination under this paragraph
     and for purposes of subsection (a) is a determination by the
     Attorney General and the Director of National Intelligence
     that exigent circumstances exist because, without immediate
     implementation of an authorization under subsection (a),
     intelligence important to the national security of the United
     States may be lost or not timely acquired and time does not
     permit the issuance of an order pursuant to subsection (i)(3)
     prior to the implementation of such authorization.
       ``(3) Timing of determination.--The Attorney General and
     the Director of National Intelligence may make the
     determination under paragraph (2)--
       ``(A) before the submission of a certification in
     accordance with subsection (g); or
       ``(B) by amending a certification pursuant to subsection
     (i)(1)(C) at any time during which judicial review under
     subsection (i) of such certification is pending.
       ``(4) Construction.--Nothing in title I shall be construed
     to require an application for a court order under such title
     for an acquisition that is targeted in accordance with this
     section at a person reasonably believed to be located outside
     the United States.
       ``(d) Targeting Procedures.--
       ``(1) Requirement to adopt.--The Attorney General, in
     consultation with the Director of National Intelligence,
     shall adopt targeting procedures that are reasonably designed
     to--
       ``(A) ensure that any acquisition authorized under
     subsection (a) is limited to targeting persons reasonably
     believed to be located outside the United States; and
       ``(B) prevent the intentional acquisition of any
     communication as to which the sender and all intended
     recipients are known at the time of the acquisition to be
     located in the United States.
       ``(2) Judicial review.--The procedures adopted in
     accordance with paragraph (1) shall be subject to judicial
     review pursuant to subsection (i).
       ``(e) Minimization Procedures.--
       ``(1) Requirement to adopt.--The Attorney General, in
     consultation with the Director of National Intelligence,
     shall adopt minimization procedures that meet the definition
     of minimization procedures under section 101(h) or 301(4), as
     appropriate, for acquisitions authorized under subsection
     (a).
       ``(2) Judicial review.--The minimization procedures adopted
     in accordance with paragraph (1) shall be subject to judicial
     review pursuant to subsection (i).
       ``(f) Guidelines for Compliance With Limitations.--
       ``(1) Requirement to adopt.--The Attorney General, in
     consultation with the Director of National Intelligence,
     shall adopt guidelines to ensure--
       ``(A) compliance with the limitations in subsection (b);
     and
       ``(B) that an application for a court order is filed as
     required by this Act.
       ``(2) Submission of guidelines.--The Attorney General shall
     provide the guidelines adopted in accordance with paragraph
     (1) to--
       ``(A) the congressional intelligence committees;
       ``(B) the Committees on the Judiciary of the Senate and the
     House of Representatives; and
       ``(C) the Foreign Intelligence Surveillance Court.
       ``(g) Certification.--
       ``(1) In general.--
       ``(A) Requirement.--Subject to subparagraph (B), prior to
     the implementation of an authorization under subsection (a),
     the Attorney General and the Director of National
     Intelligence shall provide to the Foreign Intelligence
     Surveillance Court a written certification and any supporting
     affidavit, under oath and under seal, in accordance with this
     subsection.
       ``(B) Exception.--If the Attorney General and the Director
     of National Intelligence make a determination under
     subsection (c)(2) and time does not permit the submission of
     a certification under this subsection prior to the
     implementation of an authorization under subsection (a), the
     Attorney General and the Director of National Intelligence
     shall submit to the Court a certification for such
     authorization as soon as practicable but in no event later
     than 7 days after such determination is made.
       ``(2) Requirements.--A certification made under this
     subsection shall--
       ``(A) attest that--
       ``(i) there are procedures in place that have been
     approved, have been submitted for approval, or will be
     submitted with the certification for approval by the Foreign
     Intelligence Surveillance Court that are reasonably designed
     to--

       ``(I) ensure that an acquisition authorized under
     subsection (a) is limited to targeting persons reasonably
     believed to be located outside the United States; and
       ``(II) prevent the intentional acquisition of any
     communication as to which the sender and all intended
     recipients are known at the time of the acquisition to be
     located in the United States;

       ``(ii) the minimization procedures to be used with respect
     to such acquisition--

       ``(I) meet the definition of minimization procedures under
     section 101(h) or 301(4), as appropriate; and
       ``(II) have been approved, have been submitted for
     approval, or will be submitted with the certification for
     approval by the Foreign Intelligence Surveillance Court;

       ``(iii) guidelines have been adopted in accordance with
     subsection (f) to ensure compliance with the limitations in
     subsection (b) and to ensure that an application for a court
     order is filed as required by this Act;
       ``(iv) the procedures and guidelines referred to in clauses
     (i), (ii), and (iii) are consistent with the requirements of
     the fourth amendment to the Constitution of the United
     States;
       ``(v) a significant purpose of the acquisition is to obtain
     foreign intelligence information;
       ``(vi) the acquisition involves obtaining foreign
     intelligence information from or with the assistance of an
     electronic communication service provider; and
       ``(vii) the acquisition complies with the limitations in
     subsection (b);
       ``(B) include the procedures adopted in accordance with
     subsections (d) and (e);
       ``(C) be supported, as appropriate, by the affidavit of any
     appropriate official in the area of national security who
     is--
       ``(i) appointed by the President, by and with the advice
     and consent of the Senate; or
       ``(ii) the head of an element of the intelligence
     community;
       ``(D) include--
       ``(i) an effective date for the authorization that is at
     least 30 days after the submission of the written
     certification to the court; or
       ``(ii) if the acquisition has begun or the effective date
     is less than 30 days after the submission of the written
     certification to the court, the date the acquisition began or
     the effective date for the acquisition; and
       ``(E) if the Attorney General and the Director of National
     Intelligence make a determination under subsection (c)(2),
     include a statement that such determination has been made.
       ``(3) Change in effective date.--The Attorney General and
     the Director of National Intelligence may advance or delay
     the effective date referred to in paragraph (2)(D) by
     submitting an amended certification in accordance with
     subsection (i)(1)(C) to the Foreign Intelligence Surveillance
     Court for review pursuant to subsection (i).
       ``(4) Limitation.--A certification made under this
     subsection is not required to identify the specific
     facilities, places, premises, or property at which an
     acquisition authorized under subsection (a) will be directed
     or conducted.
       ``(5) Maintenance of certification.--The Attorney General
     or a designee of the Attorney General shall maintain a copy
     of a certification made under this subsection.
       ``(6) Review.--A certification submitted in accordance with
     this subsection shall be subject to judicial review pursuant
     to subsection (i).
       ``(h) Directives and Judicial Review of Directives.--
       ``(1) Authority.--With respect to an acquisition authorized
     under subsection (a), the

[[Page H5745]]

     Attorney General and the Director of National Intelligence
     may direct, in writing, an electronic communication service
     provider to--
       ``(A) immediately provide the Government with all
     information, facilities, or assistance necessary to
     accomplish the acquisition in a manner that will protect the
     secrecy of the acquisition and produce a minimum of
     interference with the services that such electronic
     communication service provider is providing to the target of
     the acquisition; and
       ``(B) maintain under security procedures approved by the
     Attorney General and the Director of National Intelligence
     any records concerning the acquisition or the aid furnished
     that such electronic communication service provider wishes to
     maintain.
       ``(2) Compensation.--The Government shall compensate, at
     the prevailing rate, an electronic communication service
     provider for providing information, facilities, or assistance
     in accordance with a directive issued pursuant to paragraph
     (1).
       ``(3) Release from liability.--No cause of action shall lie
     in any court against any electronic communication service
     provider for providing any information, facilities, or
     assistance in accordance with a directive issued pursuant to
     paragraph (1).
       ``(4) Challenging of directives.--
       ``(A) Authority to challenge.--An electronic communication
     service provider receiving a directive issued pursuant to
     paragraph (1) may file a petition to modify or set aside such
     directive with the Foreign Intelligence Surveillance Court,
     which shall have jurisdiction to review such petition.
       ``(B) Assignment.--The presiding judge of the Court shall
     assign a petition filed under subparagraph (A) to 1 of the
     judges serving in the pool established under section
     103(e)(1) not later than 24 hours after the filing of such
     petition.
       ``(C) Standards for review.--A judge considering a petition
     filed under subparagraph (A) may grant such petition only if
     the judge finds that the directive does not meet the
     requirements of this section, or is otherwise unlawful.
       ``(D) Procedures for initial review.--A judge shall conduct
     an initial review of a petition filed under subparagraph (A)
     not later than 5 days after being assigned such petition. If
     the judge determines that such petition does not consist of
     claims, defenses, or other legal contentions that are
     warranted by existing law or by a nonfrivolous argument for
     extending, modifying, or reversing existing law or for
     establishing new law, the judge shall immediately deny such
     petition and affirm the directive or any part of the
     directive that is the subject of such petition and order the
     recipient to comply with the directive or any part of it.
     Upon making a determination under this subparagraph or
     promptly thereafter, the judge shall provide a written
     statement for the record of the reasons for such
     determination.
       ``(E) Procedures for plenary review.--If a judge determines
     that a petition filed under subparagraph (A) requires plenary
     review, the judge shall affirm, modify, or set aside the
     directive that is the subject of such petition not later than
     30 days after being assigned such petition. If the judge does
     not set aside the directive, the judge shall immediately
     affirm or affirm with modifications the directive, and order
     the recipient to comply with the directive in its entirety or
     as modified. The judge shall provide a written statement for
     the record of the reasons for a determination under this
     subparagraph.
       ``(F) Continued effect.--Any directive not explicitly
     modified or set aside under this paragraph shall remain in
     full effect.
       ``(G) Contempt of court.--Failure to obey an order issued
     under this paragraph may be punished by the Court as contempt
     of court.
       ``(5) Enforcement of directives.--
       ``(A) Order to compel.--If an electronic communication
     service provider fails to comply with a directive issued
     pursuant to paragraph (1), the Attorney General may file a
     petition for an order to compel the electronic communication
     service provider to comply with the directive with the
     Foreign Intelligence Surveillance Court, which shall have
     jurisdiction to review such petition.
       ``(B) Assignment.--The presiding judge of the Court shall
     assign a petition filed under subparagraph (A) to 1 of the
     judges serving in the pool established under section
     103(e)(1) not later than 24 hours after the filing of such
     petition.
       ``(C) Procedures for review.--A judge considering a
     petition filed under subparagraph (A) shall, not later than
     30 days after being assigned such petition, issue an order
     requiring the electronic communication service provider to
     comply with the directive or any part of it, as issued or as
     modified, if the judge finds that the directive meets the
     requirements of this section and is otherwise lawful. The
     judge shall provide a written statement for the record of the
     reasons for a determination under this paragraph.
       ``(D) Contempt of court.--Failure to obey an order issued
     under this paragraph may be punished by the Court as contempt
     of court.
       ``(E) Process.--Any process under this paragraph may be
     served in any judicial district in which the electronic
     communication service provider may be found.
       ``(6) Appeal.--
       ``(A) Appeal to the court of review.--The Government or an
     electronic communication service provider receiving a
     directive issued pursuant to paragraph (1) may file a
     petition with the Foreign Intelligence Surveillance Court of
     Review for review of a decision issued pursuant to paragraph
     (4) or (5). The Court of Review shall have jurisdiction to
     consider such petition and shall provide a written statement
     for the record of the reasons for a decision under this
     subparagraph.
       ``(B) Certiorari to the supreme court.--The Government or
     an electronic communication service provider receiving a
     directive issued pursuant to paragraph (1) may file a
     petition for a writ of certiorari for review of a decision of
     the Court of Review issued under subparagraph (A). The record
     for such review shall be transmitted under seal to the
     Supreme Court of the United States, which shall have
     jurisdiction to review such decision.
       ``(i) Judicial Review of Certifications and Procedures.--
       ``(1) In general.--
       ``(A) Review by the foreign intelligence surveillance
     court.--The Foreign Intelligence Surveillance Court shall
     have jurisdiction to review a certification submitted in
     accordance with subsection (g) and the targeting and
     minimization procedures adopted in accordance with
     subsections (d) and (e), and amendments to such certification
     or such procedures.
       ``(B) Time period for review.--The Court shall review a
     certification submitted in accordance with subsection (g) and
     the targeting and minimization procedures adopted in
     accordance with subsections (d) and (e) and shall complete
     such review and issue an order under paragraph (3) not later
     than 30 days after the date on which such certification and
     such procedures are submitted.
       ``(C) Amendments.--The Attorney General and the Director of
     National Intelligence may amend a certification submitted in
     accordance with subsection (g) or the targeting and
     minimization procedures adopted in accordance with
     subsections (d) and (e) as necessary at any time, including
     if the Court is conducting or has completed review of such
     certification or such procedures, and shall submit the
     amended certification or amended procedures to the Court not
     later than 7 days after amending such certification or such
     procedures. The Court shall review any amendment under this
     subparagraph under the procedures set forth in this
     subsection. The Attorney General and the Director of National
     Intelligence may authorize the use of an amended
     certification or amended procedures pending the Court's
     review of such amended certification or amended procedures.
       ``(2) Review.--The Court shall review the following:
       ``(A) Certification.--A certification submitted in
     accordance with subsection (g) to determine whether the
     certification contains all the required elements.
       ``(B) Targeting procedures.--The targeting procedures
     adopted in accordance with subsection (d) to assess whether
     the procedures are reasonably designed to--
       ``(i) ensure that an acquisition authorized under
     subsection (a) is limited to targeting persons reasonably
     believed to be located outside the United States; and
       ``(ii) prevent the intentional acquisition of any
     communication as to which the sender and all intended
     recipients are known at the time of the acquisition to be
     located in the United States.
       ``(C) Minimization procedures.--The minimization procedures
     adopted in accordance with subsection (e) to assess whether
     such procedures meet the definition of minimization
     procedures under section 101(h) or section 301(4), as
     appropriate.
       ``(3) Orders.--
       ``(A) Approval.--If the Court finds that a certification
     submitted in accordance with subsection (g) contains all the
     required elements and that the targeting and minimization
     procedures adopted in accordance with subsections (d) and (e)
     are consistent with the requirements of those subsections and
     with the fourth amendment to the Constitution of the United
     States, the Court shall enter an order approving the
     certification and the use, or continued use in the case of an
     acquisition authorized pursuant to a determination under
     subsection (c)(2), of the procedures for the acquisition.
       ``(B) Correction of deficiencies.--If the Court finds that
     a certification submitted in accordance with subsection (g)
     does not contain all the required elements, or that the
     procedures adopted in accordance with subsections (d) and (e)
     are not consistent with the requirements of those subsections
     or the fourth amendment to the Constitution of the United
     States, the Court shall issue an order directing the
     Government to, at the Government's election and to the extent
     required by the Court's order--
       ``(i) correct any deficiency identified by the Court's
     order not later than 30 days after the date on which the
     Court issues the order; or
       ``(ii) cease, or not begin, the implementation of the
     authorization for which such certification was submitted.
       ``(C) Requirement for written statement.--In support of an
     order under this subsection, the Court shall provide,
     simultaneously with the order, for the record a written
     statement of the reasons for the order.
       ``(4) Appeal.--
       ``(A) Appeal to the court of review.--The Government may
     file a petition with the Foreign Intelligence Surveillance
     Court of Review for review of an order under this subsection.
     The Court of Review shall have jurisdiction to consider such
     petition. For any decision under this subparagraph affirming,

[[Page H5746]]

     reversing, or modifying an order of the Foreign Intelligence
     Surveillance Court, the Court of Review shall provide for the
     record a written statement of the reasons for the decision.
       ``(B) Continuation of acquisition pending rehearing or
     appeal.--Any acquisition affected by an order under paragraph
     (3)(B) may continue--
       ``(i) during the pendency of any rehearing of the order by
     the Court en banc; and
       ``(ii) if the Government files a petition for review of an
     order under this section, until the Court of Review enters an
     order under subparagraph (C).
       ``(C) Implementation pending appeal.--Not later than 60
     days after the filing of a petition for review of an order
     under paragraph (3)(B) directing the correction of a
     deficiency, the Court of Review shall determine, and enter a
     corresponding order regarding, whether all or any part of the
     correction order, as issued or modified, shall be implemented
     during the pendency of the review.
       ``(D) Certiorari to the supreme court.--The Government may
     file a petition for a writ of certiorari for review of a
     decision of the Court of Review issued under subparagraph
     (A). The record for such review shall be transmitted under
     seal to the Supreme Court of the United States, which shall
     have jurisdiction to review such decision.
       ``(5) Schedule.--
       ``(A) Reauthorization of authorizations in effect.--If the
     Attorney General and the Director of National Intelligence
     seek to reauthorize or replace an authorization issued under
     subsection (a), the Attorney General and the Director of
     National Intelligence shall, to the extent practicable,
     submit to the Court the certification prepared in accordance
     with subsection (g) and the procedures adopted in accordance
     with subsections (d) and (e) at least 30 days prior to the
     expiration of such authorization.
       ``(B) Reauthorization of orders, authorizations, and
     directives.--If the Attorney General and the Director of
     National Intelligence seek to reauthorize or replace an
     authorization issued under subsection (a) by filing a
     certification pursuant to subparagraph (A), that
     authorization, and any directives issued thereunder and any
     order related thereto, shall remain in effect,
     notwithstanding the expiration provided for in subsection
     (a), until the Court issues an order with respect to such
     certification under paragraph (3) at which time the
     provisions of that paragraph and paragraph (4) shall apply
     with respect to such certification.
       ``(j) Judicial Proceedings.--
       ``(1) Expedited judicial proceedings.--Judicial proceedings
     under this section shall be conducted as expeditiously as
     possible.
       ``(2) Time limits.--A time limit for a judicial decision in
     this section shall apply unless the Court, the Court of
     Review, or any judge of either the Court or the Court of
     Review, by order for reasons stated, extends that time as
     necessary for good cause in a manner consistent with national
     security.
       ``(k) Maintenance and Security of Records and
     Proceedings.--
       ``(1) Standards.--The Foreign Intelligence Surveillance
     Court shall maintain a record of a proceeding under this
     section, including petitions, appeals, orders, and statements
     of reasons for a decision, under security measures adopted by
     the Chief Justice of the United States, in consultation with
     the Attorney General and the Director of National
     Intelligence.
       ``(2) Filing and review.--All petitions under this section
     shall be filed under seal. In any proceedings under this
     section, the Court shall, upon request of the Government,
     review ex parte and in camera any Government submission, or
     portions of a submission, which may include classified
     information.
       ``(3) Retention of records.--The Attorney General and the
     Director of National Intelligence shall retain a directive or
     an order issued under this section for a period of not less
     than 10 years from the date on which such directive or such
     order is issued.
       ``(l) Assessments and Reviews.--
       ``(1) Semiannual assessment.--Not less frequently than once
     every 6 months, the Attorney General and Director of National
     Intelligence shall assess compliance with the targeting and
     minimization procedures adopted in accordance with
     subsections (d) and (e) and the guidelines adopted in
     accordance with subsection (f) and shall submit each
     assessment to--
       ``(A) the Foreign Intelligence Surveillance Court; and
       ``(B) consistent with the Rules of the House of
     Representatives, the Standing Rules of the Senate, and Senate
     Resolution 400 of the 94th Congress or any successor Senate
     resolution--
       ``(i) the congressional intelligence committees; and
       ``(ii) the Committees on the Judiciary of the House of
     Representatives and the Senate.
       ``(2) Agency assessment.--The Inspector General of the
     Department of Justice and the Inspector General of each
     element of the intelligence community authorized to acquire
     foreign intelligence information under subsection (a), with
     respect to the department or element of such Inspector
     General--
       ``(A) are authorized to review compliance with the
     targeting and minimization procedures adopted in accordance
     with subsections (d) and (e) and the guidelines adopted in
     accordance with subsection (f);
       ``(B) with respect to acquisitions authorized under
     subsection (a), shall review the number of disseminated
     intelligence reports containing a reference to a United
     States-person identity and the number of United States-person
     identities subsequently disseminated by the element concerned
     in response to requests for identities that were not referred
     to by name or title in the original reporting;
       ``(C) with respect to acquisitions authorized under
     subsection (a), shall review the number of targets that were
     later determined to be located in the United States and, to
     the extent possible, whether communications of such targets
     were reviewed; and
       ``(D) shall provide each such review to--
       ``(i) the Attorney General;
       ``(ii) the Director of National Intelligence; and
       ``(iii) consistent with the Rules of the House of
     Representatives, the Standing Rules of the Senate, and Senate
     Resolution 400 of the 94th Congress or any successor Senate
     resolution--

       ``(I) the congressional intelligence committees; and
       ``(II) the Committees on the Judiciary of the House of
     Representatives and the Senate.

       ``(3) Annual review.--
       ``(A) Requirement to conduct.--The head of each element of
     the intelligence community conducting an acquisition
     authorized under subsection (a) shall conduct an annual
     review to determine whether there is reason to believe that
     foreign intelligence information has been or will be obtained
     from the acquisition. The annual review shall provide, with
     respect to acquisitions authorized under subsection (a)--
       ``(i) an accounting of the number of disseminated
     intelligence reports containing a reference to a United
     States-person identity;
       ``(ii) an accounting of the number of United States-person
     identities subsequently disseminated by that element in
     response to requests for identities that were not referred to
     by name or title in the original reporting;
       ``(iii) the number of targets that were later determined to
     be located in the United States and, to the extent possible,
     whether communications of such targets were reviewed; and
       ``(iv) a description of any procedures developed by the
     head of such element of the intelligence community and
     approved by the Director of National Intelligence to assess,
     in a manner consistent with national security, operational
     requirements and the privacy interests of United States
     persons, the extent to which the acquisitions authorized
     under subsection (a) acquire the communications of United
     States persons, and the results of any such assessment.
       ``(B) Use of review.--The head of each element of the
     intelligence community that conducts an annual review under
     subparagraph (A) shall use each such review to evaluate the
     adequacy of the minimization procedures utilized by such
     element and, as appropriate, the application of the
     minimization procedures to a particular acquisition
     authorized under subsection (a).
       ``(C) Provision of review.--The head of each element of the
     intelligence community that conducts an annual review under
     subparagraph (A) shall provide such review to--
       ``(i) the Foreign Intelligence Surveillance Court;
       ``(ii) the Attorney General;
       ``(iii) the Director of National Intelligence; and
       ``(iv) consistent with the Rules of the House of
     Representatives, the Standing Rules of the Senate, and Senate
     Resolution 400 of the 94th Congress or any successor Senate
     resolution--

       ``(I) the congressional intelligence committees; and
       ``(II) the Committees on the Judiciary of the House of
     Representatives and the Senate.

     ``SEC. 703. CERTAIN ACQUISITIONS INSIDE THE UNITED STATES
                   TARGETING UNITED STATES PERSONS OUTSIDE THE
                   UNITED STATES.

       ``(a) Jurisdiction of the Foreign Intelligence Surveillance
     Court.--
       ``(1) In general.--The Foreign Intelligence Surveillance
     Court shall have jurisdiction to review an application and to
     enter an order approving the targeting of a United States
     person reasonably believed to be located outside the United
     States to acquire foreign intelligence information, if the
     acquisition constitutes electronic surveillance or the
     acquisition of stored electronic communications or stored
     electronic data that requires an order under this Act, and
     such acquisition is conducted within the United States.
       ``(2) Limitation.--If a United States person targeted under
     this subsection is reasonably believed to be located in the
     United States during the effective period of an order issued
     pursuant to subsection (c), an acquisition targeting such
     United States person under this section shall cease unless
     the targeted United States person is again reasonably
     believed to be located outside the United States while an
     order issued pursuant to subsection (c) is in effect. Nothing
     in this section shall be construed to limit the authority of
     the Government to seek an order or authorization under, or
     otherwise engage in any activity that is authorized under,
     any other title of this Act.
       ``(b) Application.--
       ``(1) In general.--Each application for an order under this
     section shall be made by a Federal officer in writing upon
     oath or affirmation to a judge having jurisdiction under
     subsection (a)(1). Each application shall require the
     approval of the Attorney General based upon the Attorney
     General's finding

[[Page H5747]]

     that it satisfies the criteria and requirements of such
     application, as set forth in this section, and shall
     include--
       ``(A) the identity of the Federal officer making the
     application;
       ``(B) the identity, if known, or a description of the
     United States person who is the target of the acquisition;
       ``(C) a statement of the facts and circumstances relied
     upon to justify the applicant's belief that the United States
     person who is the target of the acquisition is--
       ``(i) a person reasonably believed to be located outside
     the United States; and
       ``(ii) a foreign power, an agent of a foreign power, or an
     officer or employee of a foreign power;
       ``(D) a statement of proposed minimization procedures that
     meet the definition of minimization procedures under section
     101(h) or 301(4), as appropriate;
       ``(E) a description of the nature of the information sought
     and the type of communications or activities to be subjected
     to acquisition;
       ``(F) a certification made by the Attorney General or an
     official specified in section 104(a)(6) that--
       ``(i) the certifying official deems the information sought
     to be foreign intelligence information;
       ``(ii) a significant purpose of the acquisition is to
     obtain foreign intelligence information;
       ``(iii) such information cannot reasonably be obtained by
     normal investigative techniques;
       ``(iv) designates the type of foreign intelligence
     information being sought according to the categories
     described in section 101(e); and
       ``(v) includes a statement of the basis for the
     certification that--

       ``(I) the information sought is the type of foreign
     intelligence information designated; and
       ``(II) such information cannot reasonably be obtained by
     normal investigative techniques;

       ``(G) a summary statement of the means by which the
     acquisition will be conducted and whether physical entry is
     required to effect the acquisition;
       ``(H) the identity of any electronic communication service
     provider necessary to effect the acquisition, provided that
     the application is not required to identify the specific
     facilities, places, premises, or property at which the
     acquisition authorized under this section will be directed or
     conducted;
       ``(I) a statement of the facts concerning any previous
     applications that have been made to any judge of the Foreign
     Intelligence Surveillance Court involving the United States
     person specified in the application and the action taken on
     each previous application; and
       ``(J) a statement of the period of time for which the
     acquisition is required to be maintained, provided that such
     period of time shall not exceed 90 days per application.
       ``(2) Other requirements of the attorney general.--The
     Attorney General may require any other affidavit or
     certification from any other officer in connection with the
     application.
       ``(3) Other requirements of the judge.--The judge may
     require the applicant to furnish such other information as
     may be necessary to make the findings required by subsection
     (c)(1).
       ``(c) Order.--
       ``(1) Findings.--Upon an application made pursuant to
     subsection (b), the Foreign Intelligence Surveillance Court
     shall enter an ex parte order as requested or as modified by
     the Court approving the acquisition if the Court finds that--
       ``(A) the application has been made by a Federal officer
     and approved by the Attorney General;
       ``(B) on the basis of the facts submitted by the applicant,
     for the United States person who is the target of the
     acquisition, there is probable cause to believe that the
     target is--
       ``(i) a person reasonably believed to be located outside
     the United States; and
       ``(ii) a foreign power, an agent of a foreign power, or an
     officer or employee of a foreign power;
       ``(C) the proposed minimization procedures meet the
     definition of minimization procedures under section 101(h) or
     301(4), as appropriate; and
       ``(D) the application that has been filed contains all
     statements and certifications required by subsection (b) and
     the certification or certifications are not clearly erroneous
     on the basis of the statement made under subsection
     (b)(1)(F)(v) and any other information furnished under
     subsection (b)(3).
       ``(2) Probable cause.--In determining whether or not
     probable cause exists for purposes of paragraph (1)(B), a
     judge having jurisdiction under subsection (a)(1) may
     consider past activities of the target and facts and
     circumstances relating to current or future activities of the
     target. No United States person may be considered a foreign
     power, agent of a foreign power, or officer or employee of a
     foreign power solely upon the basis of activities protected
     by the first amendment to the Constitution of the United
     States.
       ``(3) Review.--
       ``(A) Limitation on review.--Review by a judge having
     jurisdiction under subsection (a)(1) shall be limited to that
     required to make the findings described in paragraph (1).
       ``(B) Review of probable cause.--If the judge determines
     that the facts submitted under subsection (b) are
     insufficient to establish probable cause under paragraph
     (1)(B), the judge shall enter an order so stating and provide
     a written statement for the record of the reasons for the
     determination. The Government may appeal an order under this
     subparagraph pursuant to subsection (f).
       ``(C) Review of minimization procedures.--If the judge
     determines that the proposed minimization procedures referred
     to in paragraph (1)(C) do not meet the definition of
     minimization procedures under section 101(h) or 301(4), as
     appropriate, the judge shall enter an order so stating and
     provide a written statement for the record of the reasons for
     the determination. The Government may appeal an order under
     this subparagraph pursuant to subsection (f).
       ``(D) Review of certification.--If the judge determines
     that an application pursuant to subsection (b) does not
     contain all of the required elements, or that the
     certification or certifications are clearly erroneous on the
     basis of the statement made under subsection (b)(1)(F)(v) and
     any other information furnished under subsection (b)(3), the
     judge shall enter an order so stating and provide a written
     statement for the record of the reasons for the
     determination. The Government may appeal an order under this
     subparagraph pursuant to subsection (f).
       ``(4) Specifications.--An order approving an acquisition
     under this subsection shall specify--
       ``(A) the identity, if known, or a description of the
     United States person who is the target of the acquisition
     identified or described in the application pursuant to
     subsection (b)(1)(B);
       ``(B) if provided in the application pursuant to subsection
     (b)(1)(H), the nature and location of each of the facilities
     or places at which the acquisition will be directed;
       ``(C) the nature of the information sought to be acquired
     and the type of communications or activities to be subjected
     to acquisition;
       ``(D) a summary of the means by which the acquisition will
     be conducted and whether physical entry is required to effect
     the acquisition; and
       ``(E) the period of time during which the acquisition is
     approved.
       ``(5) Directives.--An order approving an acquisition under
     this subsection shall direct--
       ``(A) that the minimization procedures referred to in
     paragraph (1)(C), as approved or modified by the Court, be
     followed;
       ``(B) if applicable, an electronic communication service
     provider to provide to the Government forthwith all
     information, facilities, or assistance necessary to
     accomplish the acquisition authorized under such order in a
     manner that will protect the secrecy of the acquisition and
     produce a minimum of interference with the services that such
     electronic communication service provider is providing to the
     target of the acquisition;
       ``(C) if applicable, an electronic communication service
     provider to maintain under security procedures approved by
     the Attorney General any records concerning the acquisition
     or the aid furnished that such electronic communication
     service provider wishes to maintain; and
       ``(D) if applicable, that the Government compensate, at the
     prevailing rate, such electronic communication service
     provider for providing such information, facilities, or
     assistance.
       ``(6) Duration.--An order approved under this subsection
     shall be effective for a period not to exceed 90 days and
     such order may be renewed for additional 90-day periods upon
     submission of renewal applications meeting the requirements
     of subsection (b).
       ``(7) Compliance.--At or prior to the end of the period of
     time for which an acquisition is approved by an order or
     extension under this section, the judge may assess compliance
     with the minimization procedures referred to in paragraph
     (1)(C) by reviewing the circumstances under which information
     concerning United States persons was acquired, retained, or
     disseminated.
       ``(d) Emergency Authorization.--
       ``(1) Authority for emergency authorization.--
     Notwithstanding any other provision of this Act, if the
     Attorney General reasonably determines that--
       ``(A) an emergency situation exists with respect to the
     acquisition of foreign intelligence information for which an
     order may be obtained under subsection (c) before an order
     authorizing such acquisition can with due diligence be
     obtained, and
       ``(B) the factual basis for issuance of an order under this
     subsection to approve such acquisition exists,
     the Attorney General may authorize such acquisition if a
     judge having jurisdiction under subsection (a)(1) is informed
     by the Attorney General, or a designee of the Attorney
     General, at the time of such authorization that the decision
     has been made to conduct such acquisition and if an
     application in accordance with this section is made to a
     judge of the Foreign Intelligence Surveillance Court as soon
     as practicable, but not more than 7 days after the Attorney
     General authorizes such acquisition.
       ``(2) Minimization procedures.--If the Attorney General
     authorizes an acquisition under paragraph (1), the Attorney
     General shall require that the minimization procedures
     referred to in subsection (c)(1)(C) for the issuance of a
     judicial order be followed.
       ``(3) Termination of emergency authorization.--In the
     absence of a judicial order

[[Page H5748]]

     approving an acquisition under paragraph (1), such
     acquisition shall terminate when the information sought is
     obtained, when the application for the order is denied, or
     after the expiration of 7 days from the time of authorization
     by the Attorney General, whichever is earliest.
       ``(4) Use of information.--If an application for approval
     submitted pursuant to paragraph (1) is denied, or in any
     other case where the acquisition is terminated and no order
     is issued approving the acquisition, no information obtained
     or evidence derived from such acquisition, except under
     circumstances in which the target of the acquisition is
     determined not to be a United States person, shall be
     received in evidence or otherwise disclosed in any trial,
     hearing, or other proceeding in or before any court, grand
     jury, department, office, agency, regulatory body,
     legislative committee, or other authority of the United
     States, a State, or political subdivision thereof, and no
     information concerning any United States person acquired from
     such acquisition shall subsequently be used or disclosed in
     any other manner by Federal officers or employees without the
     consent of such person, except with the approval of the
     Attorney General if the information indicates a threat of
     death or serious bodily harm to any person.
       ``(e) Release From Liability.--No cause of action shall lie
     in any court against any electronic communication service
     provider for providing any information, facilities, or
     assistance in accordance with an order or request for
     emergency assistance issued pursuant to subsection (c) or
     (d), respectively.
       ``(f) Appeal.--
       ``(1) Appeal to the foreign intelligence surveillance court
     of review.--The Government may file a petition with the
     Foreign Intelligence Surveillance Court of Review for review
     of an order issued pursuant to subsection (c). The Court of
     Review shall have jurisdiction to consider such petition and
     shall provide a written statement for the record of the
     reasons for a decision under this paragraph.
       ``(2) Certiorari to the supreme court.--The Government may
     file a petition for a writ of certiorari for review of a
     decision of the Court of Review issued under paragraph (1).
     The record for such review shall be transmitted under seal to
     the Supreme Court of the United States, which shall have
     jurisdiction to review such decision.
       ``(g) Construction.--Except as provided in this section,
     nothing in this Act shall be construed to require an
     application for a court order for an acquisition that is
     targeted in accordance with this section at a United States
     person reasonably believed to be located outside the United
     States.

