[Congressional Record: June 20, 2008 (House)]
[Page H5743-H5774]
FISA AMENDMENTS ACT OF 2008
Mr. CONYERS. Madam Speaker, pursuant to House Resolution 1285, I call
up the bill (H.R. 6304) to amend the Foreign Intelligence Surveillance
Act of 1978 to establish a procedure for authorizing certain
acquisitions of foreign intelligence, and for other purposes, and ask
for its immediate consideration in the House.
The Clerk read the title of the bill.
The text of the bill is as follows:
H.R. 6304
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. SHORT TITLE; TABLE OF CONTENTS.
(a) Short Title.--This Act may be cited as the ``Foreign
Intelligence Surveillance Act of 1978 Amendments Act of
2008'' or the ``FISA Amendments Act of 2008''.
(b) Table of Contents.--The table of contents for this Act
is as follows:
Sec. 1. Short title; table of contents.
TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE
Sec. 101. Additional procedures regarding certain persons outside the
United States.
Sec. 102. Statement of exclusive means by which electronic surveillance
and interception of certain communications may be
conducted.
Sec. 103. Submittal to Congress of certain court orders under the
Foreign Intelligence Surveillance Act of 1978.
Sec. 104. Applications for court orders.
Sec. 105. Issuance of an order.
Sec. 106. Use of information.
Sec. 107. Amendments for physical searches.
Sec. 108. Amendments for emergency pen registers and trap and trace
devices.
Sec. 109. Foreign Intelligence Surveillance Court.
Sec. 110. Weapons of mass destruction.
TITLE II--PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS
Sec. 201. Procedures for implementing statutory defenses under the
Foreign Intelligence Surveillance Act of 1978.
Sec. 202. Technical amendments.
TITLE III--REVIEW OF PREVIOUS ACTIONS
Sec. 301. Review of previous actions.
TITLE IV--OTHER PROVISIONS
Sec. 401. Severability.
Sec. 402. Effective date.
Sec. 403. Repeals.
Sec. 404. Transition procedures.
TITLE I--FOREIGN INTELLIGENCE SURVEILLANCE
SEC. 101. ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS
OUTSIDE THE UNITED STATES.
(a) In General.--The Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1801 et seq.) is amended--
(1) by striking title VII; and
(2) by adding at the end the following:
``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
THE UNITED STATES
``SEC. 701. DEFINITIONS.
``(a) In General.--The terms `agent of a foreign power',
`Attorney General', `contents', `electronic surveillance',
`foreign intelligence information', `foreign power',
`person', `United States', and `United States person' have
the meanings given such terms in section 101, except as
specifically provided in this title.
``(b) Additional Definitions.--
``(1) Congressional intelligence committees.--The term
`congressional intelligence committees' means--
``(A) the Select Committee on Intelligence of the Senate;
and
``(B) the Permanent Select Committee on Intelligence of the
House of Representatives.
``(2) Foreign intelligence surveillance court; court.--The
terms `Foreign Intelligence Surveillance Court' and `Court'
mean the court established under section 103(a).
``(3) Foreign intelligence surveillance court of review;
court of review.--The terms `Foreign Intelligence
Surveillance Court of Review' and `Court of Review' mean the
court established under section 103(b).
``(4) Electronic communication service provider.--The term
`electronic communication service provider' means--
``(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
[[Page H5744]]
``(B) a provider of electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
``(C) a provider of a remote computing service, as that
term is defined in section 2711 of title 18, United States
Code;
``(D) any other communication service provider who has
access to wire or electronic communications either as such
communications are transmitted or as such communications are
stored; or
``(E) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), or (D).
``(5) Intelligence community.--The term `intelligence
community' has the meaning given the term in section 3(4) of
the National Security Act of 1947 (50 U.S.C. 401a(4)).
``SEC. 702. PROCEDURES FOR TARGETING CERTAIN PERSONS OUTSIDE
THE UNITED STATES OTHER THAN UNITED STATES
PERSONS.
``(a) Authorization.--Notwithstanding any other provision
of law, upon the issuance of an order in accordance with
subsection (i)(3) or a determination under subsection (c)(2),
the Attorney General and the Director of National
Intelligence may authorize jointly, for a period of up to 1
year from the effective date of the authorization, the
targeting of persons reasonably believed to be located
outside the United States to acquire foreign intelligence
information.
``(b) Limitations.--An acquisition authorized under
subsection (a)--
``(1) may not intentionally target any person known at the
time of acquisition to be located in the United States;
``(2) may not intentionally target a person reasonably
believed to be located outside the United States if the
purpose of such acquisition is to target a particular, known
person reasonably believed to be in the United States;
``(3) may not intentionally target a United States person
reasonably believed to be located outside the United States;
``(4) may not intentionally acquire any communication as to
which the sender and all intended recipients are known at the
time of the acquisition to be located in the United States;
and
``(5) shall be conducted in a manner consistent with the
fourth amendment to the Constitution of the United States.
``(c) Conduct of Acquisition.--
``(1) In general.--An acquisition authorized under
subsection (a) shall be conducted only in accordance with--
``(A) the targeting and minimization procedures adopted in
accordance with subsections (d) and (e); and
``(B) upon submission of a certification in accordance with
subsection (g), such certification.
``(2) Determination.--A determination under this paragraph
and for purposes of subsection (a) is a determination by the
Attorney General and the Director of National Intelligence
that exigent circumstances exist because, without immediate
implementation of an authorization under subsection (a),
intelligence important to the national security of the United
States may be lost or not timely acquired and time does not
permit the issuance of an order pursuant to subsection (i)(3)
prior to the implementation of such authorization.
``(3) Timing of determination.--The Attorney General and
the Director of National Intelligence may make the
determination under paragraph (2)--
``(A) before the submission of a certification in
accordance with subsection (g); or
``(B) by amending a certification pursuant to subsection
(i)(1)(C) at any time during which judicial review under
subsection (i) of such certification is pending.
``(4) Construction.--Nothing in title I shall be construed
to require an application for a court order under such title
for an acquisition that is targeted in accordance with this
section at a person reasonably believed to be located outside
the United States.
``(d) Targeting Procedures.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt targeting procedures that are reasonably designed
to--
``(A) ensure that any acquisition authorized under
subsection (a) is limited to targeting persons reasonably
believed to be located outside the United States; and
``(B) prevent the intentional acquisition of any
communication as to which the sender and all intended
recipients are known at the time of the acquisition to be
located in the United States.
``(2) Judicial review.--The procedures adopted in
accordance with paragraph (1) shall be subject to judicial
review pursuant to subsection (i).
``(e) Minimization Procedures.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt minimization procedures that meet the definition
of minimization procedures under section 101(h) or 301(4), as
appropriate, for acquisitions authorized under subsection
(a).
``(2) Judicial review.--The minimization procedures adopted
in accordance with paragraph (1) shall be subject to judicial
review pursuant to subsection (i).
``(f) Guidelines for Compliance With Limitations.--
``(1) Requirement to adopt.--The Attorney General, in
consultation with the Director of National Intelligence,
shall adopt guidelines to ensure--
``(A) compliance with the limitations in subsection (b);
and
``(B) that an application for a court order is filed as
required by this Act.
``(2) Submission of guidelines.--The Attorney General shall
provide the guidelines adopted in accordance with paragraph
(1) to--
``(A) the congressional intelligence committees;
``(B) the Committees on the Judiciary of the Senate and the
House of Representatives; and
``(C) the Foreign Intelligence Surveillance Court.
``(g) Certification.--
``(1) In general.--
``(A) Requirement.--Subject to subparagraph (B), prior to
the implementation of an authorization under subsection (a),
the Attorney General and the Director of National
Intelligence shall provide to the Foreign Intelligence
Surveillance Court a written certification and any supporting
affidavit, under oath and under seal, in accordance with this
subsection.
``(B) Exception.--If the Attorney General and the Director
of National Intelligence make a determination under
subsection (c)(2) and time does not permit the submission of
a certification under this subsection prior to the
implementation of an authorization under subsection (a), the
Attorney General and the Director of National Intelligence
shall submit to the Court a certification for such
authorization as soon as practicable but in no event later
than 7 days after such determination is made.
``(2) Requirements.--A certification made under this
subsection shall--
``(A) attest that--
``(i) there are procedures in place that have been
approved, have been submitted for approval, or will be
submitted with the certification for approval by the Foreign
Intelligence Surveillance Court that are reasonably designed
to--
``(I) ensure that an acquisition authorized under
subsection (a) is limited to targeting persons reasonably
believed to be located outside the United States; and
``(II) prevent the intentional acquisition of any
communication as to which the sender and all intended
recipients are known at the time of the acquisition to be
located in the United States;
``(ii) the minimization procedures to be used with respect
to such acquisition--
``(I) meet the definition of minimization procedures under
section 101(h) or 301(4), as appropriate; and
``(II) have been approved, have been submitted for
approval, or will be submitted with the certification for
approval by the Foreign Intelligence Surveillance Court;
``(iii) guidelines have been adopted in accordance with
subsection (f) to ensure compliance with the limitations in
subsection (b) and to ensure that an application for a court
order is filed as required by this Act;
``(iv) the procedures and guidelines referred to in clauses
(i), (ii), and (iii) are consistent with the requirements of
the fourth amendment to the Constitution of the United
States;
``(v) a significant purpose of the acquisition is to obtain
foreign intelligence information;
``(vi) the acquisition involves obtaining foreign
intelligence information from or with the assistance of an
electronic communication service provider; and
``(vii) the acquisition complies with the limitations in
subsection (b);
``(B) include the procedures adopted in accordance with
subsections (d) and (e);
``(C) be supported, as appropriate, by the affidavit of any
appropriate official in the area of national security who
is--
``(i) appointed by the President, by and with the advice
and consent of the Senate; or
``(ii) the head of an element of the intelligence
community;
``(D) include--
``(i) an effective date for the authorization that is at
least 30 days after the submission of the written
certification to the court; or
``(ii) if the acquisition has begun or the effective date
is less than 30 days after the submission of the written
certification to the court, the date the acquisition began or
the effective date for the acquisition; and
``(E) if the Attorney General and the Director of National
Intelligence make a determination under subsection (c)(2),
include a statement that such determination has been made.
``(3) Change in effective date.--The Attorney General and
the Director of National Intelligence may advance or delay
the effective date referred to in paragraph (2)(D) by
submitting an amended certification in accordance with
subsection (i)(1)(C) to the Foreign Intelligence Surveillance
Court for review pursuant to subsection (i).
``(4) Limitation.--A certification made under this
subsection is not required to identify the specific
facilities, places, premises, or property at which an
acquisition authorized under subsection (a) will be directed
or conducted.
``(5) Maintenance of certification.--The Attorney General
or a designee of the Attorney General shall maintain a copy
of a certification made under this subsection.
``(6) Review.--A certification submitted in accordance with
this subsection shall be subject to judicial review pursuant
to subsection (i).
``(h) Directives and Judicial Review of Directives.--
``(1) Authority.--With respect to an acquisition authorized
under subsection (a), the
[[Page H5745]]
Attorney General and the Director of National Intelligence
may direct, in writing, an electronic communication service
provider to--
``(A) immediately provide the Government with all
information, facilities, or assistance necessary to
accomplish the acquisition in a manner that will protect the
secrecy of the acquisition and produce a minimum of
interference with the services that such electronic
communication service provider is providing to the target of
the acquisition; and
``(B) maintain under security procedures approved by the
Attorney General and the Director of National Intelligence
any records concerning the acquisition or the aid furnished
that such electronic communication service provider wishes to
maintain.
``(2) Compensation.--The Government shall compensate, at
the prevailing rate, an electronic communication service
provider for providing information, facilities, or assistance
in accordance with a directive issued pursuant to paragraph
(1).
``(3) Release from liability.--No cause of action shall lie
in any court against any electronic communication service
provider for providing any information, facilities, or
assistance in accordance with a directive issued pursuant to
paragraph (1).
``(4) Challenging of directives.--
``(A) Authority to challenge.--An electronic communication
service provider receiving a directive issued pursuant to
paragraph (1) may file a petition to modify or set aside such
directive with the Foreign Intelligence Surveillance Court,
which shall have jurisdiction to review such petition.
``(B) Assignment.--The presiding judge of the Court shall
assign a petition filed under subparagraph (A) to 1 of the
judges serving in the pool established under section
103(e)(1) not later than 24 hours after the filing of such
petition.
``(C) Standards for review.--A judge considering a petition
filed under subparagraph (A) may grant such petition only if
the judge finds that the directive does not meet the
requirements of this section, or is otherwise unlawful.
``(D) Procedures for initial review.--A judge shall conduct
an initial review of a petition filed under subparagraph (A)
not later than 5 days after being assigned such petition. If
the judge determines that such petition does not consist of
claims, defenses, or other legal contentions that are
warranted by existing law or by a nonfrivolous argument for
extending, modifying, or reversing existing law or for
establishing new law, the judge shall immediately deny such
petition and affirm the directive or any part of the
directive that is the subject of such petition and order the
recipient to comply with the directive or any part of it.
Upon making a determination under this subparagraph or
promptly thereafter, the judge shall provide a written
statement for the record of the reasons for such
determination.
``(E) Procedures for plenary review.--If a judge determines
that a petition filed under subparagraph (A) requires plenary
review, the judge shall affirm, modify, or set aside the
directive that is the subject of such petition not later than
30 days after being assigned such petition. If the judge does
not set aside the directive, the judge shall immediately
affirm or affirm with modifications the directive, and order
the recipient to comply with the directive in its entirety or
as modified. The judge shall provide a written statement for
the record of the reasons for a determination under this
subparagraph.
``(F) Continued effect.--Any directive not explicitly
modified or set aside under this paragraph shall remain in
full effect.
``(G) Contempt of court.--Failure to obey an order issued
under this paragraph may be punished by the Court as contempt
of court.
``(5) Enforcement of directives.--
``(A) Order to compel.--If an electronic communication
service provider fails to comply with a directive issued
pursuant to paragraph (1), the Attorney General may file a
petition for an order to compel the electronic communication
service provider to comply with the directive with the
Foreign Intelligence Surveillance Court, which shall have
jurisdiction to review such petition.
``(B) Assignment.--The presiding judge of the Court shall
assign a petition filed under subparagraph (A) to 1 of the
judges serving in the pool established under section
103(e)(1) not later than 24 hours after the filing of such
petition.
``(C) Procedures for review.--A judge considering a
petition filed under subparagraph (A) shall, not later than
30 days after being assigned such petition, issue an order
requiring the electronic communication service provider to
comply with the directive or any part of it, as issued or as
modified, if the judge finds that the directive meets the
requirements of this section and is otherwise lawful. The
judge shall provide a written statement for the record of the
reasons for a determination under this paragraph.
``(D) Contempt of court.--Failure to obey an order issued
under this paragraph may be punished by the Court as contempt
of court.
``(E) Process.--Any process under this paragraph may be
served in any judicial district in which the electronic
communication service provider may be found.
``(6) Appeal.--
``(A) Appeal to the court of review.--The Government or an
electronic communication service provider receiving a
directive issued pursuant to paragraph (1) may file a
petition with the Foreign Intelligence Surveillance Court of
Review for review of a decision issued pursuant to paragraph
(4) or (5). The Court of Review shall have jurisdiction to
consider such petition and shall provide a written statement
for the record of the reasons for a decision under this
subparagraph.
``(B) Certiorari to the supreme court.--The Government or
an electronic communication service provider receiving a
directive issued pursuant to paragraph (1) may file a
petition for a writ of certiorari for review of a decision of
the Court of Review issued under subparagraph (A). The record
for such review shall be transmitted under seal to the
Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``(i) Judicial Review of Certifications and Procedures.--
``(1) In general.--
``(A) Review by the foreign intelligence surveillance
court.--The Foreign Intelligence Surveillance Court shall
have jurisdiction to review a certification submitted in
accordance with subsection (g) and the targeting and
minimization procedures adopted in accordance with
subsections (d) and (e), and amendments to such certification
or such procedures.
``(B) Time period for review.--The Court shall review a
certification submitted in accordance with subsection (g) and
the targeting and minimization procedures adopted in
accordance with subsections (d) and (e) and shall complete
such review and issue an order under paragraph (3) not later
than 30 days after the date on which such certification and
such procedures are submitted.
``(C) Amendments.--The Attorney General and the Director of
National Intelligence may amend a certification submitted in
accordance with subsection (g) or the targeting and
minimization procedures adopted in accordance with
subsections (d) and (e) as necessary at any time, including
if the Court is conducting or has completed review of such
certification or such procedures, and shall submit the
amended certification or amended procedures to the Court not
later than 7 days after amending such certification or such
procedures. The Court shall review any amendment under this
subparagraph under the procedures set forth in this
subsection. The Attorney General and the Director of National
Intelligence may authorize the use of an amended
certification or amended procedures pending the Court's
review of such amended certification or amended procedures.
``(2) Review.--The Court shall review the following:
``(A) Certification.--A certification submitted in
accordance with subsection (g) to determine whether the
certification contains all the required elements.
``(B) Targeting procedures.--The targeting procedures
adopted in accordance with subsection (d) to assess whether
the procedures are reasonably designed to--
``(i) ensure that an acquisition authorized under
subsection (a) is limited to targeting persons reasonably
believed to be located outside the United States; and
``(ii) prevent the intentional acquisition of any
communication as to which the sender and all intended
recipients are known at the time of the acquisition to be
located in the United States.
``(C) Minimization procedures.--The minimization procedures
adopted in accordance with subsection (e) to assess whether
such procedures meet the definition of minimization
procedures under section 101(h) or section 301(4), as
appropriate.
``(3) Orders.--
``(A) Approval.--If the Court finds that a certification
submitted in accordance with subsection (g) contains all the
required elements and that the targeting and minimization
procedures adopted in accordance with subsections (d) and (e)
are consistent with the requirements of those subsections and
with the fourth amendment to the Constitution of the United
States, the Court shall enter an order approving the
certification and the use, or continued use in the case of an
acquisition authorized pursuant to a determination under
subsection (c)(2), of the procedures for the acquisition.
``(B) Correction of deficiencies.--If the Court finds that
a certification submitted in accordance with subsection (g)
does not contain all the required elements, or that the
procedures adopted in accordance with subsections (d) and (e)
are not consistent with the requirements of those subsections
or the fourth amendment to the Constitution of the United
States, the Court shall issue an order directing the
Government to, at the Government's election and to the extent
required by the Court's order--
``(i) correct any deficiency identified by the Court's
order not later than 30 days after the date on which the
Court issues the order; or
``(ii) cease, or not begin, the implementation of the
authorization for which such certification was submitted.
``(C) Requirement for written statement.--In support of an
order under this subsection, the Court shall provide,
simultaneously with the order, for the record a written
statement of the reasons for the order.
``(4) Appeal.--
``(A) Appeal to the court of review.--The Government may
file a petition with the Foreign Intelligence Surveillance
Court of Review for review of an order under this subsection.
The Court of Review shall have jurisdiction to consider such
petition. For any decision under this subparagraph affirming,
[[Page H5746]]
reversing, or modifying an order of the Foreign Intelligence
Surveillance Court, the Court of Review shall provide for the
record a written statement of the reasons for the decision.
``(B) Continuation of acquisition pending rehearing or
appeal.--Any acquisition affected by an order under paragraph
(3)(B) may continue--
``(i) during the pendency of any rehearing of the order by
the Court en banc; and
``(ii) if the Government files a petition for review of an
order under this section, until the Court of Review enters an
order under subparagraph (C).
``(C) Implementation pending appeal.--Not later than 60
days after the filing of a petition for review of an order
under paragraph (3)(B) directing the correction of a
deficiency, the Court of Review shall determine, and enter a
corresponding order regarding, whether all or any part of the
correction order, as issued or modified, shall be implemented
during the pendency of the review.
``(D) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review issued under subparagraph
(A). The record for such review shall be transmitted under
seal to the Supreme Court of the United States, which shall
have jurisdiction to review such decision.
``(5) Schedule.--
``(A) Reauthorization of authorizations in effect.--If the
Attorney General and the Director of National Intelligence
seek to reauthorize or replace an authorization issued under
subsection (a), the Attorney General and the Director of
National Intelligence shall, to the extent practicable,
submit to the Court the certification prepared in accordance
with subsection (g) and the procedures adopted in accordance
with subsections (d) and (e) at least 30 days prior to the
expiration of such authorization.
``(B) Reauthorization of orders, authorizations, and
directives.--If the Attorney General and the Director of
National Intelligence seek to reauthorize or replace an
authorization issued under subsection (a) by filing a
certification pursuant to subparagraph (A), that
authorization, and any directives issued thereunder and any
order related thereto, shall remain in effect,
notwithstanding the expiration provided for in subsection
(a), until the Court issues an order with respect to such
certification under paragraph (3) at which time the
provisions of that paragraph and paragraph (4) shall apply
with respect to such certification.
``(j) Judicial Proceedings.--
``(1) Expedited judicial proceedings.--Judicial proceedings
under this section shall be conducted as expeditiously as
possible.
``(2) Time limits.--A time limit for a judicial decision in
this section shall apply unless the Court, the Court of
Review, or any judge of either the Court or the Court of
Review, by order for reasons stated, extends that time as
necessary for good cause in a manner consistent with national
security.
``(k) Maintenance and Security of Records and
Proceedings.--
``(1) Standards.--The Foreign Intelligence Surveillance
Court shall maintain a record of a proceeding under this
section, including petitions, appeals, orders, and statements
of reasons for a decision, under security measures adopted by
the Chief Justice of the United States, in consultation with
the Attorney General and the Director of National
Intelligence.
``(2) Filing and review.--All petitions under this section
shall be filed under seal. In any proceedings under this
section, the Court shall, upon request of the Government,
review ex parte and in camera any Government submission, or
portions of a submission, which may include classified
information.
``(3) Retention of records.--The Attorney General and the
Director of National Intelligence shall retain a directive or
an order issued under this section for a period of not less
than 10 years from the date on which such directive or such
order is issued.
``(l) Assessments and Reviews.--
``(1) Semiannual assessment.--Not less frequently than once
every 6 months, the Attorney General and Director of National
Intelligence shall assess compliance with the targeting and
minimization procedures adopted in accordance with
subsections (d) and (e) and the guidelines adopted in
accordance with subsection (f) and shall submit each
assessment to--
``(A) the Foreign Intelligence Surveillance Court; and
``(B) consistent with the Rules of the House of
Representatives, the Standing Rules of the Senate, and Senate
Resolution 400 of the 94th Congress or any successor Senate
resolution--
``(i) the congressional intelligence committees; and
``(ii) the Committees on the Judiciary of the House of
Representatives and the Senate.
``(2) Agency assessment.--The Inspector General of the
Department of Justice and the Inspector General of each
element of the intelligence community authorized to acquire
foreign intelligence information under subsection (a), with
respect to the department or element of such Inspector
General--
``(A) are authorized to review compliance with the
targeting and minimization procedures adopted in accordance
with subsections (d) and (e) and the guidelines adopted in
accordance with subsection (f);
``(B) with respect to acquisitions authorized under
subsection (a), shall review the number of disseminated
intelligence reports containing a reference to a United
States-person identity and the number of United States-person
identities subsequently disseminated by the element concerned
in response to requests for identities that were not referred
to by name or title in the original reporting;
``(C) with respect to acquisitions authorized under
subsection (a), shall review the number of targets that were
later determined to be located in the United States and, to
the extent possible, whether communications of such targets
were reviewed; and
``(D) shall provide each such review to--
``(i) the Attorney General;
``(ii) the Director of National Intelligence; and
``(iii) consistent with the Rules of the House of
Representatives, the Standing Rules of the Senate, and Senate
Resolution 400 of the 94th Congress or any successor Senate
resolution--
``(I) the congressional intelligence committees; and
``(II) the Committees on the Judiciary of the House of
Representatives and the Senate.
``(3) Annual review.--
``(A) Requirement to conduct.--The head of each element of
the intelligence community conducting an acquisition
authorized under subsection (a) shall conduct an annual
review to determine whether there is reason to believe that
foreign intelligence information has been or will be obtained
from the acquisition. The annual review shall provide, with
respect to acquisitions authorized under subsection (a)--
``(i) an accounting of the number of disseminated
intelligence reports containing a reference to a United
States-person identity;
``(ii) an accounting of the number of United States-person
identities subsequently disseminated by that element in
response to requests for identities that were not referred to
by name or title in the original reporting;
``(iii) the number of targets that were later determined to
be located in the United States and, to the extent possible,
whether communications of such targets were reviewed; and
``(iv) a description of any procedures developed by the
head of such element of the intelligence community and
approved by the Director of National Intelligence to assess,
in a manner consistent with national security, operational
requirements and the privacy interests of United States
persons, the extent to which the acquisitions authorized
under subsection (a) acquire the communications of United
States persons, and the results of any such assessment.
``(B) Use of review.--The head of each element of the
intelligence community that conducts an annual review under
subparagraph (A) shall use each such review to evaluate the
adequacy of the minimization procedures utilized by such
element and, as appropriate, the application of the
minimization procedures to a particular acquisition
authorized under subsection (a).
``(C) Provision of review.--The head of each element of the
intelligence community that conducts an annual review under
subparagraph (A) shall provide such review to--
``(i) the Foreign Intelligence Surveillance Court;
``(ii) the Attorney General;
``(iii) the Director of National Intelligence; and
``(iv) consistent with the Rules of the House of
Representatives, the Standing Rules of the Senate, and Senate
Resolution 400 of the 94th Congress or any successor Senate
resolution--
``(I) the congressional intelligence committees; and
``(II) the Committees on the Judiciary of the House of
Representatives and the Senate.
``SEC. 703. CERTAIN ACQUISITIONS INSIDE THE UNITED STATES
TARGETING UNITED STATES PERSONS OUTSIDE THE
UNITED STATES.
``(a) Jurisdiction of the Foreign Intelligence Surveillance
Court.--
``(1) In general.--The Foreign Intelligence Surveillance
Court shall have jurisdiction to review an application and to
enter an order approving the targeting of a United States
person reasonably believed to be located outside the United
States to acquire foreign intelligence information, if the
acquisition constitutes electronic surveillance or the
acquisition of stored electronic communications or stored
electronic data that requires an order under this Act, and
such acquisition is conducted within the United States.
``(2) Limitation.--If a United States person targeted under
this subsection is reasonably believed to be located in the
United States during the effective period of an order issued
pursuant to subsection (c), an acquisition targeting such
United States person under this section shall cease unless
the targeted United States person is again reasonably
believed to be located outside the United States while an
order issued pursuant to subsection (c) is in effect. Nothing
in this section shall be construed to limit the authority of
the Government to seek an order or authorization under, or
otherwise engage in any activity that is authorized under,
any other title of this Act.
``(b) Application.--
``(1) In general.--Each application for an order under this
section shall be made by a Federal officer in writing upon
oath or affirmation to a judge having jurisdiction under
subsection (a)(1). Each application shall require the
approval of the Attorney General based upon the Attorney
General's finding
[[Page H5747]]
that it satisfies the criteria and requirements of such
application, as set forth in this section, and shall
include--
``(A) the identity of the Federal officer making the
application;
``(B) the identity, if known, or a description of the
United States person who is the target of the acquisition;
``(C) a statement of the facts and circumstances relied
upon to justify the applicant's belief that the United States
person who is the target of the acquisition is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(D) a statement of proposed minimization procedures that
meet the definition of minimization procedures under section
101(h) or 301(4), as appropriate;
``(E) a description of the nature of the information sought
and the type of communications or activities to be subjected
to acquisition;
``(F) a certification made by the Attorney General or an
official specified in section 104(a)(6) that--
``(i) the certifying official deems the information sought
to be foreign intelligence information;
``(ii) a significant purpose of the acquisition is to
obtain foreign intelligence information;
``(iii) such information cannot reasonably be obtained by
normal investigative techniques;
``(iv) designates the type of foreign intelligence
information being sought according to the categories
described in section 101(e); and
``(v) includes a statement of the basis for the
certification that--
``(I) the information sought is the type of foreign
intelligence information designated; and
``(II) such information cannot reasonably be obtained by
normal investigative techniques;
``(G) a summary statement of the means by which the
acquisition will be conducted and whether physical entry is
required to effect the acquisition;
``(H) the identity of any electronic communication service
provider necessary to effect the acquisition, provided that
the application is not required to identify the specific
facilities, places, premises, or property at which the
acquisition authorized under this section will be directed or
conducted;
``(I) a statement of the facts concerning any previous
applications that have been made to any judge of the Foreign
Intelligence Surveillance Court involving the United States
person specified in the application and the action taken on
each previous application; and
``(J) a statement of the period of time for which the
acquisition is required to be maintained, provided that such
period of time shall not exceed 90 days per application.
``(2) Other requirements of the attorney general.--The
Attorney General may require any other affidavit or
certification from any other officer in connection with the
application.
``(3) Other requirements of the judge.--The judge may
require the applicant to furnish such other information as
may be necessary to make the findings required by subsection
(c)(1).
