[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3253-S3255]



                    TRADE BILL AND BULK DATA PROGRAM

  Mr. McCONNELL. Madam President, I am glad the Senate voted yesterday 
to take another step forward on the important trade legislation that is 
before us. This bill represents an opportunity for Republicans and 
Democrats to stand together for the middle class, so I hope our friends 
across the aisle will allow us to seize this opportunity. I am 
optimistic. We all know that trade is important for American workers 
and American jobs. We all know that by passing this legislation, we can 
show we are serious about advancing new opportunities for bigger 
American paychecks, better American jobs, and a stronger American 
economy.
  We want to process as many amendments as we can. The Republican and 
Democratic bill managers, Senator Hatch and Senator Wyden, have done a 
great job managing this bill in a bipartisan spirit thus far. My hope 
is that, with some cooperation from across the aisle, we can vote on 
some amendments today and complete our work on this trade legislation 
today.
  I appreciate all the hard work from both sides that got us to the 
point we are today. Let's keep the momentum going so we can finally 
pass a bill that Republicans, President Obama, and many Democrats all 
agree is good for the middle class, good for the economy, and good for 
our country.
  Let's also move forward in the same spirit to finish our work on the 
other two important issues on the Senate's to-do list. I will speak 
about one of them in a moment. But the point is, we have to get our 
work done, however long it takes. With bipartisan cooperation, we can 
get it done as soon as this afternoon.
  On the issue I mentioned, following the attacks of September 11, the 
United States improved its laws and legal authorities in an effort to 
better understand the terrorist threat and, rather than treat it as a 
crime to be handled by civilian prosecution, to combat it as a matter 
of warfare--not as a crime but as a matter of warfare. But that does 
not mean Al Qaeda and its affiliates stood still. The terrorist threat 
metastasized under regional affiliates such as Al Qaeda in the Arabian 
Peninsula, al-Shabaab, Al Qaeda in Iraq, and AQIM.
  We have all seen the advance of the Islamic State in Iraq and the 
Levant, which, despite coalition air attacks and Iraqi military ground 
operations, actually seized Ramadi last weekend. Although ISIL has 
broken from core Al Qaeda, it is emblematic of how the threat continues 
to evolve.
  Last week, the Director of the FBI explained how ISIL, operating from 
safe havens within Syria, is now using social media to radicalize 
Americans by making contact through Twitter and then directing them to 
encrypted venues. Moreover, through the publication of online 
magazines, Al Qaeda and ISIL are able to radicalize recruits and reveal 
the tactics needed for small-scale attacks here at home. These tactics, 
along with the information gained by terrorist networks from the 
unlawful disclosure of classified information by Edward Snowden, 
challenge counterterrorism officials in their efforts to detect 
terrorist plots and terrorist communications.
  This all comes at a moment of elevated threats to the American 
people.
  Let me read something the L.A. Times recently reported. This is what 
the Times had to say:

       Alarmed about the growing threat from Islamic State, the 
     Obama administration has dramatically stepped up warnings of 
     potential terrorist attacks on American soil after several 
     years of relative calm.
       Behind the scenes, U.S. authorities have raised defenses at 
     U.S. military bases, put local police forces on alert and 
     increased surveillance at the nation's airports, railroads, 
     shopping malls, energy plants and other potential targets. 
     Driving the unease are FBI arrests of at least 30 Americans 
     on terrorism-related charges this year in an array of ``lone 
     wolf'' plots, none successful, but

[[Page S3254]]

     nearly all purportedly inspired by Islamic State propaganda 
     or appeals.

  I ask unanimous consent to have the article printed in the Record at 
the conclusion of my remarks.
  We need to recognize that terrorist tactics and the nature of the 
threat have changed and that at a moment of elevated threat, it would 
be a mistake to take from our intelligence community any--any--of the 
valuable tools needed to build a complete picture of terrorist networks 
and their plans, such as the bulk data collection program of section 
215. The intelligence community needs these tools to protect us from 
these attacks.
  I would like to quote the observations that someone intimately 
familiar with this program made in the aftermath of the unauthorized 
leaks of classified material by Edward Snowden.
  ``This program does not involve the content of phone calls or the 
names of people making calls,'' he said. ``Instead, it provides a 
record of phone numbers and the times and lengths of calls, metadata 
that can be queried if and when we have a reasonable suspicion that a 
particular number is linked to a terrorist organization.''
  He then described why the program was necessary.
  ``The program grew out of a desire to address a gap identified after 
9/11,'' he said.

       One of the 9/11 hijackers, Khalid A. Mihdhar, made a phone 
     call from San Diego to a known Al Qaeda safe house in Yemen. 
     NSA saw that call, but it could not see that the call was 
     coming from an individual already in the United States. The 
     telephone metadata program under Section 215 was designed to 
     map the communications of terrorists, so we can see who they 
     may be in contact with as quickly as possible.

  Let me say that again: ``as quickly as possible.''

       This capability could also prove valuable in a crisis. For 
     example, if a bomb goes off in one of our cities and law 
     enforcement is racing to determine whether a network is 
     poised to conduct additional attacks, time is of the essence. 
     Being able to quickly review telephone connections to assess 
     whether a network exists is critical to that effort.

  He concluded by noting this:

       The Review Group turned up no indication that this database 
     has been intentionally abused.

  ``[N]o indication that this database has been intentionally abused.''

       And I believe it is important that the capability that this 
     program is designed to meet is preserved.

  The person who made those observations I just quoted was President 
Obama, and he made them just last year--just last year.
  Unfortunately, there is now a huge gap between the capabilities the 
President rightly recognized as being necessary for our intelligence 
professionals and the legislation he is endorsing today. The untried--
and as of yet, nonexistent--bulk collection system envisioned under 
that bill would be slower and more cumbersome than the one that 
currently helps keep us safe. At worst, it might not work at all due 
to, among many other problems, the lack of a requirement for 
telecommunications providers to retain the data to begin with--no 
requirement to retain the data.
  Last week, the Obama administration briefed Senators on the current 
bulk data program under section 215. Senators were impressed with the 
safeguards built into the current program, and they were impressed that 
there had not been one incident--not one--of abuse of the program. But 
many Senators were disturbed by the administration's inability to 
answer basic, yet critical, questions about the alternate bulk data 
system that would be set up at some point--at some point--under the 
legislation the administration now supports. The administration could 
not guarantee whether a new system would work as well as the current 
system, and the administration could not guarantee whether there would 
be much, if any, data available to be analyzed under a new system given 
the lack of a data-retention requirement in the legislation.
  Despite what the administration told us just last week about its 
inability to guarantee that this nonexistent system could even be built 
in time, it did an about-face earlier this week--sort of. The 
administration had the Director of NSA write that the nonexistent 
system could be built in time if--if--the providers cooperated in 
building it. And, of course, they are not required to.
  The problem, of course, is that the providers have made it abundantly 
clear that they will not commit to retaining the data for any period of 
time as contemplated by the House-passed bill unless they are legally 
required to do so. There is no such requirement in the bill. For 
example, one provider said the following: ``[We are] not prepared to 
commit to voluntarily retain documents for any particular period of 
time pursuant to the proposed USA FREEDOM Act if not otherwise required 
by law.''
  Far from addressing the concerns many have had about the USA FREEDOM 
Act, the administration in its letter only underscored the problem. It 
said the only way this nonexistent system could even be built in time 
is if the providers cooperate. But the providers have made it 
abundantly clear they will not cooperate, and there is nothing--
absolutely nothing--in the bill that would require them to do so.
  This is just as cynical as the letter from the Attorney General and 
the Director of National Intelligence that assured us they would let us 
know about any problems after the current program was replaced with a 
nonexistent system. Let me say that again. This is just as cynical as 
the letter from the Attorney General and the Director of National 
Intelligence that assured us they would let us know about any problems 
after the current program was replaced with a nonexistent system. Boy, 
that is reassuring.
  This is beyond troubling. We should not establish an alternate system 
that contains a glaring hole in its ability to function--namely, the 
complete absence of any requirement for data retention.
  I have begun the legislative process to advance a 60-day extension of 
section 215 and the other two authorities that will expire soon. This 
extension will allow for the Intelligence Committee to continue its 
efforts to produce a compromise bill we can send to the House that does 
not destroy an important counterterrorism tool that is needed to 
protect American lives.
  There being no objection, the material was ordered to be printed in 
the Record, as follows:

               [From the Los Angeles Times, May 19, 2015]

       White House Steps Up Warnings About Terrorism on U.S. Soil

                           (By Brian Bennett)

