[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3253-S3255]
TRADE BILL AND BULK DATA PROGRAM
Mr. McCONNELL. Madam President, I am glad the Senate voted yesterday
to take another step forward on the important trade legislation that is
before us. This bill represents an opportunity for Republicans and
Democrats to stand together for the middle class, so I hope our friends
across the aisle will allow us to seize this opportunity. I am
optimistic. We all know that trade is important for American workers
and American jobs. We all know that by passing this legislation, we can
show we are serious about advancing new opportunities for bigger
American paychecks, better American jobs, and a stronger American
economy.
We want to process as many amendments as we can. The Republican and
Democratic bill managers, Senator Hatch and Senator Wyden, have done a
great job managing this bill in a bipartisan spirit thus far. My hope
is that, with some cooperation from across the aisle, we can vote on
some amendments today and complete our work on this trade legislation
today.
I appreciate all the hard work from both sides that got us to the
point we are today. Let's keep the momentum going so we can finally
pass a bill that Republicans, President Obama, and many Democrats all
agree is good for the middle class, good for the economy, and good for
our country.
Let's also move forward in the same spirit to finish our work on the
other two important issues on the Senate's to-do list. I will speak
about one of them in a moment. But the point is, we have to get our
work done, however long it takes. With bipartisan cooperation, we can
get it done as soon as this afternoon.
On the issue I mentioned, following the attacks of September 11, the
United States improved its laws and legal authorities in an effort to
better understand the terrorist threat and, rather than treat it as a
crime to be handled by civilian prosecution, to combat it as a matter
of warfare--not as a crime but as a matter of warfare. But that does
not mean Al Qaeda and its affiliates stood still. The terrorist threat
metastasized under regional affiliates such as Al Qaeda in the Arabian
Peninsula, al-Shabaab, Al Qaeda in Iraq, and AQIM.
We have all seen the advance of the Islamic State in Iraq and the
Levant, which, despite coalition air attacks and Iraqi military ground
operations, actually seized Ramadi last weekend. Although ISIL has
broken from core Al Qaeda, it is emblematic of how the threat continues
to evolve.
Last week, the Director of the FBI explained how ISIL, operating from
safe havens within Syria, is now using social media to radicalize
Americans by making contact through Twitter and then directing them to
encrypted venues. Moreover, through the publication of online
magazines, Al Qaeda and ISIL are able to radicalize recruits and reveal
the tactics needed for small-scale attacks here at home. These tactics,
along with the information gained by terrorist networks from the
unlawful disclosure of classified information by Edward Snowden,
challenge counterterrorism officials in their efforts to detect
terrorist plots and terrorist communications.
This all comes at a moment of elevated threats to the American
people.
Let me read something the L.A. Times recently reported. This is what
the Times had to say:
Alarmed about the growing threat from Islamic State, the
Obama administration has dramatically stepped up warnings of
potential terrorist attacks on American soil after several
years of relative calm.
Behind the scenes, U.S. authorities have raised defenses at
U.S. military bases, put local police forces on alert and
increased surveillance at the nation's airports, railroads,
shopping malls, energy plants and other potential targets.
Driving the unease are FBI arrests of at least 30 Americans
on terrorism-related charges this year in an array of ``lone
wolf'' plots, none successful, but
[[Page S3254]]
nearly all purportedly inspired by Islamic State propaganda
or appeals.
I ask unanimous consent to have the article printed in the Record at
the conclusion of my remarks.
We need to recognize that terrorist tactics and the nature of the
threat have changed and that at a moment of elevated threat, it would
be a mistake to take from our intelligence community any--any--of the
valuable tools needed to build a complete picture of terrorist networks
and their plans, such as the bulk data collection program of section
215. The intelligence community needs these tools to protect us from
these attacks.
I would like to quote the observations that someone intimately
familiar with this program made in the aftermath of the unauthorized
leaks of classified material by Edward Snowden.
``This program does not involve the content of phone calls or the
names of people making calls,'' he said. ``Instead, it provides a
record of phone numbers and the times and lengths of calls, metadata
that can be queried if and when we have a reasonable suspicion that a
particular number is linked to a terrorist organization.''
He then described why the program was necessary.
``The program grew out of a desire to address a gap identified after
9/11,'' he said.
One of the 9/11 hijackers, Khalid A. Mihdhar, made a phone
call from San Diego to a known Al Qaeda safe house in Yemen.
NSA saw that call, but it could not see that the call was
coming from an individual already in the United States. The
telephone metadata program under Section 215 was designed to
map the communications of terrorists, so we can see who they
may be in contact with as quickly as possible.
Let me say that again: ``as quickly as possible.''
This capability could also prove valuable in a crisis. For
example, if a bomb goes off in one of our cities and law
enforcement is racing to determine whether a network is
poised to conduct additional attacks, time is of the essence.
Being able to quickly review telephone connections to assess
whether a network exists is critical to that effort.
He concluded by noting this:
The Review Group turned up no indication that this database
has been intentionally abused.
``[N]o indication that this database has been intentionally abused.''
And I believe it is important that the capability that this
program is designed to meet is preserved.
The person who made those observations I just quoted was President
Obama, and he made them just last year--just last year.
Unfortunately, there is now a huge gap between the capabilities the
President rightly recognized as being necessary for our intelligence
professionals and the legislation he is endorsing today. The untried--
and as of yet, nonexistent--bulk collection system envisioned under
that bill would be slower and more cumbersome than the one that
currently helps keep us safe. At worst, it might not work at all due
to, among many other problems, the lack of a requirement for
telecommunications providers to retain the data to begin with--no
requirement to retain the data.
Last week, the Obama administration briefed Senators on the current
bulk data program under section 215. Senators were impressed with the
safeguards built into the current program, and they were impressed that
there had not been one incident--not one--of abuse of the program. But
many Senators were disturbed by the administration's inability to
answer basic, yet critical, questions about the alternate bulk data
system that would be set up at some point--at some point--under the
legislation the administration now supports. The administration could
not guarantee whether a new system would work as well as the current
system, and the administration could not guarantee whether there would
be much, if any, data available to be analyzed under a new system given
the lack of a data-retention requirement in the legislation.
Despite what the administration told us just last week about its
inability to guarantee that this nonexistent system could even be built
in time, it did an about-face earlier this week--sort of. The
administration had the Director of NSA write that the nonexistent
system could be built in time if--if--the providers cooperated in
building it. And, of course, they are not required to.
The problem, of course, is that the providers have made it abundantly
clear that they will not commit to retaining the data for any period of
time as contemplated by the House-passed bill unless they are legally
required to do so. There is no such requirement in the bill. For
example, one provider said the following: ``[We are] not prepared to
commit to voluntarily retain documents for any particular period of
time pursuant to the proposed USA FREEDOM Act if not otherwise required
by law.''
Far from addressing the concerns many have had about the USA FREEDOM
Act, the administration in its letter only underscored the problem. It
said the only way this nonexistent system could even be built in time
is if the providers cooperate. But the providers have made it
abundantly clear they will not cooperate, and there is nothing--
absolutely nothing--in the bill that would require them to do so.
This is just as cynical as the letter from the Attorney General and
the Director of National Intelligence that assured us they would let us
know about any problems after the current program was replaced with a
nonexistent system. Let me say that again. This is just as cynical as
the letter from the Attorney General and the Director of National
Intelligence that assured us they would let us know about any problems
after the current program was replaced with a nonexistent system. Boy,
that is reassuring.
This is beyond troubling. We should not establish an alternate system
that contains a glaring hole in its ability to function--namely, the
complete absence of any requirement for data retention.
I have begun the legislative process to advance a 60-day extension of
section 215 and the other two authorities that will expire soon. This
extension will allow for the Intelligence Committee to continue its
efforts to produce a compromise bill we can send to the House that does
not destroy an important counterterrorism tool that is needed to
protect American lives.
There being no objection, the material was ordered to be printed in
the Record, as follows:
[From the Los Angeles Times, May 19, 2015]
White House Steps Up Warnings About Terrorism on U.S. Soil
(By Brian Bennett)
Alarmed about the growing threat from Islamic State, the
Obama administration has dramatically stepped up warnings of
potential terrorist attacks on American soil after several
years of relative calm.
Behind the scenes, U.S. authorities have raised defenses at
U.S. military bases, put local police forces on alert and
increased surveillance at the nation's airports, railroads,
shopping malls, energy plants and other potential targets.
Driving the unease are FBI arrests of at least 30 Americans
on terrorism-related charges this year in an array of ``lone
wolf'' plots, none successful, but nearly all purportedly
inspired by Islamic State propaganda or appeals.