``(c) Order.--
``(1) Findings.--Upon an application made pursuant to
subsection (b), the Foreign Intelligence Surveillance Court
shall enter an ex parte order as requested or as modified by
the Court approving the acquisition if the Court finds that--
``(A) the application has been made by a Federal officer
and approved by the Attorney General;
``(B) on the basis of the facts submitted by the applicant,
for the United States person who is the target of the
acquisition, there is probable cause to believe that the
target is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(C) the proposed minimization procedures meet the
definition of minimization procedures under section 101(h) or
301(4), as appropriate; and
``(D) the application that has been filed contains all
statements and certifications required by subsection (b) and
the certification or certifications are not clearly erroneous
on the basis of the statement made under subsection
(b)(1)(F)(v) and any other information furnished under
subsection (b)(3).
``(2) Probable cause.--In determining whether or not
probable cause exists for purposes of paragraph (1)(B), a
judge having jurisdiction under subsection (a)(1) may
consider past activities of the target and facts and
circumstances relating to current or future activities of the
target. No United States person may be considered a foreign
power, agent of a foreign power, or officer or employee of a
foreign power solely upon the basis of activities protected
by the first amendment to the Constitution of the United
States.
``(3) Review.--
``(A) Limitation on review.--Review by a judge having
jurisdiction under subsection (a)(1) shall be limited to that
required to make the findings described in paragraph (1).
``(B) Review of probable cause.--If the judge determines
that the facts submitted under subsection (b) are
insufficient to establish probable cause under paragraph
(1)(B), the judge shall enter an order so stating and provide
a written statement for the record of the reasons for the
determination. The Government may appeal an order under this
subparagraph pursuant to subsection (f).
``(C) Review of minimization procedures.--If the judge
determines that the proposed minimization procedures referred
to in paragraph (1)(C) do not meet the definition of
minimization procedures under section 101(h) or 301(4), as
appropriate, the judge shall enter an order so stating and
provide a written statement for the record of the reasons for
the determination. The Government may appeal an order under
this subparagraph pursuant to subsection (f).
``(D) Review of certification.--If the judge determines
that an application pursuant to subsection (b) does not
contain all of the required elements, or that the
certification or certifications are clearly erroneous on the
basis of the statement made under subsection (b)(1)(F)(v) and
any other information furnished under subsection (b)(3), the
judge shall enter an order so stating and provide a written
statement for the record of the reasons for the
determination. The Government may appeal an order under this
subparagraph pursuant to subsection (f).
``(4) Specifications.--An order approving an acquisition
under this subsection shall specify--
``(A) the identity, if known, or a description of the
United States person who is the target of the acquisition
identified or described in the application pursuant to
subsection (b)(1)(B);
``(B) if provided in the application pursuant to subsection
(b)(1)(H), the nature and location of each of the facilities
or places at which the acquisition will be directed;
``(C) the nature of the information sought to be acquired
and the type of communications or activities to be subjected
to acquisition;
``(D) a summary of the means by which the acquisition will
be conducted and whether physical entry is required to effect
the acquisition; and
``(E) the period of time during which the acquisition is
approved.
``(5) Directives.--An order approving an acquisition under
this subsection shall direct--
``(A) that the minimization procedures referred to in
paragraph (1)(C), as approved or modified by the Court, be
followed;
``(B) if applicable, an electronic communication service
provider to provide to the Government forthwith all
information, facilities, or assistance necessary to
accomplish the acquisition authorized under such order in a
manner that will protect the secrecy of the acquisition and
produce a minimum of interference with the services that such
electronic communication service provider is providing to the
target of the acquisition;
``(C) if applicable, an electronic communication service
provider to maintain under security procedures approved by
the Attorney General any records concerning the acquisition
or the aid furnished that such electronic communication
service provider wishes to maintain; and
``(D) if applicable, that the Government compensate, at the
prevailing rate, such electronic communication service
provider for providing such information, facilities, or
assistance.
``(6) Duration.--An order approved under this subsection
shall be effective for a period not to exceed 90 days and
such order may be renewed for additional 90-day periods upon
submission of renewal applications meeting the requirements
of subsection (b).
``(7) Compliance.--At or prior to the end of the period of
time for which an acquisition is approved by an order or
extension under this section, the judge may assess compliance
with the minimization procedures referred to in paragraph
(1)(C) by reviewing the circumstances under which information
concerning United States persons was acquired, retained, or
disseminated.
``(d) Emergency Authorization.--
``(1) Authority for emergency authorization.--
Notwithstanding any other provision of this Act, if the
Attorney General reasonably determines that--
``(A) an emergency situation exists with respect to the
acquisition of foreign intelligence information for which an
order may be obtained under subsection (c) before an order
authorizing such acquisition can with due diligence be
obtained, and
``(B) the factual basis for issuance of an order under this
subsection to approve such acquisition exists,
the Attorney General may authorize such acquisition if a
judge having jurisdiction under subsection (a)(1) is informed
by the Attorney General, or a designee of the Attorney
General, at the time of such authorization that the decision
has been made to conduct such acquisition and if an
application in accordance with this section is made to a
judge of the Foreign Intelligence Surveillance Court as soon
as practicable, but not more than 7 days after the Attorney
General authorizes such acquisition.
``(2) Minimization procedures.--If the Attorney General
authorizes an acquisition under paragraph (1), the Attorney
General shall require that the minimization procedures
referred to in subsection (c)(1)(C) for the issuance of a
judicial order be followed.
``(3) Termination of emergency authorization.--In the
absence of a judicial order
[[Page H5748]]
approving an acquisition under paragraph (1), such
acquisition shall terminate when the information sought is
obtained, when the application for the order is denied, or
after the expiration of 7 days from the time of authorization
by the Attorney General, whichever is earliest.
``(4) Use of information.--If an application for approval
submitted pursuant to paragraph (1) is denied, or in any
other case where the acquisition is terminated and no order
is issued approving the acquisition, no information obtained
or evidence derived from such acquisition, except under
circumstances in which the target of the acquisition is
determined not to be a United States person, shall be
received in evidence or otherwise disclosed in any trial,
hearing, or other proceeding in or before any court, grand
jury, department, office, agency, regulatory body,
legislative committee, or other authority of the United
States, a State, or political subdivision thereof, and no
information concerning any United States person acquired from
such acquisition shall subsequently be used or disclosed in
any other manner by Federal officers or employees without the
consent of such person, except with the approval of the
Attorney General if the information indicates a threat of
death or serious bodily harm to any person.
``(e) Release From Liability.--No cause of action shall lie
in any court against any electronic communication service
provider for providing any information, facilities, or
assistance in accordance with an order or request for
emergency assistance issued pursuant to subsection (c) or
(d), respectively.
``(f) Appeal.--
``(1) Appeal to the foreign intelligence surveillance court
of review.--The Government may file a petition with the
Foreign Intelligence Surveillance Court of Review for review
of an order issued pursuant to subsection (c). The Court of
Review shall have jurisdiction to consider such petition and
shall provide a written statement for the record of the
reasons for a decision under this paragraph.
``(2) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review issued under paragraph (1).
The record for such review shall be transmitted under seal to
the Supreme Court of the United States, which shall have
jurisdiction to review such decision.
``(g) Construction.--Except as provided in this section,
nothing in this Act shall be construed to require an
application for a court order for an acquisition that is
targeted in accordance with this section at a United States
person reasonably believed to be located outside the United
States.
``SEC. 704. OTHER ACQUISITIONS TARGETING UNITED STATES
PERSONS OUTSIDE THE UNITED STATES.
``(a) Jurisdiction and Scope.--
``(1) Jurisdiction.--The Foreign Intelligence Surveillance
Court shall have jurisdiction to enter an order pursuant to
subsection (c).
``(2) Scope.--No element of the intelligence community may
intentionally target, for the purpose of acquiring foreign
intelligence information, a United States person reasonably
believed to be located outside the United States under
circumstances in which the targeted United States person has
a reasonable expectation of privacy and a warrant would be
required if the acquisition were conducted inside the United
States for law enforcement purposes, unless a judge of the
Foreign Intelligence Surveillance Court has entered an order
with respect to such targeted United States person or the
Attorney General has authorized an emergency acquisition
pursuant to subsection (c) or (d), respectively, or any other
provision of this Act.
``(3) Limitations.--
``(A) Moving or misidentified targets.--If a United States
person targeted under this subsection is reasonably believed
to be located in the United States during the effective
period of an order issued pursuant to subsection (c), an
acquisition targeting such United States person under this
section shall cease unless the targeted United States person
is again reasonably believed to be located outside the United
States during the effective period of such order.
``(B) Applicability.--If an acquisition for foreign
intelligence purposes is to be conducted inside the United
States and could be authorized under section 703, the
acquisition may only be conducted if authorized under section
703 or in accordance with another provision of this Act other
than this section.
``(C) Construction.--Nothing in this paragraph shall be
construed to limit the authority of the Government to seek an
order or authorization under, or otherwise engage in any
activity that is authorized under, any other title of this
Act.
``(b) Application.--Each application for an order under
this section shall be made by a Federal officer in writing
upon oath or affirmation to a judge having jurisdiction under
subsection (a)(1). Each application shall require the
approval of the Attorney General based upon the Attorney
General's finding that it satisfies the criteria and
requirements of such application as set forth in this section
and shall include--
``(1) the identity of the Federal officer making the
application;
``(2) the identity, if known, or a description of the
specific United States person who is the target of the
acquisition;
``(3) a statement of the facts and circumstances relied
upon to justify the applicant's belief that the United States
person who is the target of the acquisition is--
``(A) a person reasonably believed to be located outside
the United States; and
``(B) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(4) a statement of proposed minimization procedures that
meet the definition of minimization procedures under section
101(h) or 301(4), as appropriate;
``(5) a certification made by the Attorney General, an
official specified in section 104(a)(6), or the head of an
element of the intelligence community that--
``(A) the certifying official deems the information sought
to be foreign intelligence information; and
``(B) a significant purpose of the acquisition is to obtain
foreign intelligence information;
``(6) a statement of the facts concerning any previous
applications that have been made to any judge of the Foreign
Intelligence Surveillance Court involving the United States
person specified in the application and the action taken on
each previous application; and
``(7) a statement of the period of time for which the
acquisition is required to be maintained, provided that such
period of time shall not exceed 90 days per application.
``(c) Order.--
``(1) Findings.--Upon an application made pursuant to
subsection (b), the Foreign Intelligence Surveillance Court
shall enter an ex parte order as requested or as modified by
the Court if the Court finds that--
``(A) the application has been made by a Federal officer
and approved by the Attorney General;
``(B) on the basis of the facts submitted by the applicant,
for the United States person who is the target of the
acquisition, there is probable cause to believe that the
target is--
``(i) a person reasonably believed to be located outside
the United States; and
``(ii) a foreign power, an agent of a foreign power, or an
officer or employee of a foreign power;
``(C) the proposed minimization procedures, with respect to
their dissemination provisions, meet the definition of
minimization procedures under section 101(h) or 301(4), as
appropriate; and
``(D) the application that has been filed contains all
statements and certifications required by subsection (b) and
the certification provided under subsection (b)(5) is not
clearly erroneous on the basis of the information furnished
under subsection (b).
``(2) Probable cause.--In determining whether or not
probable cause exists for purposes of paragraph (1)(B), a
judge having jurisdiction under subsection (a)(1) may
consider past activities of the target and facts and
circumstances relating to current or future activities of the
target. No United States person may be considered a foreign
power, agent of a foreign power, or officer or employee of a
foreign power solely upon the basis of activities protected
by the first amendment to the Constitution of the United
States.
``(3) Review.--
``(A) Limitations on review.--Review by a judge having
jurisdiction under subsection (a)(1) shall be limited to that
required to make the findings described in paragraph (1). The
judge shall not have jurisdiction to review the means by
which an acquisition under this section may be conducted.
``(B) Review of probable cause.--If the judge determines
that the facts submitted under subsection (b) are
insufficient to establish probable cause to issue an order
under this subsection, the judge shall enter an order so
stating and provide a written statement for the record of the
reasons for such determination. The Government may appeal an
order under this subparagraph pursuant to subsection (e).
``(C) Review of minimization procedures.--If the judge
determines that the minimization procedures applicable to
dissemination of information obtained through an acquisition
under this subsection do not meet the definition of
minimization procedures under section 101(h) or 301(4), as
appropriate, the judge shall enter an order so stating and
provide a written statement for the record of the reasons for
such determination. The Government may appeal an order under
this subparagraph pursuant to subsection (e).
``(D) Scope of review of certification.--If the judge
determines that an application under subsection (b) does not
contain all the required elements, or that the certification
provided under subsection (b)(5) is clearly erroneous on the
basis of the information furnished under subsection (b), the
judge shall enter an order so stating and provide a written
statement for the record of the reasons for such
determination. The Government may appeal an order under this
subparagraph pursuant to subsection (e).
``(4) Duration.--An order under this paragraph shall be
effective for a period not to exceed 90 days and such order
may be renewed for additional 90-day periods upon submission
of renewal applications meeting the requirements of
subsection (b).
``(5) Compliance.--At or prior to the end of the period of
time for which an order or extension is granted under this
section, the judge may assess compliance with the
minimization procedures referred to in paragraph (1)(C) by
reviewing the circumstances under which information
concerning United States persons was disseminated, provided
that the
[[Page H5749]]
judge may not inquire into the circumstances relating to the
conduct of the acquisition.
``(d) Emergency Authorization.--
``(1) Authority for emergency authorization.--
Notwithstanding any other provision of this section, if the
Attorney General reasonably determines that--
``(A) an emergency situation exists with respect to the
acquisition of foreign intelligence information for which an
order may be obtained under subsection (c) before an order
under that subsection can, with due diligence, be obtained,
and
``(B) the factual basis for the issuance of an order under
this section exists,
the Attorney General may authorize the emergency acquisition
if a judge having jurisdiction under subsection (a)(1) is
informed by the Attorney General or a designee of the
Attorney General at the time of such authorization that the
decision has been made to conduct such acquisition and if an
application in accordance with this section is made to a
judge of the Foreign Intelligence Surveillance Court as soon
as practicable, but not more than 7 days after the Attorney
General authorizes such acquisition.
``(2) Minimization procedures.--If the Attorney General
authorizes an emergency acquisition under paragraph (1), the
Attorney General shall require that the minimization
procedures referred to in subsection (c)(1)(C) be followed.
``(3) Termination of emergency authorization.--In the
absence of an order under subsection (c), an emergency
acquisition under paragraph (1) shall terminate when the
information sought is obtained, if the application for the
order is denied, or after the expiration of 7 days from the
time of authorization by the Attorney General, whichever is
earliest.
``(4) Use of information.--If an application submitted to
the Court pursuant to paragraph (1) is denied, or in any
other case where the acquisition is terminated and no order
with respect to the target of the acquisition is issued under
subsection (c), no information obtained or evidence derived
from such acquisition, except under circumstances in which
the target of the acquisition is determined not to be a
United States person, shall be received in evidence or
otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from such acquisition shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of such
person, except with the approval of the Attorney General if
the information indicates a threat of death or serious bodily
harm to any person.
``(e) Appeal.--
``(1) Appeal to the court of review.--The Government may
file a petition with the Foreign Intelligence Surveillance
Court of Review for review of an order issued pursuant to
subsection (c). The Court of Review shall have jurisdiction
to consider such petition and shall provide a written
statement for the record of the reasons for a decision under
this paragraph.
``(2) Certiorari to the supreme court.--The Government may
file a petition for a writ of certiorari for review of a
decision of the Court of Review issued under paragraph (1).
The record for such review shall be transmitted under seal to
the Supreme Court of the United States, which shall have
jurisdiction to review such decision.''
``SEC. 705. JOINT APPLICATIONS AND CONCURRENT AUTHORIZATIONS.
``(a) Joint Applications and Orders.--If an acquisition
targeting a United States person under section 703 or 704 is
proposed to be conducted both inside and outside the United
States, a judge having jurisdiction under section 703(a)(1)
or 704(a)(1) may issue simultaneously, upon the request of
the Government in a joint application complying with the
requirements of sections 703(b) and 704(b), orders under
sections 703(c) and 704(c), as appropriate.
``(b) Concurrent Authorization.--If an order authorizing
electronic surveillance or physical search has been obtained
under section 105 or 304, the Attorney General may authorize,
for the effective period of that order, without an order
under section 703 or 704, the targeting of that United States
person for the purpose of acquiring foreign intelligence
information while such person is reasonably believed to be
located outside the United States.
``SEC. 706. USE OF INFORMATION ACQUIRED UNDER TITLE VII.
``(a) Information Acquired Under Section 702.--Information
acquired from an acquisition conducted under section 702
shall be deemed to be information acquired from an electronic
surveillance pursuant to title I for purposes of section 106,
except for the purposes of subsection (j) of such section.
``(b) Information Acquired Under Section 703.--Information
acquired from an acquisition conducted under section 703
shall be deemed to be information acquired from an electronic
surveillance pursuant to title I for purposes of section 106.
``SEC. 707. CONGRESSIONAL OVERSIGHT.
``(a) Semiannual Report.--Not less frequently than once
every 6 months, the Attorney General shall fully inform, in a
manner consistent with national security, the congressional
intelligence committees and the Committees on the Judiciary
of the Senate and the House of Representatives, consistent
with the Rules of the House of Representatives, the Standing
Rules of the Senate, and Senate Resolution 400 of the 94th
Congress or any successor Senate resolution, concerning the
implementation of this title.
``(b) Content.--Each report under subsection (a) shall
include--
``(1) with respect to section 702--
``(A) any certifications submitted in accordance with
section 702(g) during the reporting period;
``(B) with respect to each determination under section
702(c)(2), the reasons for exercising the authority under
such section;
``(C) any directives issued under section 702(h) during the
reporting period;
``(D) a description of the judicial review during the
reporting period of such certifications and targeting and
minimization procedures adopted in accordance with
subsections (d) and (e) of section 702 and utilized with
respect to an acquisition under such section, including a
copy of an order or pleading in connection with such review
that contains a significant legal interpretation of the
provisions of section 702;
``(E) any actions taken to challenge or enforce a directive
under paragraph (4) or (5) of section 702(h);
``(F) any compliance reviews conducted by the Attorney
General or the Director of National Intelligence of
acquisitions authorized under section 702(a);
``(G) a description of any incidents of noncompliance--
``(i) with a directive issued by the Attorney General and
the Director of National Intelligence under section 702(h),
including incidents of noncompliance by a specified person to
whom the Attorney General and Director of National
Intelligence issued a directive under section 702(h); and
``(ii) by an element of the intelligence community with
procedures and guidelines adopted in accordance with
subsections (d), (e), and (f) of section 702; and
``(H) any procedures implementing section 702;
``(2) with respect to section 703--
``(A) the total number of applications made for orders
under section 703(b);
``(B) the total number of such orders--
``(i) granted;
``(ii) modified; and
``(iii) denied; and
``(C) the total number of emergency acquisitions authorized
by the Attorney General under section 703(d) and the total
number of subsequent orders approving or denying such
acquisitions; and
``(3) with respect to section 704--
``(A) the total number of applications made for orders
under section 704(b);
``(B) the total number of such orders--
``(i) granted;
``(ii) modified; and
``(iii) denied; and
``(C) the total number of emergency acquisitions authorized
by the Attorney General under section 704(d) and the total
number of subsequent orders approving or denying such
applications.
``SEC. 708. SAVINGS PROVISION.
``Nothing in this title shall be construed to limit the
authority of the Government to seek an order or authorization
under, or otherwise engage in any activity that is authorized
under, any other title of this Act.''.
(b) Table of Contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.) is amended--
(1) by striking the item relating to title VII;
(2) by striking the item relating to section 701; and
(3) by adding at the end the following:
``TITLE VII--ADDITIONAL PROCEDURES REGARDING CERTAIN PERSONS OUTSIDE
THE UNITED STATES
``Sec. 701. Definitions.
``Sec. 702. Procedures for targeting certain persons outside the United
States other than United States persons.
``Sec. 703. Certain acquisitions inside the United States targeting
United States persons outside the United States.
``Sec. 704. Other acquisitions targeting United States persons outside
the United States.
``Sec. 705. Joint applications and concurrent authorizations.
``Sec. 706. Use of information acquired under title VII.
``Sec. 707. Congressional oversight.
``Sec. 708. Savings provision.''.
(c) Technical and Conforming Amendments.--
(1) Title 18, united states code.--Section
2511(2)(a)(ii)(A) of title 18, United States Code, is amended
by inserting ``or a court order pursuant to section 704 of
the Foreign Intelligence Surveillance Act of 1978'' after
``assistance''.
(2) Foreign intelligence surveillance act of 1978.--Section
601(a)(1) of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1871(a)(1)) is amended--
(A) in subparagraph (C), by striking ``and''; and
(B) by adding at the end the following new subparagraphs:
``(E) acquisitions under section 703; and
``(F) acquisitions under section 704;''.
[[Page H5750]]
SEC. 102. STATEMENT OF EXCLUSIVE MEANS BY WHICH ELECTRONIC
SURVEILLANCE AND INTERCEPTION OF CERTAIN
COMMUNICATIONS MAY BE CONDUCTED.
(a) Statement of Exclusive Means.--Title I of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.) is amended by adding at the end the following new
section:
``statement of exclusive means by which electronic surveillance and
interception of certain communications may be conducted
``Sec. 112. (a) Except as provided in subsection (b), the
procedures of chapters 119, 121, and 206 of title 18, United
States Code, and this Act shall be the exclusive means by
which electronic surveillance and the interception of
domestic wire, oral, or electronic communications may be
conducted.
``(b) Only an express statutory authorization for
electronic surveillance or the interception of domestic wire,
oral, or electronic communications, other than as an
amendment to this Act or chapters 119, 121, or 206 of title
18, United States Code, shall constitute an additional
exclusive means for the purpose of subsection (a).''.
(b) Offense.--Section 109(a) of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1809(a)) is amended by
striking ``authorized by statute'' each place it appears and
inserting ``authorized by this Act, chapter 119, 121, or 206
of title 18, United States Code, or any express statutory
authorization that is an additional exclusive means for
conducting electronic surveillance under section 112.''; and
(c) Conforming Amendments.--
(1) Title 18, united states code.--Section 2511(2)(a) of
title 18, United States Code, is amended by adding at the end
the following:
``(iii) If a certification under subparagraph (ii)(B) for
assistance to obtain foreign intelligence information is
based on statutory authority, the certification shall
identify the specific statutory provision and shall certify
that the statutory requirements have been met.''; and
(2) Table of contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.) is amended by inserting after the
item relating to section 111, the following new item:
``Sec. 112. Statement of exclusive means by which electronic
surveillance and interception of certain communications
may be conducted.''.
SEC. 103. SUBMITTAL TO CONGRESS OF CERTAIN COURT ORDERS UNDER
THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF
1978.
(a) Inclusion of Certain Orders in Semiannual Reports of
Attorney General.--Subsection (a)(5) of section 601 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1871) is amended by striking ``(not including orders)'' and
inserting ``, orders,''.
(b) Reports by Attorney General on Certain Other Orders.--
Such section 601 is further amended by adding at the end the
following:
``(c) Submissions to Congress.--The Attorney General shall
submit to the committees of Congress referred to in
subsection (a)--
``(1) a copy of any decision, order, or opinion issued by
the Foreign Intelligence Surveillance Court or the Foreign
Intelligence Surveillance Court of Review that includes
significant construction or interpretation of any provision
of this Act, and any pleadings, applications, or memoranda of
law associated with such decision, order, or opinion, not
later than 45 days after such decision, order, or opinion is
issued; and
``(2) a copy of each such decision, order, or opinion, and
any pleadings, applications, or memoranda of law associated
with such decision, order, or opinion, that was issued during
the 5-year period ending on the date of the enactment of the
FISA Amendments Act of 2008 and not previously submitted in a
report under subsection (a).
``(d) Protection of National Security.--The Attorney
General, in consultation with the Director of National
Intelligence, may authorize redactions of materials described
in subsection (c) that are provided to the committees of
Congress referred to in subsection (a), if such redactions
are necessary to protect the national security of the United
States and are limited to sensitive sources and methods
information or the identities of targets.''.
(c) Definitions.--Such section 601, as amended by
subsections (a) and (b), is further amended by adding at the
end the following:
``(e) Definitions.--In this section:
``(1) Foreign intelligence surveillance court.--The term
`Foreign Intelligence Surveillance Court' means the court
established under section 103(a).
``(2) Foreign intelligence surveillance court of review.--
The term `Foreign Intelligence Surveillance Court of Review'
means the court established under section 103(b).''.
SEC. 104. APPLICATIONS FOR COURT ORDERS.
Section 104 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1804) is amended--
(1) in subsection (a)--
(A) by striking paragraphs (2) and (11);
(B) by redesignating paragraphs (3) through (10) as
paragraphs (2) through (9), respectively;
(C) in paragraph (5), as redesignated by subparagraph (B)
of this paragraph, by striking ``detailed'';
(D) in paragraph (6), as redesignated by subparagraph (B)
of this paragraph, in the matter preceding subparagraph (A)--
(i) by striking ``Affairs or'' and inserting ``Affairs,'';
and
(ii) by striking ``Senate--'' and inserting ``Senate, or
the Deputy Director of the Federal Bureau of Investigation,
if designated by the President as a certifying official--'';
(E) in paragraph (7), as redesignated by subparagraph (B)
of this paragraph, by striking ``statement of'' and inserting
``summary statement of'';
(F) in paragraph (8), as redesignated by subparagraph (B)
of this paragraph, by adding ``and'' at the end; and
(G) in paragraph (9), as redesignated by subparagraph (B)
of this paragraph, by striking ``; and'' and inserting a
period;
(2) by striking subsection (b);
(3) by redesignating subsections (c) through (e) as
subsections (b) through (d), respectively; and
(4) in paragraph (1)(A) of subsection (d), as redesignated
by paragraph (3) of this subsection, by striking ``or the
Director of National Intelligence'' and inserting ``the
Director of National Intelligence, or the Director of the
Central Intelligence Agency''.
SEC. 105. ISSUANCE OF AN ORDER.
(a) In General.--Section 105 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1805) is amended--
(1) in subsection (a)--
(A) by striking paragraph (1); and
(B) by redesignating paragraphs (2) through (5) as
paragraphs (1) through (4), respectively;
(2) in subsection (b), by striking ``(a)(3)'' and inserting
``(a)(2)'';
(3) in subsection (c)(1)--
(A) in subparagraph (D), by adding ``and'' at the end;
(B) in subparagraph (E), by striking ``; and'' and
inserting a period; and
(C) by striking subparagraph (F);
(4) by striking subsection (d);
(5) by redesignating subsections (e) through (i) as
subsections (d) through (h), respectively;
(6) by amending subsection (e), as redesignated by
paragraph (5) of this section, to read as follows:
``(e)(1) Notwithstanding any other provision of this title,
the Attorney General may authorize the emergency employment
of electronic surveillance if the Attorney General--
``(A) reasonably determines that an emergency situation
exists with respect to the employment of electronic
surveillance to obtain foreign intelligence information
before an order authorizing such surveillance can with due
diligence be obtained;
``(B) reasonably determines that the factual basis for the
issuance of an order under this title to approve such
electronic surveillance exists;
``(C) informs, either personally or through a designee, a
judge having jurisdiction under section 103 at the time of
such authorization that the decision has been made to employ
emergency electronic surveillance; and
``(D) makes an application in accordance with this title to
a judge having jurisdiction under section 103 as soon as
practicable, but not later than 7 days after the Attorney
General authorizes such surveillance.
``(2) If the Attorney General authorizes the emergency
employment of electronic surveillance under paragraph (1),
the Attorney General shall require that the minimization
procedures required by this title for the issuance of a
judicial order be followed.
``(3) In the absence of a judicial order approving such
electronic surveillance, the surveillance shall terminate
when the information sought is obtained, when the application
for the order is denied, or after the expiration of 7 days
from the time of authorization by the Attorney General,
whichever is earliest.
``(4) A denial of the application made under this
subsection may be reviewed as provided in section 103.
``(5) In the event that such application for approval is
denied, or in any other case where the electronic
surveillance is terminated and no order is issued approving
the surveillance, no information obtained or evidence derived
from such surveillance shall be received in evidence or
otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from such surveillance shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of such
person, except with the approval of the Attorney General if
the information indicates a threat of death or serious bodily
harm to any person.
``(6) The Attorney General shall assess compliance with the
requirements of paragraph (5).''; and
(7) by adding at the end the following:
``(i) In any case in which the Government makes an
application to a judge under this title to conduct electronic
surveillance involving communications and the judge grants
such application, upon the request of the applicant, the
judge shall also authorize the installation and use of pen
registers and trap and trace devices, and direct the
disclosure of the information set forth in section
402(d)(2).''.
[[Page H5751]]
(b) Conforming Amendment.--Section 108(a)(2)(C) of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1808(a)(2)(C)) is amended by striking ``105(f)'' and
inserting ``105(e)'';
SEC. 106. USE OF INFORMATION.
Subsection (i) of section 106 of the Foreign Intelligence
Surveillance Act of 1978 (8 U.S.C. 1806) is amended by
striking ``radio communication'' and inserting
``communication''.
SEC. 107. AMENDMENTS FOR PHYSICAL SEARCHES.