       Alarmed about the growing threat from Islamic State, the 
     Obama administration has dramatically stepped up warnings of 
     potential terrorist attacks on American soil after several 
     years of relative calm.
       Behind the scenes, U.S. authorities have raised defenses at 
     U.S. military bases, put local police forces on alert and 
     increased surveillance at the nation's airports, railroads, 
     shopping malls, energy plants and other potential targets.
       Driving the unease are FBI arrests of at least 30 Americans 
     on terrorism-related charges this year in an array of ``lone 
     wolf'' plots, none successful, but nearly all purportedly 
     inspired by Islamic State propaganda or appeals.
       The group's leader, Abu Bakr Baghdadi, drove home the 
     danger in a 34-minute audio recording released online 
     Thursday. He urged Muslims everywhere to ``migrate to the 
     Islamic State or fight in his land, wherever that may be.''
       The audio was released with translations in English, 
     French, German, Russian and Turkish, signaling the militants' 
     increasingly ambitious attempts to draw new recruits--and to 
     spark violence--around the world.
       U.S. officials estimate the Sunni Muslim group has drawn 
     22,000 foreign fighters to Syria and Iraq, including about 
     3,700 from Western nations. About 180 Americans have gone, or 
     tried to go.
       U.S. counter-terrorism officials initially viewed Islamic 
     State as primarily a regional security threat, focused on 
     expanding and protecting its self-proclaimed Islamist 
     caliphate in Syria and Iraq, rather than launching attacks 
     abroad.
       But the analysis has shifted sharply as gunmen inspired by 
     the group, but not controlled or assisted by them, opened 
     fire at the Parliament in Ottawa; at a cafe in Sydney, 
     Australia; at a kosher grocery in Paris; and, on May 3, in 
     Garland, Texas.
       In the Texas case, two would-be terrorists apparently 
     prompted by Islamic State social media messages tried to 
     shoot their way into a provocative contest for caricatures of 
     the prophet Muhammad. Both gunmen were shot to death, and no 
     one else was killed. Islamic State later claimed 
     responsibility for the assault, the first time it has done so 
     for an attack on U.S. soil.
       James B. Comey, the FBI director, warned this month that 
     ``hundreds, maybe thousands'' of Americans are seeing 
     recruitment pitches from Islamic State on Facebook, Twitter 
     and other social media, as well as messages sent to 
     smartphones of ``disturbed

[[Page S3255]]

     people'' who could be pushed to attack U.S. targets.
       ``It's like the devil sitting on their shoulders saying, 
     `Kill, kill, kill,' '' Comey told reporters.
       The United States has entered a ``new phase, in my view, in 
     the global terrorist threat,'' Jeh Johnson, director of 
     Homeland Security, said Friday on MSNBC.
       ``We have to be concerned about the independent actor, and 
     the independent actor who is here in the homeland who may 
     strike with little or no warning,'' he said. ``The nature of 
     the global terrorist threat has evolved.''
       That poses a special challenge for U.S. intelligence and 
     law enforcement agencies, which spent years desperately 
     trying to penetrate and understand Al Qaeda's rigid hierarchy 
     and top-down approach to terrorism.
       Now they are struggling to detect and prevent lethal 
     attacks by individuals--such as the April 2013 bombing of the 
     Boston Marathon by two Russian-born brothers--with little or 
     no outside communication or support.
       The administration has sought to stiffen homeland defenses, 
     and intelligence gathering, in response.
       This month, U.S. Northern Command boosted security at all 
     bases in the United States. Officials cited the May 3 
     shooting in Texas, specific threats against military 
     personnel and the increasing number of Americans 
     communicating with Islamic State supporters.
       In March, a group calling itself ``Islamic State Hacking 
     Division'' posted online the names, home addresses and photos 
     of 100 U.S. troops. The group wrote on Twitter that it was 
     posting the apparent hit list ``so that our brothers residing 
     in America can deal with you.''
       More armed guards have been deployed at federal buildings 
     across the country, and Homeland Security officials have 
     quietly urged more security at privately run facilities and 
     infrastructure that could be targeted, including shopping 
     malls, railroads, water treatment facilities and nuclear 
     power generators.
       ``Since last summer we have ramped up security at federal 
     installations across the country, and we have increased our 
     outreach with critical infrastructure operators,'' a senior 
     Homeland Security official said in an interview.
       Authorities have urged companies to conduct more ``active 
     shooter'' drills to ``heighten awareness and make sure people 
     are leaning forward with security protocols,'' he said. The 
     official was not authorized to publicly discuss internal 
     communications and security measures.
       Defeating Islamic State will take not only the ongoing 
     military operations in Iraq and Syria, U.S. officials said, 
     but stronger international efforts to block foreign recruits 
     from joining and to cut the group's financing networks. 
     Officials acknowledge they also need better messaging to 
     counter a barrage of polished videos, social media and 
     Internet appeals from the militants.
       ``It's a long-term challenge,'' Brett McGurk, deputy 
     assistant secretary of State for Near Eastern affairs, told 
     CNN. ``We have not seen this before. And it's going to take a 
     very long time to defeat them.''
       Still, attacking Western targets is not the group's top 
     priority, as it was for Osama bin Laden, according to Seth 
     Jones, a former U.S. counter-terrorism official now with Rand 
     Corp., the Santa Monica-based think tank. The group is far 
     more focused on the battleground in Iraq and Syria, and 
     establishing ties to terrorist groups in Libya, Yemen, 
     Algeria and elsewhere.
       Without a strong hand to help direct and organize attacks 
     abroad, they are ``likely to be less sophisticated,'' Jones 
     said. ``You actually need a lot of training to conduct a 
     Madrid-style attack or a London-style attack. Those kinds of 
     bombs are hard to put together.''
       Most of the 30 Americans arrested this year were suspected 
     of aiding or trying to join Islamic State. Many were 
     approached on social media or on chat programs designed for 
     cellphones.
       In March, for example, a 22-year-old Army National Guard 
     specialist was arrested at Chicago Midway International 
     Airport as he allegedly attempted to join Islamic State in 
     Syria. The FBI said he had downloaded military training 
     manuals to take with him and told an undercover agent he was 
     prepared to ``bring the flames of war'' to the United States.
       That same month, a retired Air Force avionics instrument 
     specialist was indicted in Brooklyn, N.Y., on suspicion of 
     trying to travel to Syria to join the group. Prosecutors in 
     Brooklyn also have charged three other men with seeking to 
     link up with the militants.
       And on Thursday, the FBI arrested a former interpreter for 
     the U.S. military in Iraq, now a naturalized American 
     citizen, who had tried to travel to Syria from Texas. In June 
     he had used Twitter to ``pledge obedience'' to Islamic State.
       ``As a numbers game, it is pretty easy for ISIS to reach 
     out to a very large number of people using a very robust 
     social media presence,'' said J.M. Berger, a nonresident 
     fellow at the Brookings Institution, using a common acronym 
     for Islamic State.
       ``I suspect we should see more plots going forward,'' he 
     added.

                          ____________________


[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3274-S3289]


                            USA FREEDOM Act

  Mr. LEAHY. Mr. President, I have been having a lot of people ask me 
where we are on the USA Freedom Act of 2015, and we actually have a 
very interesting, easy choice: We can either pass the bipartisan bill 
the House of Representatives passed with a majority of Republicans and 
a majority of Democrats voting for it, or we can let the expiring 
provisions of the USA PATRIOT Act sunset at the end of the month. Some 
may prefer that. I think the House made a number of improvements which 
protect our freedoms and protect our security, and that is what we 
ought to pass.
  Some people have talked about short-term extensions. Well, we could 
have a 2-day extension or we could have a 5,000-year extension; we 
would be extending something that doesn't exist. The fact is that the 
House gave us the USA FREEDOM Act in plenty of time to act upon it, to 
amend it if we wanted to, to send it back and go to a conference. But 
now the House has adjourned and gone on recess. If we don't vote for 
their bill, we will end up at the end of the month with nothing. There 
will be nothing to extend. We could feel good about passing an 
extension, but we can't extend something that is dead.
  I have worked for more than two years with Members of Congress from 
both parties and in both Chambers to develop the USA FREEDOM Act of 
2015. It is a commonsense, balanced reform bill that protects 
Americans' privacy, while also ensuring our national security.
  The bill doesn't go nearly as far as the bill I first introduced in 
October of 2013 with Congressman Sensenbrenner. It doesn't go as far as 
the USA FREEDOM Act that was filibustered last November by Senator 
McConnell and others. At that time, the incoming majority leader wanted 
to wait and see how it would be with a Republican majority and was able 
to rally his Members to delay reform. But we shouldn't delay it any 
further. Americans deserve to have their privacy restored and their 
national security protected. There should be no more excuses.
  In the bill Senator Lee and I have introduced and supported, the USA 
FREEDOM Act of 2015--it has not just our support, it has the 
administration's support, it has the support of the Director of 
National Intelligence, the Attorney General, the FBI Director, a 
supermajority of the House of Representatives, the technology industry, 
privacy and civil liberties groups, librarians, and the NRA. I mean, 
when are we ever going to find all these groups coming together? Well, 
they came together because they know the USA FREEDOM Act is a good 
bill, and the support for our bill continues to grow.
  Just yesterday, national security experts at the conservative 
Heritage Foundation concluded that the USA FREEDOM Act ``strikes a 
balance between maintaining our national security capabilities and 
protecting privacy and civil liberties.'' Why? Because it is a 
reasonable and responsible bill. When we get the civil liberties 
groups, the NRA, the Heritage Foundation and privacy groups together, 
we have something.
  I have been here 41 years. I have seen very few pieces of legislation 
where these diverse groups come together, and they did because the USA 
FREEDOM Act is a responsible and reasonable bill. But even if they 
hadn't come together, it is the only option left for any Senator who 
wants to avoid a sunset of the surveillance authorities at midnight on 
May 31. We won't be in session. The other body won't be in session. The 
one thing that will happen is our current authorities will sunset. They 
will go away. Wow. Can't you hear the cheers from some of our enemies?
  Last year when the current Senate majority leader led the filibuster 
of the USA FREEDOM Act, we were told that the Senate needed more time 
to consider the issue and that the new Senate would take up the matter 
under new leadership. All right. We have known the sunsets were coming 
for years. That is why I brought up the bill last year. There has been 
nothing done on this urgent matter this year--no public hearings and no 
committee markups, unlike the six public hearings I held in the 
Judiciary Committee last year.
  In contrast, the House leadership has acted responsibly and 
decisively. They moved the USA FREEDOM Act of 2015 through the 
Judiciary Committee and passed this bipartisan bill overwhelmingly.
  We had significant debate on this issue this week. I have heard 
Senators across the political spectrum who have spoken at length on the 
Senate floor about their views. Most of these Senators have urged us to 
reform the government's bulk collection program--which is, of course, 
the same way the vast majority of Americans feel. But there have also 
been voices urging more surveillance. We have heard the familiar fear-
mongering and demands for a data-retention mandate on the private 
telecom companies. Well, I disagree with those Senators who voiced that 
perspective, but they have at least been heard.
  Unfortunately, the clock has been running. The House worked very 
hard, they completed their work, and they left. They are not coming 
back until after the surveillance authorities are set to expire. And 
the House leadership has made clear that they will not pass an 
extension. Even if they were in session and we passed an extension, 
they made it very clear to Republican and Democratic leadership that 
they will not take it up.
  So here is the choice. It is a very simple one. We can let the three 
provisions at issue expire--some may like that; frankly, I don't--or we 
can pass the bipartisan and bicameral USA FREEDOM Act of 2015.
  We all know that the NSA has for years been using section 215 of the 
USA PATRIOT Act to sweep up phone