The group's leader, Abu Bakr Baghdadi, drove home the
danger in a 34-minute audio recording released online
Thursday. He urged Muslims everywhere to ``migrate to the
Islamic State or fight in his land, wherever that may be.''
The audio was released with translations in English,
French, German, Russian and Turkish, signaling the militants'
increasingly ambitious attempts to draw new recruits--and to
spark violence--around the world.
U.S. officials estimate the Sunni Muslim group has drawn
22,000 foreign fighters to Syria and Iraq, including about
3,700 from Western nations. About 180 Americans have gone, or
tried to go.
U.S. counter-terrorism officials initially viewed Islamic
State as primarily a regional security threat, focused on
expanding and protecting its self-proclaimed Islamist
caliphate in Syria and Iraq, rather than launching attacks
abroad.
But the analysis has shifted sharply as gunmen inspired by
the group, but not controlled or assisted by them, opened
fire at the Parliament in Ottawa; at a cafe in Sydney,
Australia; at a kosher grocery in Paris; and, on May 3, in
Garland, Texas.
In the Texas case, two would-be terrorists apparently
prompted by Islamic State social media messages tried to
shoot their way into a provocative contest for caricatures of
the prophet Muhammad. Both gunmen were shot to death, and no
one else was killed. Islamic State later claimed
responsibility for the assault, the first time it has done so
for an attack on U.S. soil.
James B. Comey, the FBI director, warned this month that
``hundreds, maybe thousands'' of Americans are seeing
recruitment pitches from Islamic State on Facebook, Twitter
and other social media, as well as messages sent to
smartphones of ``disturbed
[[Page S3255]]
people'' who could be pushed to attack U.S. targets.
``It's like the devil sitting on their shoulders saying,
`Kill, kill, kill,' '' Comey told reporters.
The United States has entered a ``new phase, in my view, in
the global terrorist threat,'' Jeh Johnson, director of
Homeland Security, said Friday on MSNBC.
``We have to be concerned about the independent actor, and
the independent actor who is here in the homeland who may
strike with little or no warning,'' he said. ``The nature of
the global terrorist threat has evolved.''
That poses a special challenge for U.S. intelligence and
law enforcement agencies, which spent years desperately
trying to penetrate and understand Al Qaeda's rigid hierarchy
and top-down approach to terrorism.
Now they are struggling to detect and prevent lethal
attacks by individuals--such as the April 2013 bombing of the
Boston Marathon by two Russian-born brothers--with little or
no outside communication or support.
The administration has sought to stiffen homeland defenses,
and intelligence gathering, in response.
This month, U.S. Northern Command boosted security at all
bases in the United States. Officials cited the May 3
shooting in Texas, specific threats against military
personnel and the increasing number of Americans
communicating with Islamic State supporters.
In March, a group calling itself ``Islamic State Hacking
Division'' posted online the names, home addresses and photos
of 100 U.S. troops. The group wrote on Twitter that it was
posting the apparent hit list ``so that our brothers residing
in America can deal with you.''
More armed guards have been deployed at federal buildings
across the country, and Homeland Security officials have
quietly urged more security at privately run facilities and
infrastructure that could be targeted, including shopping
malls, railroads, water treatment facilities and nuclear
power generators.
``Since last summer we have ramped up security at federal
installations across the country, and we have increased our
outreach with critical infrastructure operators,'' a senior
Homeland Security official said in an interview.
Authorities have urged companies to conduct more ``active
shooter'' drills to ``heighten awareness and make sure people
are leaning forward with security protocols,'' he said. The
official was not authorized to publicly discuss internal
communications and security measures.
Defeating Islamic State will take not only the ongoing
military operations in Iraq and Syria, U.S. officials said,
but stronger international efforts to block foreign recruits
from joining and to cut the group's financing networks.
Officials acknowledge they also need better messaging to
counter a barrage of polished videos, social media and
Internet appeals from the militants.
``It's a long-term challenge,'' Brett McGurk, deputy
assistant secretary of State for Near Eastern affairs, told
CNN. ``We have not seen this before. And it's going to take a
very long time to defeat them.''
Still, attacking Western targets is not the group's top
priority, as it was for Osama bin Laden, according to Seth
Jones, a former U.S. counter-terrorism official now with Rand
Corp., the Santa Monica-based think tank. The group is far
more focused on the battleground in Iraq and Syria, and
establishing ties to terrorist groups in Libya, Yemen,
Algeria and elsewhere.
Without a strong hand to help direct and organize attacks
abroad, they are ``likely to be less sophisticated,'' Jones
said. ``You actually need a lot of training to conduct a
Madrid-style attack or a London-style attack. Those kinds of
bombs are hard to put together.''
Most of the 30 Americans arrested this year were suspected
of aiding or trying to join Islamic State. Many were
approached on social media or on chat programs designed for
cellphones.
In March, for example, a 22-year-old Army National Guard
specialist was arrested at Chicago Midway International
Airport as he allegedly attempted to join Islamic State in
Syria. The FBI said he had downloaded military training
manuals to take with him and told an undercover agent he was
prepared to ``bring the flames of war'' to the United States.
That same month, a retired Air Force avionics instrument
specialist was indicted in Brooklyn, N.Y., on suspicion of
trying to travel to Syria to join the group. Prosecutors in
Brooklyn also have charged three other men with seeking to
link up with the militants.
And on Thursday, the FBI arrested a former interpreter for
the U.S. military in Iraq, now a naturalized American
citizen, who had tried to travel to Syria from Texas. In June
he had used Twitter to ``pledge obedience'' to Islamic State.
``As a numbers game, it is pretty easy for ISIS to reach
out to a very large number of people using a very robust
social media presence,'' said J.M. Berger, a nonresident
fellow at the Brookings Institution, using a common acronym
for Islamic State.
``I suspect we should see more plots going forward,'' he
added.
____________________
[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3274-S3289]
USA FREEDOM Act
Mr. LEAHY. Mr. President, I have been having a lot of people ask me
where we are on the USA Freedom Act of 2015, and we actually have a
very interesting, easy choice: We can either pass the bipartisan bill
the House of Representatives passed with a majority of Republicans and
a majority of Democrats voting for it, or we can let the expiring
provisions of the USA PATRIOT Act sunset at the end of the month. Some
may prefer that. I think the House made a number of improvements which
protect our freedoms and protect our security, and that is what we
ought to pass.
Some people have talked about short-term extensions. Well, we could
have a 2-day extension or we could have a 5,000-year extension; we
would be extending something that doesn't exist. The fact is that the
House gave us the USA FREEDOM Act in plenty of time to act upon it, to
amend it if we wanted to, to send it back and go to a conference. But
now the House has adjourned and gone on recess. If we don't vote for
their bill, we will end up at the end of the month with nothing. There
will be nothing to extend. We could feel good about passing an
extension, but we can't extend something that is dead.
I have worked for more than two years with Members of Congress from
both parties and in both Chambers to develop the USA FREEDOM Act of
2015. It is a commonsense, balanced reform bill that protects
Americans' privacy, while also ensuring our national security.
The bill doesn't go nearly as far as the bill I first introduced in
October of 2013 with Congressman Sensenbrenner. It doesn't go as far as
the USA FREEDOM Act that was filibustered last November by Senator
McConnell and others. At that time, the incoming majority leader wanted
to wait and see how it would be with a Republican majority and was able
to rally his Members to delay reform. But we shouldn't delay it any
further. Americans deserve to have their privacy restored and their
national security protected. There should be no more excuses.
In the bill Senator Lee and I have introduced and supported, the USA
FREEDOM Act of 2015--it has not just our support, it has the
administration's support, it has the support of the Director of
National Intelligence, the Attorney General, the FBI Director, a
supermajority of the House of Representatives, the technology industry,
privacy and civil liberties groups, librarians, and the NRA. I mean,
when are we ever going to find all these groups coming together? Well,
they came together because they know the USA FREEDOM Act is a good
bill, and the support for our bill continues to grow.
Just yesterday, national security experts at the conservative
Heritage Foundation concluded that the USA FREEDOM Act ``strikes a
balance between maintaining our national security capabilities and
protecting privacy and civil liberties.'' Why? Because it is a
reasonable and responsible bill. When we get the civil liberties
groups, the NRA, the Heritage Foundation and privacy groups together,
we have something.
I have been here 41 years. I have seen very few pieces of legislation
where these diverse groups come together, and they did because the USA
FREEDOM Act is a responsible and reasonable bill. But even if they
hadn't come together, it is the only option left for any Senator who
wants to avoid a sunset of the surveillance authorities at midnight on
May 31. We won't be in session. The other body won't be in session. The
one thing that will happen is our current authorities will sunset. They
will go away. Wow. Can't you hear the cheers from some of our enemies?