     ``SEC. 704. OTHER ACQUISITIONS TARGETING UNITED STATES
                   PERSONS OUTSIDE THE UNITED STATES.

       ``(a) Jurisdiction and Scope.--
       ``(1) Jurisdiction.--The Foreign Intelligence Surveillance
     Court shall have jurisdiction to enter an order pursuant to
     subsection (c).
       ``(2) Scope.--No element of the intelligence community may
     intentionally target, for the purpose of acquiring foreign
     intelligence information, a United States person reasonably
     believed to be located outside the United States under
     circumstances in which the targeted United States person has
     a reasonable expectation of privacy and a warrant would be
     required if the acquisition were conducted inside the United
     States for law enforcement purposes, unless a judge of the
     Foreign Intelligence Surveillance Court has entered an order
     with respect to such targeted United States person or the
     Attorney General has authorized an emergency acquisition
     pursuant to subsection (c) or (d), respectively, or any other
     provision of this Act.
       ``(3) Limitations.--
       ``(A) Moving or misidentified targets.--If a United States
     person targeted under this subsection is reasonably believed
     to be located in the United States during the effective
     period of an order issued pursuant to subsection (c), an
     acquisition targeting such United States person under this
     section shall cease unless the targeted United States person
     is again reasonably believed to be located outside the United
     States during the effective period of such order.
       ``(B) Applicability.--If an acquisition for foreign
     intelligence purposes is to be conducted inside the United
     States and could be authorized under section 703, the
     acquisition may only be conducted if authorized under section
     703 or in accordance with another provision of this Act other
     than this section.
       ``(C) Construction.--Nothing in this paragraph shall be
     construed to limit the authority of the Government to seek an
     order or authorization under, or otherwise engage in any
     activity that is authorized under, any other title of this
     Act.
       ``(b) Application.--Each application for an order under
     this section shall be made by a Federal officer in writing
     upon oath or affirmation to a judge having jurisdiction under
     subsection (a)(1). Each application shall require the
     approval of the Attorney General based upon the Attorney
     General's finding that it satisfies the criteria and
     requirements of such application as set forth in this section
     and shall include--
       ``(1) the identity of the Federal officer making the
     application;
       ``(2) the identity, if known, or a description of the
     specific United States person who is the target of the
     acquisition;
       ``(3) a statement of the facts and circumstances relied
     upon to justify the applicant's belief that the United States
     person who is the target of the acquisition is--
       ``(A) a person reasonably believed to be located outside
     the United States; and
       ``(B) a foreign power, an agent of a foreign power, or an
     officer or employee of a foreign power;
       ``(4) a statement of proposed minimization procedures that
     meet the definition of minimization procedures under section
     101(h) or 301(4), as appropriate;
       ``(5) a certification made by the Attorney General, an
     official specified in section 104(a)(6), or the head of an
     element of the intelligence community that--
       ``(A) the certifying official deems the information sought
     to be foreign intelligence information; and
       ``(B) a significant purpose of the acquisition is to obtain
     foreign intelligence information;
       ``(6) a statement of the facts concerning any previous
     applications that have been made to any judge of the Foreign
     Intelligence Surveillance Court involving the United States
     person specified in the application and the action taken on
     each previous application; and
       ``(7) a statement of the period of time for which the
     acquisition is required to be maintained, provided that such
     period of time shall not exceed 90 days per application.
       ``(c) Order.--
       ``(1) Findings.--Upon an application made pursuant to
     subsection (b), the Foreign Intelligence Surveillance Court
     shall enter an ex parte order as requested or as modified by
     the Court if the Court finds that--
       ``(A) the application has been made by a Federal officer
     and approved by the Attorney General;
       ``(B) on the basis of the facts submitted by the applicant,
     for the United States person who is the target of the
     acquisition, there is probable cause to believe that the
     target is--
       ``(i) a person reasonably believed to be located outside
     the United States; and
       ``(ii) a foreign power, an agent of a foreign power, or an
     officer or employee of a foreign power;
       ``(C) the proposed minimization procedures, with respect to
     their dissemination provisions, meet the definition of
     minimization procedures under section 101(h) or 301(4), as
     appropriate; and
       ``(D) the application that has been filed contains all
     statements and certifications required by subsection (b) and
     the certification provided under subsection (b)(5) is not
     clearly erroneous on the basis of the information furnished
     under subsection (b).
       ``(2) Probable cause.--In determining whether or not
     probable cause exists for purposes of paragraph (1)(B), a
     judge having jurisdiction under subsection (a)(1) may
     consider past activities of the target and facts and
     circumstances relating to current or future activities of the
     target. No United States person may be considered a foreign
     power, agent of a foreign power, or officer or employee of a
     foreign power solely upon the basis of activities protected
     by the first amendment to the Constitution of the United
     States.
       ``(3) Review.--
       ``(A) Limitations on review.--Review by a judge having
     jurisdiction under subsection (a)(1) shall be limited to that
     required to make the findings described in paragraph (1). The
     judge shall not have jurisdiction to review the means by
     which an acquisition under this section may be conducted.
       ``(B)  Review of probable cause.--If the judge determines
     that the facts submitted under subsection (b) are
     insufficient to establish probable cause to issue an order
     under this subsection, the judge shall enter an order so
     stating and provide a written statement for the record of the
     reasons for such determination. The Government may appeal an
     order under this subparagraph pursuant to subsection (e).
       ``(C) Review of minimization procedures.--If the judge
     determines that the minimization procedures applicable to
     dissemination of information obtained through an acquisition
     under this subsection do not meet the definition of
     minimization procedures under section 101(h) or 301(4), as
     appropriate, the judge shall enter an order so stating and
     provide a written statement for the record of the reasons for
     such determination. The Government may appeal an order under
     this subparagraph pursuant to subsection (e).
       ``(D) Scope of review of certification.--If the judge
     determines that an application under subsection (b) does not
     contain all the required elements, or that the certification
     provided under subsection (b)(5) is clearly erroneous on the
     basis of the information furnished under subsection (b), the
     judge shall enter an order so stating and provide a written
     statement for the record of the reasons for such
     determination. The Government may appeal an order under this
     subparagraph pursuant to subsection (e).
       ``(4) Duration.--An order under this paragraph shall be
     effective for a period not to exceed 90 days and such order
     may be renewed for additional 90-day periods upon submission
     of renewal applications meeting the requirements of
     subsection (b).
       ``(5) Compliance.--At or prior to the end of the period of
     time for which an order or extension is granted under this
     section, the judge may assess compliance with the
     minimization procedures referred to in paragraph (1)(C) by
     reviewing the circumstances under which information
     concerning United States persons was disseminated, provided
     that the

[[Page H5749]]

     judge may not inquire into the circumstances relating to the
     conduct of the acquisition.
       ``(d) Emergency Authorization.--
       ``(1) Authority for emergency authorization.--
     Notwithstanding any other provision of this section, if the
     Attorney General reasonably determines that--
       ``(A) an emergency situation exists with respect to the
     acquisition of foreign intelligence information for which an
     order may be obtained under subsection (c) before an order
     under that subsection can, with due diligence, be obtained,
     and
       ``(B) the factual basis for the issuance of an order under
     this section exists,
     the Attorney General may authorize the emergency acquisition
     if a judge having jurisdiction under subsection (a)(1) is
     informed by the Attorney General or a designee of the
     Attorney General at the time of such authorization that the
     decision has been made to conduct such acquisition and if an
     application in accordance with this section is made to a
     judge of the Foreign Intelligence Surveillance Court as soon
     as practicable, but not more than 7 days after the Attorney
     General authorizes such acquisition.
       ``(2) Minimization procedures.--If the Attorney General
     authorizes an emergency acquisition under paragraph (1), the
     Attorney General shall require that the minimization
     procedures referred to in subsection (c)(1)(C) be followed.
       ``(3) Termination of emergency authorization.--In the
     absence of an order under subsection (c), an emergency
     acquisition under paragraph (1) shall terminate when the
     information sought is obtained, if the application for the
     order is denied, or after the expiration of 7 days from the
     time of authorization by the Attorney General, whichever is
     earliest.
       ``(4) Use of information.--If an application submitted to
     the Court pursuant to paragraph (1) is denied, or in any
     other case where the acquisition is terminated and no order
     with respect to the target of the acquisition is issued under
     subsection (c), no information obtained or evidence derived
     from such acquisition, except under circumstances in which
     the target of the acquisition is determined not to be a
     United States person, shall be received in evidence or
     otherwise disclosed in any trial, hearing, or other
     proceeding in or before any court, grand jury, department,
     office, agency, regulatory body, legislative committee, or
     other authority of the United States, a State, or political
     subdivision thereof, and no information concerning any United
     States person acquired from such acquisition shall
     subsequently be used or disclosed in any other manner by
     Federal officers or employees without the consent of such
     person, except with the approval of the Attorney General if
     the information indicates a threat of death or serious bodily
     harm to any person.
       ``(e) Appeal.--
       ``(1) Appeal to the court of review.--The Government may
     file a petition with the Foreign Intelligence Surveillance
     Court of Review for review of an order issued pursuant to
     subsection (c). The Court of Review shall have jurisdiction
     to consider such petition and shall provide a written
     statement for the record of the reasons for a decision under
     this paragraph.
       ``(2) Certiorari to the supreme court.--The Government may
     file a petition for a writ of certiorari for review of a
     decision of the Court of Review issued under paragraph (1).
     The record for such review shall be transmitted under seal to
     the Supreme Court of the United States, which shall have
     jurisdiction to review such decision.''

     ``SEC. 705. JOINT APPLICATIONS AND CONCURRENT AUTHORIZATIONS.

       ``(a) Joint Applications and Orders.--If an acquisition
     targeting a United States person under section 703 or 704 is
     proposed to be conducted both inside and outside the United
     States, a judge having jurisdiction under section 703(a)(1)
     or 704(a)(1) may issue simultaneously, upon the request of
     the Government in a joint application complying with the
     requirements of sections 703(b) and 704(b), orders under
     sections 703(c) and 704(c), as appropriate.
       ``(b) Concurrent Authorization.--If an order authorizing
     electronic surveillance or physical search has been obtained
     under section 105 or 304, the Attorney General may authorize,
     for the effective period of that order, without an order
     under section 703 or 704, the targeting of that United States
     person for the purpose of acquiring foreign intelligence
     information while such person is reasonably believed to be
     located outside the United States.

     ``SEC. 706. USE OF INFORMATION ACQUIRED UNDER TITLE VII.

       ``(a) Information Acquired Under Section 702.--Information
     acquired from an acquisition conducted under section 702
     shall be deemed to be information acquired from an electronic
     surveillance pursuant to title I for purposes of section 106,
     except for the purposes of subsection (j) of such section.
       ``(b) Information Acquired Under Section 703.--Information
     acquired from an acquisition conducted under section 703
     shall be deemed to be information acquired from an electronic
     surveillance pursuant to title I for purposes of section 106.

     ``SEC. 707. CONGRESSIONAL OVERSIGHT.

       ``(a) Semiannual Report.--Not less frequently than once
     every 6 months, the Attorney General shall fully inform, in a
     manner consistent with national security, the congressional
     intelligence committees and the Committees on the Judiciary
     of the Senate and the House of Representatives, consistent
     with the Rules of the House of Representatives, the Standing
     Rules of the Senate, and Senate Resolution 400 of the 94th
     Congress or any successor Senate resolution, concerning the
     implementation of this title.
       ``(b) Content.--Each report under subsection (a) shall
     include--
       ``(1) with respect to section 702--
       ``(A) any certifications submitted in accordance with
     section 702(g) during the reporting period;
       ``(B) with respect to each determination under section
     702(c)(2), the reasons for exercising the authority under
     such section;
       ``(C) any directives issued under section 702(h) during the
     reporting period;
       ``(D) a description of the judicial review during the
     reporting period of such certifications and targeting and
     minimization procedures adopted in accordance with
     subsections (d) and (e) of section 702 and utilized with
     respect to an acquisition under such section, including a
     copy of an order or pleading in connection with such review
     that contains a significant legal interpretation of the
     provisions of section 702;
       ``(E) any actions taken to challenge or enforce a directive
     under paragraph (4) or (5) of section 702(h);
       ``(F) any compliance reviews conducted by the Attorney
     General or the Director of National Intelligence of
     acquisitions authorized under section 702(a);
       ``(G) a description of any incidents of noncompliance--
       ``(i) with a directive issued by the Attorney General and
     the Director of National Intelligence under section 702(h),
     including incidents of noncompliance by a specified person to
     whom the Attorney General and Director of National
     Intelligence issued a directive under section 702(h); and
       ``(ii) by an element of the intelligence community with
     procedures and guidelines adopted in accordance with
     subsections (d), (e), and (f) of section 702; and
       ``(H) any procedures implementing section 702;
       ``(2) with respect to section 703--
       ``(A) the total number of applications made for orders
     under section 703(b);
       ``(B) the total number of such orders--
       ``(i) granted;
       ``(ii) modified; and
       ``(iii) denied; and
       ``(C) the total number of emergency acquisitions authorized
     by the Attorney General under section 703(d) and the total
     number of subsequent orders approving or denying such
     acquisitions; and
       ``(3) with respect to section 704--
       ``(A) the total number of applications made for orders
     under section 704(b);
       ``(B) the total number of such orders--
       ``(i) granted;
       ``(ii) modified; and
       ``(iii) denied; and
       ``(C) the total number of emergency acquisitions authorized
     by the Attorney General under section 704(d) and the total
     number of subsequent orders approving or denying such
     applications.

     ``SEC. 708. SAVINGS PROVISION.

       ``Nothing in this title shall be construed to limit the
     authority of the Government to seek an order or authorization
     under, or otherwise engage in any activity that is authorized
     under, any other title of this Act.''.
       (b) Table of Contents.--The table of contents in the first
     section of the Foreign Intelligence Surveillance Act of 1978
     (50 U.S.C. 1801 et seq.) is amended--
       (1) by striking the item relating to title VII;
       (2) by striking the item relating to section 701; and
       (3) by adding at the end the following:

 ``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
                           THE UNITED STATES

``Sec. 701. Definitions.
``Sec. 702. Procedures for targeting certain persons outside the United
              States other than United States persons.
``Sec. 703. Certain acquisitions inside the United States targeting
              United States persons outside the United States.
``Sec. 704. Other acquisitions targeting United States persons outside
              the United States.
``Sec. 705. Joint applications and concurrent authorizations.
``Sec. 706. Use of information acquired under title VII.
``Sec. 707. Congressional oversight.
``Sec. 708. Savings provision.''.

       (c) Technical and Conforming Amendments.--
       (1) Title 18, united states code.--Section
     2511(2)(a)(ii)(A) of title 18, United States Code, is amended
     by inserting ``or a court order pursuant to section 704 of
     the Foreign Intelligence Surveillance Act of 1978'' after
     ``assistance''.
       (2) Foreign intelligence surveillance act of 1978.--Section
     601(a)(1) of the Foreign Intelligence Surveillance Act of
     1978 (50 U.S.C. 1871(a)(1)) is amended--
       (A) in subparagraph (C), by striking ``and''; and
       (B) by adding at the end the following new subparagraphs:
       ``(E) acquisitions under section 703; and
       ``(F) acquisitions under section 704;''.

[[Page H5750]]

     SEC. 102. STATEMENT OF EXCLUSIVE MEANS BY WHICH ELECTRONIC
                   SURVEILLANCE AND INTERCEPTION OF CERTAIN
                   COMMUNICATIONS MAY BE CONDUCTED.

       (a) Statement of Exclusive Means.--Title I of the Foreign
     Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
     seq.) is amended by adding at the end the following new
     section:


  ``statement of exclusive means by which electronic surveillance and
        interception of certain communications may be conducted

       ``Sec. 112.  (a) Except as provided in subsection (b), the
     procedures of chapters 119, 121, and 206 of title 18, United
     States Code, and this Act shall be the exclusive means by
     which electronic surveillance and the interception of
     domestic wire, oral, or electronic communications may be
     conducted.
       ``(b) Only an express statutory authorization for
     electronic surveillance or the interception of domestic wire,
     oral, or electronic communications, other than as an
     amendment to this Act or chapters 119, 121, or 206 of title
     18, United States Code, shall constitute an additional
     exclusive means for the purpose of subsection (a).''.
       (b) Offense.--Section 109(a) of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1809(a)) is amended by
     striking ``authorized by statute'' each place it appears and
     inserting ``authorized by this Act, chapter 119, 121, or 206
     of title 18, United States Code, or any express statutory
     authorization that is an additional exclusive means for
     conducting electronic surveillance under section 112.''; and
       (c) Conforming Amendments.--
       (1) Title 18, united states code.--Section 2511(2)(a) of
     title 18, United States Code, is amended by adding at the end
     the following:
       ``(iii) If a certification under subparagraph (ii)(B) for
     assistance to obtain foreign intelligence information is
     based on statutory authority, the certification shall
     identify the specific statutory provision and shall certify
     that the statutory requirements have been met.''; and
       (2) Table of contents.--The table of contents in the first
     section of the Foreign Intelligence Surveillance Act of 1978
     (50 U.S.C. 1801 et seq.) is amended by inserting after the
     item relating to section 111, the following new item:

``Sec. 112. Statement of exclusive means by which electronic
              surveillance and interception of certain communications
              may be conducted.''.

     SEC. 103. SUBMITTAL TO CONGRESS OF CERTAIN COURT ORDERS UNDER
                   THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF
                   1978.

       (a) Inclusion of Certain Orders in Semiannual Reports of
     Attorney General.--Subsection (a)(5) of section 601 of the
     Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
     1871) is amended by striking ``(not including orders)'' and
     inserting ``, orders,''.
       (b) Reports by Attorney General on Certain Other Orders.--
     Such section 601 is further amended by adding at the end the
     following:
       ``(c) Submissions to Congress.--The Attorney General shall
     submit to the committees of Congress referred to in
     subsection (a)--
       ``(1) a copy of any decision, order, or opinion issued by
     the Foreign Intelligence Surveillance Court or the Foreign
     Intelligence Surveillance Court of Review that includes
     significant construction or interpretation of any provision
     of this Act, and any pleadings, applications, or memoranda of
     law associated with such decision, order, or opinion, not
     later than 45 days after such decision, order, or opinion is
     issued; and
       ``(2) a copy of each such decision, order, or opinion, and
     any pleadings, applications, or memoranda of law associated
     with such decision, order, or opinion, that was issued during
     the 5-year period ending on the date of the enactment of the
     FISA Amendments Act of 2008 and not previously submitted in a
     report under subsection (a).
       ``(d) Protection of National Security.--The Attorney
     General, in consultation with the Director of National
     Intelligence, may authorize redactions of materials described
     in subsection (c) that are provided to the committees of
     Congress referred to in subsection (a), if such redactions
     are necessary to protect the national security of the United
     States and are limited to sensitive sources and methods
     information or the identities of targets.''.
       (c) Definitions.--Such section 601, as amended by
     subsections (a) and (b), is further amended by adding at the
     end the following:
       ``(e) Definitions.--In this section:
       ``(1) Foreign intelligence surveillance court.--The term
     `Foreign Intelligence Surveillance Court' means the court
     established under section 103(a).
       ``(2) Foreign intelligence surveillance court of review.--
     The term `Foreign Intelligence Surveillance Court of Review'
     means the court established under section 103(b).''.

     SEC. 104. APPLICATIONS FOR COURT ORDERS.

       Section 104 of the Foreign Intelligence Surveillance Act of
     1978 (50 U.S.C. 1804) is amended--
       (1) in subsection (a)--
       (A) by striking paragraphs (2) and (11);
       (B) by redesignating paragraphs (3) through (10) as
     paragraphs (2) through (9), respectively;
       (C) in paragraph (5), as redesignated by subparagraph (B)
     of this paragraph, by striking ``detailed'';
       (D) in paragraph (6), as redesignated by subparagraph (B)
     of this paragraph, in the matter preceding subparagraph (A)--
       (i) by striking ``Affairs or'' and inserting ``Affairs,'';
     and
       (ii) by striking ``Senate--'' and inserting ``Senate, or
     the Deputy Director of the Federal Bureau of Investigation,
     if designated by the President as a certifying official--'';
       (E) in paragraph (7), as redesignated by subparagraph (B)
     of this paragraph, by striking ``statement of'' and inserting
     ``summary statement of'';
       (F) in paragraph (8), as redesignated by subparagraph (B)
     of this paragraph, by adding ``and'' at the end; and
       (G) in paragraph (9), as redesignated by subparagraph (B)
     of this paragraph, by striking ``; and'' and inserting a
     period;
       (2) by striking subsection (b);
       (3) by redesignating subsections (c) through (e) as
     subsections (b) through (d), respectively; and
       (4) in paragraph (1)(A) of subsection (d), as redesignated
     by paragraph (3) of this subsection, by striking ``or the
     Director of National Intelligence'' and inserting ``the
     Director of National Intelligence, or the Director of the
     Central Intelligence Agency''.

     SEC. 105. ISSUANCE OF AN ORDER.

       (a) In General.--Section 105 of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1805) is amended--
       (1) in subsection (a)--
       (A) by striking paragraph (1); and
       (B) by redesignating paragraphs (2) through (5) as
     paragraphs (1) through (4), respectively;
       (2) in subsection (b), by striking ``(a)(3)'' and inserting
     ``(a)(2)'';
       (3) in subsection (c)(1)--
       (A) in subparagraph (D), by adding ``and'' at the end;
       (B) in subparagraph (E), by striking ``; and'' and
     inserting a period; and
       (C) by striking subparagraph (F);
       (4) by striking subsection (d);
       (5) by redesignating subsections (e) through (i) as
     subsections (d) through (h), respectively;
       (6) by amending subsection (e), as redesignated by
     paragraph (5) of this section, to read as follows:
       ``(e)(1) Notwithstanding any other provision of this title,
     the Attorney General may authorize the emergency employment
     of electronic surveillance if the Attorney General--
       ``(A) reasonably determines that an emergency situation
     exists with respect to the employment of electronic
     surveillance to obtain foreign intelligence information
     before an order authorizing such surveillance can with due
     diligence be obtained;
       ``(B) reasonably determines that the factual basis for the
     issuance of an order under this title to approve such
     electronic surveillance exists;
       ``(C) informs, either personally or through a designee, a
     judge having jurisdiction under section 103 at the time of
     such authorization that the decision has been made to employ
     emergency electronic surveillance; and
       ``(D) makes an application in accordance with this title to
     a judge having jurisdiction under section 103 as soon as
     practicable, but not later than 7 days after the Attorney
     General authorizes such surveillance.
       ``(2) If the Attorney General authorizes the emergency
     employment of electronic surveillance under paragraph (1),
     the Attorney General shall require that the minimization
     procedures required by this title for the issuance of a
     judicial order be followed.
       ``(3) In the absence of a judicial order approving such
     electronic surveillance, the surveillance shall terminate
     when the information sought is obtained, when the application
     for the order is denied, or after the expiration of 7 days
     from the time of authorization by the Attorney General,
     whichever is earliest.
       ``(4) A denial of the application made under this
     subsection may be reviewed as provided in section 103.
       ``(5) In the event that such application for approval is
     denied, or in any other case where the electronic
     surveillance is terminated and no order is issued approving
     the surveillance, no information obtained or evidence derived
     from such surveillance shall be received in evidence or
     otherwise disclosed in any trial, hearing, or other
     proceeding in or before any court, grand jury, department,
     office, agency, regulatory body, legislative committee, or
     other authority of the United States, a State, or political
     subdivision thereof, and no information concerning any United
     States person acquired from such surveillance shall
     subsequently be used or disclosed in any other manner by
     Federal officers or employees without the consent of such
     person, except with the approval of the Attorney General if
     the information indicates a threat of death or serious bodily
     harm to any person.
       ``(6) The Attorney General shall assess compliance with the
     requirements of paragraph (5).''; and
       (7) by adding at the end the following:
       ``(i) In any case in which the Government makes an
     application to a judge under this title to conduct electronic
     surveillance involving communications and the judge grants
     such application, upon the request of the applicant, the
     judge shall also authorize the installation and use of pen
     registers and trap and trace devices, and direct the
     disclosure of the information set forth in section
     402(d)(2).''.

[[Page H5751]]

       (b) Conforming Amendment.--Section 108(a)(2)(C) of the
     Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
     1808(a)(2)(C)) is amended by striking ``105(f)'' and
     inserting ``105(e)'';

     SEC. 106. USE OF INFORMATION.

       Subsection (i) of section 106 of the Foreign Intelligence
     Surveillance Act of 1978 (8 U.S.C. 1806) is amended by
     striking ``radio communication'' and inserting
     ``communication''.

     SEC. 107. AMENDMENTS FOR PHYSICAL SEARCHES.