[[Page S3275]]

records of innocent Americans without any connection to terrorism. I am 
sure innocent Americans who may be in the Chamber or who are hearing 
what we are saying have had their phone records swept up. Well, I don't 
think anybody would feel very comfortable with that.
  We also know that the NSA used a similar legal theory for years to 
collect massive amounts of metadata related to billions of emails sent 
to and from innocent Americans--a parent to a child asking, ``how is my 
granddaughter's cold coming along?'' or ``How did my grandson do in 
school?'' or somebody writing to a friend, back and forth.
  The American people oppose this indiscriminate dragnet collection of 
their records--not only that, the courts do, too. They found it to be 
unlawful. The House of Representatives listened to the American people, 
they listened to the courts, and they voted overwhelmingly to end this 
program through the USA FREEDOM Act and assumed, of course, that the 
Senate would do what the courts have said and what the vast majority of 
the American people said.
  Last November, when Senator McConnell convinced his caucus to block 
the USA FREEDOM Act, I warned that we would not have much time in the 
new Congress, and that the American people were demanding action. 
People should go back and see the number of letters and emails that 
came pouring in to the Capitol saying: We want this passed. Yet, here 
we are--Congress racing against the clock to act before the sunsets 
take effect next weekend.
  Well, this is a manufactured crisis. I think there are some who hope 
that enough Senators will be scared by the prospect of these 
authorities expiring that they will blindly vote in favor of a clean 
extension even though that will go nowhere. We have all seen this movie 
before. We know that opponents of the USA FREEDOM Act simply want to 
delay again. Well, I don't frighten.
  Many Americans, especially my constituents, are wondering what 
opponents of the USA FREEDOM Act have been doing for the past six 
months? They are rapidly approaching a sunset that has been on the 
books for years--the original sunset provision written by myself and 
Republican leader Dick Armey. It is not as though this deadline 
suddenly snuck up on the leadership or the chairman of the Intelligence 
Committee, who is just now considering alternative proposals.
  Remember, we are just a few days away from the expiration date. But 
despite this urgency and the extensive debate we have been having for 
many months, the only bill that has been filed by the opponents of the 
USA FREEDOM Act is a 2-month rubberstamp of the USA PATRIOT Act 
provisions--a bill the Senate sponsors know cannot pass the House even 
if they were in session. And because they are not in session, if we 
were to pass it here, it would become a ``nothingburger'' because there 
would be no law to extend.
  I read in the press that there may be an alternative proposal in the 
works. It may include a provision to keep the bulk collection program 
in place for more than two years. But even if we could legally pass 
that, it is entirely unnecessary.
  Just this week, the NSA Director stated in a letter to Leaders 
McConnell and Reid that the NSA only needs 180 days to transition to 
the new targeted program established by the USA FREEDOM Act. Not 2 
years. The 180-day transition has been part of the USA FREEDOM Act for 
more than a year. And during all the negotiations about the bill, 
neither the NSA nor the intelligence community ever raised a concern 
with me about this provision. In fact, we have on the record that they 
support it.
  I ask unanimous consent to have printed in the Record a copy of the 
May 20 letter from Admiral Rogers, the head of NSA.
  There being no objection, the material was ordered to be printed in 
the Record, as follows:


                                      National Security Agency

                            Fort George G. Meade, MD, May 20 2015.
     Hon. Mitch McConnell,
     Majority Leader, U.S. Senate,
     Washington, DC.
     Hon. Harry Reid,
     Minority Leader, U.S. Senate,
     Washington, DC.
       Dear Senators McConnell and Reid: The USA Freedom Act would 
     establish a 180-day period for transitioning from the current 
     bulk-collection program for telephone metadata to a model 
     where queries would be carried out against business records 
     held by telephone service providers. Several questions have 
     been raised about the feasibility of the 180-day deadline.
       Should the USA Freedom Act of 2015 become law, NSA assesses 
     that the transition of the program to a query at the provider 
     model is achievable within 180 days, with provider 
     cooperation. We base this judgment on the analysis that we 
     have undertaken on how to make this model work. Upon passage 
     of the law, we will work with the companies that are expected 
     to be subject to Orders under the law by providing them the 
     technical details, guidance, and compensation to create a 
     fully operational query at the provider model. We are aware 
     of no technical or security reasons why this cannot be tested 
     and brought on line within the 180-day period.
       We very much appreciate the time and attention the Senate 
     continues to devote to this important issue.

                                            Michael S. Rogers,

                                     Admiral, U.S. Navy, Director,
                                         National Security Agency.

  Mr. LEAHY. We all know this last-ditch attempt at further delay is 
just too late. We have two options: Pass the USA FREEDOM Act or let the 
provisions expire. A growing majority of the Senate--a straight up-or-
down vote--supports the USA FREEDOM Act. If we pass it today, the 
President can sign it today or tomorrow.
  Also, the intelligence community says: Is the law going to be here or 
is the law gone? By passing the USA FREEDOM Act, they can move forward 
with the certainty they need to protect the American people.
  Senator Lee and I, along with a bipartisan group of Senators ranging 
from Senator Durbin, to Senator Heller, to Senator Schumer, to Senator 
Cruz--and that is going across the political spectrum--are moving for a 
responsible path forward.
  We have worked for 2 years on this bill to end the NSA bulk 
collection of Americans' phone records. Republicans and Democrats have 
worked together for 2 years to end the NSA's bulk collection of 
Americans' phone records, something that every one of us, at a townhall 
meeting--I do not care what State you are in, if you ask Americans ``Do 
you want a bulk collection of all your phone records?'' you know what 
the answer would be: ``Of course not.''
  The clock has run out, but there is a responsible choice before us. 
Let's pass the USA FREEDOM Act today. Then we will have important 
reforms, we will keep America secure, and we will not have all of these 
authorities expire.
  Mr. President, I see other Senators on the floor.
  I yield the floor.
  The PRESIDING OFFICER. The Senator from Montana.
  Mr. TESTER. Mr. President, I ask unanimous consent for Senator Daines 
and I to speak as in morning business.
  The PRESIDING OFFICER. Without objection, it is so ordered.

[...]

  Mr. SANDERS. [...]

