[Congressional Record Volume 161, Number 86 (Monday, June 1, 2015)]
[Senate]
[Page S3373]
USA FREEDOM ACT
Mr. McCONNELL. Mr. President, last night the Senate voted to advance
the House-passed FISA bill. We will have a vote on that legislation as
soon as we can. On our way there, we should take some commonsense steps
to ensure the new system envisioned by that legislation--a system we
would soon have to rely upon to keep our country safe--will, in fact,
actually work. The amendments filed last night would help do just that.
For example, one amendment would ensure that there is adequate time
to build and test a system that doesn't yet exist. One amendment would
ensure that there is adequate time to build and test a system that
doesn't even exist yet. Another would require that once the new system
is actually built, the Director of National Intelligence reviews it and
certifies that it actually works. I will say that again. The second
amendment would require that once the new system is actually built, the
Director of National Intelligence reviews the new system and certifies
that it will actually work. Amendment No. 3 would require simple
notification if the providers decide to change their data-retention
policies. It will just require them to notify us if the providers
decide to change their data-retention policies. Three amendments to
improve the bill.
These fixes are common sense, and whatever one thinks of the proposed
new system, there needs to be basic assurance that it will function as
its proponents say it will. The Senate should adopt these basic
safeguards.
I had hoped to see committees working hard to advance bipartisan,
compromise FISA legislation this week, which is why I had offered
several temporary extensions of the existing program to allow the space
for that to occur. But these proposed short-term extensions were either
voted down or objected to, including a very narrow extension of some of
the least controversial tools contained within the program that we are
considering.
So this is where we are. It now falls on all of us to work diligently
and responsibly to get the American people the best outcome that can be
reasonably expected in this reality with which we are confronted. That
is my commitment, and I know many of my colleagues share it as well.
Mr. President, I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The bill clerk proceeded to call the roll.
Mr. BURR. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
The PRESIDING OFFICER (Mr. Gardner). Without objection, it is so
ordered.
____________________
[Congressional Record Volume 161, Number 86 (Monday, June 1, 2015)]
[Senate]
[Page S3374]
NATIONAL SECURITY LEGISLATION
Mr. NELSON. Mr. President, we are here because the Senate is not
functioning. We were here last night because the Senate is not
functioning. Oh, it is functioning according to the rules, which say
that you have to go through this arcane procedure of cloture on the
motion to proceed and get 60 votes before you can ever get to the bill.
Once you get to the bill, then you file another motion for cloture. The
Senate rules say that there are 30 hours that have to run unless, as
has been typical of Senate business, there is comity, there is
understanding, and there is bipartisanship. But one Senator can
withhold unanimous consent, and that has been done--so the 30 hours.
Now, normally that may be standard procedure for the Senate, but it
is getting in the way of our national security. At midnight last night
the law that allows our intelligence community to track the emails and
the phone calls of the terrorists evaporated. It won't be reenacted
until sometime later this week because of the lack of unanimous
consent.
But this Senator from Florida is not putting it at the feet of just
the one Senator who is withholding the unanimous consent. This Senator
from Florida is saying that this should have been planned on over a
week ago. This Senator is saying that we should have gone through the
laborious procedures--not assuming that we were going to have the votes
last night, not assuming that there was going to have comity and
unanimous consent. This Senator thinks that we should have done this
because of the urgency of national security.
It is interesting that this Senator from Florida comes to the floor
with mixed feelings. I voted for the Leahy bill, which is identical to
the House bill, but I did that because we didn't have any other choice.
When I had another choice, I voted for Senator Burr's--the chairman of
the Senate Intelligence Committee--version, which was to continue
existing law. I did so because I clearly thought that was in the
interests of our national security.
But since that is not the prevailing vote of the Senate, we need to
get on with it and pass the House bill. Then I would urge the chairman
of the Intelligence Committee, who is on the floor, that--down the
line--the 6-month transitional period from the old law to the new law
be extended with a greater transition time to 12 or 18 months. I would
further urge the chairman of the Intelligence Committee that as to a
major flaw in the bill passed by the House, which we will eventually
pass this week, we add to it a requirement for a certain amount of time
that the telephone companies would have to keep those telephone
business records, so that if there is an urgency of national security
going through the FISA Court, those records would be available to the
intelligence community to trace the telephone calls of the terrorists.
That would be my recommendation, and I see the chairman nodding in
somewhat agreement.
I hope we will get on. I hope better hearts and minds will prevail
and that we can collapse this period of darkness where there is no law
governing emails, phone calls, cell phones, et cetera, as we try to
protect ourselves from the terrorists.
I would hope that this would be collapsed into a much shorter time
instead of having to wait until late Tuesday or Wednesday or Thursday
of this week.
I yield the floor.
The PRESIDING OFFICER. The Senator from North Carolina.
____________________
[Congressional Record Volume 161, Number 86 (Monday, June 1, 2015)]
[Senate]
[Pages S3374-S3381]
USA FREEDOM ACT OF 2015
The PRESIDING OFFICER. Under the previous order, the Senate will
resume consideration of H.R. 2048, which the clerk will report.
The senior assistant legislative clerk read as follows:
A bill (H.R. 2048) to reform the authorities of the Federal
Government to require the production of certain business
records, conduct electronic surveillance, use pen registers
and trap and trace devices, and use other forms of
information gathering for foreign intelligence,
counterterrorism, and criminal purposes, and for other
purposes.
Pending:
McConnell/Burr amendment No. 1449, in the nature of a
substitute.
McConnell amendment No. 1450 (to amendment No. 1449), of a
perfecting nature.
McConnell amendment No. 1451 (to amendment No. 1450),
relating to appointment of amicus curiae.
McConnell/Burr amendment No. 1452 (to the language proposed
to be stricken by amendment No. 1449), of a perfecting
nature.
McConnell amendment No. 1453 (to amendment No. 1452), to
change the enactment date.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Mr. President, I rise while my good friend from Florida is
on the floor to say that I wish I could have a magic wand with which I
could collapse this time. But as he knows, under Senate rules, one
Member can demand for the full 30 hours, and we are in a process like
that. My hope is that there will be accommodation as we go through this
because I think most Members would like to resolve this.
Let me say specifically to his two points that there is a substitute
amendment that has the USA FREEDOM language with two additional pieces.
Those two pieces are a 6-month notification to NSA by any telecom
company that intends to change its retention program. As my good friend
from Florida knows, in part, trying to move a bill is making sure we
move a bill that can be passed and accepted by the House of
Representatives. Mandatory retention right now does not meet that
threshold. But I hope they will accept this requirement of notification
of any change in their retention program, as well as a DNI
certification at the end of whatever the transition period is.
Now, there will be a first-degree and a second-degree amendment, in
addition to that, made in order and germane. The first-degree amendment
will be to extend the transition period to 12 months. So we would go
from 6 months--not to 2 years, as my colleague from Florida and I would
prefer, and not to 18 but to 12. I think that is a happy spot for us to
agree upon.
Then there will be a second-degree amendment to that to address some
language that is in the bill that makes it mandatory on the part of the
Justice Department that they get a panel of amicus individuals. What we
have heard from the Justice Department and gotten a recommendation on
is that that be voluntary on the part of the courts. We will second-
degree that first-degree amendment with that language provided to us by
the courts.
I would like to tell my colleague that by tomorrow afternoon, I hope,
we can have this complete and send it to the House, and by the time we
go to bed tomorrow night this might all be back in place.
I remind my colleagues that any law enforcement case that was in
progress is not affected by the suspension of the roving or ``lone-
wolf'' provisions. They are grandfathered in so those investigations
can continue. But for the 48 hours we might be closed, it means they
are going to delay the start of an investigation, if in fact they need
those two tools.
From the standpoint of the bulk data program, it means that is
frozen. It can't be queried for the period of time, but it hasn't gone
away. Immediately, as we reinstitute the authorities in this program,
that additional data will be brought in and the process that NSA would
go through to query the data
[[Page S3375]]
would, in fact, be available to the National Security Agency only--as
is current law--once a FISA Court provides the authority for them to do
it.
I think there are a lot of misstatements that have been made on this
floor. Let me just state for my colleagues what is collected. What is
metadata? It is a telephone number, it is a date, it is the time the
call was made, and it is the duration of the phone call.
Now, I am not sure how we have invaded anybody's privacy by getting a
telephone number that is deidentified. We don't know who it belongs to,
and we would never know who it belongs to until it is turned over to
law enforcement to investigate because it has now been connected to a
known foreign terrorist's telephone number.
Stop and think about this. The CFPB--a government agency--collects
financial transactions on every American. There is nobody down here
trying to eliminate the CFPB. I would love to eliminate the CFPB
tomorrow. But there is no outrage over it, and they collect a ton more
information that is not deidentified. It is identified.
Every American has a discount card for their grocery store. You go in
and you get a discount every time you use it. Your grocery store
collects 20 times the amount of data the NSA does--all identified with
you. There is a big difference between the NSA and your grocery store:
We don't sell your data at the NSA; your grocery store does.
Now, I am for outrage, but let's make it equal. Let's understand we
are in a society where data is transferred automatically. The fact is,
No. 1, this is a program authorized by law, overseen by the Congress--
House and Senate--and the executive branch at the White House. It is a
program that has never had--never, never had--a privacy violation, not
one, in the time it has been in place.
Now, I am all for, if the American people say this is not a function
we believe government should be in--and I think that is what we have
heard--and we are transferring this data over to the telecom companies,
where no longer are there going to be a limited number of people who
can access that information. We are going to open it up to the telecom
companies to search it in some way, shape or form. Whether they are
trained or untrained or how exactly they are going to do it, it is
going to delay the amount of time it will take us to connect a dot to
another dot.
Mr. NELSON. Will the Senator yield for a question?
Mr. BURR. I will be happy to yield.
Mr. NELSON. Mr. President, this is a good example of the chairman of
the intel committee, a Republican, and this Senator from Florida, a
Democrat and a former member of the intel committee, agreeing and being
so frustrated--as was just exemplified by the Senator from North
Carolina--that there is so much misunderstanding of what this
legislation does.
The fact is, as the chairman has just said, ``metadata''--a fancy
term--is nothing more than business records of the telephone company. A
telephone number is made to another telephone number on such and such a
date, at such and such a time, for such and such duration. That is all.
We don't know whom the call was from or to. It is when there is the
suspicion, through other things that are authorized by court order,
that the analyst can get in and open up as to what the content is in
order to protect us.
Would the Senator from North Carolina agree there is so much
misunderstanding in the press, as has been reported, about how this is
an invasion of privacy, as if the conversations were the ones that were
being held by the National Security Agency? Would the Senator agree
with that statement?
Mr. BURR. I would agree exactly with that statement. The collection
has nothing to do with the content of a call. To do that would take an
investigation into an individual and an additional court process that
would probably be pursued by the FBI, not the NSA, to look at the
content.
I think when the American people see this thing dissected, in
reality, they will see that my telephone number without my name isn't
really an intrusion, the time the call was made really isn't an
intrusion, the duration of the call really isn't an intrusion, and now
I know they are not collecting anything that was said, that there is no
content in it and that this metadata base is only telephone numbers.
There is a legitimate question the American people ask: Why did we
create this program? Well, it was created in the Department of Defense.
It was transferred over to the intelligence community. The purpose of
it was in real time to be able to search or query a massive amount of
data.
A few weeks ago, we, the United States, went into Syria and we got a
bad guy. And we got hard drives and we got telephones and we got a lot
of SIM cards. Those telephone numbers now, hopefully--don't know but
hopefully--we are testing them in the metadata base to see if those
phones talked to anybody in the United States. Why? I think the
American people want us to know if terrorists are talking to somebody
in this country. I think they really do want us to know that.
What we have tried to do since 9/11 is to structure something that
lives within the law or a Presidential directive that gives us that
head start in identifying who that individual is. But we only do it
through telephone numbers, the date of the call, and the length of the
call. We don't do it through listening to content.
That is why I think it is healthy for us to have this debate. I think
my good friend from Florida shares my frustration. We are changing a
program that didn't have a problem and didn't need to be changed, and
we are accepting a lower threshold of our ability to intercept that
individual in the United States who might have the intention of
carrying out some type of an attack.
Now, I would only say this. I don't believe the threat level has
dropped to a point where we can remove some of the tools. If anything,
the threat level has gotten higher, and one would think we would be
talking about an expansion of tools. But I accept the fact that this
debate has gotten to a point where a bulk data storage capacity within
the government is not going to be continued long term.
I would say to my good friend, who I think agrees with me, that
although I believe 24 months is a safer transition period, hopefully
our friends in the House will see 12 months as a good agreement between
the two bodies. That 12-month agreement I think would give me
confidence knowing we have taken care of the technology needed for the
telecoms to search in real time their numbers.
Now, make no mistake, this will be a delay from where we currently
are. I can't get into the classified nature of how long it takes us to
query a database, given the way we do it, but there is no question this
will lengthen the amount of time it takes us to connect the dots.
Therefore, for something that might be in an operational mode, we may
or may not hit that. That is a concern. But this is certainly something
we can go back and look at as time goes on.
Mr. NELSON. Mr. President, if the Senator will further yield.
Mr. BURR. Absolutely.
Mr. NELSON. Has the Senator heard many times from the press: Well,
nobody has come forward and shown us one case in which the holding of
these telephone business bulk records has paid off. Has the Senator
heard that statement by the press?
Mr. BURR. The Senator has heard that statement by the press and has
heard it made by Members of this body.
Mr. NELSON. Has the Senator come to the conclusion that with regard
to the holding of that data and the many cases that are classified,
that that data has protected this country from terrorists by virtue of
just the example he gave of terrorist records apprehended in the raid
in Syria a couple of weeks ago and that those telephone numbers may
well be like mining gold in finding other terrorists who want to hit
us?
Mr. BURR. The Senator hits on a great point, and let me state it this
way. Would any Member of the Intelligence Committee be on the floor
battling to keep this program, if, in fact, in our oversight capacity,
we had looked at a program that was absolutely worthless? Would we
expend any capital to do that? The answer is, no, we wouldn't.
We are down here battling on the floor, those of us either on the
committee or who have been on the committee since 9/11, because we have
seen the impact of this program. We know what it has enabled us to do
and we
[[Page S3376]]
know what happens when we get a trove of technology in our hands that
gives us the ability to see whether it was tied to somebody--whether we
knew about them or we didn't.
The fact is, when you have groups such as ISIL today, that are saying
on social media: Don't come to Syria, stay in the United States, stay
in Europe, go buy a gun, here are 100 law enforcement officers, here
are 100 military folks, that is how you can carry out the jihad, it
makes the use of the tool we are talking about even more important
because no longer do we get to look at no-fly lists, no longer do we
get to look at individuals who have traveled or who intend to travel to
Syria. It is individuals who grew up in neighborhoods that we never
worried about. And the only way we will be able to find out about them
is if we connect the conversation they have had or just the fact that a
conversation took place, and then law enforcement can begin to peel the
onion back with the proper authorities--the proper court order--to
begin to look at whether this is a person we need to worry about.
The Senator from Florida is 100 percent correct that this is
invaluable to the overall defense of this country.
Mr. NELSON. Mr. President, if the Senator will further yield, and I
will conclude with this.
The American people need to understand there is so much agreement
behind the closed doors on the Intelligence Committee, as they are
invested with the oversight of what is going on in order to protect our
blessed country. My plea now is we would get to the point that as the
chairman has suggested, even by waiting until tomorrow, we can collapse
this time and get on to passing this by sending down some minor
modifications to the House that they can accept, then get it to the
President so this important program that tries to protect us from
terrorists can continue.
I thank the Senator for yielding.
Mr. BURR. I thank my good friend from Florida for his willingness to
come to the floor and talk facts.
I see my good friend from Arizona here. Before I yield, let me just
restate what the Senator from Florida asked me, which was, geez, we
need a longer transition period and we need something addressed on the
data that is held.
I say for my colleagues that there will be three votes at some point.
One will be on a substitute amendment. It has the exact same language
as the USA FREEDOM bill. It makes two changes to the USA FREEDOM bill.
It has a requirement that the telecoms notify the government 6 months
in advance of any change in the retention program for their data, which
I think is very reasonable. The second would be that it requires the
Director of National Intelligence to certify, on whatever the
transition date is, that the software that needs to be provided to the
telecoms has been provided so that search can go through.
In addition to that, there will be two other amendments. The first
will deal with expanding the transition period from the current 6
months in the USA FREEDOM bill to 12 months. Again, I would have
preferred 24 months. We have settled on 12 months. The last thing is
that it would change the current amicus language in the bill to reflect
something provided to us by the courts. It was the court's
recommendation that we change it. This would be easier to fit within a
program that has a time sensitivity to it.
So as we go through the debate today, as we go through tomorrow,
hopefully we will have three amendments that pass, and we can report
this bill out shortly after lunch tomorrow if everything works well.
With that, I yield the floor.
The PRESIDING OFFICER. The Senator from Arizona.
Mr. McCAIN. Mr. President, I ask unanimous consent to address the
Senate as in morning business.
The PRESIDING OFFICER. Without objection, it is so ordered.
[...]
The PRESIDING OFFICER (Mr. Cotton). The Senator from Maine.
Mr. KING. Mr. President, I rise to address the bill before us, the
USA FREEDOM Act, and its predecessor, the PATRIOT Act. Before talking
about the specifics of those bills, I will try to address the
historical context of what it is we are wrestling with and why it is so
hard.
What we are really trying to do in this body this week is to balance
two critical constitutional provisions. The first is in the preamble,
which is to provide for the common defense and ensure domestic
tranquility. That is a fundamental purpose of this government. It is a
fundamental purpose of any government--to provide for the common
defense and ensure domestic tranquility. That is national security, and
it is in the very core preamble to the Constitution of the United
States.
Of course, the other provisions are found in the Bill of Rights,
particularly in the Fourth Amendment, which talks about the rights of
the people to be secure in their persons and papers from unreasonable
searches and seizures. ``Unreasonable'' is a key word. The people who
drafted our Constitution were geniuses and every word counts. The word
was ``unreasonable.'' So there is no absolute right to privacy, just as
there is no absolute right to national security. We have to try to find
the right balance, and that is what we have to do year in and year out,
decade in and decade out, in relation to developments in technology and
developments in terms of the threats which we face. It is a calibration
that we have to continue to try to make.
Now, I have been concerned, as a member of the Intelligence
Committee, about the retention of large quantities of telephone data by
the government. I think the program under which that data has been
analyzed is important, and I will talk about that in a few minutes. I
share the concern of many in this body who feel that simply having and
retaining all of that information in government computers, even though
it was hedged about with various protections and even though there were
requirements for how it was to be accessed--and the level of attention
to the detail of that access was important--and there is no evidence
that it had ever been abused, was a danger to the liberty of our
country. I feel the same as many of the Members of this body who have
expressed that concern. Therefore, the USA FREEDOM Act, which we have
before us now, proposes to move to leave the data with the phone
companies. Instead of the government collecting and having it in the
government's hands, the data will be in the phone companies. If it is
necessary to access that information for national security purposes,
the government will have to go through the process of going through the
Justice Department and the court in order to get permission to access
that data.
Why shouldn't the government simply hold it? I am a subscriber to
Lord Acton's famous maxim that ``power tends to corrupt, and absolute
power corrupts absolutely.''
While the current administration or the prior administration may have
no inclination to misuse that data, we have no idea what may come in
the future, what pressures there may be, what political pressures there
may be. Therefore, it struck me as sensible to get it out of
government's hands.
The trouble I have had with the USA FREEDOM Act is that I felt it
went too far in the other direction because there was no requirement in
the bill, as it passed the House, that the phone companies retain and
hold the data for any particular period of time. They now hold it, as a
matter of business practice, for 18 months to 2 years, which is all
that is necessary in order to have the data available for a national
security search if necessary. The problem is that there is no
requirement that they maintain that level of retention.
In fact, in an open hearing, one of the vice presidents of one of the
carriers said categorically: We will not accept a limitation on how
long we have to hold the data. I think that is a glaring weakness in
the USA FREEDOM Act, and, in fact, it led me to vote against the
consideration of the motion to proceed when it came up last week.
Today or tomorrow--whenever the timing works out--there will be a
series of amendments proposed by the Senator from North Carolina, the
chair of the Intelligence Committee, designed to deal with several of
these technical but very important aspects of this program. One of
those amendments would require the carriers--if they decide to hold the
data for a shorter period of time--to notify the government, notify the
Congress, and we could then make a decision as to whether we thought
that some additional required period of retention would be necessary in
order to adequately protect our national security. Another amendment
that I understand is going to be proposed is that the transition period
from the current program to the private carriers holding the data will
be extended from 6 months to 1 year, simply because this is a major,
Herculean technical task to develop the software to be sure that this
information will be available for national security purposes on a
timely basis.
Now, the final question, and the one we have been debating and
discussing here is this: Is it an important program? Is it worth
maintaining? There has been a lot of argument that if you can't point
to a specific plot that was specifically foiled by this narrow
provision, then we don't need it at all. I don't buy that. It is part
of our national security toolkit.
It is interesting to talk about the history of this provision. It
came into being shortly after September 11, because a gap in our
security analysis ability was identified at that time, and that was
that we could not track phone connections--not content, and I will talk
about that in a minute--between the people who were preparing for the
September 11 attack. For that reason, the section 215 program was
invented.
I want to stop for just a moment and make clear to the American
people that this program does not collect or listen to or otherwise
have anything to do with the content of phone calls.
As I talked to people in Maine and they approached me about this,
they said: We don't want the government listening to all of our phone
calls. The answer is: They don't. This program does not convey and has
not conveyed any such authority. We are talking about a much more
narrow ability to determine whether a particular phone number called
another phone number, the duration and date of that phone call, and
that is it.
An example of its usefulness was at the Boston Marathon bombing. The
two brothers perpetrated that horrendous attack in Boston in April of
2013. This program allowed the authorities to check their phone numbers
to see if they were in touch with other people in the country so they
could determine
[[Page S3380]]
whether this was a nationwide plot or whether it was simply these two
guys in Boston. That, I will submit, is an important and--some would
say--critical piece of information. It turned out that they were acting
on their own, but had there been connections with other similarly
inclined people in the country at that time, that would have been
important information for us to know, and that is the way this program
is used.