       (a) Applications.--Section 303 of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1823) is amended--
       (1) in subsection (a)--
       (A) by striking paragraph (2);
       (B) by redesignating paragraphs (3) through (9) as
     paragraphs (2) through (8), respectively;
       (C) in paragraph (2), as redesignated by subparagraph (B)
     of this paragraph, by striking ``detailed'';
       (D) in paragraph (3)(C), as redesignated by subparagraph
     (B) of this paragraph, by inserting ``or is about to be''
     before ``owned''; and
       (E) in paragraph (6), as redesignated by subparagraph (B)
     of this paragraph, in the matter preceding subparagraph (A)--
       (i) by striking ``Affairs or'' and inserting ``Affairs,'';
     and
       (ii) by striking ``Senate--'' and inserting ``Senate, or
     the Deputy Director of the Federal Bureau of Investigation,
     if designated by the President as a certifying official--'';
     and
       (2) in subsection (d)(1)(A), by striking ``or the Director
     of National Intelligence'' and inserting ``the Director of
     National Intelligence, or the Director of the Central
     Intelligence Agency''.
       (b) Orders.--Section 304 of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1824) is amended--
       (1) in subsection (a)--
       (A) by striking paragraph (1);
       (B) by redesignating paragraphs (2) through (5) as
     paragraphs (1) through (4), respectively; and
       (C) in paragraph (2)(B), as redesignated by subparagraph
     (B) of this paragraph, by inserting ``or is about to be''
     before ``owned''; and
       (2) by amending subsection (e) to read as follows:
       ``(e)(1) Notwithstanding any other provision of this title,
     the Attorney General may authorize the emergency employment
     of a physical search if the Attorney General--
       ``(A) reasonably determines that an emergency situation
     exists with respect to the employment of a physical search to
     obtain foreign intelligence information before an order
     authorizing such physical search can with due diligence be
     obtained;
       ``(B) reasonably determines that the factual basis for
     issuance of an order under this title to approve such
     physical search exists;
       ``(C) informs, either personally or through a designee, a
     judge of the Foreign Intelligence Surveillance Court at the
     time of such authorization that the decision has been made to
     employ an emergency physical search; and
       ``(D) makes an application in accordance with this title to
     a judge of the Foreign Intelligence Surveillance Court as
     soon as practicable, but not more than 7 days after the
     Attorney General authorizes such physical search.
       ``(2) If the Attorney General authorizes the emergency
     employment of a physical search under paragraph (1), the
     Attorney General shall require that the minimization
     procedures required by this title for the issuance of a
     judicial order be followed.
       ``(3) In the absence of a judicial order approving such
     physical search, the physical search shall terminate when the
     information sought is obtained, when the application for the
     order is denied, or after the expiration of 7 days from the
     time of authorization by the Attorney General, whichever is
     earliest.
       ``(4) A denial of the application made under this
     subsection may be reviewed as provided in section 103.
       ``(5) In the event that such application for approval is
     denied, or in any other case where the physical search is
     terminated and no order is issued approving the physical
     search, no information obtained or evidence derived from such
     physical search shall be received in evidence or otherwise
     disclosed in any trial, hearing, or other proceeding in or
     before any court, grand jury, department, office, agency,
     regulatory body, legislative committee, or other authority of
     the United States, a State, or political subdivision thereof,
     and no information concerning any United States person
     acquired from such physical search shall subsequently be used
     or disclosed in any other manner by Federal officers or
     employees without the consent of such person, except with the
     approval of the Attorney General if the information indicates
     a threat of death or serious bodily harm to any person.
       ``(6) The Attorney General shall assess compliance with the
     requirements of paragraph (5).''.
       (c) Conforming Amendments.--The Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1801 et seq.) is
     amended--
       (1) in section 304(a)(4), as redesignated by subsection (b)
     of this section, by striking ``303(a)(7)(E)'' and inserting
     ``303(a)(6)(E)''; and
       (2) in section 305(k)(2), by striking ``303(a)(7)'' and
     inserting ``303(a)(6)''.

     SEC. 108. AMENDMENTS FOR EMERGENCY PEN REGISTERS AND TRAP AND
                   TRACE DEVICES.

       Section 403 of the Foreign Intelligence Surveillance Act of
     1978 (50 U.S.C. 1843) is amended--
       (1) in subsection (a)(2), by striking ``48 hours'' and
     inserting ``7 days''; and
       (2) in subsection (c)(1)(C), by striking ``48 hours'' and
     inserting ``7 days''.

     SEC. 109. FOREIGN INTELLIGENCE SURVEILLANCE COURT.

       (a) Designation of Judges.--Subsection (a) of section 103
     of the Foreign Intelligence Surveillance Act of 1978 (50
     U.S.C. 1803) is amended by inserting ``at least'' before
     ``seven of the United States judicial circuits''.
       (b) En Banc Authority.--
       (1) In general.--Subsection (a) of section 103 of the
     Foreign Intelligence Surveillance Act of 1978, as amended by
     subsection (a) of this section, is further amended--
       (A) by inserting ``(1)'' after ``(a)''; and
       (B) by adding at the end the following new paragraph:
       ``(2)(A) The court established under this subsection may,
     on its own initiative, or upon the request of the Government
     in any proceeding or a party under section 501(f) or
     paragraph (4) or (5) of section 702(h), hold a hearing or
     rehearing, en banc, when ordered by a majority of the judges
     that constitute such court upon a determination that--
       ``(i) en banc consideration is necessary to secure or
     maintain uniformity of the court's decisions; or
       ``(ii) the proceeding involves a question of exceptional
     importance.
       ``(B) Any authority granted by this Act to a judge of the
     court established under this subsection may be exercised by
     the court en banc. When exercising such authority, the court
     en banc shall comply with any requirements of this Act on the
     exercise of such authority.
       ``(C) For purposes of this paragraph, the court en banc
     shall consist of all judges who constitute the court
     established under this subsection.''.
       (2) Conforming amendments.--The Foreign Intelligence
     Surveillance Act of 1978 is further amended--
       (A) in subsection (a) of section 103, as amended by this
     subsection, by inserting ``(except when sitting en banc under
     paragraph (2))'' after ``no judge designated under this
     subsection''; and
       (B) in section 302(c) (50 U.S.C. 1822(c)), by inserting
     ``(except when sitting en banc)'' after ``except that no
     judge''.
       (c) Stay or Modification During an Appeal.--Section 103 of
     the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
     1803) is amended--
       (1) by redesignating subsection (f) as subsection (g); and
       (2) by inserting after subsection (e) the following new
     subsection:
       ``(f)(1) A judge of the court established under subsection
     (a), the court established under subsection (b) or a judge of
     that court, or the Supreme Court of the United States or a
     justice of that court, may, in accordance with the rules of
     their respective courts, enter a stay of an order or an order
     modifying an order of the court established under subsection
     (a) or the court established under subsection (b) entered
     under any title of this Act, while the court established
     under subsection (a) conducts a rehearing, while an appeal is
     pending to the court established under subsection (b), or
     while a petition of certiorari is pending in the Supreme
     Court of the United States, or during the pendency of any
     review by that court.
       ``(2) The authority described in paragraph (1) shall apply
     to an order entered under any provision of this Act.''.
       (d) Authority of Foreign Intelligence Surveillance Court.--
     Section 103 of the Foreign Intelligence Surveillance Act of
     1978 (50 U.S.C. 1803), as amended by this Act, is amended by
     adding at the end the following:
       ``(i) Nothing in this Act shall be construed to reduce or
     contravene the inherent authority of the court established
     under subsection (a) to determine or enforce compliance with
     an order or a rule of such court or with a procedure approved
     by such court.''.

     SEC. 110. WEAPONS OF MASS DESTRUCTION.

       (a) Definitions.--
       (1) Foreign power.--Subsection (a) of section 101 of the
     Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
     1801(a)) is amended--
       (A) in paragraph (5), by striking ``persons; or'' and
     inserting ``persons;'';
       (B) in paragraph (6) by striking the period and inserting
     ``; or''; and
       (C) by adding at the end the following new paragraph:
       ``(7) an entity not substantially composed of United States
     persons that is engaged in the international proliferation of
     weapons of mass destruction.''.
       (2) Agent of a foreign power.--Subsection (b)(1) of such
     section 101 is amended--
       (A) in subparagraph (B), by striking ``or'' at the end;
       (B) in subparagraph (C), by striking ``or'' at the end; and
       (C) by adding at the end the following new subparagraphs:
       ``(D) engages in the international proliferation of weapons
     of mass destruction, or activities in preparation therefor;
     or
       ``(E) engages in the international proliferation of weapons
     of mass destruction, or activities in preparation therefor
     for or on behalf of a foreign power; or''.
       (3) Foreign intelligence information.--Subsection (e)(1)(B)
     of such section 101 is

[[Page H5752]]

     amended by striking ``sabotage or international terrorism''
     and inserting ``sabotage, international terrorism, or the
     international proliferation of weapons of mass destruction''.
       (4) Weapon of mass destruction.--Such section 101 is
     amended by adding at the end the following new subsection:
       ``(p) `Weapon of mass destruction' means--
       ``(1) any explosive, incendiary, or poison gas device that
     is designed, intended, or has the capability to cause a mass
     casualty incident;
       ``(2) any weapon that is designed, intended, or has the
     capability to cause death or serious bodily injury to a
     significant number of persons through the release,
     dissemination, or impact of toxic or poisonous chemicals or
     their precursors;
       ``(3) any weapon involving a biological agent, toxin, or
     vector (as such terms are defined in section 178 of title 18,
     United States Code) that is designed, intended, or has the
     capability to cause death, illness, or serious bodily injury
     to a significant number of persons; or
       ``(4) any weapon that is designed, intended, or has the
     capability to release radiation or radioactivity causing
     death, illness, or serious bodily injury to a significant
     number of persons.''.
       (b) Use of Information.--
       (1) In general.--Section 106(k)(1)(B) of the Foreign
     Intelligence Surveillance Act of 1978 (50 U.S.C.
     1806(k)(1)(B)) is amended by striking ``sabotage or
     international terrorism'' and inserting ``sabotage,
     international terrorism, or the international proliferation
     of weapons of mass destruction''.
       (2) Physical searches.--Section 305(k)(1)(B) of such Act
     (50 U.S.C. 1825(k)(1)(B)) is amended by striking ``sabotage
     or international terrorism'' and inserting ``sabotage,
     international terrorism, or the international proliferation
     of weapons of mass destruction''.
       (c) Technical and Conforming Amendments.--The Foreign
     Intelligence Surveillance Act of 1978 is further amended--
       (1) in paragraph (2) of section 105(d) (50 U.S.C. 1805(d)),
     as redesignated by section 105(a)(5) of this Act, by striking
     ``section 101(a) (5) or (6)'' and inserting ``paragraph (5),
     (6), or (7) of section 101(a)'';
       (2) in section 301(1) (50 U.S.C. 1821(1)), by inserting
     ``weapon of mass destruction,'' after ``person,''; and
       (3) in section 304(d)(2) (50 U.S.C. 1824(d)(2)), by
     striking ``section 101(a) (5) or (6)'' and inserting
     ``paragraph (5), (6), or (7) of section 101(a)''.

  TITLE II--PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS

     SEC. 201. PROCEDURES FOR IMPLEMENTING STATUTORY DEFENSES
                   UNDER THE FOREIGN INTELLIGENCE SURVEILLANCE ACT
                   OF 1978.

       The Foreign Intelligence Surveillance Act of 1978 (50
     U.S.C. 1801 et seq.), as amended by section 101, is further
     amended by adding at the end the following new title:

      ``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT

     ``SEC. 801. DEFINITIONS.

       ``In this title:
       ``(1) Assistance.--The term `assistance' means the
     provision of, or the provision of access to, information
     (including communication contents, communications records, or
     other information relating to a customer or communication),
     facilities, or another form of assistance.
       ``(2) Civil action.--The term `civil action' includes a
     covered civil action.
       ``(3) Congressional intelligence committees.--The term
     `congressional intelligence committees' means--
       ``(A) the Select Committee on Intelligence of the Senate;
     and
       ``(B) the Permanent Select Committee on Intelligence of the
     House of Representatives.
       ``(4) Contents.--The term `contents' has the meaning given
     that term in section 101(n).
       ``(5) Covered civil action.--The term `covered civil
     action' means a civil action filed in a Federal or State
     court that--
       ``(A) alleges that an electronic communication service
     provider furnished assistance to an element of the
     intelligence community; and
       ``(B) seeks monetary or other relief from the electronic
     communication service provider related to the provision of
     such assistance.
       ``(6) Electronic communication service provider.--The term
     `electronic communication service provider' means--
       ``(A) a telecommunications carrier, as that term is defined
     in section 3 of the Communications Act of 1934 (47 U.S.C.
     153);
       ``(B) a provider of electronic communication service, as
     that term is defined in section 2510 of title 18, United
     States Code;
       ``(C) a provider of a remote computing service, as that
     term is defined in section 2711 of title 18, United States
     Code;
       ``(D) any other communication service provider who has
     access to wire or electronic communications either as such
     communications are transmitted or as such communications are
     stored;
       ``(E) a parent, subsidiary, affiliate, successor, or
     assignee of an entity described in subparagraph (A), (B),
     (C), or (D); or
       ``(F) an officer, employee, or agent of an entity described
     in subparagraph (A), (B), (C), (D), or (E).
       ``(7) Intelligence community.--The term `intelligence
     community' has the meaning given the term in section 3(4) of
     the National Security Act of 1947 (50 U.S.C. 401a(4)).
       ``(8) Person.--The term `person' means--
       ``(A) an electronic communication service provider; or
       ``(B) a landlord, custodian, or other person who may be
     authorized or required to furnish assistance pursuant to--
       ``(i) an order of the court established under section
     103(a) directing such assistance;
       ``(ii) a certification in writing under section
     2511(2)(a)(ii)(B) or 2709(b) of title 18, United States Code;
     or
       ``(iii) a directive under section 102(a)(4), 105B(e), as
     added by section 2 of the Protect America Act of 2007 (Public
     Law 110-55), or 702(h).
       ``(9) State.--The term `State' means any State, political
     subdivision of a State, the Commonwealth of Puerto Rico, the
     District of Columbia, and any territory or possession of the
     United States, and includes any officer, public utility
     commission, or other body authorized to regulate an
     electronic communication service provider.

     ``SEC. 802. PROCEDURES FOR IMPLEMENTING STATUTORY DEFENSES.

       ``(a) Requirement for Certification.--Notwithstanding any
     other provision of law, a civil action may not lie or be
     maintained in a Federal or State court against any person for
     providing assistance to an element of the intelligence
     community, and shall be promptly dismissed, if the Attorney
     General certifies to the district court of the United States
     in which such action is pending that--
       ``(1) any assistance by that person was provided pursuant
     to an order of the court established under section 103(a)
     directing such assistance;
       ``(2) any assistance by that person was provided pursuant
     to a certification in writing under section 2511(2)(a)(ii)(B)
     or 2709(b) of title 18, United States Code;
       ``(3) any assistance by that person was provided pursuant
     to a directive under section 102(a)(4), 105B(e), as added by
     section 2 of the Protect America Act of 2007 (Public Law 110-
     55), or 702(h) directing such assistance;
       ``(4) in the case of a covered civil action, the assistance
     alleged to have been provided by the electronic communication
     service provider was--
       ``(A) in connection with an intelligence activity involving
     communications that was--
       ``(i) authorized by the President during the period
     beginning on September 11, 2001, and ending on January 17,
     2007; and
       ``(ii) designed to detect or prevent a terrorist attack, or
     activities in preparation for a terrorist attack, against the
     United States; and
       ``(B) the subject of a written request or directive, or a
     series of written requests or directives, from the Attorney
     General or the head of an element of the intelligence
     community (or the deputy of such person) to the electronic
     communication service provider indicating that the activity
     was--
       ``(i) authorized by the President; and
       ``(ii) determined to be lawful; or
       ``(5) the person did not provide the alleged assistance.
       ``(b) Judicial Review.--
       ``(1) Review of certifications.--A certification under
     subsection (a) shall be given effect unless the court finds
     that such certification is not supported by substantial
     evidence provided to the court pursuant to this section.
       ``(2) Supplemental materials.--In its review of a
     certification under subsection (a), the court may examine the
     court order, certification, written request, or directive
     described in subsection (a) and any relevant court order,
     certification, written request, or directive submitted
     pursuant to subsection (d).
       ``(c) Limitations on Disclosure.--If the Attorney General
     files a declaration under section 1746 of title 28, United
     States Code, that disclosure of a certification made pursuant
     to subsection (a) or the supplemental materials provided
     pursuant to subsection (b) or (d) would harm the national
     security of the United States, the court shall--
       ``(1) review such certification and the supplemental
     materials in camera and ex parte; and
       ``(2) limit any public disclosure concerning such
     certification and the supplemental materials, including any
     public order following such in camera and ex parte review, to
     a statement as to whether the case is dismissed and a
     description of the legal standards that govern the order,
     without disclosing the paragraph of subsection (a) that is
     the basis for the certification.
       ``(d) Role of the Parties.--Any plaintiff or defendant in a
     civil action may submit any relevant court order,
     certification, written request, or directive to the district
     court referred to in subsection (a) for review and shall be
     permitted to participate in the briefing or argument of any
     legal issue in a judicial proceeding conducted pursuant to
     this section, but only to the extent that such participation
     does not require the disclosure of classified information to
     such party. To the extent that classified information is
     relevant to the proceeding or would be revealed in the
     determination of an issue, the court shall review such
     information in camera and ex parte, and shall issue any part
     of the court's written order that would reveal classified
     information in camera and ex parte and maintain such part
     under seal.
       ``(e) Nondelegation.--The authority and duties of the
     Attorney General under this section shall be performed by the
     Attorney General (or Acting Attorney General) or the Deputy
     Attorney General.

[[Page H5753]]

       ``(f) Appeal.--The courts of appeals shall have
     jurisdiction of appeals from interlocutory orders of the
     district courts of the United States granting or denying a
     motion to dismiss or for summary judgment under this section.
       ``(g) Removal.--A civil action against a person for
     providing assistance to an element of the intelligence
     community that is brought in a State court shall be deemed to
     arise under the Constitution and laws of the United States
     and shall be removable under section 1441 of title 28, United
     States Code.
       ``(h) Relationship to Other Laws.--Nothing in this section
     shall be construed to limit any otherwise available immunity,
     privilege, or defense under any other provision of law.
       ``(i) Applicability.--This section shall apply to a civil
     action pending on or filed after the date of the enactment of
     the FISA Amendments Act of 2008.

     ``SEC. 803. PREEMPTION.

       ``(a) In General.--No State shall have authority to--
       ``(1) conduct an investigation into an electronic
     communication service provider's alleged assistance to an
     element of the intelligence community;
       ``(2) require through regulation or any other means the
     disclosure of information about an electronic communication
     service provider's alleged assistance to an element of the
     intelligence community;
       ``(3) impose any administrative sanction on an electronic
     communication service provider for assistance to an element
     of the intelligence community; or
       ``(4) commence or maintain a civil action or other
     proceeding to enforce a requirement that an electronic
     communication service provider disclose information
     concerning alleged assistance to an element of the
     intelligence community.
       ``(b) Suits by the United States.--The United States may
     bring suit to enforce the provisions of this section.
       ``(c) Jurisdiction.--The district courts of the United
     States shall have jurisdiction over any civil action brought
     by the United States to enforce the provisions of this
     section.
       ``(d) Application.--This section shall apply to any
     investigation, action, or proceeding that is pending on or
     commenced after the date of the enactment of the FISA
     Amendments Act of 2008.

     ``SEC. 804. REPORTING.

       ``(a) Semiannual Report.--Not less frequently than once
     every 6 months, the Attorney General shall, in a manner
     consistent with national security, the Rules of the House of
     Representatives, the Standing Rules of the Senate, and Senate
     Resolution 400 of the 94th Congress or any successor Senate
     resolution, fully inform the congressional intelligence
     committees, the Committee on the Judiciary of the Senate, and
     the Committee on the Judiciary of the House of
     Representatives concerning the implementation of this title.
       ``(b) Content.--Each report made under subsection (a) shall
     include--
       ``(1) any certifications made under section 802;
       ``(2) a description of the judicial review of the
     certifications made under section 802; and
       ``(3) any actions taken to enforce the provisions of
     section 803.''.

     SEC. 202. TECHNICAL AMENDMENTS.

       The table of contents in the first section of the Foreign
     Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
     seq.), as amended by section 101(b), is further amended by
     adding at the end the following:

      ``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT

``Sec. 801. Definitions.
``Sec. 802. Procedures for implementing statutory defenses.
``Sec. 803. Preemption.
``Sec. 804. Reporting.''.

                 TITLE III--REVIEW OF PREVIOUS ACTIONS

     SEC. 301. REVIEW OF PREVIOUS ACTIONS.

       (a) Definitions.--In this section:
       (1) Appropriate committees of congress.--The term
     ``appropriate committees of Congress'' means--
       (A) the Select Committee on Intelligence and the Committee
     on the Judiciary of the Senate; and
       (B) the Permanent Select Committee on Intelligence and the
     Committee on the Judiciary of the House of Representatives.
       (2) Foreign intelligence surveillance court.--The term
     ``Foreign Intelligence Surveillance Court'' means the court
     established under section 103(a) of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1803(a)).
       (3) President's surveillance program and program.--The
     terms ``President's Surveillance Program'' and ``Program''
     mean the intelligence activity involving communications that
     was authorized by the President during the period beginning
     on September 11, 2001, and ending on January 17, 2007,
     including the program referred to by the President in a radio
     address on December 17, 2005 (commonly known as the Terrorist
     Surveillance Program).
       (b) Reviews.--
       (1) Requirement to conduct.--The Inspectors General of the
     Department of Justice, the Office of the Director of National
     Intelligence, the National Security Agency, the Department of
     Defense, and any other element of the intelligence community
     that participated in the President's Surveillance Program,
     shall complete a comprehensive review of, with respect to the
     oversight authority and responsibility of each such Inspector
     General--
       (A) all of the facts necessary to describe the
     establishment, implementation, product, and use of the
     product of the Program;
       (B) access to legal reviews of the Program and access to
     information about the Program;
       (C) communications with, and participation of, individuals
     and entities in the private sector related to the Program;
       (D) interaction with the Foreign Intelligence Surveillance
     Court and transition to court orders related to the Program;
     and
       (E) any other matters identified by any such Inspector
     General that would enable that Inspector General to complete
     a review of the Program, with respect to such Department or
     element.
       (2) Cooperation and coordination.--
       (A) Cooperation.--Each Inspector General required to
     conduct a review under paragraph (1) shall--
       (i) work in conjunction, to the extent practicable, with
     any other Inspector General required to conduct such a
     review; and
       (ii) utilize, to the extent practicable, and not
     unnecessarily duplicate or delay, such reviews or audits that
     have been completed or are being undertaken by any such
     Inspector General or by any other office of the Executive
     Branch related to the Program.
       (B) Integration of other reviews.--The Counsel of the
     Office of Professional Responsibility of the Department of
     Justice shall provide the report of any investigation
     conducted by such Office on matters relating to the Program,
     including any investigation of the process through which
     legal reviews of the Program were conducted and the substance
     of such reviews, to the Inspector General of the Department
     of Justice, who shall integrate the factual findings and
     conclusions of such investigation into its review.
       (C) Coordination.--The Inspectors General shall designate
     one of the Inspectors General required to conduct a review
     under paragraph (1) that is appointed by the President, by
     and with the advice and consent of the Senate, to coordinate
     the conduct of the reviews and the preparation of the
     reports.
       (c) Reports.--
       (1) Preliminary reports.--Not later than 60 days after the
     date of the enactment of this Act, the Inspectors General of
     the Department of Justice, the Office of the Director of
     National Intelligence, the National Security Agency, the
     Department of Defense, and any other Inspector General
     required to conduct a review under subsection (b)(1), shall
     submit to the appropriate committees of Congress an interim
     report that describes the planned scope of such review.
       (2) Final report.--Not later than 1 year after the date of
     the enactment of this Act, the Inspectors General of the
     Department of Justice, the Office of the Director of National
     Intelligence, the National Security Agency, the Department of
     Defense, and any other Inspector General required to conduct
     a review under subsection (b)(1), shall submit to the
     appropriate committees of Congress, in a manner consistent
     with national security, a comprehensive report on such
     reviews that includes any recommendations of any such
     Inspectors General within the oversight authority and
     responsibility of any such Inspector General with respect to
     the reviews.
       (3) Form.--A report under this subsection shall be
     submitted in unclassified form, but may include a classified
     annex. The unclassified report shall not disclose the name or
     identity of any individual or entity of the private sector
     that participated in the Program or with whom there was
     communication about the Program, to the extent that
     information is classified.
       (d) Resources.--
       (1) Expedited security clearance.--The Director of National
     Intelligence shall ensure that the process for the
     investigation and adjudication of an application by an
     Inspector General or any appropriate staff of an Inspector
     General for a security clearance necessary for the conduct of
     the review under subsection (b)(1) is carried out as
     expeditiously as possible.
       (2) Additional personnel for the inspectors general.--An
     Inspector General required to conduct a review under
     subsection (b)(1) and submit a report under subsection (c) is
     authorized to hire such additional personnel as may be
     necessary to carry out such review and prepare such report in
     a prompt and timely manner. Personnel authorized to be hired
     under this paragraph--
       (A) shall perform such duties relating to such a review as
     the relevant Inspector General shall direct; and
       (B) are in addition to any other personnel authorized by
     law.
       (3) Transfer of personnel.--The Attorney General, the
     Secretary of Defense, the Director of National Intelligence,
     the Director of the National Security Agency, or the head of
     any other element of the intelligence community may transfer
     personnel to the relevant Office of the Inspector General
     required to conduct a review under subsection (b)(1) and
     submit a report under subsection (c) and, in addition to any
     other personnel authorized by law, are authorized to fill any
     vacancy caused by such a transfer. Personnel transferred
     under this paragraph shall perform such duties relating to
     such review as the relevant Inspector General shall direct.

                       TITLE IV--OTHER PROVISIONS

     SEC. 401. SEVERABILITY.

       If any provision of this Act, any amendment made by this
     Act, or the application thereof to any person or
     circumstances is

[[Page H5754]]

     held invalid, the validity of the remainder of the Act, of
     any such amendments, and of the application of such
     provisions to other persons and circumstances shall not be
     affected thereby.

     SEC. 402. EFFECTIVE DATE.

       Except as provided in section 404, the amendments made by
     this Act shall take effect on the date of the enactment of
     this Act.

     SEC. 403. REPEALS.

       (a) Repeal of Protect America Act of 2007 Provisions.--
       (1) Amendments to fisa.--
       (A) In general.--Except as provided in section 404,
     sections 105A, 105B, and 105C of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1805a, 1805b, and 1805c)
     are repealed.
       (B) Technical and conforming amendments.--
       (i) Table of contents.--The table of contents in the first
     section of the Foreign Intelligence Surveillance Act of 1978
     (50 U.S.C. 1801 et seq.) is amended by striking the items
     relating to sections 105A, 105B, and 105C.
       (ii) Conforming amendments.--Except as provided in section
     404, section 103(e) of the Foreign Intelligence Surveillance
     Act of 1978 (50 U.S.C. 1803(e)) is amended--

       (I) in paragraph (1), by striking ``105B(h) or 501(f)(1)''
     and inserting ``501(f)(1) or 702(h)(4)''; and
       (II) in paragraph (2), by striking ``105B(h) or 501(f)(1)''
     and inserting ``501(f)(1) or 702(h)(4)''.

       (2) Reporting requirements.--Except as provided in section
     404, section 4 of the Protect America Act of 2007 (Public Law
     110-55; 121 Stat. 555) is repealed.
       (3) Transition procedures.--Except as provided in section
     404, subsection (b) of section 6 of the Protect America Act
     of 2007 (Public Law 110-55; 121 Stat. 556) is repealed.
       (b) FISA Amendments Act of 2008.--
       (1) In general.--Except as provided in section 404,
     effective December 31, 2012, title VII of the Foreign
     Intelligence Surveillance Act of 1978, as amended by section
     101(a), is repealed.
       (2) Technical and conforming amendments.--Effective
     December 31, 2012--
       (A) the table of contents in the first section of such Act
     (50 U.S.C. 1801 et seq.) is amended by striking the items
     related to title VII;
       (B) except as provided in section 404, section 601(a)(1) of
     such Act (50 U.S.C. 1871(a)(1)) is amended to read as such
     section read on the day before the date of the enactment of
     this Act; and
       (C) except as provided in section 404, section
     2511(2)(a)(ii)(A) of title 18, United States Code, is amended
     by striking ``or a court order pursuant to section 704 of the
     Foreign Intelligence Surveillance Act of 1978''.

     SEC. 404. TRANSITION PROCEDURES.