                            USA PATRIOT Act

  Mr. President, there is another issue I wish to very briefly touch on 
as well today. That issue deals with the USA PATRIOT Act and FISA and 
civil liberties in this country. Let me make a few basic points.
  There is nobody in the Senate, there is nobody in the House who does 
not understand that there are terrorist groups out there that want to 
attack the United States of America and our allies and that want to do 
us harm. There is nobody in the Senate or in the House or, I think, in 
the United States of America who does not believe that as a nation we 
have to do everything we can to protect the people of our country from 
terrorist attacks. There is no debate on that. What the debate is about 
is how we protect the American people without undermining the 
Constitution of the United States of America or undermining the privacy 
rights of the American people.
  I think everybody does understand and should understand that modern 
technology in all of its forms--from iPhones to a dozen or 100 
different ways--has greatly outstripped public policy in terms of 
protecting privacy rights. By and large, the privacy rights we have on 
the books now were written years and years before the development of 
the technologies we see right now.
  It is absolutely imperative that as a nation we begin a serious 
conversation, which includes some of the most knowledgeable people in 
this country--people who know about what technology can do today and 
what it can do tomorrow, people who are concerned about civil liberties 
and privacy rights, our law enforcement officials, our national 
security people, and Members of Congress. What that discussion should 
be about is pretty simple: How do we protect our country against 
terrorism at the same time that we protect our privacy rights and our 
constitutional freedoms.
  As we consider whether to reauthorize parts of the PATRIOT Act, we 
must take stock of where we are today. It is no secret that NSA 
collects vast sums of information and at one point or another has 
collected information on virtually every person in this country who 
uses a telephone. That is no great secret. Since June 2013, we have 
learned that the NSA collects phone call metadata, including the 
numbers of both parties, location, time, and duration. They collect 
text messages, email chat, and Internet browsing history; smart phone 
app data, including Google Maps, which can pinpoint a person's location 
to within a few yards. They collect maps of people's social networks, 
bank and credit card transactions. This is just the tip of the iceberg. 
There is undoubtedly much more being done that we simply don't know 
anything about.
  Further, local governments and other agencies are also collecting 
information about the movements and the habits of law-abiding 
Americans. When we drive down the street, there are cameras that can 
take pictures of license plates. There are cameras on street corners, 
cameras in private buildings. The government knows where we are 
traveling and how long we are gone. Let's be clear. While today we are 
focusing appropriately on the role of the Federal Government in issues 
of civil liberties, we must also understand that

[[Page S3279]]

it is not just the government that is collecting information on law-
abiding Americans. In fact, the private sector's collection of 
information is just as intrusive and equally dangerous. Private 
companies, private corporations know a whole lot about what we do. Our 
every move can be tracked by a smart phone. Almost two-thirds of the 
American people, by the way, have smart phones.
  Private companies can know what we read, what we are emailing about, 
what Web sites we visit. They know when we have purchased a ticket, and 
they know where that trip is taking us. They know whether we are going 
on a plane or a train or a bus. When we go to a grocery store, our 
discount card gets scanned and the grocery store knows exactly what we 
are eating. It is the same situation at the pharmacy. They know what 
kind of medicine we are buying, enabling people to make judgments about 
one's health. They know when a woman is pregnant based on her 
purchases. In the name of fitness, people are wearing watches and 
Fitbits that record our heart rate and exercise pattern and how much we 
sleep.
  In the wrong hands, this information could prevent us from getting 
health insurance through our jobs. It could even prevent us from 
getting hired in the first place. In other words, enormous, enormous, 
undreamed of amounts of information are out there and, in the wrong 
hands, that could be a real danger to our country and to the lives of 
millions of innocent people.
  This is what the attack on privacy looks like. Someone can access our 
phone calls. They can access our credit card records. They can comb 
through our purchases. They can analyze our spending habits. They can 
access our emails and our contacts. They can track our movements. 
Pretty much anything and everything we do these days can be tracked and 
recorded.
  Now, many of my colleagues come to the floor of the Senate and talk 
about America being a free country. Well, if somebody knows everything 
we are doing, maybe it is time to recognize that we are not quite as 
free as we think we are. I know that in response to the argument I am 
raising, people will say: Well, trust these large corporations; trust 
the government. They are honest people. By and large, many of them are. 
I am not suggesting otherwise.
  In terms of government policy, however, let us not forget that 45 
years ago we had a President of the United States named Richard Nixon. 
And what Richard Nixon believed was that anything the President of the 
United States did, by definition, was legal. The President can break 
into his or her opponent's political headquarters--not a problem. He is 
the President. He can spy on people--not a problem. He is the 
President.
  So I ask my colleagues and the American people--and I do not suggest 
for one second that this is true of the Obama administration. But I ask 
the American people to think about what happens in the future if we 
have a President who really does believe that he or she is the law, 
that he or she can or should have access to the kinds of information 
that are out there. Think about the incredible power the administration 
has, the potential for blackmail, the political advantages that 
administration has.

  People say: Well, it is a pretty crazy idea. It is never going to 
happen.
  Well, a lot of things have happened that we never thought could 
happen.
  It seems to me that now is the time for us as a nation, for us as 
elected officials to have a very important conversation about how we 
balance our need--of which there is no debate--to protect the American 
people against terrorist attacks while at the same time we respect the 
privacy rights and the constitutional rights of our people and how we 
maintain America as a free and open society.
  I got involved in this issue a number of years ago when I voted 
against the USA PATRIOT Act. I remember some librarians in the State of 
Vermont came to me and they said: You know, as a result of section 215 
of the USA PATRIOT Act, law enforcement officials--the FBI can come to 
a librarian and demand that the librarian provide information about the 
books people are borrowing from the library.
  Of course, section 215 goes a lot further than that.
  Do we want to be a nation in which we are looking over our shoulders 
and worrying about the books we are reading because somebody may say: 
Oh, well, you are reading a book about Osama bin Laden; clearly, you 
must be a terrorist. Is that really the kind of fear we want to see 
established in this country?
  So I say to my colleagues, it is great to come to the floor and talk 
about freedom, but what freedom is about ultimately is the right of 
people to do what they want to do in a law-abiding way without harming 
other people. That is called freedom. In my view, people have a right 
to make a telephone call today without that information being collected 
by the government. People have a right to go on the Internet and send 
an email with the absolute assurance that as law-abiding citizens their 
visits to a Web site or the emails they send will not be tracked by the 
government. People have a right to go to a grocery store and make 
purchases without somebody knowing what they are buying.
  I intend to introduce legislation shortly which will call for a 
comprehensive review of data collection by public and private entities 
and the impact that data is having on the American people. I don't know 
if this is a progressive piece of legislation or a conservative piece 
of legislation, but I would hope this concept would have broad support 
across the political spectrum from people who actually do believe in a 
free society, that our young people should not be worried about the 
kinds of books they read or the Web sites they visit.
  We must bring together leaders in the technology world, people who 
not only know what technology today is doing as far as invading our 
privacy rights but what the future holds, because I am quite certain 
that every single day, this technology is growing more and more 
sophisticated and more and more intrusive, and sitting down with people 
who are experts on technology--we have to have civil libertarians, 
people who understand what the First Amendment is, what the Fourth 
Amendment is, what our Bill of Rights is about, what our Constitution 
is about, and, of course, involved in that discussion must be law 
enforcement and our security experts. The goal of all of this must be 
to create legislation which does everything we can to protect the 
safety of the American people but also protects our privacy rights and 
our constitutional rights.
  I look forward to working with my colleagues on both sides of the 
aisle on that legislation.
  With that, I yield the floor.

[...]

                            The PATRIOT Act

  Mr. SESSIONS. Mr. President, we will be talking about the PATRIOT Act 
and the USA FREEDOM Act that has been offered, and I think it is an 
important issue. I believe the PATRIOT Act provides critical tools that 
have helped protect America, and I believe it does so without any 
infringement on constitutional rights.
  Some say we have to compromise rights or balance rights against the 
threats. Maybe sometimes we have to do that. But when we wrote the 
PATRIOT Act in the Judiciary Committee--of which I am a member, Senator 
Leahy is a strong libertarian, Senator Hatch is a strong libertarian, 
Senator Hatch was chairman, Senator Leahy was ranking member, I had 
been a Federal prosecutor for 15 years; people like Jon Kyl and Dianne 
Feinstein and so many others worked on it for months--it wasn't passed 
in a few days without thought. People talked about it. It was on the 
radio and television, we got letters, we had hearings with professors 
and constitutional scholars, law enforcement officers, some public and 
some classified briefings, and we tried to write a bill, and I believe 
did, that provided the Federal Government an expedited method to access 
phone call data, metadata as it is called, under section 215 of the 
act.
  Now, this data has no content--no phone communications at all. It is 
just phone numbers, even less than you get on your telephone bill when 
it comes to you in the mail every month. That data is maintained at the 
telephone companies in their records. Everybody who makes a phone call 
should know that, if they are alert to the world. So that record is not 
your personal record. That record is the telephone company's record.
  Now, if you have documents at home, if you have records in your desk, 
records anywhere in your house, if you have a gun or drugs that are 
illegal in your house, nobody can come in your house, they can't go 
into your car, can't go into your glove compartment or trunk without a 
court order because it is within your custody and you have a right, 
under the Fourth Amendment, to be free from an unreasonable search. The 
law enforcement officer has to get a court order, backed up by facts, 
before they can breach that Fourth Amendment.
  Of course, the Fourth Amendment simply says that your right is 
against unreasonable search and seizure. It doesn't say the government 
can never conduct a search. An unreasonable search and seizure is what 
the Constitution talks about. I would say, first and foremost, it is 
reasonable the government be able to identify certain matters of 
evidence that could prevent a 9/11-type attack on America that could 
cause the deaths of thousands of Americans.
  So what is it that is provided for under this act? I am raising this 
because I think my colleagues have misunderstood it, and they are more 
worried about it than they should be. In fact, I think many of their 
worries are based on a false understanding of how the system works and 
a false understanding of how law enforcement is conducted in America 
every day.
  So these telephone companies all maintain these records and they are 
accessible by law enforcement. And it does not take a court order, 
colleagues; it takes a subpoena. A subpoena is an order for production 
issued by an entity empowered to issue subpoenas.
  The basic standard for a Drug Enforcement Administration agent to get 
people's telephone records that are in the possession of a telephone 
company is the administrative subpoena. They do not have to go to a 
judge, they do not have to go to the U.S. attorney or any Federal 
prosecutor. They are empowered if the documents are relevant to an 
investigation they are conducting because they are not an individual's 
possession; they are the phone company's records. This is done every 
day.
  Now, oddly, the FBI doesn't have that power. The FBI is the Agency 
charged with the responsibility of investigating and stopping terrorist 
attacks, but they have never been given this power. They have to issue 
their subpoenas simply by calling the Federal prosecutor in the U.S. 
attorney's office. I was a U.S. attorney for 12 years, an assistant 
U.S. attorney for 2\1/2\. I approved hundreds and hundreds, thousands 
of subpoenas.
  In almost every major investigation you want telephone toll records. 
You are investigating a drug dealer and you capture somebody and he 
starts providing evidence. He says: I talked to the main drug dealer. 
How many times? Hundreds. Did you use a phone? Yes. So you immediately 
subpoena the telephone records. Those come right in, and they can prove 
he is telling you the truth. He has made 50 or 100 phone calls to the 
main drug dealer. That corroborates his testimony and builds truth and 
power in the prosecution's case that this person is indeed a drug 
dealer and this witness is telling the truth.
  Now, there are all sorts of reasons for getting documents. That is 
just one of them, but it is done every day by a subpoena. As I said, a 
subpoena does not require a judge's approval.
  So this all got stirred up in the PATRIOT Act, and we set up this 
procedure with judicial oversight where the phone companies' phone 
data--metadata--is simply put in one secure system that is accessible 
by the Federal Government. I don't believe that violates any 
constitutional rights. It is just a mechanism by which to further the 
system. And before they can access it, the FBI, the National Security 
Agency, has to have more proof and put out more evidence and go through 
more hoops than the drug enforcement agent does to get your telephone 
records. Remember, these records have no names. They have nothing but a 
telephone number, the date the number was called, and how long the 
conversation was.
  Nobody is accessing those records for personal gain. Only 30-some 
people in the United States have the ability to access this system. 
That is the way it works, and so I believe, colleagues, this does not 
in any way impact the integrity of the constitutional right to be free 
from unreasonable search and seizure under the Constitution.