Is it absolutely critical and indispensable in solving these cases? I
don't think anybody can argue that that is the case. Is it important
and useful as a part of the national security toolkit? Yes,
particularly when the invasion of privacy, if you will, is so limited
and really so narrowly defined. I liken it to a notebook that a police
officer carries at the scene of a crime. A detective goes to the scene
of a crime, takes out his notebook, and writes some notes. If we said
that detectives can no longer carry notebooks, would it eliminate law
enforcement's ability to solve crimes? No, but would it limit a tool
that was helpful to them in solving that crime or another crime? The
answer, I think, would be yes.
We should not take a tool away that is useful and important unless
there is some compelling argument on the other side. Since we are not
talking about the content of the phone conversations--we are simply
talking about which number called which other number, and it can only
be accessed through a process that involves the Justice Department and
then permission from the court--I think it is a program that is worthy
of protection and useful to this country, and I think it is
particularly important now.
It is ironic that we are talking about, in effect, unilaterally
disarming to this extent at a time when the threat to this country has
never been greater and the nature of the threat is changing. September
11 is what I would call terrorism 1.0, a plot that was hatched abroad.
The people who perpetrated it were smuggled into the country in various
ways. They had a specific target and a specific plot that they were
working on. That is terrorism 1.0, September 11. Terrorism 2.0 is a
plot that is hatched abroad but communicated directly to people in the
United States who are part of the jihadist group. But now we are on to
terrorism 3.0, which is ISIS sending out what amounts to a terrorist
APB to no particular person but to anyone in this country who has been
radicalized by themselves or by the Internet. There is no direct
connection between them and ISIS. It might be a Facebook post. That
person then takes up arms and tries to kill Americans, and that is what
their intent is. That is the hardest situation for us to counteract,
and that is a situation where this ability to track numbers calling
numbers can be extremely useful. In fact, it might be the only useful
tool because we are not going to have the kind of specific plotting
that we have seen in the past.
This is the most dangerous threat that I think we face today. To
throw aside a protection or a safeguard that I believe passes
constitutional and legal muster and goes the extra mile to protect the
privacy rights of Americans by getting this data out of the hands of
the government and that is worthy of the support and the active work in
this Chamber to find that balance--the balance between the imperative,
the most solemn responsibility we have in this body, which is to
provide for the common defense and ensure domestic tranquility, and to
protect the safety and security of the people of this country in light
of the constitutional limitations in the Bill of Rights that protect
our individual liberties that make us who we are--we can do both
things. There is never going to be a final answer to this question. But
what we have to do is just what we are doing this week, and that is to
assess the threats, assess the technology developments, and try to find
the right calibration and the right balance that will allow us to meet
that most solemn of our responsibilities.
I look forward, hopefully, to the consideration of amendments later
either today or tomorrow and look forward to what I hope will be a
quick passage of this legislation in the next 24 to 48 hours so we can
look our constituents and the people of this country in the eyes and
say: We took the responsibility to protect your security seriously, and
we also took seriously your rights, your liberty, and your
understanding that the government is not going to impinge unreasonably
in any way in violation of the principles of this Constitution.
I yield the floor.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Mr. President, I thank my good friend, the Senator from
Maine, a committed member of the Committee on Intelligence, and one who
has been vitally involved in the oversight of section 215.
I think what has been left out of the debate is that 15 Members of
the U.S. Senate have actively carried out oversight. This is probably
one of the most looked at programs that exists within the jurisdiction
of the Intelligence Committee. There are a couple more that probably
get more constant attention, but this is not a program that is used
that frequently. I think that is the key point.
I wish to reiterate some of the issues Senator King brought up. We
are not listening to people's phone calls. There is no content
collected.
This program expired last night at midnight. That means the database
cannot be queried, regardless of if we find a terrorist telephone
number. I think it is important to remind my colleagues and the
American people that this is all triggered by a nonterrorist number
outside of the United States.
Now, in the case of the Tsarnaev brothers, we had the telephone
number outside the country, and we wanted to see whether the connection
had been made, so there was direction in that case. But this is
triggered by not just going through the database and looking at who
Americans are calling and trying to figure something out, it is
triggered by a known foreign terrorist's telephone number, and we
searched to see whom they may have contacted in the United States.
Now, the FISA Court only allows this data to be queried when there is
a reasonable articulable suspicion--or RAS, as we call it--based on
specific facts; that the basis for the query is associated with a
foreign terrorist or terrorist organization. If the NSA can't make that
case to the courts, that RAS is never authorized to go forward. The NSA
is not searching through records to see whom ordinary Americans are
calling; they are only looking for the terrorist links based upon the
connection to a phone number known to be a terrorist phone number.
Now, my good friend, the Senator from Maine, spoke about the Boston
bombings. Let me go back to some comments the Director of the FBI,
Director Mueller, made earlier last year. He testified in the House
that had the program been in place before September 11, 2001, those
attacks might have been derailed. Why? Well, according to the Director
of the FBI, before 9/11, the intelligence community lost track of al-
Mihdhar. Al-Mihdhar was one of the two who lived in San Diego, and he
was tied to a terrorist group in Yemen. We lost track of al-Mihdhar,
but we knew the terrorist organization in Yemen. So if we would have
had this program in place, we could have targeted the telephone numbers
out of the cell in Yemen to see if they were contacting anybody in the
United States--and they were contacting al-Mihdhar--and we could have
put the connection together and found al-Mihdhar after we lost him in
flight to the United States.
I think Director Mueller said we saw on 9/11 what happens when the
right information is not put together. If this program had been in
place, then it could have provided the necessary link between the safe
house in Yemen and al-Mihdhar in San Diego.
For those who claim this program served no purpose prior to 9/11,
here is the Director of the FBI saying it would have. Then we have the
Boston Marathon bombing, and the program told us there was no terrorist
link.
Then we come to the 2009 New York City subway bombing plot. In early
September 2009, while monitoring the activities of an Al Qaeda
terrorist group in Pakistan, NSA noted contact from an individual in
the United States who the FBI subsequently identified as Colorado-based
Najibullah Zazi. Section 215 provided important lead information that
helped thwart this plot.
I wish to say this one more time to my colleagues: This program
works. It has worked. It has stopped attacks because we have been able
to identify an
[[Page S3381]]
individual before they carried out the attack.
Now, the threshold for my colleagues who say this program has not
served any useful purpose, meaning we have to have an attack to be able
to prove we thwarted an attack--that is not why we have this program in
place. We are trying to get ahead of the terrorist act. In the case of
the subway bombings in New York, we did that in 2009.
There was a Chicago terrorist investigation in 2009. David Coleman
Headley, a Chicago businessman and dual U.S. and Pakistan citizen, was
arrested by the FBI as he tried to depart Chicago O'Hare Airport to go
to Europe. At the time of his arrest, Headley and his colleagues, at
the behest of Al Qaeda, were plotting to attack the Danish newspaper
that published the unflattering cartoons of Prophet Mohammed. Section
215 metadata analysis was used along with other FBI authorities to
investigate Headley's overseas associates and their involvement in
Headley's activities.
I am not sure how it gets any clearer than this. We have an
individual who is radicalized, who intends to carry out an act, who has
overseas connections that we never would have understood without
section 215. I think that as my good friend from Maine knows, when we
connect one dot, typically it leads to another dot and that leads to
another dot. To say to law enforcement, to say to our intelligence
community that we are not going to give you the tools to connect these
dots is to basically stand up in front of the American people and say
that we are supposed to keep you safe, but we are not going to do that.
So I thank my good friend, the Senator from Maine, for his support.
I say to my colleagues, I hope we are going to be able to reinstitute
this program shortly after lunch tomorrow. Hopefully, we will be able
to do it with three amendment votes and a final passage vote. One will
be a substitute to the full bill. It has all the USA FREEDOM Act
language, with two changes. It would require the telecom companies to
provide 6 months' notification of any change in the retention program
of their company. That language was the suggestion of the Senator from
Maine, and it works extremely well.
The second piece of the substitute amendment will deal with the
certification of the Director of National Intelligence that we have
made the technological changes necessary for the telecom companies to
actually query that data they are holding.
There will be two additional amendments. The first one will be to
change the transition period from 6 months to 12 months, and I think
the Senator from Maine would agree with me that--I would like to see it
longer--anything longer than 6 months is beneficial as we talk about
the safety and security of the American people.
The last amendment is the change in the amicus language or the friend
of the court language. I will get into that in a little while. The
current bill says the courts shall--``shall'' means they will do it.
The administrator of the court has provided us with language that they
think will allow the court the flexibility, when they need a friend of
the court, to solicit a friend of the court in FISA Court but not
require them, with the word ``shall,'' to always have a friend of the
court.
Again, I think, as my good friend from Maine knows, the process we go
through in section 215 through the FISA Court in many cases is an
accelerated process. Any delay can defeat the purpose of what we are
doing; that is, trying to be in front of an attack versus in the back
of an attack. I say one last time for my colleagues, NSA, under the
metadata program, collects a few things: They collect the telephone
number, they collect a date, they collect the duration of time that the
call took place. They don't get content. They don't get the person's
name. They have no idea whose number it is. Were they to tie a domestic
number to a foreign terrorist number, that then goes directly to the
FBI because they say to the Bureau: We have a suspicious American
because they have communicated with a terrorist, at which time it is
out of the 215 program for the purposes of investigation of the
individual. If there was ever a need to find out whose telephone number
it was or if there was a need to see content, that would be sought by
the FBI under an investigation through the normal court processes that
are not part of the 215 program. Section 215 is limited to a telephone
number, with no identifier for whose number it is, the collection of
the date, and the duration of the call.
I think the Senator from Maine would agree with me. I would just as
soon see the program stay at NSA, but that decision is a fait accompli.
It is going to transition out. We would just like to make sure we have
enough time so this can seamlessly happen versus an artificial date of
6 months and not knowing whether it can happen.
I thank the Senator from Maine.
Mr. President, I yield the floor.
____________________
[Congressional Record Volume 161, Number 86 (Monday, June 1, 2015)]
[Senate]
[Pages S3385-S3399]
USA FREEDOM ACT OF 2015--Continued
The PRESIDING OFFICER. The majority whip.
Mr. CORNYN. Mr. President, I would ask the Senate's indulgence. I
actually have three topics that I need to discuss here today. One topic
involves the historic flooding that we have experienced in Texas and
the consequences of that, also the President's signing the Justice for
Victims of Trafficking Act, and lastly, the bill that is before us on
the floor today, which is another tool in the toolbox of the national
security apparatus in this country to help keep Americans safe.
[...]
Mr. President, I want to speak about the effort to reauthorize the
critical provisions of the PATRIOT Act that expired at midnight last
night.
As others have observed, there has been a lot of misleading rhetoric
and downright demagoguery about this topic. The issue is pretty
straightforward and simple. This is about how we use all of the tools
available to us to keep our Nation safe amidst pervasive and growing
threats, while at the same time preserving our essential liberties.
This is not about trading one for the other. This is about how we
achieve the correct balance.
Despite our efforts last night, this Chamber was unable to come up
with even a short-term solution to ensure that the key provisions--
including section 215--of the PATRIOT Act did not expire. We know that
any single Senator could object to this extension that would allow us
to continue our work without allowing this program to expire.
Unfortunately, three of our colleagues chose to object to the
commonsense unanimous consent request to allow those temporary
extensions while the Senate and the House continued their work.
It is important to remember that these provisions of the law were
created after September 11 and were designed to equip those
investigating terrorism with the basic tools used by ordinary law
enforcement. Why in the world would we want to deny law enforcement the
investigatory tools they need to keep America safe from terrorist
attacks? That is what section 215 did and does and will do again once
we resurrect it.
Before it expired at midnight, these provisions helped our
intelligence and law enforcement officials keep the country safe. As I
think about this, and in discussing it with Chairman Burr and others
who are very concerned about the safety and security of our country and
who are determined to protect the country by making sure that our
counterterrorism efforts maintain every available legal tool consistent
with our civil liberties, I think what has happened is we have fallen
victim again to the pre-9/11 mentality of considering counterterrorism
efforts to be a law enforcement matter alone. Of course, the Fourth
Amendment to the Constitution, which prohibits unreasonable searches
and seizures, was designed primarily in a criminal law enforcement
context to make sure that American citizens' privacy was protected. But
what many of those who object to using these provisions fail to
acknowledge is that our intelligence community has to be able to
investigate and detect threats to the American homeland before they
occur.
After 9/11, where almost 3,000 people lost their lives, there was
plenty of time to do a criminal investigation and law enforcement
action, but we had failed in our most essential obligation, which is to
detect these threats ahead of time and to prevent them from ever
occurring.
Importantly, as we discussed the week before last, section 215 in
particular included vigorous oversight measures. It is important for
people to understand that the executive branch--in other words, the
White House--and the legislative branch, which is both Houses of
Congress, and the courts are all very much engaged in the vigorous
oversight of these tools used to protect the American people. By taking
this tool away from those investigating the constant threat stream to
American citizens, we have unfortunately given terrorists an advantage
right here in our own backyard.
As we have reiterated over and over that these threats to our
homeland are real and they are growing. Why in the world would we take
time to gamble with our national security?
Secretary of Homeland Security Jeh Johnson said that our country has
entered ``a new phase in the global terrorism threat'' as the so-called
Islamic State or ISIL continues to encourage people right here at home
to take up the cause of global jihad. Perhaps, to me, the best and most
concrete examples are events such as what happened in Garland, TX, just
a few weeks ago, when two people who had been communicating overseas
with representatives of the Islamic State were incited to take up arms
against their fellow citizens here in the United States of America. Why
in the world would we want to deny our law enforcement and intelligence
authorities lawful tools available to them to be able to identify
people plotting threats against the homeland and to prevent those
threats from actually being carried out?
Thank goodness, due to the vigilance of local police and other law
enforcement authorities, what could have been a bloodbath in Garland,
TX, was averted. Why in the world would we want to take away a tool
available to our intelligence and law enforcement authorities and raise
the risk that an attack here in the homeland be successful rather than
thwarted?
This is not just something that happened in Garland. A few weeks ago,
FBI Director James Comey described the widespread nature of the
threats--so widespread, in fact, that he said all 56 field divisions of
the FBI have opened inquiries regarding suspected cases of homegrown
terrorism. So let me repeat. Every FBI field division in the country is
currently investigating at least one suspected case of homegrown
terrorism.
As my colleagues must know, we do not have to go very far to find
other examples like the one I mentioned that
[[Page S3387]]
manifested itself in Garland. We read about examples regularly. Just 2
weeks ago, also in my home State of Texas, the FBI arrested a man who
had reportedly pledged his allegiance to the leader of ISIL. According
to the FBI, he is but one of hundreds of ISIL sympathizers here in the
United States, which ought to alarm all of us, ought to be a call to
vigilance and to make sure we maintain every available legal tool
consistent with civil liberties to protect our citizens.
So I think it is obvious that section 215 and the two
noncontroversial national security provisions at issue should not have
been allowed to expire, but unfortunately they were, and now it is our
responsibility to fill that gap by passing this legislation and taking
up the important amendments, which will actually strengthen the House
bill.
We know our country and our people are the target of terrorists
again, and we need to do everything we can to stop them. Well, my
initial preference was to extend these portions of the PATRIOT Act for
a short period of time so we could begin the debate and discuss the
next best move to address these issues without giving the terrorist any
advantage by handicapping the men and women committed to protecting our
homeland.
At a time when the threats to our country are increasing, we should
be enabling our intelligence officials and law enforcement with the
tools they need and not stripping them of the authorities they require
in order to protect us. Clearly a full extension of section 215, which
was easily extended in 2011, is not possible at this time. But the last
thing any one of us should do is allow this program to continue to
remain dark.
I encourage our colleagues to join me in quickly working together to
reauthorize these critical provisions. Every day we allow these
authorities to remain expired, our intelligence officials are forced to
act with one hand tied behind their back.
We plan to make minor improvements to the House-passed bill, and I
think they make a lot of sense, things such as actually getting a
certification by the Director of National Intelligence and this plan to
let the telecoms continue to hold this information and then, after a
court order is provided, allow that search. But certainly we should
want to know whether this actually will work in a way that is
consistent with our national security.
So, essentially, the House provisions are the base bill here, but I
think Chairman Burr and others on the Intelligence Committee have
recommended some very positive, commonsense improvements which will
make this bill better. Working together, the Senate and the House, I
think we can make sure these necessary authorities are restored.
As elected representatives of the American people, it is our duty to
make sure the balance between physical safety and civil liberties is
struck. We will do that again. We can do that responsibly by extending
these authorities and coming together to find a long-term solution that
keeps these invaluable tools in place.
I yield the floor.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Mr. President, I thank the majority whip for his comments
and for his support of the extension of 215 and for what I think are
some very reasonable changes to it. Some of what the Senator from Texas
said took me back to some of the hearings I know the Presiding Officer
was in where intelligence officials were asked about this transition.
They were asked very simply ``Will it work?'' and the answer they gave
was ``I think so.'' To an institution such as Congress, where our No. 1
responsibility is the defense of the country, ``I think so'' is not the
answer on which you base the change of a program. Therefore, that is
why there is a debate in Washington right now--now in the Senate, soon
to be with the House--as to whether 6 months is sufficient time to be
able to address it.
I know the Presiding Officer of the Senate heard individuals from the
Justice Department say: Well, if this does not work, we will get back
to you on changes.
One of the reasons this tool is in place is because we identified
shortcomings in our capability to identify terrorists post-9/11.
Let me revert back--and I hate to go to history, but on 9/11, as the
majority whip said, there was the loss of almost 3,000 lives, American
and international lives. Washington, New York--could have been this
building had some brave passengers not found out what they were up to
and stopped them.
I remember those days and weeks and months right after 9/11 as a
member of the House Intelligence Committee. There are not many of us
left who were here. I think only 40 percent of the Senate was here on
9/11. What were the questions that went through our minds? Who did
this? Why did they do it? How wide was the plan to attack us? We had to
start from a dead stop and try to figure out the answer to all of those
questions. It is amazing that in a very short period of time we were
able to construct tools that made sure that America would never be
faced with questions such as those again and that if we were, it would
be a very short period of time, not weeks and months and in some cases
years to connect the dots and try to figure out how to keep this from
happening again. Section 215 was one of the tools that was created as a
result of 9/11.
I revert back to the Director of the FBI, who said last year that had
section 215 been in place prior to September 11, the likelihood is that
we could have connected the dots between a known terrorist we lost
track of by the name of Al Mihdhar, who traveled from Kuala Lumpur to
San Diego before we had a no-fly list, who communicated via cell phone
with a terrorist cell operating out of Yemen--we had the numbers out of
Yemen; we just did not have the number of Al Mihdhar. Had 215 been in
place, we could have tested the terrorist cell phones against the
database we had. The FBI Director's own words: We probably would have
stopped that component of 9/11.
Al Mihdhar and his roommate, I believe, were the two who flew the
plane into the Pentagon. Would it have captured everybody? Possibly
not. Would identifying two individuals incorporated in a cell inside
the United States have allowed the FBI to work through traditional
means of investigation and find the rest of that cell, those planes
directed--two planes toward New York and that fourth plane directed to
the Capitol? Maybe. Maybe it would have.
Maybe when are you trying to stop something, it is good, but when you
are talking about eliminating something, ``I think we can do it'' does
not meet my test. That is why one of the amendments I will ask my
colleagues to vote on is an amendment to make the transition period not
6 months but 12 months. It is to make sure we have allowed the NSA a
sufficient amount of time to technologically prepare the telephone
companies to be able to search their data in a timeframe that we need
to get in front of an attack versus in back of an attack.
It is very simple: If it happens in front, it is intelligence. If it
happens in back, it is an investigation. It is a legal investigation.
It has already happened. We are trying to make sure we stay in front.
I would like to take a moment to go over some myths about the PATRIOT
Act.
Here is myth No. 9: The President put in place two panels--a review
panel and another one called the Privacy and Civil Liberties Oversight
Board--and, interestingly, both panels told him the same thing: that
what he was doing was illegal.
Fact: President Obama's review panel never opined on the legality of
the metadata program. It said the question of the program's legality
under the Fourth Amendment ``is not before us,'' and it is not the
review panel's job to resolve these questions of whether the program
was statutorily authorized.
Myth. Fact.
Myth No. 8: The national security letter is similar to what we fought
the Revolution over.
I am not a lawyer, but given what we have been faced with since
September 11, I think it would have been easier to go to law school
than to try to figure out some of these things. The national security
letter, despite its ominous-sounding name, is nothing more than an
administrative subpoena. It has the authority equivalent to the
authority postal inspectors employ to investigate mail fraud or IRS
agents use to investigate tax fraud. Postal inspectors and
[[Page S3388]]
IRS agents do not need judicial authorization to issue an
administrative subpoena. Our Framers would likely be embarrassed if the
post office had more authority to investigate postal fraud than the
Federal Government had to protect us from terrorism.
Before 215, the FBI would issue a national security letter that gave
them expansive investigatory tools. Now, they could not do it in a
timely fashion, but eventually they could not only get to a search of
telephone numbers, they could search financial records, and they could
search anything about an individual.
Let me remind my colleagues that what we are talking about in section
215, the metadata program--we have never identified an American. All we
have is a pool of telephone numbers with no person's name attached to
them, and we collect the date the call was made, the duration of the
call, and the telephone number that it talked to. The only time that
information can be queried is when we have a foreign telephone number
that we know to be the telephone number of a terrorist. Where we were
before was much more expansive with a national security letter, but it
was not timely, and if you want to be in front of an act, you have to
be timely. That is how 215 was created.
Myth No. 7: NSA collects your address book, buddy lists, call
records, et cetera, and then they put them into a data--I think the
program is called SNAC--they put it all into this data program and they
develop a network of who you are and who your friends are.
Myth.