Last year when the current Senate majority leader led the filibuster
of the USA FREEDOM Act, we were told that the Senate needed more time
to consider the issue and that the new Senate would take up the matter
under new leadership. All right. We have known the sunsets were coming
for years. That is why I brought up the bill last year. There has been
nothing done on this urgent matter this year--no public hearings and no
committee markups, unlike the six public hearings I held in the
Judiciary Committee last year.
In contrast, the House leadership has acted responsibly and
decisively. They moved the USA FREEDOM Act of 2015 through the
Judiciary Committee and passed this bipartisan bill overwhelmingly.
We had significant debate on this issue this week. I have heard
Senators across the political spectrum who have spoken at length on the
Senate floor about their views. Most of these Senators have urged us to
reform the government's bulk collection program--which is, of course,
the same way the vast majority of Americans feel. But there have also
been voices urging more surveillance. We have heard the familiar fear-
mongering and demands for a data-retention mandate on the private
telecom companies. Well, I disagree with those Senators who voiced that
perspective, but they have at least been heard.
Unfortunately, the clock has been running. The House worked very
hard, they completed their work, and they left. They are not coming
back until after the surveillance authorities are set to expire. And
the House leadership has made clear that they will not pass an
extension. Even if they were in session and we passed an extension,
they made it very clear to Republican and Democratic leadership that
they will not take it up.
So here is the choice. It is a very simple one. We can let the three
provisions at issue expire--some may like that; frankly, I don't--or we
can pass the bipartisan and bicameral USA FREEDOM Act of 2015.
We all know that the NSA has for years been using section 215 of the
USA PATRIOT Act to sweep up phone
[[Page S3275]]
records of innocent Americans without any connection to terrorism. I am
sure innocent Americans who may be in the Chamber or who are hearing
what we are saying have had their phone records swept up. Well, I don't
think anybody would feel very comfortable with that.
We also know that the NSA used a similar legal theory for years to
collect massive amounts of metadata related to billions of emails sent
to and from innocent Americans--a parent to a child asking, ``how is my
granddaughter's cold coming along?'' or ``How did my grandson do in
school?'' or somebody writing to a friend, back and forth.
The American people oppose this indiscriminate dragnet collection of
their records--not only that, the courts do, too. They found it to be
unlawful. The House of Representatives listened to the American people,
they listened to the courts, and they voted overwhelmingly to end this
program through the USA FREEDOM Act and assumed, of course, that the
Senate would do what the courts have said and what the vast majority of
the American people said.
Last November, when Senator McConnell convinced his caucus to block
the USA FREEDOM Act, I warned that we would not have much time in the
new Congress, and that the American people were demanding action.
People should go back and see the number of letters and emails that
came pouring in to the Capitol saying: We want this passed. Yet, here
we are--Congress racing against the clock to act before the sunsets
take effect next weekend.
Well, this is a manufactured crisis. I think there are some who hope
that enough Senators will be scared by the prospect of these
authorities expiring that they will blindly vote in favor of a clean
extension even though that will go nowhere. We have all seen this movie
before. We know that opponents of the USA FREEDOM Act simply want to
delay again. Well, I don't frighten.
Many Americans, especially my constituents, are wondering what
opponents of the USA FREEDOM Act have been doing for the past six
months? They are rapidly approaching a sunset that has been on the
books for years--the original sunset provision written by myself and
Republican leader Dick Armey. It is not as though this deadline
suddenly snuck up on the leadership or the chairman of the Intelligence
Committee, who is just now considering alternative proposals.
Remember, we are just a few days away from the expiration date. But
despite this urgency and the extensive debate we have been having for
many months, the only bill that has been filed by the opponents of the
USA FREEDOM Act is a 2-month rubberstamp of the USA PATRIOT Act
provisions--a bill the Senate sponsors know cannot pass the House even
if they were in session. And because they are not in session, if we
were to pass it here, it would become a ``nothingburger'' because there
would be no law to extend.
I read in the press that there may be an alternative proposal in the
works. It may include a provision to keep the bulk collection program
in place for more than two years. But even if we could legally pass
that, it is entirely unnecessary.
Just this week, the NSA Director stated in a letter to Leaders
McConnell and Reid that the NSA only needs 180 days to transition to
the new targeted program established by the USA FREEDOM Act. Not 2
years. The 180-day transition has been part of the USA FREEDOM Act for
more than a year. And during all the negotiations about the bill,
neither the NSA nor the intelligence community ever raised a concern
with me about this provision. In fact, we have on the record that they
support it.
I ask unanimous consent to have printed in the Record a copy of the
May 20 letter from Admiral Rogers, the head of NSA.
There being no objection, the material was ordered to be printed in
the Record, as follows:
National Security Agency
Fort George G. Meade, MD, May 20 2015.
Hon. Mitch McConnell,
Majority Leader, U.S. Senate,
Washington, DC.
Hon. Harry Reid,
Minority Leader, U.S. Senate,
Washington, DC.
Dear Senators McConnell and Reid: The USA Freedom Act would
establish a 180-day period for transitioning from the current
bulk-collection program for telephone metadata to a model
where queries would be carried out against business records
held by telephone service providers. Several questions have
been raised about the feasibility of the 180-day deadline.
Should the USA Freedom Act of 2015 become law, NSA assesses
that the transition of the program to a query at the provider
model is achievable within 180 days, with provider
cooperation. We base this judgment on the analysis that we
have undertaken on how to make this model work. Upon passage
of the law, we will work with the companies that are expected
to be subject to Orders under the law by providing them the
technical details, guidance, and compensation to create a
fully operational query at the provider model. We are aware
of no technical or security reasons why this cannot be tested
and brought on line within the 180-day period.
We very much appreciate the time and attention the Senate
continues to devote to this important issue.
Michael S. Rogers,
Admiral, U.S. Navy, Director,
National Security Agency.
Mr. LEAHY. We all know this last-ditch attempt at further delay is
just too late. We have two options: Pass the USA FREEDOM Act or let the
provisions expire. A growing majority of the Senate--a straight up-or-
down vote--supports the USA FREEDOM Act. If we pass it today, the
President can sign it today or tomorrow.
Also, the intelligence community says: Is the law going to be here or
is the law gone? By passing the USA FREEDOM Act, they can move forward
with the certainty they need to protect the American people.
Senator Lee and I, along with a bipartisan group of Senators ranging
from Senator Durbin, to Senator Heller, to Senator Schumer, to Senator
Cruz--and that is going across the political spectrum--are moving for a
responsible path forward.
We have worked for 2 years on this bill to end the NSA bulk
collection of Americans' phone records. Republicans and Democrats have
worked together for 2 years to end the NSA's bulk collection of
Americans' phone records, something that every one of us, at a townhall
meeting--I do not care what State you are in, if you ask Americans ``Do
you want a bulk collection of all your phone records?'' you know what
the answer would be: ``Of course not.''
The clock has run out, but there is a responsible choice before us.
Let's pass the USA FREEDOM Act today. Then we will have important
reforms, we will keep America secure, and we will not have all of these
authorities expire.
Mr. President, I see other Senators on the floor.
I yield the floor.
The PRESIDING OFFICER. The Senator from Montana.
Mr. TESTER. Mr. President, I ask unanimous consent for Senator Daines
and I to speak as in morning business.
The PRESIDING OFFICER. Without objection, it is so ordered.
[...]
Mr. SANDERS. [...]
USA PATRIOT Act
Mr. President, there is another issue I wish to very briefly touch on
as well today. That issue deals with the USA PATRIOT Act and FISA and
civil liberties in this country. Let me make a few basic points.
There is nobody in the Senate, there is nobody in the House who does
not understand that there are terrorist groups out there that want to
attack the United States of America and our allies and that want to do
us harm. There is nobody in the Senate or in the House or, I think, in
the United States of America who does not believe that as a nation we
have to do everything we can to protect the people of our country from
terrorist attacks. There is no debate on that. What the debate is about
is how we protect the American people without undermining the
Constitution of the United States of America or undermining the privacy
rights of the American people.
I think everybody does understand and should understand that modern
technology in all of its forms--from iPhones to a dozen or 100
different ways--has greatly outstripped public policy in terms of
protecting privacy rights. By and large, the privacy rights we have on
the books now were written years and years before the development of
the technologies we see right now.
It is absolutely imperative that as a nation we begin a serious
conversation, which includes some of the most knowledgeable people in
this country--people who know about what technology can do today and
what it can do tomorrow, people who are concerned about civil liberties
and privacy rights, our law enforcement officials, our national
security people, and Members of Congress. What that discussion should
be about is pretty simple: How do we protect our country against
terrorism at the same time that we protect our privacy rights and our
constitutional freedoms.