  Somebody may say: Well, they could abuse that. Well, they could abuse 
it, that is true. But I have to tell you, I have seen this system. I 
have seen the people who operate it. They are not out there trying to 
corruptly spy on politicians or anyone else. I don't know how they 
could use the system to do that anyway. Anybody who works at the 
telephone company can access your telephone toll records now. So how 
much security do you have in your telephone toll records, pray tell?
  But these people aren't doing that. They are intensely focused. If 
they have information connecting a phone number to a foreign terrorist 
or terrorist organization and they can see other people have called 
that number. They can do some preliminary investigations and if there 
is a hit and some information that coincides with other data they have, 
they may be able to investigate it. That may lead to other information 
that may stop an attack on the United States of America.
  These people are not after drug dealers, they are not after bank 
cheats, fraudsters or armed robbers; they are

[[Page S3284]]

after terrorists. That is all they are authorized to use the system 
for.
  I just have difficulty having the words to express how I feel about 
this.
  So this system can save this country from massive attacks. We know, 
and our officials are telling us, there are more threats out there than 
before.
  A lot of people watch these television programs, these CSI shows and 
things, and they get the false impression of the power of the American 
Government to conduct surveillance and the extent to which it is 
limited. I have worked with FBI agents, DEA and IRS agents. They are 
not risking their careers. They are not signing false statements. You 
see that sometimes on television. Even the heroes do things that 
violate the rules. In my experience, none of the Federal officers I 
dealt with violated the rules. If criminals walked, they walked. Even 
though they desperately needed some information, the agents do not lie, 
defraud or cheat.
  I will tell you, these people at the NSA aren't doing that. They are 
patriots. They are the best kind of people you want to have serving in 
America. So I think this is an exaggerated thing.
  I hope, colleagues, we will spend more time identifying and looking 
through the challenges we face, the threats we face in America, and 
that we will examine this program and be sure we fully understand what 
is at stake and the advantages that it brings. The President has given 
us examples of what will happen. Director Comey of the FBI said that 
losing these authorities would be a big problem as the Agency uses 
section 215, the key section, in about 200 cases a year to get records 
through the Foreign Intelligence Surveillance Court.
  By the way, colleagues, the Internal Revenue Service can issue an 
administrative subpoena to get your bank records. I think they have the 
power to issue telephone toll records too--but, no, not here in this 
system. You have to go through the court process.
  We talk about the roving wiretap authority that would expire if we do 
not reauthorize these programs. That is used in counterespionage and 
counterterrorism investigations and it allows the FBI to conduct 
surveillance on a person who may be using a burner phone. In other 
words, using a telephone and then throwing it away and switching to a 
new phone so they maintain their ability to communicate without 
interception.
  This is important when you actually do get a warrant that allows a 
title III wiretap of a terrorist phone. You get this ability when you 
go to court. In the affidavits I have seen--in all 12 years as a U.S. 
attorney, I think I had one or two wiretaps approved--they were 
hundreds of pages of affidavits. You have to monitor it all. It takes 
tremendous time, but if you are after a terrorist, a wiretap can be a 
decisive and important matter.
  Then, you face the problem of, well, you have a wiretap and it names 
the phone and the number of it, but he throws that phone down and picks 
up another one. How do you deal with that? So this allows a roving 
wiretap and provides a mechanism for a person who changes phones, and 
it is consistent with the fundamental principle we use in drug cases 
and organized crime cases.
  In a Washington Times article published today, the President of the 
Law Enforcement Legal Defense Fund and former Assistant Director of the 
FBI, Ron Hosko, said:

       ISIS is singing a siren song calling people to their death 
     to crash on the rocks--and it's the rocks that ISIS will take 
     credit for. They're looking for those who are disaffected, 
     disconnected and willing to commit murder. So if we're 
     willing to take away tools, OK, congressman, stand behind 
     it [and] take the credit by putting the FBI in the dark.

  In other words, be sure we will be taking credit for shutting off the 
ability of our investigators to protect America.
  President Obama said it is indeed helping protect America. Last year, 
he said:

       The program grew out of a desire to address a gap 
     identified after 9/11. One of the 
     9/11 hijackers, Khalid al-Mihdhar, made a phone call from San 
     Diego to a known al-Qaida safehouse in Yemen. NSA [the 
     National Security Agency] saw that call, but could not see 
     that the call was coming from an individual already in the 
     United States.

  They didn't have the legal ability or a system at that time that 
could do it.
  The President went on to say of the telephone metadata program:

       Section 215 was designed to map the communications of 
     terrorists, so we can see who they may be in contact with as 
     quickly as possible.

  Speed is critical.
  The President went on to say:

       This capability could also provide valuable information in 
     a crisis. For example, if a bomb goes off in one of our 
     cities and law enforcement is racing to determine whether a 
     network is poised to conduct additional attacks, time is of 
     the essence. Being able to quickly review telephone 
     connections to assess whether a network exists is critical to 
     that effort.

  I think the President is right about that. We don't have superhuman 
abilities in this country. We don't monitor everybody's phone calls. 
There is no way humanly possible Federal agents can do that. But once 
they identify someone who is being connected to a terrorist group, they 
can at least follow their phone number and whom they may be calling.
  Passing the House bill I believe is not the right thing. The bill 
would eliminate entirely the database through which our intelligence 
analysts are able to quickly access information to connect the dots.
  The bill ends these programs. It just does. It ends the metadata 
program, replacing it with a nonexistent, untested system. It relies on 
the hope that private telephone companies will agree to retain this 
data. But these companies have made it clear they will not commit, and 
flatly refuse to commit, to retaining this telephone data in their 
computer systems for any period of time as contemplated by the House-
passed bill, unless they are legally required to do so--and the bill 
does not require them to do so.
  One provider said the following:

       [We are] not prepared to commit to voluntarily retain 
     documents for any particular period of time pursuant to the 
     proposed [House bill] if not otherwise required by law.

  The House has refused to put that in.
  Colleagues, when I was prosecuting, phone companies kept the data 3 
years, some phone companies more. One rural phone company never got rid 
of their data. It was amazing how often older phone calls helped 
connect the dots, improved facts that are critical in a prosecution.
  For example, somebody says: I never called John Jones, and then you 
find 50 calls from their phone document to John Jones. These things 
have tremendous importance. When we are looking to prevent an attack on 
America, trying to produce intelligence to prevent enemy attacks on 
this country, just the fact that one individual is calling another 
individual who is known to be a terrorist is exceedingly valuable 
information. My goodness, maybe it is an innocent call, but it is 
worthy of looking at and investigating. That is how investigation work. 
That is how crimes are solved. That is how attacks are stopped. One 
shred of evidence, one bit can lead to new bits that can lead to more 
and more evidence and reveals an entire organization poised to attack 
our country.
  Let me repeat. I don't believe we have a violation of the 
Constitution. I am absolutely convinced the procedures utilized in this 
process are utterly consistent with the policies approved by thousands 
of court cases nationwide that law enforcement uses on a daily basis to 
investigate tax cheats and drug dealers. And we can't use these same 
tactics against terrorists who are enemies of the United States and 
seek to perhaps blow up and kill thousands of people?
  I think this is a mistake. I urge my colleagues to be careful about 
it.
  Yesterday, we received a letter from the Sergeants Benevolent 
Association. It pleads with us to do a short-term extension of the 
program: Congress, do your duty. The letter says:

       With provisions of the USA PATRIOT Act set to expire in 
     less than two weeks, the responsible course is to pass a 
     short-term extension of the expiring authorities--including 
     section 215. This will allow time for the Senate to undertake 
     the kind of serious deliberative process critical national 
     security issues demand and that the American people expect of 
     ``the world's greatest deliberative body.''