Here is fact: SNAC is the National Security Agency Systems and
Network Attack Center, which, among other things, publishes a
configuration guide to assist entities in protecting their networks
from intrusion. Its work could not be further from the allegation made.
Myth No. 6: Executive Order 12333 has no congressional oversight.
Boy, that is a strange one to the Intelligence Committee, which
spends a lot of time on oversight of 12333. It is simply wrong. S. Res.
400 of the 94th Congress created the Select Committee on Intelligence.
CRS--the Congressional Research Service--points out that the President
has a statutory responsibility to ``ensure that the intelligence
committees are kept fully and currently informed of the intelligence
activities of the United States.'' The committee routinely receives
reports on such matters, including reports on NSA activities under
Executive Order 12333. It is a part of the committee's mandate that we
do successful oversight, and it is a requirement of any President that
they make sure their administration fully cooperates and reports to
both the Senate select committee and the House select committee.
Myth No. 5: The President started this program by himself. He did not
tell us about it. Maybe one or two people knew about it.
Again, that is factually incorrect. Every Senator was put on notice
of the program's existence in 2010 and again in 2011. My gosh, it has
been a national--international debate over the last several weeks.
Myth No. 4: The PATRIOT Act goes from probable cause, which is what
the Constitution had, to articulable suspicion, down to relevance.
This statement conflates issues. Articulable suspicion and relevance
are not two different standards for the same thing. They both must be
present--both must be present--in the metadata program.
FISA, as amended by section 215 of the PATRIOT Act, allows the
government to seek a court order requiring the production of ``tangible
things'' upon a statement--articulation--of facts showing ``there are
reasonable grounds to believe'' those things are ``relevant'' to an
authorized investigation. This allows the government to seek call
records from telecommunications companies. Then, when those records
have been compiled into a database, that database can only be queried
upon a reasonable articulable suspicion that the number to be queried
is associated with a particular foreign terrorist organization.
We keep getting back to this, and of all the conversations that are
had on this floor about intrusion into privacy--one, let me state the
obvious fact again. It is hard for me to believe we have invaded
anyone's privacy when we have done nothing but grab a telephone number
and we have no earthly idea to whom it belongs. And the only reason we
would be concerned with that telephone number is if we pull a foreign
terrorist telephone number and we search it and find somebody in
America they have talked to. That is it. That is the entirety of the
program, and it is all predicated on the fact that we don't search
any--we don't query any data unless we have a foreign terrorist
telephone number known, and that is what triggers the program to begin
to meet the threshold of the court for a query of the information.
Myth No. 3: The FISA Court has somewhat become a rubberstamp for the
government.
First, if that characterization is correct, then the Federal criminal
wiretap process is even more of a rubberstamp for the government. The
approval rate for title III criminal wiretaps is higher than the
approval rate for FISA applications.
Second, this claim does a disservice to the practice of the FISA
Court, where there is often a back-and-forth between the government as
applicant and the court. Again, this is not unlike the criminal wiretap
process. The government often proposes to make an application before
making its final application. The chief judge of the FISA Court has
said it returns or demands modifications on these proposed applications
25 percent of the time. In this respect, the high approval rate of FISA
applications does not ``reflect the fact that many applications are
altered prior to final submission or even withheld from final
submission entirely, often after an indication that a judge would not
approve them'' because it had not met the threshold.
Third, the government has every interest in self-selecting only
meritorious applications to bring to the court. The government is a
repeat player at the FISA Court. It has a well-earned reputation as a
broker of candor before the court, and there would be significant
reputational costs to bringing nonmeritorious applications to the
court.
Let me sort of put in layman's terms what that is. The current
wiretap standard--equivalent to going to a FISA Court--approves at a
25-percent higher rate than the FISA Court. And the FISA Court is the
court that expedites time-sensitive investigations and time-sensitive
intelligence requests.
Myth No. 2: The problem in the FISA Court is that when they take you
to this court, it is secret.
True, it is secret, but so are any other judicial hearings where
classified information is before to the court, and that court shuts
down and goes into a nonpublic setting, just the way this institution
does. We will do it as we get into the appropriations bills, and when
we get into classified, sensitive appropriations, these doors will
shut, the Gallery will be cleared, the TVs will be cut off, and we will
do our business on secret, classified information.
It is only realistic to believe that the court--especially the court
that hears the most sensitive cases--would only hear those cases in
secret because the cases cannot be presented in public.
The last, No. 1: The bulk collection of all Americans' phone records
all of the time is a direct violation of the Fourth Amendment.
The Fourth Amendment protects against unreasonable searches. A search
occurs when the government intrudes upon ``a reasonable expectation of
privacy.'' The Supreme Court has noted ``that a person has no
legitimate expectation of privacy in information he voluntarily turns
over to third parties.''
The Court has also squarely determined that a person does not have a
Fourth Amendment-protected privacy interest in the numbers he dialed on
his phone. Telephone companies keep call records for billing purposes.
When the government obtains those records from a third-party
telecommunications provider, a search has not taken place for
constitutional purposes, and therefore a warrant is not required.
This program has been approved over 40 times by the FISA Court to
exist. The program was instituted by the executive branch. The
executive branch could end the program today. Why don't they? They
don't because this program is effective. This program has thwarted
attacks here and abroad.
[[Page S3389]]
I know individuals have come on the floor and they have said: There
is absolutely nothing that shows that section 215 has contributed to
the safety of America.
I can only say that they are factually challenged in that. You would
not have the majority of the Intelligence Committee on floor lobbying
for this program to continue in its current form. Now we know that is
not going to happen, so we are trying to reach a modification of the
current language so, in fact, we have a greater comfort level that the
intelligence community can be in front of attacks and not behind them.
I remind my colleagues that hopefully tomorrow afternoon we will be
at a point where we are ready to vote on amendments. There will be
three amendments to the USA FREEDOM Act.
The first one will be a full substitute. It will take all the
identical language of USA FREEDOM with two changes:
One, it will require the telephone companies to notify the U.S.
Government 6 months in advance of any change they make in their
retention policy of the data, the telephone numbers. I think it is a
very reasonable request that they give us 6 months' notice if, in fact,
they are going to reduce the amount of time they keep that data.
The second piece is that we direct the Director of National
Intelligence to certify at the end of the transition period that we can
successfully make the transition and that the technology is in place at
the telephone companies, provided by the government, that they can
query those numbers--in other words, that they can search it and take a
foreign terrorist telephone number and figure out whether they talked
to an American.
In addition to that substitute amendment, there will be two
additional amendments.
The first one will take the transition period that is currently 6
months in the bill and will simply make it 12 months. If I had my
preference, it would be 24 months, but I think this is a fair
compromise. And my hope is that, matched with the certification of the
DNI, we will be prepared to transfer this data but to continue the
program in a seamless fashion, although it will add some time--yet to
be determined--to how quickly we can make the identification of any
connection of dots.
The second amendment very specifically will be addressing the amicus
provision in the USA FREEDOM Act. I am going to talk about amicus a
little later, but let me just say for my colleagues that in the USA
FREEDOM Act, in numerous places, it says that the courts shall provide
a friend of the court.
I am not a lawyer, but my understanding from those who are lawyers is
that ``shall'' is an indication of ``you must.'' The courts have told
us that will be cumbersome and difficult and delay the ability of this
process to move forward. So the courts have provided for us language
that changes it to where the FISA Court can access a friend of the
court when they feel it is necessary but not be required to have a
friend of the court regardless of what their determination is.
We will talk about that over the next just shy of a day, but it is my
hope to all the Members that all three of these amendments can be dealt
with before 24 hours is up and that passage of the USA FREEDOM Act as
amended by the Senate can be passed to the House for quick action by
the U.S. House and hopefully by the end of business tomorrow can be
signed by the President and these very important programs can be back
in place.
I would make one last note--that I am sure Americans find it
troubling that this program is going to be suspended for roughly 48
hours. In the case of investigations that are currently underway, they
are grandfathered and the ``lone wolf'' and roving wiretap can still be
used, but new investigations have to wait for the reauthorization of
this bill. From the standpoint of the metadata program, last night at 8
o'clock it could no longer be queried, and it won't be able to be
queried until this is reauthorized.
There is time sensitivity on us passing this, just as there is time
sensitivity in getting the language of this bill correct so that, in
fact, we can query it, we can connect the dots, and we can get in front
of an attack prior to the attack happening.
I urge my colleagues in the Senate to spend the next 24 hours
understanding what is in the USA FREEDOM Act. Look at the amendments.
They are reasonable. They don't blow up this piece of legislation. They
provide us the assurance that we can make this transition and that
after we make the transition, the program will still work.
I urge my colleagues to support all three amendments.
I yield the floor.
I suggest the absence of a quorum.
The PRESIDING OFFICER (Mrs. Ernst). The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. McCONNELL. Madam President, I ask unanimous consent that the
order for the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. McCONNELL. Madam President, it is time to get the job done on
FISA. It is time to get the job done.
From the beginning of this debate, I had aimed to give Senators a
chance to advance bipartisan compromise legislation through the regular
order. That is why I offered extension proposals that sought to create
the space needed to do that. But as we all know, by now, every effort
to temporarily extend important counterterrorism tools--even
noncontroversial ones--was either voted down or objected to.
So here is where we are. We find ourselves in a circumstance where
important tools have already lapsed. We need to work quickly to remedy
this situation. Everyone has had ample opportunity to say their piece
at this point. Now is the time for action.
That is why, in just a moment, I will ask for unanimous consent to
allow the Senate to consider cloture on the House-passed FISA bill,
along with amendments to improve it, today--not tomorrow but today.
There is no point in letting another day lapse when the endgame is
clear to absolutely everyone--we know how this is going to end--when we
have seen such a robust debate already, a big debate, not only in the
Senate but across the country, and when the need to act expeditiously
could not be more apparent.
Madam President, I ask unanimous consent that at 6 p.m. today, the
Senate vote on the pending cloture motion on H.R. 2048, the U.S.
FREEDOM Act, and that if cloture is invoked, that all postcloture time
be yielded back and the Senate proceed to vote on the pending
amendments under the regular order; that upon disposition of the
amendments, the bill be read a third time, as amended, if amended, and
the Senate proceed to vote on passage of the bill, as amended, if
amended.
The PRESIDING OFFICER. Is there objection?
The Senator from Kentucky.
Mr. PAUL. Madam President, reserving the right to object, I would be
happy to agree to dispensing with the time and having a vote at the
soonest possibility, if we were allowed to accommodate amendments for
those of us who object to the bill. I think the bill would be made much
better with amendments. If we can come to an arrangement to allow
amendments to be voted on, I would be happy to allow my consent. But at
this point, I object.
The PRESIDING OFFICER. Objection is heard.
Mr. McCONNELL. Madam President, without consent to speed things up,
the cloture vote will occur an hour after the Senate convenes tomorrow,
on Tuesday. Therefore, Senators should expect the cloture vote at 11
a.m. tomorrow.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, before the recess, there was an attempt to
try to bring finality before this bill expired. At that time, I reached
out to my friend and colleague from Kentucky, Senator Paul, and offered
him my assurance, as manager of the bill, that we would take up his
amendments. But as the President of the Senate knows, if any one
Senator objects to a vote, then a vote does not happen. I consented at
that time that I would initiate a tabling of his amendment so that
there could actually be a vote. There has been every attempt to try to
accommodate amendments. I think that given the short time that we are
[[Page S3390]]
dealing with, where we are trying to make sure that the expiration of
these needed tools is as limited as we can, the leader is exactly
right. You cannot go outside of the processes that were already
triggered prior to this.
I think we have made every attempt to try to accommodate the current
Senate rules, but unfortunately, there were objections to that as we
departed town over a week ago, and we are where we are.
For my colleagues' sake, let me restate where we are. We have had the
expiration as of midnight last night of section 215. Section 215 has
many pieces to it, but there are three that are highlighted. One is the
``lone wolf'' provision, an individual who has no direct tie to a
terrorist organization but could be radicalized in some type of
communication, and ``lone wolf'' provides us the ability to target them
without a direct association to a terrorist group. And roving wiretaps
are the ability to target an individual and not a specific phone.
These two are noncontentious, and there was a request by unanimous
consent yesterday before the expiration to extend those two pieces.
There was an objection. The Senate operates by rules. When one Senator
objects, everything stops. For that reason, those two provisions
expired last night.
Let me say for the benefit of my colleagues and for the American
people that any investigation that was currently under way as of 12
o'clock last night can continue to use those two tools. What is
affected while we are in this expiration period is that you cannot open
a new investigation and use those two tools to investigate that
individual. So we are limited on anything that might have opened since
12:01 this morning.
My hope is that the Senate will dispose of all of the 215 provisions
by 3 o'clock tomorrow. We can turn the faucet back on, and law
enforcement can use those two tools.
But the third piece has been the focus of contention in the Senate
and in the country, and it deals with a program called the metadata
program. It is a scary word. Let me explain what the metadata program
is.
The NSA receives from telephone companies a telephone number with no
identity whatsoever. We refer to it as a deidentified number. They put
all of that into one big database. The purpose of it is that when we
find a known terrorist outside of the country and we have his telephone
number, then we want the ability to query or search that big database
to see if that known terrorist talked to anybody in the United States.
We actually have to go to court--to the FISA Court--to get permission,
and we have to have articulate, reasonable suspicion that there is a
connection, that that known terrorist's telephone number can be tested
against this database. We collect the telephone number, we collect the
date the call was made, and we collect the duration of time of the
call. There is absolutely zero--zero--content. There is zero
identifier. There is not a person's name to it. People have questioned
whether the program is legal. It is legal because the Supreme Court has
said that when we turn over our data to a third party, we have no
reason to believe there is a privacy protection. Therefore, when we get
that telephone number from a telephone company, we throw it into a
pool, and the only person who should ever be worried is somebody who is
in that pool that actually carried on a conversation with a terrorist.
And if we connect those two dots--a person in America and a known
terrorist abroad--and they communicate, then it is immediately turned
over to the FBI for an investigation. It is a person of suspicion. We
turn it over to law enforcement. Law enforcement then goes through
whatever court procedures they need to do to investigate that
individual.
That is the metadata program. That is the contentious thing that has
bogged this institution down to where we have let it expire--in most
cases because people have suggested it is something other than what I
have just described.
I have read a lot of the myths. Let me just go back through some of
them again. I think it is important.
Myth No. 1: The NSA listens to Americans' phone calls and tracks
their movement.
The NSA does not and cannot indiscriminately listen to Americans'
phone calls, read their emails or track their movement. The NSA is not
targeting or conducting surveillance of Americans. Under the Foreign
Intelligence Surveillance Court--FISA Court--order, the only
information acquired by the government from telephone companies is the
time of call, the length of call, and the phone number involved in the
call. The government does not listen to the call. It does not acquire
the personal information of the caller or the person who is called,
which is obtained only through a separate legal process including, if
necessary, a warrant based on probable cause, which is the highest
standard that the judicial system has.
Frankly, there is more information available in a U.S. phonebook than
what the NSA puts in the metadata base. There is more privacy
information that Americans share with their grocery store when they use
their discount card to get groceries. There is more data that is
collected at the CFPB on the American people than the NSA ever dreamed
about, but there is nobody down here trying to eliminate the CFPB,
although I would love to do it tomorrow. But the fact is, if this is
about privacy, how can we intrude on anybody's privacy when we do not
know who the individuals are of the phone numbers that we have? And
there is the fact that the Supreme Court has said that when you
relinquish that information to your phone company, you have no right of
privacy.
Myth No. 2: The NSA program is illegal.
There have been some who have come to the floor and said that. The
Supreme Court held in Smith v. Maryland and in U.S. v. Miller that
there is no reasonable expectation of privacy in telephone call
records, such as those obtained under section 215. Those records are
not protected by the Fourth Amendment.
Under the current 215 program, the judges of the FISA Court must
approve any request by the FBI to obtain information from the telephone
companies. Congress has reauthorized the PATRIOT Act seven times. The
FISA Court reviews the act in an application every 90 days, and the
FISA Court has approved the reauthorization of those 90-day extensions
over 41 times.
This is not a car on cruise control. This is a program that every 90
days the court looks at and assesses whether for another 90 days we
have the right to run the program. Put on top of that, the
congressional oversight of the program is probably the second-most or
third-most looked at program by the Senate and House Intelligence
Committees of any program within our intelligence community.
Myth No. 3: The NSA dragnet repeatedly abuses government authority.
The government does not acquire content or personal information of
Americans under the section 215 program. The names linked to the
telephone numbers are not available unless the government obtains
authorization through a separate legal process, including, if
necessary, a warrant based on probable cause.
Careful oversight of the program reveals no pattern of government
abuse whatsoever. In fact, after more than a decade, critics cannot
cite a single case of intentional abuse associated with FISA
authorities. That is a far cry from the debate that we have listened to
and, I might say, that has been covered on some of the national media.
Myth No. 4: The government stopped only one plot using section 215.
For anybody that was listening earlier to me, I described four
specific things that I can talk about in public. There were four plots.
A plot is something that you get to before an act is done.
We even talked about the Tsarnaev brothers, who committed a violent
act that killed and maimed a number of people in the Boston Marathon.
We had the ability because we had a foreign telephone number that we
thought was tied to the Tsarnaevs, and even after the fact, we were
able to go back and use 215 to see if there was a foreign nexus to an
act that had already been committed. In this case, we could not find
that nexus, but we had the tools available so that law enforcement
could responsibly look at the American people and say we have done
everything to make sure that there are not additional participants in
this act who
[[Page S3391]]
might carry it out at the next marathon or the next race or the next
festival. That is what our ability is supposed to be if, in fact, our
oath of office as a Member of Congress is to defend the country, number
one.
Myth No. 5: The FISA Court is a rubberstamp.
Despite all the claims that the FISA Court approves 99 percent of the
government's applications, the FISA Court often returns or demands
modifications to about 25 percent of the applications before they are
even filed with the court. According to the FISA Court chief judge, the
99-percent figure does not reflect--does not reflect--the fact that
many applications are altered prior to the final submission or even
withheld from final submission entirely, often after an indication that
a judge would not approve them.
Let me put this in perspective. Twenty-five percent more of the
wiretap applications are approved than of FISA. I mean, that says
enough right there. In comparison to Federal court documents which
include wiretap applications as instructed, of the 13,593 wiretap
applications filed from 2008 to 2012, the Federal district court
approved 99.6.
The only reason that FISA is at 99 percent is because when the
government sees that they are not going to be approved, they withdraw
the application. That seldom happens in wiretap applications.
Myth No. 6: There is no oversight of the NSA.
The NSA conducts these programs under the strict oversight of three
branches of government, including a judicial process overseen by
Senate-confirmed judges appointed to the FISA Court and a chief judge
of the United States. Republicans and Democrats in Congress together
review, audit, and authorize all activities under FISA. There are few
issues that garner more oversight attention by congressional
Intelligence Committees than this program, as well as the
responsibilities imposed on the executive branch to make sure that the
Federal agencies in a timely fashion share all information with the
select committees in the Senate and the House for the purposes of
oversight of our intelligence community. Now, some have suggested that
because the Director of the NSA says we think we can do this, we should
just trust them. Please understand that the reason we are having this
debate is because some have suggested that the NSA cannot be trusted.
Once again, I will state for my colleagues that we are going to do
everything we can to wrap this up by 3 p.m. tomorrow. The debate about
whether the data is going to transfer from the metadata program at NSA
to the telephone companies has been decided. It will transfer. Over the
next 24 hours, we will attempt to take up the USA FREEDOM Act--the
exact language that was passed by the House--with a substitute
amendment that embraces all of the House language with the exception of
two issues. We will make two changes. One of the changes will require
the telephone companies to provide a 6-month notice of any change in
their data retention policy. In other words, if one telephone company
has an 18-month retention program currently in place and they decide
they are only going to hold the data for 12 months, they have to notify
the Federal Government 6 months in advance of that change.
The second change will require the Director of National Intelligence
to certify that on the transition date, that the government has
provided the technology for the telephone companies to be able to
search the data in a timely fashion for us to stay in front of attacks.
In addition to that substitute amendment, which I hope my colleagues
will support because there are minimal changes, there will be two
amendments to the bill.
The first amendment will change the transition period from 6 months
to 12 months. So when the Director of the NSA says ``I think we can do
it in 6 months,'' to the Intelligence Committee, ``I think we can do
it'' is not a good answer. So what we are asking is that we go from 6
months to 12 months so we can make sure the technology is in place for
this program to continue.
The last piece is a change in the amicus language of the bill or the
friend-of-the-court language in the bill. The bill itself uses the
words that the courts shall--which means must--have a friend of the
court, and that is not needed in all cases. If that is applied to all
cases, it will put in place a very cumbersome and untimely process.
When we are dealing with trying to get in front of an attack and
dealing with individuals who are linked to known terrorists abroad, we
want to have a way to query that data, to search that data as quickly
as we possibly can with the approval of the court. So what we have done
is taken language that has already passed out of the Intelligence
Committee and has been signed off by the courts that changes ``shall''
to ``must.'' It basically says that the court has the opportunity,
anytime they need a friend of the court's advice, to turn to it and to
get it, but it doesn't require that they have a panel set up that
automatically sits in on every consideration, because a judge doesn't
always need that.
As the Presiding Officer of the Senate knows, the FISA Court operates
in secret, which is another criticism of many people. Well, I don't
want to share any secrets, but sometimes the Senate operates in secret.
Most of the time, the Intelligence Committee operates in secret.
Believe it or not, some titans of the courts in our country operate in
secret. They have the authority to do it anytime there is secret or
classified information that can't be shared publicly.
Well, that is all the FISA Court does. That is the reason it is in
secret. It is not because we don't want the American people to know
that there is a FISA Court or that there is an application or a
decision made by the FISA Court, but everything the FISA Court takes up
is secret or classified, so it has to be done in secret, just like some
of the budgets and some of the authorizations we do in the Senate that
are classified. We shut these doors, we empty the Gallery, we cut off
the TV, we hash out our differences, we come together, and we have a
piece of legislation that only those people who are cleared can read.