       (a) Transition Procedures for Protect America Act of 2007
     Provisions.--
       (1) Continued effect of orders, authorizations,
     directives.--Except as provided in paragraph (7),
     notwithstanding any other provision of law, any order,
     authorization, or directive issued or made pursuant to
     section 105B of the Foreign Intelligence Surveillance Act of
     1978, as added by section 2 of the Protect America Act of
     2007 (Public Law 110-55; 121 Stat. 552), shall continue in
     effect until the expiration of such order, authorization, or
     directive.
       (2) Applicability of protect america act of 2007 to
     continued orders, authorizations, directives.--
     Notwithstanding any other provision of this Act, any
     amendment made by this Act, or the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1801 et seq.)--
       (A) subject to paragraph (3), section 105A of such Act, as
     added by section 2 of the Protect America Act of 2007 (Public
     Law 110-55; 121 Stat. 552), shall continue to apply to any
     acquisition conducted pursuant to an order, authorization, or
     directive referred to in paragraph (1); and
       (B) sections 105B and 105C of the Foreign Intelligence
     Surveillance Act of 1978, as added by sections 2 and 3,
     respectively, of the Protect America Act of 2007, shall
     continue to apply with respect to an order, authorization, or
     directive referred to in paragraph (1) until the later of--
       (i) the expiration of such order, authorization, or
     directive; or
       (ii) the date on which final judgment is entered for any
     petition or other litigation relating to such order,
     authorization, or directive.
       (3) Use of information.--Information acquired from an
     acquisition conducted pursuant to an order, authorization, or
     directive referred to in paragraph (1) shall be deemed to be
     information acquired from an electronic surveillance pursuant
     to title I of the Foreign Intelligence Surveillance Act of
     1978 (50 U.S.C. 1801 et seq.) for purposes of section 106 of
     such Act (50 U.S.C. 1806), except for purposes of subsection
     (j) of such section.
       (4) Protection from liability.--Subsection (l) of section
     105B of the Foreign Intelligence Surveillance Act of 1978, as
     added by section 2 of the Protect America Act of 2007, shall
     continue to apply with respect to any directives issued
     pursuant to such section 105B.
       (5) Jurisdiction of foreign intelligence surveillance
     court.--Notwithstanding any other provision of this Act or of
     the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
     1801 et seq.), section 103(e) of the Foreign Intelligence
     Surveillance Act (50 U.S.C. 1803(e)), as amended by section
     5(a) of the Protect America Act of 2007 (Public Law 110-55;
     121 Stat. 556), shall continue to apply with respect to a
     directive issued pursuant to section 105B of the Foreign
     Intelligence Surveillance Act of 1978, as added by section 2
     of the Protect America Act of 2007, until the later of--
       (A) the expiration of all orders, authorizations, or
     directives referred to in paragraph (1); or
       (B) the date on which final judgment is entered for any
     petition or other litigation relating to such order,
     authorization, or directive.
       (6) Reporting requirements.--
       (A) Continued applicability.--Notwithstanding any other
     provision of this Act, any amendment made by this Act, the
     Protect America Act of 2007 (Public Law 110-55), or the
     Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801
     et seq.), section 4 of the Protect America Act of 2007 shall
     continue to apply until the date that the certification
     described in subparagraph (B) is submitted.
       (B) Certification.--The certification described in this
     subparagraph is a certification--
       (i) made by the Attorney General;
       (ii) submitted as part of a semi-annual report required by
     section 4 of the Protect America Act of 2007;
       (iii) that states that there will be no further
     acquisitions carried out under section 105B of the Foreign
     Intelligence Surveillance Act of 1978, as added by section 2
     of the Protect America Act of 2007, after the date of such
     certification; and
       (iv) that states that the information required to be
     included under such section 4 relating to any acquisition
     conducted under such section 105B has been included in a
     semi-annual report required by such section 4.
       (7) Replacement of orders, authorizations, and
     directives.--
       (A) In general.--If the Attorney General and the Director
     of National Intelligence seek to replace an authorization
     issued pursuant to section 105B of the Foreign Intelligence
     Surveillance Act of 1978, as added by section 2 of the
     Protect America Act of 2007 (Public Law 110-55), with an
     authorization under section 702 of the Foreign Intelligence
     Surveillance Act of 1978 (as added by section 101(a) of this
     Act), the Attorney General and the Director of National
     Intelligence shall, to the extent practicable, submit to the
     Foreign Intelligence Surveillance Court (as such term is
     defined in section 701(b)(2) of such Act (as so added)) a
     certification prepared in accordance with subsection (g) of
     such section 702 and the procedures adopted in accordance
     with subsections (d) and (e) of such section 702 at least 30
     days before the expiration of such authorization.
       (B) Continuation of existing orders.--If the Attorney
     General and the Director of National Intelligence seek to
     replace an authorization made pursuant to section 105B of the
     Foreign Intelligence Surveillance Act of 1978, as added by
     section 2 of the Protect America Act of 2007 (Public Law 110-
     55; 121 Stat. 522), by filing a certification in accordance
     with subparagraph (A), that authorization, and any directives
     issued thereunder and any order related thereto, shall remain
     in effect, notwithstanding the expiration provided for in
     subsection (a) of such section 105B, until the Foreign
     Intelligence Surveillance Court (as such term is defined in
     section 701(b)(2) of the Foreign Intelligence Surveillance
     Act of 1978 (as so added)) issues an order with respect to
     that certification under section 702(i)(3) of such Act (as so
     added) at which time the provisions of that section and of
     section 702(i)(4) of such Act (as so added) shall apply.
       (8) Effective date.--Paragraphs (1) through (7) shall take
     effect as if enacted on August 5, 2007.
       (b) Transition Procedures for FISA Amendments Act of 2008
     Provisions.--
       (1) Orders in effect on december 31, 2012.--Notwithstanding
     any other provision of this Act, any amendment made by this
     Act, or the Foreign Intelligence Surveillance Act of 1978 (50
     U.S.C. 1801 et seq.), any order, authorization, or directive
     issued or made under title VII of the Foreign Intelligence
     Surveillance Act of 1978, as amended by section 101(a), shall
     continue in effect until the date of the expiration of such
     order, authorization, or directive.
       (2) Applicability of title vii of fisa to continued orders,
     authorizations, directives.--Notwithstanding any other
     provision of this Act, any amendment made by this Act, or the
     Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801
     et seq.), with respect to any order, authorization, or
     directive referred to in paragraph (1), title VII of such
     Act, as amended by section 101(a), shall continue to apply
     until the later of--
       (A) the expiration of such order, authorization, or
     directive; or
       (B) the date on which final judgment is entered for any
     petition or other litigation relating to such order,
     authorization, or directive.
       (3) Challenge of directives; protection from liability; use
     of information.--Notwithstanding any other provision of this
     Act or of the Foreign Intelligence Surveillance Act of 1978
     (50 U.S.C. 1801 et seq.)--
       (A) section 103(e) of such Act, as amended by section
     403(a)(1)(B)(ii), shall continue to apply with respect to any
     directive issued pursuant to section 702(h) of such Act, as
     added by section 101(a);
       (B) section 702(h)(3) of such Act (as so added) shall
     continue to apply with respect to any directive issued
     pursuant to section 702(h) of such Act (as so added);

[[Page H5755]]

       (C) section 703(e) of such Act (as so added) shall continue
     to apply with respect to an order or request for emergency
     assistance under that section;
       (D) section 706 of such Act (as so added) shall continue to
     apply to an acquisition conducted under section 702 or 703 of
     such Act (as so added); and
       (E) section 2511(2)(a)(ii)(A) of title 18, United States
     Code, as amended by section 101(c)(1), shall continue to
     apply to an order issued pursuant to section 704 of the
     Foreign Intelligence Surveillance Act of 1978, as added by
     section 101(a).
       (4) Reporting requirements.--
       (A) Continued applicability.--Notwithstanding any other
     provision of this Act or of the Foreign Intelligence
     Surveillance Act of 1978 (50 U.S.C. 1801 et seq.), section
     601(a) of such Act (50 U.S.C. 1871(a)), as amended by section
     101(c)(2), and sections 702(l) and 707 of such Act, as added
     by section 101(a), shall continue to apply until the date
     that the certification described in subparagraph (B) is
     submitted.
       (B) Certification.--The certification described in this
     subparagraph is a certification--
       (i) made by the Attorney General;
       (ii) submitted to the Select Committee on Intelligence of
     the Senate, the Permanent Select Committee on Intelligence of
     the House of Representatives, and the Committees on the
     Judiciary of the Senate and the House of Representatives;
       (iii) that states that there will be no further
     acquisitions carried out under title VII of the Foreign
     Intelligence Surveillance Act of 1978, as amended by section
     101(a), after the date of such certification; and
       (iv) that states that the information required to be
     included in a review, assessment, or report under section 601
     of such Act, as amended by section 101(c), or section 702(l)
     or 707 of such Act, as added by section 101(a), relating to
     any acquisition conducted under title VII of such Act, as
     amended by section 101(a), has been included in a review,
     assessment, or report under such section 601, 702(l), or 707.
       (5) Transition procedures concerning the targeting of
     united states persons overseas.--Any authorization in effect
     on the date of enactment of this Act under section 2.5 of
     Executive Order 12333 to intentionally target a United States
     person reasonably believed to be located outside the United
     States shall continue in effect, and shall constitute a
     sufficient basis for conducting such an acquisition targeting
     a United States person located outside the United States
     until the earlier of--
       (A) the date that authorization expires; or
       (B) the date that is 90 days after the date of the
     enactment of this Act.
  The SPEAKER pro tempore. Pursuant to House Resolution 1285, debate
shall not exceed 1 hour, with 30 minutes equally divided and controlled
by the chairman and ranking minority member of the Committee on the
Judiciary, and 30 minutes equally divided and controlled by the
chairman and ranking minority member of the Permanent Select Committee
on Intelligence.
  The gentleman from Michigan (Mr. Conyers), the gentleman from Texas
(Mr. Smith), the gentleman from Texas (Mr. Reyes), and the gentleman
from Michigan (Mr. Hoekstra) each will control 15 minutes.
  The Chair recognizes the gentleman from Michigan (Mr. Conyers).


                             General Leave

  Mr. CONYERS. Madam Speaker, I ask unanimous consent that all Members
have 5 legislative days to revise and extend their remarks and include
extraneous material on the bill under consideration.
  The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Michigan?
  There was no objection.
  Mr. CONYERS. Madam Speaker, I yield myself such time as I may
consume.
  Members of the House, several months ago on October 16, 2007, to be
exact, the House passed the Foreign Intelligence Surveillance Act
legislation, known as the RESTORE Act. In the view of this Member, the
RESTORE Act was a reasonable and balanced one giving the administration
the power it needs to combat terrorism while protecting our precious
rights and liberties.
  The legislation before us today, which I concede includes significant
improvements over the Senate legislation, goes beyond what I think was
a reasonable bottom line in the form of the RESTORE Act.
  Title I of the bill continues the House approach by providing
mechanisms to ensure that FISA's longstanding exclusivity is crystal
clear. It states only a new statute directly addressing the executive
branch's foreign intelligence surveillance authority can modify FISA.
Secondly, it provides sunshine by requiring that the government
requests to private parties for surveillance assistance must actually
cite the statutory authority under which they're issued.
  Now in earlier versions of FISA reform, the administration claimed
that prior court approval of procedures for overseas surveillance would
hurt national security. This matter is now laid to rest with the
consensus that upfront court review is indeed appropriate. The
requirement for individual warrants and probable cause determinations
for Americans overseas is an improvement over even the original FISA
legislation. There is a provision in the legislation that permits the
Attorney General and Director of National Intelligence to begin
surveillance prior to seeking court approval for the necessary
procedures in exigent circumstances. This is intended to be used
rarely, if at all, and was included upon assurances from the
administration that agrees that it shall not be used routinely.
  The measure before us further requires extensive oversight by
Congress and the independent Inspectors General to prevent abuse. It
mandates guidelines for targeting minimization and to prevent reverse
targeting and tasks the Inspector General to monitor compliance with
those protections.
  Now title II of the legislation concerning telecom liability raises
the most serious concerns in my view. In the past, I have said I would
be open to developing a set of procedures that allow both plaintiffs
and defendants to make their case. Unfortunately, this bill goes well
beyond that and changes the substantive standard for legal liability by
the telecom community, by the telecom companies and does so on a
retroactive basis, retroactive immunity. And so I appreciate that the
final bill does not send the matter to a new secret court and does
grant the court a meaningful role in the determination. Unfortunately,
these improvements do not redeem the overall provision.
  Title III of the bill will also ask the Inspector General to conduct
independent investigations into the President's warrantless wiretapping
program. This inquiry will help uncover the truth for the American
people, hopefully, about the President's activities. And then there is
a part in here about an emergency provision any U.S. citizen can be
wiretapped. And I strenuously object to that.
  Six years ago, the Administration unilaterally chose to engage in
warrantless surveillance of American citizens without court review. We
are now restoring the balance through enhanced Congressional oversight,
Inspector General investigations, and procedures to ensure that FISA
remains the exclusive means for authorizing electronic surveillance.
  This bill continues the House approach by providing mechanisms to
ensure that FISA's longstanding exclusivity is crystal clear. First, it
states that only a new statute directly addressing the executive
branch's foreign intelligence surveillance authority can modify FISA.
Secondly, it provides sunshine by requiring requests for assistance to
cite the statutory authority under which they are issued. A conforming
amendment to Title 18 Section 2511(2)(a) is meant to underscore the
need to specify the specific statutory language being relied on, and
must be read in conjunction with the entirety of Sec. 102 of the
legislation. It should not be read to imply that assistance may be
sought for electronic surveillance, as defined in the statute, which is
not specifically authorized by statute.
  In earlier versions of FISA reform, the Administration claimed that
prior court approval of procedures for overseas surveillance would hurt
national security. This matter is now laid to rest, with a consensus
that up-front court review is in fact appropriate. The requirement for
individual warrants and probable cause determinations for Americans
overseas is an improvement over even the original FISA legislation.
  There is a provision in the legislation that permits the Attorney
General and Director of National Intelligence to begin a surveillance
prior to seeking court approval for the necessary procedures in
``exigent circumstances.'' This is intended to be used rarely, if at
all. In the normal course of events the DNI will have ample time to
submit such procedures to the FISA court for its approval before
initiating a particular surveillance.
  The Congress provided this authority at the request of the DNI to
meet unforeseen and extraordinary circumstances, and the Administration
agrees that it may not be used routinely. The Administration
understands that the Congress expects its use to be very rare if it is
used at all.

[[Page H5756]]

  The oversight committees will be informed of any use of the exigent
circumstances provision and are committed to effective oversight to
insure that it is not used to avoid the requirement to secure court
approval of the procedures in advance in all but the most extreme
circumstances. The exception must not swallow the rule.
  The bill requires extensive oversight by Congress and the independent
Inspectors General to prevent abuse. It mandates guidelines for
targeting, minimization, and to prevent reverse targeting, and tasks
the Inspectors General to monitor compliance with those protections.
  ``Reverse targeting'' is specifically prohibited in Section
702(b)(2). The Intelligence Community agrees that this language
prohibits the targeting of one or more persons overseas for the purpose
of acquiring the communications of a specific is person reasonably
believed to be in the United States. Thus, Section 702(f) requires the
government to adopt guidelines to insure that this abuse does not occur
and the FISA court must review and approve these guidelines and assure
that they are consistent with the Fourth Amendment. The oversight
committees of the Congress intend to conduct rigorous oversight to
insure that these provisions are faithfully observed. In this
connection the Committee attaches particular importance to the required
annual review and the reporting in that review of the number of
disseminated reports which contain a reference to the identity of a US
person.
  There is currently ongoing multi-District litigation in which a
federal District Court is conducting a review of the telecom carriers'
activities and the lawfulness of the President's warrantless
wiretapping program. This bill does not strip jurisdiction on that
Court and provide blanket immunity, as many wanted.
  Instead, in cases where the program was actually designed to detect
or prevent a terrorist attack, the Court will assess an Attorney
General certification that can assert--among other reasons for
dismissal--that the carriers got certain requests and directives from
the Administration. The Court will look to see if the Attorney
General's certification is backed up with substantial evidence. That
means not only the underlying directives and requests, but supplemental
materials as well. And in cases where the Government claims that the
company did not provide the alleged assistance, a bald assertion is not
``substantial evidence''--the Government will have to back up its
claims to the Court's satisfaction.

  That Title II of this bill provides procedures for assessing lawsuits
relating to warrantless surveillance since 9/11 does not imply that
such surveillance was lawful or that the Congress as a whole believes
that the service providers acted lawfully in providing assistance. Nor
can the provision remove the power of the courts hearing the cases to
determine if this provision is constitutional.
  No company or private citizen asked by the executive branch to
provide assistance in securing the private information of Americans
without authority of law should read this language as implying that
Congress will act in the future to provide such a grounds for
dismissing a lawsuit. On the contrary, companies should be on notice
that the Congress is very reluctantly providing this defense as a one-
time action in an extremely unusual circumstance. It expects private
citizens and companies to provide assistance only when specifically
authorized by law.
  For over 30 years we have mandated that telecommunications carriers
not be a merely unquestioning partner to surveillance activities. This
bill provides many ways for the companies to question or challenge
directives or requests for assistance, and we expect these to be used
any time there is something unusual or novel being requested.
  Today's compromise will give the District Court direction and
procedures for handling the pending lawsuits. However, it is important
to note that the question of whether FISA's existing security
procedures at 50 U.S.C. 1806(f) preempt the state secrets privilege is
still being litigated in the courts in a case against the Government.
Nothing in this bill is intended to affect that litigation, or any
litigation against the Government or Government employees.
  Today's vote is not the end of the matter. The bill provides for a 4-
year sunset, but this doesn't mean we cannot or should not revisit
these issues in the next congressional session. We will conduct
vigorous oversight, and will be monitoring the program through the
reports and audits. We will be keeping a close eye on the development
and implementation of reverse targeting, minimization, and targeting
procedures, in order to not only make sure that they are followed, but
to inform us as we consider what improvements need to be made to this
legislation.
  On that note, I will reserve the balance of my time.
  Mr. SMITH of Texas. Madam Speaker, I yield myself such time as I may
consume.
  Madam Speaker, after nearly a year of delays and months of
negotiations, the House today will finally vote on compromise
legislation that gives our intelligence community the tools that it
needs to protect America. I join my colleague, Mr. Hoekstra, ranking
member of the Intelligence Committee, and Chairman Reyes, as an
original cosponsor of this compromise bill.
  America's enemies take on many forms, terrorist groups, foreign
governments and spies who all pose serious threat to America and its
allies. Last August, Congress passed the Protect America Act which
provided a temporary solution to the problem. The PAA expired in
February. As a result, our intelligence community could not gather two-
thirds of the foreign intelligence they needed to protect American
lives.
  From day one, we insisted that any legislation passed by Congress
must not interfere with our fundamental ability to collect foreign
intelligence. This legislation accomplishes that goal. H.R. 6304 does
not extend constitutional protections to foreign terrorists and other
foreign targets overseas. The bill does allow the intelligence
community to target a foreign person overseas without a court order if
critical intelligence would be lost or not collected in a timely
manner.
  We insisted that any legislation passed by Congress include strong
liability protections for telecommunications carriers that assisted the
government following the terrorist attacks of September 11, 2001, as
well as protections for their assistance in the future. H.R. 6304
provides these important protections.
  We insisted that Congress enact long-term FISA legislation. The bill
we have before us today will not sunset until the end of 2012. This
compromise legislation also provides strong civil liberties protections
for Americans both within the United States and abroad. And it mandates
congressional oversight and detailed reports to the House and Senate
Judiciary and Intelligence committees and requires a review by the
Inspectors General of the Department of Justice and the intelligence
agencies. This compromise is long overdue. It is supported by both the
Department of Justice and the intelligence community.
  Madam Speaker, I urge my colleagues to support this bill.

  Madam Speaker, I submit the following letter for the Record:

                                                    June 19, 2008.
     Hon. Nancy Pelosi,
     Speaker, House of Representatives,
     Washington, DC.
       Dear-Madam Speaker: This letter presents the views of the
     Administration on the Foreign Intelligence Surveillance Act
     of 1978 (``FISA'') Amendments Act of 2008 (H.R. 6304). The
     bill would modernize FISA to reflect changes in
     communications technology since the Act was first passed 30
     years ago. The amendments would provide the Intelligence
     Community with the tools it needs to collect the foreign
     intelligence necessary to secure our Nation while protecting
     the civil liberties of Americans. The bill would also provide
     the necessary legal protections for those companies sued
     because they are believed to have helped the Government
     prevent terrorist attacks in the aftermath of September 11.
     Because this bill accomplishes these two goals essential to
     any effort to modernize FISA, we strongly support passage of
     this bill and will recommend that the President sign it.
       Last August, Congress took an important step toward
     modernizing FlSA by enacting the Protect America Act of 2007.
     That Act allowed us temporarily to close intelligence gaps by
     enabling our intelligence professionals to collect, without
     having to first obtain a court order, foreign intelligence
     information from targets overseas. The Act has enabled us to
     gather significant intelligence critical to protecting our
     Nation. It has also been implemented in a responsible way,
     subject to extensive executive, congressional, and judicial
     oversight in order to protect the country in a manner
     consistent with safeguarding Americans' civil liberties.
     Since passage of the Act, the Administration has worked
     closely with Congress to address the need for long-term FISA
     modernization. This joint effort has involved compromises on
     both sides, but we believe that it has resulted in a strong
     bill that will place the Nation's foreign intelligence effort
     in this area on a firm, long-term foundation. Below, we have
     set forth our views on certain important provisions of H.R.
     6304.


             i. title i--foreign intelligence surveillance

       Title I of H.R. 6304 contains key authorities that would
     ensure that our intelligence agencies have the tools they
     need to collect vital foreign intelligence information and
     would provide significant safeguards for the civil liberties
     of Americans.

[[Page H5757]]

       Court Approval. With respect to authorizations for foreign
     intelligence surveillance directed at foreign targets outside
     the United States, the bill provides that the Foreign
     Intelligence Surveillance Court (FISC) would review
     certifications made by the Attorney General and the Director
     of NationaI Intelligence relating to these acquisitions, the
     reasonableness of the procedures used by the Intelligence
     Community to ensure the targets are overseas, and the
     minimization procedures used to protect the privacy of
     Americans. The scope of the FISC's review is carefully and
     rightly crafted to focus on aspects of the acquisition that
     may affect the privacy rights of Americans so as not to
     confer quasi-constitutional rights on foreign terrorists and
     other foreign intelligence targets outside the United States.
       We have been clear that any satisfactory bill could not
     require individual court orders to target non-United States
     persons outside the United States, nor could a bill establish
     a court-approval mechanism that would cause the Intelligence
     Community to lose valuable foreign intelligence while
     awaiting such approval. H.R. 6304 would do neither and would
     retain for the Intelligence Community the speed and agility
     that it needs to protect the Nation. The bill would establish
     a schedule for court approval of certifications and
     procedures relating to renewals of existing acquisition
     authority. A critical feature of the H.R. 6304 would allow
     existing acquisitions, which were the subject of court review
     under the Protect America Act or will be the subject of such
     review under the H.R. 6304, to continue pending court review.
     With respect to new acquisitions, absent exigent
     circumstances, Court review of new procedures and
     certifications would take place before the Government begins
     the acquisition. The exigent circumstances exception is
     critical to allowing the Intelligence Community to respond
     swiftly to changing circumstances when the Attorney General
     and the Director of National Intelligence determine that
     intelligence may be lost or not timely acquired. Such exigent
     circumstances could arise in certain situations where an
     unexpected gap has opened in our intelligence collection
     efforts. Taken together, these provisions would enable the
     Intelligence Community to keep closed the intelligence gaps
     that existed before the passage of the Protect America Act
     and ensure that it will have the opportunity to collect
     critical foreign intelligence information in the future.
       Exclusive means. H.R. 6304 contains an exclusive means
     provision that goes beyond the exclusive means provision that
     was passed as part of FISA. As we have previously stated, we
     believe that the provision will complicate the ability of
     Congress to pass, in an emergency situation, a law to
     authorize immediate collection of communications in the
     aftermath of an attack or in response to a grave threat to
     the national security. Unlike other versions of this
     provision, however, the one in this bill would not restrict
     the authority of the Government to conduct necessary
     surveillance for intelligence and law enforcement purposes in
     a way that would harm national security.
       Oversight and Protections for the Civil Liberties of
     Americans. H.R. 6304 contains numerous provisions that
     protect the civil liberties of Americans and allow for
     extensive executive, congressional, and judicial oversight of
     the use of the authorities. The bill would require the
     Attorney General and the Director of National Intelligence to
     conduct semiannual assessments of compliance with targeting
     procedures and minimization procedures and to submit those
     assessments to the FISC and to Congress. The FISC and
     Congress would also receive annual reviews relating to those
     acquisitions prepared by the heads of agencies that use the
     authorities contained in the bill. Congress would receive
     reviews from the Inspectors General of these agencies and of
     the Department of Justice regarding compliance with the
     provisions of the bill. In addition, the bill would require
     the Attorney General to submit to Congress a report at
     least semiannually concerning the implementation of the
     authorities provided by the bill and would expand the
     categories of FISA-related court documents that the
     Government must provide to the congressional intelligence
     and judiciary committees.
       Title I also includes provisions that would protect the
     civil liberties of Americans. For instance, the bill would
     require for the first time that a court order be obtained to
     conduct foreign intelligence surveillance outside the United
     States of an American abroad. Historically, Executive Branch
     procedures guided the conduct of surveillance of a U.S.
     person overseas, such as when a U.S. person acts as an agent
     of a foreign power, e.g., spying on behalf of a foreign
     government. Given the complexity of extending judicial review
     to activities outside the United States, these provisions
     were carefully crafted with Congress to ensure that such
     review can be accomplished while preserving the necessary
     flexibility for intelligence operations. Other provisions of
     the bill address concerns that some voiced about the Protect
     America Act, such as clarifying that the Government cannot
     ``reverse target'' without a court order and requiring that
     the Attorney General establish guidelines to prevent this
     from occurring. We believe that, taken together, these
     provisions will allow for ample oversight of the use of these
     new authorities and ensure that the privacy and civil
     liberties of Americans are well protected.


    ii. title ii--protections for electronic communications service
                               providers

       Title II of the bill contains, among other provisions,
     vital protections for electronic communications service
     providers who assist the Intelligence Community's efforts to
     protect the Nation from terrorism and other foreign
     intelligence threats. Title II would provide liability
     protection related to future assistance while ensuring the
     protection of sources and methods. Importantly, the bill
     would also provide the necessary legal protection for those
     companies who are sued only because they are believed to have
     helped the Government with communications intelligence
     activities in the aftermath of September 11, 2001.
       The framework contained in the bill for obtaining
     retroactive liability protection is narrowly tailored. An
     action must be dismissed if the Attorney General certifies to
     the district court in which the action is pending that
     either: (i) the electronic communications service provider
     did not provide the assistance; or (ii) the assistance was
     provided in the wake of the September 11 attack and was the
     subject of a written request or series of requests from a
     senior Government official indicating that the activity was
     authorized by the President and determined to be lawful. The
     district court would be required to review this certification
     before dismissing the action, and the provision allows for
     the participation of the parties to the lawsuit in a manner
     consistent with the protection of classified information. The
     liability protection provision does not extend to the
     Government or to Government officials and it does not
     immunize any criminal conduct.
       Providing this liability protection is critical to the
     Nation's security. As the Senate Select Committee on
     Intelligence recognized, ``the intelligence community cannot
     obtain the intelligence it needs without assistance from
     these companies.'' That committee also recognized that
     companies in the future may be less willing to assist the
     Government if they face the threat of private lawsuits each
     time they are believed to have provided assistance. Finally,
     allowing litigation over these matters risks the disclosure
     of highly classified information regarding intelligence
     sources and methods. As we have stated on many occasions, it
     is critical that any long-term FISA modernization legislation
     contain an effective liability protection provision. H.R.
     6304 contains just such a provision and for this reason, as
     well as those expressed with respect to Title I above, we
     strongly support its passage.


               III. Title III--Review of Previous Actions

       Title III would require the Inspectors General of the
     Department of Justice, the Office of the Director of National
     Intelligence, and of certain elements of the Intelligence
     Community to review certain communications surveillance
     activities, including the Terrorist Surveillance Program
     described by the President. Although improvements have been
     made over prior versions of this provision, we believe, as we
     have written before, that it is unnecessary in light of the
     Inspector General reviews previously completed, those already
     underway, and the congressional intelligence and judiciary
     committee oversight already conducted. Nevertheless, we do
     not believe that, as currently drafted, the provision would
     create unacceptable operational concerns. The bill contains
     important provisions to make clear that such reviews should
     not duplicate reviews already conducted by Inspectors
     General.


                     IV. Title IV--Other Provisions

       Title IV contains important provisions that will ensure
     that the transition between the current authorities and the
     authorities provided in this bill will not have a detrimental
     effect on intelligence operations.
       Title IV also states that the authorities in the bill
     sunset at the end of 2012. We have long favored permanent
     modernization of FISA. The Intelligence Community operates
     more effectively when the rules governing our intelligence
     professionals' ability to track our enemies are firmly
     established. Stability of law also allows the Intelligence
     Community to invest resources appropriately. Congress has
     extensively debated and considered the need to modernize FISA
     since 2006, a process that has involved numerous hearings,
     briefings, and floor debates. The process has been valuable
     and necessary, but it has also involved the discussion in
     open settings of extraordinary information dealing with
     sensitive intelligence operations. Every time we repeat this
     process it risks exposing our intelligence sources and
     methods to our adversaries. Although we would prefer that
     H.R. 6304 contain no sunset, a sunset in 2012 is
     significantly longer than others that were proposed and it is
     long enough to avoid impairing the effectiveness of
     intelligence operations.
       Thank you for the opportunity to present our views on this
     crucial bill. We reiterate our sincere appreciation to the
     Congress for working with us on H.R. 6304, a long-term FISA
     modernization bill that will strengthen the Nation's
     intelligence capabilities while respecting and protecting the
     constitutional rights of Americans. We strongly support its
     prompt passage.
           Sincerely,
     Michael B. Mukasey,
       Attorney General.
     J.M. McConnell,
       Director of National Intelligence.

  I reserve the balance of my time.

[[Page H5758]]

  Mr. REYES. Madam Speaker, I yield myself such time as I may consume.
  (Mr. REYES asked and was given permission to revise and extend his
remarks.)
  Mr. REYES. Madam Speaker, I rise today as a sponsor of H.R. 6304, the
FISA Amendments Act of 2008. This bill represents the culmination of
more than a year's work by the members and staff of the House
Intelligence Committee, together with our colleagues on the Judiciary
Committee, to bring to the floor a bill that modernizes our
surveillance authorities while protecting the constitutional rights of
Americans.
  I want to thank Chairman Conyers for his efforts to strengthen this
bill. As always, I greatly appreciate my good friend's commitment to
protecting our country and the principles that we hold so dear. I also
want to thank the respective ranking members and all that worked so
hard to bring this bill to the floor today.
  This bill, Madam Speaker, enjoys wide support inside the Democratic
Caucus. It has been endorsed by our Democratic whip, by our Democratic
Caucus chair, by the Blue Dog Coalition, the New Democratic Caucus and
by a number of our colleagues. For that, I want to thank in particular
our majority leader, Mr. Hoyer, for leading the effort towards a
bipartisan compromise. This bill is a far better deal than the Protect
America Act. And it is far better than the Senate bill that passed
earlier this year.
  Madam Speaker, intelligence is the first line of defense in our
Nation's effort to prevent terrorism and to stop the proliferation of
weapons of mass destruction. This legislation strengthens the ability
of our intelligence agencies to conduct lawful surveillance of foreign
targets. But this legislation also serves another very important and
vital function. It strengthens the constitutional rights of Americans,
protects them from unlawful surveillance and it stops this President,
or any President, for that matter, from invoking executive power to
conduct warrantless surveillance of Americans.