  I think we are doing that now. That is my opinion. I was present when 
the law was drafted, and we tried to be sure we did that and I believe 
we did. Some of the concerns are real. A lot of good people are 
concerned about it. So I think it is time for us to slow down, go

[[Page S3285]]

back to the basics, lay out this program, see what the complaints are, 
and then see if they are justified. If they are, the program will have 
to end. But I don't believe it needs to end, and right now we are 
heading on a path that will end it.
  I thank the Presiding Officer and I yield the floor.
  I suggest the absence of a quorum.
  The PRESIDING OFFICER (Mr. Boozman). The clerk will call the roll.
  The legislative clerk proceeded to call the roll.
  Mr. REID. Mr. President, I ask unanimous consent that the order for 
the quorum call be rescinded.
  The PRESIDING OFFICER. Without objection, it is so ordered.

[...]

[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3300-S3301]


                            USA PATRIOT ACT

  Mr. HATCH. Mr. President, today I wish to speak on a critical 
national security issue: the importance of renewing the authority for 
essential anti-terrorism tools which is set to expire by the time 
Congress returns to Washington after Memorial Day.
  Every single Member of this body remembers where he or she was on 
September 11, 2001. I was here in the Senate. I remember evacuating the 
Capitol and the office building. I remember standing on the lawn 
outside, wondering if a plane was headed toward this very building.
  That terrible day gave us a taste of what terrorists want to visit 
upon our country. We realized that these fanatics would stop at nothing 
to kill innocent men, women, and children and to bring our country to 
its knees.
  Knowing the threat this country faced, we resolved not to let 
bureaucratic red tape hinder the ability of our law enforcement and 
intelligence communities to keep us safe. As the ranking member of the 
Judiciary Committee, I joined with colleagues of both parties as well 
as the Bush administration to craft the USA PATRIOT Act, which passed 
the Senate 98 to 1. The PATRIOT Act and its subsequent reauthorizations 
have proven critical to our ability to investigate terrorist threats 
and prevent another mass-casualty attack on the homeland.
  Let me make one matter perfectly clear: we continue to face a very 
serious terrorist threat. The evil that struck us on September 11 has 
metastasized and continues to present a clear and present danger to the 
national security of the United States. As the American people's 
elected representatives, it is our primary duty to keep this country 
safe. Accordingly, we must continue to provide the necessary tools to 
the law enforcement and intelligence communities that have helped keep 
this Nation safe for the past 14 years.
  Unfortunately, some of these tools have become quite controversial, 
despite the repeated showing of strong bipartisan support for them. The 
collection of telephone metadata under section 215 has drawn particular 
criticisms and worrisome calls for ``reform.'' I find this development 
enormously concerning.
  Consider what President Obama himself had to say about our need for 
such a capability:

       The program grew out of a desire to address a gap 
     identified after 9/11. One of the 9/11 hijackers, Khalid al-
     Mihdhar, made a phone call from San Diego to a known al-Qaeda 
     safe house in Yemen. NSA saw that call, but it could not see 
     that the call was coming from an individual already in the 
     United States. The telephone metadata program under Section 
     215 was designed to map the communications of terrorists so 
     we could see who they may be in contact with as quickly as 
     possible.

  The President was absolutely right. The collection of telephone 
metadata in bulk facilitates our mapping of terrorist networks and our 
ability to disrupt terrorist plots. Contrary to the wild fantasies that 
critics frequently spout, this collection does not meaningfully intrude 
on our privacy. It does not involve the NSA listening in on anyone's 
calls. It is simply a very important means of finding a proverbial 
needle in a haystack. We should reauthorize this authority without 
delay.
  A number of my colleagues have taken a different approach, taking up 
the cause of the so-called USA FREEDOM Act to ``reform'' our 
counterterrorism efforts. I find the name of this bill ironic, in the 
sense that their legislation aims to restore a freedom that was never 
under threat while sacrificing critical tools that secure our freedom.
  For instance, under this legislation, metadata would no longer be 
collected by the government but instead retained by private 
communications corporations. While this idea may seem initially 
appealing, I have strong reservations about such an approach. Their 
proposal contains no requirement for these companies to maintain this 
data for any length of time. Without such a requirement, the 
effectiveness of a search would obviously be compromised.
  This is hardly my only concern. Consider also the provision of the 
so-called FREEDOM Act that would create a body of outside experts to 
advise the Foreign Intelligence Surveillance Court on the government's 
warrant applications. Such an unprecedented move would cause serious 
constitutional concerns and could undermine the adversarial system 
which at the core of the judicial branch.

[[Page S3301]]

  For these and many other reasons, I cannot support the so-called 
FREEDOM Act. While I would prefer to pass a long-term extension of our 
current authorities, I will support a short-term extension to 
facilitate the search for a long-term solution. I urge my colleagues in 
both Houses to support this effort.

                          ____________________


[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3302-S3303]


                            USA PATRIOT ACT

  Mr. GRASSLEY. Mr. President, I wish to explain why I support a short-
term reauthorization of the national security authorities that expire 
on June 1, and why I will not vote for cloture on the latest version of 
the USA FREEDOM Act at this time. These authorities need to be 
reauthorized and reformed in a way that appropriately balances national 
security with the privacy and civil liberties of all Americans. I am 
hopeful that during the next few weeks we can do a better job of doing 
just that.
  I start with the premise that these are important national security 
tools that shouldn't be permitted to expire. If that were to happen, 
there is little doubt that the country would be placed at greater risk 
of terrorist attack, at a time when we can least afford it. This isn't 
exaggeration or hyperbole.
  We have recently witnessed the emergence of ISIS, a terrorist 
organization that controls large swaths of Iraq and Syria, including, 
as of just days ago, the capital of the largest province in Iraq. ISIS 
is beheading Americans and burning its captives alive for propaganda 
value. And fueled in part by black market oil sales, ISIS reportedly 
has at least $2 billion.
  The organization isn't just sitting on that money. Members of ISIS 
and related groups are actively recruiting would-be terrorists from 
around the world to come to Syria. They are inspiring attacks, often 
using social media, in the West, from Paris, to Sydney, to Ottawa, and 
even here in the United States, in places like New York City, Ohio, and 
Garland, TX. Director Comey has reported that the FBI has 
investigations of perhaps thousands of people in various stages of 
radicalization in all 50 States.
  So this isn't the time to let these various authorities expire. This 
isn't the time to terminate the government's ability to conduct 
electronic surveillance of so-called ``lone wolf' terrorists--people 
who are inspired by groups like ISIS but don't have direct contact with 
them. And this isn't the time to end the government's ability to seek 
roving wiretaps against terrorists. After all, this is a tool that 
prosecutors have used in criminal investigations since the mid-1980s.
  Most of all, this isn't the time to sunset the government's ability 
to acquire records from businesses like hotels, car rental agencies, 
and supply

[[Page S3303]]