As we consider whether to reauthorize parts of the PATRIOT Act, we
must take stock of where we are today. It is no secret that NSA
collects vast sums of information and at one point or another has
collected information on virtually every person in this country who
uses a telephone. That is no great secret. Since June 2013, we have
learned that the NSA collects phone call metadata, including the
numbers of both parties, location, time, and duration. They collect
text messages, email chat, and Internet browsing history; smart phone
app data, including Google Maps, which can pinpoint a person's location
to within a few yards. They collect maps of people's social networks,
bank and credit card transactions. This is just the tip of the iceberg.
There is undoubtedly much more being done that we simply don't know
anything about.
Further, local governments and other agencies are also collecting
information about the movements and the habits of law-abiding
Americans. When we drive down the street, there are cameras that can
take pictures of license plates. There are cameras on street corners,
cameras in private buildings. The government knows where we are
traveling and how long we are gone. Let's be clear. While today we are
focusing appropriately on the role of the Federal Government in issues
of civil liberties, we must also understand that
[[Page S3279]]
it is not just the government that is collecting information on law-
abiding Americans. In fact, the private sector's collection of
information is just as intrusive and equally dangerous. Private
companies, private corporations know a whole lot about what we do. Our
every move can be tracked by a smart phone. Almost two-thirds of the
American people, by the way, have smart phones.
Private companies can know what we read, what we are emailing about,
what Web sites we visit. They know when we have purchased a ticket, and
they know where that trip is taking us. They know whether we are going
on a plane or a train or a bus. When we go to a grocery store, our
discount card gets scanned and the grocery store knows exactly what we
are eating. It is the same situation at the pharmacy. They know what
kind of medicine we are buying, enabling people to make judgments about
one's health. They know when a woman is pregnant based on her
purchases. In the name of fitness, people are wearing watches and
Fitbits that record our heart rate and exercise pattern and how much we
sleep.
In the wrong hands, this information could prevent us from getting
health insurance through our jobs. It could even prevent us from
getting hired in the first place. In other words, enormous, enormous,
undreamed of amounts of information are out there and, in the wrong
hands, that could be a real danger to our country and to the lives of
millions of innocent people.
This is what the attack on privacy looks like. Someone can access our
phone calls. They can access our credit card records. They can comb
through our purchases. They can analyze our spending habits. They can
access our emails and our contacts. They can track our movements.
Pretty much anything and everything we do these days can be tracked and
recorded.
Now, many of my colleagues come to the floor of the Senate and talk
about America being a free country. Well, if somebody knows everything
we are doing, maybe it is time to recognize that we are not quite as
free as we think we are. I know that in response to the argument I am
raising, people will say: Well, trust these large corporations; trust
the government. They are honest people. By and large, many of them are.
I am not suggesting otherwise.
In terms of government policy, however, let us not forget that 45
years ago we had a President of the United States named Richard Nixon.
And what Richard Nixon believed was that anything the President of the
United States did, by definition, was legal. The President can break
into his or her opponent's political headquarters--not a problem. He is
the President. He can spy on people--not a problem. He is the
President.
So I ask my colleagues and the American people--and I do not suggest
for one second that this is true of the Obama administration. But I ask
the American people to think about what happens in the future if we
have a President who really does believe that he or she is the law,
that he or she can or should have access to the kinds of information
that are out there. Think about the incredible power the administration
has, the potential for blackmail, the political advantages that
administration has.
People say: Well, it is a pretty crazy idea. It is never going to
happen.
Well, a lot of things have happened that we never thought could
happen.
It seems to me that now is the time for us as a nation, for us as
elected officials to have a very important conversation about how we
balance our need--of which there is no debate--to protect the American
people against terrorist attacks while at the same time we respect the
privacy rights and the constitutional rights of our people and how we
maintain America as a free and open society.
I got involved in this issue a number of years ago when I voted
against the USA PATRIOT Act. I remember some librarians in the State of
Vermont came to me and they said: You know, as a result of section 215
of the USA PATRIOT Act, law enforcement officials--the FBI can come to
a librarian and demand that the librarian provide information about the
books people are borrowing from the library.
Of course, section 215 goes a lot further than that.
Do we want to be a nation in which we are looking over our shoulders
and worrying about the books we are reading because somebody may say:
Oh, well, you are reading a book about Osama bin Laden; clearly, you
must be a terrorist. Is that really the kind of fear we want to see
established in this country?
So I say to my colleagues, it is great to come to the floor and talk
about freedom, but what freedom is about ultimately is the right of
people to do what they want to do in a law-abiding way without harming
other people. That is called freedom. In my view, people have a right
to make a telephone call today without that information being collected
by the government. People have a right to go on the Internet and send
an email with the absolute assurance that as law-abiding citizens their
visits to a Web site or the emails they send will not be tracked by the
government. People have a right to go to a grocery store and make
purchases without somebody knowing what they are buying.
I intend to introduce legislation shortly which will call for a
comprehensive review of data collection by public and private entities
and the impact that data is having on the American people. I don't know
if this is a progressive piece of legislation or a conservative piece
of legislation, but I would hope this concept would have broad support
across the political spectrum from people who actually do believe in a
free society, that our young people should not be worried about the
kinds of books they read or the Web sites they visit.
We must bring together leaders in the technology world, people who
not only know what technology today is doing as far as invading our
privacy rights but what the future holds, because I am quite certain
that every single day, this technology is growing more and more
sophisticated and more and more intrusive, and sitting down with people
who are experts on technology--we have to have civil libertarians,
people who understand what the First Amendment is, what the Fourth
Amendment is, what our Bill of Rights is about, what our Constitution
is about, and, of course, involved in that discussion must be law
enforcement and our security experts. The goal of all of this must be
to create legislation which does everything we can to protect the
safety of the American people but also protects our privacy rights and
our constitutional rights.
I look forward to working with my colleagues on both sides of the
aisle on that legislation.
With that, I yield the floor.
[...]
The PATRIOT Act
Mr. SESSIONS. Mr. President, we will be talking about the PATRIOT Act
and the USA FREEDOM Act that has been offered, and I think it is an
important issue. I believe the PATRIOT Act provides critical tools that
have helped protect America, and I believe it does so without any
infringement on constitutional rights.
Some say we have to compromise rights or balance rights against the
threats. Maybe sometimes we have to do that. But when we wrote the
PATRIOT Act in the Judiciary Committee--of which I am a member, Senator
Leahy is a strong libertarian, Senator Hatch is a strong libertarian,
Senator Hatch was chairman, Senator Leahy was ranking member, I had
been a Federal prosecutor for 15 years; people like Jon Kyl and Dianne
Feinstein and so many others worked on it for months--it wasn't passed
in a few days without thought. People talked about it. It was on the
radio and television, we got letters, we had hearings with professors
and constitutional scholars, law enforcement officers, some public and
some classified briefings, and we tried to write a bill, and I believe
did, that provided the Federal Government an expedited method to access
phone call data, metadata as it is called, under section 215 of the
act.
Now, this data has no content--no phone communications at all. It is
just phone numbers, even less than you get on your telephone bill when
it comes to you in the mail every month. That data is maintained at the
telephone companies in their records. Everybody who makes a phone call
should know that, if they are alert to the world. So that record is not
your personal record. That record is the telephone company's record.
Now, if you have documents at home, if you have records in your desk,
records anywhere in your house, if you have a gun or drugs that are
illegal in your house, nobody can come in your house, they can't go
into your car, can't go into your glove compartment or trunk without a
court order because it is within your custody and you have a right,
under the Fourth Amendment, to be free from an unreasonable search. The
law enforcement officer has to get a court order, backed up by facts,
before they can breach that Fourth Amendment.
Of course, the Fourth Amendment simply says that your right is
against unreasonable search and seizure. It doesn't say the government
can never conduct a search. An unreasonable search and seizure is what
the Constitution talks about. I would say, first and foremost, it is
reasonable the government be able to identify certain matters of
evidence that could prevent a 9/11-type attack on America that could
cause the deaths of thousands of Americans.
So what is it that is provided for under this act? I am raising this
because I think my colleagues have misunderstood it, and they are more
worried about it than they should be. In fact, I think many of their
worries are based on a false understanding of how the system works and
a false understanding of how law enforcement is conducted in America
every day.
So these telephone companies all maintain these records and they are
accessible by law enforcement. And it does not take a court order,
colleagues; it takes a subpoena. A subpoena is an order for production
issued by an entity empowered to issue subpoenas.