(a) Applications.--Section 303 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1823) is amended--
(1) in subsection (a)--
(A) by striking paragraph (2);
(B) by redesignating paragraphs (3) through (9) as
paragraphs (2) through (8), respectively;
(C) in paragraph (2), as redesignated by subparagraph (B)
of this paragraph, by striking ``detailed'';
(D) in paragraph (3)(C), as redesignated by subparagraph
(B) of this paragraph, by inserting ``or is about to be''
before ``owned''; and
(E) in paragraph (6), as redesignated by subparagraph (B)
of this paragraph, in the matter preceding subparagraph (A)--
(i) by striking ``Affairs or'' and inserting ``Affairs,'';
and
(ii) by striking ``Senate--'' and inserting ``Senate, or
the Deputy Director of the Federal Bureau of Investigation,
if designated by the President as a certifying official--'';
and
(2) in subsection (d)(1)(A), by striking ``or the Director
of National Intelligence'' and inserting ``the Director of
National Intelligence, or the Director of the Central
Intelligence Agency''.
(b) Orders.--Section 304 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1824) is amended--
(1) in subsection (a)--
(A) by striking paragraph (1);
(B) by redesignating paragraphs (2) through (5) as
paragraphs (1) through (4), respectively; and
(C) in paragraph (2)(B), as redesignated by subparagraph
(B) of this paragraph, by inserting ``or is about to be''
before ``owned''; and
(2) by amending subsection (e) to read as follows:
``(e)(1) Notwithstanding any other provision of this title,
the Attorney General may authorize the emergency employment
of a physical search if the Attorney General--
``(A) reasonably determines that an emergency situation
exists with respect to the employment of a physical search to
obtain foreign intelligence information before an order
authorizing such physical search can with due diligence be
obtained;
``(B) reasonably determines that the factual basis for
issuance of an order under this title to approve such
physical search exists;
``(C) informs, either personally or through a designee, a
judge of the Foreign Intelligence Surveillance Court at the
time of such authorization that the decision has been made to
employ an emergency physical search; and
``(D) makes an application in accordance with this title to
a judge of the Foreign Intelligence Surveillance Court as
soon as practicable, but not more than 7 days after the
Attorney General authorizes such physical search.
``(2) If the Attorney General authorizes the emergency
employment of a physical search under paragraph (1), the
Attorney General shall require that the minimization
procedures required by this title for the issuance of a
judicial order be followed.
``(3) In the absence of a judicial order approving such
physical search, the physical search shall terminate when the
information sought is obtained, when the application for the
order is denied, or after the expiration of 7 days from the
time of authorization by the Attorney General, whichever is
earliest.
``(4) A denial of the application made under this
subsection may be reviewed as provided in section 103.
``(5) In the event that such application for approval is
denied, or in any other case where the physical search is
terminated and no order is issued approving the physical
search, no information obtained or evidence derived from such
physical search shall be received in evidence or otherwise
disclosed in any trial, hearing, or other proceeding in or
before any court, grand jury, department, office, agency,
regulatory body, legislative committee, or other authority of
the United States, a State, or political subdivision thereof,
and no information concerning any United States person
acquired from such physical search shall subsequently be used
or disclosed in any other manner by Federal officers or
employees without the consent of such person, except with the
approval of the Attorney General if the information indicates
a threat of death or serious bodily harm to any person.
``(6) The Attorney General shall assess compliance with the
requirements of paragraph (5).''.
(c) Conforming Amendments.--The Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.) is
amended--
(1) in section 304(a)(4), as redesignated by subsection (b)
of this section, by striking ``303(a)(7)(E)'' and inserting
``303(a)(6)(E)''; and
(2) in section 305(k)(2), by striking ``303(a)(7)'' and
inserting ``303(a)(6)''.
SEC. 108. AMENDMENTS FOR EMERGENCY PEN REGISTERS AND TRAP AND
TRACE DEVICES.
Section 403 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1843) is amended--
(1) in subsection (a)(2), by striking ``48 hours'' and
inserting ``7 days''; and
(2) in subsection (c)(1)(C), by striking ``48 hours'' and
inserting ``7 days''.
SEC. 109. FOREIGN INTELLIGENCE SURVEILLANCE COURT.
(a) Designation of Judges.--Subsection (a) of section 103
of the Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1803) is amended by inserting ``at least'' before
``seven of the United States judicial circuits''.
(b) En Banc Authority.--
(1) In general.--Subsection (a) of section 103 of the
Foreign Intelligence Surveillance Act of 1978, as amended by
subsection (a) of this section, is further amended--
(A) by inserting ``(1)'' after ``(a)''; and
(B) by adding at the end the following new paragraph:
``(2)(A) The court established under this subsection may,
on its own initiative, or upon the request of the Government
in any proceeding or a party under section 501(f) or
paragraph (4) or (5) of section 702(h), hold a hearing or
rehearing, en banc, when ordered by a majority of the judges
that constitute such court upon a determination that--
``(i) en banc consideration is necessary to secure or
maintain uniformity of the court's decisions; or
``(ii) the proceeding involves a question of exceptional
importance.
``(B) Any authority granted by this Act to a judge of the
court established under this subsection may be exercised by
the court en banc. When exercising such authority, the court
en banc shall comply with any requirements of this Act on the
exercise of such authority.
``(C) For purposes of this paragraph, the court en banc
shall consist of all judges who constitute the court
established under this subsection.''.
(2) Conforming amendments.--The Foreign Intelligence
Surveillance Act of 1978 is further amended--
(A) in subsection (a) of section 103, as amended by this
subsection, by inserting ``(except when sitting en banc under
paragraph (2))'' after ``no judge designated under this
subsection''; and
(B) in section 302(c) (50 U.S.C. 1822(c)), by inserting
``(except when sitting en banc)'' after ``except that no
judge''.
(c) Stay or Modification During an Appeal.--Section 103 of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1803) is amended--
(1) by redesignating subsection (f) as subsection (g); and
(2) by inserting after subsection (e) the following new
subsection:
``(f)(1) A judge of the court established under subsection
(a), the court established under subsection (b) or a judge of
that court, or the Supreme Court of the United States or a
justice of that court, may, in accordance with the rules of
their respective courts, enter a stay of an order or an order
modifying an order of the court established under subsection
(a) or the court established under subsection (b) entered
under any title of this Act, while the court established
under subsection (a) conducts a rehearing, while an appeal is
pending to the court established under subsection (b), or
while a petition of certiorari is pending in the Supreme
Court of the United States, or during the pendency of any
review by that court.
``(2) The authority described in paragraph (1) shall apply
to an order entered under any provision of this Act.''.
(d) Authority of Foreign Intelligence Surveillance Court.--
Section 103 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1803), as amended by this Act, is amended by
adding at the end the following:
``(i) Nothing in this Act shall be construed to reduce or
contravene the inherent authority of the court established
under subsection (a) to determine or enforce compliance with
an order or a rule of such court or with a procedure approved
by such court.''.
SEC. 110. WEAPONS OF MASS DESTRUCTION.
(a) Definitions.--
(1) Foreign power.--Subsection (a) of section 101 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801(a)) is amended--
(A) in paragraph (5), by striking ``persons; or'' and
inserting ``persons;'';
(B) in paragraph (6) by striking the period and inserting
``; or''; and
(C) by adding at the end the following new paragraph:
``(7) an entity not substantially composed of United States
persons that is engaged in the international proliferation of
weapons of mass destruction.''.
(2) Agent of a foreign power.--Subsection (b)(1) of such
section 101 is amended--
(A) in subparagraph (B), by striking ``or'' at the end;
(B) in subparagraph (C), by striking ``or'' at the end; and
(C) by adding at the end the following new subparagraphs:
``(D) engages in the international proliferation of weapons
of mass destruction, or activities in preparation therefor;
or
``(E) engages in the international proliferation of weapons
of mass destruction, or activities in preparation therefor
for or on behalf of a foreign power; or''.
(3) Foreign intelligence information.--Subsection (e)(1)(B)
of such section 101 is
[[Page H5752]]
amended by striking ``sabotage or international terrorism''
and inserting ``sabotage, international terrorism, or the
international proliferation of weapons of mass destruction''.
(4) Weapon of mass destruction.--Such section 101 is
amended by adding at the end the following new subsection:
``(p) `Weapon of mass destruction' means--
``(1) any explosive, incendiary, or poison gas device that
is designed, intended, or has the capability to cause a mass
casualty incident;
``(2) any weapon that is designed, intended, or has the
capability to cause death or serious bodily injury to a
significant number of persons through the release,
dissemination, or impact of toxic or poisonous chemicals or
their precursors;
``(3) any weapon involving a biological agent, toxin, or
vector (as such terms are defined in section 178 of title 18,
United States Code) that is designed, intended, or has the
capability to cause death, illness, or serious bodily injury
to a significant number of persons; or
``(4) any weapon that is designed, intended, or has the
capability to release radiation or radioactivity causing
death, illness, or serious bodily injury to a significant
number of persons.''.
(b) Use of Information.--
(1) In general.--Section 106(k)(1)(B) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C.
1806(k)(1)(B)) is amended by striking ``sabotage or
international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(2) Physical searches.--Section 305(k)(1)(B) of such Act
(50 U.S.C. 1825(k)(1)(B)) is amended by striking ``sabotage
or international terrorism'' and inserting ``sabotage,
international terrorism, or the international proliferation
of weapons of mass destruction''.
(c) Technical and Conforming Amendments.--The Foreign
Intelligence Surveillance Act of 1978 is further amended--
(1) in paragraph (2) of section 105(d) (50 U.S.C. 1805(d)),
as redesignated by section 105(a)(5) of this Act, by striking
``section 101(a) (5) or (6)'' and inserting ``paragraph (5),
(6), or (7) of section 101(a)'';
(2) in section 301(1) (50 U.S.C. 1821(1)), by inserting
``weapon of mass destruction,'' after ``person,''; and
(3) in section 304(d)(2) (50 U.S.C. 1824(d)(2)), by
striking ``section 101(a) (5) or (6)'' and inserting
``paragraph (5), (6), or (7) of section 101(a)''.
TITLE II--PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS
SEC. 201. PROCEDURES FOR IMPLEMENTING STATUTORY DEFENSES
UNDER THE FOREIGN INTELLIGENCE SURVEILLANCE ACT
OF 1978.
The Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1801 et seq.), as amended by section 101, is further
amended by adding at the end the following new title:
``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
``SEC. 801. DEFINITIONS.
``In this title:
``(1) Assistance.--The term `assistance' means the
provision of, or the provision of access to, information
(including communication contents, communications records, or
other information relating to a customer or communication),
facilities, or another form of assistance.
``(2) Civil action.--The term `civil action' includes a
covered civil action.
``(3) Congressional intelligence committees.--The term
`congressional intelligence committees' means--
``(A) the Select Committee on Intelligence of the Senate;
and
``(B) the Permanent Select Committee on Intelligence of the
House of Representatives.
``(4) Contents.--The term `contents' has the meaning given
that term in section 101(n).
``(5) Covered civil action.--The term `covered civil
action' means a civil action filed in a Federal or State
court that--
``(A) alleges that an electronic communication service
provider furnished assistance to an element of the
intelligence community; and
``(B) seeks monetary or other relief from the electronic
communication service provider related to the provision of
such assistance.
``(6) Electronic communication service provider.--The term
`electronic communication service provider' means--
``(A) a telecommunications carrier, as that term is defined
in section 3 of the Communications Act of 1934 (47 U.S.C.
153);
``(B) a provider of electronic communication service, as
that term is defined in section 2510 of title 18, United
States Code;
``(C) a provider of a remote computing service, as that
term is defined in section 2711 of title 18, United States
Code;
``(D) any other communication service provider who has
access to wire or electronic communications either as such
communications are transmitted or as such communications are
stored;
``(E) a parent, subsidiary, affiliate, successor, or
assignee of an entity described in subparagraph (A), (B),
(C), or (D); or
``(F) an officer, employee, or agent of an entity described
in subparagraph (A), (B), (C), (D), or (E).
``(7) Intelligence community.--The term `intelligence
community' has the meaning given the term in section 3(4) of
the National Security Act of 1947 (50 U.S.C. 401a(4)).
``(8) Person.--The term `person' means--
``(A) an electronic communication service provider; or
``(B) a landlord, custodian, or other person who may be
authorized or required to furnish assistance pursuant to--
``(i) an order of the court established under section
103(a) directing such assistance;
``(ii) a certification in writing under section
2511(2)(a)(ii)(B) or 2709(b) of title 18, United States Code;
or
``(iii) a directive under section 102(a)(4), 105B(e), as
added by section 2 of the Protect America Act of 2007 (Public
Law 110-55), or 702(h).
``(9) State.--The term `State' means any State, political
subdivision of a State, the Commonwealth of Puerto Rico, the
District of Columbia, and any territory or possession of the
United States, and includes any officer, public utility
commission, or other body authorized to regulate an
electronic communication service provider.
``SEC. 802. PROCEDURES FOR IMPLEMENTING STATUTORY DEFENSES.
``(a) Requirement for Certification.--Notwithstanding any
other provision of law, a civil action may not lie or be
maintained in a Federal or State court against any person for
providing assistance to an element of the intelligence
community, and shall be promptly dismissed, if the Attorney
General certifies to the district court of the United States
in which such action is pending that--
``(1) any assistance by that person was provided pursuant
to an order of the court established under section 103(a)
directing such assistance;
``(2) any assistance by that person was provided pursuant
to a certification in writing under section 2511(2)(a)(ii)(B)
or 2709(b) of title 18, United States Code;
``(3) any assistance by that person was provided pursuant
to a directive under section 102(a)(4), 105B(e), as added by
section 2 of the Protect America Act of 2007 (Public Law 110-
55), or 702(h) directing such assistance;
``(4) in the case of a covered civil action, the assistance
alleged to have been provided by the electronic communication
service provider was--
``(A) in connection with an intelligence activity involving
communications that was--
``(i) authorized by the President during the period
beginning on September 11, 2001, and ending on January 17,
2007; and
``(ii) designed to detect or prevent a terrorist attack, or
activities in preparation for a terrorist attack, against the
United States; and
``(B) the subject of a written request or directive, or a
series of written requests or directives, from the Attorney
General or the head of an element of the intelligence
community (or the deputy of such person) to the electronic
communication service provider indicating that the activity
was--
``(i) authorized by the President; and
``(ii) determined to be lawful; or
``(5) the person did not provide the alleged assistance.
``(b) Judicial Review.--
``(1) Review of certifications.--A certification under
subsection (a) shall be given effect unless the court finds
that such certification is not supported by substantial
evidence provided to the court pursuant to this section.
``(2) Supplemental materials.--In its review of a
certification under subsection (a), the court may examine the
court order, certification, written request, or directive
described in subsection (a) and any relevant court order,
certification, written request, or directive submitted
pursuant to subsection (d).
``(c) Limitations on Disclosure.--If the Attorney General
files a declaration under section 1746 of title 28, United
States Code, that disclosure of a certification made pursuant
to subsection (a) or the supplemental materials provided
pursuant to subsection (b) or (d) would harm the national
security of the United States, the court shall--
``(1) review such certification and the supplemental
materials in camera and ex parte; and
``(2) limit any public disclosure concerning such
certification and the supplemental materials, including any
public order following such in camera and ex parte review, to
a statement as to whether the case is dismissed and a
description of the legal standards that govern the order,
without disclosing the paragraph of subsection (a) that is
the basis for the certification.
``(d) Role of the Parties.--Any plaintiff or defendant in a
civil action may submit any relevant court order,
certification, written request, or directive to the district
court referred to in subsection (a) for review and shall be
permitted to participate in the briefing or argument of any
legal issue in a judicial proceeding conducted pursuant to
this section, but only to the extent that such participation
does not require the disclosure of classified information to
such party. To the extent that classified information is
relevant to the proceeding or would be revealed in the
determination of an issue, the court shall review such
information in camera and ex parte, and shall issue any part
of the court's written order that would reveal classified
information in camera and ex parte and maintain such part
under seal.
``(e) Nondelegation.--The authority and duties of the
Attorney General under this section shall be performed by the
Attorney General (or Acting Attorney General) or the Deputy
Attorney General.
[[Page H5753]]
``(f) Appeal.--The courts of appeals shall have
jurisdiction of appeals from interlocutory orders of the
district courts of the United States granting or denying a
motion to dismiss or for summary judgment under this section.
``(g) Removal.--A civil action against a person for
providing assistance to an element of the intelligence
community that is brought in a State court shall be deemed to
arise under the Constitution and laws of the United States
and shall be removable under section 1441 of title 28, United
States Code.
``(h) Relationship to Other Laws.--Nothing in this section
shall be construed to limit any otherwise available immunity,
privilege, or defense under any other provision of law.
``(i) Applicability.--This section shall apply to a civil
action pending on or filed after the date of the enactment of
the FISA Amendments Act of 2008.
``SEC. 803. PREEMPTION.
``(a) In General.--No State shall have authority to--
``(1) conduct an investigation into an electronic
communication service provider's alleged assistance to an
element of the intelligence community;
``(2) require through regulation or any other means the
disclosure of information about an electronic communication
service provider's alleged assistance to an element of the
intelligence community;
``(3) impose any administrative sanction on an electronic
communication service provider for assistance to an element
of the intelligence community; or
``(4) commence or maintain a civil action or other
proceeding to enforce a requirement that an electronic
communication service provider disclose information
concerning alleged assistance to an element of the
intelligence community.
``(b) Suits by the United States.--The United States may
bring suit to enforce the provisions of this section.
``(c) Jurisdiction.--The district courts of the United
States shall have jurisdiction over any civil action brought
by the United States to enforce the provisions of this
section.
``(d) Application.--This section shall apply to any
investigation, action, or proceeding that is pending on or
commenced after the date of the enactment of the FISA
Amendments Act of 2008.
``SEC. 804. REPORTING.
``(a) Semiannual Report.--Not less frequently than once
every 6 months, the Attorney General shall, in a manner
consistent with national security, the Rules of the House of
Representatives, the Standing Rules of the Senate, and Senate
Resolution 400 of the 94th Congress or any successor Senate
resolution, fully inform the congressional intelligence
committees, the Committee on the Judiciary of the Senate, and
the Committee on the Judiciary of the House of
Representatives concerning the implementation of this title.
``(b) Content.--Each report made under subsection (a) shall
include--
``(1) any certifications made under section 802;
``(2) a description of the judicial review of the
certifications made under section 802; and
``(3) any actions taken to enforce the provisions of
section 803.''.
SEC. 202. TECHNICAL AMENDMENTS.
The table of contents in the first section of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et
seq.), as amended by section 101(b), is further amended by
adding at the end the following:
``TITLE VIII--PROTECTION OF PERSONS ASSISTING THE GOVERNMENT
``Sec. 801. Definitions.
``Sec. 802. Procedures for implementing statutory defenses.
``Sec. 803. Preemption.
``Sec. 804. Reporting.''.
TITLE III--REVIEW OF PREVIOUS ACTIONS
SEC. 301. REVIEW OF PREVIOUS ACTIONS.
(a) Definitions.--In this section:
(1) Appropriate committees of congress.--The term
``appropriate committees of Congress'' means--
(A) the Select Committee on Intelligence and the Committee
on the Judiciary of the Senate; and
(B) the Permanent Select Committee on Intelligence and the
Committee on the Judiciary of the House of Representatives.
(2) Foreign intelligence surveillance court.--The term
``Foreign Intelligence Surveillance Court'' means the court
established under section 103(a) of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1803(a)).
(3) President's surveillance program and program.--The
terms ``President's Surveillance Program'' and ``Program''
mean the intelligence activity involving communications that
was authorized by the President during the period beginning
on September 11, 2001, and ending on January 17, 2007,
including the program referred to by the President in a radio
address on December 17, 2005 (commonly known as the Terrorist
Surveillance Program).
(b) Reviews.--
(1) Requirement to conduct.--The Inspectors General of the
Department of Justice, the Office of the Director of National
Intelligence, the National Security Agency, the Department of
Defense, and any other element of the intelligence community
that participated in the President's Surveillance Program,
shall complete a comprehensive review of, with respect to the
oversight authority and responsibility of each such Inspector
General--
(A) all of the facts necessary to describe the
establishment, implementation, product, and use of the
product of the Program;
(B) access to legal reviews of the Program and access to
information about the Program;
(C) communications with, and participation of, individuals
and entities in the private sector related to the Program;
(D) interaction with the Foreign Intelligence Surveillance
Court and transition to court orders related to the Program;
and
(E) any other matters identified by any such Inspector
General that would enable that Inspector General to complete
a review of the Program, with respect to such Department or
element.
(2) Cooperation and coordination.--
(A) Cooperation.--Each Inspector General required to
conduct a review under paragraph (1) shall--
(i) work in conjunction, to the extent practicable, with
any other Inspector General required to conduct such a
review; and
(ii) utilize, to the extent practicable, and not
unnecessarily duplicate or delay, such reviews or audits that
have been completed or are being undertaken by any such
Inspector General or by any other office of the Executive
Branch related to the Program.
(B) Integration of other reviews.--The Counsel of the
Office of Professional Responsibility of the Department of
Justice shall provide the report of any investigation
conducted by such Office on matters relating to the Program,
including any investigation of the process through which
legal reviews of the Program were conducted and the substance
of such reviews, to the Inspector General of the Department
of Justice, who shall integrate the factual findings and
conclusions of such investigation into its review.
(C) Coordination.--The Inspectors General shall designate
one of the Inspectors General required to conduct a review
under paragraph (1) that is appointed by the President, by
and with the advice and consent of the Senate, to coordinate
the conduct of the reviews and the preparation of the
reports.
(c) Reports.--
(1) Preliminary reports.--Not later than 60 days after the
date of the enactment of this Act, the Inspectors General of
the Department of Justice, the Office of the Director of
National Intelligence, the National Security Agency, the
Department of Defense, and any other Inspector General
required to conduct a review under subsection (b)(1), shall
submit to the appropriate committees of Congress an interim
report that describes the planned scope of such review.
(2) Final report.--Not later than 1 year after the date of
the enactment of this Act, the Inspectors General of the
Department of Justice, the Office of the Director of National
Intelligence, the National Security Agency, the Department of
Defense, and any other Inspector General required to conduct
a review under subsection (b)(1), shall submit to the
appropriate committees of Congress, in a manner consistent
with national security, a comprehensive report on such
reviews that includes any recommendations of any such
Inspectors General within the oversight authority and
responsibility of any such Inspector General with respect to
the reviews.
(3) Form.--A report under this subsection shall be
submitted in unclassified form, but may include a classified
annex. The unclassified report shall not disclose the name or
identity of any individual or entity of the private sector
that participated in the Program or with whom there was
communication about the Program, to the extent that
information is classified.
(d) Resources.--
(1) Expedited security clearance.--The Director of National
Intelligence shall ensure that the process for the
investigation and adjudication of an application by an
Inspector General or any appropriate staff of an Inspector
General for a security clearance necessary for the conduct of
the review under subsection (b)(1) is carried out as
expeditiously as possible.
(2) Additional personnel for the inspectors general.--An
Inspector General required to conduct a review under
subsection (b)(1) and submit a report under subsection (c) is
authorized to hire such additional personnel as may be
necessary to carry out such review and prepare such report in
a prompt and timely manner. Personnel authorized to be hired
under this paragraph--
(A) shall perform such duties relating to such a review as
the relevant Inspector General shall direct; and
(B) are in addition to any other personnel authorized by
law.
(3) Transfer of personnel.--The Attorney General, the
Secretary of Defense, the Director of National Intelligence,
the Director of the National Security Agency, or the head of
any other element of the intelligence community may transfer
personnel to the relevant Office of the Inspector General
required to conduct a review under subsection (b)(1) and
submit a report under subsection (c) and, in addition to any
other personnel authorized by law, are authorized to fill any
vacancy caused by such a transfer. Personnel transferred
under this paragraph shall perform such duties relating to
such review as the relevant Inspector General shall direct.
TITLE IV--OTHER PROVISIONS
SEC. 401. SEVERABILITY.
If any provision of this Act, any amendment made by this
Act, or the application thereof to any person or
circumstances is
[[Page H5754]]
held invalid, the validity of the remainder of the Act, of
any such amendments, and of the application of such
provisions to other persons and circumstances shall not be
affected thereby.
SEC. 402. EFFECTIVE DATE.
Except as provided in section 404, the amendments made by
this Act shall take effect on the date of the enactment of
this Act.
SEC. 403. REPEALS.
(a) Repeal of Protect America Act of 2007 Provisions.--
(1) Amendments to fisa.--
(A) In general.--Except as provided in section 404,
sections 105A, 105B, and 105C of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1805a, 1805b, and 1805c)
are repealed.
(B) Technical and conforming amendments.--
(i) Table of contents.--The table of contents in the first
section of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.) is amended by striking the items
relating to sections 105A, 105B, and 105C.
(ii) Conforming amendments.--Except as provided in section
404, section 103(e) of the Foreign Intelligence Surveillance
Act of 1978 (50 U.S.C. 1803(e)) is amended--
(I) in paragraph (1), by striking ``105B(h) or 501(f)(1)''
and inserting ``501(f)(1) or 702(h)(4)''; and
(II) in paragraph (2), by striking ``105B(h) or 501(f)(1)''
and inserting ``501(f)(1) or 702(h)(4)''.
(2) Reporting requirements.--Except as provided in section
404, section 4 of the Protect America Act of 2007 (Public Law
110-55; 121 Stat. 555) is repealed.
(3) Transition procedures.--Except as provided in section
404, subsection (b) of section 6 of the Protect America Act
of 2007 (Public Law 110-55; 121 Stat. 556) is repealed.
(b) FISA Amendments Act of 2008.--
(1) In general.--Except as provided in section 404,
effective December 31, 2012, title VII of the Foreign
Intelligence Surveillance Act of 1978, as amended by section
101(a), is repealed.
(2) Technical and conforming amendments.--Effective
December 31, 2012--
(A) the table of contents in the first section of such Act
(50 U.S.C. 1801 et seq.) is amended by striking the items
related to title VII;
(B) except as provided in section 404, section 601(a)(1) of
such Act (50 U.S.C. 1871(a)(1)) is amended to read as such
section read on the day before the date of the enactment of
this Act; and
(C) except as provided in section 404, section
2511(2)(a)(ii)(A) of title 18, United States Code, is amended
by striking ``or a court order pursuant to section 704 of the
Foreign Intelligence Surveillance Act of 1978''.
SEC. 404. TRANSITION PROCEDURES.
(a) Transition Procedures for Protect America Act of 2007
Provisions.--
(1) Continued effect of orders, authorizations,
directives.--Except as provided in paragraph (7),
notwithstanding any other provision of law, any order,
authorization, or directive issued or made pursuant to
section 105B of the Foreign Intelligence Surveillance Act of
1978, as added by section 2 of the Protect America Act of
2007 (Public Law 110-55; 121 Stat. 552), shall continue in
effect until the expiration of such order, authorization, or
directive.
(2) Applicability of protect america act of 2007 to
continued orders, authorizations, directives.--
Notwithstanding any other provision of this Act, any
amendment made by this Act, or the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.)--
(A) subject to paragraph (3), section 105A of such Act, as
added by section 2 of the Protect America Act of 2007 (Public
Law 110-55; 121 Stat. 552), shall continue to apply to any
acquisition conducted pursuant to an order, authorization, or
directive referred to in paragraph (1); and
(B) sections 105B and 105C of the Foreign Intelligence
Surveillance Act of 1978, as added by sections 2 and 3,
respectively, of the Protect America Act of 2007, shall
continue to apply with respect to an order, authorization, or
directive referred to in paragraph (1) until the later of--
(i) the expiration of such order, authorization, or
directive; or
(ii) the date on which final judgment is entered for any
petition or other litigation relating to such order,
authorization, or directive.
(3) Use of information.--Information acquired from an
acquisition conducted pursuant to an order, authorization, or
directive referred to in paragraph (1) shall be deemed to be
information acquired from an electronic surveillance pursuant
to title I of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1801 et seq.) for purposes of section 106 of
such Act (50 U.S.C. 1806), except for purposes of subsection
(j) of such section.
(4) Protection from liability.--Subsection (l) of section
105B of the Foreign Intelligence Surveillance Act of 1978, as
added by section 2 of the Protect America Act of 2007, shall
continue to apply with respect to any directives issued
pursuant to such section 105B.
(5) Jurisdiction of foreign intelligence surveillance
court.--Notwithstanding any other provision of this Act or of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801 et seq.), section 103(e) of the Foreign Intelligence
Surveillance Act (50 U.S.C. 1803(e)), as amended by section
5(a) of the Protect America Act of 2007 (Public Law 110-55;
121 Stat. 556), shall continue to apply with respect to a
directive issued pursuant to section 105B of the Foreign
Intelligence Surveillance Act of 1978, as added by section 2
of the Protect America Act of 2007, until the later of--
(A) the expiration of all orders, authorizations, or
directives referred to in paragraph (1); or
(B) the date on which final judgment is entered for any
petition or other litigation relating to such order,
authorization, or directive.
(6) Reporting requirements.--
(A) Continued applicability.--Notwithstanding any other
provision of this Act, any amendment made by this Act, the
Protect America Act of 2007 (Public Law 110-55), or the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801
et seq.), section 4 of the Protect America Act of 2007 shall
continue to apply until the date that the certification
described in subparagraph (B) is submitted.
(B) Certification.--The certification described in this
subparagraph is a certification--
(i) made by the Attorney General;
(ii) submitted as part of a semi-annual report required by
section 4 of the Protect America Act of 2007;
(iii) that states that there will be no further
acquisitions carried out under section 105B of the Foreign
Intelligence Surveillance Act of 1978, as added by section 2
of the Protect America Act of 2007, after the date of such
certification; and
(iv) that states that the information required to be
included under such section 4 relating to any acquisition
conducted under such section 105B has been included in a
semi-annual report required by such section 4.