companies, under section 215, in a targeted fashion. These kinds of 
records are routinely obtained by prosecutors in criminal 
investigations, though the use of grand jury subpoenas. It makes no 
sense for the government to be able to collect these records to 
investigate bank fraud, insider trading and public corruption, but not 
to help keep the country safe from terrorists.
  While we must reauthorize these authorities, however, it is equally 
important that we reform them. But we don't yet have a reform bill that 
I am satisfied with.
  The American people have made clear that they want the government to 
stop indiscriminately collecting their telephone metadata in bulk under 
section 215. They also want more transparency from the government and 
from the private sector about how section 215 and other national 
security authorities are being used. They want real reform.
  I want to be clear that I emphatically agree with these goals. They 
can be achieved responsibly, and doing so will restore an important 
measure of trust in our intelligence community.
  I agree with these reforms because the civil liberties implications 
of the collection of this type of bulk telephone metadata are 
concerning. This is especially so, given the scope and nature of the 
metadata collected through this program.
  Now, there haven't been any cases of this metadata being 
intentionally abused for political or other ends. That is good. I 
recognize that the overwhelming majority of those who work in the 
intelligence community are law-abiding American heroes to whom we owe a 
great debt for helping to keep us safe.
  But other national security authorities have been abused. 
Unfortunately, to paraphrase James Madison, all men aren't angels. I've 
been critical, for example, of the Department of Justice's handling of 
the so-called LOVEINT cases uncovered by the NSA's Inspector General.
  Given human nature, then, the mere potential for abuse makes the 
status quo concerning the bulk collection of telephone metadata under 
section 215 unsustainable, especially when measured against the real 
yet modest intelligence value the program has provided.
  The USA FREEDOM Act would in some ways reauthorize and reform section 
215 along these lines. It would end the bulk collection of telephone 
metadata in 6 months, and transition the program to a system where the 
phone companies hold the data for targeted searching by the government.
  But the bill's serious flaws cause me to believe that we can do 
better. Let me discuss just a few.
  First, while the system to which the bill would transition the 
program sounds promising, it does not exist at present, and may well 
not exist in 6 months. Intelligence community leaders don't know for 
sure how long it will take to build. They don't know for sure how fast 
it will be able to return search results to the government. They don't 
know for sure whether the phone companies will voluntarily keep the 
metadata for later searching by the government.
  On this score, then, this bill feels like a leap into the dark when 
we can least afford it. While we need certainty that the bulk 
collection of telephone metadata under section 215 will end, we also 
need more certainty that the new system proposed will work and be 
effective.
  Second, the bill contains reforms to the FISA Court that are unneeded 
and risky. I am strongly in favor of reforming the court to make clear 
that it can appoint a traditional amicus, or a friend of the court, to 
help it get the law right. This is a well understood legal concept.
  But this bill goes further--potentially dangerously so. Under certain 
circumstances, the bill directs the FISA Court to name a panel of 
outside experts who would, in the words of the New York Times, 
``challenge the government's pleadings'' before the court.
  Especially when the bill already ends the kind of dragnet 
intelligence collection under section 215 that affects so many innocent 
Americans, this is wholly unnecessary. And for this reason, the 
Administrative Office of the U.S. Courts sent a letter alerting 
Congress to its concerns that this outside advocate could ``impede the 
court's work'' by delaying the process and chilling the government's 
candor.
  In addition, this proposed advocate is contrary to our legal 
traditions, in which judges routinely make similar decisions on an ex 
parte basis, hearing only from the government. Mobsters don't get a 
public defender when the government seeks to wiretap their phones. 
Crooked bankers don't get a public defender when the government seeks a 
search warrant for their offices. There is no need to give ISIS a 
public defender when the government seeks to spy on its terrorists to 
keep the country safe.
  Third, the bill also contains language that amends the federal 
criminal code to implement a series of important and widely-supported 
treaties aimed at preventing nuclear terrorism and proliferation. 
However, the bill doesn't authorize the death penalty for nuclear 
terrorists. Nor does it permit the government to request authorization 
from a judge to wiretap the telephones of these terrorists or allow 
those who provide them material support to be prosecuted. These common-
sense provisions were requested by both the Bush and Obama 
Administrations, but for unknown reasons they were omitted from the 
bill.
  In fact, Senator Whitehouse and I have introduced separate 
legislation, the Nuclear Terrorism Conventions Implementation and 
Safety of Maritime Navigation Act of 2015, which would implement these 
treaties with these provisions included.
  Recently, I have been heartened that there is a bipartisan group of 
members of the Judiciary and Intelligence Committees who share these 
and other concerns. We have been discussing an alternative reform bill 
that would also end the bulk collection of telephone metadata under 
section 215. But it would also do a better job of ensuring that our 
national security is still protected.
  So I support a short, temporary reauthorization with the hope that an 
alternative reform bill can be crafted that addresses the core reform 
goals of the American people and that appropriately balances national 
security with the privacy and civil liberties of all Americans. There 
is work ahead, but it is important that we get this reform right.

                          ____________________


[Congressional Record Volume 161, Number 80 (Friday, May 22, 2015)]
[Senate]
[Pages S3303-S3304]


                            USA FREEDOM ACT

  Mrs. FEINSTEIN. Mr. President, I rise today to discuss the votes the 
Senate will soon take relating to three expiring provisions in the 
Foreign Intelligence Surveillance Act.
  I will vote to support the USA FREEDOM Act, the bill passed by the 
House last week by a vote of 338 to 88, and strongly urge my colleagues 
to do the same. In my view, this is the only action that we can take 
right now that will prevent important intelligence authorities from 
expiring at the end of next week.
  Let me describe the situation in a little more detail.
  On Monday morning at 12:01 a.m. on June 1, three separate sections of 
the Foreign Intelligence Surveillance Act, or FISA, will expire. Two of 
those provisions were first added to FISA in 2001 in the USA PATRIOT 
Act, shortly after the terrorist attacks of September 11. They are the 
business records section, also known as section 215, and the roving 
wiretap provision.
  The business records provision was originally intended to allow the 
government to go to the FISA Court to get an order to be able to obtain 
a variety of records relevant to an investigation. The authority was, 
and remains, very important for the FBI.
  Since 2006, the business records authority in FISA has also been used 
by the NSA to get telephone metadata records from telephone companies--
the records of the telephone numbers and the time and duration of a 
call. Metadata does not include the content or the location or names of 
the individuals on the phone.
  The roving wiretap provision allows the government to use 
surveillance authorities under FISA, pursuant to a court order, against 
an individual who seeks to evade surveillance by switching 
communication devices. If a terrorist gets a new cell phone or changes 
an email address, the government can continue surveillance on that 
individual under the same probable cause

[[Page S3304]]

warrant from the FISA court rather than having to go back to the Court 
for authority to collect information from each new phone number or 
email address.
  The third provision, the so-called ``lone wolf'' provision, was added 
in 2004 over concern that the intelligence community may not be able to 
gather information on a known terrorist if it could not demonstrate his 
membership in a specific terrorist group. Given the threat we face 
today from individuals inspired by ISIL, for example, that threat is 
even more real today than it was a decade ago.
  These provisions have been reviewed by the Intelligence and the 
Judiciary Committees for many years and have been subject to enormous 
public scrutiny.
  For more than a year, there has been a strong desire by the American 
public, supported by the President and by the House of Representatives, 
to make a basic change in the use of the business records authority. 
That change is to end the bulk collection of phone records by the NSA 
and to replace it with a system for the government to get a FISA Court 
order to be able to obtain a much more specific set of records from the 
telecommunications providers when there is a ``reasonable, articulable 
suspicion'' that a phone number is associated with a foreign terrorist 
group.
  The Director of National Intelligence and the Attorney General have 
written to the Senate to indicate their support for this change, which 
they state ``preserves essential operational capabilities of the 
telephone metadata program and enhances other intelligence capabilities 
needed to protect our nation and its partners.''
  I would also note that the USA FREEDOM Act will allow private 
companies that receive requests and orders from the government to 
produce information, at their own discretion, that allows them to be 
more transparent about those requests and orders from the government. I 
support this additional transparency and thank the sponsors of the USA 
FREEDOM legislation for including it.
  I have spoken to a number of technology companies, including several 
founded and based in California, that believe that transparency is not 
only good policy but that it will help them show publicly that their 
products and services are secure and independent from government 
control.
  So the choice before the Senate today is a clear one: whether to vote 
for the only sure way to continue the use of important intelligence 
authorities in a way that has the support of the American people, the 
President, the intelligence community, and the Department of Justice or 
to hope that the authorities will be renewed for 2 months despite clear 
communications from the House that it will not support such an 
extension.
  FBI Director Comey said earlier this week that the expiration of the 
business records and roving wiretap authorities would be a ``huge 
problem,'' and I believe him.
  Given the wide range of threats facing Americans, both at home and 
abroad--particularly from ISIL and Al Qaeda--we should not allow these 
valuable authorities to expire.
  To me, this is an easy choice, and I will support the USA FREEDOM 
Act.
  Mr. BROWN. Mr. President, I ask unanimous consent to engage in a 
colloquy with Senator Cornyn and Senator Leahy, ranking member of the 
Judiciary Committee, regarding important aspects of S. 337, the FOIA 
Improvement Act of 2015, that could affect the essential work of our 
financial regulators.
  The PRESIDING OFFICER. Without objection, it is so ordered.

                          ____________________


[Congressional Record Volume 161, Number 81 (Saturday, May 23, 2015)]
[Senate]
[Pages S3313-S3314]



                             CLOTURE MOTION

  The ACTING PRESIDENT pro tempore. Pursuant to rule XXII, the Chair 
lays before the Senate the pending cloture motion, which the clerk will 
state.
  The senior assistant legislative clerk read as follows:

                             Cloture Motion

       We, the undersigned Senators, in accordance with the 
     provisions of rule XXII of the Standing Rules of the Senate, 
     do hereby move to bring to a close debate on the motion to 
     proceed to H.R. 2048, an act to reform the authorities of the 
     Federal Government to require the production of certain 
     business records, conduct electronic surveillance, use pen 
     registers and trap and trace devises, and use other forms of 
     information gathering for foreign intelligence, 
     counterterrorism, and criminal purposes, and for other 
     purposes.
         Mitch McConnell, Lamar Alexander, Michael B. Enzi, David 
           Vitter, John Cornyn, Johnny Isakson, Lisa Murkowski, 
           John Barrasso, Richard Burr, Pat Roberts, Roy Blunt, 
           Bob Corker, Orrin G. Hatch, Jerry Moran, Patrick J. 
           Toomey, Mike Lee, Ted Cruz.

  The ACTING PRESIDENT pro tempore. By unanimous consent, the mandatory 
quorum call has been waived.
  The question is, Is it the sense of the Senate that debate on the 
motion to proceed to H.R. 2048, an act to reform the authorities of the 
Federal Government to require the production of certain business 
records, conduct electronic surveillance, use pen registers and trap 
and trace devices, and use other forms of information gathering for 
foreign intelligence, counterterrorism, and criminal purposes, and for 
other purposes, shall be brought to a close?
  The yeas and nays are mandatory under the rule.
  The clerk will call the roll.
  The legislative clerk called the roll.
  Mr. CORNYN. The following Senator is necessarily absent: the Senator 
from Wyoming (Mr. Enzi).
  The ACTING OFFICER pro tempore. Are there any other Senators in the 
Chamber desiring to vote?
  The yeas and nays resulted--yeas 57, nays 42, as follows:

[[Page S3314]]

                      [Rollcall Vote No. 194 Leg.]