The basic standard for a Drug Enforcement Administration agent to get
people's telephone records that are in the possession of a telephone
company is the administrative subpoena. They do not have to go to a
judge, they do not have to go to the U.S. attorney or any Federal
prosecutor. They are empowered if the documents are relevant to an
investigation they are conducting because they are not an individual's
possession; they are the phone company's records. This is done every
day.
Now, oddly, the FBI doesn't have that power. The FBI is the Agency
charged with the responsibility of investigating and stopping terrorist
attacks, but they have never been given this power. They have to issue
their subpoenas simply by calling the Federal prosecutor in the U.S.
attorney's office. I was a U.S. attorney for 12 years, an assistant
U.S. attorney for 2\1/2\. I approved hundreds and hundreds, thousands
of subpoenas.
In almost every major investigation you want telephone toll records.
You are investigating a drug dealer and you capture somebody and he
starts providing evidence. He says: I talked to the main drug dealer.
How many times? Hundreds. Did you use a phone? Yes. So you immediately
subpoena the telephone records. Those come right in, and they can prove
he is telling you the truth. He has made 50 or 100 phone calls to the
main drug dealer. That corroborates his testimony and builds truth and
power in the prosecution's case that this person is indeed a drug
dealer and this witness is telling the truth.
Now, there are all sorts of reasons for getting documents. That is
just one of them, but it is done every day by a subpoena. As I said, a
subpoena does not require a judge's approval.
So this all got stirred up in the PATRIOT Act, and we set up this
procedure with judicial oversight where the phone companies' phone
data--metadata--is simply put in one secure system that is accessible
by the Federal Government. I don't believe that violates any
constitutional rights. It is just a mechanism by which to further the
system. And before they can access it, the FBI, the National Security
Agency, has to have more proof and put out more evidence and go through
more hoops than the drug enforcement agent does to get your telephone
records. Remember, these records have no names. They have nothing but a
telephone number, the date the number was called, and how long the
conversation was.
Nobody is accessing those records for personal gain. Only 30-some
people in the United States have the ability to access this system.
That is the way it works, and so I believe, colleagues, this does not
in any way impact the integrity of the constitutional right to be free
from unreasonable search and seizure under the Constitution.
Somebody may say: Well, they could abuse that. Well, they could abuse
it, that is true. But I have to tell you, I have seen this system. I
have seen the people who operate it. They are not out there trying to
corruptly spy on politicians or anyone else. I don't know how they
could use the system to do that anyway. Anybody who works at the
telephone company can access your telephone toll records now. So how
much security do you have in your telephone toll records, pray tell?
But these people aren't doing that. They are intensely focused. If
they have information connecting a phone number to a foreign terrorist
or terrorist organization and they can see other people have called
that number. They can do some preliminary investigations and if there
is a hit and some information that coincides with other data they have,
they may be able to investigate it. That may lead to other information
that may stop an attack on the United States of America.
These people are not after drug dealers, they are not after bank
cheats, fraudsters or armed robbers; they are
[[Page S3284]]
after terrorists. That is all they are authorized to use the system
for.
I just have difficulty having the words to express how I feel about
this.
So this system can save this country from massive attacks. We know,
and our officials are telling us, there are more threats out there than
before.
A lot of people watch these television programs, these CSI shows and
things, and they get the false impression of the power of the American
Government to conduct surveillance and the extent to which it is
limited. I have worked with FBI agents, DEA and IRS agents. They are
not risking their careers. They are not signing false statements. You
see that sometimes on television. Even the heroes do things that
violate the rules. In my experience, none of the Federal officers I
dealt with violated the rules. If criminals walked, they walked. Even
though they desperately needed some information, the agents do not lie,
defraud or cheat.
I will tell you, these people at the NSA aren't doing that. They are
patriots. They are the best kind of people you want to have serving in
America. So I think this is an exaggerated thing.
I hope, colleagues, we will spend more time identifying and looking
through the challenges we face, the threats we face in America, and
that we will examine this program and be sure we fully understand what
is at stake and the advantages that it brings. The President has given
us examples of what will happen. Director Comey of the FBI said that
losing these authorities would be a big problem as the Agency uses
section 215, the key section, in about 200 cases a year to get records
through the Foreign Intelligence Surveillance Court.
By the way, colleagues, the Internal Revenue Service can issue an
administrative subpoena to get your bank records. I think they have the
power to issue telephone toll records too--but, no, not here in this
system. You have to go through the court process.
We talk about the roving wiretap authority that would expire if we do
not reauthorize these programs. That is used in counterespionage and
counterterrorism investigations and it allows the FBI to conduct
surveillance on a person who may be using a burner phone. In other
words, using a telephone and then throwing it away and switching to a
new phone so they maintain their ability to communicate without
interception.
This is important when you actually do get a warrant that allows a
title III wiretap of a terrorist phone. You get this ability when you
go to court. In the affidavits I have seen--in all 12 years as a U.S.
attorney, I think I had one or two wiretaps approved--they were
hundreds of pages of affidavits. You have to monitor it all. It takes
tremendous time, but if you are after a terrorist, a wiretap can be a
decisive and important matter.
Then, you face the problem of, well, you have a wiretap and it names
the phone and the number of it, but he throws that phone down and picks
up another one. How do you deal with that? So this allows a roving
wiretap and provides a mechanism for a person who changes phones, and
it is consistent with the fundamental principle we use in drug cases
and organized crime cases.
In a Washington Times article published today, the President of the
Law Enforcement Legal Defense Fund and former Assistant Director of the
FBI, Ron Hosko, said:
ISIS is singing a siren song calling people to their death
to crash on the rocks--and it's the rocks that ISIS will take
credit for. They're looking for those who are disaffected,
disconnected and willing to commit murder. So if we're
willing to take away tools, OK, congressman, stand behind
it [and] take the credit by putting the FBI in the dark.
In other words, be sure we will be taking credit for shutting off the
ability of our investigators to protect America.
President Obama said it is indeed helping protect America. Last year,
he said:
The program grew out of a desire to address a gap
identified after 9/11. One of the
9/11 hijackers, Khalid al-Mihdhar, made a phone call from San
Diego to a known al-Qaida safehouse in Yemen. NSA [the
National Security Agency] saw that call, but could not see
that the call was coming from an individual already in the
United States.
They didn't have the legal ability or a system at that time that
could do it.
The President went on to say of the telephone metadata program:
Section 215 was designed to map the communications of
terrorists, so we can see who they may be in contact with as
quickly as possible.
Speed is critical.
The President went on to say:
This capability could also provide valuable information in
a crisis. For example, if a bomb goes off in one of our
cities and law enforcement is racing to determine whether a
network is poised to conduct additional attacks, time is of
the essence. Being able to quickly review telephone
connections to assess whether a network exists is critical to
that effort.
I think the President is right about that. We don't have superhuman
abilities in this country. We don't monitor everybody's phone calls.
There is no way humanly possible Federal agents can do that. But once
they identify someone who is being connected to a terrorist group, they
can at least follow their phone number and whom they may be calling.
Passing the House bill I believe is not the right thing. The bill
would eliminate entirely the database through which our intelligence
analysts are able to quickly access information to connect the dots.
The bill ends these programs. It just does. It ends the metadata
program, replacing it with a nonexistent, untested system. It relies on
the hope that private telephone companies will agree to retain this
data. But these companies have made it clear they will not commit, and
flatly refuse to commit, to retaining this telephone data in their
computer systems for any period of time as contemplated by the House-
passed bill, unless they are legally required to do so--and the bill
does not require them to do so.
One provider said the following:
[We are] not prepared to commit to voluntarily retain
documents for any particular period of time pursuant to the
proposed [House bill] if not otherwise required by law.
The House has refused to put that in.
Colleagues, when I was prosecuting, phone companies kept the data 3
years, some phone companies more. One rural phone company never got rid
of their data. It was amazing how often older phone calls helped
connect the dots, improved facts that are critical in a prosecution.
For example, somebody says: I never called John Jones, and then you
find 50 calls from their phone document to John Jones. These things
have tremendous importance. When we are looking to prevent an attack on
America, trying to produce intelligence to prevent enemy attacks on
this country, just the fact that one individual is calling another
individual who is known to be a terrorist is exceedingly valuable
information. My goodness, maybe it is an innocent call, but it is
worthy of looking at and investigating. That is how investigation work.
That is how crimes are solved. That is how attacks are stopped. One
shred of evidence, one bit can lead to new bits that can lead to more
and more evidence and reveals an entire organization poised to attack
our country.