                              {time}  1100

  This bill does more than just retain the original FISA requirements
for an individual warrant based upon probable cause for surveillance
targeting Americans here in the United States. For the first time ever,
this bill requires in statute warrants for Americans anywhere in the
world. It also requires the government to establish clear guidelines to
ensure that no American is the target of any surveillance without a
warrant. It clarifies that FISA and Title 18, the Criminal Code, are
the exclusive means by which the government may conduct domestic
surveillance.
  It will prohibit any unlawful, warrantless wiretapping, the kind we
saw under this administration. It provides accountability by requiring
the inspectors general of various agencies to compile a comprehensive
report on the President's surveillance program and that review must be
given to Congress. It requires prior court approval of the procedures
used to conduct surveillance of foreign targets, except in an
emergency, similar to the current FISA law.
  This legislation, Madam Speaker, also addresses the issue of lawsuits
against telecommunications companies that comply with directives from
our government. This bill does not grant immunity to any government
official who might have violated the law, and this bill does not grant
automatic immunity to telecom companies, as the Senate bill would have.
  Under this legislation, a Federal District Court will review the
evidence submitted by the Attorney General and then the court will
decide whether to grant civil liability and protection to a company
that provided post-9/11 assistance to the government. This bill does
not grant immunity. Congress isn't deciding the question of immunity;
the District Court will.
  Finally, Madam Speaker, this bill will sunset in 4\1/2\ years,
ensuring that the next administration will be in a position to assess
and review the effectiveness of this legislation.
  This legislation represents a bipartisan compromise, and, as such,
both sides got less than they wanted. But it is a product of a good
faith effort by both Republicans and Democrats to give our intelligence
agencies the tools necessary to keep America safe, while protecting our
Constitution and our civil liberties.
  I strongly urge my colleagues to vote for this very important piece
of legislation.
  In addition, Chairman Reyes submitted the following views for the
Record:


                         Exigent Circumstances

       Prior court review is an absolutely integral part of this
     bill, but we have also crafted an ``exigent circumstances''
     circumstances provision that allows the Administration to
     commence surveillance immediately in an emergency. This
     provision should be invoked rarely, if at all. In the normal
     course of events, the Attorney General and the Director of
     National Intelligence will have ample time to submit
     applications for surveillance to the FISA Court for its
     approval before initiating a particular surveillance.
       When used, this exception should be for purposes of a true
     emergency, involving unforeseen or extraordinary
     circumstances. I consider this to be limited to situations
     where the intelligence sought would serve a critical function
     in protecting national security and where the failure to act
     immediately would result in the loss of what might be the
     only opportunity to collect the information in question.
       The Intelligence Committee intends to engage in regular and
     vigorous oversight of these new authorities and, in
     particular, the use of the ``exigent circumstances''
     exception to ensure that the important protections in this
     bill are not circumvented.


                         ``Reverse Targeting''

       The FISA Amendments Act of 2008 regularly uses the term
     ``targeting.'' We intend this term to mean more than simply
     the process of selecting a telephone number or an e-mail
     address to surveil. Rather, it is meant to describe the
     process of purposely acquiring communications of or
     information about a specific individual.
       It is in this context that Section 702(b)(2) prohibits what
     is generally referred to as ``reverse targeting.'' In our
     discussions with the intelligence agencies, they have agreed
     that this language prohibits the targeting of one or more
     persons overseas where the purpose is to acquire the
     communications of or information about a U.S. person or any
     specific person reasonably believed to be inside the United
     States. Accordingly, Section 702(f) requires that the
     government adopt guidelines to ensure that this does not
     occur.


           Inadvertent Collection of U.S.-Person Information

       Because of the nature of the new surveillance authorities
     granted under this bill, we were particularly concerned about
     the potential for a significant increase in the inadvertent
     collection of U.S.-person communications and information. For
     that reason, we have adopted several oversight provisions
     that require the Intelligence Community to report to Congress
     on the number of targets later determined to have been
     located inside the United States, the number of disseminated
     intelligence reports that contain U.S.-person information,
     and the number of disseminated intelligence reports that
     contain information identifying specific U.S. persons. The
     Intelligence Committee plans to conduct vigorous oversight
     of the reports.


                              Exclusivity

       The exclusivity provision of this bill is extremely
     important. This language is designed to prevent any future
     efforts to conduct surveillance that is not authorized by
     statute. The bill not only establishes that FISA and Title 18
     are the exclusive means of conducting surveillance, it
     requires that any future authorization for surveillance must
     be explicitly established in statute. The language should in
     no way be read to imply that there is an inherent power to
     conduct surveillance beyond what is expressly authorized by
     statute.
       In particular, the language in Section 102(c)(l)(ii) should
     be read to require citation to specific statutory authority
     in all certifications for assistance in conducting electronic
     surveillance issued pursuant to 18 U.S.C.
     Sec. 2511(2)(a)(ii)(B).


                                 Sunset

       This bill is set to expire on December 31, 2012. During the
     next four years, Congress will continue to assess the
     surveillance activities of the U.S. Government and assess
     whether additional changes need to enacted before the sunset
     date to correct any deficiencies or problems that arise.


                       Civil Liability Provisions

       The provisions in title II of this bill establish a
     meaningful court review to determine whether
     telecommunications companies should be protected from civil
     liability for assistance provided to the government. It is
     important to state that these provisions are not intended to
     imply in any way that the President's conduct in connection
     with the President's warrantless surveillance program was
     lawful or to excuse the conduct of any government official
     that might have violated the law.
       Further, no telecommunications company should interpret
     these provisions to imply that Congress will act in the
     future to seek the dismissal of any other lawsuits charging
     improper conduct in connection with surveillance activities.
     Rather, Congress considers the tragic events of 9/11 to be a
     unique set of circumstances that require special
     consideration. As a general matter, we expect companies and
     private citizens to respect the rule of law and to require
     the same of its government.
       With respect to the applicable legal standard, we intend
     ``substantial evidence'' to apply not only to a finding that
     assistance was provided in response to a request that

[[Page H5759]]

     meets the standard of this bill. That standard should also
     apply where the court is asked to determine that the alleged
     assistance was not provided. A simple declaration from the
     Government or the defendant that the alleged assistance did
     not occur should be deemed insufficient where there is
     sufficient evidence to the contrary.
       Similarly, when the Government alleges that a surveillance
     program was ``designed'' (as opposed to ``intended'') to
     detect and prevent terrorism, the court should examine the
     evidence to assess the scope of the program and determine,
     where appropriate, that indiscriminate surveillance that
     acquires the communications of millions of Americans is not
     truly ``designed'' to detect or prevent terrorism.
       Finally, these provisions should also not be interpreted to
     remove the power of the courts to review the
     constitutionality of the process this bill establishes.

  Mr. REYES. Madam Speaker, I reserve the balance of my time.
  Mr. HOEKSTRA. Madam Speaker, I yield 3 minutes to the gentleman from
Missouri (Mr. Blunt), the distinguished minority whip, who played such
a critical role in ensuring that this bill made it to the floor today.
  Mr. BLUNT. Madam Speaker, I thank Mr. Hoekstra for yielding me this
initial time that would have the otherwise gone to you.
  I thank you, Mr. Hoekstra, Mr. Reyes and Mr. Smith, for bringing this
important piece of legislation to the floor and for working so hard to
see that it came to the floor. I would also like to say that I again
appreciated the opportunity to work with my good friend Mr. Hoyer, as
he spent so many hours and so much time on this. From his staff, Mariah
Sixkiller; from my staff, Brian Diffel; Mr. Boehner's staff, Jen
Stewart worked hard on this; Chris Donesa from Mr. Hoekstra's staff was
indispensable in his work, as was Caroline Lynch from Mr. Smith's
staff. And I got to know frankly and work with Jeremy Bash from Mr.
Reyes' staff and Lou DeBaca from Mr. Conyers' staff, and appreciated
the real positive contributions they bring to this process every day.
  I would also like to suggest that two staffers of my colleague from
Missouri, Mr. Bond, Louis Tucker, and Jack Livingston, spent lots of
time and lots of productive work on this.
  Madam Speaker, this represents a compromise, as Mr. Reyes just said,
as Mr. Smith just said, that was forged with lots of hard work by lots
of people. It accomplishes the goals of the intelligence community.
There is no individualized court order for targeting foreign terrorists
in foreign countries. There are protections here for communications
providers that may have assisted the government. But, as Mr. Reyes just
said, those protections will be determined by a court, not by this
legislation.
  We modernized the law to adapt to changes in technology since the
1978 FISA statute. The bill would accomplish all this while adding new
protections and strengthening the individual liberties and privacy
protections of Americans.
  We also worked closely with the majority to reinforce the FISA
Court's role in procedural certifications and reviews of administration
policies, and we created some new obligations for the Attorney General
to establish guidelines.
  Madam Speaker, like yesterday's vote, this bill is an example of what
we can do when we work together. I thank all those who worked so hard
to get it to the floor today. I urge my colleagues to vote for it.
  Mr. CONYERS. Madam Speaker, is it true that I have 10 minutes
remaining?
  The SPEAKER pro tempore. The gentleman from Michigan has 10\1/2\
minutes remaining.
  Mr. CONYERS. I am going to recognize Mr. Nadler, Ms. Lofgren, Mr.
Scott, Ms. Jackson-Lee, Mr. Holt, Ms. Lee, Mr. Capuano, Mr. Kucinich
and Mr. Inslee. A couple of them will get 1\1/2\ minutes.
  The first one to be recognized is the chairman of the Crime
Subcommittee, the gentleman from Virginia (Mr. Scott), for 1\1/2\
minutes.
  Mr. SCOTT of Virginia. Madam Speaker, I oppose H.R. 6304. It allows
widespread acquisition of private conversations without meaningful
court review. The bill actually permits the government to perform mass
untargeted surveillance of any and all conversations believed to be
coming into and out of the United States without any individualized
finding and without a requirement that wrongdoing is believed to be
involved at all.
  It arguably is not limited just to terrorism. It could be any foreign
intelligence, which would include diplomacy and anything else. It is
vague on what can be done with the information after it is acquired and
who has access to it, and the only court review is a check on whether
or not the government certifies that the process has been followed. The
court does not review who, what and where the tapping will take place.
  Furthermore, the collection of all of this data can be done under
emergency provisions before the court acts, but the collection can
continue to be done even if the court later rejects the application if
the administration appeals.
  The bill also provides retroactive immunity to communications
companies who may have violated people's rights, and whether or not
those rights have been violated should be reviewed by the courts, not
decided here in Congress.
  Madam Speaker, we can protect Americans' national security and
protect civil rights by providing government access to personal
conversations with meaningful court review. This bill fails to do that,
and therefore should be defeated.
  Mr. SMITH of Texas. Madam Speaker, I yield 1 minute to the gentleman
from Virginia (Mr. Forbes), a member of the Judiciary Committee and the
Armed Services Committee.
  Mr. FORBES. Madam Speaker, today when the sun comes up on America,
there are all too many people who spend all too much time criticizing
and apologizing for this Nation, trying to verbally tear it down. But
what frightens us most is those people who spend way too much energy
and way too much time trying to do harm to innocent Americans as they
go about their day-to-day lives, carrying their children to piano
recitals, to Little League practice, just going to work. It just makes
common sense that we would want to know what they were trying to do,
because if we know, we have at least a chance to stop it.
  This is a bipartisan bill that we should have had a year ago. We
certainly should have had 4 months ago. Thank goodness we have it
today. The only unfortunate thing is those who will benefit the most
will never know it, because they never became victims because we were
able to stop those terrorist acts before they took place.
  Mr. REYES. Madam Speaker, I yield 1 minute to the distinguished
gentleman from Missouri (Mr. Skelton), the chairman of the Armed
Services Committee.
  Mr. SKELTON. Madam Speaker, today I rise in strong support of this
bill, the FISA Amendments Act of 2008. The bipartisan compromise before
us strikes the right balance between providing our intelligence
community with the tools they need to fight and find terrorists and
protecting our constitutional rights on the other hand.
  Let me thank my colleagues Sylvester Reyes and John Conyers, our
Intelligence and Judiciary Committee chairmen, for their hard work. I
am pleased that we have resolved this critical national security issue
through bipartisan negotiations between the administration and the
Congress. I want to particularly commend Steny Hoyer, our majority
leader, and our Speaker, Nancy Pelosi, for their leadership in reaching
this landmark legislation.
  The bill before us is a great improvement over the Senate bill in
that it provides for more rigorous review of electronic surveillance
activities. It gives the courts a meaningful role in determining if
telecommunication firms are entitled to civil liability protection.
  The SPEAKER pro tempore. The time of the gentleman has expired.
  Mr. REYES. I grant the gentleman an additional 30 seconds.
  Mr. SKELTON. From my perspective as chairman of the Armed Services
Committee, the bill strongly supports the intelligence needs of those
who wear the uniform. Every day, American men and women deployed in
harm's way depend on electronic surveillance capabilities to achieve
their missions. Because of this bill and the work that has been done in
this Congress, especially the Intelligence Committee and the Judiciary
Committee, I thank them, and at the end of the day the young men and
young women will be the beneficiaries of this strong legislation.

[[Page H5760]]

  Madam Speaker, I rise today in strong support of H.R. 6304, the FISA
Amendments Act of 2008.
  The bipartisan compromise before us today strikes the right balance
between providing our intelligence community with the tools they need
to find and fight terrorists, and protecting our constitutional rights.
  I want to thank my colleagues, Silvestre Reyes and John Conyers, our
Intelligence and Judiciary Committee Chairmen, for their hard work in
bringing a strong bill to the floor today.
  I am pleased that we have resolved this critical national security
issue through bipartisan negotiations between the Administration and
the Congress and I want to particularly commend Speaker Nancy Pelosi
and Steny Hoyer for their leadership in reaching this landmark
legislation.
  The bill before us today is a great improvement over the Senate bill
in that it provides for more rigorous review of electronic surveillance
activities, and gives the courts a meaningful role in determining if
telecommunications firms are entitled to civil liability protection.
  From my perspective, as the Chairman of the Armed Services Committee,
this bill strongly supports the intelligence needs of our soldiers,
sailors, airmen and marines. Every day, American men and women deployed
in harm's way depend on the electronic surveillance capabilities to
achieve their missions. This legislation ensures continued delivery of
this intelligence to our warfighters.
  Again, I want to congratulate Chairman Reyes and Chairman Conyers or
bringing this strong bill to the floor, and I urge my colleagues to
join me in supporting this vital national security measure.
  Mr. HOEKSTRA. Madam Speaker, I yield 2 minutes to the distinguished
member of the Intelligence Committee from Texas (Mr. Thornberry).
  Mr. THORNBERRY. Madam Speaker, the compromise bill before us today is
not the bill that I would have written. As a matter of fact, the
compromise Senate bill we have been trying to get a vote on since
February is not the bill I would have written either. But I do believe
that the bill before us, imperfect as it is, does do what is needed to
protect the country, and therefore I support it.
  A number of people deserve credit, including Mr. Hoekstra, Mr. Blunt
and Mrs. Wilson on our side. But I also want to commend the majority
leader, Mr. Hoyer, for the time and energy he put into this issue and
for his perseverance in pushing it to a resolution. I know a number of
Members on his side don't want to do anything. They prefer operating
under an outdated law that makes it impossible to move with the speed
and agility we need to have to protect the country in an age of
terrorism. There may be some on this side who would prefer to have a
political issue for the fall campaign.
  But I believe that every day we grow more vulnerable, and that we
must act now to give our national security professionals, including our
troops in the field, the tools and the information they need to do
their job.
  Madam Speaker, the House has taken some significant steps this week
toward ending the disturbing practice of playing politics with national
security. When this House is allowed to vote, we can come together and
accomplish things for the country. If we can just extend that now into
energy and other issues and just allow a vote on the proposals that are
before us, we can do good for the country in other areas as well.
  Mr. CONYERS. Madam Speaker, I yield 1\1/2\ minutes to the gentlewoman
from California (Ms. Zoe Lofgren), the Chair of the Immigration
Subcommittee.
  Ms. ZOE LOFGREN of California. Madam Speaker, I rise in opposition to
this bill. I appreciate that some improvements have made been made to
title I of the bill, but even these improvements are undercut by the
scheme in title II that means there will be no accountability and
perhaps no adherence to the provisions of title I.
  I cannot support the legislation's deeply flawed provisions relating
to the issue of immunity for telecommunications companies. These
provisions turn the judiciary into the administration's rubber stamp.
The review provided in this bill is an empty formality that will lead
to a preordained conclusion, dismissing all cases with no examination
on their merits.
  Under this bill, the courts are not allowed to ask whether the
conduct of the corporations who assisted was in fact legal. They may
only note that the administration says that it was legal. In other
words, the decision on the ultimate question of legality, a decision
the Constitution dedicates to the judiciary, will instead be made by
the executive branch with the judiciary acting as a rubber stamp. It
turns the process of judicial review into a joke and denigrates this
supposedly independent and coequal branch of government.

                              {time}  1115

  It's all the more aggravating because immunity already exists in the
law under 18 U.S.C., section 2511. It provides that telecommunications
companies are immune from suit if the company has been provided with a
court order or a certification by the Attorney General, in writing,
that the order has been obtained or is unnecessary.
  I cannot support this.

                     (Effective: November 25, 2002)

                UNITED STATES CODE ANNOTATED CURRENTNESS

         Title 18. Crimes and Criminal Procedure (Refs & Annos)

                     Part I. Crimes (Refs & Annos)

   Chapter 119. Wire and Electronic Communications Interception and
           Interception of Oral Communications (Refs & Annos)

     Sec. 2511. INTERCEPTION AND DISCLOSURE OF WIRE, ORAL, OR
                   ELECTRONIC COMMUNICATIONS PROHIBITED

       (1) Except as otherwise specifically provided in this
     chapter any person who--
       (a) intentionally intercepts, endeavors to intercept, or
     procures any other person to intercept or endeavor to
     intercept, any wire, oral, or electronic communication;
       (b) intentionally uses, endeavors to use, or procures any
     other person to use or endeavor to use any electronic,
     mechanical, or other device to intercept any oral
     communication when--
       (i) such device is affixed to, or otherwise transmits a
     signal through, a wire, cable, or other like connection used
     in wire communication; or
       (ii) such device transmits communications by radio, or
     interferes with the transmission of such communication; or
       (iii) such person knows, or has reason to know, that such
     device or any component thereof has been sent through the
     mail or transported in interstate or foreign commerce; or
       (iv) such use or endeavor to use (A) takes place on the
     premises of any business or other commercial establishment
     the operations of which affect interstate or foreign
     commerce; or (B) obtains or is for the purpose of obtaining
     information relating to the operations of any business or
     other commercial establishment the operations of which affect
     interstate or foreign commerce; or
       (v) such person acts in the District of Columbia, the
     Commonwealth of Puerto Rico, or any territory or possession
     of the United States;
       (c) intentionally discloses, or endeavors to disclose, to
     any other person the contents of any wire, oral, or
     electronic communication, knowing or having reason to know
     that the information was obtained through the interception of
     a wire, oral, or electronic communication in violation of
     this subsection;
       (d) intentionally uses, or endeavors to use, the contents
     of any wire, oral, or electronic communication, knowing or
     having reason to know that the information was obtained
     through the interception of a wire, oral, or electronic
     communication in violation of this subsection; or
       (e) (i) intentionally discloses, or endeavors to disclose,
     to any other person the contents of any wire, oral, or
     electronic communication, intercepted by means authorized by
     sections 2511(2)(a)(ii), 2511(2)(b)-(c), 2511(2)(e), 2516,
     and 2518 of this chapter, (ii) knowing or having reason to
     know that the information was obtained through the
     interception of such a communication in connection with a
     criminal investigation, (iii) having obtained or received the
     information in connection with a criminal investigation, and
     (iv) with intent to improperly obstruct, impede, or interfere
     with a duly authorized criminal investigation,

     shall be punished as provided in subsection (4) or shall be
     subject to suit as provided in subsection (5).
       (2)(a)(i) It shall not be unlawful under this chapter for
     an operator of a switchboard, or an officer, employee, or
     agent of a provider of wire or electronic communication
     service, whose facilities are used in the transmission of a
     wire or electronic communication, to intercept, disclose, or
     use that communication in the normal course of his employment
     while engaged in any activity which is a necessary incident
     to the rendition of his service or to the protection of the
     rights or property of the provider of that service, except
     that a provider of wire communication service to the public
     shall not utilize service observing or random monitoring
     except for mechanical or service quality control checks.
       (ii) Notwithstanding any other law, providers of wire or
     electronic communication service, their officers, employees,
     and agents, landlords, custodians, or other persons, are
     authorized to provide information, facilities, or technical
     assistance to persons authorized by law to intercept wire,
     oral, or electronic communications or to conduct electronic
     surveillance, as defined in section 101 of the Foreign
     Intelligence Surveillance Act of 1978, if such provider, its
     officers, employees, or agents, landlord, custodian, or

[[Page H5761]]

     other specified person, has been provided with--
       (A) a court order directing such assistance signed by the
     authorizing judge, or
       (B) a certification in writing by a person specified in
     section 2518(7) of this title or the Attorney General of the
     United States that no warrant or court order is required by
     law, that all statutory requirements have been met, and that
     the specified assistance is required, setting forth the
     period of time during which the provision of the
     information, facilities, or technical assistance is
     authorized and specifying the information, facilities, or
     technical assistance required. No provider of wire or
     electronic communication service, officer, employee, or
     agent thereof, or landlord, custodian, or other specified
     person shall disclose the existence of any interception or
     surveillance or the device used to accomplish the
     interception or surveillance with respect to which the
     person has been furnished a court order or certification
     under this chapter, except as may otherwise be required by
     legal process and then only after prior notification to
     the Attorney General or to the principal prosecuting
     attorney of a State or any political subdivision of a
     State, as may be appropriate. Any such disclosure, shall
     render such person liable for the civil damages provided
     for in section 2520. No cause of action shall lie in any
     court against any provider of wire or electronic
     communication service, its officers, employees, or agents,
     landlord, custodian, or other specified person for
     providing information, facilities, or assistance in
     accordance with the terms of a court order, statutory
     authorization, or certification under this chapter.
       (b) It shall not be unlawful under this chapter for an
     officer, employee, or agent of the Federal Communications
     Commission, in the normal course of his employment and in
     discharge of the monitoring responsibilities exercised by the
     Commission in the enforcement of chapter 5 of title 47 of the
     United States Code, to intercept a wire or electronic
     communication, or oral communication transmitted by radio, or
     to disclose or use the information thereby obtained.
       (c) It shall not be unlawful under this chapter for a
     person acting under color of law to intercept a wire, oral,
     or electronic communication, where such person is a party to
     the communication or one of the parties to the communication
     has given prior consent to such interception.
       (d) It shall not be unlawful under this chapter for a
     person not acting under color of law to intercept a wire,
     oral, or electronic communication where such person is a
     party to the communication or where one of the parties to the
     communication has given prior consent to such interception
     unless such communication is intercepted for the purpose of
     committing any criminal or tortious act in violation of the
     Constitution or laws of the United States or of any State.
       (e) Notwithstanding any other provision of this title or
     section 705 or 706 of the Communications Act of 1934, it
     shall not be unlawful for an officer, employee, or agent of
     the United States in the normal course of his official duty
     to conduct electronic surveillance, as defined in section 101
     of the Foreign Intelligence Surveillance Act of 1978, as
     authorized by that Act.
       (f) Nothing contained in this chapter or chapter 121 or 206
     of this title, or section 705 of the Communications Act of
     1934, shall be deemed to affect the acquisition by the United
     States Government of foreign intelligence information from
     international or foreign communications, or foreign
     intelligence activities conducted in accordance with
     otherwise applicable Federal law involving a foreign
     electronic communications system, utilizing a means other
     than electronic surveillance as defined in section 101 of the
     Foreign Intelligence Surveillance Act of 1978, and procedures
     in this chapter or chapter 121 and the Foreign Intelligence
     Surveillance Act of 1978 shall be the exclusive means by
     which electronic surveillance, as defined in section 101 of
     such Act, and the interception of domestic wire, oral, and
     electronic communications may be conducted.
       (g) It shall not be unlawful under this chapter or chapter
     121 of this title for any person--
       (i) to intercept or access an electronic communication made
     through an electronic communication system that is configured
     so that such electronic communication is readily accessible
     to the general public;
       (ii) to intercept any radio communication which is
     transmitted--
       (I) by any station for the use of the general public, or
     that relates to ships, aircraft, vehicles, or persons in
     distress;
       (II) by any governmental, law enforcement, civil defense,
     private land mobile, or public safety communications system,
     including police and fire, readily accessible to the general
     public;
       (III) by a station operating on an authorized frequency
     within the bands allocated to the amateur, citizens band, or
     general mobile radio services; or
       (IV) by any marine or aeronautical communications system;
       (iii) to engage in any conduct which--
       (I) is prohibited by section 633 of the Communications Act
     of 1934; or
       (II) is excepted from the application of section 705(a) of
     the Communications Act of 1934 by section 705(b) of that Act;
       (iv) to intercept any wire or electronic communication the
     transmission of which is causing harmful interference to any
     lawfully operating station or consumer electronic equipment,
     to the extent necessary to identify the source of such
     interference; or
       (v) for other users of the same frequency to intercept any
     radio communication made through a system that utilizes
     frequencies monitored by individuals engaged in the provision
     or the use of such system, if such communication is not
     scrambled or encrypted.
       (h) It shall not be unlawful under this chapter--
       (i) to use a pen register or a trap and trace device (as
     those terms are defined for the purposes of chapter 206
     (relating to pen registers and trap and trace devices) of
     this title); or
       (ii) for a provider of electronic communication service to
     record the fact that a wire or electronic communication was
     initiated or completed in order to protect such provider,
     another provider furnishing service toward the completion of
     the wire or electronic communication, or a user of that
     service, from fraudulent, unlawful or abusive use of such
     service.
       (i) It shall not be unlawful under this chapter for a
     person acting under color of law to intercept the wire or
     electronic communications of a computer trespasser
     transmitted to, through, or from the protected computer, if--
       (I) the owner or operator of the protected computer
     authorizes the interception of the computer trespasser's
     communications on the protected computer;
       (II) the person acting under color of law is lawfully
     engaged in an investigation;
       (III) the person acting under color of law has reasonable
     grounds to believe that the contents of the
     computer trespasser's communications will be relevant to
     the investigation; and
       (IV) such interception does not acquire communications
     other than those transmitted to or from the computer
     trespasser.
       (3)(a) Except as provided in paragraph (b) of this
     subsection, a person or entity providing an electronic
     communication service to the public shall not intentionally
     divulge the contents of any communication (other than one to
     such person or entity, or an agent thereof) while in
     transmission on that service to any person or entity other
     than an addressee or intended recipient of such communication
     or an agent of such addressee or intended recipient.
       (b) A person or entity providing electronic communication
     service to the public may divulge the contents of any such
     communication--
       (i) as otherwise authorized in section 2511(2)(a) or 2517
     of this title;
       (ii) with the lawful consent of the originator or an
     addressee or intended recipient of such communication;
       (iii) to a person employed or authorized, or whose
     facilities are used, to forward such communication to its
     destination; or
       (iv) which were inadvertently obtained by the service
     provider and which appear to pertain to the commission of a
     crime, if such divulgence is made to a law enforcement
     agency.
       (4)(a) Except as provided in paragraph (b) of this
     subsection or in subsection (5), whoever violates subsection
     (1) of this section shall be fined under this title or
     imprisoned not more than five years, or both.
       (b) Conduct otherwise an offense under this subsection that
     consists of or relates to the interception of a satellite
     transmission that is not encrypted or scrambled and that is
     transmitted--
       (i) to a broadcasting station for purposes of
     retransmission to the general public; or
       (ii) as an audio subcarrier intended for redistribution to
     facilities open to the public, but not including data
     transmissions or telephone calls,

     is not an offense under this subsection unless the conduct is
     for the purposes of direct or indirect commercial advantage
     or private financial gain.
       [(c) Redesignated (b)]
       (5)(a)(i) If the communication is--

       (A) a private satellite video communication that is not
     scrambled or encrypted and the conduct in violation of this
     chapter is the private viewing of that communication and is
     not for a tortious or illegal purpose or for purposes of
     direct or indirect commercial advantage or private commercial
     gain; or
       (B) a radio communication that is transmitted on
     frequencies allocated under subpart D of part 74 of the rules
     of the Federal Communications Commission that is not
     scrambled or encrypted and the conduct in violation of this
     chapter is not for a tortious or illegal purpose or for
     purposes of direct or indirect commercial advantage or
     private commercial gain,

     then the person who engages in such conduct shall be subject
     to suit by the Federal Government in a court of competent
     jurisdiction.
       (ii) In an action under this subsection--
       (A) if the violation of this chapter is a first offense for
     the person under paragraph (a) of subsection (4) and such
     person has not been found liable in a civil action under
     section 2520 of this title, the Federal Government shall be
     entitled to appropriate injunctive relief; and
       (B) if the violation of this chapter is a second or
     subsequent offense under paragraph (a) of subsection (4) or
     such person has been found liable in any prior civil action
     under section 2520, the person shall be subject to a
     mandatory $500 civil fine.
       (b) The court may use any means within its authority to
     enforce an injunction issued under paragraph (ii)(A), and
     shall impose a

[[Page H5762]]

     civil fine of not less than $500 for each violation of such
     an injunction.