That is part of functioning. And part of functioning from a standpoint
of getting in front of terrorism is to make sure the tools are in place
to allow not only intelligence but law enforcement to do their job.
I think when the American people understand how simple this program
is--we take the telephone numbers, we take the date the call was made,
we take the duration of the call, and if it connects to a known foreign
terrorist number, then we turn it over to the Federal Bureau of
Investigation and they go to court to figure out whether this is an
individual they need to look at. It is no longer a part of the
intelligence community. It is a valuable tool. It has helped us to
thwart attacks in the past. My hope is that after we get through with
business tomorrow at about 3 p.m., that this will continue to be a
useful tool.
I urge my colleagues to expeditiously consider not only the base
language but the substitute and both amendments.
I yield the floor.
I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Ms. MIKULSKI. Madam President, I ask unanimous consent that the order
for the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Remembering Beau Biden
Ms. MIKULSKI. Madam President, I rise to speak about where we are as
we debate the various aspects of the USA FREEDOM Act. However, before I
proceed with my statement on the current issue before the Senate, I
really wish to note the very sad passing of our Vice President's son,
Beau Biden, who passed away at age 46 of brain cancer.
Of course, the world knows this now because of the news announcement.
Standing on the Senate floor, where I served with the Vice President
when he was a U.S. Senator, I just personally want to express my
condolences to him on behalf of myself, his friend in the U.S. Senate
and his colleague on so many issues, as well as the people of Maryland.
Once the news broke over the weekend, many people asked me in my home
State: Did you know him? Had you ever met him? There is just a general
outpouring of sadness for his family, his wife, his two children, and,
of
[[Page S3392]]
course, the Vice President and his stepmother Jill. So, Mr. Vice
President, if you have the opportunity to listen, know that the U.S.
Senate is sending our thoughts and our prayers to you during this
difficult time.
Madam President, I wish to speak now about where we are in terms of
our parliamentary situation. Once again, here we are in the Senate
where, when all is said and done, more is getting said than is getting
done. I am a very strong proponent of the oath I took to defend the
Constitution of the United States against all enemies. By that I mean
we have to be able to protect this country. We need to have a sense of
urgency about it.
I am not only disappointed, I am deeply, deeply, deeply frustrated
that the key authorities of the PATRIOT Act expired last night, when we
had a path forward on legislation that would be constitutionally sound,
would be legal, and would be authorized. But what did we do? We got
ourselves into a parliamentary quagmire with the filibuster of one
individual, which now has left us exposed in the world's eyes.
Major authorities were given to our intelligence community to be able
to pursue the surveillance of potential terrorists, and they have
expired. Those authorities included ``lone wolf,'' the roving wiretap,
and some other aspects involving surveillance, and we have just let
them expire at midnight. Right now, I hope we do what we can to pass
the USA FREEDOM Act without delay. We need to get these authorities
restored. Do we need reform? Absolutely. But let's not delay. Let's get
it going.
Others are going to speak later on today on the merits of the USA
FREEDOM Act. I believe it is our best opportunity to protect the
Nation, while balancing privacy and constitutionally approved
surveillance. I do support reforming the PATRIOT Act, but I don't
support unilateral disarmament. I don't want to throw the PATRIOT Act
away. I don't want to throw away our ability to place potential
terrorists under surveillance. I don't want to give in under the guise
of some false pretense about privacy where we say, Well, gee, I worry
about my privacy, so the terrorists don't need to worry about us being
able to pursue them.
Our Nation needs to know that when bad guys with predatory intent are
plotting against the United States of America, we are going to know
about it and we are going to stop it. We are going to know about it
because we have the legal authority to track them, put them under
surveillance, and we are going to stop them before they do very bad
things to our country.
The purpose of my comments today is to stand up not only for the
ability to have a law but also for the men and women who are working
for the intel agencies--for the people who work at the National
Security Agency in my own State, the FBI, and other agencies within our
intel community who are essential to protecting our country against
terrorist attacks, whether it is a ``lone wolf'' or State-sponsored
terrorism.
These dedicated, patriotic, intelligence professionals want to
operate under a rule of law. They want to operate under a rule of law
that is constitutional, that is legal, and that is authorized by the
U.S. Congress. They are ready to do their job, but they are wondering
when we are going to do our job.
Congress needs to pass a bill, as promptly as it can, that is
constitutional, legal, and authorized.
We on the Intelligence Committee have worked long and hard on such a
legislative framework. We have cooperated with members of the Judiciary
Committee, including Senators Grassley of Iowa and Leahy of Vermont,
who have also worked on this. We worked together putting our best ideas
forward, doing the targeted reform that was essential, not pursuing
unilateral disarmament, and we now have legislation called the USA
FREEDOM Act. Is it a perfect bill? No, it is not perfect, but it is
constitutional. If we pass it, it will be legal, and it will be
authorized.
I know the Presiding Officer is a military veteran and I support her
for her service. The Presiding Officer knows what it is like when
people try to trash America.
Ever since Eric Snowden made his allegations, the wrong people have
been vilified. The men and women of our intelligence agencies have been
vilified as if they were the enemy or the bad guys.
I have the great honor to be able to represent the men and women who
work at the National Security Agency and some other key intelligence
agencies located in my State. They work a 36-hour day. Many times they
have worked a 10-day week. When others have been eating turkey or
acting like turkeys, they were on their job, doing their job, trying to
protect America.
Let me tell my colleagues, these people who work for the National
Security Agency, for the FBI, and other intelligence agencies are
patriots. They are deserving of our respect, and one way to respect
them is to pass the law under which they can then operate in a way that
is again appropriate. At times, these men and women, ever since Eric
Snowden, have been wrongly vilified by those who don't bother to inform
themselves about national security structures and the vital functions
they perform. Good one-liners and snarky comments have been the order
of the day.
Now, the National Security Agency is located in my State, but I am
not here because it is in my State. I am here because it is located in
the United States of America. Thousands of men and women serve in
silence without public accolades, protecting us from cyber attacks,
against terrorist attacks, as well as supporting our war fighters. I
wish the Presiding Officer would have the opportunity to come with me
to meet them sometime. They are linguists. They are Ph.D.s. the
National Security Agency is the largest employer of mathematicians in
America. They are the cyber geeks. Many of them are whiz kids. They are
the treasured human capital of this Nation. If they had chosen to go to
work in dot-com agencies, they would have stock options and time off
and financial rewards far beyond what government service can offer. We
need to be able to support them, again, by providing them with the
legal authority necessary.
Remember, that section 215 is such a small aspect of what these
intelligence agencies do as they stand sentry in cyber space protecting
us. People act as though that is all NSA does. They haven't even
bothered to educate themselves as to the legality and constitutionality
of where we are.
Now, let's say where we are and let's say where we have been. Much
has been said about the PATRIOT Act. It has been sharply criticized.
There has been no doubt that it does require reform. That is why the
Congress, in its wisdom, when it passed the bill right after 9/11, put
in the safeguard of periodic sunsets so we could take a breather and
reexamine the law to make sure what we did was appropriate and
necessary.
Congress did pass the PATRIOT Act so the men and women at the
intelligence agencies worked under what they thought was the rule of
law that Congress supported. President George Bush also told us and his
legal advisors told us that it was constitutional, so people believed
it. Those men and women at the intelligence agencies thought they were
working under legislation that was constitutional, legal, and
authorized because we passed it. Well, now others say it wasn't. Others
even want to filibuster about it. They want to quote the Founding
Fathers. Well, I don't know about the Founding Fathers, but I know what
the ``founding mothers'' would have said. The ``founding mothers''
would have said get off the dime and let's pass this legislation.
We do need good intelligence in a world of ISIL, al-Nusra Front, and
Al Qaeda. NSA is one of our key agencies on the frontline of defense,
and the people of the National Security Agency make up the frontline.
As they looked at audits, checks and balances, and oversight, there was
no evidence ever of any abuse of inappropriate surveillance on American
citizens. We need to know that and we need to recognize that. Those
employees thought they were implementing a law, but some in the media--
and even some in this body--have made them feel as though they were the
wrongdoers. I find this insulting and demeaning.
The morale at the National Security Agency was devastated for a long
time. People were vilified, families were harassed for even working at
the NSA,
[[Page S3393]]
and, in some instances, I heard even their children were bullied in
school. This isn't the way it should be. They thought they were
patriots working for America. When the actions of our own government
have placed these workers where they feel under attack--they were
attacked by sequester and they felt under attack by a government
shutdown because many of them were civilian employees at DOD--they were
not paid--and now Congress's failure to reform national security has
further then said: We can take our time. What you are doing is
important, but we have to talk some more.
Gee, we have to talk some more. What do you mean we have to talk some
more? The only person in the Chamber is my very distinguished
colleague, the distinguished colleague from Indiana, whom I work with
in such a wonderfully cooperative way on the Intelligence Committee.
You know we are not bipartisan, we are nonpartisan for the good of the
country.
Where is everybody who wanted to speak? Do we see 10, 20, 30, 40, 50
Senators lined up waiting to speak? No. We have to kill time. I don't
want to kill time. I am afraid Americans will be killed. We have to get
on this legislation and we have to get our act together and we have to
pass it. I want the people to know we cannot let them down by our
failure to act and to act promptly.
I come to the floor to say let's pass the USA FREEDOM Act and let's
do it as soon as we can. I know a vote has been set for 11 o'clock
tomorrow. That means that it will be almost 35 or 36 hours since the
authorities expired, and then it has to go over to the House. So let's
move it and let's keep our country safe and let's get our self-respect
back.
For those who looked at our country, there were three attitudes
toward America: One was great respect for who we are, our rule of law;
the other was our fear, because we were once the arsenal of democracy;
and, third, the yearning to be in a country that worked under a
Constitution, a Congress that worked to solve the problems of our
Nation. Can we get back to that? I know the Presiding Officer wants to
get back to that. I know my colleague here wants to be part of that.
Let's get back together, where shoulder to shoulder we shoulder our
responsibilities, pass the legislation we need to, protect our country,
respect the men and women who work there, and say to any foe in the
world that the United States of America stands united and is willing to
protect us, and to the men and women who work for us in national
security, we will support you by passing legislation promptly that is
constitutional, legal, and authorized.
Madam President, I yield the floor.
The PRESIDING OFFICER. The Senator from Indiana.
Mr. COATS. Madam President, I want to thank my colleague from
Maryland, a member of the Senate Intelligence Committee. It is obvious
this is a bipartisan effort in dealing with the security of the
American people. The Senator from Maryland is not from my party.
Together, we serve on the Intelligence Committee. We have served
hundreds of hours on that committee together doing everything we can to
provide our country with the opportunity to protect Americans from
harm.
The threat to Americans today has never been greater. We are dealing
with fires raging in the Middle East and terrorist groups forming as we
speak, targeting the United States and Americans, and inspiring
Americans to take up arms against their fellow citizens for whatever
jihadist cause they are using as the basis for the brutality that is
spreading throughout the Middle East and that can happen here if they
respond to these inspirational social media requests from organizations
such as ISIS, Al Qaeda, and many others.
I understand Americans' frustrations and concerns about their civil
liberties and privacy. Those concerns have been bolstered by acts of
government that can hardly be explained. Look at what has taken place
with the IRS. Talk about targeting people, invading their privacy and
civil rights and using the organization of government for political
purposes is outrageous. Of course, people are up in arms about all of
this, the debacle of Benghazi and Fast and Furious and on and on over
the years. One can go into what has happened to instill distrust in the
minds of the American people.
When a program such as this comes along and, unfortunately, the
American people are told by Members of this Congress falsehoods as to
what this program is and what it isn't, it just feeds the narrative
that Washington is in their bedroom, Washington is in their home, it is
in their phone, it is listening to their calls--Washington is
monitoring everything they do--their locations.
This simply is not true. We have an organization and tools put in
place with that organization, the National Security Agency, following
the tragic events of 9/11 that the American people insisted on putting
in place. Let's use the tools that we can to try to prevent another 9/
11 from happening, to try to identify terrorist attacks before they
happen, not to clean up after they happen.
The frustration for those of us on the Intelligence Committee is we
are not able to come down and refute statements that are false that are
made here without breaching our oath not to release classified
information. We have had briefings with all of our Members. Some don't
choose to attend, and therefore their narrative continues without any
ability to publicly challenge what is being said. It has been said on
this floor that Big Government is listening to everyone's phone calls.
That is patently false.
First of all, it is impossible. There are trillions of phone calls
made every day throughout the world. The calculation is that it would
take 330 million employees sitting there monitoring Americans' phone
calls to be able to listen to everyone's phone calls. It is an
impossibility, No. 1.
No. 2, it is guaranteed that this is not happening because the
authorities given to the National Security Agency prevent that from
happening. There are layers and layers of attorneys and others who
oversee this process, including those of us in the Intelligence
Committees in the Senate and the House, the Justice Department, and the
executive branch. All three branches of government are so concerned
that this program could potentially be abused that the oversight is
such that it would take a monumental conspiracy, involving hundreds and
hundreds of people, to all agree that, yes, let's do this and breach
the law.
If what has been said on this floor about the nature of this program
was correct, I would be the first to line up and say I am here to
defend the liberties that are being abused by the government. I
guarantee to my constituents that this is a high priority for me, that
I do not support anything that would violate their civil rights or
violate their privacy. That is true of those of us on the Intelligence
Committee, whether we are a Democrat or Republican.
We have heard today from Senator King, who is on the committee. We
have heard from Senator Mikulski of Maryland, who spoke. We heard from
Senator Nelson, who was formerly on the committee on the Democratic
side. On the Republican side, our leader of the committee, Senator
Burr, has laid out in great detail how this works.
The tragedy is that in being forced to describe what the program is
and what it isn't, we have had to declassify information. Guess who is
listening.
I hope a lot of the American people are listening because they need
to understand that much of what they have heard is simply a falsity. It
is factually incorrect.
I am not going to go into why this has happened, why some Members
choose to say things like--and I am stating what has been said on this
floor--``Big Government is looking at every American's records, all
Americans' phone records all the time. They have said the NSA collects
Americans' contacts from address books, buddy lists, calling records,
phone records, emails, and do we want to live in a world where the
government has us under constant surveillance?''
None of us want to live in that kind of world. That is why we live in
America. That is why America is what it is. This is not Stasi Germany.
This is not a Communist regime. This is not a totalitarian society. We
would not allow that here. Our Constitution guarantees privacy and we
cherish that privacy and we protect that privacy. But to
[[Page S3394]]
come down to this floor and make statements such as those is
irresponsible, and it is a narrative that is just not the case.
Poor Ben Franklin has been dragged into this because the quote that
has been attributed to Franklin that should drive our decision on this
point was: ``Those who would give up essential Liberty to purchase a
little temporary Safety deserve neither Liberty nor Safety.''
I agree with that, but the key word here is ``essential.'' This
matter has come before the Supreme Court, and the Supreme Court has
said that what the NSA is doing in storing phone numbers only--not
names, not collecting information--is not essential to liberty. They
have declared it as a necessary, effective tool that is open. The only
information that is in your phone record is the date of the call, the
number called, the duration, and the time of the call--nothing more
than that.
Why is this done? It is done so that when we determine the phone
number of a known terrorist in a foreign country, we can go into that
haystack of phone numbers and say, Was that phone number connected to a
phone number held by someone in America?
In fact, the former Director of the CIA said that we likely would
have prevented 9/11 because we now know that a phone number in America
was connected to a phone number of a terrorist group--Al Qaeda--and we
could have taken that information to the FISA Court or to a court and
gotten permission to check into that to see if that was leading to some
kind of terror attacks.
It doesn't take much to recall the images of what happened on 9/11,
where we were, what horror we stood and watched coming over the
airwaves, and the tragedy and the loss of life that took place,
changing the face of America.
So it is important that we tell the American people what it is and
what it isn't. It is important that Members take responsibility to
understand this is an issue that rises above politics. This is an issue
that cannot be used and should not be used for political gain, whether
it is monetary gain or whether it is feeding a base of support that
responds to the scare tactics of America listening to all of your
calls, Big Government in all of your business.
This is too important an issue. This is about the safety of America.
This is about preventing us from terrorist attacks. The threat is real,
and it is more real than it has been in a long, long time.
So I talked yesterday about the existing program, what it was and
what it isn't. It has been talked about by my colleagues on the floor.
We have moved to a point where we have to choose between the better of
two bad choices.
One choice is that we eliminate the program. One of our Members in
the Senate has publicly indicated that is what he wants to do. He
claims it is unconstitutional. Unfortunately, he doesn't have the
support of the Supreme Court that has dealt with this issue, nor the
constitutional lawyers. That is a case that just simply cannot be made
because it doesn't impede on anyone's liberty.
Again, I would say, if it did impede on Americans' liberty, I would
be the first in line to state that and to fight against it. But it is a
solution to something that is not a problem.
But secondly, because one individual would not grant even the
shortest of extensions, even an extension on two noncontroversial parts
of this program that no one has challenged, to allow that to go forward
so that we could keep something in place to address a potential threat
that could happen--even that was denied us last evening as the clock
was ticking toward midnight, and the program expired. Someone who is so
determined to eliminate this entire program, who has misrepresented
this program to the American people, so determined to stay with his
narrative that he would not even allow an hour, not even allow a day,
not even allow minutes for us to try to reconcile the differences here
with the House of Representatives--and those differences are pretty
small.
Senator Burr has been in negotiations with the House and with Members
of the Senate relative to some changes and modifications in the USA
FREEDOM Act, which was supported by a significant bipartisan majority
in the House of Representatives. I think that is a step in the right
direction. It does not solve all of the problems. My concern with the
FREEDOM Act is a concern of many; that is, the act has some major
flaws, some of which I thought were fatal. But I have to measure that
against nothing.
Thanks to the procedural maneuvering by one Member here, we have been
left with only two choices. The Senate majority leader laid those out
with some clarity yesterday and today. The choices are completely
eliminate the program, go completely dark, take away this tool, and put
Americans more at risk--thanks very much, but it is over and try
something else--or a provision that has been passed by the House of
Representatives that moves collection of the phone numbers from NSA to
the telephone companies. The problem with the bill is that it does not
mandate that movement. It is a voluntary act that the phone companies
are most likely not going to want to adhere to, primarily because they
now have to set up a situation where they potentially could be liable
for breaches of the people who are overseeing their program.
There are 1,400 telephone companies in the United States. Many of
them are small. But to move this program, which has six layers of
oversight at NSA, which has the oversight of the Senate Intelligence
Committee and the House Intelligence Committee, which has the oversight
of the Department of Justice and the administration, and which has the
oversight of the Federal intelligence court called FISA--all of that
security oversight--to make sure there is no breach will now get
transferred over to up to 1,400 telephone companies.
The people who oversee this program--it is a very small number at NSA
who operate this program--have had intensive background checks and
security clearances. They have proven their commitment to make sure--to
do everything possible not to abuse this program. There has never been
a documented case, never one case of an abuse of this program--again, a
solution to something that is not a problem.
All of a sudden, now we will have dozens, if not hundreds, if not
more than 1,000 phone companies all putting their own programs in
place. This is not something they would like to do, No. 1, because it
is going to be very costly, and, No. 2, they cannot guarantee that
every one of their people is going to have the same kind of background
check and security check NSA has. They will not have the oversight of
the Intelligence Committees, of the Justice Department, of the
executive branch.
We are trusting a private entity to do the kinds of things that
multiple agencies do. And you can just count on probably some breaches
of security there as people want to use the capability to abuse that
program for whatever reason--maybe checking up on their wife or their
girlfriend or their business partner or who knows for what possible
reasons they could use it. So it really does not add privacy
protections; it detracts from privacy protections.
Secondly, the retention of records is voluntary. Now, if we have some
amendments that are passed by this body and accepted by the House, we
will get notification if a company does not want to retain those
records. But there is no retention authority granted here to us to
ensure that those companies will keep any phone numbers, and then the
capability of the program will be significantly reduced.
We are having to look at a very sophisticated program that the NSA
says: We are not sure it is going to work. We are not sure if this
process that the FREEDOM Act requires to replace what we have now is
going to be effective.
It is going to take many months to determine if that is the case. So
it is an untested program that we are putting a bet on that this is
going to work. It would be nice to know we had something in place we
can easily replace this with. So we are going from the known to the
unknown. We are making a bet that this is going to be more effective
and provide more privacy for the American people. It is a diminishment
and a significant degradation of the current program. It will not be as
effective as the program that is currently in place. Nevertheless, we
have
[[Page S3395]]
to weigh this against nothing. That is the position we have been put in
because one Senator would not allow an extension of time for us to have
a more lengthy debate and reasonable negotiation in consultation with
the House of Representatives to arrive at something that will give us
more assurance that we have a program in place that does not breach
privacy but allows us to detect potential terrorist attacks and stop
those attacks before they take place.
Having had to go through all of this and raise these kinds of issues
here and talk about a fellow colleague is not fun. It is not something
I hoped I would ever have to do. But I could not stand by and watch a
program that is helping protect American people from known terrorist
threats and let their safety be jeopardized by falsehoods that are
being said about what this program is and is not.
It looks like we are coming together on something that is far from
what we need, that is going to significantly degrade our capability,
but it is the only choice that we have. We are going to have to weigh
that decision. Is something that is far less better than nothing?
Ultimately, given the fact that these threats have never been greater,
something--even if it is not what we now have--something is better than
nothing.
But we have been put in this situation unnecessarily by
misrepresentations and a public that has not been informed. It is not
their fault. We have not been able to because so much of this has been
classified. Now, much of it is. Our adversaries, the terrorist groups,
know a lot about the program they did not know about before. Thanks to
Edward Snowden and thanks to some misrepresentations, we are left with
the devil's bargain, and that is to choose the best of the worst.
We will talk this through today. We will have a vote tomorrow. In my
mind, it is absolutely essential that the modifications that are being
made, that are being presented--I will not go into depth about those.
It has already been talked about here. It is essential that those be
passed by this body. It is, of course, essential that the House accept
them. I know a lot of negotiation has gone on back and forth, and it
will continue. But it is the only way to keep a program in place. Even
as degraded as it is, even as compromised as it is, it is the only way
to keep a program in place.