(7) Replacement of orders, authorizations, and
directives.--
(A) In general.--If the Attorney General and the Director
of National Intelligence seek to replace an authorization
issued pursuant to section 105B of the Foreign Intelligence
Surveillance Act of 1978, as added by section 2 of the
Protect America Act of 2007 (Public Law 110-55), with an
authorization under section 702 of the Foreign Intelligence
Surveillance Act of 1978 (as added by section 101(a) of this
Act), the Attorney General and the Director of National
Intelligence shall, to the extent practicable, submit to the
Foreign Intelligence Surveillance Court (as such term is
defined in section 701(b)(2) of such Act (as so added)) a
certification prepared in accordance with subsection (g) of
such section 702 and the procedures adopted in accordance
with subsections (d) and (e) of such section 702 at least 30
days before the expiration of such authorization.
(B) Continuation of existing orders.--If the Attorney
General and the Director of National Intelligence seek to
replace an authorization made pursuant to section 105B of the
Foreign Intelligence Surveillance Act of 1978, as added by
section 2 of the Protect America Act of 2007 (Public Law 110-
55; 121 Stat. 522), by filing a certification in accordance
with subparagraph (A), that authorization, and any directives
issued thereunder and any order related thereto, shall remain
in effect, notwithstanding the expiration provided for in
subsection (a) of such section 105B, until the Foreign
Intelligence Surveillance Court (as such term is defined in
section 701(b)(2) of the Foreign Intelligence Surveillance
Act of 1978 (as so added)) issues an order with respect to
that certification under section 702(i)(3) of such Act (as so
added) at which time the provisions of that section and of
section 702(i)(4) of such Act (as so added) shall apply.
(8) Effective date.--Paragraphs (1) through (7) shall take
effect as if enacted on August 5, 2007.
(b) Transition Procedures for FISA Amendments Act of 2008
Provisions.--
(1) Orders in effect on december 31, 2012.--Notwithstanding
any other provision of this Act, any amendment made by this
Act, or the Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1801 et seq.), any order, authorization, or directive
issued or made under title VII of the Foreign Intelligence
Surveillance Act of 1978, as amended by section 101(a), shall
continue in effect until the date of the expiration of such
order, authorization, or directive.
(2) Applicability of title vii of fisa to continued orders,
authorizations, directives.--Notwithstanding any other
provision of this Act, any amendment made by this Act, or the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801
et seq.), with respect to any order, authorization, or
directive referred to in paragraph (1), title VII of such
Act, as amended by section 101(a), shall continue to apply
until the later of--
(A) the expiration of such order, authorization, or
directive; or
(B) the date on which final judgment is entered for any
petition or other litigation relating to such order,
authorization, or directive.
(3) Challenge of directives; protection from liability; use
of information.--Notwithstanding any other provision of this
Act or of the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801 et seq.)--
(A) section 103(e) of such Act, as amended by section
403(a)(1)(B)(ii), shall continue to apply with respect to any
directive issued pursuant to section 702(h) of such Act, as
added by section 101(a);
(B) section 702(h)(3) of such Act (as so added) shall
continue to apply with respect to any directive issued
pursuant to section 702(h) of such Act (as so added);
[[Page H5755]]
(C) section 703(e) of such Act (as so added) shall continue
to apply with respect to an order or request for emergency
assistance under that section;
(D) section 706 of such Act (as so added) shall continue to
apply to an acquisition conducted under section 702 or 703 of
such Act (as so added); and
(E) section 2511(2)(a)(ii)(A) of title 18, United States
Code, as amended by section 101(c)(1), shall continue to
apply to an order issued pursuant to section 704 of the
Foreign Intelligence Surveillance Act of 1978, as added by
section 101(a).
(4) Reporting requirements.--
(A) Continued applicability.--Notwithstanding any other
provision of this Act or of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.), section
601(a) of such Act (50 U.S.C. 1871(a)), as amended by section
101(c)(2), and sections 702(l) and 707 of such Act, as added
by section 101(a), shall continue to apply until the date
that the certification described in subparagraph (B) is
submitted.
(B) Certification.--The certification described in this
subparagraph is a certification--
(i) made by the Attorney General;
(ii) submitted to the Select Committee on Intelligence of
the Senate, the Permanent Select Committee on Intelligence of
the House of Representatives, and the Committees on the
Judiciary of the Senate and the House of Representatives;
(iii) that states that there will be no further
acquisitions carried out under title VII of the Foreign
Intelligence Surveillance Act of 1978, as amended by section
101(a), after the date of such certification; and
(iv) that states that the information required to be
included in a review, assessment, or report under section 601
of such Act, as amended by section 101(c), or section 702(l)
or 707 of such Act, as added by section 101(a), relating to
any acquisition conducted under title VII of such Act, as
amended by section 101(a), has been included in a review,
assessment, or report under such section 601, 702(l), or 707.
(5) Transition procedures concerning the targeting of
united states persons overseas.--Any authorization in effect
on the date of enactment of this Act under section 2.5 of
Executive Order 12333 to intentionally target a United States
person reasonably believed to be located outside the United
States shall continue in effect, and shall constitute a
sufficient basis for conducting such an acquisition targeting
a United States person located outside the United States
until the earlier of--
(A) the date that authorization expires; or
(B) the date that is 90 days after the date of the
enactment of this Act.
The SPEAKER pro tempore. Pursuant to House Resolution 1285, debate
shall not exceed 1 hour, with 30 minutes equally divided and controlled
by the chairman and ranking minority member of the Committee on the
Judiciary, and 30 minutes equally divided and controlled by the
chairman and ranking minority member of the Permanent Select Committee
on Intelligence.
The gentleman from Michigan (Mr. Conyers), the gentleman from Texas
(Mr. Smith), the gentleman from Texas (Mr. Reyes), and the gentleman
from Michigan (Mr. Hoekstra) each will control 15 minutes.
The Chair recognizes the gentleman from Michigan (Mr. Conyers).
General Leave
Mr. CONYERS. Madam Speaker, I ask unanimous consent that all Members
have 5 legislative days to revise and extend their remarks and include
extraneous material on the bill under consideration.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Michigan?
There was no objection.
Mr. CONYERS. Madam Speaker, I yield myself such time as I may
consume.
Members of the House, several months ago on October 16, 2007, to be
exact, the House passed the Foreign Intelligence Surveillance Act
legislation, known as the RESTORE Act. In the view of this Member, the
RESTORE Act was a reasonable and balanced one giving the administration
the power it needs to combat terrorism while protecting our precious
rights and liberties.
The legislation before us today, which I concede includes significant
improvements over the Senate legislation, goes beyond what I think was
a reasonable bottom line in the form of the RESTORE Act.
Title I of the bill continues the House approach by providing
mechanisms to ensure that FISA's longstanding exclusivity is crystal
clear. It states only a new statute directly addressing the executive
branch's foreign intelligence surveillance authority can modify FISA.
Secondly, it provides sunshine by requiring that the government
requests to private parties for surveillance assistance must actually
cite the statutory authority under which they're issued.
Now in earlier versions of FISA reform, the administration claimed
that prior court approval of procedures for overseas surveillance would
hurt national security. This matter is now laid to rest with the
consensus that upfront court review is indeed appropriate. The
requirement for individual warrants and probable cause determinations
for Americans overseas is an improvement over even the original FISA
legislation. There is a provision in the legislation that permits the
Attorney General and Director of National Intelligence to begin
surveillance prior to seeking court approval for the necessary
procedures in exigent circumstances. This is intended to be used
rarely, if at all, and was included upon assurances from the
administration that agrees that it shall not be used routinely.
The measure before us further requires extensive oversight by
Congress and the independent Inspectors General to prevent abuse. It
mandates guidelines for targeting minimization and to prevent reverse
targeting and tasks the Inspector General to monitor compliance with
those protections.
Now title II of the legislation concerning telecom liability raises
the most serious concerns in my view. In the past, I have said I would
be open to developing a set of procedures that allow both plaintiffs
and defendants to make their case. Unfortunately, this bill goes well
beyond that and changes the substantive standard for legal liability by
the telecom community, by the telecom companies and does so on a
retroactive basis, retroactive immunity. And so I appreciate that the
final bill does not send the matter to a new secret court and does
grant the court a meaningful role in the determination. Unfortunately,
these improvements do not redeem the overall provision.
Title III of the bill will also ask the Inspector General to conduct
independent investigations into the President's warrantless wiretapping
program. This inquiry will help uncover the truth for the American
people, hopefully, about the President's activities. And then there is
a part in here about an emergency provision any U.S. citizen can be
wiretapped. And I strenuously object to that.
Six years ago, the Administration unilaterally chose to engage in
warrantless surveillance of American citizens without court review. We
are now restoring the balance through enhanced Congressional oversight,
Inspector General investigations, and procedures to ensure that FISA
remains the exclusive means for authorizing electronic surveillance.
This bill continues the House approach by providing mechanisms to
ensure that FISA's longstanding exclusivity is crystal clear. First, it
states that only a new statute directly addressing the executive
branch's foreign intelligence surveillance authority can modify FISA.
Secondly, it provides sunshine by requiring requests for assistance to
cite the statutory authority under which they are issued. A conforming
amendment to Title 18 Section 2511(2)(a) is meant to underscore the
need to specify the specific statutory language being relied on, and
must be read in conjunction with the entirety of Sec. 102 of the
legislation. It should not be read to imply that assistance may be
sought for electronic surveillance, as defined in the statute, which is
not specifically authorized by statute.
In earlier versions of FISA reform, the Administration claimed that
prior court approval of procedures for overseas surveillance would hurt
national security. This matter is now laid to rest, with a consensus
that up-front court review is in fact appropriate. The requirement for
individual warrants and probable cause determinations for Americans
overseas is an improvement over even the original FISA legislation.
There is a provision in the legislation that permits the Attorney
General and Director of National Intelligence to begin a surveillance
prior to seeking court approval for the necessary procedures in
``exigent circumstances.'' This is intended to be used rarely, if at
all. In the normal course of events the DNI will have ample time to
submit such procedures to the FISA court for its approval before
initiating a particular surveillance.
The Congress provided this authority at the request of the DNI to
meet unforeseen and extraordinary circumstances, and the Administration
agrees that it may not be used routinely. The Administration
understands that the Congress expects its use to be very rare if it is
used at all.
[[Page H5756]]
The oversight committees will be informed of any use of the exigent
circumstances provision and are committed to effective oversight to
insure that it is not used to avoid the requirement to secure court
approval of the procedures in advance in all but the most extreme
circumstances. The exception must not swallow the rule.
The bill requires extensive oversight by Congress and the independent
Inspectors General to prevent abuse. It mandates guidelines for
targeting, minimization, and to prevent reverse targeting, and tasks
the Inspectors General to monitor compliance with those protections.
``Reverse targeting'' is specifically prohibited in Section
702(b)(2). The Intelligence Community agrees that this language
prohibits the targeting of one or more persons overseas for the purpose
of acquiring the communications of a specific is person reasonably
believed to be in the United States. Thus, Section 702(f) requires the
government to adopt guidelines to insure that this abuse does not occur
and the FISA court must review and approve these guidelines and assure
that they are consistent with the Fourth Amendment. The oversight
committees of the Congress intend to conduct rigorous oversight to
insure that these provisions are faithfully observed. In this
connection the Committee attaches particular importance to the required
annual review and the reporting in that review of the number of
disseminated reports which contain a reference to the identity of a US
person.
There is currently ongoing multi-District litigation in which a
federal District Court is conducting a review of the telecom carriers'
activities and the lawfulness of the President's warrantless
wiretapping program. This bill does not strip jurisdiction on that
Court and provide blanket immunity, as many wanted.
Instead, in cases where the program was actually designed to detect
or prevent a terrorist attack, the Court will assess an Attorney
General certification that can assert--among other reasons for
dismissal--that the carriers got certain requests and directives from
the Administration. The Court will look to see if the Attorney
General's certification is backed up with substantial evidence. That
means not only the underlying directives and requests, but supplemental
materials as well. And in cases where the Government claims that the
company did not provide the alleged assistance, a bald assertion is not
``substantial evidence''--the Government will have to back up its
claims to the Court's satisfaction.
That Title II of this bill provides procedures for assessing lawsuits
relating to warrantless surveillance since 9/11 does not imply that
such surveillance was lawful or that the Congress as a whole believes
that the service providers acted lawfully in providing assistance. Nor
can the provision remove the power of the courts hearing the cases to
determine if this provision is constitutional.
No company or private citizen asked by the executive branch to
provide assistance in securing the private information of Americans
without authority of law should read this language as implying that
Congress will act in the future to provide such a grounds for
dismissing a lawsuit. On the contrary, companies should be on notice
that the Congress is very reluctantly providing this defense as a one-
time action in an extremely unusual circumstance. It expects private
citizens and companies to provide assistance only when specifically
authorized by law.
For over 30 years we have mandated that telecommunications carriers
not be a merely unquestioning partner to surveillance activities. This
bill provides many ways for the companies to question or challenge
directives or requests for assistance, and we expect these to be used
any time there is something unusual or novel being requested.
Today's compromise will give the District Court direction and
procedures for handling the pending lawsuits. However, it is important
to note that the question of whether FISA's existing security
procedures at 50 U.S.C. 1806(f) preempt the state secrets privilege is
still being litigated in the courts in a case against the Government.
Nothing in this bill is intended to affect that litigation, or any
litigation against the Government or Government employees.
Today's vote is not the end of the matter. The bill provides for a 4-
year sunset, but this doesn't mean we cannot or should not revisit
these issues in the next congressional session. We will conduct
vigorous oversight, and will be monitoring the program through the
reports and audits. We will be keeping a close eye on the development
and implementation of reverse targeting, minimization, and targeting
procedures, in order to not only make sure that they are followed, but
to inform us as we consider what improvements need to be made to this
legislation.
On that note, I will reserve the balance of my time.
Mr. SMITH of Texas. Madam Speaker, I yield myself such time as I may
consume.
Madam Speaker, after nearly a year of delays and months of
negotiations, the House today will finally vote on compromise
legislation that gives our intelligence community the tools that it
needs to protect America. I join my colleague, Mr. Hoekstra, ranking
member of the Intelligence Committee, and Chairman Reyes, as an
original cosponsor of this compromise bill.
America's enemies take on many forms, terrorist groups, foreign
governments and spies who all pose serious threat to America and its
allies. Last August, Congress passed the Protect America Act which
provided a temporary solution to the problem. The PAA expired in
February. As a result, our intelligence community could not gather two-
thirds of the foreign intelligence they needed to protect American
lives.
From day one, we insisted that any legislation passed by Congress
must not interfere with our fundamental ability to collect foreign
intelligence. This legislation accomplishes that goal. H.R. 6304 does
not extend constitutional protections to foreign terrorists and other
foreign targets overseas. The bill does allow the intelligence
community to target a foreign person overseas without a court order if
critical intelligence would be lost or not collected in a timely
manner.
We insisted that any legislation passed by Congress include strong
liability protections for telecommunications carriers that assisted the
government following the terrorist attacks of September 11, 2001, as
well as protections for their assistance in the future. H.R. 6304
provides these important protections.
We insisted that Congress enact long-term FISA legislation. The bill
we have before us today will not sunset until the end of 2012. This
compromise legislation also provides strong civil liberties protections
for Americans both within the United States and abroad. And it mandates
congressional oversight and detailed reports to the House and Senate
Judiciary and Intelligence committees and requires a review by the
Inspectors General of the Department of Justice and the intelligence
agencies. This compromise is long overdue. It is supported by both the
Department of Justice and the intelligence community.
Madam Speaker, I urge my colleagues to support this bill.
Madam Speaker, I submit the following letter for the Record:
June 19, 2008.
Hon. Nancy Pelosi,
Speaker, House of Representatives,
Washington, DC.
Dear-Madam Speaker: This letter presents the views of the
Administration on the Foreign Intelligence Surveillance Act
of 1978 (``FISA'') Amendments Act of 2008 (H.R. 6304). The
bill would modernize FISA to reflect changes in
communications technology since the Act was first passed 30
years ago. The amendments would provide the Intelligence
Community with the tools it needs to collect the foreign
intelligence necessary to secure our Nation while protecting
the civil liberties of Americans. The bill would also provide
the necessary legal protections for those companies sued
because they are believed to have helped the Government
prevent terrorist attacks in the aftermath of September 11.
Because this bill accomplishes these two goals essential to
any effort to modernize FISA, we strongly support passage of
this bill and will recommend that the President sign it.
Last August, Congress took an important step toward
modernizing FlSA by enacting the Protect America Act of 2007.
That Act allowed us temporarily to close intelligence gaps by
enabling our intelligence professionals to collect, without
having to first obtain a court order, foreign intelligence
information from targets overseas. The Act has enabled us to
gather significant intelligence critical to protecting our
Nation. It has also been implemented in a responsible way,
subject to extensive executive, congressional, and judicial
oversight in order to protect the country in a manner
consistent with safeguarding Americans' civil liberties.
Since passage of the Act, the Administration has worked
closely with Congress to address the need for long-term FISA
modernization. This joint effort has involved compromises on
both sides, but we believe that it has resulted in a strong
bill that will place the Nation's foreign intelligence effort
in this area on a firm, long-term foundation. Below, we have
set forth our views on certain important provisions of H.R.
6304.
i. title i--foreign intelligence surveillance
Title I of H.R. 6304 contains key authorities that would
ensure that our intelligence agencies have the tools they
need to collect vital foreign intelligence information and
would provide significant safeguards for the civil liberties
of Americans.
[[Page H5757]]
Court Approval. With respect to authorizations for foreign
intelligence surveillance directed at foreign targets outside
the United States, the bill provides that the Foreign
Intelligence Surveillance Court (FISC) would review
certifications made by the Attorney General and the Director
of NationaI Intelligence relating to these acquisitions, the
reasonableness of the procedures used by the Intelligence
Community to ensure the targets are overseas, and the
minimization procedures used to protect the privacy of
Americans. The scope of the FISC's review is carefully and
rightly crafted to focus on aspects of the acquisition that
may affect the privacy rights of Americans so as not to
confer quasi-constitutional rights on foreign terrorists and
other foreign intelligence targets outside the United States.
We have been clear that any satisfactory bill could not
require individual court orders to target non-United States
persons outside the United States, nor could a bill establish
a court-approval mechanism that would cause the Intelligence
Community to lose valuable foreign intelligence while
awaiting such approval. H.R. 6304 would do neither and would
retain for the Intelligence Community the speed and agility
that it needs to protect the Nation. The bill would establish
a schedule for court approval of certifications and
procedures relating to renewals of existing acquisition
authority. A critical feature of the H.R. 6304 would allow
existing acquisitions, which were the subject of court review
under the Protect America Act or will be the subject of such
review under the H.R. 6304, to continue pending court review.
With respect to new acquisitions, absent exigent
circumstances, Court review of new procedures and
certifications would take place before the Government begins
the acquisition. The exigent circumstances exception is
critical to allowing the Intelligence Community to respond
swiftly to changing circumstances when the Attorney General
and the Director of National Intelligence determine that
intelligence may be lost or not timely acquired. Such exigent
circumstances could arise in certain situations where an
unexpected gap has opened in our intelligence collection
efforts. Taken together, these provisions would enable the
Intelligence Community to keep closed the intelligence gaps
that existed before the passage of the Protect America Act
and ensure that it will have the opportunity to collect
critical foreign intelligence information in the future.
Exclusive means. H.R. 6304 contains an exclusive means
provision that goes beyond the exclusive means provision that
was passed as part of FISA. As we have previously stated, we
believe that the provision will complicate the ability of
Congress to pass, in an emergency situation, a law to
authorize immediate collection of communications in the
aftermath of an attack or in response to a grave threat to
the national security. Unlike other versions of this
provision, however, the one in this bill would not restrict
the authority of the Government to conduct necessary
surveillance for intelligence and law enforcement purposes in
a way that would harm national security.
Oversight and Protections for the Civil Liberties of
Americans. H.R. 6304 contains numerous provisions that
protect the civil liberties of Americans and allow for
extensive executive, congressional, and judicial oversight of
the use of the authorities. The bill would require the
Attorney General and the Director of National Intelligence to
conduct semiannual assessments of compliance with targeting
procedures and minimization procedures and to submit those
assessments to the FISC and to Congress. The FISC and
Congress would also receive annual reviews relating to those
acquisitions prepared by the heads of agencies that use the
authorities contained in the bill. Congress would receive
reviews from the Inspectors General of these agencies and of
the Department of Justice regarding compliance with the
provisions of the bill. In addition, the bill would require
the Attorney General to submit to Congress a report at
least semiannually concerning the implementation of the
authorities provided by the bill and would expand the
categories of FISA-related court documents that the
Government must provide to the congressional intelligence
and judiciary committees.
Title I also includes provisions that would protect the
civil liberties of Americans. For instance, the bill would
require for the first time that a court order be obtained to
conduct foreign intelligence surveillance outside the United
States of an American abroad. Historically, Executive Branch
procedures guided the conduct of surveillance of a U.S.
person overseas, such as when a U.S. person acts as an agent
of a foreign power, e.g., spying on behalf of a foreign
government. Given the complexity of extending judicial review
to activities outside the United States, these provisions
were carefully crafted with Congress to ensure that such
review can be accomplished while preserving the necessary
flexibility for intelligence operations. Other provisions of
the bill address concerns that some voiced about the Protect
America Act, such as clarifying that the Government cannot
``reverse target'' without a court order and requiring that
the Attorney General establish guidelines to prevent this
from occurring. We believe that, taken together, these
provisions will allow for ample oversight of the use of these
new authorities and ensure that the privacy and civil
liberties of Americans are well protected.
ii. title ii--protections for electronic communications service
providers
Title II of the bill contains, among other provisions,
vital protections for electronic communications service
providers who assist the Intelligence Community's efforts to
protect the Nation from terrorism and other foreign
intelligence threats. Title II would provide liability
protection related to future assistance while ensuring the
protection of sources and methods. Importantly, the bill
would also provide the necessary legal protection for those
companies who are sued only because they are believed to have
helped the Government with communications intelligence
activities in the aftermath of September 11, 2001.
The framework contained in the bill for obtaining
retroactive liability protection is narrowly tailored. An
action must be dismissed if the Attorney General certifies to
the district court in which the action is pending that
either: (i) the electronic communications service provider
did not provide the assistance; or (ii) the assistance was
provided in the wake of the September 11 attack and was the
subject of a written request or series of requests from a
senior Government official indicating that the activity was
authorized by the President and determined to be lawful. The
district court would be required to review this certification
before dismissing the action, and the provision allows for
the participation of the parties to the lawsuit in a manner
consistent with the protection of classified information. The
liability protection provision does not extend to the
Government or to Government officials and it does not
immunize any criminal conduct.
Providing this liability protection is critical to the
Nation's security. As the Senate Select Committee on
Intelligence recognized, ``the intelligence community cannot
obtain the intelligence it needs without assistance from
these companies.'' That committee also recognized that
companies in the future may be less willing to assist the
Government if they face the threat of private lawsuits each
time they are believed to have provided assistance. Finally,
allowing litigation over these matters risks the disclosure
of highly classified information regarding intelligence
sources and methods. As we have stated on many occasions, it
is critical that any long-term FISA modernization legislation
contain an effective liability protection provision. H.R.
6304 contains just such a provision and for this reason, as
well as those expressed with respect to Title I above, we
strongly support its passage.
III. Title III--Review of Previous Actions
Title III would require the Inspectors General of the
Department of Justice, the Office of the Director of National
Intelligence, and of certain elements of the Intelligence
Community to review certain communications surveillance
activities, including the Terrorist Surveillance Program
described by the President. Although improvements have been
made over prior versions of this provision, we believe, as we
have written before, that it is unnecessary in light of the
Inspector General reviews previously completed, those already
underway, and the congressional intelligence and judiciary
committee oversight already conducted. Nevertheless, we do
not believe that, as currently drafted, the provision would
create unacceptable operational concerns. The bill contains
important provisions to make clear that such reviews should
not duplicate reviews already conducted by Inspectors
General.
IV. Title IV--Other Provisions
Title IV contains important provisions that will ensure
that the transition between the current authorities and the
authorities provided in this bill will not have a detrimental
effect on intelligence operations.
Title IV also states that the authorities in the bill
sunset at the end of 2012. We have long favored permanent
modernization of FISA. The Intelligence Community operates
more effectively when the rules governing our intelligence
professionals' ability to track our enemies are firmly
established. Stability of law also allows the Intelligence
Community to invest resources appropriately. Congress has
extensively debated and considered the need to modernize FISA
since 2006, a process that has involved numerous hearings,
briefings, and floor debates. The process has been valuable
and necessary, but it has also involved the discussion in
open settings of extraordinary information dealing with
sensitive intelligence operations. Every time we repeat this
process it risks exposing our intelligence sources and
methods to our adversaries. Although we would prefer that
H.R. 6304 contain no sunset, a sunset in 2012 is
significantly longer than others that were proposed and it is
long enough to avoid impairing the effectiveness of
intelligence operations.
Thank you for the opportunity to present our views on this
crucial bill. We reiterate our sincere appreciation to the
Congress for working with us on H.R. 6304, a long-term FISA
modernization bill that will strengthen the Nation's
intelligence capabilities while respecting and protecting the
constitutional rights of Americans. We strongly support its
prompt passage.
Sincerely,
Michael B. Mukasey,
Attorney General.
J.M. McConnell,
Director of National Intelligence.
I reserve the balance of my time.
[[Page H5758]]
Mr. REYES. Madam Speaker, I yield myself such time as I may consume.
(Mr. REYES asked and was given permission to revise and extend his
remarks.)
Mr. REYES. Madam Speaker, I rise today as a sponsor of H.R. 6304, the
FISA Amendments Act of 2008. This bill represents the culmination of
more than a year's work by the members and staff of the House
Intelligence Committee, together with our colleagues on the Judiciary
Committee, to bring to the floor a bill that modernizes our
surveillance authorities while protecting the constitutional rights of
Americans.
I want to thank Chairman Conyers for his efforts to strengthen this
bill. As always, I greatly appreciate my good friend's commitment to
protecting our country and the principles that we hold so dear. I also
want to thank the respective ranking members and all that worked so
hard to bring this bill to the floor today.
This bill, Madam Speaker, enjoys wide support inside the Democratic
Caucus. It has been endorsed by our Democratic whip, by our Democratic
Caucus chair, by the Blue Dog Coalition, the New Democratic Caucus and
by a number of our colleagues. For that, I want to thank in particular
our majority leader, Mr. Hoyer, for leading the effort towards a
bipartisan compromise. This bill is a far better deal than the Protect
America Act. And it is far better than the Senate bill that passed
earlier this year.
Madam Speaker, intelligence is the first line of defense in our
Nation's effort to prevent terrorism and to stop the proliferation of
weapons of mass destruction. This legislation strengthens the ability
of our intelligence agencies to conduct lawful surveillance of foreign
targets. But this legislation also serves another very important and
vital function. It strengthens the constitutional rights of Americans,
protects them from unlawful surveillance and it stops this President,
or any President, for that matter, from invoking executive power to
conduct warrantless surveillance of Americans.
{time} 1100
This bill does more than just retain the original FISA requirements
for an individual warrant based upon probable cause for surveillance
targeting Americans here in the United States. For the first time ever,
this bill requires in statute warrants for Americans anywhere in the
world. It also requires the government to establish clear guidelines to
ensure that no American is the target of any surveillance without a
warrant. It clarifies that FISA and Title 18, the Criminal Code, are
the exclusive means by which the government may conduct domestic
surveillance.
It will prohibit any unlawful, warrantless wiretapping, the kind we
saw under this administration. It provides accountability by requiring
the inspectors general of various agencies to compile a comprehensive
report on the President's surveillance program and that review must be
given to Congress. It requires prior court approval of the procedures
used to conduct surveillance of foreign targets, except in an
emergency, similar to the current FISA law.
This legislation, Madam Speaker, also addresses the issue of lawsuits
against telecommunications companies that comply with directives from
our government. This bill does not grant immunity to any government
official who might have violated the law, and this bill does not grant
automatic immunity to telecom companies, as the Senate bill would have.
Under this legislation, a Federal District Court will review the
evidence submitted by the Attorney General and then the court will
decide whether to grant civil liability and protection to a company
that provided post-9/11 assistance to the government. This bill does
not grant immunity. Congress isn't deciding the question of immunity;
the District Court will.
Finally, Madam Speaker, this bill will sunset in 4\1/2\ years,
ensuring that the next administration will be in a position to assess
and review the effectiveness of this legislation.
This legislation represents a bipartisan compromise, and, as such,
both sides got less than they wanted. But it is a product of a good
faith effort by both Republicans and Democrats to give our intelligence
agencies the tools necessary to keep America safe, while protecting our
Constitution and our civil liberties.
I strongly urge my colleagues to vote for this very important piece
of legislation.
In addition, Chairman Reyes submitted the following views for the
Record:
Exigent Circumstances
Prior court review is an absolutely integral part of this
bill, but we have also crafted an ``exigent circumstances''
circumstances provision that allows the Administration to
commence surveillance immediately in an emergency. This
provision should be invoked rarely, if at all. In the normal
course of events, the Attorney General and the Director of
National Intelligence will have ample time to submit
applications for surveillance to the FISA Court for its
approval before initiating a particular surveillance.