Let me repeat. I don't believe we have a violation of the
Constitution. I am absolutely convinced the procedures utilized in this
process are utterly consistent with the policies approved by thousands
of court cases nationwide that law enforcement uses on a daily basis to
investigate tax cheats and drug dealers. And we can't use these same
tactics against terrorists who are enemies of the United States and
seek to perhaps blow up and kill thousands of people?
I think this is a mistake. I urge my colleagues to be careful about
it.
Yesterday, we received a letter from the Sergeants Benevolent
Association. It pleads with us to do a short-term extension of the
program: Congress, do your duty. The letter says:
With provisions of the USA PATRIOT Act set to expire in
less than two weeks, the responsible course is to pass a
short-term extension of the expiring authorities--including
section 215. This will allow time for the Senate to undertake
the kind of serious deliberative process critical national
security issues demand and that the American people expect of
``the world's greatest deliberative body.''
I think we are doing that now. That is my opinion. I was present when
the law was drafted, and we tried to be sure we did that and I believe
we did. Some of the concerns are real. A lot of good people are
concerned about it. So I think it is time for us to slow down, go
[[Page S3285]]
back to the basics, lay out this program, see what the complaints are,
and then see if they are justified. If they are, the program will have
to end. But I don't believe it needs to end, and right now we are
heading on a path that will end it.
I thank the Presiding Officer and I yield the floor.
I suggest the absence of a quorum.
The PRESIDING OFFICER (Mr. Boozman). The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. REID. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
[...]
[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3300-S3301]
USA PATRIOT ACT
Mr. HATCH. Mr. President, today I wish to speak on a critical
national security issue: the importance of renewing the authority for
essential anti-terrorism tools which is set to expire by the time
Congress returns to Washington after Memorial Day.
Every single Member of this body remembers where he or she was on
September 11, 2001. I was here in the Senate. I remember evacuating the
Capitol and the office building. I remember standing on the lawn
outside, wondering if a plane was headed toward this very building.
That terrible day gave us a taste of what terrorists want to visit
upon our country. We realized that these fanatics would stop at nothing
to kill innocent men, women, and children and to bring our country to
its knees.
Knowing the threat this country faced, we resolved not to let
bureaucratic red tape hinder the ability of our law enforcement and
intelligence communities to keep us safe. As the ranking member of the
Judiciary Committee, I joined with colleagues of both parties as well
as the Bush administration to craft the USA PATRIOT Act, which passed
the Senate 98 to 1. The PATRIOT Act and its subsequent reauthorizations
have proven critical to our ability to investigate terrorist threats
and prevent another mass-casualty attack on the homeland.
Let me make one matter perfectly clear: we continue to face a very
serious terrorist threat. The evil that struck us on September 11 has
metastasized and continues to present a clear and present danger to the
national security of the United States. As the American people's
elected representatives, it is our primary duty to keep this country
safe. Accordingly, we must continue to provide the necessary tools to
the law enforcement and intelligence communities that have helped keep
this Nation safe for the past 14 years.
Unfortunately, some of these tools have become quite controversial,
despite the repeated showing of strong bipartisan support for them. The
collection of telephone metadata under section 215 has drawn particular
criticisms and worrisome calls for ``reform.'' I find this development
enormously concerning.
Consider what President Obama himself had to say about our need for
such a capability:
The program grew out of a desire to address a gap
identified after 9/11. One of the 9/11 hijackers, Khalid al-
Mihdhar, made a phone call from San Diego to a known al-Qaeda
safe house in Yemen. NSA saw that call, but it could not see
that the call was coming from an individual already in the
United States. The telephone metadata program under Section
215 was designed to map the communications of terrorists so
we could see who they may be in contact with as quickly as
possible.
The President was absolutely right. The collection of telephone
metadata in bulk facilitates our mapping of terrorist networks and our
ability to disrupt terrorist plots. Contrary to the wild fantasies that
critics frequently spout, this collection does not meaningfully intrude
on our privacy. It does not involve the NSA listening in on anyone's
calls. It is simply a very important means of finding a proverbial
needle in a haystack. We should reauthorize this authority without
delay.
A number of my colleagues have taken a different approach, taking up
the cause of the so-called USA FREEDOM Act to ``reform'' our
counterterrorism efforts. I find the name of this bill ironic, in the
sense that their legislation aims to restore a freedom that was never
under threat while sacrificing critical tools that secure our freedom.
For instance, under this legislation, metadata would no longer be
collected by the government but instead retained by private
communications corporations. While this idea may seem initially
appealing, I have strong reservations about such an approach. Their
proposal contains no requirement for these companies to maintain this
data for any length of time. Without such a requirement, the
effectiveness of a search would obviously be compromised.
This is hardly my only concern. Consider also the provision of the
so-called FREEDOM Act that would create a body of outside experts to
advise the Foreign Intelligence Surveillance Court on the government's
warrant applications. Such an unprecedented move would cause serious
constitutional concerns and could undermine the adversarial system
which at the core of the judicial branch.
[[Page S3301]]
For these and many other reasons, I cannot support the so-called
FREEDOM Act. While I would prefer to pass a long-term extension of our
current authorities, I will support a short-term extension to
facilitate the search for a long-term solution. I urge my colleagues in
both Houses to support this effort.
____________________
[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3302-S3303]
USA PATRIOT ACT
Mr. GRASSLEY. Mr. President, I wish to explain why I support a short-
term reauthorization of the national security authorities that expire
on June 1, and why I will not vote for cloture on the latest version of
the USA FREEDOM Act at this time. These authorities need to be
reauthorized and reformed in a way that appropriately balances national
security with the privacy and civil liberties of all Americans. I am
hopeful that during the next few weeks we can do a better job of doing
just that.
I start with the premise that these are important national security
tools that shouldn't be permitted to expire. If that were to happen,
there is little doubt that the country would be placed at greater risk
of terrorist attack, at a time when we can least afford it. This isn't
exaggeration or hyperbole.
We have recently witnessed the emergence of ISIS, a terrorist
organization that controls large swaths of Iraq and Syria, including,
as of just days ago, the capital of the largest province in Iraq. ISIS
is beheading Americans and burning its captives alive for propaganda
value. And fueled in part by black market oil sales, ISIS reportedly
has at least $2 billion.
The organization isn't just sitting on that money. Members of ISIS
and related groups are actively recruiting would-be terrorists from
around the world to come to Syria. They are inspiring attacks, often
using social media, in the West, from Paris, to Sydney, to Ottawa, and
even here in the United States, in places like New York City, Ohio, and
Garland, TX. Director Comey has reported that the FBI has
investigations of perhaps thousands of people in various stages of
radicalization in all 50 States.
So this isn't the time to let these various authorities expire. This
isn't the time to terminate the government's ability to conduct
electronic surveillance of so-called ``lone wolf' terrorists--people
who are inspired by groups like ISIS but don't have direct contact with
them. And this isn't the time to end the government's ability to seek
roving wiretaps against terrorists. After all, this is a tool that
prosecutors have used in criminal investigations since the mid-1980s.
Most of all, this isn't the time to sunset the government's ability
to acquire records from businesses like hotels, car rental agencies,
and supply
[[Page S3303]]
companies, under section 215, in a targeted fashion. These kinds of
records are routinely obtained by prosecutors in criminal
investigations, though the use of grand jury subpoenas. It makes no
sense for the government to be able to collect these records to
investigate bank fraud, insider trading and public corruption, but not
to help keep the country safe from terrorists.
While we must reauthorize these authorities, however, it is equally
important that we reform them. But we don't yet have a reform bill that
I am satisfied with.
The American people have made clear that they want the government to
stop indiscriminately collecting their telephone metadata in bulk under
section 215. They also want more transparency from the government and
from the private sector about how section 215 and other national
security authorities are being used. They want real reform.
I want to be clear that I emphatically agree with these goals. They
can be achieved responsibly, and doing so will restore an important
measure of trust in our intelligence community.
I agree with these reforms because the civil liberties implications
of the collection of this type of bulk telephone metadata are
concerning. This is especially so, given the scope and nature of the
metadata collected through this program.
Now, there haven't been any cases of this metadata being
intentionally abused for political or other ends. That is good. I
recognize that the overwhelming majority of those who work in the
intelligence community are law-abiding American heroes to whom we owe a
great debt for helping to keep us safe.
But other national security authorities have been abused.
Unfortunately, to paraphrase James Madison, all men aren't angels. I've
been critical, for example, of the Department of Justice's handling of
the so-called LOVEINT cases uncovered by the NSA's Inspector General.
Given human nature, then, the mere potential for abuse makes the
status quo concerning the bulk collection of telephone metadata under
section 215 unsustainable, especially when measured against the real
yet modest intelligence value the program has provided.