So I will be supporting those tweaks, those changes, even though I
think they are far short of what we need to do to fix the issue that
was rushed through the House without much deliberation. But to make it
stronger, to put it in a better position, I will support those. If
those amendments can be passed, then I will reluctantly choose to vote
for something that is better than nothing, as degraded as it is, in
order to keep this program as one of the essential tools--one of many--
as we collect information, keep that in place.
I know my colleague from Ohio has been seeking the floor for some
time. I apologize for taking too long.
I yield the floor.
The PRESIDING OFFICER. The Senator from Ohio.
Mr. BROWN. Madam President, I ask unanimous consent that following my
remarks, Senator Blumenthal be recognized.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. BROWN. Madam President, I ask unanimous consent to speak as in
morning business.
The PRESIDING OFFICER. Without objection, it is so ordered.
[...]
The PRESIDING OFFICER (Mr. Coats). The Senator from Connecticut.
Mr. BLUMENTHAL. Mr. President, I feel my speaking at this moment is
appropriate because much of what I have to say follows logically from
the last words of the Presiding Officer when he spoke recently on the
USA FREEDOM Act because I agree with the Presiding Officer when he said
we need a bill. We need to move forward and approve reforms and changes
in the law that are contained in the USA FREEDOM Act. We may be in
disagreement about some of the specifics. We may be in contention about
the extent of the changes made. But there is a general consensus that
this decade-and-a-half old law is in some need of revision.
The USA FREEDOM Act contains many important and genuinely worthwhile
changes in the rules that will apply as the United States helps to
protect our security but also to safeguard and preserve essential
rights and liberties. That is the balance which needs to be struck. It
is a difficult balance in a democracy, one of the most difficult in an
area where secrecy has to be maintained because surveillance is more
useful if it is done in secret, but at the same time, rights need to be
protected in an open society that prides itself on transparent and
accessible courts.
Changes in the rules are welcome, such as the end to the present
system of bulk collection of phone data. We may disagree on that point.
Changes in the rules that I support may not be supported by many of my
colleagues. I believe the USA FREEDOM Act goes in the right direction
on bulk collection of phone data by ending the current practice in its
present form.
What brings me to the floor is not so much a discussion about the
rules as the method of enforcing those rules and implementing and
assuring that they are faithfully executed, which is the role and the
responsibility of the Foreign Intelligence Surveillance Court in the
first instance. There are means of appeal from that court, but, as with
many courts in our system, that one is likely to be the end destination
on most issues, particularly since it operates in secret.
The USA FREEDOM Act goes in the right direction by making it more
transparent and requiring the disclosure of significant decisions and
opinions when it is appropriate to do so and under circumstances that
in no way should involve compromising our national security--striking,
again, a good balance.
But this Court, we have to recognize, is an anomaly in an open,
democratic system. Its secrecy makes it an anomaly. It works in secret,
it hears arguments in secret, and it issues opinions in secret. Its
decisions are almost never reviewable. It is, unlike most of our
institutions, opaque and unaccountable--understandably so because it
deals with classified, sensitive information, protecting our national
security against threats that cannot be disclosed when they are
thwarted in many instances. The success of actions resulting from the
FISA Court are most valuable when they are known to most American
people.
So this court is special. It is different. But let's not forget that
if we were to say to the Founders of this country that there will be a
court that works in secret, has hearings in secret, issues opinions
that are kept secret, and its decisions will have sweeping consequences
in constitutional rights and liberties, they would say: That sounds a
lot like the courts that were abhorrent to us, so much so that we
rebelled against the Crown, who said in the Star Chamber, in courts
that England had at the time, that there was no need for two sides to
be represented or for openness. Secret, one-sided courts were one of
the reasons we rebelled. Men and women laid their lives on the line.
They lost their homes, treasures, families, and paid a price for open
and democratic institutions.
So we should be careful about this anomalous court. It may be
necessary, but we should try to make it work better, and we have.
Transparency in the issuance of opinions is very much a step in the
right direction where the issues are significant and the transparency
of those decisions is consistent with our security at the moment. There
may be a delay, but we should remember that the bulk collection of
phone data, which the U.S. Court of Appeals for the Second Circuit said
was illegal, persisted for so many years because the decision itself
was never made known to the American people.
There is another reform that I think is equally if not more
significant. Courts that are secret and one-sided are likely to be less
accessible not only because they are secret but because they are one-
sided. So as a part of this reform, I have worked hard and proposed, in
fact, for the first time a bill that would create an adversarial
process--two sides represented before the court.
A bill that I sponsored in 2013 to reform the Foreign Intelligence
Surveillance Court was joined by 18 cosponsors. I thanked them for
their support, both sides of the aisle. The basic structures that I
proposed are reflected in the USA FREEDOM Act today.
Colleagues worked with me--and have since--on formulating that bill
and in arriving at this moment where the central goals would be
accomplished by section 401 of the USA FREEDOM Act, which provides for
the appointment of individuals to serve as amicus curiae--friends of
the court--in cases involving a novel or significant interpretation of
the law.
That provision would be egregiously undercut--in fact, gutted--by
McConnell amendment No. 1451 because it would prevent these lawyers--
the amicus curiae who would be selected by the court--from obtaining
the information and taking the actions they need to advance and protect
the strongest and most accurate legal arguments, and that is really
eviscerating the effectiveness of this provision as a protection. It is
a protection of our rights and liberties because these amicus curiae
would be public advocates protecting public constitutional rights, and
they would help safeguard essential liberties not just for the
individuals who might be subjects of surveillance, whether it be by
wiretap or by other means, but for all of us, because the Foreign
Intelligence Surveillance Court is a court. Its decisions have the
force of law. Its members are article III judges selected to be on that
court, sworn to uphold the law, both constitutional law and statutory
law.
So this provision, in my view, is fundamental to the court as a
matter of concept and constitutional integrity. That integrity is
important because it is a court, but it is also important to the trust
and confidence the people have in this institution.
I was a law clerk to the U.S. Supreme Court--specifically to Justice
Blackmun--and I well recall one of the Justices saying to me: You know,
we don't have armies; we don't have police forces; we don't have even
the ability to hold press conferences. What we have is our credibility
and the trust and confidence of the American people.
That is so fundamental to the courts of this Nation that consist of
judges appointed for life, without any real direct accountability, as
we can be held to through the election process.
The Foreign Intelligence Surveillance Court has taken a hit in public
[[Page S3397]]
trust and confidence. There is a question about whether the American
people will continue to have trust and confidence and whether that
sense of legitimacy and credibility will continue. The best way to
ensure it is, is to make the court's process as effective as possible
not just in the way it operates but in the way it is seen and perceived
to operate, the way the American people know it should operate, and the
way they can be assured that their rights are protected before the
court by an advocate, an amicus curiae who will protect those rights of
privacy and liberty that are integral to our Constitution--and the
reason why the Founders rebelled against the English.
But there is another reason an advocate presenting the side opposing
the government is important to the Foreign Intelligence Surveillance
Court; that is, everybody makes better decisions when they hear both
sides of the argument. Judges testified at our hearings in the
Judiciary Committee about the importance of hearing both sides of the
argument, whether it is a routine contract case or a criminal trial--
where, by the way, often a judge's worst nightmare is to have the
defendant represent himself because the judge is deprived, and so is
the jury, of an effective argument on the other side of the government.
And so, too, here we were told again and again and again by the
judicial officers who testified before our committee--and I have heard
it again and again and again as I have litigated over the last 40
years--that judges and courts work best when they hear both sides.
I have no doubt the judges of the FISA Court believe as strongly in
constitutional rights and implementation of the Constitution as anyone
in this body, including myself. I have no doubt government litigators
who appear before the court representing the intelligence agencies
seeking warrants or other actions and approval by the court have a
commitment no less than anybody in the United States Senate, including
myself, to those essential values and ideals. But courts are
contentious. They are places where people argue, where sides--different
sides--are represented with different views of complex questions, and
these issues before the court are extraordinarily complex. They also
involve technology that is fast changing and often difficult to explain
and comprehend and is easily minimized in the consequences that may
flow from approval of them.
So the USA FREEDOM Act would provide for, in effect, a panel of
advocates and experts with proper security clearances that the court
can call upon to give independent, informed opinions and advocacy in
cases involving a novel or significant interpretation of law, not in
every case, not every argument but where there is, for example, the
issue of whether the statute authorizes the bulk collection of phone
records.
I tend to think the outcome would have been different in that case if
the court had been given the opposing side of the argument, the
argument that eventually prevailed in the U.S. Court of Appeals for the
Second Circuit by a unanimous bench.
So the court really deserves this expertise. It deserves the other
side and it deserves to hear both sides of the argument. Just to
clarify, those two sides of the argument should not be in any way given
so as to detract from the time necessary. If it is an urgency, the
warrant should be issued and the arguments heard later, just as they
are in criminal court. When there is an exigency of time--and I have
done it myself as a prosecutor--the government's lawyer should go to
the judge, be given approval for whatever is necessary to protect the
public or gain access to records that may be destroyed or otherwise
safeguard security, public safety, and that should be the rule here
too.
Now, in the normal criminal setting, at some point, a significant
issue of law is going to be litigated if the evidence is ever used, and
that is the basic principle here too. If there is a novel or
significant issue of law, it should be litigated at some point, and
that is where the amicus curiae would be involved. Security clearance
is essential, timing is important, and there should be no compromise to
our national security in the court hearing the argument that the
advocate may present on the other side. It can only make for better
decisions. In fact, it will benefit all of our rights.
These provisions were written in consultation with the Department of
Justice attorneys who advocate before the FISA Court. They are
supported by the Attorney General and the National Director of
Intelligence. They reflect the balance and compromise that appear
throughout the USA FREEDOM Act. Amendment No. 1451 would upset this
balance. It would strike the current provisions providing for the
appointment of a panel of amicus curiae--the provisions that represent
a carefully crafted balance--and it would compromise those provisions
in a way that need not be done because this balance has the support of
numerous stakeholders, from civil liberties groups to the intelligence
community, and it would replace this balance, this institution, with an
ineffective, far less valuable advocate.
There is no need to water down and undercut and eviscerate the role
of the independent experts by removing requirements for the court to
appoint a panel of experts to be on call, for the experts to receive
briefings on relevant issues, and significantly to provide those
experts with access to relevant information. Those provisions are
unnecessary and unwise and, therefore, I oppose strongly amendment No.
1451 because it does unnecessarily and unwisely weaken the role of
these experts and amicus curiae.
Equally important, amendment No. 1451 would limit access and
significantly restrict the experts in their going to legal precedents,
petitions, motions or other materials that are crucial to making a
well-reasoned argument. It would restrict their access unnecessarily
and unwisely; thereby, endangering those rights and liberties the
public advocates are there to protect. It would also restrict their
ability to consult with one another and share insights they may have
gained from related cases as government attorneys are currently able to
do.
By undercutting these essential abilities and authorities, this
amendment would hamstring any independence, both in reality and in
perception; thereby, also undercutting the trust and confidence this
act is designed to bolster and sustain.
In short, I know many people of good conscience may disagree over the
best way to reform this law. I accept and I welcome that fact. I
welcome also my colleagues' recognition that an amicus curiae procedure
in some form would benefit this court, but I urge my colleagues to
reject an amendment that would lessen its constructive and beneficial
impact.
We have already delayed long enough. This amendment would not only
weaken the bill, it would exacerbate the delay by sending this bill
back to the House. We all want to avoid a very potentially troubling
delay in approving this measure. I have been dismayed by the divisions
and delays that have prevented us from finally approving the USA
FREEDOM Act before the existing law expires. We should move now. We
should act decisively. We should adopt the USA FREEDOM Act without
amendment No. 1451, which would simply further erode the trust and
confidence, the legitimacy, and credibility of the Foreign Intelligence
Surveillance Court.
I urge my colleagues to join me in voting against this amendment,
passing the USA FREEDOM Act in its current form, avoiding the delay of
sending it back to the House and then potentially having it come back
to the Senate, so we can tell the American people we are protecting the
strongest, greatest country in the history of the world from some of
the most pernicious and perilous terrorist forces ever in the world's
history.
Mr. President, I yield the floor.
I suggest the absence of a quorum.
[...]
_________________________
[Congressional Record Volume 161, Number 86 (Monday, June 1, 2015)]
[Senate]
[Pages S3408-S3417]
TEXT OF AMENDMENTS
SA 1454. Mr. WYDEN (for himself and Mr. Paul) submitted an amendment
intended to be proposed by him to the bill H.R. 2048, to reform the
authorities of the Federal Government to require the production of
certain business records, conduct electronic surveillance, use pen
registers and trap and trace devices, and use other forms of
information gathering for foreign intelligence, counterterrorism, and
criminal purposes, and for other purposes; which was ordered to lie on
the table; as follows:
At the appropriate place, insert the following:
SEC. __. PROHIBITION ON DATA SECURITY VULNERABILITY MANDATES.
(a) In General.--Except as provided in subsection (b), no
agency may mandate that a manufacturer, developer, or seller
of covered products design or alter the security functions in
its product or service to allow the surveillance of any user
of such product or service, or to allow the physical search
of such product, by any agency.
(b) Exception.--Subsection (a) shall not apply to mandates
authorized under the Communications Assistance for Law
Enforcement Act (47 U.S.C. 1001 et seq.).
(c) Definitions.--In this section--
(1) the term ``agency'' has the meaning given the term in
section 3502 of title 44, United States Code; and
(2) the term ``covered product'' means any computer
hardware, computer software, or electronic device that is
made available to the general public.
______
SA 1455. Mr. WYDEN (for himself and Mr. Paul) submitted an amendment
intended to be proposed by him to the bill H.R. 2048, to reform the
authorities of the Federal Government to require the production of
certain business records, conduct electronic surveillance, use pen
registers and trap and trace devices, and use other forms of
information gathering for foreign intelligence, counterterrorism, and
criminal purposes, and for other purposes; which was ordered to lie on
the table; as follows:
At the appropriate place, insert the following:
SEC. ___. CLARIFICATION ON PROHIBITION ON SEARCHING OF
COLLECTIONS OF COMMUNICATIONS TO CONDUCT
WARRANTLESS SEARCHES FOR THE COMMUNICATIONS OF
UNITED STATES PERSONS.
Section 702(b) of the Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1881a(b)) is amended--
(1) by redesignating paragraphs (1) through (5) as
subparagraphs (A) through (E), respectively, and indenting
such subparagraphs, as so redesignated, an additional two ems
from the left margin;
(2) by striking ``An acquisition'' and inserting the
following:
``(1) In general.--An acquisition''; and
(3) by adding at the end the following:
``(2) Clarification on prohibition on searching of
collections of communications of united states persons.--
``(A) In general.--Except as provided in subparagraph (B),
no officer or employee of the United States may conduct a
search of a collection of communications acquired under this
section in an effort to find communications of a particular
United States person (other than a corporation).
``(B) Concurrent authorization and exception for emergency
situations.--Subparagraph (A) shall not apply to a search for
communications related to a particular United States person
if--
``(i) such United States person is the subject of an order
or emergency authorization authorizing electronic
surveillance or physical search under section 105, 304, 703,
704, or 705 of this Act, or under title 18, United States
Code, for the effective period of that order;
``(ii) the entity carrying out the search has a reasonable
belief that the life or safety of such United States person
is threatened and the information is sought for the purpose
of assisting that person; or
``(iii) such United States person has consented to the
search.''.
______
SA 1456. Mr. McCAIN submitted an amendment intended to be proposed by
him to the bill H.R. 1735, to authorize appropriations for fiscal year
2016 for military activities of the Department
[[Page S3409]]
of Defense and for military construction, to prescribe military
personnel strengths for such fiscal year, and for other purposes; which
was ordered to lie on the table; as follows:
At the end of subtitle C of title X, add the following:
SEC. __. ADDITIONAL INFORMATION SUPPORTING LONG-RANGE PLANS
FOR CONSTRUCTION OF NAVAL VESSELS.
Section 231(b)(2)(C) of title 10, United States Code, is
amended by inserting ``by ship class in both graphical and
tabular form'' after ``The estimated levels of annual
funding''.
______
SA 1457. Mr. UDALL (for himself and Mr. Wyden) submitted an amendment
intended to be proposed by him to the bill H.R. 2048, to reform the
authorities of the Federal Government to require the production of
certain business records, conduct electronic surveillance, use pen
registers and trap and trace devices, and use other forms of
information gathering for foreign intelligence, counterterrorism, and
criminal purposes, and for other purposes; which was ordered to lie on
the table; as follows:
At the end, add the following:
TITLE IX--PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REFORM
SEC. 901. SHORT TITLES.
This title may be cited as the ``Strengthening Privacy,
Oversight, and Transparency Act'' or the ``SPOT Act''.
SEC. 902. INCLUSION OF FOREIGN INTELLIGENCE ACTIVITIES IN
OVERSIGHT AUTHORITY OF THE PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD.
Section 1061 of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee) is amended by
inserting ``and conduct foreign intelligence activities''
after ``terrorism'' in the following provisions:
(1) Paragraphs (1) and (2) of subsection (c).
(2) Subparagraphs (A) and (B) of subsection (d)(1).
(3) Subparagraphs (A), (B), and (C) of subsection (d)(2).
SEC. 903. SUBMISSION OF WHISTLEBLOWER COMPLAINTS TO THE
PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD.
Section 1061 of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee), as amended by
section 902, is further amended--
(1) in subsection (d), by adding at the end the following
new paragraph:
``(5) Whistleblower complaints.--
``(A) Submission to board.--An employee of, or contractor
or detailee to, an element of the intelligence community may
submit to the Board a complaint or information that such
employee, contractor, or detailee believes relates to a
privacy or civil liberties concern.
``(B) Authority of board.--The Board may take such action
as the Board considers appropriate with respect to
investigating a complaint or information submitted under
subparagraph (A) or transmitting such complaint or
information to any other Executive agency or the
congressional intelligence committees.
``(C) Relationship to existing laws.--The authority under
subparagraph (A) of an employee, contractor, or detailee to
submit to the Board a complaint or information shall be in
addition to any other authority under another provision of
law to submit a complaint or information. Any action taken
under any other provision of law by the recipient of a
complaint or information shall not preclude the Board from
taking action relating to the same complaint or information.
``(D) Relationship to actions taken under other laws.--
Nothing in this paragraph shall prevent--
``(i) any individual from submitting a complaint or
information to any authorized recipient of the complaint or
information; or
``(ii) the recipient of a complaint or information from
taking independent action on the complaint or information.'';
and
(2) by adding at the end the following new subsection:
``(n) Definitions.--In this section, the terms
`congressional intelligence committees' and `intelligence
community' have the meaning given such terms in section 3 of
the National Security Act of 1947 (50 U.S.C. 3003).''.
SEC. 904. PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD
SUBPOENA POWER.
Section 1061(g) of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee(g)) is amended--
(1) in paragraph (1)(D), by striking ``submit a written
request to the Attorney General of the United States that the
Attorney General'';
(2) by striking paragraph (2); and
(3) by redesignating paragraphs (3) and (4) as paragraphs
(2) and (3), respectively.
SEC. 905. APPOINTMENT OF STAFF OF THE PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD.
Section 1061(j) of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee(j)) is amended--
(1) by redesignating paragraphs (2) and (3) as paragraphs
(3) and (4), respectively; and
(2) by inserting after paragraph (1) the following new
paragraph:
``(2) Appointment in absence of chairman.--If the position
of chairman of the Board is vacant, during the period of the
vacancy the Board, at the direction of the majority of the
members of the Board, may exercise the authority of the
chairman under paragraph (1).''.
SEC. 906. PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD.
(a) In General.--Section 1061 of the Intelligence Reform
and Terrorism Prevention Act of 2004 (42 U.S.C. 2000ee), as
amended by sections 902 and 903, is further amended--
(1) in subsection (h)--
(A) in paragraph (1), by inserting ``full-time'' after ``4
additional''; and
(B) in paragraph (4)(B), by striking ``, except that'' and
all that follows through the end and inserting a period;
(2) in subsection (i)(1)--
(A) in subparagraph (A), by striking ``level III of the
Executive Schedule under section 5314'' and inserting ``level
II of the Executive Schedule under section 5313''; and
(B) in subparagraph (B), by striking ``level IV of the
Executive Schedule'' and all that follows through the end and
inserting ``level III of the Executive Schedule under section
5314 of title 5, United States Code.''; and
(3) in subsection (j)(1), by striking ``level V of the
Executive Schedule under section 5316'' and inserting ``level
IV of the Executive Schedule under section 5315''.
(b) Effective Date; Applicability.--
(1) In general.--The amendments made by subsection (a)
shall--
(A) take effect on the date of enactment of this Act; and
(B) except as provided in paragraph (2), apply to any
appointment to a position as a member of the Privacy and
Civil Liberties Oversight Board made on or after the date of
the enactment of this Act.
(2) Exceptions.--
(A) Compensation changes.--The amendments made by
paragraphs (2)(A) and (3) of subsection (a) shall take effect
on the first day of the first pay period beginning after the
date of the enactment of this Act.
(B) Election to serve full time by incumbents.--
(i) In general.--An individual serving as a member of the
Privacy and Civil Liberties Oversight Board on the date of
the enactment of this Act, including a member continuing to
serve as a member under section 1061(h)(4)(B) of the
Intelligence Reform and Terrorism Prevention Act of 2004 (42
U.S.C. 2000ee(h)(4)(B)), (in this subparagraph referred to as
a ``current member'') may make an election to--
(I) serve as a member of the Privacy and Civil Liberties
Oversight Board on a full-time basis and in accordance with
section 1061 of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee), as amended by this
Act; or
(II) serve as a member of the Privacy and Civil Liberties
Oversight Board on a part-time basis in accordance with such
section 1061, as in effect on the day before the date of
enactment of this Act, including the limitation on service
after the expiration of the term of the member under
subsection (h)(4)(B) of such section, as in effect on the day
before the date of the enactment of this Act.