When used, this exception should be for purposes of a true
emergency, involving unforeseen or extraordinary
circumstances. I consider this to be limited to situations
where the intelligence sought would serve a critical function
in protecting national security and where the failure to act
immediately would result in the loss of what might be the
only opportunity to collect the information in question.
The Intelligence Committee intends to engage in regular and
vigorous oversight of these new authorities and, in
particular, the use of the ``exigent circumstances''
exception to ensure that the important protections in this
bill are not circumvented.
``Reverse Targeting''
The FISA Amendments Act of 2008 regularly uses the term
``targeting.'' We intend this term to mean more than simply
the process of selecting a telephone number or an e-mail
address to surveil. Rather, it is meant to describe the
process of purposely acquiring communications of or
information about a specific individual.
It is in this context that Section 702(b)(2) prohibits what
is generally referred to as ``reverse targeting.'' In our
discussions with the intelligence agencies, they have agreed
that this language prohibits the targeting of one or more
persons overseas where the purpose is to acquire the
communications of or information about a U.S. person or any
specific person reasonably believed to be inside the United
States. Accordingly, Section 702(f) requires that the
government adopt guidelines to ensure that this does not
occur.
Inadvertent Collection of U.S.-Person Information
Because of the nature of the new surveillance authorities
granted under this bill, we were particularly concerned about
the potential for a significant increase in the inadvertent
collection of U.S.-person communications and information. For
that reason, we have adopted several oversight provisions
that require the Intelligence Community to report to Congress
on the number of targets later determined to have been
located inside the United States, the number of disseminated
intelligence reports that contain U.S.-person information,
and the number of disseminated intelligence reports that
contain information identifying specific U.S. persons. The
Intelligence Committee plans to conduct vigorous oversight
of the reports.
Exclusivity
The exclusivity provision of this bill is extremely
important. This language is designed to prevent any future
efforts to conduct surveillance that is not authorized by
statute. The bill not only establishes that FISA and Title 18
are the exclusive means of conducting surveillance, it
requires that any future authorization for surveillance must
be explicitly established in statute. The language should in
no way be read to imply that there is an inherent power to
conduct surveillance beyond what is expressly authorized by
statute.
In particular, the language in Section 102(c)(l)(ii) should
be read to require citation to specific statutory authority
in all certifications for assistance in conducting electronic
surveillance issued pursuant to 18 U.S.C.
Sec. 2511(2)(a)(ii)(B).
Sunset
This bill is set to expire on December 31, 2012. During the
next four years, Congress will continue to assess the
surveillance activities of the U.S. Government and assess
whether additional changes need to enacted before the sunset
date to correct any deficiencies or problems that arise.
Civil Liability Provisions
The provisions in title II of this bill establish a
meaningful court review to determine whether
telecommunications companies should be protected from civil
liability for assistance provided to the government. It is
important to state that these provisions are not intended to
imply in any way that the President's conduct in connection
with the President's warrantless surveillance program was
lawful or to excuse the conduct of any government official
that might have violated the law.
Further, no telecommunications company should interpret
these provisions to imply that Congress will act in the
future to seek the dismissal of any other lawsuits charging
improper conduct in connection with surveillance activities.
Rather, Congress considers the tragic events of 9/11 to be a
unique set of circumstances that require special
consideration. As a general matter, we expect companies and
private citizens to respect the rule of law and to require
the same of its government.
With respect to the applicable legal standard, we intend
``substantial evidence'' to apply not only to a finding that
assistance was provided in response to a request that
[[Page H5759]]
meets the standard of this bill. That standard should also
apply where the court is asked to determine that the alleged
assistance was not provided. A simple declaration from the
Government or the defendant that the alleged assistance did
not occur should be deemed insufficient where there is
sufficient evidence to the contrary.
Similarly, when the Government alleges that a surveillance
program was ``designed'' (as opposed to ``intended'') to
detect and prevent terrorism, the court should examine the
evidence to assess the scope of the program and determine,
where appropriate, that indiscriminate surveillance that
acquires the communications of millions of Americans is not
truly ``designed'' to detect or prevent terrorism.
Finally, these provisions should also not be interpreted to
remove the power of the courts to review the
constitutionality of the process this bill establishes.
Mr. REYES. Madam Speaker, I reserve the balance of my time.
Mr. HOEKSTRA. Madam Speaker, I yield 3 minutes to the gentleman from
Missouri (Mr. Blunt), the distinguished minority whip, who played such
a critical role in ensuring that this bill made it to the floor today.
Mr. BLUNT. Madam Speaker, I thank Mr. Hoekstra for yielding me this
initial time that would have the otherwise gone to you.
I thank you, Mr. Hoekstra, Mr. Reyes and Mr. Smith, for bringing this
important piece of legislation to the floor and for working so hard to
see that it came to the floor. I would also like to say that I again
appreciated the opportunity to work with my good friend Mr. Hoyer, as
he spent so many hours and so much time on this. From his staff, Mariah
Sixkiller; from my staff, Brian Diffel; Mr. Boehner's staff, Jen
Stewart worked hard on this; Chris Donesa from Mr. Hoekstra's staff was
indispensable in his work, as was Caroline Lynch from Mr. Smith's
staff. And I got to know frankly and work with Jeremy Bash from Mr.
Reyes' staff and Lou DeBaca from Mr. Conyers' staff, and appreciated
the real positive contributions they bring to this process every day.
I would also like to suggest that two staffers of my colleague from
Missouri, Mr. Bond, Louis Tucker, and Jack Livingston, spent lots of
time and lots of productive work on this.
Madam Speaker, this represents a compromise, as Mr. Reyes just said,
as Mr. Smith just said, that was forged with lots of hard work by lots
of people. It accomplishes the goals of the intelligence community.
There is no individualized court order for targeting foreign terrorists
in foreign countries. There are protections here for communications
providers that may have assisted the government. But, as Mr. Reyes just
said, those protections will be determined by a court, not by this
legislation.
We modernized the law to adapt to changes in technology since the
1978 FISA statute. The bill would accomplish all this while adding new
protections and strengthening the individual liberties and privacy
protections of Americans.
We also worked closely with the majority to reinforce the FISA
Court's role in procedural certifications and reviews of administration
policies, and we created some new obligations for the Attorney General
to establish guidelines.
Madam Speaker, like yesterday's vote, this bill is an example of what
we can do when we work together. I thank all those who worked so hard
to get it to the floor today. I urge my colleagues to vote for it.
Mr. CONYERS. Madam Speaker, is it true that I have 10 minutes
remaining?
The SPEAKER pro tempore. The gentleman from Michigan has 10\1/2\
minutes remaining.
Mr. CONYERS. I am going to recognize Mr. Nadler, Ms. Lofgren, Mr.
Scott, Ms. Jackson-Lee, Mr. Holt, Ms. Lee, Mr. Capuano, Mr. Kucinich
and Mr. Inslee. A couple of them will get 1\1/2\ minutes.
The first one to be recognized is the chairman of the Crime
Subcommittee, the gentleman from Virginia (Mr. Scott), for 1\1/2\
minutes.
Mr. SCOTT of Virginia. Madam Speaker, I oppose H.R. 6304. It allows
widespread acquisition of private conversations without meaningful
court review. The bill actually permits the government to perform mass
untargeted surveillance of any and all conversations believed to be
coming into and out of the United States without any individualized
finding and without a requirement that wrongdoing is believed to be
involved at all.
It arguably is not limited just to terrorism. It could be any foreign
intelligence, which would include diplomacy and anything else. It is
vague on what can be done with the information after it is acquired and
who has access to it, and the only court review is a check on whether
or not the government certifies that the process has been followed. The
court does not review who, what and where the tapping will take place.
Furthermore, the collection of all of this data can be done under
emergency provisions before the court acts, but the collection can
continue to be done even if the court later rejects the application if
the administration appeals.
The bill also provides retroactive immunity to communications
companies who may have violated people's rights, and whether or not
those rights have been violated should be reviewed by the courts, not
decided here in Congress.
Madam Speaker, we can protect Americans' national security and
protect civil rights by providing government access to personal
conversations with meaningful court review. This bill fails to do that,
and therefore should be defeated.
Mr. SMITH of Texas. Madam Speaker, I yield 1 minute to the gentleman
from Virginia (Mr. Forbes), a member of the Judiciary Committee and the
Armed Services Committee.
Mr. FORBES. Madam Speaker, today when the sun comes up on America,
there are all too many people who spend all too much time criticizing
and apologizing for this Nation, trying to verbally tear it down. But
what frightens us most is those people who spend way too much energy
and way too much time trying to do harm to innocent Americans as they
go about their day-to-day lives, carrying their children to piano
recitals, to Little League practice, just going to work. It just makes
common sense that we would want to know what they were trying to do,
because if we know, we have at least a chance to stop it.
This is a bipartisan bill that we should have had a year ago. We
certainly should have had 4 months ago. Thank goodness we have it
today. The only unfortunate thing is those who will benefit the most
will never know it, because they never became victims because we were
able to stop those terrorist acts before they took place.
Mr. REYES. Madam Speaker, I yield 1 minute to the distinguished
gentleman from Missouri (Mr. Skelton), the chairman of the Armed
Services Committee.
Mr. SKELTON. Madam Speaker, today I rise in strong support of this
bill, the FISA Amendments Act of 2008. The bipartisan compromise before
us strikes the right balance between providing our intelligence
community with the tools they need to fight and find terrorists and
protecting our constitutional rights on the other hand.
Let me thank my colleagues Sylvester Reyes and John Conyers, our
Intelligence and Judiciary Committee chairmen, for their hard work. I
am pleased that we have resolved this critical national security issue
through bipartisan negotiations between the administration and the
Congress. I want to particularly commend Steny Hoyer, our majority
leader, and our Speaker, Nancy Pelosi, for their leadership in reaching
this landmark legislation.
The bill before us is a great improvement over the Senate bill in
that it provides for more rigorous review of electronic surveillance
activities. It gives the courts a meaningful role in determining if
telecommunication firms are entitled to civil liability protection.
The SPEAKER pro tempore. The time of the gentleman has expired.
Mr. REYES. I grant the gentleman an additional 30 seconds.
Mr. SKELTON. From my perspective as chairman of the Armed Services
Committee, the bill strongly supports the intelligence needs of those
who wear the uniform. Every day, American men and women deployed in
harm's way depend on electronic surveillance capabilities to achieve
their missions. Because of this bill and the work that has been done in
this Congress, especially the Intelligence Committee and the Judiciary
Committee, I thank them, and at the end of the day the young men and
young women will be the beneficiaries of this strong legislation.
[[Page H5760]]
Madam Speaker, I rise today in strong support of H.R. 6304, the FISA
Amendments Act of 2008.
The bipartisan compromise before us today strikes the right balance
between providing our intelligence community with the tools they need
to find and fight terrorists, and protecting our constitutional rights.
I want to thank my colleagues, Silvestre Reyes and John Conyers, our
Intelligence and Judiciary Committee Chairmen, for their hard work in
bringing a strong bill to the floor today.
I am pleased that we have resolved this critical national security
issue through bipartisan negotiations between the Administration and
the Congress and I want to particularly commend Speaker Nancy Pelosi
and Steny Hoyer for their leadership in reaching this landmark
legislation.
The bill before us today is a great improvement over the Senate bill
in that it provides for more rigorous review of electronic surveillance
activities, and gives the courts a meaningful role in determining if
telecommunications firms are entitled to civil liability protection.
From my perspective, as the Chairman of the Armed Services Committee,
this bill strongly supports the intelligence needs of our soldiers,
sailors, airmen and marines. Every day, American men and women deployed
in harm's way depend on the electronic surveillance capabilities to
achieve their missions. This legislation ensures continued delivery of
this intelligence to our warfighters.
Again, I want to congratulate Chairman Reyes and Chairman Conyers or
bringing this strong bill to the floor, and I urge my colleagues to
join me in supporting this vital national security measure.
Mr. HOEKSTRA. Madam Speaker, I yield 2 minutes to the distinguished
member of the Intelligence Committee from Texas (Mr. Thornberry).
Mr. THORNBERRY. Madam Speaker, the compromise bill before us today is
not the bill that I would have written. As a matter of fact, the
compromise Senate bill we have been trying to get a vote on since
February is not the bill I would have written either. But I do believe
that the bill before us, imperfect as it is, does do what is needed to
protect the country, and therefore I support it.
A number of people deserve credit, including Mr. Hoekstra, Mr. Blunt
and Mrs. Wilson on our side. But I also want to commend the majority
leader, Mr. Hoyer, for the time and energy he put into this issue and
for his perseverance in pushing it to a resolution. I know a number of
Members on his side don't want to do anything. They prefer operating
under an outdated law that makes it impossible to move with the speed
and agility we need to have to protect the country in an age of
terrorism. There may be some on this side who would prefer to have a
political issue for the fall campaign.
But I believe that every day we grow more vulnerable, and that we
must act now to give our national security professionals, including our
troops in the field, the tools and the information they need to do
their job.
Madam Speaker, the House has taken some significant steps this week
toward ending the disturbing practice of playing politics with national
security. When this House is allowed to vote, we can come together and
accomplish things for the country. If we can just extend that now into
energy and other issues and just allow a vote on the proposals that are
before us, we can do good for the country in other areas as well.
Mr. CONYERS. Madam Speaker, I yield 1\1/2\ minutes to the gentlewoman
from California (Ms. Zoe Lofgren), the Chair of the Immigration
Subcommittee.
Ms. ZOE LOFGREN of California. Madam Speaker, I rise in opposition to
this bill. I appreciate that some improvements have made been made to
title I of the bill, but even these improvements are undercut by the
scheme in title II that means there will be no accountability and
perhaps no adherence to the provisions of title I.
I cannot support the legislation's deeply flawed provisions relating
to the issue of immunity for telecommunications companies. These
provisions turn the judiciary into the administration's rubber stamp.
The review provided in this bill is an empty formality that will lead
to a preordained conclusion, dismissing all cases with no examination
on their merits.
Under this bill, the courts are not allowed to ask whether the
conduct of the corporations who assisted was in fact legal. They may
only note that the administration says that it was legal. In other
words, the decision on the ultimate question of legality, a decision
the Constitution dedicates to the judiciary, will instead be made by
the executive branch with the judiciary acting as a rubber stamp. It
turns the process of judicial review into a joke and denigrates this
supposedly independent and coequal branch of government.
{time} 1115
It's all the more aggravating because immunity already exists in the
law under 18 U.S.C., section 2511. It provides that telecommunications
companies are immune from suit if the company has been provided with a
court order or a certification by the Attorney General, in writing,
that the order has been obtained or is unnecessary.
I cannot support this.
(Effective: November 25, 2002)
UNITED STATES CODE ANNOTATED CURRENTNESS
Title 18. Crimes and Criminal Procedure (Refs & Annos)
Part I. Crimes (Refs & Annos)
Chapter 119. Wire and Electronic Communications Interception and
Interception of Oral Communications (Refs & Annos)
Sec. 2511. INTERCEPTION AND DISCLOSURE OF WIRE, ORAL, OR
ELECTRONIC COMMUNICATIONS PROHIBITED
(1) Except as otherwise specifically provided in this
chapter any person who--
(a) intentionally intercepts, endeavors to intercept, or
procures any other person to intercept or endeavor to
intercept, any wire, oral, or electronic communication;
(b) intentionally uses, endeavors to use, or procures any
other person to use or endeavor to use any electronic,
mechanical, or other device to intercept any oral
communication when--
(i) such device is affixed to, or otherwise transmits a
signal through, a wire, cable, or other like connection used
in wire communication; or
(ii) such device transmits communications by radio, or
interferes with the transmission of such communication; or
(iii) such person knows, or has reason to know, that such
device or any component thereof has been sent through the
mail or transported in interstate or foreign commerce; or
(iv) such use or endeavor to use (A) takes place on the
premises of any business or other commercial establishment
the operations of which affect interstate or foreign
commerce; or (B) obtains or is for the purpose of obtaining
information relating to the operations of any business or
other commercial establishment the operations of which affect
interstate or foreign commerce; or
(v) such person acts in the District of Columbia, the
Commonwealth of Puerto Rico, or any territory or possession
of the United States;
(c) intentionally discloses, or endeavors to disclose, to
any other person the contents of any wire, oral, or
electronic communication, knowing or having reason to know
that the information was obtained through the interception of
a wire, oral, or electronic communication in violation of
this subsection;
(d) intentionally uses, or endeavors to use, the contents
of any wire, oral, or electronic communication, knowing or
having reason to know that the information was obtained
through the interception of a wire, oral, or electronic
communication in violation of this subsection; or
(e) (i) intentionally discloses, or endeavors to disclose,
to any other person the contents of any wire, oral, or
electronic communication, intercepted by means authorized by
sections 2511(2)(a)(ii), 2511(2)(b)-(c), 2511(2)(e), 2516,
and 2518 of this chapter, (ii) knowing or having reason to
know that the information was obtained through the
interception of such a communication in connection with a
criminal investigation, (iii) having obtained or received the
information in connection with a criminal investigation, and
(iv) with intent to improperly obstruct, impede, or interfere
with a duly authorized criminal investigation,
shall be punished as provided in subsection (4) or shall be
subject to suit as provided in subsection (5).
(2)(a)(i) It shall not be unlawful under this chapter for
an operator of a switchboard, or an officer, employee, or
agent of a provider of wire or electronic communication
service, whose facilities are used in the transmission of a
wire or electronic communication, to intercept, disclose, or
use that communication in the normal course of his employment
while engaged in any activity which is a necessary incident
to the rendition of his service or to the protection of the
rights or property of the provider of that service, except
that a provider of wire communication service to the public
shall not utilize service observing or random monitoring
except for mechanical or service quality control checks.
(ii) Notwithstanding any other law, providers of wire or
electronic communication service, their officers, employees,
and agents, landlords, custodians, or other persons, are
authorized to provide information, facilities, or technical
assistance to persons authorized by law to intercept wire,
oral, or electronic communications or to conduct electronic
surveillance, as defined in section 101 of the Foreign
Intelligence Surveillance Act of 1978, if such provider, its
officers, employees, or agents, landlord, custodian, or
[[Page H5761]]
other specified person, has been provided with--
(A) a court order directing such assistance signed by the
authorizing judge, or
(B) a certification in writing by a person specified in
section 2518(7) of this title or the Attorney General of the
United States that no warrant or court order is required by
law, that all statutory requirements have been met, and that
the specified assistance is required, setting forth the
period of time during which the provision of the
information, facilities, or technical assistance is
authorized and specifying the information, facilities, or
technical assistance required. No provider of wire or
electronic communication service, officer, employee, or
agent thereof, or landlord, custodian, or other specified
person shall disclose the existence of any interception or
surveillance or the device used to accomplish the
interception or surveillance with respect to which the
person has been furnished a court order or certification
under this chapter, except as may otherwise be required by
legal process and then only after prior notification to
the Attorney General or to the principal prosecuting
attorney of a State or any political subdivision of a
State, as may be appropriate. Any such disclosure, shall
render such person liable for the civil damages provided
for in section 2520. No cause of action shall lie in any
court against any provider of wire or electronic
communication service, its officers, employees, or agents,
landlord, custodian, or other specified person for
providing information, facilities, or assistance in
accordance with the terms of a court order, statutory
authorization, or certification under this chapter.
(b) It shall not be unlawful under this chapter for an
officer, employee, or agent of the Federal Communications
Commission, in the normal course of his employment and in
discharge of the monitoring responsibilities exercised by the
Commission in the enforcement of chapter 5 of title 47 of the
United States Code, to intercept a wire or electronic
communication, or oral communication transmitted by radio, or
to disclose or use the information thereby obtained.
(c) It shall not be unlawful under this chapter for a
person acting under color of law to intercept a wire, oral,
or electronic communication, where such person is a party to
the communication or one of the parties to the communication
has given prior consent to such interception.
(d) It shall not be unlawful under this chapter for a
person not acting under color of law to intercept a wire,
oral, or electronic communication where such person is a
party to the communication or where one of the parties to the
communication has given prior consent to such interception
unless such communication is intercepted for the purpose of
committing any criminal or tortious act in violation of the
Constitution or laws of the United States or of any State.
(e) Notwithstanding any other provision of this title or
section 705 or 706 of the Communications Act of 1934, it
shall not be unlawful for an officer, employee, or agent of
the United States in the normal course of his official duty
to conduct electronic surveillance, as defined in section 101
of the Foreign Intelligence Surveillance Act of 1978, as
authorized by that Act.
(f) Nothing contained in this chapter or chapter 121 or 206
of this title, or section 705 of the Communications Act of
1934, shall be deemed to affect the acquisition by the United
States Government of foreign intelligence information from
international or foreign communications, or foreign
intelligence activities conducted in accordance with
otherwise applicable Federal law involving a foreign
electronic communications system, utilizing a means other
than electronic surveillance as defined in section 101 of the
Foreign Intelligence Surveillance Act of 1978, and procedures
in this chapter or chapter 121 and the Foreign Intelligence
Surveillance Act of 1978 shall be the exclusive means by
which electronic surveillance, as defined in section 101 of
such Act, and the interception of domestic wire, oral, and
electronic communications may be conducted.
(g) It shall not be unlawful under this chapter or chapter
121 of this title for any person--
(i) to intercept or access an electronic communication made
through an electronic communication system that is configured
so that such electronic communication is readily accessible
to the general public;
(ii) to intercept any radio communication which is
transmitted--
(I) by any station for the use of the general public, or
that relates to ships, aircraft, vehicles, or persons in
distress;
(II) by any governmental, law enforcement, civil defense,
private land mobile, or public safety communications system,
including police and fire, readily accessible to the general
public;
(III) by a station operating on an authorized frequency
within the bands allocated to the amateur, citizens band, or
general mobile radio services; or
(IV) by any marine or aeronautical communications system;
(iii) to engage in any conduct which--
(I) is prohibited by section 633 of the Communications Act
of 1934; or
(II) is excepted from the application of section 705(a) of
the Communications Act of 1934 by section 705(b) of that Act;
(iv) to intercept any wire or electronic communication the
transmission of which is causing harmful interference to any
lawfully operating station or consumer electronic equipment,
to the extent necessary to identify the source of such
interference; or
(v) for other users of the same frequency to intercept any
radio communication made through a system that utilizes
frequencies monitored by individuals engaged in the provision
or the use of such system, if such communication is not
scrambled or encrypted.
(h) It shall not be unlawful under this chapter--
(i) to use a pen register or a trap and trace device (as
those terms are defined for the purposes of chapter 206
(relating to pen registers and trap and trace devices) of
this title); or
(ii) for a provider of electronic communication service to
record the fact that a wire or electronic communication was
initiated or completed in order to protect such provider,
another provider furnishing service toward the completion of
the wire or electronic communication, or a user of that
service, from fraudulent, unlawful or abusive use of such
service.
(i) It shall not be unlawful under this chapter for a
person acting under color of law to intercept the wire or
electronic communications of a computer trespasser
transmitted to, through, or from the protected computer, if--
(I) the owner or operator of the protected computer
authorizes the interception of the computer trespasser's
communications on the protected computer;
(II) the person acting under color of law is lawfully
engaged in an investigation;
(III) the person acting under color of law has reasonable
grounds to believe that the contents of the
computer trespasser's communications will be relevant to
the investigation; and
(IV) such interception does not acquire communications
other than those transmitted to or from the computer
trespasser.
(3)(a) Except as provided in paragraph (b) of this
subsection, a person or entity providing an electronic
communication service to the public shall not intentionally
divulge the contents of any communication (other than one to
such person or entity, or an agent thereof) while in
transmission on that service to any person or entity other
than an addressee or intended recipient of such communication
or an agent of such addressee or intended recipient.
(b) A person or entity providing electronic communication
service to the public may divulge the contents of any such
communication--
(i) as otherwise authorized in section 2511(2)(a) or 2517
of this title;
(ii) with the lawful consent of the originator or an
addressee or intended recipient of such communication;
(iii) to a person employed or authorized, or whose
facilities are used, to forward such communication to its
destination; or
(iv) which were inadvertently obtained by the service
provider and which appear to pertain to the commission of a
crime, if such divulgence is made to a law enforcement
agency.
(4)(a) Except as provided in paragraph (b) of this
subsection or in subsection (5), whoever violates subsection
(1) of this section shall be fined under this title or
imprisoned not more than five years, or both.
(b) Conduct otherwise an offense under this subsection that
consists of or relates to the interception of a satellite
transmission that is not encrypted or scrambled and that is
transmitted--
(i) to a broadcasting station for purposes of
retransmission to the general public; or
(ii) as an audio subcarrier intended for redistribution to
facilities open to the public, but not including data
transmissions or telephone calls,
is not an offense under this subsection unless the conduct is
for the purposes of direct or indirect commercial advantage
or private financial gain.
[(c) Redesignated (b)]
(5)(a)(i) If the communication is--
(A) a private satellite video communication that is not
scrambled or encrypted and the conduct in violation of this
chapter is the private viewing of that communication and is
not for a tortious or illegal purpose or for purposes of
direct or indirect commercial advantage or private commercial
gain; or
(B) a radio communication that is transmitted on
frequencies allocated under subpart D of part 74 of the rules
of the Federal Communications Commission that is not
scrambled or encrypted and the conduct in violation of this
chapter is not for a tortious or illegal purpose or for
purposes of direct or indirect commercial advantage or
private commercial gain,
then the person who engages in such conduct shall be subject
to suit by the Federal Government in a court of competent
jurisdiction.
(ii) In an action under this subsection--
(A) if the violation of this chapter is a first offense for
the person under paragraph (a) of subsection (4) and such
person has not been found liable in a civil action under
section 2520 of this title, the Federal Government shall be
entitled to appropriate injunctive relief; and
(B) if the violation of this chapter is a second or
subsequent offense under paragraph (a) of subsection (4) or
such person has been found liable in any prior civil action
under section 2520, the person shall be subject to a
mandatory $500 civil fine.
(b) The court may use any means within its authority to
enforce an injunction issued under paragraph (ii)(A), and
shall impose a
[[Page H5762]]
civil fine of not less than $500 for each violation of such
an injunction.
Mr. SMITH of Texas. Madam Speaker, I will yield 2 minutes to the
gentleman from Indiana (Mr. Pence) who is a member of the Judiciary
Committee and the Foreign Affairs Committee as well.
(Mr. PENCE asked and was given permission to revise and extend his
remarks.)
Mr. PENCE. Madam Speaker, I rise in support of the FISA Amendments
Act of 2008.
America is at war. We have to do all we can to protect our Nation
from those who seek to harm this country, our communities and our
families.
After nearly a year of delays, we finally have before us a bill that
will institute a long-term fix to our Nation's foreign intelligence
surveillance laws and provide the intelligence community with the tools
it needs to protect this country.
I rise in particular appreciation of Republican Whip Roy Blunt,
Ranking Member Smith and Mr. Hoekstra. These Republicans stood firm and
have succeeded in negotiating a strong 4-year extension to our
surveillance laws.
While this bill is tough on terrorists, it includes strong
protections for civil liberties and Americans that have also been put
in place by extensive measures of oversight and review in the
Department of Justice, and it protects those patriotic
telecommunications companies who assisted the Federal Government in the
wake of 9/11.
While I endorse these reforms and safeguards, let me say, Madam
Speaker, Congress and future administrations must be vigilant to ensure
that the exigent circumstances exceptions are practiced in a way that
preserves Presidential discretion when conducting real-time foreign
intelligence. Speaking less as a Congressman and more as a father, and
as an American who was here on September 11, I am grateful to my
colleagues in both parties for bringing this important compromise to
the floor and making sure that our intelligence community, those who
work tirelessly every day to protect us, have the tools they need to
prevent the horrors of that day from ever being visited on our soil
again.
Mr. REYES. Madam Speaker, I yield 2 minutes to the distinguished
gentlewoman from California, Ms. Jane Harman, who is the former ranking
member of the Intelligence Committee.
(Ms. HARMAN asked and was given permission to revise and extend her
remarks.)
Ms. HARMAN. Madam Speaker, my phones are ringing off the hook, and my
e-mail accounts are full. By the hundreds and hundreds, my constituents
are saying, ``don't cave in,'' ``don't toss due process out the
window,'' ``no compromise on our civil liberties'' and ``all
surveillance of Americans should require a warrant.'' One of the most
powerful, ``The U.S. Constitution has been `marked up.' Don't shred
it.''
I agree, now and always. The hard part is deciding whether the FISA
compromise before us meets my constituents' requirements and my own.
After reading every word of it, and after many, many hours working to
develop and revise portions of it, I conclude that the compromise
replaces bad law, the Protect America Act, with law that actually
improves many of the provisions of the underlying FISA law which has
served our country well for three decades.
Let me highlight three issues.
First, this bill makes clear that no president can ignore it ever
again. FISA is the exclusive means by which our government can conduct
surveillance. In short, no more warrantless surveillance.
Second, it expands the circumstances for which individual warrants
are required, by including Americans outside the U.S., and it protects
Americans from so-called reverse targeting.
Third, it requires Federal court review to determine whether
communications firms, which assisted in post-9/11 activities, get civil
liability protection. If the evidence is inadequate, courts can deny
immunity, and immunity does not cover government officials who may have
violated the law.