                                YEAS--57

     Baldwin
     Bennet
     Blumenthal
     Booker
     Boxer
     Brown
     Cantwell
     Cardin
     Carper
     Casey
     Coons
     Cruz
     Daines
     Donnelly
     Durbin
     Feinstein
     Flake
     Franken
     Gardner
     Gillibrand
     Heinrich
     Heitkamp
     Heller
     Hirono
     Hoeven
     Johnson
     Kaine
     Klobuchar
     Lankford
     Leahy
     Lee
     Manchin
     Markey
     McCaskill
     Menendez
     Merkley
     Mikulski
     Murkowski
     Murphy
     Murray
     Nelson
     Peters
     Reed
     Reid
     Sanders
     Schatz
     Schumer
     Scott
     Shaheen
     Stabenow
     Sullivan
     Tester
     Udall
     Warner
     Warren
     Whitehouse
     Wyden

                                NAYS--42

     Alexander
     Ayotte
     Barrasso
     Blunt
     Boozman
     Burr
     Capito
     Cassidy
     Coats
     Cochran
     Collins
     Corker
     Cornyn
     Cotton
     Crapo
     Ernst
     Fischer
     Graham
     Grassley
     Hatch
     Inhofe
     Isakson
     King
     Kirk
     McCain
     McConnell
     Moran
     Paul
     Perdue
     Portman
     Risch
     Roberts
     Rounds
     Rubio
     Sasse
     Sessions
     Shelby
     Thune
     Tillis
     Toomey
     Vitter
     Wicker

                             NOT VOTING--1

       
     Enzi
       
  The ACTING PRESIDENT pro tempore. On this vote, the yeas are 57, the 
nays are 42.
  Three-fifths of the Senators duly chosen and sworn not having voted 
in the affirmative, the motion is rejected.
  The majority leader.
  Mr. McCONNELL. Mr. President, I enter a motion to reconsider the 
vote.
  The ACTING PRESIDENT pro tempore. The motion is entered.
  Mr. McCONNELL. Mr. President, the Senate has demonstrated that the 
House-passed bill lacks the support of 60 Senators. I would urge a 
``yes'' vote on the 2-month extension. Senator Burr, the chairman of 
the Intelligence Committee, and Senator Feinstein, the ranking member, 
as we all know, have been working on a proposal that they think would 
improve the version that the Senate has not accepted that the House 
sent over. It would allow the committee to work on this bill, refine 
it, and bring it before us for consideration. So the 2-month extension, 
it strikes me, would be in the best interest of getting an outcome that 
is acceptable to both the Senate and the House and hopefully the 
President.
  Mrs. BOXER. Mr. President.
  Mr. McCONNELL. So I would urge a ``yes'' vote.
  The ACTING PRESIDENT pro tempore. The Senator from California.

                          ____________________


[Congressional Record Volume 161, Number 81 (Saturday, May 23, 2015)]
[Senate]
[Page S3314]


                             CLOTURE MOTION

  The ACTING PRESIDENT pro tempore. Pursuant to rule XXII, the Chair 
lays before the Senate the pending cloture motion, which the clerk will 
state.
  The legislative clerk read as follows:

                             Cloture Motion

       We, the undersigned Senators, in accordance with the 
     provisions of rule XXII of the Standing Rules of the Senate, 
     do hereby move to bring to a close debate on the motion to 
     proceed to S. 1357, a bill to extend authority relating to 
     roving surveillance, access to business records, and 
     individual terrorists as agents of foreign powers under the 
     Foreign Intelligence Surveillance Act of 1978 until July 31, 
     2015, and for other purposes.
         Mitch McConnell, John Cornyn, Daniel Coats, Thom Tillis, 
           Mike Rounds, Pat Roberts, Richard Burr, John Barrasso, 
           Tom Cotton, Shelley Moore Capito, David Perdue, Lamar 
           Alexander, Michael B. Enzi, David Vitter, Johnny 
           Isakson, Roy Blunt.

  The ACTING PRESIDENT pro tempore. By unanimous consent, the mandatory 
quorum call has been waived.
  The question is, Is it the sense of the Senate that debate on the 
motion to proceed to S. 1357, a bill to extend authority relating to 
roving surveillance, access to business records, and individual 
terrorists as agents of foreign powers under the Foreign Intelligence 
Surveillance Act of 1978 until July 31, 2015, and for other purposes, 
shall be brought to a close?
  The yeas and nays are mandatory under the rule.
  The clerk will call the roll.
  The senior assistant legislative clerk called the roll.
  Mr. CORNYN. The following Senator is necessarily absent: the Senator 
from Wyoming (Mr. Enzi).
  The PRESIDING OFFICER (Mr. Sullivan). Are there any other Senators in 
the Chamber desiring to vote?
  The yeas and nays resulted--yeas 45, nays 54, as follows:

                      [Rollcall Vote No. 195 Leg.]

                                YEAS--45

     Alexander
     Ayotte
     Barrasso
     Blunt
     Boozman
     Burr
     Capito
     Cassidy
     Coats
     Cochran
     Collins
     Corker
     Cornyn
     Cotton
     Donnelly
     Ernst
     Fischer
     Flake
     Graham
     Grassley
     Hatch
     Hoeven
     Inhofe
     Isakson
     Johnson
     Kirk
     Lankford
     McCain
     Nelson
     Perdue
     Portman
     Risch
     Roberts
     Rounds
     Rubio
     Sasse
     Scott
     Sessions
     Shelby
     Sullivan
     Thune
     Tillis
     Toomey
     Vitter
     Wicker

                                NAYS--54

     Baldwin
     Bennet
     Blumenthal
     Booker
     Boxer
     Brown
     Cantwell
     Cardin
     Carper
     Casey
     Coons
     Crapo
     Cruz
     Daines
     Durbin
     Feinstein
     Franken
     Gardner
     Gillibrand
     Heinrich
     Heitkamp
     Heller
     Hirono
     Kaine
     King
     Klobuchar
     Leahy
     Lee
     Manchin
     Markey
     McCaskill
     McConnell
     Menendez
     Merkley
     Mikulski
     Moran
     Murkowski
     Murphy
     Murray
     Paul
     Peters
     Reed
     Reid
     Sanders
     Schatz
     Schumer
     Shaheen
     Stabenow
     Tester
     Udall
     Warner
     Warren
     Whitehouse
     Wyden

                             NOT VOTING--1

       
     Enzi
       
  The PRESIDING OFFICER. On this vote, the yeas are 45, the nays are 
54.
  Three-fifths of the Senators duly chosen and sworn not having voted 
in the affirmative, the motion is rejected.
  The majority leader.
  Mr. McCONNELL. Mr. President, I would say to my colleagues that it is 
clear there aren't 60 votes in the Senate for the House-passed bill, 
and there aren't 60 votes for a 60-day extension.
  So I am going to propound a series of unanimous consent requests to 
see if we can avoid having the program expire roughly 1 week from now.

                          ____________________


[Congressional Record Volume 161, Number 81 (Saturday, May 23, 2015)]
[Senate]
[Page S3314]


                  UNANIMOUS CONSENT REQUEST--H.R. 2048

  Mrs. BOXER. Mr. President, I ask unanimous consent that since a 
strong bipartisan majority of the Senate voted to invoke cloture on the 
motion to proceed to the USA FREEDOM Act, that the motion to proceed be 
agreed to, that the bill then be read a third time, and the Senate vote 
on passage of the USA FREEDOM Act.
  The ACTING PRESIDENT pro tempore. Is there objection?
  Mr. BURR. Objection.
  The ACTING PRESIDENT pro tempore. Objection is heard.
  Mrs. BOXER. Mr. President, let's be clear what happened here. We 
tried with the majority----
  Mr. McCONNELL. Regular order.
  Mr. BURR. Regular order.
  Mrs. BOXER. To protect this country, and the Republicans objected. 
Let's be clear.
  The ACTING PRESIDENT pro tempore. Regular order has been called for. 
Debate is not in order.
  Mrs. FEINSTEIN addressed the Chair.
  The ACTING PRESIDENT pro tempore. Debate is not in order.
  Mrs. FEINSTEIN. Mr. President, if I may a point of personal 
privilege.
  Mr. President, I would like to correct the majority leader, 
regretfully. I did not support the Burr bill. I do not believe that is 
the way to go. I have taken a good look at this. For those who want 
reform and want to prevent the government from holding the data, the 
FREEDOM Act is the only way to do it. The House has passed it. The 
President wants it. All of the intelligence personnel have agreed to 
it, and I think not to pass that bill is really to throw the whole 
program--that whole section 215 as well as the whole business records, 
the ``lone wolf,'' the roving wiretaps--into serious legal jeopardy.
  Mr. McCONNELL. Regular order, Mr. President.
  The ACTING PRESIDENT pro tempore. Regular order.

                          ____________________