(ii) Election to serve full time.--A current member making
an election under clause (i)(I) shall begin serving as a
member of the Privacy and Civil Liberties Oversight Board on
a full-time basis on the first day of the first pay period
beginning not less than 60 days after the date on which the
current member makes the election.
SEC. 907. PROVISION OF INFORMATION ABOUT GOVERNMENT
ACTIVITIES UNDER THE FOREIGN INTELLIGENCE
SURVEILLANCE ACT OF 1978 TO THE PRIVACY AND
CIVIL LIBERTIES OVERSIGHT BOARD.
The Attorney General should fully inform the Privacy and
Civil Liberties Oversight Board about any activities carried
out by the Government under the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.), including
by providing to the Board--
(1) copies of each detailed report submitted to a committee
of Congress under such Act; and
(2) copies of each decision, order, and opinion of the
Foreign Intelligence Surveillance Court or the Foreign
Intelligence Surveillance Court of Review required to be
included in the report under section 601(a) of such Act (50
U.S.C. 1871(a)).
______
SA 1458. Mr. PAUL (for himself and Mr. Wyden) submitted an amendment
intended to be proposed by him to the bill H.R. 2048, to reform the
authorities of the Federal Government to require the production of
certain business records, conduct electronic surveillance, use pen
registers and trap and trace devices, and use other forms of
information gathering for foreign intelligence, counterterrorism, and
criminal purposes, and for other purposes; which was ordered to lie on
the table; as follows:
At the appropriate place, insert the following:
SEC. __. PROHIBITION ON DATA SECURITY VULNERABILITY MANDATES.
(a) In General.--Except as provided in subsection (b), no
agency may mandate that a manufacturer, developer, or seller
of covered products design or alter the security functions in
its product or service to allow
[[Page S3410]]
the surveillance of any user of such product or service, or
to allow the physical search of such product, by any agency.
(b) Exception.--Subsection (a) shall not apply to mandates
authorized under the Communications Assistance for Law
Enforcement Act (47 U.S.C. 1001 et seq.).
(c) Definitions.--In this section--
(1) the term ``agency'' has the meaning given the term in
section 3502 of title 44, United States Code; and
(2) the term ``covered product'' means any computer
hardware, computer software, or electronic device that is
made available to the general public.
______
SA 1459. Mr. PAUL (for himself and Mr. Wyden) submitted an amendment
intended to be proposed by him to the bill H.R. 2048, to reform the
authorities of the Federal Government to require the production of
certain business records, conduct electronic surveillance, use pen
registers and trap and trace devices, and use other forms of
information gathering for foreign intelligence, counterterrorism, and
criminal purposes, and for other purposes; which was ordered to lie on
the table; as follows:
At the appropriate place, insert the following:
SEC. ___. CLARIFICATION ON PROHIBITION ON SEARCHING OF
COLLECTIONS OF COMMUNICATIONS TO CONDUCT
WARRANTLESS SEARCHES FOR THE COMMUNICATIONS OF
UNITED STATES PERSONS.
Section 702(b) of the Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1881a(b)) is amended--
(1) by redesignating paragraphs (1) through (5) as
subparagraphs (A) through (E), respectively, and indenting
such subparagraphs, as so redesignated, an additional two ems
from the left margin;
(2) by striking ``An acquisition'' and inserting the
following:
``(1) In general.--An acquisition''; and
(3) by adding at the end the following:
``(2) Clarification on prohibition on searching of
collections of communications of united states persons.--
``(A) In general.--Except as provided in subparagraph (B),
no officer or employee of the United States may conduct a
search of a collection of communications acquired under this
section in an effort to find communications of a particular
United States person (other than a corporation).
``(B) Concurrent authorization and exception for emergency
situations.--Subparagraph (A) shall not apply to a search for
communications related to a particular United States person
if--
``(i) such United States person is the subject of an order
or emergency authorization authorizing electronic
surveillance or physical search under section 105, 304, 703,
704, or 705 of this Act, or under title 18, United States
Code, for the effective period of that order;
``(ii) the entity carrying out the search has a reasonable
belief that the life or safety of such United States person
is threatened and the information is sought for the purpose
of assisting that person; or
``(iii) such United States person has consented to the
search.''.
______
SA 1460. Mr. PAUL (for himself and Mr. Wyden) submitted an amendment
intended to be proposed by him to the bill H.R. 2048, to reform the
authorities of the Federal Government to require the production of
certain business records, conduct electronic surveillance, use pen
registers and trap and trace devices, and use other forms of
information gathering for foreign intelligence, counterterrorism, and
criminal purposes, and for other purposes; which was ordered to lie on
the table; as follows:
Strike all after the enacting clause and insert the
following:
SECTION 1. SHORT TITLE; TABLE OF CONTENTS.
(a) Short Title.--This Act may be cited as the
``Intelligence Oversight and Surveillance Reform Act''.
(b) Table of Contents.--The table of contents for this Act
is as follows:
Sec. 1. Short title; table of contents.
TITLE I--ACCESS TO CERTAIN BUSINESS RECORDS FOR FOREIGN INTELLIGENCE
AND INTERNATIONAL TERRORISM INVESTIGATIONS
Sec. 101. End of government bulk collection of business records.
Sec. 102. Emergency authority for access to call data records.
Sec. 103. Challenges to government surveillance.
TITLE II--PRIVACY PROTECTIONS FOR PEN REGISTERS AND TRAP AND TRACE
DEVICES
Sec. 201. Privacy protections for pen registers and trap and trace
devices.
TITLE III--PROCEDURES FOR TARGETING CERTAIN PERSONS OUTSIDE THE UNITED
STATES OTHER THAN UNITED STATES PERSONS
Sec. 301. Clarification on prohibition on searching of collections of
communications to conduct warrantless searches for the
communications of United States persons.
Sec. 302. Protection against collection of wholly domestic
communications not concerning terrorism under FISA
Amendments Act.
Sec. 303. Prohibition on reverse targeting under FISA Amendments Act.
Sec. 304. Limits on use of unlawfully obtained information under FISA
Amendments Act.
Sec. 305. Challenges to Government surveillance.
TITLE IV--FOREIGN INTELLIGENCE SURVEILLANCE COURT REFORMS
Sec. 401. Definitions.
Sec. 402. Office of the Constitutional Advocate.
Sec. 403. Advocacy before the FISA Court.
Sec. 404. Advocacy before the petition review pool.
Sec. 405. Appellate review.
Sec. 406. Disclosure.
Sec. 407. Annual report to Congress.
Sec. 408. Preservation of rights.
TITLE V--NATIONAL SECURITY LETTER REFORMS
Sec. 501. National security letter authority.
Sec. 502. Public reporting on National Security Letters.
TITLE VI--REPORTING FISA ORDERS AND NATIONAL SECURITY LETTERS
Sec. 601. Third-party reporting of FISA orders and National Security
Letters.
Sec. 602. Government reporting of FISA orders.
TITLE VII--OTHER MATTERS
Sec. 701. Privacy and Civil Liberties Oversight Board subpoena
authority.
Sec. 702. Scope of liability protection for providing assistance to the
Government.
TITLE I--ACCESS TO CERTAIN BUSINESS RECORDS FOR FOREIGN INTELLIGENCE
AND INTERNATIONAL TERRORISM INVESTIGATIONS
SEC. 101. END OF GOVERNMENT BULK COLLECTION OF BUSINESS
RECORDS.
(a) Privacy Protections for Section 215 Business Records
Orders.--
(1) In general.--Section 501(b) of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1861(b)) is amended--
(A) in paragraph (1)(B), by striking ``and'' at the end;
(B) in paragraph (2), by striking subparagraphs (A) and (B)
and inserting the following:
``(A) a statement of facts showing that there are
reasonable grounds to believe that the records or other
things sought--
``(i) are relevant to an authorized investigation (other
than a threat assessment) conducted in accordance with
subsection (a)(2) to obtain foreign intelligence information
not concerning a United States person or to protect against
international terrorism or clandestine intelligence
activities; and
``(ii) pertain to--
``(I) a foreign power or an agent of a foreign power;
``(II) the activities of a suspected agent of a foreign
power who is the subject of such authorized investigation; or
``(III) an individual in contact with, or known to, a
suspected agent of a foreign power; and
``(B) a statement of proposed minimization procedures;
and''; and
(C) by adding at the end the following:
``(3) if the applicant is seeking a nondisclosure
requirement described in subsection (d), shall include--
``(A) a statement of specific and articulable facts
providing reason to believe that disclosure of particular
information about the existence or contents of the order
requiring the production of tangible things under this
section during the applicable time period will result in--
``(i) endangering the life or physical safety of any
person;
``(ii) flight from prosecution;
``(iii) destruction of or tampering with evidence;
``(iv) intimidation of potential witnesses;
``(v) interference with diplomatic relations; or
``(vi) otherwise seriously endangering the national
security of the United States by alerting a target, an
associate of a target, or the foreign power of which the
target is an agent, of the interest of the Government in the
target;
``(B) an explanation of how the harm identified under
subparagraph (A) is related to the authorized investigation
to which the tangible things sought are relevant;
``(C) an explanation of how the nondisclosure requirement
is narrowly tailored to address the specific harm identified
under subparagraph (A); and
``(D) the time period during which the Government believes
the nondisclosure requirement should apply.''.
(2) Order.--Section 501(c) of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1861(c)) is amended--
(A) in paragraph (1)--
(i) by striking ``subsections (a) and (b),'' and inserting
``subsection (a) and paragraphs (1) and (2) of subsection (b)
and that the proposed minimization procedures meet the
definition of minimization procedures under subsection
(g),''; and
(ii) by striking the last sentence and inserting the
following: ``If the judge finds that
[[Page S3411]]
the requirements of subsection (b)(3) have been met, such
order shall include a nondisclosure requirement, which may
apply for not longer than 1 year, unless the facts justify a
longer period of nondisclosure, subject to the principles and
procedures described in subsection (d).''; and
(B) in paragraph (2)--
(i) in subparagraph (C), by striking ``(d);'' and inserting
``(d), if applicable;'';
(ii) in subparagraph (D), by striking ``and'' at the end;
(iii) in subparagraph (E), by striking the period at the
end and inserting ``; and''; and
(iv) by adding at the end the following:
``(F) shall direct that the minimization procedures be
followed.''.
(3) Nondisclosure.--Section 501(d) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1861(d)) is
amended to read as follows:
``(d) Nondisclosure.--
``(1) In general.--No person who receives an order under
subsection (c) that contains a nondisclosure requirement
shall disclose to any person the particular information
specified in the nondisclosure requirement during the time
period to which the requirement applies.
``(2) Exception.--
``(A) Disclosure.--A person who receives an order under
subsection (c) that contains a nondisclosure requirement may
disclose information otherwise subject to any applicable
nondisclosure requirement to--
``(i) those persons to whom disclosure is necessary in
order to comply with an order under this section;
``(ii) an attorney in order to obtain legal advice or
assistance regarding the order; or
``(iii) other persons as permitted by the Director of the
Federal Bureau of Investigation or the designee of the
Director.
``(B) Application.--A person to whom disclosure is made
under subparagraph (A) shall be subject to the nondisclosure
requirements applicable to a person to whom an order is
directed under this section in the same manner as the person
to whom the order is directed.
``(C) Notification.--Any person who discloses to a person
described in subparagraph (A) information otherwise subject
to a nondisclosure requirement shall notify the person of the
applicable nondisclosure requirement.
``(3) Extension.--The Director of the Federal Bureau of
Investigation, or a designee of the Director (whose rank
shall be no lower than Assistant Special Agent in Charge),
may apply for renewals of the prohibition on disclosure of
particular information about the existence or contents of an
order requiring the production of tangible things under this
section for additional periods of not longer than 1 year,
unless the facts justify a longer period of nondisclosure. A
nondisclosure requirement shall be renewed if a court having
jurisdiction under paragraph (4) determines that the
application meets the requirements of subsection (b)(3).
``(4) Jurisdiction.--An application for a renewal under
this subsection shall be made to--
``(A) a judge of the court established under section
103(a); or
``(B) a United States Magistrate Judge under chapter 43 of
title 28, United States Code, who is publicly designated by
the Chief Justice of the United States to have the power to
hear applications and grant orders for the production of
tangible things under this section on behalf of a judge of
the court established under section 103(a).''.
(4) Minimization.--Section 501(g) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1861(g)) is
amended--
(A) in paragraph (1), by striking ``Not later than'' and
all that follows and inserting ``At or before the end of the
period of time for the production of tangible things under an
order approved under this section or at any time after the
production of tangible things under an order approved under
this section, a judge may assess compliance with the
minimization procedures by reviewing the circumstances under
which information concerning United States persons was
acquired, retained, or disseminated.''; and
(B) in paragraph (2)(A), by inserting ``acquisition and''
after ``to minimize the''.
(b) Judicial Review of Section 215 Orders.--Section
501(f)(2) of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1861(f)(2)) is amended--
(1) in subparagraph (A)(i)--
(A) by striking ``that order'' and inserting ``such
production order or any nondisclosure order imposed in
connection with such production order''; and
(B) by striking the second sentence;
(2) by striking subparagraph (C) and inserting the
following new subparagraph:
``(C) A judge considering a petition to modify or set aside
a nondisclosure order shall grant such petition unless the
court determines that--
``(i) there is reason to believe that disclosure of the
information subject to the nondisclosure requirement during
the applicable time period will result in--
``(I) endangering the life or physical safety of any
person;
``(II) flight from prosecution;
``(III) destruction of or tampering with evidence;
``(IV) intimidation of potential witnesses;
``(V) interference with diplomatic relations; or
``(VI) otherwise seriously endangering the national
security of the United States by alerting a target, an
associate of a target, or the foreign power of which the
target is an agent, of the interest of the Government in the
target;
``(ii) the harm identified under clause (i) relates to the
authorized investigation to which the tangible things sought
are relevant; and
``(iii) the nondisclosure requirement is narrowly tailored
to address the specific harm identified under clause (i).'';
and
(3) by adding at the end the following new subparagraph:
``(E) If a judge denies a petition to modify or set aside a
nondisclosure order under this paragraph, no person may file
another petition to modify or set aside such nondisclosure
order until the date that is one year after the date on which
such judge issues the denial of such petition.''.
SEC. 102. EMERGENCY AUTHORITY FOR ACCESS TO CALL DATA
RECORDS.
(a) In General.--Section 403 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1843) is amended by
adding at the end the following:
``(e)(1) Notwithstanding any other provision of this
subsection, the Attorney General may require the production
of call data records by the provider of a wire or electronic
communication service on an emergency basis if--
``(A) such records--
``(i) are relevant to an authorized investigation (other
than a threat assessment) conducted in accordance with
section 402 or 501, as appropriate, to obtain foreign
intelligence information not concerning a United States
person or to protect against international terrorism or
clandestine intelligence activities; and
``(ii) pertain to--
``(I) a foreign power or an agent of a foreign power;
``(II) the activities of a suspected agent of a foreign
power who is the subject of such authorized investigation; or
``(III) an individual in contact with, or known to, a
suspected agent of a foreign power;
``(B) the Attorney General reasonably determines--
``(i) an emergency requires the production of such records
before an order requiring such production can with due
diligence be obtained under section 402 or 501, as
appropriate; and
``(ii) the factual basis for issuance of an order under
section 402 or 501, as appropriate, to require the production
of such records exists;
``(C) a judge referred to in section 402(b) or 501(b)(1),
as appropriate, is informed by the Attorney General at the
time of the required production of such records that the
decision has been made to require such production on an
emergency basis; and
``(D) an application in accordance with section 402 or 501,
as appropriate, is made to such judge as soon as practicable,
but not more than 7 days after the date on which the Attorney
General requires the production of such records under this
subsection.
``(2)(A) In the absence of an order issued under section
402 or 501, as appropriate, to approve the emergency required
production of call data records under paragraph (1), the
authority to require the production of such records shall
terminate at the earlier of--
``(i) when the information sought is obtained;
``(ii) when the application for the order is denied under
section 402 or 501, as appropriate; or
``(iii) 7 days after the time of the authorization by the
Attorney General.
``(B) If an application for an order applied for under
section 402 or 501, as appropriate, for the production of
call data records required to be produced pursuant to
paragraph (1) is denied, or in any other case where the
emergency production of call data records under this section
is terminated and no order under section 402 or 501, as
appropriate, is issued approving the required production of
such records, no information obtained or evidence derived
from such records shall be received in evidence or otherwise
disclosed in any trial, hearing, or other proceeding in or
before any court, grand jury, department, office, agency,
regulatory body, legislative committee, or other authority of
the United States, a State, or political subdivision thereof,
and no information concerning any United States person
acquired from such records shall subsequently be used or
disclosed in any other manner by Federal officers or
employees without the consent of such person, except with the
approval of the Attorney General if the information indicates
a threat of death or serious bodily harm to any person.''.
(b) Termination of Section 501 References.--On the date
that section 102(b)(1) of the USA PATRIOT Improvement and
Reauthorization Act of 2005 (Public Law 109-177; 50 U.S.C.
1805 note) takes effect, subsection (e) of section 403 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1843), as added by paragraph (1), is amended--
(1) by striking ``or section 501, as appropriate,'' each
place that term appears;
(2) in paragraph (1)--
(A) in subparagraph (B), by striking ``or 501, as
appropriate;'' and by inserting a semicolon; and
(B) in subparagraph (C), by striking ``or 501(b)(1), as
appropriate,''; and
(3) in paragraph (2)(A)(ii), by striking ``or 501, as
appropriate;'' and by inserting a semicolon.
[[Page S3412]]
SEC. 103. CHALLENGES TO GOVERNMENT SURVEILLANCE.
(a) In General.--Title V of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1861 et seq.) is amended
by adding at the end the following:
``SEC. 503. CHALLENGES TO ORDERS TO PRODUCE CERTAIN BUSINESS
RECORDS.
``(a) Appeal.--
``(1) In general.--A person who is required to produce any
tangible thing pursuant to an order issued under section 501
may appeal the order to a United States court of appeals on
the basis that the order violates the Constitution of the
United States.
``(2) Venue.--An appeal filed pursuant to paragraph (1) may
be filed--
``(A) in the United States court of appeals for a circuit
embracing a judicial district in which venue would be proper
for a civil action under section 1391 of title 28, United
States Code; or
``(B) United States Court of Appeals for the District of
Columbia.
``(b) Supreme Court Review.--A person may seek a writ of
certiorari from the Supreme Court of the United States for
review of a decision of an appeal filed under subsection
(a)(1).''.
(b) Table of Contents Amendment.--The table of contents in
the first section of the Foreign Intelligence Surveillance
Act of 1978 is amended by adding after the item relating to
section 502 the following:
``Sec. 503. Challenges to orders to produce certain business
records.''.
TITLE II--PRIVACY PROTECTIONS FOR PEN REGISTERS AND TRAP AND TRACE
DEVICES
SEC. 201. PRIVACY PROTECTIONS FOR PEN REGISTERS AND TRAP AND
TRACE DEVICES.
(a) Application.--Section 402(c) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1842(c)) is
amended--
(1) in paragraph (1), by striking ``and'' at the end; and
(2) by striking paragraph (2) and inserting the following
new paragraphs:
``(2) a statement of facts showing that there are
reasonable grounds to believe that the records sought--
``(A) are relevant to an authorized investigation to obtain
foreign intelligence information not concerning a United
States person or to protect against international terrorism
or clandestine intelligence activities (other than a threat
assessment), provided that such investigation of a United
States person is not conducted solely upon the basis of
activities protected by the first amendment to the
Constitution; and
``(B) pertain to--
``(i) a foreign power or an agent of a foreign power;
``(ii) the activities of a suspected agent of a foreign
power who is the subject of such authorized investigation; or
``(iii) an individual in contact with, or known to, a
suspected agent of a foreign power; and
``(3) a statement of proposed minimization procedures.''.
(b) Minimization.--
(1) Definition.--Section 401 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1841) is amended by
adding at the end the following:
``(4) The term `minimization procedures' means--
``(A) specific procedures that are reasonably designed in
light of the purpose and technique of an order for the
installation and use of a pen register or trap and trace
device, to minimize the acquisition and retention, and
prohibit the dissemination, of nonpublicly available
information concerning unconsenting United States persons
consistent with the need of the United States to obtain,
produce, and disseminate foreign intelligence information;
``(B) procedures that require that nonpublicly available
information, which is not foreign intelligence information,
as defined in section 101(e)(1), shall not be disseminated in
a manner that identifies any United States person, without
such person's consent, unless such person's identity is
necessary to understand foreign intelligence information or
assess its importance; and
``(C) notwithstanding subparagraphs (A) and (B), procedures
that allow for the retention and dissemination of information
that is evidence of a crime which has been, is being, or is
about to be committed and that is to be retained or
disseminated for law enforcement purposes.''.
(2) Pen registers and trap and trace devices.--Section 402
of the Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1842) is amended--
(A) in subsection (d)--
(i) in paragraph (1), by inserting ``, and that the
proposed minimization procedures meet the definition of
minimization procedures under this title'' before the period
at the end; and
(ii) in paragraph (2)(B)--
(I) in clause (ii)(II), by striking ``and'' after the
semicolon; and
(II) by adding at the end the following:
``(iv) the minimization procedures be followed; and''; and
(B) by adding at the end the following:
``(h) At or before the end of the period of time for which
the installation and use of a pen register or trap and trace
device is approved under an order or an extension under this
section, the judge may assess compliance with the
minimization procedures by reviewing the circumstances under
which information concerning United States persons was
acquired, retained, or disseminated.''.
(3) Emergencies.--Section 403 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1843), as amended by
section 102(a), is further amended--
(A) by redesignating subsection (c) as (d); and
(B) by inserting after subsection (b) the following:
``(c) If the Attorney General authorizes the emergency
installation and use of a pen register or trap and trace
device under this section, the Attorney General shall require
that minimization procedures required by this title for the
issuance of a judicial order be followed.''.
(4) Use of information.--Section 405(a)(1) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1845(a)(1))
is amended by striking the period at the end and inserting
``and the minimization procedures required under the order
approving such pen register or trap and trace device.''.