I have lived with FISA up close and personal for many years. I am
angry about the way the Bush administration abused it and disrespected
Congress. My constituents are right to demand that Congress show
courage and stand up for the Constitution. Security and liberty are
reinforcing values, not a zero-sum gain. This bill, though imperfect,
protects both.
Mr. SMITH of Texas. Madam Speaker, I yield 1 minute to the gentleman
from Ohio (Mr. Boehner) who is the distinguished Republican leader of
the House.
Mr. BOEHNER. Let me thank my colleague from Texas for yielding.
Let me just take a moment to congratulate both Mr. Smith, ranking
member on the Judiciary Committee, and Mr. Hoekstra, the ranking member
on the Intelligence Committee, and all of their staff, who have worked
closely with our Democrat colleagues, both in the House and Senate, to
craft a bill that will help protect the American people.
Madam Speaker, America cannot afford to have a pre-9/11 mentality
when it comes to national security. I think that's why this bill is so
critical and why Members and staff have been working so hard to craft
it. I recognize the serious threat that we face, and it keeps our
Nation on offense when it comes to protecting the American people.
Our intelligence officials must have the ability to monitor
terrorists suspected of plotting to kill Americans. This measure
ensures that the tools that they need will be there to help keep
America safe. They have retroactive liability protections for firms
that have aided the government and have worked with our government at
our request to help detect and prevent attacks. We should protect those
companies.
I think it also protects the civil liberties of all Americans. This
is an important piece of legislation. It has taken an awful lot of time
to get there.
But just like yesterday, when Members on both sides of the aisle work
together, we can come to an agreement. We can come to a compromise
that's in the best interest of our country.
Two days in a row we have had two great examples of how we can craft
very good bills by working in a bipartisan manner. I want to
congratulate all the Members on both sides of the aisle and their
staffs who have worked so hard to bring this bill to the floor.
Mr. CONYERS. Madam Speaker, I would like now to yield to the chairman
of the subcommittee on the Constitution and the Judiciary, the
gentleman from New York, Jerry Nadler, 1\1/2\ minutes.
Mr. NADLER. Madam Speaker, in order to uphold the principle of the
rule of law and the supremacy of the Constitution, we must reject this
bill. This bill limits the courts hearing lawsuits alleging illegal
wiretapping, to considering only whether the telecom companies received
a ``written request or directive indicating that the activity was
authorized by the President and determined to be lawful,'' not whether
that request was actually lawful or that telecom companies knew that it
was unlawful.
The bill is a fig leaf granting blanket immunity to the telecom
companies for possibly illegal acts without allowing the courts to
consider the facts or the law. It denies people whose rights are
violated their fair day in court, and it denies the American people the
right to have the actions of this administration subjected to fair and
independent scrutiny.
Even the court's limited review will remain secret. The lawsuits will
be dismissed, but the basis for that dismissal that the defendants were
innocent of misconduct or that they were guilty, but that Congress
commands their immunity, must remain secret.
The constitutionality of the immunity granted by this bill is very
questionable. As Judge Walker put it in the AT&T case, ``AT&T's alleged
actions here violate the constitutional rights clearly established in
the Keith decision. Moreover, because the very action in question has
previously been held unlawful, AT&T cannot seriously contend that a
reasonable entity in its position could have believed that the alleged
domestic dragnet was legal.''
I would hope that the courts will find that because the
constitutional rights of Americans have been violated, Congress'
attempt to prevent court review is unconstitutional. I regret we may
today abandon the Constitution's protections and insulate lawless
behavior from legal scrutiny.
I urge a ``no'' vote on this legislation.
[[Page H5763]]
Mr. HOEKSTRA. Madam Speaker, at this time I would like to yield 3
minutes to a member of the committee, Mrs. Wilson from New Mexico.
(Mrs. WILSON of New Mexico asked and was given permission to revise
and extend her remarks.)
Mrs. WILSON of New Mexico. Madam Speaker, in December of 2005, I was
walking to work and was at 1st and C Street when the front page of the
New York Times revealed the existence of a program that had not been
previously briefed to the entire Intelligence Committee and to the
subcommittee that I, at that time, chaired that oversaw the activities
of the National Security Agency. That launched a period of extensive
oversight and draft legislation in 2006.
In January of 2007, because legislation didn't pass, the
administration made an attempt to put this entire program under a FISA
law that was not designed and was not updated. I described that at the
time as trying to put a twin-size sheet on a king-size bed. It didn't
work.
By late summer of 2007, we had lost close to two-thirds of our
intelligence collection on terrorism. We were unable to respond fast
enough when we had problems, particularly in war zones.
Just before Memorial Day in 2007, we had three soldiers who were
kidnapped in Iraq. We needed an Army of lawyers in Washington D.C. to
listen to the communications of the people that we thought had
kidnapped them.
That delay is not good enough and led to the insistence that we pass
the Protect America Act, which this Congress did, over the objections
of the Democratic leadership, in August of 2007. The Protect America
Act closed an important intelligence gap, but it expired in February of
this year, and the gap is at risk of ever widening.
The bill that we pass today will protect the civil liberties of
Americans and continue to require individualized warrants for anyone in
the United States or American citizens anywhere in the world. It will
also allow our intelligence agencies to very rapidly follow up on tips
and listen to foreigners in foreign countries who are trying to kill
Americans.
We have restored FISA to its original intent and modernized it for
21st century communications and technology. This is an important step
for our intelligence community and will put it on a sound footing for
the next several decades.
Intelligence, good intelligence, is the first line of defense against
terrorism, and today this body will take the next step in making sure
we have the tools to be able to listen to our enemies and prevent other
terrorist attacks.
I would urge my colleagues to support the legislation.
Mr. CONYERS. Madam Speaker, I would like to yield now to a senior
member of Judiciary, Sheila Jackson-Lee of Texas, 1 minute.
Ms. JACKSON-LEE of Texas. I thank the distinguished chairman.
Madam Speaker, I rise to say that we did have legislation that would
protect the Constitution and provide the security for our troops and
those in the intelligence community, and that was the RESTORE Act.
Today I rise in enormous opposition to H.R. 6304 because, frankly,
Madam Speaker, it's very difficult to put lipstick on a pig.
What we have here is the opportunity for the government to conduct
mass, untargeted surveillance of all communications coming into and out
of the United States without any individual review and without any
finding of wrongdoing.
What Americans don't know is that this government can now surveil you
for 7 days without any approval. Then if the court denies the
application, while the application is being appealed from the denial,
you can be surveilled for 60 days.
This is not constitutional protection. As it relates to the idea of
those who are now in court on warrantless searches, now the courts have
no authority over that, and your cases will be dismissed.
I ask my colleagues to oppose this because ``significant purpose''
has been taken out of this legislation.
Madam Speaker, I rise today in opposition to H.R. 6304, the ``FISA
Amendments Act of 2008''. This body has worked diligently with our
colleagues in the Senate to ensure that the civil liberties of American
citizens are appropriately addressed. Sadly, this compromise bill falls
short of that aim. I will support no bill that fails to protect
American civil liberties, both at home and abroad.
I am unable to support this bill that will overhaul how the
Government monitors foreign terrorist suspects. I will not support any
legislation that grants legal immunity to telecommunications companies
that provide information to Federal investigators without a warrant.
Madam Speaker, this administration has the law to protect the
American people. When Americans are involved, the Bill of Rights, the
fourth amendment, and our civil liberties must be adhered to. This
legislation does not go far enough to ensure that American rights are
protected.
The original legislation offered by the House Majority gave the
Administration everything that it needed, but today, after months of
negotiation, if we endorse H.R. 6304, which grants sweeping wiretapping
authority to the Government with little court oversight and ensures the
dismissal of all pending cases against the telecommunications
companies, we are eviscerating the Constitution.
Let me explain my objections to H.R. 6304. It permits the Government
to conduct mass, untargeted surveillance of all communications coming
into and out of the United States, without any individualized review,
and without any finding of wrongdoing.
H.R. 6304 permits minimal court oversight. The Foreign Intelligence
Surveillance Court (FISA Court) only reviews general procedures for
targeting and minimizing the use of information that is collected.
Under these circumstances, the court may not know what will be tapped
and where it will occur.
Furthermore, the bill contains a general ban on reverse targeting,
but not the strong language I worked so diligently to include in the
FISA legislation that had passed previously in the House. In my view,
the RESTORE Act is far superior to this piece of legislation. I wish to
take a few moments to discuss the improvement that I offered to the
RESTORE Act in the full Judiciary Committee markup, and which was sent
over to the Senate for consideration last year.
My amendment made an essential contribution to the RESTORE Act by
laying down a clear, objective criterion for the administration to
follow and the FISA court to enforce in preventing reverse targeting.
Reverse targeting is the practice where the Government targets
foreigners without a warrant while its actual purpose is to collect
information on certain U.S. persons. My language included clear
statutory directives regarding whom the government should return to the
FISA court and obtain an individualized order if it would like to
continue listening to an Americans' communications.
One of the major concerns that libertarians and classical
conservatives, as well as progressives and civil liberties
organizations, have with this legislation, as they did with its
successor, the Protect America Act, is that the temptation of national
security agencies to engage in reverse targeting may be difficult to
resist in the absence of certain safeguards in the law to prevent it.
My amendment attempted to produce such safeguards. My amendment
reduced even further any such temptation to resort to reverse targeting
by requiring the administration to obtain a regular, individualized
FISA warrant whenever the ``real'' target of the surveillance is a
person in the United States.
The amendment achieved this objective by requiring the administration
to obtain a regular FISA warrant whenever a ``significant purpose of an
acquisition is to acquire the communications of a specific person
reasonably believed to be located in the United States.''
It is far from clear how the operative language ``reasonably designed
to ensure that any acquisition authorized . . . is limited to targeting
persons reasonably believed to be located outside the United States;
and prevent the intentional acquisition of any communication as to
which the sender and all intended recipients are known at the time of
acquisition to be located in the United States.''
Yes. It is true that H.R. 6304, the compromise legislation, attempts
to ensure that American civil liberties are protected, but the
operative language in the legislation does not provide a paradigm for
consistency. This is so because it does not provide an objective
criterion. H.R. 6304 does not go as far as the legislation that the
House sent over to the Senate a few months ago. H.R. 6304 does not
retain the objective standards contained in my amendment.
The language used in my amendment, ``significant purpose,'' is a term
of art that long has been a staple of FISA jurisprudence and thus is
well known and readily applied by agencies, legal practitioners, and
the FISA Court. Thus, the Jackson-Lee amendment provided a clearer,
more objective criterion for the administration to follow and the FISA
court to enforce to prevent the practice of reverse targeting without a
warrant, which all of us can agree should not be permitted.
[[Page H5764]]
A FISA order should be required in those instances where there is a
particular, known person in the United States at the other end of the
foreign target's call in whom the Government has a significant
interest such that a significant purpose of the surveillance has become
to acquire that person's communications. This protection has been
stripped from H.R. 6304. I fought hard to keep this language in the
bill because it is important to me; and it should be very important to
members of this body and to all Americans. It is important that we
require what should be required in all cases--warrant any time there is
specific, targeted surveillance of a United States citizen.
Madam Speaker, I have more objections to H.R. 6304 which I will
quickly note. H.R. 6304 contains an ``exigent'' circumstances loophole
that thwarts the judicial review requirement. The bill permits the
Government to start a spying program and wait to go to court for up to
seven (7) days every time ``intelligence important to the national
security of the U.S. may be lost or not timely acquired.'' The problem
with H.R. 6034 is that court applications take time and will delay the
collection of information. Therefore, it is possible that there will
not be resort to prior judicial review.
Under H.R. 6304, the Government is permitted to continue surveillance
programs even if the application is denied by the court. The Government
has the authority to wiretap through the entire appeals process, and
then keep and use whatever it gathers in the meantime.
I am also troubled by H.R. 6304's dismissal of all cases pending
against telecommunication companies that facilitated the warrantless
wiretapping program over the last 7 years. The test in the bill is not
whether the Government certifications were actually legal--only whether
they were issued. Because it is public knowledge that they were, all
the cases seeking to find out what these companies and the Government
did without communications will be dismissed. Under this bill, we will
start as a tabula rasa. Telecommunications companies will be prevented
from having their day in court and we, the American people, will never
have a chance to know what the companies did and what information is
collected. I am deeply troubled by this, and frankly, you should be,
too.
Madam Speaker, it is important to point out that the loudest demands
for blanket immunity did not come from the telecommunications companies
but from the administration, which raises the interesting question of
whether the administration's real motivation is to shield from public
disclosure the ways and means by which Government officials may have
``persuaded'' telecommunications companies to assist in its warrantless
surveillance programs.
Madam Speaker, let me be clear in my opposition. Nothing in the Act
or the amendments to the Act should require the Government to obtain a
FISA order for every overseas target on the off chance that they might
pick up a call into or from the United States. Rather, what should be
required, is a FISA order only where there is a particular, known
person in the United States at the other end of the foreign target's
calls in whom the Government has a significant interest such that a
significant purpose of the surveillance has become to acquire that
person's communications.
Nearly two centuries ago, Alexis de Tocqueville, who remains the most
astute student of American democracy, observed that the reason
democracies invariably prevail in any martial conflict is because
democracy is the governmental form that best rewards and encourages
those traits that are indispensable to martial success: initiative,
innovation, resourcefulness, and courage.
As I wrote in the Politico, ``the best way to win the war on terror
is to remain true to our democratic traditions. If it retains its
democratic character, no nation and no loose confederation of
international villains will defeat the United States in the pursuit of
its vital interests.''
Thus, the way forward to victory in the war on terror is for the
United States country to redouble its commitment to the Bill of Rights
and the democratic values which every American will risk his or her
life to defend. It is only by preserving our attachment to these
cherished values that America will remain forever the home of the free,
the land of the brave, and the country we love.
Madam Speaker, FISA has served the Nation well for nearly 30 years,
placing electronic surveillance inside the United States for foreign
intelligence and counterintelligence purposes on a sound legal footing,
and I am far from persuaded that it needs to be jettisoned.
However, I know that FISA as outlined in this bill, H.R. 6304,
attempts to curtail the Bill of Rights and the civil liberties of the
American people. I continue to insist upon individual warrants, based
upon probable cause, when surveillance is directed at people in the
United States. The Attorney General must still be required to submit
procedures for international surveillance to the Foreign Intelligence
Surveillance Court for approval, but the FISA Court should not be
allowed to issue a ``basket warrant'' without making individual
determinations about foreign surveillance.
In all candor, Madam Speaker, I must restate my firm conviction that
when it comes to the track record of this President's warrantless
surveillance programs, there is still not enough on the public record
about the nature and effectiveness of those programs, or the
trustworthiness of this administration, to indicate that they require a
blank check from Congress.
The Bush administration did not comply with its legal obligation
under the National Security Act of 1947 to keep the Intelligence
Committees ``fully and currently informed'' of U.S. intelligence
activities. Congress cannot continue to rely on incomplete information
from the Bush administration or revelations in the media. It must
conduct a full and complete inquiry into electronic surveillance in the
United States and related domestic activities of the NSA, both those
that occur within FISA and those that occur outside FISA.
The inquiry must not be limited to the legal questions. It must
include the operational details of each program of intelligence
surveillance within the United States, including: (1) who the NSA is
targeting; (2) how it identifies its targets; (3) the information the
program collects and disseminates; and most important (4) whether the
program advances national security interests without unduly
compromising the privacy rights of the American people.
Given the unprecedented amount of information Americans now transmit
electronically and the post-9/11 loosening of regulations governing
information sharing, the risk of intercepting and disseminating the
communications of ordinary Americans is vastly increased, requiring
more precise--not looser--standards, closer oversight, new mechanisms
for minimization, and limits on retention of inadvertently intercepted
communications.
Madam Speaker, I encourage my colleagues to join me in opposition to
H.R. 6304, as it grants sweeping wiretapping authority to the
Government with little court oversight and ensures the dismissal of all
pending cases against the telecommunications companies. In my view,
this is wrong and unacceptable.
Mr. SMITH of Texas. Madam Speaker, I yield 1 minute to the gentleman
from Arizona (Mr. Franks) who is a member of the Judiciary Committee
and a ranking member of the Constitution Subcommittee.
{time} 1130
Mr. FRANKS of Arizona. I thank the gentleman for yielding me this
time.
Madam Speaker, the coincidence of jihadist terrorism and nuclear
proliferation in our world today I believe represents the greatest
security threat to the human family. Osama bin Laden said ``our
religious duty is to gain nuclear weapons.'' If that quest should
succeed, whether it is 100 yards from this Capitol or in one of our
major cities, it will change our concept of freedom in a way that
almost none of us can comprehend. And our best hope of preventing that
is to have effective intelligence capability.
I believe that the majority has risked the security of this country
by delaying a vote on this important bill for so long; but I am
gratified today that at least we are taking the next step in making
sure that we can see our children and grandchildren walk in the
sunlight of freedom.
As we go forward, we should all keep in mind the words of our
Founding Fathers and the words especially of Thomas Jefferson when he
said, ``The price of freedom is eternal vigilance.''
Mr. REYES. Madam Speaker, may I inquire as to how much time remains
on all sides.
The SPEAKER pro tempore. The gentleman from Michigan (Mr. Conyers)
has 5 minutes remaining; the gentleman from Texas (Mr. Reyes) has 6\1/
2\ minutes remaining; the gentleman from Texas (Mr. Smith) has 8
minutes remaining; and the gentleman from Michigan (Mr. Hoekstra) has
7\1/2\ minutes remaining.
Mr. REYES. Madam Speaker, I now would like to yield 2 minutes to the
distinguished gentleman from Maryland (Mr. Ruppersberger) who serves as
the chairman of our Subcommittee on Technical and Tactical Intelligence
on our Intelligence Committee.
Mr. RUPPERSBERGER. Madam Speaker, I am proud to rise in support of
H.R. 6304. I would like to thank Chairman Reyes, Chairman Conyers,
Majority Leader Hoyer, Minority Leader Blunt, and Ranking Member
Hoekstra for coming together with a bill that we need on behalf of our
country.
My district includes the National Security Agency, and many of NSA's
employees are my constituents. As a
[[Page H5765]]
member of the House Committee on Intelligence and the chairman of the
Subcommittee on Technical and Tactical Intelligence, which oversees
NSA, I know that the men and women who work for our Nation's
intelligence agencies work hard every day to keep our Nation safe.
The intelligence agencies must do their work within the laws of this
country, and they need those laws to be clear. The NSA employees in my
district need a clear law with a bright line between legal and illegal
surveillance activities, and this bill provides that.
Our Constitution requires checks and balances for the three branches
of government. This bill provides that the FISA Court must review
surveillance requests to protect the constitutional rights of our
citizens.
I urge my colleagues to support this bill because it gives our
intelligence community the tools they need to keep our Nation safe
while protecting the constitutional rights of Americans.
Mr. HOEKSTRA. I would like to yield 3 minutes to another
distinguished gentleman from Michigan (Mr. Rogers).
Mr. ROGERS of Michigan. Madam Speaker, I want to compliment Mr.
Reyes. When this happened 124 days ago when it expired, I realized what
a challenge you had. They were asking you to win the Kentucky Derby by
entering a donkey in the race. And trying to get all of the folks
together to get us to the place where we are today was not short feat.
Mr. Hoekstra and Mr. Reyes, I want to thank you both because what
this bill does today is reaffirm what we have been saying for the last
several years, that the due process of the Constitution, the fourth
amendment, is alive and well and protected in this bill. And any
rhetoric to the contrary is simply not true. It is fear mongering.
For any U.S. citizen who believes that their phones are going to be
unceremoniously and injudiciously tapped or listened to is simply
wrong, and this bill reaffirms the importance of that fourth amendment
and due process for every American citizen every day.
But it also says some very important things. We are going to protect
the Good Samaritan law that we have known and developed over the last
200-plus years that if you in good faith help your neighbor or help
your country, in good faith you will be protected from damages sought
by anyone else. If you stand up and protect the liberties and justice
of your country and the lives of your neighbors, you will be protected
in this law.
And finally, our foreign intelligence service allies have been
nervous for 124 days, begging, pleading, cajoling, asking please, step
up to the plate and reengage in one of the most important intelligence
elements that we have, that the United States shares with our foreign
allies to stop suicide bombers, to stop terrorist elements from
developing plans and plots to kill their citizens as well as our own.
This bill reaffirms all that we said last year and the year before.
It reaffirms what we said in the Protect America Act in August of 2007
that it is absolutely important that we step up to the plate and listen
to foreign terrorists in foreign lands plotting to kill citizens of our
allies and here at home.
I want to congratulate all those who came together today, and urge
those with the rhetoric to please stand for your country today, stand
for the soldiers in the field who deserve our protection and the
protection of the intelligence services, and for every mother and every
father, every child in America who looks for a better day tomorrow
knowing that we once again have both our eyes and our ears on the
problem with terrorism and radical jihadists.
Mr. CONYERS. Madam Speaker, I am pleased to yield to the gentleman
from New Jersey (Mr. Holt), a distinguished member of the Intelligence
Committee, 1 minute.
Mr. HOLT. Madam Speaker, I thank the chairman of the Judiciary
Committee for yielding me time to speak about this.
Unfortunately, the negotiators who brought this bill to the floor
bought into the flawed assumptions of the Bush administration that
because we live in a dangerous world, we must now redefine the fourth
amendment and thus the fundamental relationship between the government
and its people.
If this bill becomes law, it will perhaps be the only lasting legacy
of the Bush-Cheney administration's overhaul of national security
policy, a congressionally blessed distortion of congressional checks
and balances. It permits massive warrantless surveillance in the
absence of any standard for defining how communications of innocent
Americans will be protected; a fishing expedition approach to
intelligence collection that we know will not make Americans more safe.
Its court review provisions are weak and narrowly defined. I know
some of those who negotiated this bill say that some court review is
better than no court review. That is only true if the judge's hands
aren't tied in the review process. They are in this bill.
There is a fundamental American principle that those who search,
seize, intercept and detain should not be the ones who decide who are
the bad guys.
Mr. SMITH of Texas. Madam Speaker, I yield 2 minutes to the gentleman
from California (Mr. Issa) who is a member of the Judiciary Committee
and the Permanent Select Committee on Intelligence as well.
(Mr. ISSA asked and was given permission to revise and extend his
remarks.)
Mr. ISSA. Madam Speaker, I rise in strong support of this hammered-
out compromise bill.
You know, Madam Speaker, elections matter. The current balance in the
House and the Senate played an important part in the administration,
House Republicans, House Democrats, Senate Democrats, and Senate
Republicans coming together and figuring out what was needed, what was
constitutional, in a very much bipartisan fashion.
Unfortunately, there are those who want to have it both ways, those
who will talk about how this is balanced, it meets the needs of the
administration, as the administration is assuring us, and it meets all
of the constitutional requirements. But there are those who want to
also play to the other side. While making sure that we are protected by
a good piece of legislation, there are those who will come on the floor
and denounce this and then vote against it.
Madam Speaker, I ask the American people to look long and hard at how
people vote on this. This is in fact worked out to assure the American
people, and properly so, that we will protect all of their
constitutional rights while doing everything we can to ensure their
safety.
This is good legislation worked out over a long period of time, and a
lot of thoughtful work went into it on both sides. But I ask the
American people to hold accountable those who would want to know that
the American people are protected, and then vote against it in order to
play to special interests.
Madam Speaker, that is the bad part of what will happen today. The
good part is that America will be safer and the Constitution will be
secure because of what we are doing here today. I thank you and urge
support.
Mr. CONYERS. Madam Speaker, I am pleased now to yield to the
gentlewoman from California (Ms. Lee), cochair of the Progressive
Caucus and a leader in the Congressional Black Caucus, 1 minute.
Ms. LEE. Madam Speaker, let me thank the gentleman for yielding and
for his leadership.
I rise in strong opposition to this very terrible bill. It does not
strike the proper balance between protecting national security and
preserving our cherished civil liberties.
Now I know how important those protections are from my personal
experience with unwarranted domestic surveillance and wiretapping
during the J. Edgar Hoover period. The government's infamous COINTELPRO
program ruined the lives of many innocent persons. Others, including
myself, had their privacy invaded even though they posed absolutely no
threat to national security. We all remember how Dr. King and his
family were the victims of the most shameful government-sponsored
wiretapping. We must never go down this road again. Yet here we are
again.
This bill undermines the ability of Federal courts to review the
legality of domestic surveillance programs, it provides de facto
retroactive immunity to telecom companies and does not sunset
[[Page H5766]]
until December 31, 2012. How can we do that? Four years is way too
long.
A good bill will protect Americans against terrorism and not erode
the fourth amendment. This bill scares me to death, and I urge a ``no''
vote.
Mr. SMITH of Texas. Madam Speaker, I yield 3 minutes to the gentleman
from California (Mr. Daniel E. Lungren), a senior member of the
Judiciary Committee and the Homeland Security Committee.
Mr. DANIEL E. LUNGREN of California. Madam Speaker, I thank the
gentleman for the time.
Madam Speaker, as some say on radio, ``Now let's hear the rest of the
story.'' After the arguments just made on this floor, this is actually
a great day. We and the American people have been waiting for this
since 12:01 a.m. on February 6 when the Protect America Act expired.
During the intervening time we have actually been unnecessarily
vulnerable to those who would do us harm in this era of worldwide
terrorism.
In fact, Madam Speaker, I would say that this is the single most
important bill we will vote on this year, not that I say supporting our
troops is not important, but the intelligence that we gather as the
result of the authority granted by this bill may actually create
conditions under which we do not have to send troops anywhere in the
world and may be more protective of our rights than any other single
thing.
Having come before this body on five different occasions since that
initial expiration of the Protect America Act, I am greatly relieved
that we can finally send the intelligence community and the American
people a bill which will enable the intelligence community to continue
to protect those American people.
Although the compromise agreement embodied in the proposal before us
is not necessarily the one I would have written, it does, in my
estimation, meet our responsibilities for protecting the American
people. In other words, Madam Speaker, it is not the Mona Lisa but it
is not a bad paint job.
First and foremost, the proposal before us ensures that we will
continue to have the ability to monitor the conversations of al Qaeda
overseas. And although there are requirements that the Attorney General
and the Director of National Intelligence adopt procedures which will
be submitted to the FISA Court, the bill retains sufficient flexibility
for our overseas intelligence mission.
In other words, the intelligence community leadership has assured us
that this bill will allow them the operational authority to do what
needs to be done within the parameters of the Constitution. Both the
safety of the American people as well as their civil liberties are
protected in this proposal.
This proposal embodies compromise language which responds to the
legitimate concerns of telecommunication providers who themselves
responded to the call of their government in the wake of 9/11. The
language of the bill not only satisfies the interest of justice, but
communicates loudly to all Americans that if they are ever confronted
with such requests, lawful requests, their government will not hang
them out to dry afterwards.
Specifically, a Good Samaritan safe harbor will exist with respect to
any civil action where there is substantial evidence to support the
certification provided by the Attorney General. The quantum of evidence
required is merely a showing of more than a scintilla but less than a
preponderance of evidence.
And although these provisions in the proposal will contribute to
securing the safety of our citizens, this is not to suggest that I
support every provision in the compromise.
The SPEAKER pro tempore. The gentleman's time has expired.
Mr. SMITH of Texas. I yield the gentleman 1 additional minute.
Mr. DANIEL E. LUNGREN of California. For example, the so-called
``exclusive means'' language in the bill is seen by some as an
assertion of maximal congressional authority. Let me just remind my
colleagues that the FISA Court of review has said all of the other
courts to have decided the issue held the President did have inherent
authority to conduct warrantless searches to obtain foreign
intelligence information. The court stated that ``we take for granted
that the President does have that authority.''
So regardless of whether we have a President McCain or a President
Obama, this language will likely be interpreted in the context of facts
in individual cases in light of the constitutional jurisprudence which
has arisen with regard to the collection of foreign intelligence.
In other words, it does not either trample upon the constitutional
prerogatives of the Congress nor those constitutional prerogatives of
the President of the United States. This is a good compromise. It
protects the American people. We have been waiting for it. It ought to
be voted on with dispatch.
Mr. REYES. Madam Speaker, I yield 2 minutes to the distinguished
gentleman from Rhode Island (Mr. Langevin), a valued member of our
Intelligence Committee.
(Mr. LANGEVIN asked and was given permission to revise and extend his
remarks.)
{time} 1145
Mr. LANGEVIN. Madam Speaker, I rise in support of the FISA Amendments
Act of 2008. Though not a perfect piece of legislation, it is clearly
far better than what we have today, and addresses a number of the many
concerns that were raised about the administration's conduct of
surveillance in this country.
As a member of the Intelligence Committee, I know that we must give
our Intelligence Community the proper tools to protect us, while
upholding the civil liberties of Americans. Today's compromise
illustrates what this House can do when it deliberates with care, holds
steady against fear mongering and acts in the best interests of the
country and its citizens.
This bill is strong on civil liberties, and includes protections
against infringement of our constitutional right to privacy.
First, the bill clarifies that FISA is the exclusive means by which
the executive branch may conduct electronic surveillance on U.S. soil.
No President will have the power to do an end-run around the legal
requirements of FISA. This provision will prevent the types of abuses
we've witnessed under this administration.