The USA FREEDOM Act would in some ways reauthorize and reform section
215 along these lines. It would end the bulk collection of telephone
metadata in 6 months, and transition the program to a system where the
phone companies hold the data for targeted searching by the government.
But the bill's serious flaws cause me to believe that we can do
better. Let me discuss just a few.
First, while the system to which the bill would transition the
program sounds promising, it does not exist at present, and may well
not exist in 6 months. Intelligence community leaders don't know for
sure how long it will take to build. They don't know for sure how fast
it will be able to return search results to the government. They don't
know for sure whether the phone companies will voluntarily keep the
metadata for later searching by the government.
On this score, then, this bill feels like a leap into the dark when
we can least afford it. While we need certainty that the bulk
collection of telephone metadata under section 215 will end, we also
need more certainty that the new system proposed will work and be
effective.
Second, the bill contains reforms to the FISA Court that are unneeded
and risky. I am strongly in favor of reforming the court to make clear
that it can appoint a traditional amicus, or a friend of the court, to
help it get the law right. This is a well understood legal concept.
But this bill goes further--potentially dangerously so. Under certain
circumstances, the bill directs the FISA Court to name a panel of
outside experts who would, in the words of the New York Times,
``challenge the government's pleadings'' before the court.
Especially when the bill already ends the kind of dragnet
intelligence collection under section 215 that affects so many innocent
Americans, this is wholly unnecessary. And for this reason, the
Administrative Office of the U.S. Courts sent a letter alerting
Congress to its concerns that this outside advocate could ``impede the
court's work'' by delaying the process and chilling the government's
candor.
In addition, this proposed advocate is contrary to our legal
traditions, in which judges routinely make similar decisions on an ex
parte basis, hearing only from the government. Mobsters don't get a
public defender when the government seeks to wiretap their phones.
Crooked bankers don't get a public defender when the government seeks a
search warrant for their offices. There is no need to give ISIS a
public defender when the government seeks to spy on its terrorists to
keep the country safe.
Third, the bill also contains language that amends the federal
criminal code to implement a series of important and widely-supported
treaties aimed at preventing nuclear terrorism and proliferation.
However, the bill doesn't authorize the death penalty for nuclear
terrorists. Nor does it permit the government to request authorization
from a judge to wiretap the telephones of these terrorists or allow
those who provide them material support to be prosecuted. These common-
sense provisions were requested by both the Bush and Obama
Administrations, but for unknown reasons they were omitted from the
bill.
In fact, Senator Whitehouse and I have introduced separate
legislation, the Nuclear Terrorism Conventions Implementation and
Safety of Maritime Navigation Act of 2015, which would implement these
treaties with these provisions included.
Recently, I have been heartened that there is a bipartisan group of
members of the Judiciary and Intelligence Committees who share these
and other concerns. We have been discussing an alternative reform bill
that would also end the bulk collection of telephone metadata under
section 215. But it would also do a better job of ensuring that our
national security is still protected.
So I support a short, temporary reauthorization with the hope that an
alternative reform bill can be crafted that addresses the core reform
goals of the American people and that appropriately balances national
security with the privacy and civil liberties of all Americans. There
is work ahead, but it is important that we get this reform right.
____________________
[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3303-S3304]
USA FREEDOM ACT
Mrs. FEINSTEIN. Mr. President, I rise today to discuss the votes the
Senate will soon take relating to three expiring provisions in the
Foreign Intelligence Surveillance Act.
I will vote to support the USA FREEDOM Act, the bill passed by the
House last week by a vote of 338 to 88, and strongly urge my colleagues
to do the same. In my view, this is the only action that we can take
right now that will prevent important intelligence authorities from
expiring at the end of next week.
Let me describe the situation in a little more detail.
On Monday morning at 12:01 a.m. on June 1, three separate sections of
the Foreign Intelligence Surveillance Act, or FISA, will expire. Two of
those provisions were first added to FISA in 2001 in the USA PATRIOT
Act, shortly after the terrorist attacks of September 11. They are the
business records section, also known as section 215, and the roving
wiretap provision.
The business records provision was originally intended to allow the
government to go to the FISA Court to get an order to be able to obtain
a variety of records relevant to an investigation. The authority was,
and remains, very important for the FBI.
Since 2006, the business records authority in FISA has also been used
by the NSA to get telephone metadata records from telephone companies--
the records of the telephone numbers and the time and duration of a
call. Metadata does not include the content or the location or names of
the individuals on the phone.
The roving wiretap provision allows the government to use
surveillance authorities under FISA, pursuant to a court order, against
an individual who seeks to evade surveillance by switching
communication devices. If a terrorist gets a new cell phone or changes
an email address, the government can continue surveillance on that
individual under the same probable cause
[[Page S3304]]
warrant from the FISA court rather than having to go back to the Court
for authority to collect information from each new phone number or
email address.
The third provision, the so-called ``lone wolf'' provision, was added
in 2004 over concern that the intelligence community may not be able to
gather information on a known terrorist if it could not demonstrate his
membership in a specific terrorist group. Given the threat we face
today from individuals inspired by ISIL, for example, that threat is
even more real today than it was a decade ago.
These provisions have been reviewed by the Intelligence and the
Judiciary Committees for many years and have been subject to enormous
public scrutiny.
For more than a year, there has been a strong desire by the American
public, supported by the President and by the House of Representatives,
to make a basic change in the use of the business records authority.
That change is to end the bulk collection of phone records by the NSA
and to replace it with a system for the government to get a FISA Court
order to be able to obtain a much more specific set of records from the
telecommunications providers when there is a ``reasonable, articulable
suspicion'' that a phone number is associated with a foreign terrorist
group.
The Director of National Intelligence and the Attorney General have
written to the Senate to indicate their support for this change, which
they state ``preserves essential operational capabilities of the
telephone metadata program and enhances other intelligence capabilities
needed to protect our nation and its partners.''
I would also note that the USA FREEDOM Act will allow private
companies that receive requests and orders from the government to
produce information, at their own discretion, that allows them to be
more transparent about those requests and orders from the government. I
support this additional transparency and thank the sponsors of the USA
FREEDOM legislation for including it.
I have spoken to a number of technology companies, including several
founded and based in California, that believe that transparency is not
only good policy but that it will help them show publicly that their
products and services are secure and independent from government
control.
So the choice before the Senate today is a clear one: whether to vote
for the only sure way to continue the use of important intelligence
authorities in a way that has the support of the American people, the
President, the intelligence community, and the Department of Justice or
to hope that the authorities will be renewed for 2 months despite clear
communications from the House that it will not support such an
extension.
FBI Director Comey said earlier this week that the expiration of the
business records and roving wiretap authorities would be a ``huge
problem,'' and I believe him.
Given the wide range of threats facing Americans, both at home and
abroad--particularly from ISIL and Al Qaeda--we should not allow these
valuable authorities to expire.
To me, this is an easy choice, and I will support the USA FREEDOM
Act.
Mr. BROWN. Mr. President, I ask unanimous consent to engage in a
colloquy with Senator Cornyn and Senator Leahy, ranking member of the
Judiciary Committee, regarding important aspects of S. 337, the FOIA
Improvement Act of 2015, that could affect the essential work of our
financial regulators.
The PRESIDING OFFICER. Without objection, it is so ordered.
____________________
[Congressional Record Volume 161, Number 81 (Saturday, May 23, 2015)]
[Senate]
[Pages S3313-S3314]
CLOTURE MOTION
The ACTING PRESIDENT pro tempore. Pursuant to rule XXII, the Chair
lays before the Senate the pending cloture motion, which the clerk will
state.
The senior assistant legislative clerk read as follows:
Cloture Motion
We, the undersigned Senators, in accordance with the
provisions of rule XXII of the Standing Rules of the Senate,
do hereby move to bring to a close debate on the motion to
proceed to H.R. 2048, an act to reform the authorities of the
Federal Government to require the production of certain
business records, conduct electronic surveillance, use pen
registers and trap and trace devises, and use other forms of
information gathering for foreign intelligence,
counterterrorism, and criminal purposes, and for other
purposes.
Mitch McConnell, Lamar Alexander, Michael B. Enzi, David
Vitter, John Cornyn, Johnny Isakson, Lisa Murkowski,
John Barrasso, Richard Burr, Pat Roberts, Roy Blunt,
Bob Corker, Orrin G. Hatch, Jerry Moran, Patrick J.
Toomey, Mike Lee, Ted Cruz.
The ACTING PRESIDENT pro tempore. By unanimous consent, the mandatory
quorum call has been waived.