  Mr. SMITH of Texas. Madam Speaker, I will yield 2 minutes to the
gentleman from Indiana (Mr. Pence) who is a member of the Judiciary
Committee and the Foreign Affairs Committee as well.
  (Mr. PENCE asked and was given permission to revise and extend his
remarks.)
  Mr. PENCE. Madam Speaker, I rise in support of the FISA Amendments
Act of 2008.
  America is at war. We have to do all we can to protect our Nation
from those who seek to harm this country, our communities and our
families.
  After nearly a year of delays, we finally have before us a bill that
will institute a long-term fix to our Nation's foreign intelligence
surveillance laws and provide the intelligence community with the tools
it needs to protect this country.
  I rise in particular appreciation of Republican Whip Roy Blunt,
Ranking Member Smith and Mr. Hoekstra. These Republicans stood firm and
have succeeded in negotiating a strong 4-year extension to our
surveillance laws.
  While this bill is tough on terrorists, it includes strong
protections for civil liberties and Americans that have also been put
in place by extensive measures of oversight and review in the
Department of Justice, and it protects those patriotic
telecommunications companies who assisted the Federal Government in the
wake of 9/11.
  While I endorse these reforms and safeguards, let me say, Madam
Speaker, Congress and future administrations must be vigilant to ensure
that the exigent circumstances exceptions are practiced in a way that
preserves Presidential discretion when conducting real-time foreign
intelligence. Speaking less as a Congressman and more as a father, and
as an American who was here on September 11, I am grateful to my
colleagues in both parties for bringing this important compromise to
the floor and making sure that our intelligence community, those who
work tirelessly every day to protect us, have the tools they need to
prevent the horrors of that day from ever being visited on our soil
again.
  Mr. REYES. Madam Speaker, I yield 2 minutes to the distinguished
gentlewoman from California, Ms. Jane Harman, who is the former ranking
member of the Intelligence Committee.
  (Ms. HARMAN asked and was given permission to revise and extend her
remarks.)
  Ms. HARMAN. Madam Speaker, my phones are ringing off the hook, and my
e-mail accounts are full. By the hundreds and hundreds, my constituents
are saying, ``don't cave in,'' ``don't toss due process out the
window,'' ``no compromise on our civil liberties'' and ``all
surveillance of Americans should require a warrant.'' One of the most
powerful, ``The U.S. Constitution has been `marked up.' Don't shred
it.''
  I agree, now and always. The hard part is deciding whether the FISA
compromise before us meets my constituents' requirements and my own.
  After reading every word of it, and after many, many hours working to
develop and revise portions of it, I conclude that the compromise
replaces bad law, the Protect America Act, with law that actually
improves many of the provisions of the underlying FISA law which has
served our country well for three decades.
  Let me highlight three issues.
  First, this bill makes clear that no president can ignore it ever
again. FISA is the exclusive means by which our government can conduct
surveillance. In short, no more warrantless surveillance.
  Second, it expands the circumstances for which individual warrants
are required, by including Americans outside the U.S., and it protects
Americans from so-called reverse targeting.
  Third, it requires Federal court review to determine whether
communications firms, which assisted in post-9/11 activities, get civil
liability protection. If the evidence is inadequate, courts can deny
immunity, and immunity does not cover government officials who may have
violated the law.
  I have lived with FISA up close and personal for many years. I am
angry about the way the Bush administration abused it and disrespected
Congress. My constituents are right to demand that Congress show
courage and stand up for the Constitution. Security and liberty are
reinforcing values, not a zero-sum gain. This bill, though imperfect,
protects both.
  Mr. SMITH of Texas. Madam Speaker, I yield 1 minute to the gentleman
from Ohio (Mr. Boehner) who is the distinguished Republican leader of
the House.
  Mr. BOEHNER. Let me thank my colleague from Texas for yielding.
  Let me just take a moment to congratulate both Mr. Smith, ranking
member on the Judiciary Committee, and Mr. Hoekstra, the ranking member
on the Intelligence Committee, and all of their staff, who have worked
closely with our Democrat colleagues, both in the House and Senate, to
craft a bill that will help protect the American people.
  Madam Speaker, America cannot afford to have a pre-9/11 mentality
when it comes to national security. I think that's why this bill is so
critical and why Members and staff have been working so hard to craft
it. I recognize the serious threat that we face, and it keeps our
Nation on offense when it comes to protecting the American people.
  Our intelligence officials must have the ability to monitor
terrorists suspected of plotting to kill Americans. This measure
ensures that the tools that they need will be there to help keep
America safe. They have retroactive liability protections for firms
that have aided the government and have worked with our government at
our request to help detect and prevent attacks. We should protect those
companies.
  I think it also protects the civil liberties of all Americans. This
is an important piece of legislation. It has taken an awful lot of time
to get there.
  But just like yesterday, when Members on both sides of the aisle work
together, we can come to an agreement. We can come to a compromise
that's in the best interest of our country.
  Two days in a row we have had two great examples of how we can craft
very good bills by working in a bipartisan manner. I want to
congratulate all the Members on both sides of the aisle and their
staffs who have worked so hard to bring this bill to the floor.
  Mr. CONYERS. Madam Speaker, I would like now to yield to the chairman
of the subcommittee on the Constitution and the Judiciary, the
gentleman from New York, Jerry Nadler, 1\1/2\ minutes.
  Mr. NADLER. Madam Speaker, in order to uphold the principle of the
rule of law and the supremacy of the Constitution, we must reject this
bill. This bill limits the courts hearing lawsuits alleging illegal
wiretapping, to considering only whether the telecom companies received
a ``written request or directive indicating that the activity was
authorized by the President and determined to be lawful,'' not whether
that request was actually lawful or that telecom companies knew that it
was unlawful.
  The bill is a fig leaf granting blanket immunity to the telecom
companies for possibly illegal acts without allowing the courts to
consider the facts or the law. It denies people whose rights are
violated their fair day in court, and it denies the American people the
right to have the actions of this administration subjected to fair and
independent scrutiny.
  Even the court's limited review will remain secret. The lawsuits will
be dismissed, but the basis for that dismissal that the defendants were
innocent of misconduct or that they were guilty, but that Congress
commands their immunity, must remain secret.
  The constitutionality of the immunity granted by this bill is very
questionable. As Judge Walker put it in the AT&T case, ``AT&T's alleged
actions here violate the constitutional rights clearly established in
the Keith decision. Moreover, because the very action in question has
previously been held unlawful, AT&T cannot seriously contend that a
reasonable entity in its position could have believed that the alleged
domestic dragnet was legal.''
  I would hope that the courts will find that because the
constitutional rights of Americans have been violated, Congress'
attempt to prevent court review is unconstitutional. I regret we may
today abandon the Constitution's protections and insulate lawless
behavior from legal scrutiny.
  I urge a ``no'' vote on this legislation.

[[Page H5763]]

  Mr. HOEKSTRA. Madam Speaker, at this time I would like to yield 3
minutes to a member of the committee, Mrs. Wilson from New Mexico.
  (Mrs. WILSON of New Mexico asked and was given permission to revise
and extend her remarks.)
  Mrs. WILSON of New Mexico. Madam Speaker, in December of 2005, I was
walking to work and was at 1st and C Street when the front page of the
New York Times revealed the existence of a program that had not been
previously briefed to the entire Intelligence Committee and to the
subcommittee that I, at that time, chaired that oversaw the activities
of the National Security Agency. That launched a period of extensive
oversight and draft legislation in 2006.
  In January of 2007, because legislation didn't pass, the
administration made an attempt to put this entire program under a FISA
law that was not designed and was not updated. I described that at the
time as trying to put a twin-size sheet on a king-size bed. It didn't
work.
  By late summer of 2007, we had lost close to two-thirds of our
intelligence collection on terrorism. We were unable to respond fast
enough when we had problems, particularly in war zones.
  Just before Memorial Day in 2007, we had three soldiers who were
kidnapped in Iraq. We needed an Army of lawyers in Washington D.C. to
listen to the communications of the people that we thought had
kidnapped them.
  That delay is not good enough and led to the insistence that we pass
the Protect America Act, which this Congress did, over the objections
of the Democratic leadership, in August of 2007. The Protect America
Act closed an important intelligence gap, but it expired in February of
this year, and the gap is at risk of ever widening.
  The bill that we pass today will protect the civil liberties of
Americans and continue to require individualized warrants for anyone in
the United States or American citizens anywhere in the world. It will
also allow our intelligence agencies to very rapidly follow up on tips
and listen to foreigners in foreign countries who are trying to kill
Americans.
  We have restored FISA to its original intent and modernized it for
21st century communications and technology. This is an important step
for our intelligence community and will put it on a sound footing for
the next several decades.
  Intelligence, good intelligence, is the first line of defense against
terrorism, and today this body will take the next step in making sure
we have the tools to be able to listen to our enemies and prevent other
terrorist attacks.
  I would urge my colleagues to support the legislation.
  Mr. CONYERS. Madam Speaker, I would like to yield now to a senior
member of Judiciary, Sheila Jackson-Lee of Texas, 1 minute.
  Ms. JACKSON-LEE of Texas. I thank the distinguished chairman.
  Madam Speaker, I rise to say that we did have legislation that would
protect the Constitution and provide the security for our troops and
those in the intelligence community, and that was the RESTORE Act.
Today I rise in enormous opposition to H.R. 6304 because, frankly,
Madam Speaker, it's very difficult to put lipstick on a pig.
  What we have here is the opportunity for the government to conduct
mass, untargeted surveillance of all communications coming into and out
of the United States without any individual review and without any
finding of wrongdoing.
  What Americans don't know is that this government can now surveil you
for 7 days without any approval. Then if the court denies the
application, while the application is being appealed from the denial,
you can be surveilled for 60 days.
  This is not constitutional protection. As it relates to the idea of
those who are now in court on warrantless searches, now the courts have
no authority over that, and your cases will be dismissed.
  I ask my colleagues to oppose this because ``significant purpose''
has been taken out of this legislation.
  Madam Speaker, I rise today in opposition to H.R. 6304, the ``FISA
Amendments Act of 2008''. This body has worked diligently with our
colleagues in the Senate to ensure that the civil liberties of American
citizens are appropriately addressed. Sadly, this compromise bill falls
short of that aim. I will support no bill that fails to protect
American civil liberties, both at home and abroad.
  I am unable to support this bill that will overhaul how the
Government monitors foreign terrorist suspects. I will not support any
legislation that grants legal immunity to telecommunications companies
that provide information to Federal investigators without a warrant.
  Madam Speaker, this administration has the law to protect the
American people. When Americans are involved, the Bill of Rights, the
fourth amendment, and our civil liberties must be adhered to. This
legislation does not go far enough to ensure that American rights are
protected.
  The original legislation offered by the House Majority gave the
Administration everything that it needed, but today, after months of
negotiation, if we endorse H.R. 6304, which grants sweeping wiretapping
authority to the Government with little court oversight and ensures the
dismissal of all pending cases against the telecommunications
companies, we are eviscerating the Constitution.
  Let me explain my objections to H.R. 6304. It permits the Government
to conduct mass, untargeted surveillance of all communications coming
into and out of the United States, without any individualized review,
and without any finding of wrongdoing.
  H.R. 6304 permits minimal court oversight. The Foreign Intelligence
Surveillance Court (FISA Court) only reviews general procedures for
targeting and minimizing the use of information that is collected.
Under these circumstances, the court may not know what will be tapped
and where it will occur.
  Furthermore, the bill contains a general ban on reverse targeting,
but not the strong language I worked so diligently to include in the
FISA legislation that had passed previously in the House. In my view,
the RESTORE Act is far superior to this piece of legislation. I wish to
take a few moments to discuss the improvement that I offered to the
RESTORE Act in the full Judiciary Committee markup, and which was sent
over to the Senate for consideration last year.
  My amendment made an essential contribution to the RESTORE Act by
laying down a clear, objective criterion for the administration to
follow and the FISA court to enforce in preventing reverse targeting.
  Reverse targeting is the practice where the Government targets
foreigners without a warrant while its actual purpose is to collect
information on certain U.S. persons. My language included clear
statutory directives regarding whom the government should return to the
FISA court and obtain an individualized order if it would like to
continue listening to an Americans' communications.
  One of the major concerns that libertarians and classical
conservatives, as well as progressives and civil liberties
organizations, have with this legislation, as they did with its
successor, the Protect America Act, is that the temptation of national
security agencies to engage in reverse targeting may be difficult to
resist in the absence of certain safeguards in the law to prevent it.
  My amendment attempted to produce such safeguards. My amendment
reduced even further any such temptation to resort to reverse targeting
by requiring the administration to obtain a regular, individualized
FISA warrant whenever the ``real'' target of the surveillance is a
person in the United States.
  The amendment achieved this objective by requiring the administration
to obtain a regular FISA warrant whenever a ``significant purpose of an
acquisition is to acquire the communications of a specific person
reasonably believed to be located in the United States.''
  It is far from clear how the operative language ``reasonably designed
to ensure that any acquisition authorized . . . is limited to targeting
persons reasonably believed to be located outside the United States;
and prevent the intentional acquisition of any communication as to
which the sender and all intended recipients are known at the time of
acquisition to be located in the United States.''
  Yes. It is true that H.R. 6304, the compromise legislation, attempts
to ensure that American civil liberties are protected, but the
operative language in the legislation does not provide a paradigm for
consistency. This is so because it does not provide an objective
criterion. H.R. 6304 does not go as far as the legislation that the
House sent over to the Senate a few months ago. H.R. 6304 does not
retain the objective standards contained in my amendment.
  The language used in my amendment, ``significant purpose,'' is a term
of art that long has been a staple of FISA jurisprudence and thus is
well known and readily applied by agencies, legal practitioners, and
the FISA Court. Thus, the Jackson-Lee amendment provided a clearer,
more objective criterion for the administration to follow and the FISA
court to enforce to prevent the practice of reverse targeting without a
warrant, which all of us can agree should not be permitted.

[[Page H5764]]

  A FISA order should be required in those instances where there is a
particular, known person in the United States at the other end of the
foreign target's call in whom the Government has a significant
interest such that a significant purpose of the surveillance has become
to acquire that person's communications. This protection has been
stripped from H.R. 6304. I fought hard to keep this language in the
bill because it is important to me; and it should be very important to
members of this body and to all Americans. It is important that we
require what should be required in all cases--warrant any time there is
specific, targeted surveillance of a United States citizen.

  Madam Speaker, I have more objections to H.R. 6304 which I will
quickly note. H.R. 6304 contains an ``exigent'' circumstances loophole
that thwarts the judicial review requirement. The bill permits the
Government to start a spying program and wait to go to court for up to
seven (7) days every time ``intelligence important to the national
security of the U.S. may be lost or not timely acquired.'' The problem
with H.R. 6034 is that court applications take time and will delay the
collection of information. Therefore, it is possible that there will
not be resort to prior judicial review.
  Under H.R. 6304, the Government is permitted to continue surveillance
programs even if the application is denied by the court. The Government
has the authority to wiretap through the entire appeals process, and
then keep and use whatever it gathers in the meantime.
  I am also troubled by H.R. 6304's dismissal of all cases pending
against telecommunication companies that facilitated the warrantless
wiretapping program over the last 7 years. The test in the bill is not
whether the Government certifications were actually legal--only whether
they were issued. Because it is public knowledge that they were, all
the cases seeking to find out what these companies and the Government
did without communications will be dismissed. Under this bill, we will
start as a tabula rasa. Telecommunications companies will be prevented
from having their day in court and we, the American people, will never
have a chance to know what the companies did and what information is
collected. I am deeply troubled by this, and frankly, you should be,
too.
  Madam Speaker, it is important to point out that the loudest demands
for blanket immunity did not come from the telecommunications companies
but from the administration, which raises the interesting question of
whether the administration's real motivation is to shield from public
disclosure the ways and means by which Government officials may have
``persuaded'' telecommunications companies to assist in its warrantless
surveillance programs.
  Madam Speaker, let me be clear in my opposition. Nothing in the Act
or the amendments to the Act should require the Government to obtain a
FISA order for every overseas target on the off chance that they might
pick up a call into or from the United States. Rather, what should be
required, is a FISA order only where there is a particular, known
person in the United States at the other end of the foreign target's
calls in whom the Government has a significant interest such that a
significant purpose of the surveillance has become to acquire that
person's communications.
  Nearly two centuries ago, Alexis de Tocqueville, who remains the most
astute student of American democracy, observed that the reason
democracies invariably prevail in any martial conflict is because
democracy is the governmental form that best rewards and encourages
those traits that are indispensable to martial success: initiative,
innovation, resourcefulness, and courage.
  As I wrote in the Politico, ``the best way to win the war on terror
is to remain true to our democratic traditions. If it retains its
democratic character, no nation and no loose confederation of
international villains will defeat the United States in the pursuit of
its vital interests.''
  Thus, the way forward to victory in the war on terror is for the
United States country to redouble its commitment to the Bill of Rights
and the democratic values which every American will risk his or her
life to defend. It is only by preserving our attachment to these
cherished values that America will remain forever the home of the free,
the land of the brave, and the country we love.
  Madam Speaker, FISA has served the Nation well for nearly 30 years,
placing electronic surveillance inside the United States for foreign
intelligence and counterintelligence purposes on a sound legal footing,
and I am far from persuaded that it needs to be jettisoned.
  However, I know that FISA as outlined in this bill, H.R. 6304,
attempts to curtail the Bill of Rights and the civil liberties of the
American people. I continue to insist upon individual warrants, based
upon probable cause, when surveillance is directed at people in the
United States. The Attorney General must still be required to submit
procedures for international surveillance to the Foreign Intelligence
Surveillance Court for approval, but the FISA Court should not be
allowed to issue a ``basket warrant'' without making individual
determinations about foreign surveillance.
  In all candor, Madam Speaker, I must restate my firm conviction that
when it comes to the track record of this President's warrantless
surveillance programs, there is still not enough on the public record
about the nature and effectiveness of those programs, or the
trustworthiness of this administration, to indicate that they require a
blank check from Congress.
  The Bush administration did not comply with its legal obligation
under the National Security Act of 1947 to keep the Intelligence
Committees ``fully and currently informed'' of U.S. intelligence
activities. Congress cannot continue to rely on incomplete information
from the Bush administration or revelations in the media. It must
conduct a full and complete inquiry into electronic surveillance in the
United States and related domestic activities of the NSA, both those
that occur within FISA and those that occur outside FISA.
  The inquiry must not be limited to the legal questions. It must
include the operational details of each program of intelligence
surveillance within the United States, including: (1) who the NSA is
targeting; (2) how it identifies its targets; (3) the information the
program collects and disseminates; and most important (4) whether the
program advances national security interests without unduly
compromising the privacy rights of the American people.
  Given the unprecedented amount of information Americans now transmit
electronically and the post-9/11 loosening of regulations governing
information sharing, the risk of intercepting and disseminating the
communications of ordinary Americans is vastly increased, requiring
more precise--not looser--standards, closer oversight, new mechanisms
for minimization, and limits on retention of inadvertently intercepted
communications.
  Madam Speaker, I encourage my colleagues to join me in opposition to
H.R. 6304, as it grants sweeping wiretapping authority to the
Government with little court oversight and ensures the dismissal of all
pending cases against the telecommunications companies. In my view,
this is wrong and unacceptable.
  Mr. SMITH of Texas. Madam Speaker, I yield 1 minute to the gentleman
from Arizona (Mr. Franks) who is a member of the Judiciary Committee
and a ranking member of the Constitution Subcommittee.

                              {time}  1130

  Mr. FRANKS of Arizona. I thank the gentleman for yielding me this
time.
  Madam Speaker, the coincidence of jihadist terrorism and nuclear
proliferation in our world today I believe represents the greatest
security threat to the human family. Osama bin Laden said ``our
religious duty is to gain nuclear weapons.'' If that quest should
succeed, whether it is 100 yards from this Capitol or in one of our
major cities, it will change our concept of freedom in a way that
almost none of us can comprehend. And our best hope of preventing that
is to have effective intelligence capability.
  I believe that the majority has risked the security of this country
by delaying a vote on this important bill for so long; but I am
gratified today that at least we are taking the next step in making
sure that we can see our children and grandchildren walk in the
sunlight of freedom.
  As we go forward, we should all keep in mind the words of our
Founding Fathers and the words especially of Thomas Jefferson when he
said, ``The price of freedom is eternal vigilance.''
  Mr. REYES. Madam Speaker, may I inquire as to how much time remains
on all sides.
  The SPEAKER pro tempore. The gentleman from Michigan (Mr. Conyers)
has 5 minutes remaining; the gentleman from Texas (Mr. Reyes) has 6\1/
2\ minutes remaining; the gentleman from Texas (Mr. Smith) has 8
minutes remaining; and the gentleman from Michigan (Mr. Hoekstra) has
7\1/2\ minutes remaining.
  Mr. REYES. Madam Speaker, I now would like to yield 2 minutes to the
distinguished gentleman from Maryland (Mr. Ruppersberger) who serves as
the chairman of our Subcommittee on Technical and Tactical Intelligence
on our Intelligence Committee.
  Mr. RUPPERSBERGER. Madam Speaker, I am proud to rise in support of
H.R. 6304. I would like to thank Chairman Reyes, Chairman Conyers,
Majority Leader Hoyer, Minority Leader Blunt, and Ranking Member
Hoekstra for coming together with a bill that we need on behalf of our
country.
  My district includes the National Security Agency, and many of NSA's
employees are my constituents. As a

[[Page H5765]]

member of the House Committee on Intelligence and the chairman of the
Subcommittee on Technical and Tactical Intelligence, which oversees
NSA, I know that the men and women who work for our Nation's
intelligence agencies work hard every day to keep our Nation safe.
  The intelligence agencies must do their work within the laws of this
country, and they need those laws to be clear. The NSA employees in my
district need a clear law with a bright line between legal and illegal
surveillance activities, and this bill provides that.
  Our Constitution requires checks and balances for the three branches
of government. This bill provides that the FISA Court must review
surveillance requests to protect the constitutional rights of our
citizens.
  I urge my colleagues to support this bill because it gives our
intelligence community the tools they need to keep our Nation safe
while protecting the constitutional rights of Americans.
  Mr. HOEKSTRA. I would like to yield 3 minutes to another
distinguished gentleman from Michigan (Mr. Rogers).
  Mr. ROGERS of Michigan. Madam Speaker, I want to compliment Mr.
Reyes. When this happened 124 days ago when it expired, I realized what
a challenge you had. They were asking you to win the Kentucky Derby by
entering a donkey in the race. And trying to get all of the folks
together to get us to the place where we are today was not short feat.
  Mr. Hoekstra and Mr. Reyes, I want to thank you both because what
this bill does today is reaffirm what we have been saying for the last
several years, that the due process of the Constitution, the fourth
amendment, is alive and well and protected in this bill. And any
rhetoric to the contrary is simply not true. It is fear mongering.
  For any U.S. citizen who believes that their phones are going to be
unceremoniously and injudiciously tapped or listened to is simply
wrong, and this bill reaffirms the importance of that fourth amendment
and due process for every American citizen every day.
  But it also says some very important things. We are going to protect
the Good Samaritan law that we have known and developed over the last
200-plus years that if you in good faith help your neighbor or help
your country, in good faith you will be protected from damages sought
by anyone else. If you stand up and protect the liberties and justice
of your country and the lives of your neighbors, you will be protected
in this law.
  And finally, our foreign intelligence service allies have been
nervous for 124 days, begging, pleading, cajoling, asking please, step
up to the plate and reengage in one of the most important intelligence
elements that we have, that the United States shares with our foreign
allies to stop suicide bombers, to stop terrorist elements from
developing plans and plots to kill their citizens as well as our own.
  This bill reaffirms all that we said last year and the year before.
It reaffirms what we said in the Protect America Act in August of 2007
that it is absolutely important that we step up to the plate and listen
to foreign terrorists in foreign lands plotting to kill citizens of our
allies and here at home.
  I want to congratulate all those who came together today, and urge
those with the rhetoric to please stand for your country today, stand
for the soldiers in the field who deserve our protection and the
protection of the intelligence services, and for every mother and every
father, every child in America who looks for a better day tomorrow
knowing that we once again have both our eyes and our ears on the
problem with terrorism and radical jihadists.
  Mr. CONYERS. Madam Speaker, I am pleased to yield to the gentleman
from New Jersey (Mr. Holt), a distinguished member of the Intelligence
Committee, 1 minute.
  Mr. HOLT. Madam Speaker, I thank the chairman of the Judiciary
Committee for yielding me time to speak about this.
  Unfortunately, the negotiators who brought this bill to the floor
bought into the flawed assumptions of the Bush administration that
because we live in a dangerous world, we must now redefine the fourth
amendment and thus the fundamental relationship between the government
and its people.
  If this bill becomes law, it will perhaps be the only lasting legacy
of the Bush-Cheney administration's overhaul of national security
policy, a congressionally blessed distortion of congressional checks
and balances. It permits massive warrantless surveillance in the
absence of any standard for defining how communications of innocent
Americans will be protected; a fishing expedition approach to
intelligence collection that we know will not make Americans more safe.
  Its court review provisions are weak and narrowly defined. I know
some of those who negotiated this bill say that some court review is
better than no court review. That is only true if the judge's hands
aren't tied in the review process. They are in this bill.
  There is a fundamental American principle that those who search,
seize, intercept and detain should not be the ones who decide who are
the bad guys.
  Mr. SMITH of Texas. Madam Speaker, I yield 2 minutes to the gentleman
from California (Mr. Issa) who is a member of the Judiciary Committee
and the Permanent Select Committee on Intelligence as well.
  (Mr. ISSA asked and was given permission to revise and extend his
remarks.)
  Mr. ISSA. Madam Speaker, I rise in strong support of this hammered-
out compromise bill.
  You know, Madam Speaker, elections matter. The current balance in the
House and the Senate played an important part in the administration,
House Republicans, House Democrats, Senate Democrats, and Senate
Republicans coming together and figuring out what was needed, what was
constitutional, in a very much bipartisan fashion.
  Unfortunately, there are those who want to have it both ways, those
who will talk about how this is balanced, it meets the needs of the
administration, as the administration is assuring us, and it meets all
of the constitutional requirements. But there are those who want to
also play to the other side. While making sure that we are protected by
a good piece of legislation, there are those who will come on the floor
and denounce this and then vote against it.
  Madam Speaker, I ask the American people to look long and hard at how
people vote on this. This is in fact worked out to assure the American
people, and properly so, that we will protect all of their
constitutional rights while doing everything we can to ensure their
safety.
  This is good legislation worked out over a long period of time, and a
lot of thoughtful work went into it on both sides. But I ask the
American people to hold accountable those who would want to know that
the American people are protected, and then vote against it in order to
play to special interests.
  Madam Speaker, that is the bad part of what will happen today. The
good part is that America will be safer and the Constitution will be
secure because of what we are doing here today. I thank you and urge
support.
  Mr. CONYERS. Madam Speaker, I am pleased now to yield to the
gentlewoman from California (Ms. Lee), cochair of the Progressive
Caucus and a leader in the Congressional Black Caucus, 1 minute.
  Ms. LEE. Madam Speaker, let me thank the gentleman for yielding and
for his leadership.
  I rise in strong opposition to this very terrible bill. It does not
strike the proper balance between protecting national security and
preserving our cherished civil liberties.
  Now I know how important those protections are from my personal
experience with unwarranted domestic surveillance and wiretapping
during the J. Edgar Hoover period. The government's infamous COINTELPRO
program ruined the lives of many innocent persons. Others, including
myself, had their privacy invaded even though they posed absolutely no
threat to national security. We all remember how Dr. King and his
family were the victims of the most shameful government-sponsored
wiretapping. We must never go down this road again. Yet here we are
again.
  This bill undermines the ability of Federal courts to review the
legality of domestic surveillance programs, it provides de facto
retroactive immunity to telecom companies and does not sunset

[[Page H5766]]

until December 31, 2012. How can we do that? Four years is way too
long.
  A good bill will protect Americans against terrorism and not erode
the fourth amendment. This bill scares me to death, and I urge a ``no''
vote.
  Mr. SMITH of Texas. Madam Speaker, I yield 3 minutes to the gentleman
from California (Mr. Daniel E. Lungren), a senior member of the
Judiciary Committee and the Homeland Security Committee.
  Mr. DANIEL E. LUNGREN of California. Madam Speaker, I thank the
gentleman for the time.
  Madam Speaker, as some say on radio, ``Now let's hear the rest of the
story.'' After the arguments just made on this floor, this is actually
a great day. We and the American people have been waiting for this
since 12:01 a.m. on February 6 when the Protect America Act expired.
During the intervening time we have actually been unnecessarily
vulnerable to those who would do us harm in this era of worldwide
terrorism.
  In fact, Madam Speaker, I would say that this is the single most
important bill we will vote on this year, not that I say supporting our
troops is not important, but the intelligence that we gather as the
result of the authority granted by this bill may actually create
conditions under which we do not have to send troops anywhere in the
world and may be more protective of our rights than any other single
thing.
  Having come before this body on five different occasions since that
initial expiration of the Protect America Act, I am greatly relieved
that we can finally send the intelligence community and the American
people a bill which will enable the intelligence community to continue
to protect those American people.
  Although the compromise agreement embodied in the proposal before us
is not necessarily the one I would have written, it does, in my
estimation, meet our responsibilities for protecting the American
people. In other words, Madam Speaker, it is not the Mona Lisa but it
is not a bad paint job.
  First and foremost, the proposal before us ensures that we will
continue to have the ability to monitor the conversations of al Qaeda
overseas. And although there are requirements that the Attorney General
and the Director of National Intelligence adopt procedures which will
be submitted to the FISA Court, the bill retains sufficient flexibility
for our overseas intelligence mission.
  In other words, the intelligence community leadership has assured us
that this bill will allow them the operational authority to do what
needs to be done within the parameters of the Constitution. Both the
safety of the American people as well as their civil liberties are
protected in this proposal.
  This proposal embodies compromise language which responds to the
legitimate concerns of telecommunication providers who themselves
responded to the call of their government in the wake of 9/11. The
language of the bill not only satisfies the interest of justice, but
communicates loudly to all Americans that if they are ever confronted
with such requests, lawful requests, their government will not hang
them out to dry afterwards.
  Specifically, a Good Samaritan safe harbor will exist with respect to
any civil action where there is substantial evidence to support the
certification provided by the Attorney General. The quantum of evidence
required is merely a showing of more than a scintilla but less than a
preponderance of evidence.
  And although these provisions in the proposal will contribute to
securing the safety of our citizens, this is not to suggest that I
support every provision in the compromise.
  The SPEAKER pro tempore. The gentleman's time has expired.
  Mr. SMITH of Texas. I yield the gentleman 1 additional minute.
  Mr. DANIEL E. LUNGREN of California. For example, the so-called
``exclusive means'' language in the bill is seen by some as an
assertion of maximal congressional authority. Let me just remind my
colleagues that the FISA Court of review has said all of the other
courts to have decided the issue held the President did have inherent
authority to conduct warrantless searches to obtain foreign
intelligence information. The court stated that ``we take for granted
that the President does have that authority.''
  So regardless of whether we have a President McCain or a President
Obama, this language will likely be interpreted in the context of facts
in individual cases in light of the constitutional jurisprudence which
has arisen with regard to the collection of foreign intelligence.
  In other words, it does not either trample upon the constitutional
prerogatives of the Congress nor those constitutional prerogatives of
the President of the United States. This is a good compromise. It
protects the American people. We have been waiting for it. It ought to
be voted on with dispatch.
  Mr. REYES. Madam Speaker, I yield 2 minutes to the distinguished
gentleman from Rhode Island (Mr. Langevin), a valued member of our
Intelligence Committee.
  (Mr. LANGEVIN asked and was given permission to revise and extend his
remarks.)