Second, this act requires a warrant from the FISA court to conduct
surveillance of Americans abroad. Americans will no longer leave their
constitutional protections at home when working, studying or traveling
abroad.
Third, it requires prior approval by the FISA court of procedures the
government will use when carrying out foreign electronic surveillance.
This will ensure that the government's efforts are not aimed at
targeting Americans, the so-called reverse targeting that we're all
concerned about; and that if an American's communications is
inadvertently intercepted, it is dealt with in a manner that guarantees
legal protections.
It also requires and allows for, now, an IG investigation of this
warrantless surveillance program that took place prior to Congress
being made aware of this legislation.
The SPEAKER pro tempore. The gentleman's time has expired.
Mr. REYES. I grant the gentleman another 15 seconds.
Mr. LANGEVIN. Madam Speaker, as I've said before, this legislation
will only work if everyone involved follows the rules and remains
within the confines of the law. Congress must continue to conduct
robust oversight to make sure that the law is implemented as intended
to maintain the critical and fragile balance of protecting our Nation
and protecting civil liberties.
Mr. HOEKSTRA. At this time I would like to yield 1 minute to the
gentleman from California (Mr. Issa).
(Mr. ISSA asked and was given permission to revise and extend his
remarks.)
Mr. ISSA. Madam Speaker, in just 1 minute it's impossible to assure
the American people of everything this bill will do. But I would like
too, if you will, react to something that was said on the other side
that just simply isn't true.
Yes, during J. Edgar Hoover's day, there was warrantless
surveillance, even on political enemies of the people who were
President at the time. Those days are behind us.
This act, long since we've taken care of domestic wiretap, but this
goes one step further. It insures Americans and
[[Page H5767]]
particularly, I think, Arab Americans like myself who might go back and
forth between here or have relatives in the Middle East, that their
conversations will not be the subject of warrantless wiretaps, that, in
fact, they can be very confident that America is going to observe the
Constitution for them, both when they are here and if they are visiting
abroad.
So it's not easy to undo some of the statements that talk about the
past, but the truth is, this will protect what has already been
established for Americans here.
Mr. CONYERS. Madam Speaker, I am pleased to yield to the gentleman
that has more measures in the Judiciary Committee than anybody else in
Congress, Dennis Kucinich, the distinguished gentleman from Ohio, 1
minute.
Mr. KUCINICH. Under this bill, large corporations and big government
can work together to violate the United States Constitution, use
massive databases to spy, to wiretap, to invade the privacy of the
American people. There's no requirement for the government to seek a
warrant for any intercepted communication that includes a U.S. citizen,
as long as the program in general is directed towards foreign targets.
This Congress must not allow the names of innocent U.S. citizens to
be placed on secret intelligence lists. Under this bill, violations of
Fourth Amendment rights and blanket wiretaps will be permissible for
the next 4 years. Massive and untargeted collection of communications
will continue and with the enactment of this bill.
Furthermore, it allows the type of surveillance to be applied to all
communications entering and exiting the United States. These blanket
wiretaps make it impossible to know whose calls are being intercepted
by the National Security Agency.
Let's stand up for the fourth amendment. Let's remember, when this
country was founded Benjamin Franklin said, those who would give up
their essential liberties to achieve a measure of security deserve
neither. Vote against it.
Mr. SMITH of Texas. Madam Speaker, I yield myself the balance of my
time.
Madam Speaker, H.R. 6304 may well be one of the most important pieces
of legislation we pass this Congress.
For 4 months America has been more vulnerable to attacks by our
enemies, because of the refusal by some to bring a commonsense bill to
the floor to help the Intelligence Community protect Americans.
Many of us would have preferred the bill passed by the Senate.
Although this bill may not be ideal, it does represent a compromise
between House and Senate Republicans and Democrats. This compromise
preserves our ability to conduct a strong, effective foreign
intelligence program.
I urge my colleagues to support this legislation.
Madam Speaker, I yield back the balance of my time.
Mr. REYES. Madam Speaker, it is now my pleasure to yield 1 minute to
our esteemed Speaker of the House, Ms. Pelosi.
Ms. PELOSI. Madam Speaker, I thank the gentleman for yielding. I
thank him for his great leadership as the chairman of the Intelligence
Committee. I commend him.
I commend Mr. Conyers, the distinguished chairman of the Judiciary
Committee, for although he is not supporting the legislation before us
today, he certainly had a tremendous impact to improve it. Thank you
for your relentless championing of civil liberties in our country, Mr.
Conyers.
I want to pay special tribute to our majority leader, Mr. Hoyer, for
making this compromise possible today. It's a very difficult task, many
competing views as to how we should go forward. Mr. Hoyer handled it
all with great intellect and great respect for all of those views.
Thank you, Mr. Hoyer.
Also want to acknowledge Mr. Smith and Mr. Hoekstra and minority
whip, Mr. Blunt, for their leadership in giving us this opportunity
today.
We've heard it over and over again. Our colleagues say this bill is
not perfect, this isn't the bill I would write. I prefer this bill, I
prefer that bill.
Well, I prefer the House bill that passed and was sent to the Senate.
It isn't an option for us. I do not, I totally reject the Senate bill
which is an option, and that is the comparison that we have to make,
the contrast that we have to make today.
But in doing so, I think we all understand the important
responsibility that we have in this Congress, focused on this debate
today. I always take the debate back to our responsibility when we take
the oath of office. We take an oath of office to protect and defend the
Constitution from all enemies, foreign and domestic. In that preamble
to our Constitution, we must provide for the common defense. Essential
to honoring that commitment to protect the American people is to have
the intelligence, operational intelligence that will help us do that.
When I first went on the Intelligence Committee, our focus was on
force protection. Our troops in the field depend on timely and reliable
intelligence to make the decisions necessary to keep them safe and to
do their job. Force protection, force protection, force protection. It
is still a primary responsibility of our intelligence.
In addition to that, we have the fight on the war against terrorism,
the fight against terrorism, wherever it may exist. Good intelligence
is necessary for us to know the plans of the terrorists and to defeat
those plans.
So we can't go without a bill. That's just simply not an option. But
to have a bill, we must have a bill that does not violate the
Constitution of the United States, and this bill does not.
Some in the press have said that under this legislation, this bill
would allow warrantless surveillance of Americans. That is not true.
This bill does not allow warrantless surveillance of Americans. I just
think we have to stipulate to some set of facts.
We may have our opinions about the bill, but there have been so many
versions of the story of different bills that have come up, the PAA
last year, which I thought was totally unacceptable. The Senate bill,
also unacceptable. Our House bill, which I mentioned before, which I
thought was the appropriate way to go, and now this compromise.
As I was talking with Mr. Hoyer in the course of his negotiations,
there were certain things that I thought had to be in the bill to make
it acceptable, certain threshold issues that had to be there, and they
are.
In terms of the original FISA bill, it's interesting to note that
this bill is an improvement on that in three important ways.
First, we all recognize the changes in technology necessitate a
change in the legislation, and this legislation today modernizes our
intelligence-gathering system by recognizing and responding to
technological developments that have occurred since the original FISA
Act in 1978. In doing so, we can make the country safer in a more
advanced technological way.
Second, and this is very, very important, and there's some
misunderstanding about this. This bill provides that Americans overseas
receive the same FISA protection, including an individualized warrant
based on probable cause, as Americans living within the country. This
is a very important improvement on the original FISA Act.
Third, this bill strengthens congressional oversight. And this is
very important, the transparency. Transparency and intelligence don't
always go together, but accountability is central to intelligence. This
strengthens congressional oversight by requiring that the executive
branch provide more extensive information about the conduct of
surveillance to both the Intelligence Committee and the Judiciary
Committee. This is new, this is better. The more we know, the better, I
think, the law will be enforced.
If this bill does not pass, we will most certainly be left with the
Senate bill. I think that's clear. And this bill is an improvement over
the Senate bill in the following ways, just to name a few.
First of all, it reaffirms that FISA is the exclusive means of
collecting foreign intelligence, and makes absolutely clear that the
enactment of an authorization for the use of force does not give the
President, whoever he may be, any inherent authority to alter the
requirements of FISA. Very important.
This is important because President Bush believed, and this was what
we were told, that he, as President of the United States, had inherent
authority under the Constitution to do almost anything he wanted.
[[Page H5768]]
And what this bill reaffirms is that the FISA law is the authority
for collecting foreign intelligence. There is no inherent authority of
the President to do whatever he wants. This is a democracy. It is not a
monarchy.
Secondly, it is an improvement of the Senate bill. And by the way, no
offense to President Bush. I wouldn't want any President, Democrat or
Republican, a Democratic President or a Republican President to have
that authority.
Secondly, the bill provides that, except in rare circumstances there
will be pre-surveillance review by the FISA Court.
{time} 1200
And when I say rare circumstance, I mean very, very rare.
Unlike the Senate bill, this legislation retains FISA's broad
definition of electronic surveillance and thus guarantees that basic
protections of FISA apply to all the new forms of collection authorized
by the bill. There had been an attempt, and that's why the Senate bill
is inferior in this respect, to just narrow it to certain kinds of
collection, and this says it applies to all collection, electronic
surveillance.
Fourth, it contains specific protections against reverse targeting.
This reverse targeting is very, very important to the civil liberties
of the American people, and I am satisfied by the specific provisions
against reverse targeting. It provides a full and independent review of
the President's surveillance program by the Inspector General of the
relevant agencies.
Of course, there are aspects of this compromise bill that I do not
like. I don't believe that Congress should be in the business of
interfering with ongoing lawsuits and attempting to grant immunity to
telecommunication companies that allegedly violated the law. Those
companies have not lived up to a standard expected by the American
people. I don't think today is any cause for celebration for them. They
come out of this with a taint.
I do not believe that the pending lawsuits would have achieved what
we would have liked them to do which is what the Inspector General's
review would, which is to learn the truth about the President's
terrorist surveillance program and give us the information we need to
make sure that never happens again.
In addition, this legislation makes sure that in the future, the
telephone companies must fully comply with Federal statutes.
Again, it would have been my preference to vote for the RESTORE Act
that the House sent over to the Senate. I do not consider it an option
to live with the Senate bill. This is the opportunity that we have to
protect the American people through the gathering of intelligence which
is essential, as I said earlier, to force protection, to protect our
men and women in uniform and help them make the decisions they need to
do their jobs and keep them safe and to fight terrorists by learning
their plans in advance and squelching them.
I want to thank those who have worked so hard to bring this bill to
the floor. Again, it's not a happy occasion, but it's the work that we
have to do. I think we have to remember getting back to the
Constitution. The House, article 1, legislates. We pass the laws. The
judiciary interprets the law. The executive branch enforces the law.
And what is very important about whatever we pass, especially in
relating to subjects relating to our security and our liberty, it's
important that the President of the United States enforce this law
honoring the Constitution of the United States recognizing the
responsibility that we all have to protect the American people and
protect the Constitution of the United States at the same time.
So again, a difficult decision for all of us. I respect every opinion
that was expressed on this floor today. The knowledge, the sincerity,
the passion and the intellect of those who support and oppose this have
been very, very valuable in making the bill better, if not good enough
for some, but certainly preferable to the alternative that we have
which is the Senate bill which must be rejected.
I'm not asking anybody to vote for this bill. I just wanted you to
know why I was.
Thank you, Madam Speaker.
Mr. HOEKSTRA. Madam Speaker, I would like to yield myself the balance
of my time.
In the immediate aftermath of 9/11, the President, the leaders of
Congress, faced a very difficult situation: to learn more and to better
understand the threat that America now faced. They recognized that we
needed to move from a mentality of being law enforcement to a mentality
of prevention, that we needed to confront, contain, and ultimately
defeat radical jihadists if America was going to stay safe.
The President, the leaders of Congress, many of whom spoke today,
huddled together and talked about the various strategies that they
could implement to get a better understanding of this organization
called al Qaeda, its leaders, its intentions, and its capabilities.
Overarching in their discussions were making sure that the
Constitution and the rule of law would guide their behaviors. As they
considered various alternatives and discussed these, they implemented a
terrorist surveillance program using the capabilities that in many
cases are unique to America that could give us insights into al Qaeda,
its leadership, and its intentions.
It's not the President's program. This program was put together by
the President in consultation, sure, with members of his cabinet, but
also, very importantly, with consultation on a bipartisan basis with
the leaders of Congress.
These leaders in Congress were consistently briefed about how the
program would work, the kinds of information that was being obtained,
and how it was being used to keep America safe, all the while placing a
responsibility on yes, the President, but also the leaders of Congress
to make sure that the intel community was doing the things it was being
asked and was being asked to do things that would be legal.
The intel community has performed very well. They have gotten us
information that has enabled us to keep America safe. The intel
community, this administration, and Congress asked other parts of our
economy to participate, private sector companies. They stood up and
they did the job to keep America safe. Congress did the necessary job
of doing oversight, and in 2004, we reformed the intelligence
community.
So since 9/11, many things have been done properly. The end result,
as we've gone through this process, is that we have kept America safe.
I congratulate the Speaker, I congratulate the majority leader, I
congratulate my colleagues on the other side of the aisle, Mr. Smith,
for working in a bipartisan basis to recognize what needed to be done
in allowing this bill to come to the floor and continue to move forward
in a slightly different way than how we've been moving forward over the
last 6 years. But the most important thing is in a bipartisan basis, we
have come together on a national security issue to give our
intelligence community the tools that they need to keep America safe.
Mr. CONYERS. Madam Speaker, I would like now to recognize the
distinguished gentleman from Washington, Jay Inslee, for 1 minute.
Mr. INSLEE. Have we forgotten what our ancestors have done in the
cause of liberty? Don't we realize there are some lines we can never
cross? Don't we realize we should never legitimize illegal violations
of America's privacy rights, which this bill does?
This bill says if the telecommunication companies violated America's
privacy willfully, knowingly, knowing it was illegal, we are giving
them immunity. Where is the excuse for that? Where is the excuse for
turning a Nation of laws into a Nation that will be led by a President
who knows how to manipulate our fears?
We have got to know the law is our ultimate guardian of liberty, and
those on this side have accused us of having a pre-9/11 mentality. Let
me remind them that July 4, 1776, was pre-9/11. And heaven help us the
day that those values are shucked aside at the service of fear.
Reject this bill.
Mr. CONYERS. Madam Speaker, I will take this time to use the
remaining time that is allotted me.
The SPEAKER pro tempore. The gentleman is recognized for 1 minute.
Mr. CONYERS. I would like to point out that the grant of retroactive
immunity to the telecoms is inconsistent
[[Page H5769]]
with our basic principles because we are breaking with a very proud
tradition of intervening for the first time in a pending court decision
in an effort to reach a preordained legal outcome. This is a bad
precedent.
And may I point out, too, that we are in a period in which the
executive branch has been deemed by many constitutional authorities to
be very near the description of an imperial Presidency. We've gone too
far.
I hope that we will get a strong vote against this because the
struggle for restoring our precious rights and liberties must continue.
I return all time that may be remaining on our side.
Mr. REYES. Madam Speaker, how much time remains?
The SPEAKER pro tempore. The gentleman from Texas has 2\1/4\ minutes.
Mr. REYES. Madam Speaker, it is my privilege to yield 1 minute to our
distinguished majority leader, Mr. Hoyer, who in this case deserves MVP
status for having the wisdom of Solomon and the patience of Job.
Mr. HOYER. I thank my friend, the chairman of the Intelligence
Committee. I thank the Speaker. I thank the Speaker not only for giving
me the responsibility for trying to work with some extraordinarily
talented people but also for having the courage to lead and the courage
to express her convictions.
And I want, at the outset, to share her view that every Member who
has spoken on this floor has spoken out of a sense of conviction and
out of a sense of responsibility to the Constitution of the United
States and to the protection of our great Nation and our great people.
Mr. Reyes, Mr. Conyers, Mr. Hoekstra, Mr. Smith have all worked to
come together, realizing that there were significant differences. Those
four have been assisted by some extraordinary people, and at the
outset, I want to mention them.
First of all, I want to mention my own staff without whom I think we
would not be at this day. She sits on the floor. She worked for my
colleague and dear friend Senator Paul Sarbanes for a number of years.
One of the benefits of Senator Sarbanes retiring was that she came to
my staff. Mariah Sixkiller has expended too much time, perhaps, but
with great talent and great ability to reach this day. Thank you,
Mariah Sixkiller.
I want to thank Chairman Conyers because Chairman Conyers, as you've
heard on the floor, has been conflicted but he has been focused on the
necessity to respond to issues that are real and also to help us move
forward so that we did not, in the minds of many of us, have a bill
pass that we thought was unacceptable, a bill passed by the Senate with
68 of 100 votes. We would not be here, in my opinion, without Chairman
Conyers' leadership, not because he supports this alternative, but
because he saw the ability to work together.
I want to thank his staff, Lou DeBaca, Perry Apelbaum. And Lou
DeBaca, in particular, who sat for hours and hours and hours in a room
trying to reach agreement as we made compromises. Mr. Reyes' staff,
Mike Delaney, the staff director. Jeremy Bash. Jeremy Bash did
extraordinary work. Jeremy Bash was hired by the former Chair of the
Intelligence Committee, Jane Harman.
Jane Harman is probably as knowledgeable as almost anybody on this
floor, other than perhaps the Speaker who served on the Intelligence
Committee longer than anybody in this House. Jane Harman's leadership,
concern, focus on constitutional rights, focus on the security of our
country, was outstanding. She played a significant role in trying to
get us to this day.
{time} 1215
Eric Greenwald of Mr. Reyes' staff also played a significant role.
Without Mike Sheehy and Joe Onek of the Speaker's staff, we would not
be here today. We would not have reached the good compromises that we
reached. Joe Onek and Mike Sheehy, if they were writing this bill,
would have written a different bill, much closer to what we passed on
our side of the aisle and sent to the Senate, which they rejected. Mike
Sheehy has served the House and the Speaker for a very long time in the
intelligence field.
I want to thank Senator Rockefeller. We would not be here today on
this floor if it were not for Senator Rockefeller. Senator Rockefeller
very early on had discussions with me about what could they do to try
to move towards the bill that we passed. He made some suggestions.
Those suggestions are in this bill today. He facilitated our actions.
Andy Johnson, Mike Davidson, Alissa Starzak of his staff were very,
very helpful.
Senator Bond, Senator Bond and I did not see necessarily eye-to-eye
on these issues as we began, but at the end, we came to an agreement.
Louis Tucker and Jack Livinston of his staff were very helpful.
Chairman Hoekstra, or former Chairman Hoekstra, now Ranking Member
Hoekstra, I want to thank Chairman Hoekstra, but particularly, I want
to thank Chris Donessa who was very helpful, gave us great assistance
and advice.
Lamar Smith and Caroline Lynch of his staff, thank you very much for
your efforts as you sat in that room, as we all sat around, every one
of the committees sat around the table, as we came to the final
agreement.
Then I want to thank, of course, Jen Stewart and the minority leader,
without whom we could not have gotten to this day.
Lastly, I want to thank my friend. There's an article going to be
written. It's going to speculate whether or not he and I hurt one
another by saying the other is his friend. I don't think that's the
case. I said that Roy Blunt and I often disagree on substantive issues,
but what we agree on very strongly is that this House needs to sit down
and talk to one another and try to reach resolution on difficult
issues, not hard-to-reach compromise on easy issues. It's on the
difficult issues.
Roy Blunt is a man of this House, who cares about this House, who
cares about this country. And he cares about drafting legislation that
can be agreed upon by a broad section of this House and the American
people. He has an extraordinary staff of Brian Diffell, who I want to
thank for his efforts, but in particular, I want to thank Roy Blunt for
his friendship, for his integrity, and for his willingness to take
risks to reach compromise. Thank you, Roy.
Madam Speaker, today we conclude one step in a long, continuing
process. Just under a year ago, the House came under great pressure
from the administration and the Senate to pass the Protect America Act,
a bill I could not support and spoke out against for its lack of civil
liberties protections.
Since then, there have been other attempts to modernize the Foreign
Intelligence Surveillance Act: first, the RESTORE Act passed by the
House last November with my strong support, with Mr. Conyers' strong
support, Mr. Reyes' strong support, and the support of this House; that
was followed by the Senate bill which passed, as I said earlier, with
68 votes in February; and most recently, the FISA Amendments Act,
passed by the House last March. I supported that bill as well. I think
it was a better bill. It would be my alternative. It was our
alternative on this side of the aisle, but it was not the consensus
alternative, and we needed to reach consensus to move forward.
I was proud to support the two House bills, which I believe struck
the right balance between giving our intelligence community the tools
to go after those who seek to harm and protecting the constitutional
rights of American citizens.
Today, I stand in support of a different kind of bill, a compromise.
To be clear, this is not the bill that I would have written or that
perhaps anybody individually on this floor would have written. However,
in our legislative process, no one gets everything he or she wants.
Different parties, often with deeply competing interests, come together
here to produce a consensus product, where each side gives and takes. I
don't believe we've given on the ultimate principles on either side.
Over the past few months, I've been involved in almost daily
discussions with the stakeholders on this important issue, Members in
both Chambers, in both parties, as well as outside organizations and
experts. I want to thank all of the outside organizations, whether they
agree with our product or do not. Their contribution has been an
important one. I particularly want to thank those who take very
unpopular
[[Page H5770]]
positions to protect the rights of perhaps just one of us among the 300
million, who in the land of the free and the home of the brave deserve
to have that one individual right protected, and I appreciate their
efforts to ensure that that country remains that kind of country.
Together, we have worked to develop a bill that strikes a sound
balance. This measure provides the intelligence community with the
strong authority to surveil foreign terrorists who seek to harm this
country and our people. As the Speaker said, that is our
responsibility, and we intend to meet it.
It provides for enhanced civil liberties protections for Americans
and insists on meaningful judicial scrutiny.
It includes critical new oversight and accountability requirements
that both address the President's warrantless surveillance program and
ensures that any surveillance going forward comports with the fourth
amendment and will be closely monitored by the Congress.
Of vital importance, my colleagues, this legislation makes clear that
FISA is the exclusive means by which the government may conduct
surveillance, the Foreign Intelligence Surveillance Act. Contrary to
the administration's previous actions, in which it did not comply with
the FISA statute, this statute makes it very clear, this and this alone
is the process through which we will intercept communications, an issue
of great importance to the Speaker, as she has said.
Notably, this bill does not address or excuse any actions by the
government or government officials related to the President's
warrantless surveillance program, nor does it include any statement by
the Congress or conclusion on the legality of that program.
Indeed, it mandates for the first time ever a robust accounting by
the Inspectors General of the warrantless surveillance program, which
Congress will receive and act on.
Madam Speaker, in closing, let me say again, this bill is a
compromise, but in my opinion, it is a compromise worth supporting. And
the conclusions drawn by editorials in the New York Times, Wall Street
Journal and Washington Post over the last 2 days reflect this
compromise.
Today, for example, the Washington Post recognized that this is a
reasonable effort to strike a compromise, stating: ``Striking the
balance between liberties and security is never easy, and the new FISA
bill is not perfect. But it is a vast improvement over the original law
and over the earlier, rushed attempts to revise that law.''
As I said at the beginning, this bill is one step in a long,
continuing process of updating this critical legislation, ensuring that
our national security and our civil liberties are both protected.
This legislation sunsets at the end of 2012, and it's imperative that
we scrutinize its implementation in the future and make any necessary
changes. I believe we have the best bill before us that we could
possibly get in the current environment. It is a significant
improvement over the Senate-passed bill and, I suggest, existing law.
I look forward to working with my colleagues in the years ahead to
ensure that both our national security and our civil liberties are
protected. That is our responsibility. That is our pledge to our
constituents. I urge passage of this legislation.
Mr. REYES. Madam Speaker, I yield myself the balance of the time.
I just wanted to thank everyone again, as Mr. Hoyer indicated. I
believe every Member in this body cares about our national security,
and I also believe that this is a good bill, a good compromise and is
worthy of supporting.
Mr. VAN HOLLEN. Madam Speaker, on March 14th I voted in favor of H.R.
3773 which modernized the Foreign Intelligence Surveillance Act. This
bill successfully updated the law to accommodate the current day
communications technology while at the same time providing the much-
needed protection of the court in sanctioning the surveillance of
Americans. Moreover, the bill was also remarkable for what it did not
contain; it did not provide retroactive immunity for telephone
companies who are defendants in pending lawsuits. These suits have been
brought to uncover the full extent of the Administration's program to
conduct unauthorized surveillance on Americans.
I am deeply troubled that the Senate does not have the votes to pass
the House bill. The Senate instead passed its own bill, S. 2248, which
was unacceptable to me from the outset because it reduced the role of
the FISA Court to merely review the procedures for targeting
surveillance subjects and minimizing the information collected.
Moreover, the Senate bill established retroactive immunity for the
phone companies that have been used to carry out the Administration's
illicit surveillance program.
To be sure, the Senate bill is completely unacceptable. Majority
Leader Hoyer worked tirelessly to improve upon the Senate bill to forge
an acceptable compromise. The bill before us today, however, does not
go far enough to include sufficient safeguards of court involvement in
the surveillance of Americans. Moreover, it continues to provide
retroactive immunity for those companies that carried out the
Administration's unauthorized surveillance. Finally, it fails to hold
the Administration accountable for its past illicit surveillance
activities and its disregard of the Fourth Amendment protections of
Americans. As a result, I must vote against this bill.
____
Ms. SPEIER. Madam Speaker, when are we going to stop pulling the wool
over the eyes of the American people? The proposed FISA law protects no
one other than the administration and those within it who may use this
new-found power to snoop and spy in areas where they have no business
looking. We are giving broad new powers to political appointees who
have repeatedly disregarded the Constitution and ignored the most basic
rights of Americans to live their lives without Big Brother peeking his
nose into their private matters.
This FISA bill gives the federal government sweeping powers to gather
wide swaths of information from foreign sources while providing little
or no justification for the national security value of that
information.
The FISA Court set up to police the process isn't a court at all.
Under this bill, the government can gather as much intelligence as it
chooses for seven days prior to going to the court. Then, if the court
says ``No'' to the request, the government can continue to gather
intelligence for 60 days while they appeal.
Any first year law student knows that is not how courts work. If this
were a real court, the government would be required to abide by the
decision of the court and seek the warrant prior to conducting
surveillance.
It is fundamentally untrue to say that Americans will not be placed
under surveillance after this bill becomes law. The truth is, any
American will subject their phone and e-mail conversations to the broad
government surveillance web simply by calling a son or daughter
studying abroad, sending an e-mail to a foreign relative, even calling
an American company whose customer service center is located overseas.
Once again, our government puts a feel-good name on something that
doesn't live up to its billing. Calling the FISA rubber stamp panel a
court is akin to the President's ``Clear Skies Initiative'' which
relaxed pollution regulations or ``No Child Left Behind'' which instead
of helping schools, punishes them if they have children who are,
indeed, lagging behind.
This bill sets out to reassure Americans that, because there are
warrants and a ``court'', due process is taking place. But like the
pseudo-court, FISA warrants aren't warrants at all.
A warrant is permission by the court to look for a specific thing
from a specific person or group for a specific reason. The FISA warrant
is given after the fact and can be as broad as gathering all electronic
communication coming into or out of a foreign country.
Madam Speaker, America isn't simply `guided'' by our Constitution, it
isn't a set of ``suggestions'' but rather, the law of the land. It is
the existence of this great document and our unswerving loyalty to it
that makes America the greatest nation in the history of our planet. We
can't be sacrificing basic constitutional principles like the fourth
amendment simply because it's an election year and we want to make it
look like we're fighting terrorism.
I join my colleagues in our unified fight to defeat the global
terrorist movement. But we don't do that by sacrificing our hard-earned
Constitutional rights and forgiving telephone companies who knowingly
violate those rights.
The bottom line is, this FISA bill permits the collection of
Americans' emails and phone calls if they are communicating with
someone outside of the U.S. This is especially true when it comes to
emails, because the World Wide Web has no area codes, so it is
impossible to tell where email communications originate from. The
Government is under no obligation to seek a warrant in order to monitor
an email account unless it knows the account belongs to an American.
And once your email account is swept up in the system, it can be
monitored. Regardless of the relevance of your personal information,
once it is gathered by the government, it is never destroyed. One only
has to recall the recent incident in the State Department where
candidates' passport information was breached to know that this
information isn't
[[Page H5771]]
handled by robots, but people. And people can do any number of things
with personal informations.
Out of respect to the United States Constitution and the basic rights
of Americans to live free of intrusive eavesdropping by their
government, I strongly oppose HR 6034, the FISA Reauthorization Act.
Ms. ESHOO. Madam Speaker; first I want to commend the Chairman and
the Majority leader for the work they've done to bring this legislation
to the floor of the House. It has been a challenge for all of us on the
Intelligence Committee and in the Congress.
This legislation is a vast improvement over the previous law, and
indeed over the Protect America Act passed by the House last August
which I opposed.
The bill very importantly establishes a process for electronic
surveillance that includes prior approval by the independent courts,
and in some respects, this legislation goes even further than the
existing FISA statute or the House-passed RESTORE Act in protecting the
civil liberties of U.S. persons. Under this bill the Administration
would have to seek a court order before conducting surveillance on U.S.
persons abroad. Until now and under the Protect America Act, the
executive branch could conduct electronic surveillance of U.S. persons
without prior judicial approval. This legislation also allows the
lawsuits against the telecommunications companies to go forward in a
limited fashion, which would not have occurred at all under current
law.