TITLE III--PROCEDURES FOR TARGETING CERTAIN PERSONS OUTSIDE THE UNITED
STATES OTHER THAN UNITED STATES PERSONS
SEC. 301. CLARIFICATION ON PROHIBITION ON SEARCHING OF
COLLECTIONS OF COMMUNICATIONS TO CONDUCT
WARRANTLESS SEARCHES FOR THE COMMUNICATIONS OF
UNITED STATES PERSONS.
Section 702(b) of the Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1881a(b)) is amended--
(1) by redesignating paragraphs (1) through (5) as
subparagraphs (A) through (E), respectively, and indenting
such subparagraphs, as so redesignated, an additional two ems
from the left margin;
(2) by striking ``An acquisition'' and inserting the
following:
``(1) In general.--An acquisition''; and
(3) by adding at the end the following:
``(2) Clarification on prohibition on searching of
collections of communications of united states persons.--
``(A) In general.--Except as provided in subparagraph (B),
no officer or employee of the United States may conduct a
search of a collection of communications acquired under this
section in an effort to find communications of a particular
United States person (other than a corporation).
``(B) Concurrent authorization and exception for emergency
situations.--Subparagraph (A) shall not apply to a search for
communications related to a particular United States person
if--
``(i) such United States person is the subject of an order
or emergency authorization authorizing electronic
surveillance or physical search under section 105, 304, 703,
704, or 705 of this Act, or under title 18, United States
Code, for the effective period of that order;
``(ii) the entity carrying out the search has a reasonable
belief that the life or safety of such United States person
is threatened and the information is sought for the purpose
of assisting that person; or
``(iii) such United States person has consented to the
search.''.
SEC. 302. PROTECTION AGAINST COLLECTION OF WHOLLY DOMESTIC
COMMUNICATIONS NOT CONCERNING TERRORISM UNDER
FISA AMENDMENTS ACT.
(a) In General.--Section 702 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1881a) is amended--
(1) in subsection (d)(1)--
(A) in subparagraph (A), by striking ``and'' at the end;
(B) in subparagraph (B), by striking the period at the end
and inserting ``; and''; and
(C) by adding at the end the following new subparagraph:
``(C) limit the acquisition of the contents of any
communication to communications to which any party is a
target of the acquisition or communications that refer to the
target of the acquisition, if such communications are
acquired to protect against international terrorism.''; and
(2) in subsection (i)(2)(B)--
(A) in clause (i), by striking ``and'' at the end;
(B) in clause (ii), by striking the period at the end and
inserting ``; and''; and
(C) by adding at the end the following new clause:
``(iii) limit the acquisition of the contents of any
communication to communications to which any party is a
target of the acquisition or communications that refer to the
target of the acquisition, if such communications are
acquired to protect against international terrorism.''.
(b) Conforming Amendment.--Section 701(a) of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1881(a)) is
amended by inserting `` `international terrorism','' after ``
`foreign power',''.
SEC. 303. PROHIBITION ON REVERSE TARGETING UNDER FISA
AMENDMENTS ACT.
Section 702 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1881a), as amended by sections 301 and 302 of
this Act, is further amended--
(1) in paragraph (1)(B) of subsection (b), as redesignated
by section 301, by striking ``the purpose'' and inserting ``a
significant purpose'';
(2) in subsection (d)(1)(A)--
(A) by striking ``ensure that'' and inserting the
following: ``ensure--
``(i) that''; and
[[Page S3413]]
(B) by adding at the end the following:
``(ii) that an application is filed under title I, if
otherwise required, when a significant purpose of an
acquisition authorized under subsection (a) is to acquire the
communications of a particular, known person reasonably
believed to be located in the United States; and'';
(3) in subsection (g)(2)(A)(i)(I)--
(A) by striking ``ensure that'' and inserting the
following: ``ensure--
``(aa) that''; and
(B) by adding at the end the following:
``(bb) that an application is filed under title I, if
otherwise required, when a significant purpose of an
acquisition authorized under subsection (a) is to acquire the
communications of a particular, known person reasonably
believed to be located in the United States; and''; and
(4) in subsection (i)(2)(B)(i)--
(A) by striking ``ensure that'' and inserting the
following: ``ensure--
``(I) that''; and
(B) by adding at the end the following:
``(II) that an application is filed under title I, if
otherwise required, when a significant purpose of an
acquisition authorized under subsection (a) is to acquire the
communications of a particular, known person reasonably
believed to be located in the United States; and''.
SEC. 304. LIMITS ON USE OF UNLAWFULLY OBTAINED INFORMATION
UNDER FISA AMENDMENTS ACT.
Section 702(i)(3) of the Foreign Intelligence Surveillance
Act of 1978 (50 U.S.C. 1881a(i)(3)) is amended by striking
subparagraph (B) and inserting the following:
``(B) Correction of deficiencies.--
``(i) In general.--If the Court finds that a certification
required by subsection (g) does not contain all of the
required elements, or that the procedures required by
subsections (d) and (e) are not consistent with the
requirements of those subsections or the fourth amendment to
the Constitution of the United States, the Court shall issue
an order directing the Government to, at the Government's
election and to the extent required by the order of the
Court--
``(I) correct any deficiency identified by the order of the
Court not later than 30 days after the date on which the
Court issues the order; or
``(II) cease, or not begin, the implementation of the
authorization for which such certification was submitted.
``(ii) Limitation on use of information.--
``(I) In general.--Except as provided in subclause (II), no
information obtained or evidence derived from an acquisition
pursuant to a certification or targeting or minimization
procedures subject to an order under clause (i) concerning
any United States person shall be received in evidence or
otherwise disclosed in any trial, hearing, or other
proceeding in or before any court, grand jury, department,
office, agency, regulatory body, legislative committee, or
other authority of the United States, a State, or political
subdivision thereof, and no information concerning any United
States person acquired from the acquisition shall
subsequently be used or disclosed in any other manner by
Federal officers or employees without the consent of the
United States person, except with the approval of the
Attorney General if the information indicates a threat of
death or serious bodily harm to any person.
``(II) Exception.--If the Government corrects any
deficiency identified by the order of the Court under clause
(i), the Court may permit the use or disclosure of
information acquired before the date of the correction under
such minimization procedures as the Court shall establish for
purposes of this clause.''.
SEC. 305. CHALLENGES TO GOVERNMENT SURVEILLANCE.
Section 702 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1881a), as amended by this title, is further
amended by adding at the end the following new subsection:
``(m) Challenges to Government Surveillance.--
``(1) Injury in fact.--In any claim in a civil action
brought in a court of the United States relating to
surveillance conducted under this section, the person
asserting the claim has suffered an injury in fact if the
person--
``(A) has a reasonable basis to believe that the person's
communications will be acquired under this section; and
``(B) has taken objectively reasonable steps to avoid
surveillance under this section.
``(2) Reasonable basis.--A person shall be presumed to have
demonstrated a reasonable basis to believe that the
communications of the person will be acquired under this
section if the profession of the person requires the person
regularly to communicate foreign intelligence information
with persons who--
``(A) are not United States persons; and
``(B) are located outside the United States.
``(3) Objective steps.--A person shall be presumed to have
taken objectively reasonable steps to avoid surveillance
under this section if the person demonstrates that the steps
were taken in reasonable response to rules of professional
conduct or analogous professional rules.''.
TITLE IV--FOREIGN INTELLIGENCE SURVEILLANCE COURT REFORMS
SEC. 401. DEFINITIONS.
In this title:
(1) Constitutional advocate.--The term ``Constitutional
Advocate'' means the Constitutional Advocate appointed under
section 402(b).
(2) Decision.--The term ``decision'' means a decision,
order, or opinion issued by the FISA Court or the FISA Court
of Review.
(3) FISA.--The term ``FISA'' means the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.).
(4) FISA court.--The term ``FISA Court'' means the court
established under section 103(a) of FISA (50 U.S.C. 1803(a)).
(5) FISA court of review.--The term ``FISA Court of
Review'' means the court of review established under section
103(b) of FISA (50 U.S.C. 1803(b)).
(6) Office.--The term ``Office'' means the Office of the
Constitutional Advocate established under section 402(a).
(7) Petition review pool.--The term ``petition review
pool'' means the petition review pool established by section
103(e) of FISA (50 U.S.C. 1803(e)) or any member of that
pool.
(8) Significant construction or interpretation of law.--The
term ``significant construction or interpretation of law''
means a significant construction or interpretation of a
provision, as that term is construed under section 601(c) of
FISA (50 U.S.C. 1871(c)).
SEC. 402. OFFICE OF THE CONSTITUTIONAL ADVOCATE.
(a) Establishment.--There is established within the
judicial branch of the United States an Office of the
Constitutional Advocate.
(b) Constitutional Advocate.--
(1) In general.--The head of the Office is the
Constitutional Advocate.
(2) Appointment and term.--
(A) Appointment.--The Chief Justice of the United States
shall appoint the Constitutional Advocate from the list of
candidates submitted under subparagraph (B).
(B) Candidates.--
(i) List of candidates.--The Privacy and Civil Liberties
Oversight Board shall submit to the Chief Justice a list of
not less than 5 qualified candidates to serve as a
Constitutional Advocate.
(ii) Selection of candidates.--In preparing a list
described in clause (i), the Privacy and Civil Liberties
Oversight Board shall select candidates the Board believes
will be zealous and effective advocates in defense of civil
liberties and consider each potential candidate's--
(I) litigation and other professional experience;
(II) experience with the areas of law the Constitutional
Advocate is likely to encounter in the course of the
Advocate's duties; and
(III) demonstrated commitment to civil liberties.
(C) Security clearance.--An individual may be appointed
Constitutional Advocate without regard to whether the
individual possesses a security clearance on the date of the
appointment.
(D) Term and dismissal.--A Constitutional Advocate shall be
appointed for a term of 3 years and may be fired only for
good cause shown, including the demonstrated inability to
qualify for an adequate security clearance.
(E) Reappointment.--There shall be no limit to the number
of consecutive terms served by a Constitutional Advocate. The
reappointment of a Constitutional Advocate shall be made in
the same manner as appointment of a Constitutional Advocate.
(F) Acting constitutional advocate.--If the position of
Constitutional Advocate is vacant, the Chief Justice may
appoint an Acting Constitutional Advocate from among the
qualified employees of the Office. If there are no such
qualified employees, the Chief Justice may appoint an Acting
Constitutional Advocate from the most recent list of
candidates provided by the Privacy and Civil Liberties
Oversight Board pursuant to subparagraph (B). The Acting
Constitutional Advocate shall have all of the powers of a
Constitutional Advocate and shall serve until a
Constitutional Advocate is appointed.
(3) Employees.--The Constitutional Advocate is authorized,
without regard to the civil service laws and regulations, to
appoint and terminate employees of the Office.
(c) Security Clearances.--The appropriate departments,
agencies, and elements of the executive branch shall
cooperate with the Office, to the extent possible under
existing procedures and requirements, to expeditiously
provide the Constitutional Advocate and appropriate employees
of the Office with the security clearances necessary to carry
out the duties of the Constitutional Advocate.
(d) Duties and Authorities of the Constitutional
Advocate.--
(1) In general.--The Constitutional Advocate--
(A) shall review each application to the FISA Court by the
Attorney General;
(B) shall review each decision of the FISA Court, the
petition review pool, or the FISA Court of Review issued
after the date of the enactment of this Act and all documents
and other material relevant to such decision in a complete,
unredacted form;
(C) may participate in a proceeding before the petition
review pool if such participation is requested by a party in
such a proceeding or by the petition review pool;
(D) shall consider any request from a provider who has been
served with an order, certification, or directive compelling
the provider to provide assistance to the Government or to
release customer information to assist that provider in a
proceeding before
[[Page S3414]]
the FISA Court or the petition review pool, including a
request--
(i) to oppose the Government on behalf of the private party
in such a proceeding; or
(ii) to provide guidance to the private party if the
private party is considering compliance with an order of the
FISA Court;
(E) shall participate in a proceeding before the FISA Court
if appointed to participate by the FISA Court under section
403(a) and may participate in a proceeding before the
petition review pool if authorized under section 404(a);
(F) may request to participate in a proceeding before the
FISA Court or the petition review pool;
(G) shall participate in such a proceeding if such request
is granted;
(H) may request reconsideration of a decision of the FISA
Court under section 403(b);
(I) may appeal or seek review of a decision of the FISA
Court, the petition review pool, or the FISA Court of Review,
as permitted by this title; and
(J) shall participate in such appeal or review.
(2) Advocacy.--The Constitutional Advocate shall protect
individual rights by vigorously advocating before the FISA
Court, the petition review pool, or the FISA Court of Review,
as appropriate, in support of legal interpretations that
minimize the scope of surveillance and the extent of data
collection and retention.
(3) Utilization of outside counsel.--The Constitutional
Advocate--
(A) may delegate to a competent outside counsel any duty or
responsibility of the Constitutional Advocate with respect to
participation in a matter before the FISA Court, the FISA
Court of Review, or the Supreme Court of the United States;
and
(B) may not delegate to outside counsel any duty or
authority set out in subparagraph (A), (B), (D), (F), (H), or
(I) of paragraph (1).
(4) Availability of documents and material.--The FISA
Court, the petition review pool, or the FISA Court of Review,
as appropriate, shall order any agency, department, or entity
to make available to the Constitutional Advocate, or
appropriate outside counsel if utilized by the Constitutional
Advocate under paragraph (3), any documents or other material
necessary to carry out the duties described in paragraph (1).
SEC. 403. ADVOCACY BEFORE THE FISA COURT.
(a) Appointment To Participate.--
(1) In general.--The FISA Court may appoint the
Constitutional Advocate to participate in a FISA Court
proceeding.
(2) Standing.--If the Constitutional Advocate is appointed
to participate in a FISA Court proceeding pursuant to
paragraph (1), the Constitutional Advocate shall have
standing as a party before the FISA Court in that proceeding.
(b) Reconsideration of a FISA Court Decision.--
(1) Authority to move for reconsideration.--The
Constitutional Advocate may move the FISA Court to reconsider
any decision of the FISA Court made after the date of the
enactment of this Act by petitioning the FISA Court not later
than 30 days after the date on which all documents and
materials relevant to the decision are made available to the
Constitutional Advocate.
(2) Discretion of the fisa court.--The FISA Court shall
have discretion to grant or deny a motion for reconsideration
made pursuant to paragraph (1).
(c) Amicus Curiae Participation.--
(1) Motion by the constitutional advocate.--The
Constitutional Advocate may file a motion with the FISA Court
to permit and facilitate participation of amicus curiae,
including participation in oral argument if appropriate, in
any proceeding. The FISA Court shall have the discretion to
grant or deny such a motion.
(2) Facilitation by the fisa court.--The FISA Court may,
sua sponte, permit and facilitate participation by amicus
curiae, including participation in oral argument if
appropriate, in proceedings before the FISA Court.
(3) Regulations.--Not later than 180 days after the date of
the enactment of this Act, the FISA Court shall promulgate
rules to provide the public with information sufficient to
allow interested parties to participate as amicus curiae.
SEC. 404. ADVOCACY BEFORE THE PETITION REVIEW POOL.
(a) Authority To Participate.--The petition review pool or
any party to a proceeding before the petition review pool may
authorize the Constitutional Advocate to participate in a
petition review pool proceeding.
(b) Reconsideration of a Petition Review Pool Decision.--
(1) Authority to move for reconsideration.--The
Constitutional Advocate may move the petition review pool to
reconsider any decision of the petition review pool made
after the date of the enactment of this Act by petitioning
the petition review pool not later than 30 days after the
date on which all documents and materials relevant to the
decision are made available to the Constitutional Advocate.
(2) Discretion of the petition review pool.--The petition
review pool shall have discretion to grant or deny a motion
for reconsideration made pursuant to paragraph (1).
(c) Amicus Curiae Participation.--
(1) Motion by the constitutional advocate.--The
Constitutional Advocate may file a motion with the petition
review pool to permit and facilitate participation of amicus
curiae, including participation in oral argument if
appropriate, in any proceeding. The petition review pool
shall have the discretion to grant or deny such a motion.
(2) Facilitation by the fisa court.--The petition review
pool may, sua sponte, permit and facilitate participation by
amicus curiae, including participation in oral argument if
appropriate, in proceedings before the petition review pool.
(3) Regulations.--Not later than 180 days after the date of
the enactment of this Act, the petition review pool shall
promulgate rules to provide the public with information
sufficient to allow interested parties to participate as
amicus curiae.
SEC. 405. APPELLATE REVIEW.
(a) Appeal of FISA Court Decisions.--
(1) Authority to appeal.--The Constitutional Advocate may
appeal any decision of the FISA Court or the petition review
pool issued after the date of the enactment of this Act not
later than 90 days after the date the decision is issued,
unless it would be apparent to all reasonable jurists that
such decision is dictated by statute or by precedent handed
down after such date of enactment.
(2) Standing as appellant.--If the Constitutional Advocate
appeals a decision of the FISA Court or the petition review
pool pursuant to paragraph (1), the Constitutional Advocate
shall have standing as a party before the FISA Court of
Review in such appeal.
(3) Mandatory review.--The FISA Court of Review shall
review any FISA Court or petition review pool decision
appealed by the Constitutional Advocate and issue a decision
in such appeal.
(4) Standard of review.--The standards for a mandatory
review of a FISA Court or petition review pool decision
pursuant to paragraph (3) shall be--
(A) de novo with respect to issues of law; and
(B) clearly erroneous with respect to determination of
facts.
(5) Amicus curiae participation.--
(A) In general.--The FISA Court of Review shall accept
amicus curiae briefs from interested parties in all mandatory
reviews pursuant to paragraph (3) and shall provide for
amicus curiae participation in oral argument if appropriate.
(B) Regulations.--Not later than 180 days after the date of
the enactment of this Act, the FISA Court of Review shall
promulgate rules to provide the public with information
sufficient to allow interested parties to participate as
amicus curiae.
(b) Review of FISA Court of Review Decisions.--
(1) Authority.--The Constitutional Advocate may seek a writ
of certiorari from the Supreme Court of the United States for
review of any decision of the FISA Court of Review.
(2) Standing.--In any proceedings before the Supreme Court
of the United States relating to a petition of certiorari
filed under paragraph (1) and any proceedings in a matter for
which certiorari is granted, the Constitutional Advocate
shall have standing as a party.
SEC. 406. DISCLOSURE.
(a) Requirement To Disclose.--The Attorney General shall
publicly disclose--
(1) all decisions issued by the FISA Court, the petition
review pool, or the FISA Court of Review after July 10, 2003,
that include a significant construction or interpretation of
law;
(2) any decision of the FISA Court or the petition review
pool appealed by the Constitutional Advocate pursuant to this
title; and
(3) any FISA Court of Review decision that is issued after
an appeal by the Constitutional Advocate.
(b) Disclosure Described.--For each disclosure required by
subsection (a) with respect to a decision, the Attorney
General shall make available to the public documents
sufficient--
(1) to identify with particularity each legal question
addressed by the decision and how such question was resolved;
(2) to describe in general terms the context in which the
matter arises;
(3) to describe the construction or interpretation of any
statute, constitutional provision, or other legal authority
relied on by the decision; and
(4) to indicate whether the decision departed from any
prior decision of the FISA Court, the petition review pool,
or the FISA Court of Review.
(c) Documents Described.--The Attorney General shall
satisfy the disclosure requirements in subsection (b) by--
(1) releasing a FISA Court, petition review pool, or FISA
Court of Review decision in its entirety or as redacted;
(2) releasing a summary of a FISA Court, petition review
pool, or FISA Court of Review decision; or
(3) releasing an application made to the FISA Court, a
petition made to the petition review pool, briefs filed
before the FISA Court, the petition review pool, or the FISA
Court of Review, or other materials, in full or as redacted.
(d) Extensive Disclosure.--The Attorney General shall
release as much information regarding the facts and analysis
contained in a decision described in subsection (a) or
documents described in subsection (c) as is consistent with
legitimate national security concerns.
(e) Timing of Disclosure.--
[[Page S3415]]
(1) Decisions issued prior to enactment.--A decision issued
prior to the date of the enactment of this Act that is
required to be disclosed under subsection (a)(1) shall be
disclosed not later than 180 days after the date of the
enactment of this Act.
(2) FISA court and petition review pool decisions.--The
Attorney General shall release FISA Court or petition review
pool decisions appealed by the Constitutional Advocate not
later than 30 days after the date the appeal is filed.
(3) FISA court of review decisions.--The Attorney General
shall release FISA Court of Review decisions appealed by the
Constitutional Advocate not later than 90 days after the date
the appeal is filed.
(f) Petition by the Constitutional Advocate.--
(1) Authority to petition.--The Constitutional Advocate may
petition the FISA Court, the petition review pool, or the
FISA Court of Review to order--
(A) the public disclosure of a decision of such a Court or
review pool, and documents or other material relevant to such
a decision, previously designated as classified information;
or
(B) the release of an unclassified summary of such
decisions and documents.
(2) Contents of petition.--Each petition filed under
paragraph (1) shall contain a detailed declassification
proposal or a summary of the decision and documents that the
Constitutional Advocate proposes to have released publicly.
(3) Role of the attorney general.--
(A) Copy of petition.--The Constitutional Advocate shall
provide to the Attorney General a copy of each petition filed
under paragraph (1).
(B) Opposition.--The Attorney General may oppose a petition
filed under paragraph (1) by submitting any objections in
writing to the FISA Court, the petition review pool, or the
FISA Court of Review, as appropriate, not later than 90 days
after the date such petition was submitted.
(4) Public availability.--Not less than 91 days after
receiving a petition under paragraph (1), and taking into
account any objections from the Attorney General made under
paragraph (3)(B), the FISA Court, the petition review pool,
or the FISA Court of Review, as appropriate, shall declassify
and make readily available to the public any decision,
document, or other material requested in such petition, to
the greatest extent possible, consistent with legitimate
national security considerations.
(5) Effective date.--The Constitutional Advocate may not
file a petition under paragraph (1) until 181 days after the
date of the enactment of this Act, except with respect to a
decision appealed by the Constitutional Advocate.