                              {time}  1145

  Mr. LANGEVIN. Madam Speaker, I rise in support of the FISA Amendments
Act of 2008. Though not a perfect piece of legislation, it is clearly
far better than what we have today, and addresses a number of the many
concerns that were raised about the administration's conduct of
surveillance in this country.
  As a member of the Intelligence Committee, I know that we must give
our Intelligence Community the proper tools to protect us, while
upholding the civil liberties of Americans. Today's compromise
illustrates what this House can do when it deliberates with care, holds
steady against fear mongering and acts in the best interests of the
country and its citizens.
  This bill is strong on civil liberties, and includes protections
against infringement of our constitutional right to privacy.
  First, the bill clarifies that FISA is the exclusive means by which
the executive branch may conduct electronic surveillance on U.S. soil.
No President will have the power to do an end-run around the legal
requirements of FISA. This provision will prevent the types of abuses
we've witnessed under this administration.
  Second, this act requires a warrant from the FISA court to conduct
surveillance of Americans abroad. Americans will no longer leave their
constitutional protections at home when working, studying or traveling
abroad.
  Third, it requires prior approval by the FISA court of procedures the
government will use when carrying out foreign electronic surveillance.
This will ensure that the government's efforts are not aimed at
targeting Americans, the so-called reverse targeting that we're all
concerned about; and that if an American's communications is
inadvertently intercepted, it is dealt with in a manner that guarantees
legal protections.
  It also requires and allows for, now, an IG investigation of this
warrantless surveillance program that took place prior to Congress
being made aware of this legislation.
  The SPEAKER pro tempore. The gentleman's time has expired.
  Mr. REYES. I grant the gentleman another 15 seconds.
  Mr. LANGEVIN. Madam Speaker, as I've said before, this legislation
will only work if everyone involved follows the rules and remains
within the confines of the law. Congress must continue to conduct
robust oversight to make sure that the law is implemented as intended
to maintain the critical and fragile balance of protecting our Nation
and protecting civil liberties.
  Mr. HOEKSTRA. At this time I would like to yield 1 minute to the
gentleman from California (Mr. Issa).
  (Mr. ISSA asked and was given permission to revise and extend his
remarks.)
  Mr. ISSA. Madam Speaker, in just 1 minute it's impossible to assure
the American people of everything this bill will do. But I would like
too, if you will, react to something that was said on the other side
that just simply isn't true.
  Yes, during J. Edgar Hoover's day, there was warrantless
surveillance, even on political enemies of the people who were
President at the time. Those days are behind us.
  This act, long since we've taken care of domestic wiretap, but this
goes one step further. It insures Americans and

[[Page H5767]]

particularly, I think, Arab Americans like myself who might go back and
forth between here or have relatives in the Middle East, that their
conversations will not be the subject of warrantless wiretaps, that, in
fact, they can be very confident that America is going to observe the
Constitution for them, both when they are here and if they are visiting
abroad.
  So it's not easy to undo some of the statements that talk about the
past, but the truth is, this will protect what has already been
established for Americans here.
  Mr. CONYERS. Madam Speaker, I am pleased to yield to the gentleman
that has more measures in the Judiciary Committee than anybody else in
Congress, Dennis Kucinich, the distinguished gentleman from Ohio, 1
minute.
  Mr. KUCINICH. Under this bill, large corporations and big government
can work together to violate the United States Constitution, use
massive databases to spy, to wiretap, to invade the privacy of the
American people. There's no requirement for the government to seek a
warrant for any intercepted communication that includes a U.S. citizen,
as long as the program in general is directed towards foreign targets.
  This Congress must not allow the names of innocent U.S. citizens to
be placed on secret intelligence lists. Under this bill, violations of
Fourth Amendment rights and blanket wiretaps will be permissible for
the next 4 years. Massive and untargeted collection of communications
will continue and with the enactment of this bill.
  Furthermore, it allows the type of surveillance to be applied to all
communications entering and exiting the United States. These blanket
wiretaps make it impossible to know whose calls are being intercepted
by the National Security Agency.
  Let's stand up for the fourth amendment. Let's remember, when this
country was founded Benjamin Franklin said, those who would give up
their essential liberties to achieve a measure of security deserve
neither. Vote against it.
  Mr. SMITH of Texas. Madam Speaker, I yield myself the balance of my
time.
  Madam Speaker, H.R. 6304 may well be one of the most important pieces
of legislation we pass this Congress.
  For 4 months America has been more vulnerable to attacks by our
enemies, because of the refusal by some to bring a commonsense bill to
the floor to help the Intelligence Community protect Americans.
  Many of us would have preferred the bill passed by the Senate.
Although this bill may not be ideal, it does represent a compromise
between House and Senate Republicans and Democrats. This compromise
preserves our ability to conduct a strong, effective foreign
intelligence program.
  I urge my colleagues to support this legislation.
  Madam Speaker, I yield back the balance of my time.
  Mr. REYES. Madam Speaker, it is now my pleasure to yield 1 minute to
our esteemed Speaker of the House, Ms. Pelosi.
  Ms. PELOSI. Madam Speaker, I thank the gentleman for yielding. I
thank him for his great leadership as the chairman of the Intelligence
Committee. I commend him.
  I commend Mr. Conyers, the distinguished chairman of the Judiciary
Committee, for although he is not supporting the legislation before us
today, he certainly had a tremendous impact to improve it. Thank you
for your relentless championing of civil liberties in our country, Mr.
Conyers.
  I want to pay special tribute to our majority leader, Mr. Hoyer, for
making this compromise possible today. It's a very difficult task, many
competing views as to how we should go forward. Mr. Hoyer handled it
all with great intellect and great respect for all of those views.
Thank you, Mr. Hoyer.
  Also want to acknowledge Mr. Smith and Mr. Hoekstra and minority
whip, Mr. Blunt, for their leadership in giving us this opportunity
today.
  We've heard it over and over again. Our colleagues say this bill is
not perfect, this isn't the bill I would write. I prefer this bill, I
prefer that bill.
  Well, I prefer the House bill that passed and was sent to the Senate.
It isn't an option for us. I do not, I totally reject the Senate bill
which is an option, and that is the comparison that we have to make,
the contrast that we have to make today.
  But in doing so, I think we all understand the important
responsibility that we have in this Congress, focused on this debate
today. I always take the debate back to our responsibility when we take
the oath of office. We take an oath of office to protect and defend the
Constitution from all enemies, foreign and domestic. In that preamble
to our Constitution, we must provide for the common defense. Essential
to honoring that commitment to protect the American people is to have
the intelligence, operational intelligence that will help us do that.
  When I first went on the Intelligence Committee, our focus was on
force protection. Our troops in the field depend on timely and reliable
intelligence to make the decisions necessary to keep them safe and to
do their job. Force protection, force protection, force protection. It
is still a primary responsibility of our intelligence.
  In addition to that, we have the fight on the war against terrorism,
the fight against terrorism, wherever it may exist. Good intelligence
is necessary for us to know the plans of the terrorists and to defeat
those plans.
  So we can't go without a bill. That's just simply not an option. But
to have a bill, we must have a bill that does not violate the
Constitution of the United States, and this bill does not.
  Some in the press have said that under this legislation, this bill
would allow warrantless surveillance of Americans. That is not true.
This bill does not allow warrantless surveillance of Americans. I just
think we have to stipulate to some set of facts.
  We may have our opinions about the bill, but there have been so many
versions of the story of different bills that have come up, the PAA
last year, which I thought was totally unacceptable. The Senate bill,
also unacceptable. Our House bill, which I mentioned before, which I
thought was the appropriate way to go, and now this compromise.
  As I was talking with Mr. Hoyer in the course of his negotiations,
there were certain things that I thought had to be in the bill to make
it acceptable, certain threshold issues that had to be there, and they
are.
  In terms of the original FISA bill, it's interesting to note that
this bill is an improvement on that in three important ways.
  First, we all recognize the changes in technology necessitate a
change in the legislation, and this legislation today modernizes our
intelligence-gathering system by recognizing and responding to
technological developments that have occurred since the original FISA
Act in 1978. In doing so, we can make the country safer in a more
advanced technological way.
  Second, and this is very, very important, and there's some
misunderstanding about this. This bill provides that Americans overseas
receive the same FISA protection, including an individualized warrant
based on probable cause, as Americans living within the country. This
is a very important improvement on the original FISA Act.
  Third, this bill strengthens congressional oversight. And this is
very important, the transparency. Transparency and intelligence don't
always go together, but accountability is central to intelligence. This
strengthens congressional oversight by requiring that the executive
branch provide more extensive information about the conduct of
surveillance to both the Intelligence Committee and the Judiciary
Committee. This is new, this is better. The more we know, the better, I
think, the law will be enforced.
  If this bill does not pass, we will most certainly be left with the
Senate bill. I think that's clear. And this bill is an improvement over
the Senate bill in the following ways, just to name a few.
  First of all, it reaffirms that FISA is the exclusive means of
collecting foreign intelligence, and makes absolutely clear that the
enactment of an authorization for the use of force does not give the
President, whoever he may be, any inherent authority to alter the
requirements of FISA. Very important.
  This is important because President Bush believed, and this was what
we were told, that he, as President of the United States, had inherent
authority under the Constitution to do almost anything he wanted.

[[Page H5768]]

  And what this bill reaffirms is that the FISA law is the authority
for collecting foreign intelligence. There is no inherent authority of
the President to do whatever he wants. This is a democracy. It is not a
monarchy.
  Secondly, it is an improvement of the Senate bill. And by the way, no
offense to President Bush. I wouldn't want any President, Democrat or
Republican, a Democratic President or a Republican President to have
that authority.
  Secondly, the bill provides that, except in rare circumstances there
will be pre-surveillance review by the FISA Court.

                              {time}  1200

  And when I say rare circumstance, I mean very, very rare.
  Unlike the Senate bill, this legislation retains FISA's broad
definition of electronic surveillance and thus guarantees that basic
protections of FISA apply to all the new forms of collection authorized
by the bill. There had been an attempt, and that's why the Senate bill
is inferior in this respect, to just narrow it to certain kinds of
collection, and this says it applies to all collection, electronic
surveillance.
  Fourth, it contains specific protections against reverse targeting.
This reverse targeting is very, very important to the civil liberties
of the American people, and I am satisfied by the specific provisions
against reverse targeting. It provides a full and independent review of
the President's surveillance program by the Inspector General of the
relevant agencies.
  Of course, there are aspects of this compromise bill that I do not
like. I don't believe that Congress should be in the business of
interfering with ongoing lawsuits and attempting to grant immunity to
telecommunication companies that allegedly violated the law. Those
companies have not lived up to a standard expected by the American
people. I don't think today is any cause for celebration for them. They
come out of this with a taint.
  I do not believe that the pending lawsuits would have achieved what
we would have liked them to do which is what the Inspector General's
review would, which is to learn the truth about the President's
terrorist surveillance program and give us the information we need to
make sure that never happens again.
  In addition, this legislation makes sure that in the future, the
telephone companies must fully comply with Federal statutes.
  Again, it would have been my preference to vote for the RESTORE Act
that the House sent over to the Senate. I do not consider it an option
to live with the Senate bill. This is the opportunity that we have to
protect the American people through the gathering of intelligence which
is essential, as I said earlier, to force protection, to protect our
men and women in uniform and help them make the decisions they need to
do their jobs and keep them safe and to fight terrorists by learning
their plans in advance and squelching them.
  I want to thank those who have worked so hard to bring this bill to
the floor. Again, it's not a happy occasion, but it's the work that we
have to do. I think we have to remember getting back to the
Constitution. The House, article 1, legislates. We pass the laws. The
judiciary interprets the law. The executive branch enforces the law.
And what is very important about whatever we pass, especially in
relating to subjects relating to our security and our liberty, it's
important that the President of the United States enforce this law
honoring the Constitution of the United States recognizing the
responsibility that we all have to protect the American people and
protect the Constitution of the United States at the same time.
  So again, a difficult decision for all of us. I respect every opinion
that was expressed on this floor today. The knowledge, the sincerity,
the passion and the intellect of those who support and oppose this have
been very, very valuable in making the bill better, if not good enough
for some, but certainly preferable to the alternative that we have
which is the Senate bill which must be rejected.
  I'm not asking anybody to vote for this bill. I just wanted you to
know why I was.
  Thank you, Madam Speaker.
  Mr. HOEKSTRA. Madam Speaker, I would like to yield myself the balance
of my time.
  In the immediate aftermath of 9/11, the President, the leaders of
Congress, faced a very difficult situation: to learn more and to better
understand the threat that America now faced. They recognized that we
needed to move from a mentality of being law enforcement to a mentality
of prevention, that we needed to confront, contain, and ultimately
defeat radical jihadists if America was going to stay safe.
  The President, the leaders of Congress, many of whom spoke today,
huddled together and talked about the various strategies that they
could implement to get a better understanding of this organization
called al Qaeda, its leaders, its intentions, and its capabilities.
  Overarching in their discussions were making sure that the
Constitution and the rule of law would guide their behaviors. As they
considered various alternatives and discussed these, they implemented a
terrorist surveillance program using the capabilities that in many
cases are unique to America that could give us insights into al Qaeda,
its leadership, and its intentions.
  It's not the President's program. This program was put together by
the President in consultation, sure, with members of his cabinet, but
also, very importantly, with consultation on a bipartisan basis with
the leaders of Congress.
  These leaders in Congress were consistently briefed about how the
program would work, the kinds of information that was being obtained,
and how it was being used to keep America safe, all the while placing a
responsibility on yes, the President, but also the leaders of Congress
to make sure that the intel community was doing the things it was being
asked and was being asked to do things that would be legal.
  The intel community has performed very well. They have gotten us
information that has enabled us to keep America safe. The intel
community, this administration, and Congress asked other parts of our
economy to participate, private sector companies. They stood up and
they did the job to keep America safe. Congress did the necessary job
of doing oversight, and in 2004, we reformed the intelligence
community.
  So since 9/11, many things have been done properly. The end result,
as we've gone through this process, is that we have kept America safe.
  I congratulate the Speaker, I congratulate the majority leader, I
congratulate my colleagues on the other side of the aisle, Mr. Smith,
for working in a bipartisan basis to recognize what needed to be done
in allowing this bill to come to the floor and continue to move forward
in a slightly different way than how we've been moving forward over the
last 6 years. But the most important thing is in a bipartisan basis, we
have come together on a national security issue to give our
intelligence community the tools that they need to keep America safe.
  Mr. CONYERS. Madam Speaker, I would like now to recognize the
distinguished gentleman from Washington, Jay Inslee, for 1 minute.
  Mr. INSLEE. Have we forgotten what our ancestors have done in the
cause of liberty? Don't we realize there are some lines we can never
cross? Don't we realize we should never legitimize illegal violations
of America's privacy rights, which this bill does?
  This bill says if the telecommunication companies violated America's
privacy willfully, knowingly, knowing it was illegal, we are giving
them immunity. Where is the excuse for that? Where is the excuse for
turning a Nation of laws into a Nation that will be led by a President
who knows how to manipulate our fears?
  We have got to know the law is our ultimate guardian of liberty, and
those on this side have accused us of having a pre-9/11 mentality. Let
me remind them that July 4, 1776, was pre-9/11. And heaven help us the
day that those values are shucked aside at the service of fear.
  Reject this bill.
  Mr. CONYERS. Madam Speaker, I will take this time to use the
remaining time that is allotted me.
  The SPEAKER pro tempore. The gentleman is recognized for 1 minute.
  Mr. CONYERS. I would like to point out that the grant of retroactive
immunity to the telecoms is inconsistent

[[Page H5769]]

with our basic principles because we are breaking with a very proud
tradition of intervening for the first time in a pending court decision
in an effort to reach a preordained legal outcome. This is a bad
precedent.
  And may I point out, too, that we are in a period in which the
executive branch has been deemed by many constitutional authorities to
be very near the description of an imperial Presidency. We've gone too
far.
  I hope that we will get a strong vote against this because the
struggle for restoring our precious rights and liberties must continue.
  I return all time that may be remaining on our side.
  Mr. REYES. Madam Speaker, how much time remains?
  The SPEAKER pro tempore. The gentleman from Texas has 2\1/4\ minutes.
  Mr. REYES. Madam Speaker, it is my privilege to yield 1 minute to our
distinguished majority leader, Mr. Hoyer, who in this case deserves MVP
status for having the wisdom of Solomon and the patience of Job.
  Mr. HOYER. I thank my friend, the chairman of the Intelligence
Committee. I thank the Speaker. I thank the Speaker not only for giving
me the responsibility for trying to work with some extraordinarily
talented people but also for having the courage to lead and the courage
to express her convictions.
  And I want, at the outset, to share her view that every Member who
has spoken on this floor has spoken out of a sense of conviction and
out of a sense of responsibility to the Constitution of the United
States and to the protection of our great Nation and our great people.
  Mr. Reyes, Mr. Conyers, Mr. Hoekstra, Mr. Smith have all worked to
come together, realizing that there were significant differences. Those
four have been assisted by some extraordinary people, and at the
outset, I want to mention them.
  First of all, I want to mention my own staff without whom I think we
would not be at this day. She sits on the floor. She worked for my
colleague and dear friend Senator Paul Sarbanes for a number of years.
One of the benefits of Senator Sarbanes retiring was that she came to
my staff. Mariah Sixkiller has expended too much time, perhaps, but
with great talent and great ability to reach this day. Thank you,
Mariah Sixkiller.
  I want to thank Chairman Conyers because Chairman Conyers, as you've
heard on the floor, has been conflicted but he has been focused on the
necessity to respond to issues that are real and also to help us move
forward so that we did not, in the minds of many of us, have a bill
pass that we thought was unacceptable, a bill passed by the Senate with
68 of 100 votes. We would not be here, in my opinion, without Chairman
Conyers' leadership, not because he supports this alternative, but
because he saw the ability to work together.
  I want to thank his staff, Lou DeBaca, Perry Apelbaum. And Lou
DeBaca, in particular, who sat for hours and hours and hours in a room
trying to reach agreement as we made compromises. Mr. Reyes' staff,
Mike Delaney, the staff director. Jeremy Bash. Jeremy Bash did
extraordinary work. Jeremy Bash was hired by the former Chair of the
Intelligence Committee, Jane Harman.
  Jane Harman is probably as knowledgeable as almost anybody on this
floor, other than perhaps the Speaker who served on the Intelligence
Committee longer than anybody in this House. Jane Harman's leadership,
concern, focus on constitutional rights, focus on the security of our
country, was outstanding. She played a significant role in trying to
get us to this day.

                              {time}  1215

  Eric Greenwald of Mr. Reyes' staff also played a significant role.
  Without Mike Sheehy and Joe Onek of the Speaker's staff, we would not
be here today. We would not have reached the good compromises that we
reached. Joe Onek and Mike Sheehy, if they were writing this bill,
would have written a different bill, much closer to what we passed on
our side of the aisle and sent to the Senate, which they rejected. Mike
Sheehy has served the House and the Speaker for a very long time in the
intelligence field.
  I want to thank Senator Rockefeller. We would not be here today on
this floor if it were not for Senator Rockefeller. Senator Rockefeller
very early on had discussions with me about what could they do to try
to move towards the bill that we passed. He made some suggestions.
Those suggestions are in this bill today. He facilitated our actions.
Andy Johnson, Mike Davidson, Alissa Starzak of his staff were very,
very helpful.
  Senator Bond, Senator Bond and I did not see necessarily eye-to-eye
on these issues as we began, but at the end, we came to an agreement.
Louis Tucker and Jack Livinston of his staff were very helpful.
  Chairman Hoekstra, or former Chairman Hoekstra, now Ranking Member
Hoekstra, I want to thank Chairman Hoekstra, but particularly, I want
to thank Chris Donessa who was very helpful, gave us great assistance
and advice.
  Lamar Smith and Caroline Lynch of his staff, thank you very much for
your efforts as you sat in that room, as we all sat around, every one
of the committees sat around the table, as we came to the final
agreement.
  Then I want to thank, of course, Jen Stewart and the minority leader,
without whom we could not have gotten to this day.
  Lastly, I want to thank my friend. There's an article going to be
written. It's going to speculate whether or not he and I hurt one
another by saying the other is his friend. I don't think that's the
case. I said that Roy Blunt and I often disagree on substantive issues,
but what we agree on very strongly is that this House needs to sit down
and talk to one another and try to reach resolution on difficult
issues, not hard-to-reach compromise on easy issues. It's on the
difficult issues.
  Roy Blunt is a man of this House, who cares about this House, who
cares about this country. And he cares about drafting legislation that
can be agreed upon by a broad section of this House and the American
people. He has an extraordinary staff of Brian Diffell, who I want to
thank for his efforts, but in particular, I want to thank Roy Blunt for
his friendship, for his integrity, and for his willingness to take
risks to reach compromise. Thank you, Roy.
  Madam Speaker, today we conclude one step in a long, continuing
process. Just under a year ago, the House came under great pressure
from the administration and the Senate to pass the Protect America Act,
a bill I could not support and spoke out against for its lack of civil
liberties protections.
  Since then, there have been other attempts to modernize the Foreign
Intelligence Surveillance Act: first, the RESTORE Act passed by the
House last November with my strong support, with Mr. Conyers' strong
support, Mr. Reyes' strong support, and the support of this House; that
was followed by the Senate bill which passed, as I said earlier, with
68 votes in February; and most recently, the FISA Amendments Act,
passed by the House last March. I supported that bill as well. I think
it was a better bill. It would be my alternative. It was our
alternative on this side of the aisle, but it was not the consensus
alternative, and we needed to reach consensus to move forward.
  I was proud to support the two House bills, which I believe struck
the right balance between giving our intelligence community the tools
to go after those who seek to harm and protecting the constitutional
rights of American citizens.
  Today, I stand in support of a different kind of bill, a compromise.
To be clear, this is not the bill that I would have written or that
perhaps anybody individually on this floor would have written. However,
in our legislative process, no one gets everything he or she wants.
Different parties, often with deeply competing interests, come together
here to produce a consensus product, where each side gives and takes. I
don't believe we've given on the ultimate principles on either side.
  Over the past few months, I've been involved in almost daily
discussions with the stakeholders on this important issue, Members in
both Chambers, in both parties, as well as outside organizations and
experts. I want to thank all of the outside organizations, whether they
agree with our product or do not. Their contribution has been an
important one. I particularly want to thank those who take very
unpopular

[[Page H5770]]

positions to protect the rights of perhaps just one of us among the 300
million, who in the land of the free and the home of the brave deserve
to have that one individual right protected, and I appreciate their
efforts to ensure that that country remains that kind of country.
  Together, we have worked to develop a bill that strikes a sound
balance. This measure provides the intelligence community with the
strong authority to surveil foreign terrorists who seek to harm this
country and our people. As the Speaker said, that is our
responsibility, and we intend to meet it.
  It provides for enhanced civil liberties protections for Americans
and insists on meaningful judicial scrutiny.
  It includes critical new oversight and accountability requirements
that both address the President's warrantless surveillance program and
ensures that any surveillance going forward comports with the fourth
amendment and will be closely monitored by the Congress.
  Of vital importance, my colleagues, this legislation makes clear that
FISA is the exclusive means by which the government may conduct
surveillance, the Foreign Intelligence Surveillance Act. Contrary to
the administration's previous actions, in which it did not comply with
the FISA statute, this statute makes it very clear, this and this alone
is the process through which we will intercept communications, an issue
of great importance to the Speaker, as she has said.
  Notably, this bill does not address or excuse any actions by the
government or government officials related to the President's
warrantless surveillance program, nor does it include any statement by
the Congress or conclusion on the legality of that program.
  Indeed, it mandates for the first time ever a robust accounting by
the Inspectors General of the warrantless surveillance program, which
Congress will receive and act on.
  Madam Speaker, in closing, let me say again, this bill is a
compromise, but in my opinion, it is a compromise worth supporting. And
the conclusions drawn by editorials in the New York Times, Wall Street
Journal and Washington Post over the last 2 days reflect this
compromise.
  Today, for example, the Washington Post recognized that this is a
reasonable effort to strike a compromise, stating: ``Striking the
balance between liberties and security is never easy, and the new FISA
bill is not perfect. But it is a vast improvement over the original law
and over the earlier, rushed attempts to revise that law.''
  As I said at the beginning, this bill is one step in a long,
continuing process of updating this critical legislation, ensuring that
our national security and our civil liberties are both protected.
  This legislation sunsets at the end of 2012, and it's imperative that
we scrutinize its implementation in the future and make any necessary
changes. I believe we have the best bill before us that we could
possibly get in the current environment. It is a significant
improvement over the Senate-passed bill and, I suggest, existing law.
  I look forward to working with my colleagues in the years ahead to
ensure that both our national security and our civil liberties are
protected. That is our responsibility. That is our pledge to our
constituents. I urge passage of this legislation.
  Mr. REYES. Madam Speaker, I yield myself the balance of the time.
  I just wanted to thank everyone again, as Mr. Hoyer indicated. I
believe every Member in this body cares about our national security,
and I also believe that this is a good bill, a good compromise and is
worthy of supporting.
  Mr. VAN HOLLEN. Madam Speaker, on March 14th I voted in favor of H.R.
3773 which modernized the Foreign Intelligence Surveillance Act. This
bill successfully updated the law to accommodate the current day
communications technology while at the same time providing the much-
needed protection of the court in sanctioning the surveillance of
Americans. Moreover, the bill was also remarkable for what it did not
contain; it did not provide retroactive immunity for telephone
companies who are defendants in pending lawsuits. These suits have been
brought to uncover the full extent of the Administration's program to
conduct unauthorized surveillance on Americans.
  I am deeply troubled that the Senate does not have the votes to pass
the House bill. The Senate instead passed its own bill, S. 2248, which
was unacceptable to me from the outset because it reduced the role of
the FISA Court to merely review the procedures for targeting
surveillance subjects and minimizing the information collected.
Moreover, the Senate bill established retroactive immunity for the
phone companies that have been used to carry out the Administration's
illicit surveillance program.
  To be sure, the Senate bill is completely unacceptable. Majority
Leader Hoyer worked tirelessly to improve upon the Senate bill to forge
an acceptable compromise. The bill before us today, however, does not
go far enough to include sufficient safeguards of court involvement in
the surveillance of Americans. Moreover, it continues to provide
retroactive immunity for those companies that carried out the
Administration's unauthorized surveillance. Finally, it fails to hold
the Administration accountable for its past illicit surveillance
activities and its disregard of the Fourth Amendment protections of
Americans. As a result, I must vote against this bill.
                                  ____

  Ms. SPEIER. Madam Speaker, when are we going to stop pulling the wool
over the eyes of the American people? The proposed FISA law protects no
one other than the administration and those within it who may use this
new-found power to snoop and spy in areas where they have no business
looking. We are giving broad new powers to political appointees who
have repeatedly disregarded the Constitution and ignored the most basic
rights of Americans to live their lives without Big Brother peeking his
nose into their private matters.
  This FISA bill gives the federal government sweeping powers to gather
wide swaths of information from foreign sources while providing little
or no justification for the national security value of that
information.
  The FISA Court set up to police the process isn't a court at all.
Under this bill, the government can gather as much intelligence as it
chooses for seven days prior to going to the court. Then, if the court
says ``No'' to the request, the government can continue to gather
intelligence for 60 days while they appeal.
  Any first year law student knows that is not how courts work. If this
were a real court, the government would be required to abide by the
decision of the court and seek the warrant prior to conducting
surveillance.
  It is fundamentally untrue to say that Americans will not be placed
under surveillance after this bill becomes law. The truth is, any
American will subject their phone and e-mail conversations to the broad
government surveillance web simply by calling a son or daughter
studying abroad, sending an e-mail to a foreign relative, even calling
an American company whose customer service center is located overseas.
  Once again, our government puts a feel-good name on something that
doesn't live up to its billing. Calling the FISA rubber stamp panel a
court is akin to the President's ``Clear Skies Initiative'' which
relaxed pollution regulations or ``No Child Left Behind'' which instead
of helping schools, punishes them if they have children who are,
indeed, lagging behind.
  This bill sets out to reassure Americans that, because there are
warrants and a ``court'', due process is taking place. But like the
pseudo-court, FISA warrants aren't warrants at all.
  A warrant is permission by the court to look for a specific thing
from a specific person or group for a specific reason. The FISA warrant
is given after the fact and can be as broad as gathering all electronic
communication coming into or out of a foreign country.
  Madam Speaker, America isn't simply `guided'' by our Constitution, it
isn't a set of ``suggestions'' but rather, the law of the land. It is
the existence of this great document and our unswerving loyalty to it
that makes America the greatest nation in the history of our planet. We
can't be sacrificing basic constitutional principles like the fourth
amendment simply because it's an election year and we want to make it
look like we're fighting terrorism.
  I join my colleagues in our unified fight to defeat the global
terrorist movement. But we don't do that by sacrificing our hard-earned
Constitutional rights and forgiving telephone companies who knowingly
violate those rights.
  The bottom line is, this FISA bill permits the collection of
Americans' emails and phone calls if they are communicating with
someone outside of the U.S. This is especially true when it comes to
emails, because the World Wide Web has no area codes, so it is
impossible to tell where email communications originate from. The
Government is under no obligation to seek a warrant in order to monitor
an email account unless it knows the account belongs to an American.
  And once your email account is swept up in the system, it can be
monitored. Regardless of the relevance of your personal information,
once it is gathered by the government, it is never destroyed. One only
has to recall the recent incident in the State Department where
candidates' passport information was breached to know that this
information isn't

[[Page H5771]]

handled by robots, but people. And people can do any number of things
with personal informations.
  Out of respect to the United States Constitution and the basic rights
of Americans to live free of intrusive eavesdropping by their
government, I strongly oppose HR 6034, the FISA Reauthorization Act.
  Ms. ESHOO. Madam Speaker; first I want to commend the Chairman and
the Majority leader for the work they've done to bring this legislation
to the floor of the House. It has been a challenge for all of us on the
Intelligence Committee and in the Congress.
  This legislation is a vast improvement over the previous law, and
indeed over the Protect America Act passed by the House last August
which I opposed.
  The bill very importantly establishes a process for electronic
surveillance that includes prior approval by the independent courts,
and in some respects, this legislation goes even further than the
existing FISA statute or the House-passed RESTORE Act in protecting the
civil liberties of U.S. persons. Under this bill the Administration
would have to seek a court order before conducting surveillance on U.S.
persons abroad. Until now and under the Protect America Act, the
executive branch could conduct electronic surveillance of U.S. persons
without prior judicial approval. This legislation also allows the
lawsuits against the telecommunications companies to go forward in a
limited fashion, which would not have occurred at all under current
law.
  Having said this I must oppose this bill.
  Under the original structure of FISA, telecommunications carriers
served an important gate-keeping function. They were not permitted to
provide access to private communications in the United States unless
the government made a lawful request to conduct surveillance, pursuant
to a FISA order. For decades, the government has sought and obtained
thousands of FISA warrants prior to beginning surveillance, or in
urgent cases shortly thereafter. We all remember the shocking news when
the President had to acknowledge that his Administration created an
illegal, warrantless electronic surveillance program outside of the
FISA legal framework.
  This legislation would essentially grant retroactive immunity to
telecommunications carriers who relied on statements made by this
Administration that the program was lawful. However, as we've seen in
numerous instances, this Administration pushed new and aggressive
interpretations of the law, including in this area. We all recall
vividly the days following \9/11\, and the urgency that prevailed, but
suspending our laws and allowing the Attorney General to unilaterally
issue a ``get out of jail free card'' is not appropriate under any
circumstances. There should be at least some minimal inquiry into
whether the telecommunications carriers reliance on the statements made
by this Administration was reasonable. If so, the they would be able to
assert their existing statutory immunity defenses.
  Throughout our Nation's history, the judiciary has been the most
important check on an overzealous executive, and it is often through
the judicial process that we uncover and remedy some of the most
egregious executive misconduct. This legislation undermines and
effectively nullifies the courts' ability to hold the Administration
accountable for its actions, which likely violated the Constitution.
  Our Nation was founded on the principle of separation of powers. The
executive branch should be subject to independent oversight by the
judicial branch. This legislation does not go far enough to allow the
judicial branch to conduct an independent, reasoned inquiry into this
critical issue. Therefore, I must oppose this legislation.
  Mr. UDALL of Colorado. Madam Speaker, I will support this bill.
  I will do so because, as I have consistently said, I do think the
basic law in this area--the Foreign Intelligence Surveillance Act, or
FISA--needs to be updated to respond to changes in technology, which
was the purpose of the current, temporary law.
  That is why, last August, I voted for a bill (H.R. 3356) to provide
such an update--a bill that was supported by a majority of the House,
but did not pass because it was considered under a procedure that
required a two-thirds vote for passage, which did not occur because of
the opposition of the Bush Administration. It was supported by all but
three of our Republican colleagues.
  That is also why I voted for another bill to update FISA--H.R. 3773,
the ``Responsible Electronic Surveillance That is Overseer, Reviewed,
and Effective'' (or RESTORE) Act--which the House passed on November
15th of last year. Like those bills I supported earlier, this bill will
replace the Protect America Act, enacted in August 2007--which I
opposed.
  The bill makes it very clear that to conduct surveillance targeting a
person in the United States, the government first must obtain an
individual warrant from the FISA Court, based upon probable cause.
  And, importantly, it explicitly states that FISA and Title III of the
U.S. criminal code are the exclusive means by which the government may
conduct surveillance on American soil, and adds that any future statute
must expressly authorize surveillance if the government is going to
rely on it to conduct domestic surveillance.
  It also includes new legal protections for Americans abroad,
requiring an individual probable cause determination by the FISA Court
when the government seeks to conduct surveillance of U.S. persons
located outside the United States.
  It requires prior review and approval by the FISA Court of the
targeting and minimization procedures used to conduct surveillance of
any foreign targets (unless in an emergency, in which case the
government may authorize the surveillance and then apply to the FISA
Court for approval within 7 days), and requires that this surveillance
be conducted in accordance with the Fourth Amendment. And it requires
the government to establish guidelines to ensure that Americans are not
targeted by this surveillance (``reverse targeting guidelines''), and
requires the government to provide those reverse targeting guidelines
to Congress and the FISA Court.