The question is, Is it the sense of the Senate that debate on the
motion to proceed to H.R. 2048, an act to reform the authorities of the
Federal Government to require the production of certain business
records, conduct electronic surveillance, use pen registers and trap
and trace devices, and use other forms of information gathering for
foreign intelligence, counterterrorism, and criminal purposes, and for
other purposes, shall be brought to a close?
The yeas and nays are mandatory under the rule.
The clerk will call the roll.
The legislative clerk called the roll.
Mr. CORNYN. The following Senator is necessarily absent: the Senator
from Wyoming (Mr. Enzi).
The ACTING OFFICER pro tempore. Are there any other Senators in the
Chamber desiring to vote?
The yeas and nays resulted--yeas 57, nays 42, as follows:
[[Page S3314]]
[Rollcall Vote No. 194 Leg.]
YEAS--57
Baldwin
Bennet
Blumenthal
Booker
Boxer
Brown
Cantwell
Cardin
Carper
Casey
Coons
Cruz
Daines
Donnelly
Durbin
Feinstein
Flake
Franken
Gardner
Gillibrand
Heinrich
Heitkamp
Heller
Hirono
Hoeven
Johnson
Kaine
Klobuchar
Lankford
Leahy
Lee
Manchin
Markey
McCaskill
Menendez
Merkley
Mikulski
Murkowski
Murphy
Murray
Nelson
Peters
Reed
Reid
Sanders
Schatz
Schumer
Scott
Shaheen
Stabenow
Sullivan
Tester
Udall
Warner
Warren
Whitehouse
Wyden
NAYS--42
Alexander
Ayotte
Barrasso
Blunt
Boozman
Burr
Capito
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Crapo
Ernst
Fischer
Graham
Grassley
Hatch
Inhofe
Isakson
King
Kirk
McCain
McConnell
Moran
Paul
Perdue
Portman
Risch
Roberts
Rounds
Rubio
Sasse
Sessions
Shelby
Thune
Tillis
Toomey
Vitter
Wicker
NOT VOTING--1
Enzi
The ACTING PRESIDENT pro tempore. On this vote, the yeas are 57, the
nays are 42.
Three-fifths of the Senators duly chosen and sworn not having voted
in the affirmative, the motion is rejected.
The majority leader.
Mr. McCONNELL. Mr. President, I enter a motion to reconsider the
vote.
The ACTING PRESIDENT pro tempore. The motion is entered.
Mr. McCONNELL. Mr. President, the Senate has demonstrated that the
House-passed bill lacks the support of 60 Senators. I would urge a
``yes'' vote on the 2-month extension. Senator Burr, the chairman of
the Intelligence Committee, and Senator Feinstein, the ranking member,
as we all know, have been working on a proposal that they think would
improve the version that the Senate has not accepted that the House
sent over. It would allow the committee to work on this bill, refine
it, and bring it before us for consideration. So the 2-month extension,
it strikes me, would be in the best interest of getting an outcome that
is acceptable to both the Senate and the House and hopefully the
President.
Mrs. BOXER. Mr. President.
Mr. McCONNELL. So I would urge a ``yes'' vote.
The ACTING PRESIDENT pro tempore. The Senator from California.
____________________
[Congressional Record Volume 161, Number 81 (Saturday, May 23, 2015)]
[Senate]
[Page S3314]
CLOTURE MOTION
The ACTING PRESIDENT pro tempore. Pursuant to rule XXII, the Chair
lays before the Senate the pending cloture motion, which the clerk will
state.
The legislative clerk read as follows:
Cloture Motion
We, the undersigned Senators, in accordance with the
provisions of rule XXII of the Standing Rules of the Senate,
do hereby move to bring to a close debate on the motion to
proceed to S. 1357, a bill to extend authority relating to
roving surveillance, access to business records, and
individual terrorists as agents of foreign powers under the
Foreign Intelligence Surveillance Act of 1978 until July 31,
2015, and for other purposes.
Mitch McConnell, John Cornyn, Daniel Coats, Thom Tillis,
Mike Rounds, Pat Roberts, Richard Burr, John Barrasso,
Tom Cotton, Shelley Moore Capito, David Perdue, Lamar
Alexander, Michael B. Enzi, David Vitter, Johnny
Isakson, Roy Blunt.
The ACTING PRESIDENT pro tempore. By unanimous consent, the mandatory
quorum call has been waived.
The question is, Is it the sense of the Senate that debate on the
motion to proceed to S. 1357, a bill to extend authority relating to
roving surveillance, access to business records, and individual
terrorists as agents of foreign powers under the Foreign Intelligence
Surveillance Act of 1978 until July 31, 2015, and for other purposes,
shall be brought to a close?
The yeas and nays are mandatory under the rule.
The clerk will call the roll.
The senior assistant legislative clerk called the roll.
Mr. CORNYN. The following Senator is necessarily absent: the Senator
from Wyoming (Mr. Enzi).
The PRESIDING OFFICER (Mr. Sullivan). Are there any other Senators in
the Chamber desiring to vote?
The yeas and nays resulted--yeas 45, nays 54, as follows:
[Rollcall Vote No. 195 Leg.]
YEAS--45
Alexander
Ayotte
Barrasso
Blunt
Boozman
Burr
Capito
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Donnelly
Ernst
Fischer
Flake
Graham
Grassley
Hatch
Hoeven
Inhofe
Isakson
Johnson
Kirk
Lankford
McCain
Nelson
Perdue
Portman
Risch
Roberts
Rounds
Rubio
Sasse
Scott
Sessions
Shelby
Sullivan
Thune
Tillis
Toomey
Vitter
Wicker
NAYS--54
Baldwin
Bennet
Blumenthal
Booker
Boxer
Brown
Cantwell
Cardin
Carper
Casey
Coons
Crapo
Cruz
Daines
Durbin
Feinstein
Franken
Gardner
Gillibrand
Heinrich
Heitkamp
Heller
Hirono
Kaine
King
Klobuchar
Leahy
Lee
Manchin
Markey
McCaskill
McConnell
Menendez
Merkley
Mikulski
Moran
Murkowski
Murphy
Murray
Paul
Peters
Reed
Reid
Sanders
Schatz
Schumer
Shaheen
Stabenow
Tester
Udall
Warner
Warren
Whitehouse
Wyden
NOT VOTING--1
Enzi
The PRESIDING OFFICER. On this vote, the yeas are 45, the nays are
54.
Three-fifths of the Senators duly chosen and sworn not having voted
in the affirmative, the motion is rejected.
The majority leader.
Mr. McCONNELL. Mr. President, I would say to my colleagues that it is
clear there aren't 60 votes in the Senate for the House-passed bill,
and there aren't 60 votes for a 60-day extension.
So I am going to propound a series of unanimous consent requests to
see if we can avoid having the program expire roughly 1 week from now.
____________________
[Congressional Record Volume 161, Number 81 (Saturday, May 23, 2015)]
[Senate]
[Page S3314]
UNANIMOUS CONSENT REQUEST--H.R. 2048
Mrs. BOXER. Mr. President, I ask unanimous consent that since a
strong bipartisan majority of the Senate voted to invoke cloture on the
motion to proceed to the USA FREEDOM Act, that the motion to proceed be
agreed to, that the bill then be read a third time, and the Senate vote
on passage of the USA FREEDOM Act.
The ACTING PRESIDENT pro tempore. Is there objection?
Mr. BURR. Objection.
The ACTING PRESIDENT pro tempore. Objection is heard.
Mrs. BOXER. Mr. President, let's be clear what happened here. We
tried with the majority----
Mr. McCONNELL. Regular order.
Mr. BURR. Regular order.
Mrs. BOXER. To protect this country, and the Republicans objected.
Let's be clear.
The ACTING PRESIDENT pro tempore. Regular order has been called for.
Debate is not in order.
Mrs. FEINSTEIN addressed the Chair.
The ACTING PRESIDENT pro tempore. Debate is not in order.
Mrs. FEINSTEIN. Mr. President, if I may a point of personal
privilege.
Mr. President, I would like to correct the majority leader,
regretfully. I did not support the Burr bill. I do not believe that is
the way to go. I have taken a good look at this. For those who want
reform and want to prevent the government from holding the data, the
FREEDOM Act is the only way to do it. The House has passed it. The
President wants it. All of the intelligence personnel have agreed to
it, and I think not to pass that bill is really to throw the whole
program--that whole section 215 as well as the whole business records,
the ``lone wolf,'' the roving wiretaps--into serious legal jeopardy.
Mr. McCONNELL. Regular order, Mr. President.
The ACTING PRESIDENT pro tempore. Regular order.
____________________