SEC. 407. ANNUAL REPORT TO CONGRESS.
(a) Requirement for Annual Report.--The Constitutional
Advocate shall submit to Congress an annual report on the
implementation of this title.
(b) Contents.--Each annual report submitted under
subsection (a) shall--
(1) detail the activities of the Office;
(2) provide an assessment of the effectiveness of this
title; and
(3) propose any new legislation to improve the functioning
of the Office or the operation of the FISA Court, the
petition review pool, or the FISA Court of Review.
SEC. 408. PRESERVATION OF RIGHTS.
Nothing in this title shall be construed--
(1) to provide the Attorney General with authority to
prevent the FISA Court, the petition review pool, or the FISA
Court of Review from declassifying decisions or releasing
information pursuant to this title; and
(2) to eliminate the public's ability to secure information
under section 552 of title 5, United States Code (commonly
known as the ``Freedom of Information Act'') or any other
provision of law.
TITLE V--NATIONAL SECURITY LETTER REFORMS
SEC. 501. NATIONAL SECURITY LETTER AUTHORITY.
(a) National Security Letter Authority for Communications
Subscriber Records.--
(1) In general.--Section 2709(b) of title 18, United States
Code, is amended by amending paragraphs (1) and (2) to read
as follows:
``(1) request the name, address, length of service, and
local and long distance toll billing records of a person or
entity if the Director (or the Director's designee) certifies
in writing to the wire or electronic communication service
provider to which the request is made that--
``(A) the name, address, length of service, and toll
billing records sought are relevant to an authorized
investigation to protect against international terrorism or
clandestine intelligence activities, provided that such an
investigation of a United States person is not conducted
solely on the basis of activities protected by the first
amendment to the Constitution of the United States; and
``(B) there are specific and articulable facts showing that
there are reasonable grounds to believe that the name,
address, length of service, and toll billing records sought--
``(i) pertain to a foreign power or agent of a foreign
power;
``(ii) are relevant to the activities of a suspected agent
of a foreign power who is the subject of such authorized
investigation; or
``(iii) pertain to an individual in contact with, or known
to, a suspected agent; and
``(2) request the name, address, and length of service of a
person or entity if the Director (or the Director's designee)
certifies in writing to the wire or electronic communication
service provider to which the request is made that--
``(A) the information sought is relevant to an authorized
investigation to protect against international terrorism or
clandestine intelligence activities, provided that such an
investigation of a United States person is not conducted
solely upon the basis of activities protected by the first
amendment to the Constitution of the United States; and
``(B) there are specific and articulable facts showing that
there are reasonable grounds to believe that the information
sought pertains to--
``(i) a foreign power or agent of a foreign power;
``(ii) the activities of a suspected agent of a foreign
power who is the subject of such authorized investigation; or
``(iii) an individual in contact with, or known to, a
suspected agent.''.
(b) National Security Letter Authority for Certain
Financial Records.--Section 1114 of the Right to Financial
Privacy Act of 1978 (12 U.S.C. 3414) is amended to read as
follows:
``SEC. 1114. NATIONAL SECURITY LETTER FOR CERTAIN FINANCIAL
RECORDS.
``(a) Authorization.--
``(1) In general.--The Director of the Federal Bureau of
Investigation, or a designee of the Director whose rank shall
be no lower than Deputy Assistant Director at Bureau
headquarters or Special Agent in Charge in a Bureau field
office, or the Director of the United States Secret Service
may issue in writing and cause to be served on a financial
institution, a National Security Letter requiring the
production of--
``(A) the name of a customer of the financial institution;
``(B) the address of a customer of the financial
institution;
``(C) the length of time during which a person has been, or
was, a customer of the financial institution (including the
start date) and the type of service provided by the
institution to the customer; and
``(D) any account number or other unique identifier
associated with a customer of the financial institution.
``(2) Limitation.--A National Security Letter issued under
this subsection may not require the production of records or
information not listed in paragraph (1).
``(b) National Security Letter Requirements.--
``(1) In general.--A National Security Letter issued under
subsection (a) shall--
``(A) be subject to the requirements of subsections (b)
through (f) of section 2709 of title 18, United States Code,
in the same manner and to the same extent as those provisions
apply with respect to a request under section 2709(b) of
title 18, United States Code, to a wire or electronic
communication service provider;
``(B)(i) in the case of a National Security Letter issued
by the Director of the Federal Bureau of Investigation or the
Director's designee, include a statement of facts showing
that there are reasonable grounds to believe that the records
or other things sought--
``(I) are relevant to an authorized investigation (other
than a threat assessment) to obtain foreign intelligence
information not concerning a United States person or to
protect against international terrorism or clandestine
intelligence activities; and
``(II) pertain to--
``(aa) a foreign power or an agent of a foreign power;
``(bb) the activities of a suspected agent of a foreign
power who is the subject of such authorized investigation; or
``(cc) an individual in contact with, or known to, a
suspected agent of a foreign power; and
``(ii) in the case of a National Security Letter issued by
the Director of the United States Secret Service, include a
statement of facts showing that there are reasonable grounds
to believe that the records or other things sought are
relevant to the conduct of the protective functions of the
United States Secret Service.
``(2) Reporting.--On a semiannual basis the Director of the
Federal Bureau of Investigation and the Director of the
United States Secret Service shall fully inform the Select
Committee on Intelligence, the Committee on the Judiciary,
and the Committee on Banking, Housing, and Urban Affairs of
the Senate and the Permanent Select Committee on
Intelligence, the Committee on the Judiciary, and the
Committee on Financial Services of the House of
Representatives, concerning all requests made under
subsection (a).
``(3) Definitions.--For purposes of this subsection, the
terms `agent of a foreign power', `international terrorism',
`foreign intelligence information', and `United States
person' have the same meanings as in section 101 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801).
``(c) Definition of `Financial Institution'.--For purposes
of this section (and sections 1115 and 1117, insofar as the
sections relate to the operation of this section), the term
`financial institution' has the same meaning as in
subsections (a)(2) and (c)(1) of section 5312 of title 31,
United States Code, except that the term shall include only a
financial institution any part of which is located inside any
State or territory of the United States, the District of
Columbia, Puerto Rico, Guam, American Samoa, the Commonwealth
of the Northern Mariana Islands, or the United States Virgin
Islands.''.
[[Page S3416]]
(c) National Security Letter Authority for Certain Consumer
Report Records.--
(1) In general.--Section 626 of the Fair Credit Reporting
Act (15 U.S.C. 1681u) is amended--
(A) by striking the section heading and inserting the
following:
``Sec. 626. National Security Letters for certain consumer
report records'';
(B) by striking subsections (a) through (d) and inserting
the following:
``(a) Authorization.--
``(1) In general.--The Director of the Federal Bureau of
Investigation, or a designee of the Director whose rank shall
be no lower than Deputy Assistant Director at Bureau
headquarters or Special Agent in Charge in a Bureau field
office, may issue in writing and cause to be served on a
consumer reporting agency a National Security Letter
requiring the production of--
``(A) the name of a consumer;
``(B) the current and former address of a consumer;
``(C) the current and former places of employment of a
consumer; and
``(D) the name and address of any financial institution (as
that term is defined in section 1101 of the Right to
Financial Privacy Act of 1978 (12 U.S.C. 3401)) at which a
consumer maintains or has maintained an account, to the
extent that the information is in the files of the consumer
reporting agency.
``(2) Limitation.--A National Security Letter issued under
this subsection may not require the production of a consumer
report.
``(b) National Security Letter Requirements.--
``(1) In general.--A National Security Letter issued under
subsection (a) shall--
``(A) be subject to the requirements of subsections (b)
through (f) of section 2709 of title 18, United States Code,
in the same manner and to the same extent as those provisions
apply with respect to a request under section 2709(b) of
title 18, United States Code, to a wire or electronic
communication service provider; and
``(B) include a statement of facts showing that there are
reasonable grounds to believe that the records or other
things sought--
``(i) are relevant to an authorized investigation (other
than a threat assessment) to obtain foreign intelligence
information not concerning a United States person or to
protect against international terrorism or clandestine
intelligence activities; and
``(ii) pertain to--
``(I) a foreign power or an agent of a foreign power;
``(II) the activities of a suspected agent of a foreign
power who is the subject of such authorized investigation; or
``(III) an individual in contact with, or known to, a
suspected agent of a foreign power.
``(2) Reporting.--On a semiannual basis the Director of the
Federal Bureau of Investigation shall fully inform the Select
Committee on Intelligence, the Committee on the Judiciary,
and the Committee on Banking, Housing, and Urban Affairs of
the Senate and the Permanent Select Committee on
Intelligence, the Committee on the Judiciary, and the
Committee on Financial Services of the House of
Representatives, concerning all requests made under
subsection (a).
``(3) Definitions.--For purposes of this subsection, the
terms `agent of a foreign power', `international terrorism',
`foreign intelligence information', and `United States
person' have the same meanings as in section 101 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801).'';
(C) by striking subsections (f) through (h); and
(D) by redesignating subsections (e) and (i) through (m) as
subsections (c) through (h), respectively.
(2) Repeal.--Section 627 of the Fair Credit Reporting Act
(15 U.S.C. 1681v) is repealed.
(d) Technical and Conforming Amendment.--
(1) Table of sections amendment.--The table of sections for
the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.) is
amended by striking the items relating to sections 626 and
627 and inserting the following:
``626. National Security Letters for certain consumer report records.
``627. [Repealed].''.
(2) Conforming amendments.--
(A) Notice requirements.--Section 1109 of the Right to
Financial Privacy Act of 1978 (12 U.S.C. 3409) is amended by
striking subsection (c).
(B) Title 18, united states code.--Title 18, United States
Code, is amended--
(i) in section 1510(e), by striking ``section 626(d)(1) or
627(c)(1) of the Fair Credit Reporting Act (15 U.S.C.
1681u(d)(1) or 1681v(c)(1)), section 1114(a)(3)(A) or
1114(a)(5)(D)(i) of the Right to Financial Privacy Act (12
U.S.C. 3414(a)(3)(A) or 3414(a)(5)(D)(i)),'' and inserting
``section 626 of the Fair Credit Reporting Act (15 U.S.C.
1681u), section 1114 of the Right to Financial Privacy Act of
1978 (12 U.S.C. 3414),''; and
(ii) in section 3511--
(I) by striking ``section 1114(a)(5)(A) of the Right to
Financial Privacy Act,'' each place that term appears and
inserting ``section 1114 of the Right to Financial Privacy
Act of 1978 (12 U.S.C. 3414),''; and
(II) by striking ``or section 627(a)'' each place that term
appears.
(C) National security act of 1947.--Section 507(b) of the
National Security Act of 1947 (50 U.S.C. 3106(b)) is
amended--
(i) in paragraph (2), by striking ``section 626(h)(2) of
the Fair Credit Reporting Act (15 U.S.C. 1681u(h)(2)).'' and
inserting ``section 626(b)(2) of the Fair Credit Reporting
Act (15 U.S.C. 1681u(b)(2)).''; and
(ii) in paragraph (3), by striking ``section 1114(a)(5)(C)
of the Right to Financial Privacy Act of 1978 (12 U.S.C.
3414(a)(5)(C)).'' and inserting ``section 1114(b)(2) of the
Right to Financial Privacy Act of 1978 (12 U.S.C.
3414(b)(2)).''.
(D) USA patriot act.--
(i) Section 118.--Section 118 of the USA PATRIOT
Improvement and Reauthorization Act of 2005 (Public Law 109-
177; 18 U.S.C. 3511 note) is amended--
(I) in subsection (c)(1)--
(aa) in subparagraph (C), by inserting ``and'' at the end;
(bb) in subparagraph (D), by striking ``; and'' and
inserting a period; and
(cc) by striking subparagraph (E); and
(II) in subsection (d)--
(aa) in paragraph (2), by striking ``Section 1114(a)(5)(A)
of the Right to Financial Privacy Act (12 U.S.C.
3414(a)(5)(A))'' and inserting ``Section 1114 of the Right to
Financial Privacy Act of 1978 (12 U.S.C. 3414)''; and
(bb) by striking paragraph (5).
(ii) Section 119.--Section 119(g) of the USA PATRIOT
Improvement and Reauthorization Act of 2005 (Public Law 109-
177; 120 Stat. 219) is amended--
(I) in paragraph (2), by striking ``Section 1114(a)(5)(A)
of the Right to Financial Privacy Act (12 U.S.C.
3414(a)(5)(A))'' and inserting ``Section 1114 of the Right to
Financial Privacy Act of 1978 (12 U.S.C. 3414)''; and
(II) by striking paragraph (5).
SEC. 502. PUBLIC REPORTING ON NATIONAL SECURITY LETTERS.
Section 118(c) of the USA PATRIOT Improvement and
Reauthorization Act of 2005 (Public Law 109-177; 18 U.S.C.
3511 note), as amended by section 501(d)(2)(D)(i), is further
amended--
(1) in paragraph (1)--
(A) in the matter preceding subparagraph (A), by striking
``concerning different United States persons''; and
(B) in subparagraph (A), by striking ``, excluding the
number of requests for subscriber information'';
(2) by redesignating paragraph (2) as paragraph (3); and
(3) by inserting after paragraph (1) the following:
``(2) Content.--
``(A) In general.--Except as provided in subparagraph (B),
each report required under this subsection shall include the
total number of requests described in paragraph (1) requiring
disclosure of information concerning--
``(i) United States persons;
``(ii) persons who are not United States persons;
``(iii) persons who are the subjects of authorized national
security investigations; or
``(iv) persons who are not the subjects of authorized
national security investigations.
``(B) Exception.--With respect to the number of requests
for subscriber information under section 2709 of title 18,
United States Code, a report required under this subsection
need not provide information separated into each of the
categories described in subparagraph (A).''.
TITLE VI--REPORTING FISA ORDERS AND NATIONAL SECURITY LETTERS
SEC. 601. THIRD-PARTY REPORTING OF FISA ORDERS AND NATIONAL
SECURITY LETTERS.
(a) In General.--Each electronic service provider may
report information to the public in accordance with this
section about requests and demands for information made by
any Government entity under a surveillance law, and is exempt
in accordance with subsection (d) from liability with respect
to that report, even if such provider would otherwise be
prohibited by a surveillance law from reporting that
information.
(b) Periodic Aggregate Reports.--An electronic service
provider may report such information not more often than
quarterly and only to the following extent:
(1) Estimate of numbers of demands and requests made.--The
report may reveal an estimate of the number of such demands
and requests made during the period to which the report
pertains.
(2) Estimate of numbers of demands and requests complied
with.--The report may reveal an estimate of the numbers of
such demands and requests the service provider complied with
during the period to which the report pertains, regardless of
when the demands or requests were made.
(3) Estimate of number of users or accounts.--The report
may reveal an estimate of the numbers of users or accounts,
or both, of the service provider, for which information was
demanded, requested, or provided during the period to which
the report pertains.
(c) Special Rules for Reports.--
(1) Level of detail by authorizing surveillance law.--Any
estimate disclosed under this section may be an overall
estimate or broken down by categories of authorizing
surveillance laws or by provisions of authorizing
surveillance laws.
(2) Level of detail by numerical range.--Each estimate
disclosed under this section shall be rounded to the nearest
100. If an estimate is zero, an electronic service provider
may report the estimate as zero.
(3) Report may be broken down by periods not less than
calendar quarters.--For any reporting period, the provider
may break
[[Page S3417]]
down the report by calendar quarters or any other time
periods greater than a calendar quarter.
(d) Limitation on Liability.--An electronic service
provider making a report that the provider reasonably
believes in good faith is authorized by this section is not
criminally or civilly liable in any court for making that
report.
(e) Rule of Construction.--Nothing in this section shall be
construed to prohibit disclosures other than those authorized
by this section.
(f) Definitions.--In this section:
(1) The term ``electronic service provider'' means a
provider of an electronic communications service (as that
term is defined in section 2510 of title 18, United States
Code) or a provider of a remote computing service (as that
term is defined in section 2711 of title 18, United States
Code).
(2) The term ``surveillance law'' means any provision of
any of the following:
(A) The Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1801 et seq.).
(B) Section 802(a) of the National Security Act of 1947 (50
U.S.C. 3162(a)).
(C) Section 2709 of title 18, United States Code.
(D) Section 1114 of the Right to Financial Privacy Act of
1978 (12 U.S.C. 3414).
(E) Subsections (a) or (b) of section 626 of the Fair
Credit Reporting Act (15 U.S.C. 1681u).
SEC. 602. GOVERNMENT REPORTING OF FISA ORDERS.
(a) Electronic Surveillance.--Section 107 of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1807) is
amended--
(1) by redesignating subsections (a) and (b) as paragraphs
(1) and (2), respectively;
(2) in the matter preceding paragraph (1) (as redesignated
by paragraph (1) of this subsection)--
(A) by striking ``In April'' and inserting ``(a) In
April''; and
(B) by striking ``Congress'' and inserting ``the Select
Committee on Intelligence and the Committee on the Judiciary
of the Senate and the Permanent Select Committee on
Intelligence and the Committee on the Judiciary of the House
of Representatives'';
(3) in subsection (a) (as designated by paragraph (2) of
this subsection)--
(A) in paragraph (1) (as redesignated by paragraph (1) of
this subsection), by striking ``and'' at the end;
(B) in paragraph (2) (as so redesignated), by striking the
period at the end and inserting a semicolon; and
(C) by adding at the end the following new paragraphs:
``(3) the total number of individuals who were subject to
electronic surveillance conducted under an order entered
under this title, rounded to the nearest 100; and
``(4) the total number of United States persons who were
subject to electronic surveillance conducted under an order
entered under this title, rounded to the nearest 100.''; and
(4) by adding at the end the following new subsection:
``(b)(1) Each report required under subsection (a) shall be
submitted in unclassified form.
``(2) Not later than 7 days after a report is submitted
under subsection (a), the Attorney General shall make such
report publicly available.''.
(b) Pen Register and Trap and Trace Devices.--Section 406
of the Foreign Intelligence Surveillance Act of 1978 (50
U.S.C. 1846) is amended--
(1) in subsection (b)--
(A) in paragraph (2), by striking ``and'' at the end;
(B) in paragraph (3), by striking the period at the end and
inserting a semicolon; and
(C) by adding at the end the following new paragraphs:
``(4) a good faith estimate of the total number of
individuals whose electronic or wire communications
information was obtained through the use of pen register or
trap and trace devices authorized under an order entered
under this title, rounded to the nearest 100; and
``(5) a good faith estimate of the total number of United
States persons whose electronic or wire communications
information was obtained through the use of a pen register or
trap and trace devices authorized under an order entered
under this title, rounded to the nearest 100.''; and
(2) by adding at the end the following new subsection:
``(c)(1) Each report required under subsection (b) shall be
submitted in unclassified form.
``(2) Not later than 7 days after a report is submitted
under subsection (b), the Attorney General shall make such
report publicly available.''.
(c) Access to Certain Business Records.--Section 502 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1862) is amended--
(1) in subsection (b)(3), by adding at the end the
following new subparagraphs:
``(F) Records concerning electronic communications.
``(G) Records concerning wire communications.''; and
(2) in subsection (c)--
(A) in paragraph (1)--
(i) in subparagraph (A), by striking ``and'' at the end;
(ii) in subparagraph (B), by striking the period at the end
and inserting a semicolon; and
(iii) by adding at the end the following new subparagraphs:
``(C) a good faith estimate of the total number of
individuals whose tangible things were produced under an
order entered under section 501, rounded to the nearest 100;
and
``(D) a good faith estimate of the total number of United
States persons whose tangible things were produced under an
order entered under section 501, rounded to the nearest
100.''; and
(B) by adding at the end the following new paragraph:
``(3) Not later than 7 days after the date on which a
report is submitted under paragraph (1), the Attorney General
shall make such report publicly available.''.
(d) Additional Procedures Regarding Certain Persons Outside
the United States.--Section 707 of the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1881f) is amended by
adding at the end the following new subsection:
``(c) Additional Annual Report.--
``(1) Report required.--In April of each year, the Attorney
General shall submit to the congressional intelligence
committees and the Committees on the Judiciary of the House
of Representatives and the Senate a report setting forth with
respect to the preceding year--
``(A) the total number of--
``(i) directives issued under section 702;
``(ii) orders granted under section 703; and
``(iii) orders granted under section 704;
``(B) good faith estimates of the total number of
individuals, rounded to the nearest 100, whose electronic or
wire communications or communications records were collected
pursuant to--
``(i) an order granted under section 703; and
``(ii) an order granted under section 704; and
``(C) good faith estimates of the total number, rounded to
the nearest 100, of United States persons whose electronic or
wire communications or communications records were collected
pursuant to--
``(i) an order granted under section 703; and
``(ii) an order granted under section 704.
``(2) Form.--Each report required under paragraph (1) shall
be submitted in unclassified form.
``(3) Public availability.--Not later than 7 days after the
date on which a report is submitted under paragraph (1), the
Attorney General shall make such report publicly
available.''.
TITLE VII--OTHER MATTERS
SEC. 701. PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD
SUBPOENA AUTHORITY.
Section 1061(g) of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee(g)) is amended--
(1) in paragraph (1)(D), by striking ``submit a written
request to the Attorney General of the United States that the
Attorney General'';
(2) by striking paragraph (2); and
(3) by redesignating paragraphs (3) and (4) as paragraphs
(2) and (3).
SEC. 702. SCOPE OF LIABILITY PROTECTION FOR PROVIDING
ASSISTANCE TO THE GOVERNMENT.
Section 802 of the Foreign Intelligence Surveillance Act of
1978 (50 U.S.C. 1885a) is amended--
(1) in subsection (a), in the matter preceding paragraph
(1), by inserting ``and except as provided in subsection
(j),'' after ``law,''; and
(2) by adding at the end the following:
``(j) Violation of User Agreements.--Subsection (a) shall
not apply to assistance provided by a person if the provision
of assistance violates a user agreement, including any
privacy policy associated with the user agreement, in effect
at the time the assistance is provided between the person and
the person relating to whom the assistance was provided.''.
______