  The legislation also includes important provisions to increase
transparency and accountability. For example, it requires there be a
comprehensive review of the President's warrantless surveillance
program by the Inspectors General of the Justice Department, the
Directorate of National Intelligence, the National Security Agency, and
the Defense Department--and it provides for them to report the results
to the Intelligence and Judiciary Committees.
  This report will review ``all of the facts necessary to describe the
establishment, implementation, product, and use of the Program,'' as
well as ``communications with, and participation of, individuals and
entities in the private sector related to the Program.''
  I do not find equally satisfactory another aspect of the bill that
involves accountability--the treatment of pending lawsuits against
various telecommunication companies that acted to implement President
Bush's clandestine surveillance program.
  Like the bills I supported earlier, this measure would provide civil
liability protection for private sector companies that provide lawful
assistance to the government in the future. But it differs
significantly in the way it addresses those pending lawsuits, which
deal with the previous actions of the defendant companies.
  Those lawsuits have been consolidated and are pending in one court,
but evidently have made little progress because of the Administration's
argument, still awaiting court resolution, that the suits are barred
because they involve state secrets. My understanding is that the
defendant companies have argued that government's invocation of the
state-secrets privilege has had the result of preventing them from
defending themselves, although at least one company has stated in
regulatory filings that the cases against it are without merit.
  President Bush has insisted that Congress throw these cases out of
court by giving the companies retroactive immunity for whatever they
might have done in connection with the surveillance program, even
though the Administration and the companies themselves insist that
those actions were lawful and that the plaintiffs' complaints against
the companies have no merit.
  Regrettably, the Senate decided to comply with the president's demand
on this point, and its version of this legislation would provide that
retroactive immunity. I do not think that was the right decision
because I agree with the Rocky Mountain News, which in a February 15th
editorial said ``Letting this litigation proceed would not, as Bush
[has] said . . .punish companies that want to `help America.'
Businesses that want to help America need to be mindful of the
Constitution--and so should the government.''
  I supported removing that ``state secret'' barrier and allowing the
companies to defend themselves by demonstrating to the court the
evidence they say supports their arguments in a way that assures the
continued security of that evidence and that avoids the public
disclosure the Administration says would be adverse to the national
interest. This is a process that has worked well in criminal cases, and
while I am certainly not an expert on the matter, I think it can work
when applied to these civil cases.
  In that respect, this bill is similar to the legislation I supported
earlier this year. But it is not identical, and I do not think it is
quite as sound.
  Under this bill, a district court hearing such a case will decide
whether the Attorney General's certification attesting that the
liability protection standard has been met and is supported by
substantial evidence. In making that determination, the court will have
the opportunity to examine the highly classified letters to the
providers that indicated the President had authorized the activity and
that it had been determined to be lawful.

[[Page H5772]]

  That is not as strong a requirement for accountability as I would
prefer. However, in such cases both plaintiffs and defendants will have
the opportunity to file public briefs on legal issues and the court
should include in any public order a description of the legal standards
that govern the order.
  And, importantly, this immunity provision does not apply to any
actions against the Government for any alleged injuries caused by
government officials.
  Madam Speaker, as Benjamin Franklin has warned us, people who value
security over liberty will get neither--and the Bush Administration has
finally agreed to end its disregard for liberty and agree to effective
judicial oversight and involvement in intelligence surveillance.
  That agreement that is embodied in this bill, and the choice before
us now is whether to reject it or to support the compromise measure now
before us.
  After careful review, I have concluded that the bill adequately meets
the test of protecting civil liberties while giving our country tools
needed to effectively combat terrorism.
  So, while--like any compromise--the bill is not ideal, I have decided
the correct decision--the one that will fulfill my responsibility to
protect both our national security and the civil liberties that make
our nation worth defending--is to vote for it.
  Mr. ETHERIDGE. Madam Speaker, I rise in support of H.R. 6304, FISA
Amendments Act. This bipartisan bill takes steps to increase our
Nation's security while also protecting Americans' civil liberties.
  H.R. 6304, FISA Amendments Act, provides the critical tools that our
intelligence community needs to ensure the safety of our Nation. With
many surveillance warrants set to expire in the coming weeks, the
intelligence community needs a strong and dependable set of guidelines
to follow while conducting surveillance. H.R. 6304 allows the
Government to authorize surveillance in the case of an emergency
situation, provided that they return to the FISA court within 7 days to
apply for a warrant.
  This bill also includes a number of provisions that significantly
strengthen the protection of our civil rights. H.R. 6304 clarifies that
FISA is the exclusive means for conducting surveillance in the United
States, prohibiting any President from using executive power to conduct
a warrantless wiretapping program. This bill also requires the
Government to obtain an individual warrant from the FISA Court before
conducting surveillance on a United States citizen. This warrant must
be based on probable cause, and the provision now includes American
citizens abroad as well. H.R. 6304 requires prior review and approval
of the intelligence community's targeting and minimization procedures
that ensure that any inadvertently intercepted communications by
American citizens are destroyed. Finally, the FISA Amendments Act adds
a strong layer of oversight to this process by directing the Inspectors
General from Justice, State, Defense, the DNI, and NSA to review
surveillance procedures and submit their findings to Congress.
  H.R. 6304 rejects blanket immunity for telecommunications companies
that may have participated in the administration's warrantless
wiretapping program. Under this bill, lawsuits against these companies
would be determined by Federal district courts. These
telecommunications companies will have to prove that the Administration
provided written assurance that their activities were legal. There is
no immunity for any government official who may have violated the law
included in this legislation.
  This bill is much stronger than the Senate version, and will protect
both our security and the civil liberties that we enjoy. I support the
passage of H.R. 6304, FISA Amendments Act, and I urge my colleagues to
vote in favor of this bipartisan measure as well.
  Mr. LANGEVIN. Madam Speaker, I rise in support of the FISA Amendments
Act of 2008. As a member of the Intelligence Committee, I know we must
give our intelligence community the proper tools to protect us while
upholding the civil liberties of Americans. Today's compromise
illustrates what this House can do when it deliberates with care, holds
steady against fear-mongering, and acts in the best interest of the
country and its citizens.
  This bill is strong on civil liberties, and includes protections
against infringement of our Constitutional right to privacy.
  First, the bill clarifies that FISA is the exclusive means by which
the executive branch may conduct electronic surveillance on U.S. soil.
No President will have the power to do an end-run around the legal
requirements of FISA. This provision will prevent the types of abuses
we have witnessed under this administration.
  Second, this Act requires a warrant from the FISA court to conduct
surveillance of Americans abroad. Americans will no longer leave their
constitutional protections at home when working, studying, or traveling
abroad.
  Third, it requires prior approval by the FISA court of procedures the
Government will use when carrying out foreign electronic surveillance.
This will ensure that the Government's efforts are not aimed at
targeting Americans, and that, if an American's communication is
inadvertently intercepted, it is dealt with in a manner that guarantees
legal protections.
  One issue that has been repeatedly addressed is whether
telecommunications companies should be granted immunity against pending
lawsuits for their involvement in the earlier surveillance program. For
a long period of time, the Bush Administration stonewalled and did not
provide Congress the documents we demanded to ascertain the role that
the telecommunications companies played. Since then, I have reviewed a
large number of classified documents on this matter, and I am deeply
concerned about the manner in which the Bush administration conducted
its surveillance program. Therefore, I am pleased that this legislation
preserves a role for the U.S. court system, which will review the
documents produced by the White House and other relevant documents to
decide independently whether the telecommunications companies acted in
good faith when cooperating with the Government. Only after that review
would the courts decide whether the telecommunications companies
deserve any form of liability protection. Furthermore, the legislation
authorizes a joint investigation by the Inspectors General from the
U.S. Department of Justice, National Security Agency, Department of
Defense, and Office of the Director of National Intelligence to review
the past actions of the U.S. Government and report to Congress on their
findings so that we may take appropriate action.
  Many today have said that the legislation before us is not a perfect
bill, and I agree. Nevertheless, it is significantly better than the
bill passed by the Senate and an immense improvement over the Bush
administration's program, neither of which took sufficient steps to
protect Americans' civil liberties. I know that the Democratic
leadership negotiated a good compromise, and I will support it.
However, as I have said before, this legislation will only work if
everyone involved follows the rules and remains within the confines of
the law. Congress must continue to conduct robust oversight to make
sure the law is implemented as intended to maintain the critical and
fragile balance of protecting our Nation and protecting civil
liberties.
  Mr. LEVIN. Madam Speaker, I rise in opposition to the bill. I
appreciate the hard work that Mr. Hoyer and others have done on this
legislation. The bill before the House is a vast improvement over the
administration's Protect America Act, which I strongly opposed last
August. The legislation is also a significant improvement over the
seriously flawed FISA legislation approved by the Senate earlier this
year. In many respects, the bill before the House strikes a reasonable
balance between giving the Government the tools it needs to protect
U.S. national security and protecting Americans' constitutional rights.
  In particular, I am pleased that the bill reaffirms that the Foreign
Intelligence Surveillance Act is the exclusive legal means by which the
Government may conduct surveillance. This stands in stark contrast to
the Bush administration's warrantless surveillance program. I also
support the provisions of this bill that protect Americans traveling
abroad. They need no longer leave their constitutional protections at
home.
  At the end of the day, I oppose this bill because of the provisions
that would confer retroactive immunity on the telecommunications
companies that participated in the Bush administration's warrantless
surveillance program. We are a nation of laws, and it sets a dangerous
precedent for Congress to approve a law that dismisses ongoing court
cases simply on the basis that the companies can show that the
administration told them that its warrantless surveillance program was
legal. A program is not legal just because the administration claims
that it is. The retroactive immunity provisions in this bill shield the
administration from accountability for its actions. The goal here is
not to harm the telecommunications carriers, but rather to get to the
truth of what happened. A much better alternative would be to grant
indemnification to the companies and go forward with the trials.
  Irrespective of the outcome of today's vote, we need a full
accounting of the administration's surveillance program, and the bill
before the House provides for an Inspectors General audit describing
all Federal programs involving warrantless surveillance conducted since
September 11, 2001. The audit is to be completed within 1 year.
Congress must get to the bottom of what happened and prevent it from
happening again. It is essential that Congress follow up on the audit's
findings with robust oversight.
  Mr. DINGELL. Madam Speaker, while l cannot support the legislation
before us today, I commend Majority Leader Hoyer for the work he has
done to negotiate a bill that is substantially better than the version
that passed in the Senate. This legislation, which will be the
exclusive mechanism for the Government to conduct surveillance within
the United States,

[[Page H5773]]

contains provisions that will provide greater protections against
unwarranted and unconstitutional searches of American citizens.
  Despite the many improvements Mr. Hoyer was able to obtain, I
unfortunately still cannot support this legislation because it contains
a provision that will grant immunity to the telecommunications
companies that assisted the President with his illegal and unauthorized
warrantless wiretapping program. I have consistently said that it is
not appropriate for Congress to grant these companies immunity for
their actions without having an understanding of what it is that they
did. This is not only because it will hold the telecommunications
companies accountable for their actions, but because it is the only way
of finding out just how extensive the President's illegal wiretapping
program really was. In other words, this provision will enable the Bush
administration to continue suppressing facts and information about the
Government's own misbehavior and wrongdoing.
  The immunity provision contained in this bill purporting to allow for
judicial review to determine whether immunity is appropriate is a sham.
As drafted, courts will have no real discretion and will be forced to
grant immunity so long as the Government claims its actions were legal.
However, the court is under no obligation to investigate whether the
Government's claims are true. Anyone following the headlines recently,
who has read about the recent Supreme Court decision overturning the
administration's argument that it has the authority to detain people
indefinitely in Guantanamo Bay, or about the hearings held by Senator
Carl Levin and the Senate Armed Services Committee uncovering evidence
that top civilian leadership at the Department of Defense authored
memos arguing it was legal for the military to torture detainees,
should be extremely wary of trusting President Bush to decide whether
or not it is legal to spy on Americans.
  Mr. HALL of New York. I have consistently supported modernizing the
existing FISA law to give our Government the tools it needs to identify
and defeat terrorists in today's high-tech world, while at the same
time preserving the freedoms and rights that define America. I have
voted three times to pass legislation that would strengthen and
modernize FISA and reaffirm the rule of law. Despite some improvements
over previous attempts to update FISA, the bill considered by the House
today regrettably falls short of achieving that critical balance. The
rule of law lies at the core of America's founding principles, and the
language in this bill was too weak to ensue that any breach of our laws
that may have occurred under the warrantless wiretapping program will
be fully addressed. It is not appropriate to deny Americans the right
to pursue these matters in court, or to short-circuit the judicial
review that lies at the heart of our system of checks and balances,
which is the bedrock of our Constitution. Accordingly, I voted against
this bill.
  Mr. BLUMENAUER. Madam Speaker, I appreciate the hard work put in by
my colleagues on both sides of the aisle and in both chambers. For the
past year we've participated in substantial and sometimes heated debate
on the issue of surveillance and foreign intelligence. I appreciate the
good faith efforts of our leadership, particularly Mr. Hoyer, as we try
to craft legislation that keeps both our liberties and our persons
safe.
  For the past seven years I have been highly critical of Republican
wiretapping legislation. I voted against past efforts to expand this
administration's ability to intrude in the lives of unknowing and
innocent Americans. I supported the expiration of the disgraceful
Protect America Act. And I remain confident that the dedicated members
of the intelligence community do not need to violate the rights of
Americans in order to protect them.
  I have heard some say that the enemies of America take on many forms.
To them I say: Let us be sure one of those forms is not our own
government.
  Ultimately this is a compromise that falls short. Any gains in
security that may be achieved are temporary and are more than
outweighed by the longer-term loss of civil liberties and oversight.
Although this bill is comparatively better than the Senate's version, I
am troubled by the lack of robust government oversight, the absence of
meaningful court review, and the risk to American liberties.
  Of particular concern is the granting of de facto retroactive
immunity to the telecommunications companies that cooperated with the
administration. A `doctor's note' from the Attorney General cannot be
allowed to circumvent the entire judicial process.
  I am equally concerned with the timeline of this bill, and strongly
oppose authorizing this legislation for four years. This will extend
the Bush legacy throughout the next administration and the next two
sessions of Congress. Frankly I see no reason to rush into a compromise
that comes up this short. The American people would be better served if
we continued to debate this issue and took up a bill after we have seen
the last of this administration. Americans demand and deserve
protection of their basic civil rights and this can be accomplished
while providing the means necessary for our intelligence community to
do its job.
  Mr. NADLER. Madam Speaker, Members of the House must decide today
whether to uphold the rule of low and the supremacy of the Constitution
or whether to protect and reward the lawless behavior of the
administration and of the telecommunications companies that
participated in its clearly illegal program of spying on innocent
Americans.
  This bill limits the courts hearing lawsuits alleging illegal
wiretapping to consider only whether the telecom companies received a
``written request or directive . . . indicating that the activity was [
] authorized by the President; and [ ] determined to be lawful''--not
whether the request was actually lawful or whether the telecom
companies knew that it was unlawful.
  The bill is a fig-leaf, granting blanket immunity to the telecom
companies for illegal acts without allowing the courts to consider the
facts or the law. It denies people whose rights were violated their
fair day in court, and it denies the American people their right to
have the actions of the administration subjected to fair and
independent scrutiny.
  Even the courts' limited review will remain secret. The lawsuits will
be dismissed, but the basis for the dismissal--that the defendants were
innocent of misconduct, or that they were guilty but Congress commands
their immunity--must remain secret.
  And the constitutionality of the immunity granted by this bill is
very questionable. As Judge Walker put it in the AT&T case:

       AT&T's alleged actions here violate the constitutional
     rights clearly established in [the] Keith decision. Moreover,
     because `the very action in question has previously been held
     unlawful,' AT&T cannot seriously contend that a reasonable
     entity in its position could have believed that the alleged
     domestic dragnet was legal.

  I would hope that the courts will find that, because the
Constitutional rights of Americans have been violated, Congress'
attempt to prevent court review is unconstitutional.
  The bill also reiterates than FISA and specified other statutes are
the exclusive legal authority for electronic surveillance. The Act has
always said that. This bill adds some new mechanisms to ensure that any
future legislation may not be read to override this exclusivity by
implication, but only by explicitly saying that that is its purpose.
  No one and no court should draw the false conclusion that we are
thereby implying that the exclusivity provision was, or could have
been, overridden either by the President's claim of inherent authority
under Article II of the Constitution, or by the Authorization for the
Use of Military Force of 2001. This bill does not say or imply that. If
there is any doubt of this point, the blanket immunity provisions of
this bill reflect Congress' understanding that this domestic spying was
not legal. If it were, there would not be any necessity for these
provisions.
  This bill abandons the Constitution's protections and insulates
lawless behavior from legal scrutiny.
  I urge a ``no'' vote.
  Mr. BOSWELL. Madam Speaker, I rise in support of H.R. 6304.
  This is the kind of work I came to Congress hoping for--bipartisan
legislation that protects our security and our liberty. It's a solid
compromise that does what it needs to do for the country.
  One of my specific concerns in FISA reform over the last year has
been finding a way to protect reasonable private companies, who
assisted government out of patriotism.
  This bill does that. It doesn't give anyone a free pass, but it
allows companies to come before the courts and make their case in order
to be protected from lawsuits.
  That's a good result, and I thank Chairman Reyes for his work in
reaching this reasonable bipartisan compromise.
  I urge my colleagues to vote ``yes.''
  Ms. GINNY BROWN-WAITE of Florida. Madam Speaker, I rise today in
support of H.R. 6304, a bill to reauthorize the Foreign Intelligence
Surveillance Act and to protect America from foreign threats.
  For the past several months, I have heard from hundreds of
constituents on the issue of FISA.
  Each one of them expressed their alarm and disbelief that the House
Majority would repeatedly refuse to call a vote on bipartisan
legislation to extend FISA and address our grave vulnerability to
terrorist attacks.
  Today I am pleased that the Majority leadership has finally reached
across the aisle to put together a compromise bill, and fulfill one of
its fundamental tasks--to ensure the security of this great Nation.
  This compromise is also a reminder of what I have always believed,
that no one side can do it alone; both parties must work together to
ensure our safety.
  In such uncertain times, when it is essential that our government
utilize every available tool

[[Page H5774]]

to protect American citizens, having the ability to collect
intelligence responsibly is essential.
  While there is no excuse for the delay in bringing this critical bill
to the floor, we must now move forward together to pass H.R. 6304 and
restore our Nation's intelligence capabilities.
  Mr. REYES. Madam Speaker, I yield back the remainder of our time.
  The SPEAKER pro tempore. All time for debate has expired.
  Pursuant to House Resolution 1285, the bill is considered read and
the previous question is ordered.
  The question is on the engrossment and third reading of the bill.
  The bill was ordered to be engrossed and read a third time, and was
read the third time.
  The SPEAKER pro tempore. The question is on the passage of the bill.
  The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
  Mr. CONYERS. Madam Speaker, on that I demand the yeas and nays.
  The yeas and nays were ordered.
  The vote was taken by electronic device, and there were--yeas 293,
nays 129, not voting 13, as follows:

                             [Roll No. 437]

                               YEAS--293

     Ackerman
     Aderholt
     Akin
     Alexander
     Altmire
     Arcuri
     Baca
     Bachmann
     Bachus
     Baird
     Barrett (SC)
     Barrow
     Bartlett (MD)
     Barton (TX)
     Bean
     Berkley
     Berman
     Berry
     Biggert
     Bilbray
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Blackburn
     Blunt
     Boehner
     Bonner
     Bono Mack
     Boozman
     Boren
     Boswell
     Boucher
     Boustany
     Boyd (FL)
     Boyda (KS)
     Brady (TX)
     Broun (GA)
     Brown (SC)
     Brown, Corrine
     Buchanan
     Burgess
     Burton (IN)
     Butterfield
     Buyer
     Calvert
     Camp (MI)
     Campbell (CA)
     Cantor
     Capito
     Cardoza
     Carney
     Carter
     Castle
     Castor
     Cazayoux
     Chabot
     Chandler
     Childers
     Cleaver
     Clyburn
     Coble
     Cole (OK)
     Conaway
     Cooper
     Costa
     Cramer
     Crenshaw
     Crowley
     Cubin
     Cuellar
     Culberson
     Davis (AL)
     Davis (KY)
     Davis, David
     Davis, Lincoln
     Davis, Tom
     Deal (GA)
     Dent
     Diaz-Balart, L.
     Diaz-Balart, M.
     Dicks
     Donnelly
     Doolittle
     Drake
     Dreier
     Duncan
     Edwards (TX)
     Ehlers
     Ellsworth
     Emanuel
     Emerson
     Engel
     English (PA)
     Etheridge
     Everett
     Fallin
     Feeney
     Ferguson
     Flake
     Forbes
     Fortenberry
     Fossella
     Foxx
     Franks (AZ)
     Frelinghuysen
     Gallegly
     Garrett (NJ)
     Gerlach
     Giffords
     Gillibrand
     Gingrey
     Goode
     Goodlatte
     Gordon
     Granger
     Graves
     Green, Al
     Green, Gene
     Gutierrez
     Hall (TX)
     Harman
     Hastings (FL)
     Hastings (WA)
     Hayes
     Heller
     Hensarling
     Herger
     Herseth Sandlin
     Higgins
     Hinojosa
     Hobson
     Hoekstra
     Holden
     Hoyer
     Hulshof
     Hunter
     Inglis (SC)
     Issa
     Johnson, Sam
     Jordan
     Kanjorski
     Keller
     Kildee
     Kind
     King (IA)
     King (NY)
     Kingston
     Kirk
     Klein (FL)
     Kline (MN)
     Knollenberg
     Kuhl (NY)
     LaHood
     Lamborn
     Lampson
     Langevin
     Latham
     LaTourette
     Latta
     Lewis (CA)
     Lewis (KY)
     Linder
     Lipinski
     LoBiondo
     Lowey
     Lucas
     Lungren, Daniel E.
     Mack
     Mahoney (FL)
     Manzullo
     Marchant
     Marshall
     Matheson
     McCarthy (CA)
     McCarthy (NY)
     McCaul (TX)
     McCotter
     McCrery
     McHenry
     McHugh
     McIntyre
     McKeon
     McMorris Rodgers
     McNerney
     Meeks (NY)
     Melancon
     Mica
     Miller (FL)
     Miller (MI)
     Miller, Gary
     Mitchell
     Moore (KS)
     Moran (KS)
     Murphy, Patrick
     Murphy, Tim
     Murtha
     Musgrave
     Myrick
     Neugebauer
     Nunes
     Ortiz
     Pearce
     Pelosi
     Pence
     Perlmutter
     Peterson (MN)
     Petri
     Pickering
     Pitts
     Platts
     Poe
     Pomeroy
     Porter
     Price (GA)
     Pryce (OH)
     Putnam
     Radanovich
     Rahall
     Ramstad
     Regula
     Rehberg
     Reichert
     Renzi
     Reyes
     Richardson
     Rodriguez
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Ros-Lehtinen
     Roskam
     Ross
     Royce
     Ruppersberger
     Ryan (WI)
     Salazar
     Sali
     Saxton
     Scalise
     Schiff
     Schmidt
     Scott (GA)
     Sensenbrenner
     Sessions
     Sestak
     Shadegg
     Shays
     Sherman
     Shimkus
     Shuler
     Shuster
     Simpson
     Sires
     Skelton
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Snyder
     Souder
     Space
     Spratt
     Stearns
     Stupak
     Sullivan
     Tancredo
     Tanner
     Tauscher
     Taylor
     Terry
     Thompson (MS)
     Thornberry
     Tiberi
     Turner
     Udall (CO)
     Upton
     Walberg
     Walden (OR)
     Walsh (NY)
     Wamp
     Weldon (FL)
     Westmoreland
     Whitfield (KY)
     Wilson (NM)
     Wilson (OH)
     Wilson (SC)
     Wittman (VA)
     Wolf
     Yarmuth
     Young (AK)
     Young (FL)

                               NAYS--129

     Abercrombie
     Allen
     Andrews
     Baldwin
     Becerra
     Blumenauer
     Brady (PA)
     Braley (IA)
     Capps
     Capuano
     Carnahan
     Carson
     Clarke
     Clay
     Cohen
     Conyers
     Costello
     Courtney
     Cummings
     Davis (CA)
     Davis (IL)
     DeFazio
     DeGette
     Delahunt
     DeLauro
     Dingell
     Doggett
     Doyle
     Edwards (MD)
     Ellison
     Eshoo
     Farr
     Fattah
     Filner
     Foster
     Frank (MA)
     Gonzalez
     Grijalva
     Hall (NY)
     Hare
     Hill
     Hinchey
     Hirono
     Hodes
     Holt
     Honda
     Hooley
     Inslee
     Israel
     Jackson (IL)
     Jackson-Lee (TX)
     Jefferson
     Johnson (GA)
     Johnson (IL)
     Johnson, E. B.
     Jones (OH)
     Kagen
     Kaptur
     Kennedy
     Kilpatrick
     Kucinich
     Larsen (WA)
     Larson (CT)
     Lee
     Levin
     Lewis (GA)
     Loebsack
     Lofgren, Zoe
     Lynch
     Maloney (NY)
     Markey
     Matsui
     McCollum (MN)
     McDermott
     McGovern
     McNulty
     Meek (FL)
     Michaud
     Miller (NC)
     Miller, George
     Mollohan
     Moore (WI)
     Moran (VA)
     Murphy (CT)
     Nadler
     Napolitano
     Neal (MA)
     Oberstar
     Obey
     Olver
     Pallone
     Pascrell
     Pastor
     Payne
     Price (NC)
     Rangel
     Rothman
     Roybal-Allard
     Ryan (OH)
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Schakowsky
     Schwartz
     Scott (VA)
     Serrano
     Shea-Porter
     Slaughter
     Solis
     Speier
     Sutton
     Thompson (CA)
     Tierney
     Towns
     Tsongas
     Udall (NM)
     Van Hollen
     Velazquez
     Walz (MN)
     Wasserman Schultz
     Waters
     Watson
     Watt
     Waxman
     Weiner
     Welch (VT)
     Wexler
     Woolsey
     Wu

                             NOT VOTING--13

     Brown-Waite, Ginny
     Cannon
     Gilchrest
     Gohmert
     Jones (NC)
     Paul
     Peterson (PA)
     Reynolds
     Rush
     Stark
     Tiahrt
     Visclosky
     Weller


                Announcement by the Speaker Pro Tempore

  The SPEAKER pro tempore (during the vote). There are 2 minutes
remaining in this vote.

                              {time}  1248

  Mr. FRANK of Massachusetts, Mr. JEFFERSON, Mrs. CAPPS and Ms. KAPTUR
changed their vote from ``yea'' to ``nay.''
  Mr. BERMAN changed his vote from ``nay'' to ``yea.''
  So the bill was passed.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.
  Stated against:
  Mr. VISCLOSKY. Madam Speaker, had I been present for rollcall 437,
H.R. 6304, on passage of a measure to amend the Foreign Intelligence
Surveillance Act of 1978 to establish a procedure for authorizing
certain acquisitions of foreign intelligence, and for other purposes, I
would have voted ``nay.''

                          ____________________