Having said this I must oppose this bill.
Under the original structure of FISA, telecommunications carriers
served an important gate-keeping function. They were not permitted to
provide access to private communications in the United States unless
the government made a lawful request to conduct surveillance, pursuant
to a FISA order. For decades, the government has sought and obtained
thousands of FISA warrants prior to beginning surveillance, or in
urgent cases shortly thereafter. We all remember the shocking news when
the President had to acknowledge that his Administration created an
illegal, warrantless electronic surveillance program outside of the
FISA legal framework.
This legislation would essentially grant retroactive immunity to
telecommunications carriers who relied on statements made by this
Administration that the program was lawful. However, as we've seen in
numerous instances, this Administration pushed new and aggressive
interpretations of the law, including in this area. We all recall
vividly the days following \9/11\, and the urgency that prevailed, but
suspending our laws and allowing the Attorney General to unilaterally
issue a ``get out of jail free card'' is not appropriate under any
circumstances. There should be at least some minimal inquiry into
whether the telecommunications carriers reliance on the statements made
by this Administration was reasonable. If so, the they would be able to
assert their existing statutory immunity defenses.
Throughout our Nation's history, the judiciary has been the most
important check on an overzealous executive, and it is often through
the judicial process that we uncover and remedy some of the most
egregious executive misconduct. This legislation undermines and
effectively nullifies the courts' ability to hold the Administration
accountable for its actions, which likely violated the Constitution.
Our Nation was founded on the principle of separation of powers. The
executive branch should be subject to independent oversight by the
judicial branch. This legislation does not go far enough to allow the
judicial branch to conduct an independent, reasoned inquiry into this
critical issue. Therefore, I must oppose this legislation.
Mr. UDALL of Colorado. Madam Speaker, I will support this bill.
I will do so because, as I have consistently said, I do think the
basic law in this area--the Foreign Intelligence Surveillance Act, or
FISA--needs to be updated to respond to changes in technology, which
was the purpose of the current, temporary law.
That is why, last August, I voted for a bill (H.R. 3356) to provide
such an update--a bill that was supported by a majority of the House,
but did not pass because it was considered under a procedure that
required a two-thirds vote for passage, which did not occur because of
the opposition of the Bush Administration. It was supported by all but
three of our Republican colleagues.
That is also why I voted for another bill to update FISA--H.R. 3773,
the ``Responsible Electronic Surveillance That is Overseer, Reviewed,
and Effective'' (or RESTORE) Act--which the House passed on November
15th of last year. Like those bills I supported earlier, this bill will
replace the Protect America Act, enacted in August 2007--which I
opposed.
The bill makes it very clear that to conduct surveillance targeting a
person in the United States, the government first must obtain an
individual warrant from the FISA Court, based upon probable cause.
And, importantly, it explicitly states that FISA and Title III of the
U.S. criminal code are the exclusive means by which the government may
conduct surveillance on American soil, and adds that any future statute
must expressly authorize surveillance if the government is going to
rely on it to conduct domestic surveillance.
It also includes new legal protections for Americans abroad,
requiring an individual probable cause determination by the FISA Court
when the government seeks to conduct surveillance of U.S. persons
located outside the United States.
It requires prior review and approval by the FISA Court of the
targeting and minimization procedures used to conduct surveillance of
any foreign targets (unless in an emergency, in which case the
government may authorize the surveillance and then apply to the FISA
Court for approval within 7 days), and requires that this surveillance
be conducted in accordance with the Fourth Amendment. And it requires
the government to establish guidelines to ensure that Americans are not
targeted by this surveillance (``reverse targeting guidelines''), and
requires the government to provide those reverse targeting guidelines
to Congress and the FISA Court.
The legislation also includes important provisions to increase
transparency and accountability. For example, it requires there be a
comprehensive review of the President's warrantless surveillance
program by the Inspectors General of the Justice Department, the
Directorate of National Intelligence, the National Security Agency, and
the Defense Department--and it provides for them to report the results
to the Intelligence and Judiciary Committees.
This report will review ``all of the facts necessary to describe the
establishment, implementation, product, and use of the Program,'' as
well as ``communications with, and participation of, individuals and
entities in the private sector related to the Program.''
I do not find equally satisfactory another aspect of the bill that
involves accountability--the treatment of pending lawsuits against
various telecommunication companies that acted to implement President
Bush's clandestine surveillance program.
Like the bills I supported earlier, this measure would provide civil
liability protection for private sector companies that provide lawful
assistance to the government in the future. But it differs
significantly in the way it addresses those pending lawsuits, which
deal with the previous actions of the defendant companies.
Those lawsuits have been consolidated and are pending in one court,
but evidently have made little progress because of the Administration's
argument, still awaiting court resolution, that the suits are barred
because they involve state secrets. My understanding is that the
defendant companies have argued that government's invocation of the
state-secrets privilege has had the result of preventing them from
defending themselves, although at least one company has stated in
regulatory filings that the cases against it are without merit.
President Bush has insisted that Congress throw these cases out of
court by giving the companies retroactive immunity for whatever they
might have done in connection with the surveillance program, even
though the Administration and the companies themselves insist that
those actions were lawful and that the plaintiffs' complaints against
the companies have no merit.
Regrettably, the Senate decided to comply with the president's demand
on this point, and its version of this legislation would provide that
retroactive immunity. I do not think that was the right decision
because I agree with the Rocky Mountain News, which in a February 15th
editorial said ``Letting this litigation proceed would not, as Bush
[has] said . . .punish companies that want to `help America.'
Businesses that want to help America need to be mindful of the
Constitution--and so should the government.''
I supported removing that ``state secret'' barrier and allowing the
companies to defend themselves by demonstrating to the court the
evidence they say supports their arguments in a way that assures the
continued security of that evidence and that avoids the public
disclosure the Administration says would be adverse to the national
interest. This is a process that has worked well in criminal cases, and
while I am certainly not an expert on the matter, I think it can work
when applied to these civil cases.
In that respect, this bill is similar to the legislation I supported
earlier this year. But it is not identical, and I do not think it is
quite as sound.
Under this bill, a district court hearing such a case will decide
whether the Attorney General's certification attesting that the
liability protection standard has been met and is supported by
substantial evidence. In making that determination, the court will have
the opportunity to examine the highly classified letters to the
providers that indicated the President had authorized the activity and
that it had been determined to be lawful.
[[Page H5772]]
That is not as strong a requirement for accountability as I would
prefer. However, in such cases both plaintiffs and defendants will have
the opportunity to file public briefs on legal issues and the court
should include in any public order a description of the legal standards
that govern the order.
And, importantly, this immunity provision does not apply to any
actions against the Government for any alleged injuries caused by
government officials.
Madam Speaker, as Benjamin Franklin has warned us, people who value
security over liberty will get neither--and the Bush Administration has
finally agreed to end its disregard for liberty and agree to effective
judicial oversight and involvement in intelligence surveillance.
That agreement that is embodied in this bill, and the choice before
us now is whether to reject it or to support the compromise measure now
before us.
After careful review, I have concluded that the bill adequately meets
the test of protecting civil liberties while giving our country tools
needed to effectively combat terrorism.
So, while--like any compromise--the bill is not ideal, I have decided
the correct decision--the one that will fulfill my responsibility to
protect both our national security and the civil liberties that make
our nation worth defending--is to vote for it.
Mr. ETHERIDGE. Madam Speaker, I rise in support of H.R. 6304, FISA
Amendments Act. This bipartisan bill takes steps to increase our
Nation's security while also protecting Americans' civil liberties.
H.R. 6304, FISA Amendments Act, provides the critical tools that our
intelligence community needs to ensure the safety of our Nation. With
many surveillance warrants set to expire in the coming weeks, the
intelligence community needs a strong and dependable set of guidelines
to follow while conducting surveillance. H.R. 6304 allows the
Government to authorize surveillance in the case of an emergency
situation, provided that they return to the FISA court within 7 days to
apply for a warrant.
This bill also includes a number of provisions that significantly
strengthen the protection of our civil rights. H.R. 6304 clarifies that
FISA is the exclusive means for conducting surveillance in the United
States, prohibiting any President from using executive power to conduct
a warrantless wiretapping program. This bill also requires the
Government to obtain an individual warrant from the FISA Court before
conducting surveillance on a United States citizen. This warrant must
be based on probable cause, and the provision now includes American
citizens abroad as well. H.R. 6304 requires prior review and approval
of the intelligence community's targeting and minimization procedures
that ensure that any inadvertently intercepted communications by
American citizens are destroyed. Finally, the FISA Amendments Act adds
a strong layer of oversight to this process by directing the Inspectors
General from Justice, State, Defense, the DNI, and NSA to review
surveillance procedures and submit their findings to Congress.
H.R. 6304 rejects blanket immunity for telecommunications companies
that may have participated in the administration's warrantless
wiretapping program. Under this bill, lawsuits against these companies
would be determined by Federal district courts. These
telecommunications companies will have to prove that the Administration
provided written assurance that their activities were legal. There is
no immunity for any government official who may have violated the law
included in this legislation.
This bill is much stronger than the Senate version, and will protect
both our security and the civil liberties that we enjoy. I support the
passage of H.R. 6304, FISA Amendments Act, and I urge my colleagues to
vote in favor of this bipartisan measure as well.
Mr. LANGEVIN. Madam Speaker, I rise in support of the FISA Amendments
Act of 2008. As a member of the Intelligence Committee, I know we must
give our intelligence community the proper tools to protect us while
upholding the civil liberties of Americans. Today's compromise
illustrates what this House can do when it deliberates with care, holds
steady against fear-mongering, and acts in the best interest of the
country and its citizens.
This bill is strong on civil liberties, and includes protections
against infringement of our Constitutional right to privacy.
First, the bill clarifies that FISA is the exclusive means by which
the executive branch may conduct electronic surveillance on U.S. soil.
No President will have the power to do an end-run around the legal
requirements of FISA. This provision will prevent the types of abuses
we have witnessed under this administration.
Second, this Act requires a warrant from the FISA court to conduct
surveillance of Americans abroad. Americans will no longer leave their
constitutional protections at home when working, studying, or traveling
abroad.
Third, it requires prior approval by the FISA court of procedures the
Government will use when carrying out foreign electronic surveillance.
This will ensure that the Government's efforts are not aimed at
targeting Americans, and that, if an American's communication is
inadvertently intercepted, it is dealt with in a manner that guarantees
legal protections.
One issue that has been repeatedly addressed is whether
telecommunications companies should be granted immunity against pending
lawsuits for their involvement in the earlier surveillance program. For
a long period of time, the Bush Administration stonewalled and did not
provide Congress the documents we demanded to ascertain the role that
the telecommunications companies played. Since then, I have reviewed a
large number of classified documents on this matter, and I am deeply
concerned about the manner in which the Bush administration conducted
its surveillance program. Therefore, I am pleased that this legislation
preserves a role for the U.S. court system, which will review the
documents produced by the White House and other relevant documents to
decide independently whether the telecommunications companies acted in
good faith when cooperating with the Government. Only after that review
would the courts decide whether the telecommunications companies
deserve any form of liability protection. Furthermore, the legislation
authorizes a joint investigation by the Inspectors General from the
U.S. Department of Justice, National Security Agency, Department of
Defense, and Office of the Director of National Intelligence to review
the past actions of the U.S. Government and report to Congress on their
findings so that we may take appropriate action.
Many today have said that the legislation before us is not a perfect
bill, and I agree. Nevertheless, it is significantly better than the
bill passed by the Senate and an immense improvement over the Bush
administration's program, neither of which took sufficient steps to
protect Americans' civil liberties. I know that the Democratic
leadership negotiated a good compromise, and I will support it.
However, as I have said before, this legislation will only work if
everyone involved follows the rules and remains within the confines of
the law. Congress must continue to conduct robust oversight to make
sure the law is implemented as intended to maintain the critical and
fragile balance of protecting our Nation and protecting civil
liberties.
Mr. LEVIN. Madam Speaker, I rise in opposition to the bill. I
appreciate the hard work that Mr. Hoyer and others have done on this
legislation. The bill before the House is a vast improvement over the
administration's Protect America Act, which I strongly opposed last
August. The legislation is also a significant improvement over the
seriously flawed FISA legislation approved by the Senate earlier this
year. In many respects, the bill before the House strikes a reasonable
balance between giving the Government the tools it needs to protect
U.S. national security and protecting Americans' constitutional rights.
In particular, I am pleased that the bill reaffirms that the Foreign
Intelligence Surveillance Act is the exclusive legal means by which the
Government may conduct surveillance. This stands in stark contrast to
the Bush administration's warrantless surveillance program. I also
support the provisions of this bill that protect Americans traveling
abroad. They need no longer leave their constitutional protections at
home.
At the end of the day, I oppose this bill because of the provisions
that would confer retroactive immunity on the telecommunications
companies that participated in the Bush administration's warrantless
surveillance program. We are a nation of laws, and it sets a dangerous
precedent for Congress to approve a law that dismisses ongoing court
cases simply on the basis that the companies can show that the
administration told them that its warrantless surveillance program was
legal. A program is not legal just because the administration claims
that it is. The retroactive immunity provisions in this bill shield the
administration from accountability for its actions. The goal here is
not to harm the telecommunications carriers, but rather to get to the
truth of what happened. A much better alternative would be to grant
indemnification to the companies and go forward with the trials.
Irrespective of the outcome of today's vote, we need a full
accounting of the administration's surveillance program, and the bill
before the House provides for an Inspectors General audit describing
all Federal programs involving warrantless surveillance conducted since
September 11, 2001. The audit is to be completed within 1 year.
Congress must get to the bottom of what happened and prevent it from
happening again. It is essential that Congress follow up on the audit's
findings with robust oversight.
Mr. DINGELL. Madam Speaker, while l cannot support the legislation
before us today, I commend Majority Leader Hoyer for the work he has
done to negotiate a bill that is substantially better than the version
that passed in the Senate. This legislation, which will be the
exclusive mechanism for the Government to conduct surveillance within
the United States,
[[Page H5773]]
contains provisions that will provide greater protections against
unwarranted and unconstitutional searches of American citizens.
Despite the many improvements Mr. Hoyer was able to obtain, I
unfortunately still cannot support this legislation because it contains
a provision that will grant immunity to the telecommunications
companies that assisted the President with his illegal and unauthorized
warrantless wiretapping program. I have consistently said that it is
not appropriate for Congress to grant these companies immunity for
their actions without having an understanding of what it is that they
did. This is not only because it will hold the telecommunications
companies accountable for their actions, but because it is the only way
of finding out just how extensive the President's illegal wiretapping
program really was. In other words, this provision will enable the Bush
administration to continue suppressing facts and information about the
Government's own misbehavior and wrongdoing.
The immunity provision contained in this bill purporting to allow for
judicial review to determine whether immunity is appropriate is a sham.
As drafted, courts will have no real discretion and will be forced to
grant immunity so long as the Government claims its actions were legal.
However, the court is under no obligation to investigate whether the
Government's claims are true. Anyone following the headlines recently,
who has read about the recent Supreme Court decision overturning the
administration's argument that it has the authority to detain people
indefinitely in Guantanamo Bay, or about the hearings held by Senator
Carl Levin and the Senate Armed Services Committee uncovering evidence
that top civilian leadership at the Department of Defense authored
memos arguing it was legal for the military to torture detainees,
should be extremely wary of trusting President Bush to decide whether
or not it is legal to spy on Americans.
Mr. HALL of New York. I have consistently supported modernizing the
existing FISA law to give our Government the tools it needs to identify
and defeat terrorists in today's high-tech world, while at the same
time preserving the freedoms and rights that define America. I have
voted three times to pass legislation that would strengthen and
modernize FISA and reaffirm the rule of law. Despite some improvements
over previous attempts to update FISA, the bill considered by the House
today regrettably falls short of achieving that critical balance. The
rule of law lies at the core of America's founding principles, and the
language in this bill was too weak to ensue that any breach of our laws
that may have occurred under the warrantless wiretapping program will
be fully addressed. It is not appropriate to deny Americans the right
to pursue these matters in court, or to short-circuit the judicial
review that lies at the heart of our system of checks and balances,
which is the bedrock of our Constitution. Accordingly, I voted against
this bill.
Mr. BLUMENAUER. Madam Speaker, I appreciate the hard work put in by
my colleagues on both sides of the aisle and in both chambers. For the
past year we've participated in substantial and sometimes heated debate
on the issue of surveillance and foreign intelligence. I appreciate the
good faith efforts of our leadership, particularly Mr. Hoyer, as we try
to craft legislation that keeps both our liberties and our persons
safe.
For the past seven years I have been highly critical of Republican
wiretapping legislation. I voted against past efforts to expand this
administration's ability to intrude in the lives of unknowing and
innocent Americans. I supported the expiration of the disgraceful
Protect America Act. And I remain confident that the dedicated members
of the intelligence community do not need to violate the rights of
Americans in order to protect them.
I have heard some say that the enemies of America take on many forms.
To them I say: Let us be sure one of those forms is not our own
government.
Ultimately this is a compromise that falls short. Any gains in
security that may be achieved are temporary and are more than
outweighed by the longer-term loss of civil liberties and oversight.
Although this bill is comparatively better than the Senate's version, I
am troubled by the lack of robust government oversight, the absence of
meaningful court review, and the risk to American liberties.
Of particular concern is the granting of de facto retroactive
immunity to the telecommunications companies that cooperated with the
administration. A `doctor's note' from the Attorney General cannot be
allowed to circumvent the entire judicial process.
I am equally concerned with the timeline of this bill, and strongly
oppose authorizing this legislation for four years. This will extend
the Bush legacy throughout the next administration and the next two
sessions of Congress. Frankly I see no reason to rush into a compromise
that comes up this short. The American people would be better served if
we continued to debate this issue and took up a bill after we have seen
the last of this administration. Americans demand and deserve
protection of their basic civil rights and this can be accomplished
while providing the means necessary for our intelligence community to
do its job.
Mr. NADLER. Madam Speaker, Members of the House must decide today
whether to uphold the rule of low and the supremacy of the Constitution
or whether to protect and reward the lawless behavior of the
administration and of the telecommunications companies that
participated in its clearly illegal program of spying on innocent
Americans.
This bill limits the courts hearing lawsuits alleging illegal
wiretapping to consider only whether the telecom companies received a
``written request or directive . . . indicating that the activity was [
] authorized by the President; and [ ] determined to be lawful''--not
whether the request was actually lawful or whether the telecom
companies knew that it was unlawful.
The bill is a fig-leaf, granting blanket immunity to the telecom
companies for illegal acts without allowing the courts to consider the
facts or the law. It denies people whose rights were violated their
fair day in court, and it denies the American people their right to
have the actions of the administration subjected to fair and
independent scrutiny.
Even the courts' limited review will remain secret. The lawsuits will
be dismissed, but the basis for the dismissal--that the defendants were
innocent of misconduct, or that they were guilty but Congress commands
their immunity--must remain secret.
And the constitutionality of the immunity granted by this bill is
very questionable. As Judge Walker put it in the AT&T case:
AT&T's alleged actions here violate the constitutional
rights clearly established in [the] Keith decision. Moreover,
because `the very action in question has previously been held
unlawful,' AT&T cannot seriously contend that a reasonable
entity in its position could have believed that the alleged
domestic dragnet was legal.
I would hope that the courts will find that, because the
Constitutional rights of Americans have been violated, Congress'
attempt to prevent court review is unconstitutional.
The bill also reiterates than FISA and specified other statutes are
the exclusive legal authority for electronic surveillance. The Act has
always said that. This bill adds some new mechanisms to ensure that any
future legislation may not be read to override this exclusivity by
implication, but only by explicitly saying that that is its purpose.
No one and no court should draw the false conclusion that we are
thereby implying that the exclusivity provision was, or could have
been, overridden either by the President's claim of inherent authority
under Article II of the Constitution, or by the Authorization for the
Use of Military Force of 2001. This bill does not say or imply that. If
there is any doubt of this point, the blanket immunity provisions of
this bill reflect Congress' understanding that this domestic spying was
not legal. If it were, there would not be any necessity for these
provisions.
This bill abandons the Constitution's protections and insulates
lawless behavior from legal scrutiny.
I urge a ``no'' vote.
Mr. BOSWELL. Madam Speaker, I rise in support of H.R. 6304.
This is the kind of work I came to Congress hoping for--bipartisan
legislation that protects our security and our liberty. It's a solid
compromise that does what it needs to do for the country.
One of my specific concerns in FISA reform over the last year has
been finding a way to protect reasonable private companies, who
assisted government out of patriotism.
This bill does that. It doesn't give anyone a free pass, but it
allows companies to come before the courts and make their case in order
to be protected from lawsuits.
That's a good result, and I thank Chairman Reyes for his work in
reaching this reasonable bipartisan compromise.
I urge my colleagues to vote ``yes.''
Ms. GINNY BROWN-WAITE of Florida. Madam Speaker, I rise today in
support of H.R. 6304, a bill to reauthorize the Foreign Intelligence
Surveillance Act and to protect America from foreign threats.
For the past several months, I have heard from hundreds of
constituents on the issue of FISA.
Each one of them expressed their alarm and disbelief that the House
Majority would repeatedly refuse to call a vote on bipartisan
legislation to extend FISA and address our grave vulnerability to
terrorist attacks.
Today I am pleased that the Majority leadership has finally reached
across the aisle to put together a compromise bill, and fulfill one of
its fundamental tasks--to ensure the security of this great Nation.
This compromise is also a reminder of what I have always believed,
that no one side can do it alone; both parties must work together to
ensure our safety.
In such uncertain times, when it is essential that our government
utilize every available tool
[[Page H5774]]
to protect American citizens, having the ability to collect
intelligence responsibly is essential.
While there is no excuse for the delay in bringing this critical bill
to the floor, we must now move forward together to pass H.R. 6304 and
restore our Nation's intelligence capabilities.
Mr. REYES. Madam Speaker, I yield back the remainder of our time.
The SPEAKER pro tempore. All time for debate has expired.
Pursuant to House Resolution 1285, the bill is considered read and
the previous question is ordered.
The question is on the engrossment and third reading of the bill.
The bill was ordered to be engrossed and read a third time, and was
read the third time.
The SPEAKER pro tempore. The question is on the passage of the bill.
The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
Mr. CONYERS. Madam Speaker, on that I demand the yeas and nays.
The yeas and nays were ordered.
The vote was taken by electronic device, and there were--yeas 293,
nays 129, not voting 13, as follows:
[Roll No. 437]
YEAS--293
Ackerman
Aderholt
Akin
Alexander
Altmire
Arcuri
Baca
Bachmann
Bachus
Baird
Barrett (SC)
Barrow
Bartlett (MD)
Barton (TX)
Bean
Berkley
Berman
Berry
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Blackburn
Blunt
Boehner
Bonner
Bono Mack
Boozman
Boren
Boswell
Boucher
Boustany
Boyd (FL)
Boyda (KS)
Brady (TX)
Broun (GA)
Brown (SC)
Brown, Corrine
Buchanan
Burgess
Burton (IN)
Butterfield
Buyer
Calvert
Camp (MI)
Campbell (CA)
Cantor
Capito
Cardoza
Carney
Carter
Castle
Castor
Cazayoux
Chabot
Chandler
Childers
Cleaver
Clyburn
Coble
Cole (OK)
Conaway
Cooper
Costa
Cramer
Crenshaw
Crowley
Cubin
Cuellar
Culberson
Davis (AL)
Davis (KY)
Davis, David
Davis, Lincoln
Davis, Tom
Deal (GA)
Dent
Diaz-Balart, L.
Diaz-Balart, M.
Dicks
Donnelly
Doolittle
Drake
Dreier
Duncan
Edwards (TX)
Ehlers
Ellsworth
Emanuel
Emerson
Engel
English (PA)
Etheridge
Everett
Fallin
Feeney
Ferguson
Flake
Forbes
Fortenberry
Fossella
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Garrett (NJ)
Gerlach
Giffords
Gillibrand
Gingrey
Goode
Goodlatte
Gordon
Granger
Graves
Green, Al
Green, Gene
Gutierrez
Hall (TX)
Harman
Hastings (FL)
Hastings (WA)
Hayes
Heller
Hensarling
Herger
Herseth Sandlin
Higgins
Hinojosa
Hobson
Hoekstra
Holden
Hoyer
Hulshof
Hunter
Inglis (SC)
Issa
Johnson, Sam
Jordan
Kanjorski
Keller
Kildee
Kind
King (IA)
King (NY)
Kingston
Kirk
Klein (FL)
Kline (MN)
Knollenberg
Kuhl (NY)
LaHood
Lamborn
Lampson
Langevin
Latham
LaTourette
Latta
Lewis (CA)
Lewis (KY)
Linder
Lipinski
LoBiondo
Lowey
Lucas
Lungren, Daniel E.
Mack
Mahoney (FL)
Manzullo
Marchant
Marshall
Matheson
McCarthy (CA)
McCarthy (NY)
McCaul (TX)
McCotter
McCrery
McHenry
McHugh
McIntyre
McKeon
McMorris Rodgers
McNerney
Meeks (NY)
Melancon
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Mitchell
Moore (KS)
Moran (KS)
Murphy, Patrick
Murphy, Tim
Murtha
Musgrave
Myrick
Neugebauer
Nunes
Ortiz
Pearce
Pelosi
Pence
Perlmutter
Peterson (MN)
Petri
Pickering
Pitts
Platts
Poe
Pomeroy
Porter
Price (GA)
Pryce (OH)
Putnam
Radanovich
Rahall
Ramstad
Regula
Rehberg
Reichert
Renzi
Reyes
Richardson
Rodriguez
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Ros-Lehtinen
Roskam
Ross
Royce
Ruppersberger
Ryan (WI)
Salazar
Sali
Saxton
Scalise
Schiff
Schmidt
Scott (GA)
Sensenbrenner
Sessions
Sestak
Shadegg
Shays
Sherman
Shimkus
Shuler
Shuster
Simpson
Sires
Skelton
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Snyder
Souder
Space
Spratt
Stearns
Stupak
Sullivan
Tancredo
Tanner
Tauscher
Taylor
Terry
Thompson (MS)
Thornberry
Tiberi
Turner
Udall (CO)
Upton
Walberg
Walden (OR)
Walsh (NY)
Wamp
Weldon (FL)
Westmoreland
Whitfield (KY)
Wilson (NM)
Wilson (OH)
Wilson (SC)
Wittman (VA)
Wolf
Yarmuth
Young (AK)
Young (FL)
NAYS--129
Abercrombie
Allen
Andrews
Baldwin
Becerra
Blumenauer
Brady (PA)
Braley (IA)
Capps
Capuano
Carnahan
Carson
Clarke
Clay
Cohen
Conyers
Costello
Courtney
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
Delahunt
DeLauro
Dingell
Doggett
Doyle
Edwards (MD)
Ellison
Eshoo
Farr
Fattah
Filner
Foster
Frank (MA)
Gonzalez
Grijalva
Hall (NY)
Hare
Hill
Hinchey
Hirono
Hodes
Holt
Honda
Hooley
Inslee
Israel
Jackson (IL)
Jackson-Lee (TX)
Jefferson
Johnson (GA)
Johnson (IL)
Johnson, E. B.
Jones (OH)
Kagen
Kaptur
Kennedy
Kilpatrick
Kucinich
Larsen (WA)
Larson (CT)
Lee
Levin
Lewis (GA)
Loebsack
Lofgren, Zoe
Lynch
Maloney (NY)
Markey
Matsui
McCollum (MN)
McDermott
McGovern
McNulty
Meek (FL)
Michaud
Miller (NC)
Miller, George
Mollohan
Moore (WI)
Moran (VA)
Murphy (CT)
Nadler
Napolitano
Neal (MA)
Oberstar
Obey
Olver
Pallone
Pascrell
Pastor
Payne
Price (NC)
Rangel
Rothman
Roybal-Allard
Ryan (OH)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schwartz
Scott (VA)
Serrano
Shea-Porter
Slaughter
Solis
Speier
Sutton
Thompson (CA)
Tierney
Towns
Tsongas
Udall (NM)
Van Hollen
Velazquez
Walz (MN)
Wasserman Schultz
Waters
Watson
Watt
Waxman
Weiner
Welch (VT)
Wexler
Woolsey
Wu
NOT VOTING--13
Brown-Waite, Ginny
Cannon
Gilchrest
Gohmert
Jones (NC)
Paul
Peterson (PA)
Reynolds
Rush
Stark
Tiahrt
Visclosky
Weller
Announcement by the Speaker Pro Tempore
The SPEAKER pro tempore (during the vote). There are 2 minutes
remaining in this vote.
{time} 1248
Mr. FRANK of Massachusetts, Mr. JEFFERSON, Mrs. CAPPS and Ms. KAPTUR
changed their vote from ``yea'' to ``nay.''
Mr. BERMAN changed his vote from ``nay'' to ``yea.''
So the bill was passed.
The result of the vote was announced as above recorded.
A motion to reconsider was laid on the table.
Stated against:
Mr. VISCLOSKY. Madam Speaker, had I been present for rollcall 437,
H.R. 6304, on passage of a measure to amend the Foreign Intelligence
Surveillance Act of 1978 to establish a procedure for authorizing
certain acquisitions of foreign intelligence, and for other purposes, I
would have voted ``nay.''
____________________